Method for controlling database copyrights

ABSTRACT

The present invention provides a method for controlling copyrights of digital data in a database system including real time transmission of a digital picture. Copyrights are controlled using one or more of the following, as necessary, in addition to a permit key: a copyright control program, copyright information or copyright control message. The copyright control program, the copyright information and the copyright control message are supplied together with the permit key, or they are supplied together with the data. Otherwise, a part of them is supplied together with the permit key and the other part of them is supplied together with the data. The data, the permit key, the copyright control message, the copyright information and the copyright control program are (1) transmitted while encrypted, but are decrypted when used, or (2) they are transmitted while encrypted and decrypted for display only, otherwise remaining encrypted, or (3) they may not be encrypted at all.

This application is a Continuation of prior application Ser. No.08/895,493 filed Jul. 16, 1997, which is a Continuation of priorapplication Ser. No. 08/416,037 filed Mar. 31, 1995, which has beenabandoned.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a method for controlling copyrights orutilizing, storing, copying, editing and transferring of digital data,and in particular, to an application of the method to a multimediasystem.

2. Background Art

In the information oriented society of today, database systems arebecoming wide spread in which it is possible to use various types ofdata, stored independently by each computer in the past, by connectingcomputers via communication lines.

In such a database system, the information handled up to this point hasbeen conventionally coded information that can be processed by computer,and that contains a relatively small amount of information andmonochrome binary data, such as facsimile information at the most. It isnot possible to handle data containing a relatively large amount ofinformation, such as data for natural pictures or animation.

With the rapid progress of digital processing techniques for varioustypes of electrical signals, a technique is under development fordigital processing of picture signals other than binary data, handledonly as analog signals in the past.

By digitizing the picture signal, it is possible to handle a picturesignal, such as television signal, by computer. As a technique of thefuture, attention is now focused on “multimedia systems”, which cansimultaneously handle the data processed by computers and digitizedpicture data. Because the picture data contains an overwhelmingly largeamount of information compared with character data and audio data, it isdifficult to store, transfer or process the picture data by computer.For this reason, techniques for compressing and expanding picture datahave been developed. Further, several standards forcompression/expansion of picture data have been established. Forexample, the following standards have been established as commonstandards: JPEG (Joint Photographic image coding Experts Group)standards for still pictures, H.261 standards for televisionconferences, MPEG1 (Moving Picture image coding Experts Group 1)standards for picture accumulation, and MPEG2 standards to cope withcurrent television broadcasting and high definition televisionbroadcasting. By implementing these new techniques, it is now possibleto transmit digital picture data in real time.

For analog data, which has been widely used in the past, the control ofcopyrights during processing has not been an important issue because thequality of the analog data deteriorates each time the data is stored,copied, edited or transferred. However, the quality of digital data doesnot deteriorate even when the data is repeatedly stored, copied, editedor transferred. Therefore, the management and control of copyrightsduring processing of digital data is an important issue.

Up to now, there has been no adequate method for management and controlof copyrights for digital data. It has been managed and controlledmerely by copyright law or by contracts. In copyright law, onlycompensation for digital sound and picture recording devices has beenprescribed.

It is possible not only to refer to the content of a database, but alsoto effectively utilize the data obtained from the database by storing,copying or editing the data, and also transferring the edited data toother persons or to the database with the edited data registered as newdata.

In a conventional database system, only character data is handled.However, in multimedia systems, sound data and picture data, which areoriginally analog data, are digitized and used as part of the databasein addition to the other data in the database, such as character data.

Under such circumstances, it is an important question as to how tohandle copyrights of the data in the database. However, there are nomeans in the prior art for copyright management and control of suchactions as copying, editing, transferring, etc., of data.

A system for executing copyright control by using encrypted data andobtaining a permit key from a key control center via public telephonelines is disclosed in Japanese Patent Application 4-199942(US-08/098415) and Japanese Patent Application 4-289074 (US-08/143912)of the present inventors. A device for this purpose is disclosed inJapanese Patent Application 4-276941 (US-08/135634), also of the presentinventors.

SUMMARY OF THE INVENTION

It is an object of the present invention to provide a method forcontrolling copyrights in the display (including the process ofproviding sound), storage, copying, editing and transfer of digital datain a database system including real time transmission of digitalpictures.

For the control of copyrights in the database system to which thepresent invention is applied, it is essential to transmit one or more ofcopyright information; ie., messages of copyright control, informationabout copyrights and a program for controlling copyrights, whennecessary, in addition to a key for enabling users who wish to useencrypted data.

The copyright control message is displayed on a screen and advises orwarns the user if the data is being utilized in a manner inconsistentwith the conditions of the user's request or permission. The copyrightcontrol program watches and controls data use so that the data is notutilized beyond the conditions of the user's request or permission.

The copyright control program, the copyright information and thecopyright control message are supplied together with a permit key insome cases, but they may also be supplied together with data in othercases. It is also possible to supply a part of them together with thepermit key, and to supply the other part with the data.

For the data, the permit key, the copyright control message, thecopyright information and the copyright control program, there are thefollowing three cases: they are transmitted in encrypted form anddecrypted upon use; they are transmitted in encrypted form and decryptedonly when they are displayed; or they are not encrypted at all.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A and FIG. 1B illustrate examples of display messages of thepresent invention.

FIG. 2A and FIG. 2B illustrate structures for television signals.

FIG. 3A to FIG. 3J illustrate embodiments of the present invention.

FIGS. 4A-4E illustrate structures of embodiments of the presentinvention.

FIGS. 5A-5E illustrate structures of embodiments of the presentinvention.

DETAILED DESCRIPTION

In the following, description will be given on embodiments of thepresent invention.

In the prior patent applications mentioned above, it is assumed that apermit key obtaining route is different from a data obtaining route asshown in FIG. 3A, and that the permit key is obtained from a key controlcenter via public telephone lines. However, if a charging method isdetermined, it is possible to obtain the permit key via thecommunication system through which the database is supplied.

In the system of the prior patent applications, it is assumed that thepermit key for secondary exploitation is used for distribution of thedata selected from secondary exploitation. Secondary exploitationinvolving the storing, copying, editing, transferring, etc. of data isnot included in the assumption. Also, it is assumed that the data isdistributed only inside a LAN to which the users belong. Distributionoutside the LAN is not part of the assumption. Therefore, the system isnot adequate to cope with secondary exploitation unless the users chooseto honor the copyright.

To cope with various forms of the secondary exploitation as describedabove, a plurality of permit keys are prepared to match each form ofuse, and no utilization is possible unless there is a permit keysuitable for the desired form of use. As to the forms of use availablefor a database, there are display, storage, copying, edit, transfer,etc. Examples of these utilization forms as shown in FIGS. 4A to 4E.FIG. 4A illustrates a case when supplied encrypted data is displayed.The encrypted data is decrypted by a display permit key, and the datathus decrypted is displayed. FIG. 4B illustrates a case when suppliedencrypted data is edited. The encrypted data is decrypted by an editpermit key, and the data thus decrypted is displayed, and then editingis performed. FIG. 4C illustrates a case when supplied encrypted data isstored. The encrypted data is decrypted by a storage permit key, and thedata thus decrypted is displayed, and then storing is performed. FIG. 4Dillustrates a case when supplied encrypted data is copied. The encrypteddata is decrypted by a copy permit key, and the data thus decrypted isdisplayed, and then copying is performed. FIG. 4E illustrates a casewhen supplied encrypted data is transferred. The encrypted data isdecrypted by a transfer permit key, and the data thus decrypted isdisplayed, and then transfer is performed. In these Figures,double-framed parts show that data is encrypted. The permit keyssuitable for these forms of use should be prepared. However, in the casewhere the ability to execute several forms of use at the same time isdesired, it is necessary to obtain a plurality of permit keys. If theuser fails to obtain the permit keys, the desired form of use may not beexecuted.

To avoid such situations, a permit key can be used which makes itpossible to execute several forms of use. Hierarchical permit keys canbe used such that an upper level key also fulfills the function of alower level key. For example, from lower level to upper level, thehierarchy is defined as: display<storage<copying<edit<transfer. With thedisplay permit key, only display operations can be executed. Display andstorage operations can be executed by the storage permit key. Display,storage and copying operations can be executed by the copying permitkey. Display, storage, copying and edit operations can be executed bythe edit permit key. Display, storage, copying, edit and transferoperations can be executed by the transfer permit key.

In the prior patent application, i.e. Japanese Patent Application4-276941 (US-08/135634), the present inventors have proposed a system inwhich a plurality of encrypted data, each encrypted by one of aplurality of different crypt keys, are recorded (stored) in encryptedform. The data is decrypted when it is utilized in the system where thestorage permit key is the lowest level key.

By applying this system, it is possible to order key hierarchy fromlower-level to upper-level in the order of:storage<copying<transfer<display<edit. Specifically, the order is set insuch manner that storage operations can be executed by a storage permitkey; storage and copying operations can be executed by a copying permitkey; storage, copying and transfer operations can be executed by atransfer permit key; storage, copying, transfer and display operationscan be executed by a display permit key; and storage, copying, transfer,display and edit operations can be executed by an edit permit key.

In this system, storage, copying and transfer are placed at a lowerlevel than display because, even when storage, copying and transferoperations are executed on the data, it is difficult and meaningless toutilize the data since it cannot be displayed. It is necessary toexecute display in order to utilize the data. This hierarchicalarrangement is best suited to a system, in which encrypted data aresupplied and are utilized using a permit key.

The permit key is usually offered to the user on payment basis.Therefore, except where data utilization is unlimited, the number oftimes the permit key may be used is limited to one time or several timesif it is necessary to limit the number of times the data is used.

Because the data can be used if there is a permit key, it is possible touse the data beyond the permitted range if the permit key is duplicatedor falsified. To prevent this, the permit key is encrypted.

The use of data includes storage, display, copying, edit, transfer, etc.thereof, which are necessary to be allowed or prohibited.

In the case where it is necessary to limit the number of usage times orto limit forms of use, it is desirable to display a message for suchpurpose.

In the case where the information under copyright is falsified, the datasupplier or the user may suffer damages. This must be prevented.

To ensure complete copyright control, information on the originalcopyright and information on secondary and tertiary copyrights for theedition of the data are given to the data.

The above copyright control is executed by the copyright controlprogram.

In a conventional database system, the data itself is offered in acompletely defenseless state. Therefore, copyright control can beexecuted only when data is taken out of the database. In the subsequentcopyright control, there is no other way but to rely on conscience ofthe user and to take necessary measures when the data is utilized beyondthe permitted range of use.

For this reason, as described in the prior patent application, i.e.Japanese Patent Application 4-276941 (US-08/135634), the data suppliedfrom the database are left in an encrypted state, and storage isexecuted under this condition. In addition, copying and transfer arealso executed in the encrypted state. Decrypting is performed only indisplay and edit operations, and these are controlled by the copyrightcontrol program. These examples are shown in FIGS. 5A to 5E.

FIG. 5A illustrates a case when supplied encrypted data is displayed.The encrypted data is decrypted by a display permit key, and the datathus decrypted is displayed. FIG. 5B illustrates a case when suppliedencrypted data is edited. The encrypted data is decrypted by an editpermit key, and the data thus decrypted is displayed, and then editingis performed. FIG. 5C illustrates a case when supplied encrypted data isstored. The encrypted data is decrypted by a storage permit key, and thedata thus decrypted is displayed, and then, the decrypted data isencrypted again by the storing permit key, and then storing isperformed. Thus, the data encrypted again is stored. FIG. 5D illustratesa case when supplied encrypted data is copied. The encrypted data isdecrypted by a copy permit key, and the data thus decrypted is displayedand then, the decrypted data is encrypted again by the copy permit key,and then copying is performed. Thus, the data encrypted again is copied.FIG. 5E illustrates a case when supplied encrypted data is transferred.The encrypted data is decrypted by a transfer permit key, and the datathus decrypted is displayed and then, the decrypted data is encryptedagain by the transfer permit key, and then transfer is performed. Thus,the data encrypted again is transferred. In these Figures, double-framedparts show that data is with encrypted. In so doing, it is impossible touse the data beyond the permitted range. In this case, the copyrightcontrol program may be integrated with the data or may be encrypted.

Because the copyright control program is encrypted and the permit keydecrypts the copyright control program, and because the copyrightcontrol program decrypts and encrypts the data, the data is encryptedtwice.

In this case, if a crypt key unique to the data is added to thecopyright control program for the purpose of encrypting the data, it isimpossible to decrypt the data if the copyright control program isseparated from the data.

In this copyright control program, even if the data is stored, copied ortransferred within the permitted range of use, and if these operationsare executed after the data and the copyright control program have beenencrypted, it is impossible to use the data in an undesired manner.

If an operator uses a computer program inadequately and, as a result,the computer does not respond any more or computer operation is stopped,an error message is displayed so that the operator may know the cause.Similarly, if a user of the database erroneously uses the data beyondthe permitted range of the permit key, and, as a result, the computerdoes not respond or operation is stopped, the user cannot understand thecause. In this case, a copyright control message is displayed just as anerror message is displayed by the copyright control program.

The display of the copyright control message as described above alsofulfills the function of providing a warning if the user intentionallyuses the data beyond the range of use permitted by the permit key.

In general, various programs are incorporated into read-only memory(ROM) inside the equipment which the user uses, or the programs aresupplied from software. When the programs are incorporated into ROM,there is no possibility that the programs may be changed. However, theequipment to be used is limited to systems that contain the ROM. On theother hand, when the programs are supplied from software, there is nosystem limitation if the programs are transferred. However, there is apossibility that the programs may be altered.

The database is utilized by various users using various types ofdevices. Therefore, if the programs for controlling copyrights aresupplied as software, it is necessary to cope with various types ofdevices. Further, alteration of the programs must not be possible.Therefore, the copyright control program should be encrypted to preventsuch trouble. In this case, it is necessary to modify the programaccording to the device that the user uses. A program to translate thecopyright control program is provided in the communication software ofthe device which the user uses. The copyright control program can thenbe translated by the translation program so that it suits the device.

Even though the permit key for using the database may become morecomplicated due to encryption, a data size of several tens of bites issufficient. Therefore, the time required for transmitting the permit keyis far shorter than one second. In other words, even when apayment-based public telephone line is used and other information istransmitted together with the permit key, the increase of cost isnegligible.

Therefore, when transmitting the permit key as shown in FIG. 3B,utilizing surplus time, the copyright control program can betransmitted.

The copyright control program can be supplied together with the permitkey and also together with the data as shown in FIG. 3C.

In this case, the copyright control program is supplied together withthe data, and the entire data utilization process is placed undercontrol of the copyright control program. For example, the data suppliedin encrypted form cannot be decrypted unless the copyright programsupplied with it is used. If there is no such copyright control program,the data cannot be used. Thus, the control of copyrights is reinforced.Also, integration of the copyright control program with the data furtherreinforces copyright control.

The following are some examples of the copyright control message:

-   -   “Need a display permit key.”    -   “Need a storage permit key.”    -   “Need a copying permit key.”    -   “Need a edit permit key.”    -   “Need a transfer permit key.”

Some other examples are:

-   -   “Display unavailable.”    -   “Storage unavailable.”    -   “Copy unavailable.”    -   “Edit unavailable.”    -   “Transfer unavailable.”

These copyright control messages are displayed alone as shown in FIG. 1Aor in combination as shown in FIG. 1B.

Next, descriptions will be given on supply of the copyright controlmessage.

To display the copyright control message, the message must be stored inthe memory of the device which the user uses. The memory in the deviceis classified as ROM and random-access memory (RAM).

The method of storing the messages in ROM is reliable, but there is alimitation to the device because the user must use the ROM wherein thecopyright control messages are stored.

As for methods for storing messages in RAM, there is a method forsupplying messages together with the permit key, a method for supplyingmessages together with the copyright control program, and a method forsupplying messages together with the data. When the permit key and thecopyright control program are supplied at the same time, the copyrightcontrol message can also be supplied at the same time.

The copyright control message is not effective unless an adequatemessage is displayed. For this reason, the copyright control messagecannot play its designed role if the message is changed in such a mannerthat no substantial content is displayed, or further, if its content isdeleted such that nothing is displayed. To prevent this trouble, themessage is encrypted.

The display of the copyright control message is executed by thecopyright control program. The modes of display are as follows. (1) Whenan operation is attempted with no adequate key available, acorresponding message is displayed. (2) All messages corresponding tooperations available for the current permit key are displayed, if anoperation is attempted without an available permit key.

The copyright control message is supplied together with the permit keyas shown in FIG. 3D, or together with the data as shown in FIG. 3E.

The copyright control message is transmitted by transmitting allmessages or only the necessary messages required. In the former case,the quantity of information is relatively large, but security is high.In the latter case, the quantity of information is relatively small, butsecurity is low.

It is desirable that the copyright control message be inseparable fromthe data, as in the case of the copyright control program. This may befacilitated by integrating the copyright control message with thecopyright control program.

To display the copyright on printed matter, the name of the author andthe date are used. The copyright of the database is displayed byentering information such as the name of the author and the date.

As described above, edit and up-load of edited data are included in theuse of the data in the database. Specifically, the presence of secondarydata, which is edited from the data, i.e. a work of authorship, isrecognized. To ensure the copyright of the data in this context, it isnecessary to store the information on original authorship and secondaryauthorship together with the data. In case the data is used in a mannerother than for down-loading and display, copyright information includinginformation on the operator, in addition to the copyright informationstored up to that moment, is stored together with the data as history.

In this case, only the person who controls the database can put theoriginal authorship into the database as primary data. All data handledby other than the person in charge of database control is consideredsecondary data. Control of the data history is therefore furtherreinforced.

When the copyright information is separated from data which is a work ofauthorship, it becomes extremely difficult to recognize the copyright.Thus, it is necessary that the copyright information be inseparable fromthe data.

To prevent separation of the copyright information from the data, amethod for integrating the data with the copyright information or amethod for making the data unusable without copyright information aredescribed. These methods are similar to the methods described above forthe copyright control program and the copyright control message.

First, description will be given for a method for integrating the datawith the copyright information.

The data handled by computer comprises a file header indicating dataname and size, and a file body, which comprises the main body of data.Therefore, for integrating the data with the copyright information,there are methods that integrate the copyright information with the fileheader, that integrate the copyright information with the file body, andthat take other means for the purpose.

Among these methods, the method that integrates the copyrightinformation with file header, if the data is character informationexpressed with character code, is available even without a file header.Thus, the method is simple, but not very reliable. Also, because thecapacity of the file header is not high, it is not sufficient if thereis a large amount of copyright information.

Digital picture data and digital sound data are grouped together under acommon group header. The copyright information can be integrated intothis group header. However, there is a problem of header capacitysimilar to the case for the file header.

For the method of integrating the copyright information with the filebody, one way is to add copyright information for each piece of dataedited. Another way is to add the copyright information all together.

To add the copyright information for each edited piece of data, thecopyright information is added to each piece of data which is edited bycut-and-paste procedure and produced. This is not only complicated butdisadvantageous in that the entire file data becomes too big.

If the picture data indicates the copyright of original authorship, itis easy to identify corresponding data. Thus, it is not always necessaryto add the copyright information to each minimum unit of the editeddata.

It is also possible to write the copyright information into thecopyright control program. In this method, it is difficult to manipulatethe copyright information if it is written into the copyright controlprogram integrated with the data as already described.

If the data is a picture signal, it is necessary to have synchronizationsignal data in order to define scanning line, field and frame. Thissynchronization signal has high redundancy and is generally representedwith variable-length code. Thus, the copyright information can be mixedwith the variable-length code. The number of scanning lines is 480 forVGA standards. By utilizing this method, a considerable quantity ofinformation can be mixed into it.

In case the picture data is an animated picture, it is possible to writea sufficient quantity of copyright information in this method. However,if the picture data is a still picture edited by a cut-and-pasteprocedure, there may not be enough space to add the copyrightinformation.

FIG. 2A and FIG. 2B represent structures for an analog television signaland a digital television signal. FIG. 2A represents an analog televisionsignal, and FIG. 2B shows a digital television signal.

A signal containing other than picture data, such as the multiplexteletext signal in analog television, is inserted by utilizing thevertical retrace interval. The horizontal retrace interval is notutilized.

In contrast, in digital television, it is possible for a copyrightcontrol program or other multiplex teletext signal to be placed intohorizontal scanning data or into vertical scanning data.

As a method for integrating the copyright information with data, one wayis to write the copyright information into the data itself, and anotheris to write it into control code.

With the data used in computer, there is control code for controllingthe communication system or computer system in addition to the data tobe displayed on screen or used for some operation. This control codecannot be seen by the user. Therefore, if the copyright information iswritten into the control code, the copyright information thus writtendoes not cause trouble for the user.

It is also possible to enter the copyright information into the files ofthe computer using the technique of a computer virus without affectingthe operation itself.

The copyright information may be supplied together with the permit keyas shown in FIG. 3F of may be supplied together with data as shown inFIG. 3G.

Attention has been focused in recent years on digital signatures. Usinga private key, which only the person concerned knows, and a public key,which other persons also know, a digital signature is prepared from theprivate key and from the data on the file size of the document data. Ifthe document data is changed, the change can be confirmed by the privatekey, and the content of the document data can be seen at any time byother persons using the public key. Thus, this scheme offers very highsecurity.

The data in a computer can be changed without leaving any trace. Becauseof this, an author may not notice that his copyright is infringed, or auser may use the data without known that the content of the data hasbeen changed, and the author or user may suffer damages. To preventthis, a digital signature is attached to the data, and damage to thecopyright owner or the user can be avoided.

The permit key, copyright control program, copyright control message,and copyright information can be combined in any way as necessary toactualize the method for controlling database copyrights.

Also, it is possible to design in such a manner that only a part of thedata of the copyright control program, the copyright control message orthe copyright information is supplied together with the permit key asshown in FIG. 3H, 3I and 3J, and that the other part is suppliedtogether with the data to be utilized. The part supplied with the permitkey and the part supplied together with the data are then combined, andthe functions of the complete permit key maybe served after they havebeen combined together.

Thus, it is possible to give the function of the permit key to thecopyright program and copyright control message, and higher security isensured.

1. A digital data management method, comprising the steps of: encryptingdigital data to produce encrypted digital data supplied to a user, usinga utilization permit key pre-defined to permit at least one ofdisplaying, editing, storing, copying, and transferring of said digitaldata; decrypting said encrypted digital data to decrypted digital databy using a display permit key, which is utilization permit keypermitting displaying of said digital data, and displaying saiddecrypted digital data; decrypting said encrypted digital data todecrypted digital data by using a display permit key, which is saidutilization permit key permitting displaying of said digital data, anddisplaying said decrypted digital data; decrypting said encrypteddigital data to decrypted digital data by using an edit permit key,which is said utilization permit key permitting editing of said digitaldata, and editing said decrypted digital data; decrypting said encrypteddigital data to decrypted digital data by using a storage permit key,which is said utilization permit key permitting storing of said digitaldata, encrypting again said decrypted digital data to encrypted digitaldata by using said storage permit key, and storing said encrypteddigital data; decrypting said encrypted digital data to decrypteddigital data by using a copy permit key, which is said utilizationpermit key permitting copying of said digital data, encrypting againsaid decrypted digital data to encrypted digital data by using said copypermit key, and copying said encrypted digital data; and decrypting saidencrypted digital data to decrypted digital data by using a transferpermit key, which is said utilization permit key permitting transferringof said digital data, encrypting again said decrypted digital data toencrypted digital data by using said transfer permit key, andtransferring said encrypted digital data.
 2. A digital data managementmethod according to claim 1, wherein said utilization permit keyincludes a crypt key specific to said digital data.
 3. A digital datamanagement method according to claim 1, wherein said utilization permitkey includes a crypt key not specific to said digital data.
 4. A digitaldata management method according to claim 1, wherein: said utilizationpermit key is hierarchized; and said utilization permit key at an upperhierarchy level includes a function of said utilization permit key at alower hierarchy level.
 5. A digital management method according to claim4, wherein said transfer permit key is said utilization permit key atthe highest hierarchy level.
 6. A digital data management methodaccording to claim 4, wherein said edit permit key is said utilizationpermit key at the highest hierarchy level.
 7. A digital data managementmethod according to claim 1, wherein: said encrypted digital data isdecrypted to decrypted digital data only when said digital data isdisplayed or edited; and said decrypted digital data, when stored,copied or transferred, is encrypted again to said encrypted digitaldata.
 8. A digital data management method according to claim 1, wherein:said encrypted digital data is, when displayed or edited, decrypted tosaid decrypted digital data; and said decrypted digital data is, whenstored, copied or transferred, encrypted again to said encrypted digitaldata.
 9. A digital data management method according to claim 1, furthercomprising a step of using a copyright management program for managingutilization of said digital data.
 10. A digital data management methodaccording to claim 9, wherein said copyright management program isincluded in said utilization permit key.
 11. A digital data managementmethod according to claim 9, wherein a crypt key is added to saidcopyright management program.
 12. A digital data management methodaccording to claim 9, 10 or 11, wherein said copyright managementprogram is encrypted to an encrypted copyright management program.
 13. Adigital data management method according to claim 12, wherein saidencrypted copyright management program is decrypted by using saidutilization permit key.
 14. A digital data management method accordingto claim 9, wherein said copyright management program is separate fromsaid digital data.
 15. A digital data management method according toclaim 9, wherein said copyright management program is integrated withsaid digital data.
 16. A digital data management method according toclaim 1, wherein said utilization permit key includes a crypt key.
 17. Adigital data management method according to claim 9, wherein saidcopyright management program includes said crypt key.
 18. A digital datamanagement method according to claim 16 or 17, wherein said crypt key isencrypted.
 19. A digital data management method according to claim 1,wherein copyright information is added to said digital data.
 20. Adigital data control method according to claim 19, wherein saidcopyright information includes original copyright information and editcopyright information added to said digital data by a copyrightmanagement program.
 21. A digital data management method according toclaim 19, wherein said copyright information is added in a file body ofsaid digital data.
 22. A digital data management method according toclaim 19, wherein said copyright information is added in a file headerof said digital data.
 23. A digital data management method according toclaim 19, wherein said copyright information is added in a copyrightmanagement program.
 24. A digital data management method according toclaim 23, wherein said copyright management program is added in a filebody of said digital data.
 25. A digital data management methodaccording to claim 19, wherein said copyright information must bepresent in order to use said digital data.
 26. A digital data managementmethod according to claim 25, wherein utilization of said digital datais managed by a copyright management program.
 27. A digital datamanagement method according to claim 25, wherein said digital data,excluding said copyright information, is encrypted again to saidencrypted digital data by using said utilization permit key.
 28. Adigital data management method according to claim 25, wherein saiddigital data, excluding said copyright information, is encrypted againto said encrypted digital data by a copyright management program.