Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Access Control of Multimedia Objects Via Encryption

IP.com Disclosure Number: IPCOM000111114D
Original Publication Date: 1994-Feb-01
Included in the Prior Art Database: 2005-Mar-26
Document File: 2 page(s) / 81K

Publishing Venue

IBM

Related People

Johnson, DB: AUTHOR [+7]

Abstract

The invention builds on the concept that multimedia objects may be distributed on stamped media such a CD-ROM or OROM. Thus, it is advantageous for the supplier of the multimedia instructional document to provide only one such document on a CD-ROM or OROM, which minimizes the production and distribution costs to the vendor. Likewise, the vendor needs a way to market this single product yet make the product seem to be multiple products, i.e., one product for introductory students, another product for advanced students, another product for young students, another product for adult students, etc.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Access Control of Multimedia Objects Via Encryption

      The invention builds on the concept that multimedia objects may
be distributed on stamped media such a CD-ROM or OROM.  Thus, it is
advantageous for the supplier of the multimedia instructional
document to provide only one such document on a CD-ROM or OROM, which
minimizes the production and distribution costs to the vendor.
Likewise, the vendor needs a way to market this single product yet
make the product seem to be multiple products, i.e., one product for
introductory students, another product for advanced students, another
product for young students, another product for adult students, etc.

With multimedia applications, the user must handle significant
amounts of data, which computers are now able to store and manage in
an efficient manner.  Thus, clever and innovative access control
mechanisms offer the means to tailor a single product to many
different users with diverse processing requirements and
characteristics.

      The invention provides a method of access control enforcement
of access to multimedia data via user tags and data object tags.  The
user tags and data object tags contain encoded information used by
the computer software to determine whether a user is permitted access
to a multimedia data object.

   user1   user1_tag
      user2   user2_tag
       .          .
       .          .
       .          .
      useri   useri_tag

   document_object1  document_object1_tag
      document_object2  document_object2_tag
        .                     .
        .                     .
        .                     .
      document_objecti  document_objecti_tag

  Figure - User and Document Object Tagging

      The Figure illustrates the tags associated with users and
document objects.  Each user tag contains encoded information
controlling use of different document objects by that user.  Each
document object tag contains encoded information controlling use of
the document object by different users.  A user tag and document
object tag are crossed checked...