Title of Invention

CONTENTS ENCRYPTION METHOD, SYSTEM AND METHOD FOR PROVIDING CONTENTS THROUGH NETWORK USING THE ENCRYPTION METHOD

Abstract Disclosed are a contents encryption method, and a system and method for providing contents through a network using the contents encryption method. In order to provide contents through the network more securely, at least one piece of contents and corresponding metadata are recursively multi-encrypted at least once, and encrypted data are then provided. In particular, encrypted positions of the contents and corresponding decryption information are expressed as metadata, and the metadata include parameter information on respective encryption tools used for multi-encryption, an order of the applied encryption tools, positions of the encryption tools, and a list of encryption tool substitutes. The metadata are provided when the contents are provided. Therefore the contents provider and receiver can more safely and systematically manage the metadata including content decryption information, and multimedia are efficiently protected, managed, and controlled.
Full Text FORM 2
THE PATENTS ACT, 1970
(39 of 1970) &
The Patents Rules, 2003
COMPLETE SPECIFICATION
(See section 10, rule 13)
"CONTENT ENCRYPTION METHOD, SYSTEM AND
METHOD FOR PROVIDING CONTENTS THROUGH
NETWORK USING THE ENCRYPTION METHOD"
i). Information and Communications University Research and Industrial Cooperation Group of 103-6, Munjidong, Yuseong-gu, Daejeon-city 305-732, Korea. ii).KOREAN BROADCASTING SYSTEM of 18, Yoido-dong, Youngdungpo-gu, Seoul 150-010, Korea
The following specification particularly describes the invention and the manner in which it is to be performed.

WO 2006/080754

PCT/KR2005/003398

[DESCRIPTION]
[Invention Title]
CONTENTS ENCRYPTION METHOD, SYSTEM AND METHOD FOR PROVIDING CONTENTS THROUGH NETWORK USING THE
5 ENCRYPTION METHOD
[Technical Field]
The present invention relates to a contents providing system and method. More specifically, the present invention relates to a contents
10 encryption method, and a system and method for stably providing contents through a network using the encryption method.
[Background Art]
Various types of contents have been propagated through networks as new network technologies have been developed. The contents provided
15 through the network can be easily copied and delivered, and hence it is substantially difficult to protect the copyrights of those contents. For the purpose of protecting the copyrights, many methods have been used such as a watermarking scheme for determining falsehood of contents by inserting an invisible image into the contents, and a scheme for encrypting contents,
20 distributing the contents, and transmitting a decryption key only to granted users so that they may use the contents.
In the conventional case of encrypting and transmitting contents, part or all of digital contents have been encrypted, the encrypted contents have been transmitted, and a receiver has decrypted the contents by using an
25 encryption key and has used them. For example, in the case of transmitting
2
WO 2006/080754

PCT/KR2005/003398

the contents A, both the contents A and metadata (mainly text-based XML data) to which information used for encrypting the contents A have been encrypted have been transmitted.
The conventional method represents a method for protecting the
5 contents by encrypting digital data in a simple manner, but it fails to propose a systematical scheme for multi-encryption of contents and metadata, and it also fails to systematically present information on application of encryption.
When the information on application of encryption is not presented
systematically, it may take a long time for the receiver having usage rights to
10 decrypt the encrypted contents, and the receiver may not be able to use the
contents normally if the contents could not be completely decrypted,
depending on the case.
[Disclosure]
15 [Technical Problem]
It is an advantage of the present invention to recursively encrypt at least one of digital contents and corresponding metadata to thus protect and manage the contents in a more secure manner.
It is another advantage of the present invention to systematically
20 realize encryption information on the recursively encrypted contents into the
metadata, and thus efficiently manage and use the encrypted contents.
It is still another advantage of the present invention to provide the recursively encrypted contents and the metadata for systematically showing

-3-

WO 2006/080754

PCT/KR2005/003398

encryption information through the network, and thus control stable and efficient usage of contents.
[Technical Solution]
5 In one aspect of the present invention, a method for encrypting
contents includes: encrypting the contents according to a first encryption scheme, and generating first encryption metadata including information on the performance of encrypting to thus perform a first encryption stage; encrypting the contents that are encrypted in the previous stage and
10 corresponding metadata according to an established encryption scheme,
and generating second encryption metadata including information on the performance of encrypting to thus perform a second encryption stage; and performing the second encryption stage as many as an established number of times and generating final encryption contents and final encryption
1 5 metadata to thus perform a final stage.
In another aspect of the present invention, a system for providing contents to a user terminal includes: a contents encryptor for encrypting, storing, and managing contents, and generating, storing, and managing encryption metadata according to the encryption; a user interface for
20 receiving contents service request data from the user terminal; and a
contents transmitter for processing the encrypted contents that are provided by the contents encryptor and that correspond to the contents service request data, and encryption metadata corresponding to the contents, into
4

WO 2006/080754

PCT/KR2005/003398

transmittable contents information, and transmitting the contents information to the user terminal. The contents encryptor encrypts the contents according to an established first encryption scheme, performs a first encryption stage for generating first encryption metadata including information on the
5 performance of execution, encrypts the contents encrypted in the previous
stage and corresponding metadata according to an established number of encryptions, and performs a second encryption stage for generating second encryption metadata including information on the performance of the encryption at least once.
10 In still another aspect of the present invention, a method for
providing contents in a system for providing contents to a user terminal includes a) the system encrypting the contents, generating encryption metadata based on encryption information used for the encryption, and combining the encrypted contents and the encryption metadata to generate
1 5 combined contents; b) the system generating copyright metadata based on
copyright and usage right information on the contents; c) the system selecting corresponding combined contents according to contents service request data transmitted by the user terminal; d) the system acquiring the selected combined contents and copyright metadata; and e) the system
20 processing the combined contents and metadata to be transmittable
contents information, and transmitting the contents information to the user terminal. In this case, a) comprises encrypting the contents according to an established first encryption scheme, performing a first encryption stage for


-5-
WO 2006/080754

PCT/KR2005/003398

generating first encryption metadata including information on the
performance of the encryption, encrypting the contents encrypted in the
previous stage and corresponding metadata according to an established
second encryption scheme according to an established number of
5 encryptions, and performing a second encryption stage for generating
second encryption metadata including information on the performance of the encryption, at least once.
[Advantageous Effects]
10 According to the embodiment of the present invention, at least one
of digital contents and contents-protecting metadata including copyright information are recursively encrypted so that the contents are securely provided through a network and so the contents can be securely protected and managed.
15 Further, while encryption information on the encrypted contents is
systematically realized in the metadata, a tree structure including at least one of parameter information on applied encryption tools, an encryption application order, positions of encryption tools, encryption tool substitutes, digital signature information on the contents for protecting metadata, binary
20 encryption tools, and contents copyright information, is disclosed. As a result,
the encrypted contents are efficiently used, and in particular, the encrypted contents are quickly decrypted.
-6-
WO 2006/080754

PCT/KR2005/003398

[Description of Drawings]
FIG. 1 shows a schematic diagram of a contents providing system according to an embodiment of the present invention.
FIG. 2 shows a detailed schematic diagram of a contents encryptor
5 shown in FIG. 1.
FIG. 3 shows a block diagram of a user terminal according to an embodiment of the present invention.
FIG. 4 shows a concept of encrypting contents according to an embodiment of the present invention.
10 FIG. 5 shows a flowchart of a process for encrypting contents according to an embodiment of the present invention.
FIG. 6 shows a structure of encrypted metadata according to an embodiment of the present invention.
FIG. 7 and FIG. 8 show exemplified encrypted metadata according
15 to an embodiment of the present invention.
FIG. 9 shows a flowchart of a method for providing contents according to an embodiment of the present invention.
[BEST MODE]
20 In the following detailed description, only the preferred embodiment of the invention has been shown and described, simply by way of illustration of the best mode contemplated by the inventor(s) of carrying out the invention. As will be realized, the invention is capable of modification in
-7-
WO 2006/080754

PCT/KR2005/003398

various obvious respects, all without departing from the invention. Accordingly, the drawings and description are to be regarded as illustrative in nature, and not restrictive. To clarity the present invention, parts which are not described in the specification are omitted, and parts for which similar
5 descriptions are provided have the same reference numerals.
When it is described that a unit includes some components, it means that the unit can further include components in addition to those described unless stated to the contrary.
In addition, the module described in the specification represents a
10 single unit for processing a specific function or an operation, and it can be
realized by hardware, software, or a combination of hardware and software.
In the embodiment, at least one piece of contents and corresponding metadata are recursively encrypted at least once so that the contents and the metadata may be provided more securely.
15 In particular, the metadata are controlled to systematically describe
information related to contents encryption. In detail, the metadata are systematically described to include at least one of parameter information on encryption tools applied to contents, an encryption application order, positions of the encryption tools, encryption tool substitutes, binary
20 encryption tools, and contents copyright information, and digital signature
information for proving no faultiness of contents protection information.
In order to efficiently decrypt the contents that have a recursive structure and that are encrypted in many folds on the user terminal, the
8
WO 2006/080754

PCT/KR2005/003398

metadata are realized in a tree structure format including a plurality of nodes including contents encryption information. It is controlled to apply an encryption tool to each node forming the tree structure. Therefore, the user terminal can be equipped with a decryption tool before performing encryption
5 based on the metadata.
Also, in order to solve the problem in which it takes much time to encrypt all contents and the user terminal spends much decryption time, part of the contents can be encrypted instead of encrypting all the contents. When the contents are partially encrypted, information on a used encryption
10 tool (algorithm), parameters used for encryption, an encryption key, a key length, and a position in the contents to which encryption is applied Is presented as metadata, and the metadata together with the encrypted contents (ciphers) are transmitted to the user terminal, and hence, contents can be distributed in a secure manner. Also, it is allowed to use a plurality of
15 encryption algorithms for a single piece of contents so that the contents are
protected in a more secure manner than in the case of partial encryption.
FIG. 1 shows a schematic diagram of a contents providing system according to an embodiment of the present invention, given for the purpose of realizing the contents provision.
20 The system for providing contents through the network (referred to
as a contents providing system hereinafter) 100 is connected to the user terminals (310 to 30N, given as 300 for ease of description) through a network (including wired or wireless networks such as the Internet, wireless
-9-
WO 2006/080754

PCT/KR2005/003398

communication networks, future networks) 200, as shown in FIG. 1.
The system 100 for providing contents to the user terminal 300 includes a contents storage unit 110 for storing a plurality of contents to be provided, a contents processor 110 for displaying a usage right to the
5 contents to be provided, a contents encryptor 130 for encrypting the
processed contents, a contents transmitter 140 for providing the encrypted contents to the user terminal 300 through the network 200, an authenticator 150 for authenticating the user, a service manager 160, and a manager interface 170.
10 The contents storage unit 110 stores contents provided through
various ways such as contents produced by the system 100, contents provided by other systems on the network, and contents provided by users. For ease of management, the contents can be sorted, stored, and managed according to predefined categories.
15 The service manager 160 analyzes contents service request data
provided by the user terminal 300 through the network 200, and operates the contents processor 110, the contents encryptor 130, and the contents transmitter 140 so as to transmit predetermined contents according to analysis results.
20 The authenticator 150 performs authentication to determine whether
the user having requested contents is a user who can receive the contents through the system. For this, the authenticator 150 may include a user database 151 for storing user information. The user database 151 stores
-10-
WO 2006/080754

PCT/KR2005/003398

information on the users who are registered to the contents providing system 100. For example, the user database 151 stores tendency information such as sex, age, and hobbies together with IDs and passwords corresponding to the identities assigned to the users.
5 The manager interface 170 establishes copyrights and usage rights
on the contents serviced by a manager of the system according to the
embodiment of the present invention, or it establishes encryption parameters.
The contents processor 110 generates metadata on the copyright
and usage right information for the contents, and in particular, it generates
10 and manages the metadata according to the copyright and usage right
performed by the manager interface 170.
FIG. 2 shows a detailed schematic diagram for the contents encryptor 130 shown in FIG. 1.
The contents encryptor 130 includes a contents withdrawal module
15 131 for withdrawing contents to be encrypted from the contents storage unit
110, a contents multi-encryption module 132 for encrypting contents in a multiple manner, a metadata generation module 133 for generating encryption metadata on the multi-encrypted contents, a combined contents generation module 134 for combining the multi-encrypted contents and
20 corresponding encryption metadata into a single unit of combined contents,
and a combined contents storage module 135 for storing the combined contents. The combined contents stored in the combined contents storage module 135 can be stored in and managed by the contents storage unit 110.
-11-
WO 2006/080754

PCT/KR2005/003398

The contents encryptor 130 performs recursive encryption so as to increase the security of contents. For this, the contents multi-encryption module 132 and the metadata generation module 133 are operated according to an established number of recursive encryptions so that
5 recursive encrypted information may be generated by the number of

recursive encryptions. Hence, the contents multi-encryption module 132 erforms a first encryption stage for encrypting contents only, and performs a second encryption stage for encrypted contents and corresponding metadata. In this case, the metadata generation module 133 generates metadata
10 having described information related to encryption for each execution of
encryption stage. The encryption stage will be described in detail when the operations are described. In the embodiment, the encryption operation by the contents encryptor 130 is controlled by the service manager 160, and without being restricted to this, the encryption operation can be controlled by
15 including an additional control module into the contents encryptor 130.
The user terminal 300 connected through the network is a communication device for supporting receiving of contents from the above-configured system 100, and in detail, it includes wired terminals including a computer that is accessible by cable to the network 200 and an Internet-TV,
20 and wireless terminals including a cellular phone, a PCS, a PDA, an IMT-
2000, a PDA phone, and a smart phone that are wirelessiy accessible to the network 200.
FIG. 3 shows a schematic diagram of the user terminal 300
-12-
WO 2006/080754

PCT/KR2005/003398

according to the embodiment of the present invention. As shown in FIG. 3, the user terminal 300 includes a user interface 31, a user terminal manager 32, an encryption contents and metadata receiver 33, a metadata parsing and rendering controller 34, an encryption contents decryptor 35, and a
5 contents renderer 36.
The user interface 31 represents means for controlling the user to request various contents and use the requested contents, and for example, it includes input means such as a keypad and a mouse, and various output means such as a monitor and an LCD.
10 The user terminal manager 32 generates contents service request
data according to the user's contents request provided by the user interface, and transmits the generated data to the system 100.
The encryption contents and metadata receiver 33 receives information from the system 100 according to the contents service request
15 data, and determines and divides encryption contents, encryption metadata,
and copyright and usage right metadata from the received information.
The metadata parsing and rendering controller 34 parses the copyright and usage right metadata, and checks the user's contents copyright and usage right, and parses the encryption metadata when a
20 usage right is assigned to the user (or the user terminal.)
The encryption contents decryptor 35 decrypts the encryption data based on the parsing results of the encryption metadata, and the contents renderer 36 processes the decrypted contents and uses the same or controls

-13 -

WO 2006/080754

PCT/KR2005/003398

the user to check them through the user interface 31. The metadata parsing and rendering controller 34 controls the contents renderer 36 so that the usage right of contents may be applied to the conditions written to the copyright.
5 An operation of the contents providing system according to the
embodiment of the present invention will be described based on the above-described structure.
A method for encrypting contents and generating corresponding encryption metadata will now be described.
10 Recursive encryption is performed in order to improve security of the
contents provided through the network in the embodiment. FIG. 4 shows an encryption concept according to the embodiment of the present invention.
In the embodiment, recursive encryption is performed in which, as shown in FIG. 4, a piece of contents to be transmitted is encrypted by using
15 a first encryption scheme, and a first encryption stage for generating
metadata is performed based on the encryption parameter that is established when the first encryption scheme is used. The first contents and the first metadata encrypted in the first encryption stage are encrypted by using a second encryption scheme, and a second encryption stage for generating
20 second metadata is performed based on the encryption parameter that is
established when the second encryption scheme is used. In this instance, the second encryption stage can be performed several times. That is, both the encrypted contents and metadata encrypted in the previous stage are
-14-
WO 2006/080754

PCT/KR2OO5/003398

encrypted according to the encryption scheme established in the current stage, and the second encryption stage for newly generating metadata based on the encryption parameter related to the above-noted encryption is performed a plurality of times according to the defined number of recursive
5 encryption, in this instance, the contents are encrypted only according to the established encryption scheme in the first encryption stage, and both the contents and the metadata are encrypted according to the established encryption scheme in the second encryption stage. As a result, as shown in FIG. 4, the original contents to be transmitted and the corresponding
10 metadata are encrypted in a multiple manner. In the final second encryption
stage, the metadata describing information on the encryption executed to the previous stage, the final encryption contents encrypted together with contents, and the final metadata describing information on the encryption executed in the current stage (the final encryption stage) are obtained.
15 Therefore, on receiving the multi-encrypted contents (final
encryption contents and final metadata), the receiver can acquire the original contents by reversely performing the encryption stage as if peeling an onion. FIG. 5 shows a contents encryption process for performing the recursive encryption according to the embodiment of the present invention.
20 As shown in FIG. 5, the service manager 160 analyzes established
encryption control information, and operates the contents multi-encryption module 132 and the metadata generation module 133 to perform encryption in step S100.
-15-

WO 2006/080754

PCT/KR2005/003398

Encryption control information includes all pieces of control
information for encryption according to the embodiment, and in particular, it
includes control information for respective stages for recursive encryption. In
detail, it includes a first encryption scheme to be used in the first encryption
5 stage, corresponding encryption parameters, second encryption schemes to
be respectively used in the second encryption stages, and corresponding encryption parameters. For example, encryption control information can be given as Table 1.
TABLE 1

Encryption Scheme Encryption Parameters
First Encryption Stage First Encryption Scheme First Encryption Parameters
Second Encryption Stage (2-1 )th Encryption Stage SecondEncryptionScheme SecondEncryptionParameters
(2-2)th Encryption Stage Third Encryption Scheme Third Encryption Parameters
: : :
(2-N)th Encryption Stage (2-N+1)thEncryptionScheme (2-N+1)thEncryptionParameters
-16-
WO 2006/080754

PCT/KR2005/003398

The encryption controi information may be established by a manager through the manager interface 170 or may be automatically established by a program.
5 The encryption parameter represents a condition used for decrypting
or encrypting contents by using a used encryption scheme (or an algorithm). For example, the encryption parameter may include a key value, a key length, an encryption format, an initialization vector value, an operation mode (mode information for combining encrypted data blocks), a padding type, a start
10 position of contents to which encryption is applied, and a final position of the
contents to which encryption is applied. The type of the encryption parameter is variable according to the used encryption scheme (algorithm).
One of the data encryption standards (DES) based on a symmetric key or an asymmetric key for encryption bit stream data, the Triple-DES, the
15 Revest-Shamir-Adleman (RSA), the Advanced Encryption Standard (AES),
the Digital Signature Standard (DSS), the MD5, the SHA, elliptic curve encryption, and a scheme for modifying the original data by using a symmetric encryption scheme or an asymmetric encryption scheme including encryption based on prime factorization can be used to the encryption
20 scheme (or named as an encryption tool), and other encryption schemes can
also be used.
The first encryption stage is performed according to the analysis result of encryption control information.

-17-


WO 2006/080754

PCT/KR2005/003398

In detail, the contents multi-encryption module 132 analyzes the first encryption parameter established in the first encryption stage, and performs contents encryption by using the first encryption scheme based on the analysis result in step S110. In particular, when a partial encryption is
5 established by the encryption parameter, the contents multi-encryption module 132 of the contents encryptor 130 according to the embodiment of the present invention extracts a portion that corresponds to a predetermined area from the contents that are withdrawn and provided by the contents withdrawal module 131 from the contents storage unit 110, that is, the
10 contents to be encrypted, and encrypts the extracted portion according to the
established encryption scheme in step S120, and transmits information including the executed encryption scheme and the position value of the area of the encrypted contents to the metadata generation module 133.
The metadata generation module 133 generates metadata based on
15 the transmitted information, and in particular, it generates metadata including
at least one of a used encryption scheme, a value of the used encryption parameter, an operation mode, a data padding scheme, information on the encrypted contents area in the contents, and decryption information (e.g., a key and a key length) used for decrypting the used encryption in step S130.
20 Different encryption schemes can be applied to a single piece of
contents. That is, encryption can be performed by different encryption schemes to the respective areas that configure the contents, and in this case, the metadata generation module 133 can generate metadata to which an
-18-
WO 2006/080754

PCT/KR2005/003398

encryption scheme and decryption information are differently assigned for each area for each piece of contents.
When a single piece of contents is totally encrypted according to an encryption parameter, the contents multi-encryption module 132 encrypts the
5 total contents according to a single established method, and the metadata generation module 133 generates metadata including at least one of a used encryption scheme, a value of the used encryption parameter, an operation mode, a data padding scheme, and decryption information used for decrypting the used encryption.
10 The contents encrypted in the first encryption stage are called "first
encryption contents," and the generated metadata are called "first metadata." The first metadata generated as described above are stored and managed corresponding to the contents in step S140.
When the first encryption stage is performed, the second encryption
15 stage is performed at least once according to the number of recursive
encryptions established in the encryption control information.
When the second encryption stage is performed, by the control of the service manager 160, the contents multi-encryption module 132 encrypts encrypted results (which are first encryption contents acquired in the first
20 encryption stage, and which can also be results acquired in a previously-
performed second encryption stage from among the second encryption stages that are to be performed many times) acquired from the previous encryption stage (which is the first encryption stage, and which can also be a
-19-
WO 2006/080754

PCT/KR2005/003398

previously-performed second encryption stage from among the second encryption stages that are to be performed many times) together with corresponding metadata. For example, a second encryption parameter corresponding to the (2-1 )th encryption stage is analyzed from among the
5 encryption control information, and the first encryption contents that are the
results of the first encryption stage and the first metadata are encrypted by using the second encryption scheme based on the analysis result in steps S150 and S160. In the below, the results acquired by encrypting the encrypted contents and the metadata will be referred to as "second
10 encryption contents," and the second encryption contents are acquired each
time the second encryption stage is executed. Partial encryption can also be performed in the second encryption stage.
Next, the metadata generation module 133 generates metadata based on the information transmitted from the contents multi-encryption
15 module 132 according to the execution of the second encryption stage in
step S170. Hereinafter, the metadata generated in the second encryption stage will be referred to as "second metadata." In particular, the second metadata include a list of encryption schemes (encryption tools) applied in the encryption stages executed up to the current stage, an order of applied
20 encryption schemes, and a list of encryption scheme substitutes.
The second metadata are stored and managed corresponding to the respective contents in step S180. Therefore, the metadata generation module 133 stores first metadata and at least one piece of second metadata
-20-
WO 2006/080754

PCT/KR2005/003398

corresponding to the IDs assigned to the original contents.
When the second encryption stage is performed as described above, the contents encryptor 9130 checks whether to re-execute the second encryption stage according to the number of recursive encryptions of
5 encryption control information in step S190. The encryption process is terminated in step S200 when the second encryption stage is performed by as many as the number of recursive encryptions, and it returns to the previous step S150 to re-execute the second encryption stages S150 to S190 if else.
10 Therefore, the contents to be transmitted together with the metadata
are multi-encrypted according to the number of recursive encryptions, as exemplified in FIG. 4.
When the second encryption stage is performed according to the established number of recursive encryptions, the combined contents
15 generation module 134 sets the second encryption contents (results generated by encrypting the encryption results acquired in the previous stage and the corresponding metadata) which are results acquired in the final second encryption stage (e.g., the (2-N)th encryption stage when N=1,2,3,...) to be final encryption contents, sets the second metadata that has
20 information on the generation of the final second encryption contents, and
combines the final encryption contents and the final metadata to generate combined contents. The combined contents are then transmitted to the user terminal. In this instance, the combined contents are generated for ease of
-21-
WO 2006/080754

PCT/KR2005/003398

managing the contents and data, and without being restricted to this, the final encryption contents and the final metadata can be individually stored and managed without combination thereof, and predetermined encryption contents and metadata can be transmitted to the user terminal according to a
5 user request.
A structure of metadata according to the embodiment of the present invention, that is, second metadata performed by recursive encryption will now be described.
According to the embodiment of the present invention, as described
10 above, multiple encryption contents are acquired when the first and second
encryption stages are performed, and in particular, the second encryption stage is performed at least once. Therefore, when decrypting the multiple encryption contents (final encryption contents), the receiver must reversely perform the encryption stage as if peeling an onion layer by layer. Hence,
15 the final metadata provided to the user terminal must include information for
showing what type of encryption scheme is used and in what method the encryption method is applied until the final encryption contents are generated. Therefore, in the embodiment of the present invention, a list of encryption tools (encryption schemes) to which the encryption metadata are used,
20 parameter information on the respective encryption tools, a list of applying
the encryption tools, and a list of encryption tool substitutes are included.
FIG. 6 shows a structure of encryption metadata according to an embodiment of the present invention.

-22 -

WO 2006/080754

PCT/KR2005/003398

In order to efficiently decrypt the contents which are encrypted in many folds in the recursive structure on the user terminal, the encryption metadata has a tree structure, as shown in FIG. 6, including parameter information on the respective encryption tools applied for protecting multiple
5 contents, an order for applying the respective encryption tools, positions of the encryption tools, and a list of encryption tool substitutes. In addition, the encryption metadata describe digital signature information on the contents protection metadata, binary encryption tools, and contents copyright information in the tree-structured recursive method.
10 In particular, FIG. 6 shows an example of a digital rights
management (DRM) description stmcture. The DRM is server software developed for guaranteeing secure distribution of paid contents through the web, and preventing illegal distribution which is more important. The DRM completely supports tasks from contents generation to distribution and
15 management, including securely protecting the rights and benefits of
contents providers, preventing illegal reproduction, billing usage fees, and functioning as agents for settlement.
Also, the encryption metadata has a structure for protecting at least one partial node, and has a structure for providing encryption tool information
20 of the protected node as metadata.
in detail, referring to FIG. 6, the encryption metadata according to the embodiment of the present invention has a tree structure, and includes a plurality of nodes (e.g., encryption contents, tool information, encryption
-23-
WO 2006/080754

PCT/KR2005/003398

contents key information, tool license information, and digital signature.) Each node has information on the encrypted contents, and in particular, the "encryption contents key information" node from among the nodes is very sensitive and important information having a key for solving encryption
5 contents, and the metadata of the node can be partially encrypted. That is, the "encryption contents key Information" node can be selected and encrypted without totally encrypting the tree-structured encryption metadata. In this instance, for example, in order to more efficiently encrypt the encryption metadata, metadata of the "tool information" node for indicating a
10 tool list and the "encryption contents key information" node can be encrypted.
When the encryption metadata acquired in the respective encryption
stages are sequentially positioned from the bottom layer, the first encryption
metadata acquired in the first encryption stage are positioned in the lowest
layer (N1, N2, N3, N4, and N5 nodes), and the second encryption metadata
1 5 are positioned on the top side of the lowest layer for example, and in a
similar manner, the (N-1)th encryption data are positioned in the (N-1)th encryption layers (N6, N7, N8, N9, N10, and N11), and the Nth encryption data are positioned in the Nth encryption layers (N12, N13, N14, N15, N16, and N17), and thus the encryption metadata are totally configured in the
20 bottom-up form.
Since the encryption metadata are configured in the above-noted structure, reverse encryption is performed sequentially in the top-down direction from the Nth encryption layer acquired by the most recent
24

WO 2006/080754

PCT/KR2005/003398

encryption, and the reverse encryption can be performed to the lowest (first encryption) layer including the metadata to which the initial encryption is performed. That is, the encryption metadata are reversely encrypted in a like manner of peeling the layers of an onion from the outside thereof.
5 Since the encryption metadata have a tool list node N19 including
the tool list used for performance of encryption below the uppermost node N20, a decryption tool used for solving the encryption contents to be decrypted can be instantly prepared for the application only when the used tool list node N19 is analyzed. The nodes are then parsed in the top-down
10 direction of N18 ■> N15 -> N9 ■>... starting from the next "information" node
N15. The bottom encryption layer is the first encryption layer to which the encryption is initially applied, and hence it has no "information" node.
Since the encryption metadata according to the embodiment of the present invention have a systematic structure, the contents which are
15 encrypted in many folds in the recursive structure can be efficiently
decrypted by using the encryption metadata.
FIG. 7 and FIG. 8 show exemplified encryption metadata according to the embodiment of the present invention.
In FIG. 7, the DES is used as an encryption algorithm, the key value
20 for solving the encryption is given as "nfEoH/5M+yDLaxaJ+XpJ5Q==", the
key length is given as 64 bits, the operational mode of the DES algorithm applied for encryption is given as an "ECB", the used padding scheme is "PCK#5", and the initial vector value is given as "asBefes".
-25-
WO 2006/080754

PCT/KR2005/003398

FIG. 8 shows metadata for showing information on how the encryption tool is applied to a single piece of contents. In FIG. 8, the applied encryption tool can be known by the first indicator that is the tag, and am application order of the encryption tool
5 applied by the second indicator that is the tag. That is, in
FIG. 8, the represents that the encryption tool with the reference ID of 2 is used in the first order (order="1"). In the case of applying the encryption tool with the reference ID of 2, the metadata for the encryption parameter are positioned within the
10 tag as shown in FIG. 7.
Next, a method for providing recursively encrypted contents through the network will be described.
FIG. 9 shows a flowchart of a method for providing contents according to an embodiment of the present invention.
is It will be described that the contents are provided with the
precondition that the contents (in particular, recursively encrypted contents) according to the embodiment of the present invention are encrypted in the multiple manner, the multi-encrypted contents and corresponding encryption metadata are generated and stored as combined contents, and the contents
20 rights metadata are generated and stored. Without being restricted to this
description, the process for encrypting the contents and generating the metadata according to the user's contents request can be performed, and the contents based on the process can then be provided.
-26-
WO 2006/080754

PCT/KR2005/003398

As shown in FIG. 9, when the user requests to receive predetermined contents through the interface 31 by using the terminal 300, the user terminal manager 32 generates contents service request data according to the request, and transmits the same to the system 100 in step
5 S300. In this instance, the contents service request data includes at least one of a display size of the terminal, a color depth, features of an encoder and a decoder, a battery lifespan, an operating system, program execution environments, and an encryption contents decryptor (encryption contents reverse encryption processing module.)
10 On receiving the contents service request data through the network
200, the authenticator 150 of the system 100 checks whether the user can receive the contents. For example, when the user inputs an ID and a password according to the request by the authenticator 150, the authenticator 150 authenticates the user in step S310 based on the
15 information on whether the input ID and the password are stored in the user
database 151 and whether the input ID and the password match the stored ones in step S310.
When the user of the terminal 300 having provided the request data is authenticated to be a legal user who can receive contents, the
20 authenticator 150 transmits authentication results to the user terminal 300,
and the contents processor 120 and the contents encryptor 130 process the requested contents and transmit the same to the transmitter 140.
In detail, the service manager 160 analyzes the contents service
-27-

WO 2006/080754

PCT/KR2005/003398

request data transmitted through the network 200 to check which contents are requested by the user, and transmits checking results to the contents encryptor 130 and the contents processor 120.
The contents encryptor 130 withdraws the combined contents
5 generated by multi-encrypting the contents requested from the combined contents storage module 135 and combining the multi-encrypted contents and corresponding metadata, and transmits the combined contents to the transmitter 140. The withdrawn combined contents are generated by combining the final encryption contents that are multi-encrypted according to
10 the established recursive number and the final metadata.
Also, a copyright and usage right metadata withdrawal module 136 withdraws metadata on the copyright and the usage right established on the combined contents, and transmits the same to the transmitter 140 in steps S330 and S340.
15 Next, the contents transmitter 140 encodes (modulates) the
combined contents and the copyright and usage right metadata according to a transmission format, and transmits them to the user terminal through the network 200 in step S350. In this instance, in order to efficiently process the contents, the contents transmitter 1140 considers at least one of a display
20 size of the terminal that processes contents information according to the
contents service request data, a color depth, features of an encoder and a decoder, a battery lifespan, an operating system, program execution environments, and an encryption contents decryptor; acquires appropriate
-28-

WO 2006/080754

PCT/KR2005/003398

combined contents, a copyright, and usage right metadata from the contents encryptor 130; processes the data, and transmits processed results to the user terminal 300. For ease of description, the modulated and transmitted combined contents and usage right metadata will be referred to as "contents
5 information."
In response to this, the encryption contents and metadata receiver 33 of the user terminal 300 decodes (reversely modulates) the transmitted contents information to divide them into encryption contents, encryption metadata, and copyright and usage right metadata, and inputs the divided
10 data to the contents decryptor 35 and the metadata parsing and rendering
controller 34 in step S360.
The metadata parsing and rendering controller 34 parses the copyright and usage right metadata to check the user's contents copyright and usage right in step S370. The copyright and usage right metadata may
15 include contents usage conditions such as a time, a date, a designated
terminal, a designated user, a number of reproductions, and designated contents, and may also include a usage right following contents usage combination, that is, a usage right following usage order. Therefore, the metadata parsing and rendering controller 34 parses the encryption
20 metadata and transmits parsing results to the content decryptor 35 when the
usage right is assigned to the user (or user terminal) after checking them.
The content decryptor 35 uses the input encryption metadata to decrypt the encryption contents transmitted by the metadata parsing and
-29-
WO 2006/080754

PCT/KR2005/003398

rendering controller 34, and transmits parsing results to the contents Tenderer 36 in steps S380 and S390
In the embodiment, the contents encryptor 130 can partially encrypt the contents instead of encrypting the total contents in the first and second
5 encryption stages. That is, when partial encryption is established by the
encryption parameter, the contents multi-encryption module 132 extracts a predetermined area from the contents to be encrypted according to the established encryption scheme to encrypt the extracted area according to the established encryption scheme. Encryption metadata are generated based
10 on the information including the executed encryption scheme and the
position value on the area of the encrypted contents, and in particular, the encryption metadata include information on the encrypted contents area in the contents. The above-noted partial encryption can reduce the processing time used for contents encryption, and also can reduce the time used for
15 decoding (decryption) at the user terminal.
Also, the contents encryptor 130 can apply different encryption schemes to a single piece of contents. That is, the contents encryptor 130 can apply different encryption schemes to respective areas forming the contents to perform encryption, and the encryption metadata generated in
20 this case have different encryption schemes and decryption information for
the respective areas in the single piece of contents.
While this invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is
-30-
WO 2006/080754

PCT/KR2005/003398

to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
5 For example, the above-described encryption process and contents
providing method can be realized as a program to be stored in a recording medium readable by a computer. The recording medium may include all types of recording devices for storing data readable by the computer, such as a CD-ROM, a magnetic tape, a floppy disk, and a carrier wave format
1 0 (transmission through the Internet.)










-31-


WO 2006/080754

PCT/KR2005/003398

We [CLAIMS]
1. A method for encrypting contents, comprising:
encrypting the contents according to a first encryption scheme,
and generating first encryption metadata including information on the
5 performance of encrypting to thus perform a first encryption stage;
encrypting the contents that are encrypted in the previous stage
and corresponding metadata according to an established encryption scheme,
and generating second encryption metadata including information on the
performance of encrypting to thus perform a second encryption stage; and
1 0 performing the second encryption stage as many as the
established number of times and generating final encryption contents and final encryption metadata to thus perform a final stage.
2. The method of claim 1, wherein the final encryption contents are
generated by encrypting encryption metadata describing information on
15 encryption executed before the final stage and the contents, and the final
encryption metadata include information on the encryption executed in the final stage.
3. The method of claim 1, wherein the encryption metadata include
at least one of parameter information on respective encryption tools, an
20 order of the applied encryption tools, positions of the encryption tools, and a
list of encryption tool substitutes.
4. The method of claim 3, wherein the encryption metadata have
nodes in a tree structure, and the nodes include encryption information.
-32-
WO 2006/080754

PCT/KR2005/003398

5. The method of claim 1, wherein the first encryption stage or the
second encryption stage partially performs encryption on the contents.
6. The method of claim 1, wherein the encryption metadata
according to the encryption include information on the encrypted area of the
5 contents.
7. The method of claim 1, wherein the first encryption stage or the
second encryption stage performs encryption by applying different encryption
schemes to the respective areas forming the contents, and the encryption
metadata generated by the encryption have different encryption schemes
10 and decryption information for the respective areas of the contents.
8. A recording medium for recording a program executed on a computer following one of methods disclosed in Claim 1 to Claim 7.
9. A system for providing contents to a user terminal, comprising:
a contents encryptor for encrypting, storing, and managing
15 contents, and generating, storing, and managing encryption metadata
according to the encryption;
a user interface for receiving contents service request data from the user terminal; and
a contents transmitter for processing the encrypted contents that
20 are provided by the contents encryptor and correspond to the contents
service request data, and encryption metadata corresponding to the contents
into transmittable contents information, and transmitting the contents
information to the user terminal,

-33 -

WO 2006/080754

PCT/KR2005/003398

wherein the contents encryptor encrypts the contents according to
an established first encryption scheme, performs a first encryption stage for
generating first encryption metadata including information on the
performance of execution, encrypts the contents encrypted in the previous
5 stage and corresponding metadata according to an established number of
encryptions, and performs a second encryption stage for generating second encryption metadata including information on the performance of the encryption at least once.
10. The system of claim 9, wherein the contents encryptor
10 comprises:
a contents multi-encryption module for performing the first encryption stage and the second encryption stage to encrypt the contents in a multiple manner;
a metadata generation module for generating encryption
15 information used in the contents multi-encryption into encryption metadata;
a combined contents generation module for combining the multi-encrypted contents and encryption metadata into a single unit of combined contents; and
a combined contents storage module for storing and managing the
20 combined contents.
10. The system of claim 9 or 10, wherein the system further
comprises a contents processor for generating, storing, and managing
metadata that indicate copyright and usage right information on the contents

-34-
WO 2006/080754

PCT/KR2005/003398

and the contents transmitter processes the combined contents generated by
combining the encrypted contents and encryption metadata related to the
contents, as well as the metadata provided by the contents processor, into
transmittable contents information, and transmits the contents information to
5 the user terminal.
12. The system of claim 11, wherein the user terminal comprises:
a user interface;
a user terminal manager for generating contents service request data according to a user request input through the user interface, and
10 transmitting the contents service request data to the system;
an encryption contents and metadata receiver for receiving contents information from the system, and dividing the contents information into encrypted contents, encryption metadata, and metadata;
a metadata parsing and rendering controller for parsing the
15 metadata to check the usage right on the contents, and parsing the
encryption metadata when the contents are available;
an encryption contents decryptor for decrypting the encrypted contents based on the parsing results of the encryption metadata; and
a contents renderer for processing the decrypted contents.
20 13. The system of claim 12, wherein the contents service request
data comprise at least one of a terminal display size, a color depth, features
of an encoder and a decoder, a battery lifespan, an operating system,
program execution environments, and an encryption contents decryptor
-35-
WO 2006/080754

PCT/KR2005/003398

(encryption contents reverse encryption processing module.)
14. The system of claim 13, wherein the contents transmitter
considers at least one of a terminal display size, a color depth, features of an
encoder and a decoder, a battery lifespan, an operating system, program
5 execution environments, and an encryption contents decryptor (encryption
contents reverse encryption processing module) based on the contents service request data, receives and processes encrypted contents and encryption metadata related to the contents from the contents encryptor, receives and processes metadata from the contents processor, and
10 transmits processing results to the user terminal.
15. The system of claim 11, wherein the contents encryptor
performs encryption on a predetermined area of the contents in the first
encryption stage or the second encryption stage, and in this instance, the
encryption metadata include information on the encrypted contents area
15 within the contents.
16. A method for providing contents in a system for providing
contents to a user terminal, the method comprising:
a) the system encrypting the contents, generating encryption
metadata based on encryption information used for the encryption, and
20 combining the encrypted contents and the encryption metadata to generate
combined contents;
b) the system generating copyright metadata based on copyright
and usage right information on the contents;
-36-
WO 2006/080754

PCT/KR2005/003398

c) the system selecting corresponding combined contents according to contents service request data transmitted by the user terminal;
d) the system acquiring the selected combined contents and copyright metadata; and
5 e) the system processing the combined contents and metadata to
be transmlttable contents information, and transmitting the contents information to the user terminal,
wherein a) comprises encrypting the contents according to an established first encryption scheme, performing a first encryption stage for
10 generating first encryption metadata including information on the performance of the encryption, encrypting the contents encrypted in the previous stage and corresponding metadata according to an established second encryption scheme according to an established number of encryptions, and performing a second encryption stage for generating
15 second encryption metadata including information on the performance of the encryption, at least once.
17. The method of claim 16, wherein a) comprises performing
encryption by applying different encryption schemes to the respective areas
forming the contents, and the first metadata have different encryption
20 schemes and decoding information for the respective areas for a single piece of contents.
18. The method of claim 16, wherein the encryption metadata
include at least one of parameter information for respective encryption tools,
-37-

WO 2006/080754 PCT/KR2005/003398
an order of the applied encryption tools, positions of the encryption tools, and a list of encryption tool substitutes.
19. The method of claim 16, wherein c) comprises performing user
authentication on the user terminal having transmitted the contents service
5 request data, and selecting corresponding combined contents when the user
is an authenticated user.




































38


ABSTRACT
CONTENTS ENCRYPTION METHOD, SYSTEM AND METHOD FOR PROVIDING CONTENTS THROUGH NETWORK USING THE ENCRYPTION METHOD.
Disclosed are a contents encryption method, and a system and method for providing contents through a network using the contents encryption method. In order to provide contents through the network more securely, at least one piece of contents and corresponding metadata are recursively multi-encrypted at least once, and encrypted data are then provided. In particular, encrypted positions of the contents and corresponding decryption information are expressed as metadata, and the metadata include parameter information on respective encryption tools used for multi-encryption, an order of the applied encryption tools, positions of the encryption tools, and a list of encryption tool substitutes. The metadata are provided when the contents are provided. Therefore the contents provider and receiver can more safely and systematically manage the metadata including content decryption information, and multimedia are efficiently protected, managed, and controlled.
- 39-

Documents:

652-MUMNP-2007-ABSTRACT(27-1-2011).pdf

652-mumnp-2007-abstract(3-5-2007).pdf

652-mumnp-2007-abstract(granted)-(22-3-2011).pdf

652-mumnp-2007-abstract.doc

652-mumnp-2007-abstract.pdf

652-mumnp-2007-cancelled pages(27-1-2011).pdf

652-mumnp-2007-claims(3-5-2007).pdf

652-MUMNP-2007-CLAIMS(AMENDED)-(27-1-2011).pdf

652-mumnp-2007-claims(granted)-(22-3-2011).pdf

652-mumnp-2007-claims.doc

652-mumnp-2007-claims.pdf

652-MUMNP-2007-CORRESPONDENCE(10-11-2009).pdf

652-mumnp-2007-correspondence(19-11-2007).pdf

652-mumnp-2007-correspondence(6-11-2009).pdf

652-mumnp-2007-correspondence(ipo)-(22-3-2011).pdf

652-mumnp-2007-correspondence(ipo)-(28-1-2010).pdf

652-mumnp-2007-correspondence-received.pdf

652-mumnp-2007-description (complete).pdf

652-mumnp-2007-description(complete)-(3-5-2007).pdf

652-mumnp-2007-description(granted)-(22-3-2011).pdf

652-MUMNP-2007-DRAWING(27-1-2011).pdf

652-mumnp-2007-drawing(3-5-2007).pdf

652-mumnp-2007-drawing(granted)-(22-3-2011).pdf

652-mumnp-2007-drawings.pdf

652-MUMNP-2007-ENGLISH TRANSLATION(27-1-2011).pdf

652-mumnp-2007-form 1(19-11-2007).pdf

652-MUMNP-2007-FORM 1(27-1-2011).pdf

652-mumnp-2007-form 1(3-5-2007).pdf

652-mumnp-2007-form 18(19-7-2007).pdf

652-mumnp-2007-form 2(3-5-2007).pdf

652-mumnp-2007-form 2(granted)-(22-3-2011).pdf

652-MUMNP-2007-FORM 2(TITLE PAGE)-(27-1-2011).pdf

652-mumnp-2007-form 2(title page)-(3-5-2007).pdf

652-mumnp-2007-form 2(title page)-(granted)-(22-3-2011).pdf

652-MUMNP-2007-FORM 26(10-11-2009).pdf

652-mumnp-2007-form 26(19-11-2007).pdf

652-mumnp-2007-form 26(31-10-2007).pdf

652-mumnp-2007-form 3(15-11-2007).pdf

652-mumnp-2007-form 3(19-11-2007).pdf

652-MUMNP-2007-FORM 3(27-1-2011).pdf

652-mumnp-2007-form 3(3-5-2007).pdf

652-MUMNP-2007-FORM 5(27-1-2011).pdf

652-mumnp-2007-form 5(3-5-2007).pdf

652-mumnp-2007-form 6(10-11-2009).pdf

652-mumnp-2007-form-1.pdf

652-mumnp-2007-form-2.doc

652-mumnp-2007-form-2.pdf

652-mumnp-2007-form-3.pdf

652-mumnp-2007-form-5.pdf

652-mumnp-2007-form-pct-ib-311.pdf

652-mumnp-2007-form-pct-isa-237.pdf

652-MUMNP-2007-OTHER DOCUMENT(27-1-2011).pdf

652-mumnp-2007-pct-search report.pdf

652-MUMNP-2007-PETITION UNDER RULE 137(27-1-2011).pdf

652-MUMNP-2007-REPLY TO EXAMINATION REPORT(27-1-2011).pdf

652-MUMNP-2007-SPECIFICATION(AMENDED)-(27-1-2011).pdf

652-mumnp-2007-wo international publication report(3-5-2007).pdf

abstract1.jpg


Patent Number 246937
Indian Patent Application Number 652/MUMNP/2007
PG Journal Number 12/2011
Publication Date 25-Mar-2011
Grant Date 22-Mar-2011
Date of Filing 03-May-2007
Name of Patentee KOREAN BROADCASTING SYSTEM
Applicant Address 18, YOIDO-DONG, YOUNGDUNGPO-GU, SEOUL 150-010, KOREA.
Inventors:
# Inventor's Name Inventor's Address
1 KIM, MUN-CHURL DOONGJI APT. 110-405, DOONSAN-DONG, SEO-GU, DAEJEON-CITY 302-734, KOREA.
2 PARK, KEUN-SOO 18, YOIDO-DONG, YOUNGDUNGPO-GU, SEOUL 150-790, KOREA.
3 LEE, BEOM GOO 18, YOIDO-DONG, YOUNGDUNGPO-GU, SEOUL 150-790, KOREA.
PCT International Classification Number G06F15/00
PCT International Application Number PCT/KR2005/003398
PCT International Filing date 2005-10-12
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 10-2004-0081536 2004-10-12 Republic of Korea