Method for transferring encrypted useful data objects

ABSTRACT

An apparatus and method for transferring encrypted useful data objects (NDO) to a first telecommunication terminal (TG 1 ), wherein at least one encrypted useful data object is initially transferred from a switching component to the first telecommunication terminal. Time information (SABS) is transferred from the switching component to the first telecommunication terminal indicating up to which moment in time a rights object (RO) associated with the at least one encrypted useful data object will arrive. Once the rights object received by the first telecommunication terminal, the telecommunication terminal checks if the moment in time indicated in the time information has elapsed. If the moment has not elapsed, the first telecommunication terminal issues a signal relating to the receipt of a useful data object via a user interface.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.10/595,713 filed May 5, 2006, now U.S. Pat. No. 7,835,992 which is aU.S. National Stage Application of International Application No.PCT/EP2004/052494 filed Oct. 11, 2004, which designates the UnitedStates of America, and claims priority to DE Application No. 103 51961.0 filed Nov. 7, 2003, the contents of which are hereby incorporatedby reference in their entirety.

FIELD OF TECHNOLOGY

The present invention relates generally to a method for transferringencrypted useful data objects to a telecommunication terminal such as amobile telephone, for example. In particular, the present inventionrelates to a method in which the arrival and activation of the encrypteduseful data object on the telecommunication terminal is indicated in auser-friendly manner.

BACKGROUND

A method or service for reliably and accountably transferring usefuldata objects to a telecommunication terminal in a telecommunicationnetwork, wherein the telecommunication terminal takes the form of amobile radio device or mobile telephone, in particular. In this case,the transfer or also downloading of useful data objects onto the mobileradio device is expected to take place using one of the protocolsspecified by the Open Mobile Alliance (OMA) or an Internet protocol(e.g., Hypertext Transfer Protocol: http). In this case, a service forthe transfer can be specified in such a way that a user having anapplication program available on the mobile radio device (whichapplication program can be designated as a transfer client or as adownload client in the case of a simple downloading of data) should beable to transfer any useful data objects that are offered in the datacommunication network by one or more data provision components (e.g.,servers of service providers or content providers).

The WAP Forum and its successor organization the Open Mobile Alliance(OMA) have defined various methods for managing explicit usage rightsfor digital content of any type, e.g., including multimedia data. Inthis case, it is planned to equip a useful data object, which is to betransferred, with restrictions or limitations relating to its use by therecipient or user of the mobile radio device. Therefore, the number ofuses of the useful data object or also the usage duration can belimited. This is implemented in practice by describing the restrictionsusing a corresponding language, e.g., ODRL (Open Digital RightsLanguage) or the OMA DRM Rights Expression Language (REL) specified bythe OMA. For the purpose of managing the rights (DRM: Digital RightsManagement) associated with a (digital) useful data object, the transferclient or another special application (a so-called DRM agent) receivesthe rights description, analyzes it, stores it in a protected memoryarea (which cannot be accessed by the user on the mobile radio device)and in response to a request from the user to use the object eithergrants or withholds the rights in accordance with the rightsdescription. The useful data object itself can be protected againstunauthorized access either by being stored in encrypted form in a freelyaccessible memory area on the mobile radio device or by being managed bya special application, e.g., the DRM agent, which does not allow anyunauthorized access to the object by the user.

In accordance with a variant called “Separate Delivery” which isspecified for managing DRM-protected content by the Open MobileAlliance, a useful data object that is provided by a data provisioncomponent is encrypted and packaged into a so-called container file or aso-called container object (which is assigned, e.g., the data type orcontent type “Application/VND.OMA.DRM.Content”) for transporting andstoring on a telecommunication terminal such as a mobile radio device.Using a service for reliably transferring contents from a data provisioncomponent (content download), the encrypted useful data object which hasbeen packaged into the container object is transferred to thetelecommunication terminal by means of WAP protocols (e.g., WSP:Wireless Session Protocol) or Internet protocols (e.g., http).Separately from the encrypted useful data object, a so-called rightsobject is transferred to the telecommunication terminal via a securechannel and, e.g., automatically by means of WAP Push.

The rights object contains a description of the rights which are grantedto the user for using the encrypted useful data object, a reference tothe container object (which reference allows an assignment of the rightsobject to the corresponding container object) and a key with which theencrypted useful data object can be decrypted in order that it cansubsequently be used. A special entity or application (which can be theaforementioned DRM agent) is required on the telecommunication terminal(e.g., the mobile radio device, in order to use the combination of theencrypted useful data object which is packaged in the container objectand the rights object). Following the transfer of the rights object tothe telecommunication entity, the rights object is passed directly tothe DRM agent, which is responsible for the management and safeguardingof the secret (i.e., the key for decrypting the encrypted useful dataobject).

In practical terms, the DRM agent stores the rights object on thetelecommunication terminal in such a way that it is protected againstunauthorized access by other applications or users. When an encrypteduseful data object is to be used, the DRM agent is activated first. TheDRM agent searches the memory area which it manages in thetelecommunication entity for a rights object that corresponds to thecontainer object (using the identification which is included in thecontainer object and in the rights object), checks whether rights can begranted for the requested type of usage (e.g., a “playback” of musicdata or a “display” of image data, etc.) and decrypts the useful dataobject using the key from the rights object if the rights can begranted.

Using the method described above (in which an encrypted useful dataobject and a separate rights object can be used), the value of digitaldata is no longer represented by the (encrypted) useful data object orthe container object itself (e.g., but rather by the rights object andthe key that is contained therein, without which the encrypted usefuldata object is clearly unusable). Consequently, the encrypted usefuldata objects which are packaged in the container objects can be storedin a freely accessible manner on the telecommunication terminal.

Since the (encrypted) useful data objects to be transferred can be dataobjects having multimedia contents (as mentioned above) and consequentlyinvolve significant amounts of data, a service offering a substantialtransfer capacity is required for a corresponding transfer of such data.For example, a Multimedia Messaging Service (MMS) specified by the 3GPP(3rd Generation Partnership Project), and an OMA capable of performingswitching and transfer of multimedia messages to and from mobilecommunication subscribers.

A combination of both DRM and MMS techniques is, therefore, beneficial.MMS allows valuable digital content to be transferred to othersubscribers, wherein the actual usage rights for the content can bedefined and transferred likewise. For this, the contents are packagedinto the DRM container objects and optionally encrypted (depending onthe selected DRM method). The use of the contents can, therefore, berestricted to the addressed recipient/recipients of the MMS message.Therefore, unwanted subsequent circulation resulting from the firstrecipient simply forwarding a message can be prevented.

Subscriber-based services can be seen as an example for the use of acombination of DRM and MMS. For this, a user places an order with aprovider of such a service for the supply of useful data objects(including image contents, audio contents, text contents or otherinformation contents) of any type on the basis of availability (i.e., ona regular basis if specific events occur). For example, a video sequenceshowing the occurrence in the case of a goal in a football match, acurrent weather forecast including an image of a weather map and audioinformation explaining the map, or the like.

As shown in FIG. 1, the provider uses its data provision component DBK(e.g., a data server in the Internet) to send the user, at his or hertelecommunication terminal TG1, the desired information in the form ofencrypted useful data objects NDO via MMS. For example, the useful dataobject/objects NDO (which are integrated in a multimedia message MM)reach the telecommunication terminal TG1 via a switching component VK(e.g., taking the form of an MMS switching unit, in Push Mode at timepoints which the user cannot normally predict and without the userhaving explicitly to initiate a loading process for the download). Thisexample represent a significant difference in comparison with theso-called Pull Mode, in which the user must always send the provider anexplicit request in order to receive a desired useful data object.

In parallel therewith, the rights provider (who can be identical to theaforementioned service provider) uses the data provision component DBKto send the rights object(s) RO assigned to the encrypted useful dataobject NDO to the telecommunication terminal TG1 of the user (e.g.,using WAP Push via a WAP Push Proxy Gateway PPG). This means that usefuldata object and rights object(s) reach the terminal of the recipient onseparate paths and asynchronously. In the telecommunication terminalTG1, the MMS messages MM (which are transferred via the switchingcomponent, and in particular include the useful data objects NDO) arereceived and processed by an MMS user application MUA, and the rightsobjects RO are received and managed by a DRM agent DA. The MMS userapplication MUA and the DRM agent DA are interconnected in order thatthe encrypted useful data object can be activated using thecorresponding rights object. The MMS user application MUA and the DRMagent DA can be software applications, which are executed in thetelecommunication terminal TG1 by a processing unit (not shown) such asa microprocessor.

As mentioned above, the encrypted useful data objects and thecorresponding binary rights objects are transferred on separateindependent transport channels. In this case, the transfer is normallyunsynchronized relative to time. Only when both objects are present onthe receiving terminal can the protected contents of a useful dataobject be used on the terminal. When using http or the special variantof the Open Mobile Alliance for downloading useful data objects ontomobile terminals (so-called “OMA Download”), the user actively requestsa specific useful data object by means of a so-called “httpGet-Request,” which useful data object is subsequently supplied to theuser in the so-called “http Response-Message.” When a DRM-protecteduseful data object is supplied in this way, in addition to the usefuldata object, the provider can also supply a rights object via ShortMessage Service (SMS) or WAP Push.

In other words, when receiving DRM-protected useful data objects via MMSand corresponding rights objects in a manner that is unsynchronizedrelative to time, it was not conventionally possible to adapt thebehavior of the telecommunication terminal, specifically to theconsiderations of DRM. An incoming MMS message MM containingDRM-protected useful data objects NDO is directly signaled to the userin a first receive message via a user interface GUI (cf. FIG. 1), whichfeatures (e.g., a display DSP and a loudspeaker LS). If the user opensthe message and the required rights objects are not yet present, the useof the useful data object(s) by the user is initially refused by theterminal.

Following the arrival of the corresponding rights object(s), the user isadditionally notified in a second receive message that a use of theuseful data object in the multimedia message is now possible. This typeof information representation on the terminal is relativelyunsatisfactory for the user since although the user is initiallyinformed of the arrival of the multimedia message, he or she is not ableto use it because the required rights objects have not usually beenreceived (as a result of the useful data object and rights object(s)being received asynchronously relative to time as described above). Onlywhen the user is informed a second time that the required rights objectshave also arrived now, can he or she actually use the message.Consequently, the user is unnecessarily informed twice, as well as beingreminded on the first occasion that the useful data object is subject toa protection, i.e., certain restrictions.

The present invention, therefore, addresses the problem of producing auser-friendly possibility for signaling the receipt of a usable usefuldata object on a telecommunication terminal.

SUMMARY

An apparatus and method are proposed for transferring encrypted usefuldata objects to a first telecommunication terminal includes thefollowing steps. Firstly, at least one encrypted useful data object istransferred to the first telecommunication terminal by a switchingcomponent of a telecommunication network. In addition, a timeinformation is transferred to the first telecommunication terminal bythe switching component, specifying the time-point by when a rightsobject will also have arrived at the first telecommunication terminal.The rights object being assigned to the at least one encrypted usefuldata object and containing the key and the usage rights for the assigneduseful data object.

In this case, the time-point can either be specified or indicated insuch a way that a concrete absolute time and/or a concrete absolutedate, by when an assigned rights object should arrive, is indicated inthe time information. Alternatively, it can be specified by means of asubsequent time period within which (up to the last possible time-point)the rights objects can be expected. Next, a rights object which isassigned to the at least one useful data object is received by the firsttelecommunication terminal. The first telecommunication terminal thenchecks whether the time-point indicated in the time information hasalready passed. In the event that it has not yet passed, the terminaloutputs a signal (e.g., optical or acoustic) via a user interface withrespect to the receipt of a useable useful data object. This means thatsignaling to the user by the telecommunication terminal only takes placewhen both the useful data object and the associated matching rightsobject for activating the useful data object have arrived at thetelecommunication terminal (i.e., within the predefined time).

As a result of this delayed signaling, the user only learns that auseable useful data object has arrived on his or her telecommunicationterminal when the useable useful data object is present. The user is noteven aware beforehand that the useful data object is protected orencrypted and requires a rights object for decryption, which rightsobject is possibly yet to be supplied to the telecommunication terminal.This user-friendly method for transferring encrypted useful data objectsto a telecommunication terminal, and signaling this to a user, makes itpossible to gain increased acceptance of the introduction ofencrypteduseful data objects. During the check, if the firsttelecommunication terminal establishes that the time-point specified inthe time information has already passed, a configuration provides for itto output a (simple) signal via the user interface to the effect that,although an encrypted useful data object has been received, no rights orrights object for activation is (yet) available.

Furthermore, a predefined time-point or a predefined period (followingreceipt of the useful data object), which can be set (e.g., by the userof the telecommunication terminal) can be used in the firsttelecommunication terminal as a criterion indicating until when a rightsobject may still be validly received without outputting a simple signal.In this case, a definitive last time-point can be a minimal value ormaximal value of the two time-points (specified in the time informationor preset by the user), i.e., the time-point which is either nearer orfurther in relation to the receipt of the (encrypted) useful dataobject.

According to another embodiment of the invention, the proposed methodfor transferring encrypted useful data objects to the firsttelecommunication terminal takes place on the basis of the MultimediaMessaging Service (MMS). This allows a transfer of (encrypted) usefuldata objects which can also include multimedia contents involvingsignificant amounts of data (e.g., digital photographs or video clips).

According to another embodiment of the invention, the at least oneencrypted useful data object together with the time information istransferred to the first telecommunication terminal by means of adelivery message. In the case of the MMS, the encrypted useful dataobject and the time information can be integrated in an MMS deliverymessage. It is also conceivable for the time information to betransferred separately to the first telecommunication terminal by meansof a notification message (by means of an MMS recipient notification inthe case of MMS) which specifies that a useful data object is availableat the switching component for delivery to the first telecommunicationterminal. This last case means that the time information is transferredto the first telecommunication terminal in a first message initially,and that the useful data object is only transferred in a second messagesubsequently. The relevant notification message and/or delivery messagecan have a separate header field, to which the time information isassigned as a field value.

According to another embodiment of the invention, the at least oneencrypted useful data object can be sent by a data provision component(e.g., a data server of a provider of contents or useful data objects inthe telecommunication network), to the switching component forforwarding to the first telecommunication terminal. In this case, theuseful data objects can be transferred within the framework of asubscription or another information service. Furthermore, it is alsopossible for encrypted useful data objects to be sent from a secondtelecommunication terminal to the switching component for forwarding tothe first telecommunication terminal.

According to another embodiment of the invention, the firsttelecommunication terminal has a time measuring entity or timer which,after receipt of the time information, is instructed by thetelecommunication terminal to measure the time until the time-pointwhich is specified in the time information. Furthermore, the firsttelecommunication terminal can have a communication entity for carryingout the communication with the switching component. In particular, anMMS user application, and a management entity (e.g., a DRM agent) formanaging the encrypted useful data objects, which is connected to thecommunication entity. In this context, following receipt of the at leastone encrypted useful data object, the communication entity can ask themanagement entity whether a rights object is already present for the atleast one encrypted useful data object. If not, the communication entitycan instruct the time measuring entity to measure the time. According toyet another embodiment of the invention, the at least one encrypteduseful data object and the relevant assigned rights object aretransferred to the first telecommunication terminal via two differenttransport channels.

According to another embodiment of the invention, the firsttelecommunication terminal and possibly further telecommunicationterminals as well as the switching component are part of atelecommunication network. In this case, the further telecommunicationterminal(s) can be part of a first telecommunication network (e.g., inthe case of a plurality of telecommunication terminals, however, thesedo not have to be part of the same telecommunication network).Correspondingly, the switching component (which is designed inparticular as a server of a data transfer service, e.g., an MMS RelayServer) can be provided in a second telecommunication network, which isconnected to the telecommunication network(s) that are assigned to thefurther telecommunication terminal(s).

This second telecommunication network can be implemented in particularas a telecommunication network which is based on Internet protocols suchas the Hypertext Transfer Protocol. Moreover, it is conceivable for thedata provision component to be provided likewise in the secondtelecommunication network or in a further telecommunication networkwhich is connected thereto. In order that the method for transferringuseful data objects can be used as flexibly as possible, thetelecommunication terminal (or even the further telecommunicationterminals) can preferably be designed as a mobile telecommunicationterminal. In particular, it is conceivable for the data or messages tobe sent to and from the first or the further telecommunication terminalvia an air interface. In this case, the relevant telecommunicationterminal can include a radio module.

The telecommunication terminal can be designed as a mobile telephone, acordless telephone, a smartphone (combination of a small portablecomputer and a mobile telephone), a PDA (PDA: Personal DigitalAssistant) or an organizer. Furthermore, the telecommunication terminalcan also include other devices offering mobile accessibility, such as apersonal computer (PC) or a laptop which can be reached via a mobileradio network by means of a connected mobile radio device (mobiletelephone or mobile radio module). The mobile radio device can then beconnected to the personal computer or laptop via a cable, wirelessly orvia an infrared interface or a local Bluetooth network.

As mentioned above, the transfer of data and messages to and from therelevant telecommunication terminal can take place by means of WAPprotocols or the Hypertext Transfer Protocol (http). In this case, atelecommunication terminal such as the mobile radio device, includingthe telecommunication network (which is assigned to said device in theform of a mobile radio network) can function in accordance with the GSM(Global System for Mobile Communications) or the UMTS (Universal MobileTelecommunications System) standard, or the like. Such mobile radionetworks or telecommunication terminals according to the GSM or UMTSstandard can provide a platform for WAP protocols or the WAP protocolstack (WAP: Wireless Application Protocol), by means of which data(notifications or useful data objects) can be transferred in therelevant mobile radio network.

The first and the second telecommunication networks are advantageouslyconnected together by means of a connection component. If the WAPprotocol stack is used as mentioned above, a connection to this can beestablished using a WAP gateway as an interface or connection componentbetween a mobile radio network and another network (e.g., a networkwhich is based on the Internet protocol). In this way, it is possiblethat the switching component is located in a network which is based onan Internet protocol (e.g., the Internet) wherein the data such asmessages, useful data objects can be transferred via a WAP gateway andthen via an air interface of a mobile radio network between the basestation(s) of the mobile radio network and to the relevanttelecommunication terminals of users. It should be noted here that,particularly in the context of the MMS data transfer service, messagescan be sent by an MMS Relay Server, as part of a switching component, toa telecommunication terminal automatically by means of WAP Push, (i.e.,without a request from a telecommunication terminal).

As part of this activity, the MMS Relay Server acts as a so-called PushInitiator which causes the WAP gateway or a subcomponent thereof, namelythe Push Proxy Gateway, to send a message to the telecommunicationterminal using WAP Push. According to the MMS transfer service, forexample, the recipient notification is transferred to the firsttelecommunication terminal by means of WAP Push. The rights objects arepassed directly to the WAP Push Proxy Gateway (PPG) by the dataprovision component for delivery to the telecommunication terminal. Thetwo transport paths from the data provision component to thetelecommunication terminal are, therefore, different for the useful dataobject and the rights object and are not synchronized relative to time,since the data provision component does not have any direct influence onthe delivery of the multimedia message through the switching componentto the telecommunication terminal.

According to another embodiment of the invention, the useful dataobjects can be data in the form of text data, image data or video data,audio data, executable programs or software components or a combinationof these data types (i.e., multimedia data or contents). According toyet another embodiment of the invention, a telecommunication arrangementis established which comprises a switching component and a firsttelecommunication terminal including a user interface, wherein thetelecommunication arrangement is designed to carry out a method asdescribed above. Additional features and advantages of the presentinvention are described in, and will become apparent from, the followingDetailed Description, Figures and Tables that follow.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 illustrates a block diagram of an architecture of atelecommunication arrangement for transferring encrypted useful dataobjects as well as assigned rights objects from a data provisioncomponent via a switching component to a telecommunication terminal.

FIG. 2 illustrates a block diagram of the essential components of atelecommunication terminal used for the message flow upon receipt of anencrypted useful data object in accordance with a preferred embodimentof the invention.

FIG. 3 illustrates a flow diagram of the process sequence in a MMS userapplication upon receipt of a multimedia message or MMS messageincluding DRM-protected useful data objects.

FIG. 4 illustrates a block schematic diagram illustrating the messageflow during the delivery of an encrypted useful data object to atelecommunication terminal according to the MMS.

FIG. 5 illustrates an MMS message in the form of an MMS recipientnotification according to an embodiment of the invention.

FIG. 6 illustrates an MMS message in the form of an MMS delivery messageaccording to an embodiment of the invention.

DETAILED DESCRIPTION

In order to explain the message flow according to a preferred embodimentof the invention between the essential components of a telecommunicationterminal (upon receipt of an encrypted useful data object as per FIG.2), reference is first made to FIG. 1 again, in order to describe thecommunication environment of the telecommunication terminal.

As shown in FIG. 1, the telecommunication arrangement according to apreferred embodiment for carrying out a method for transferring usefuldata objects by means of the MMS includes a switching component VK, aWAP Push Proxy Gateway PPG and a first telecommunication terminal TG1.In this case, the telecommunication terminal is designed as a mobiletelephone, for example, which functions according to the UMTS standard.It is further assumed that the telecommunication terminal TG1, which isdesigned as a mobile telephone, is part of a mobile radio network. Thetelecommunication terminal TG1 is capable of using WAP protocols (e.g.,Wireless Session Protocol: WSP, etc.) or the WAP protocol stack in orderto transfer data via an air interface to a corresponding stationarysend/receive arrangement of the mobile radio network, which is assignedto the mobile telephone TG1.

Furthermore, the telecommunication arrangement includes a data provisioncomponent DBK of a provider of contents or useful data objects, whereinthe data provision component can also function as a “rights provisioncomponent” RBK of a provider of rights objects for the relevant usefuldata objects (the provider of rights objects and the provider of usefuldata objects can be identical in this case). In this case, the switchingcomponent VK, the data provision component DBK and/or the rightsprovision component RBK can be provided in the mobile radio networkwhich is assigned to the mobile telephone TG1, or can be provided (e.g.,in the Internet which is connected to the mobile radio network of themobile telephone TG1) via corresponding WAP gateways.

Additionally in FIG. 1, the mobile telephone TG1 includes an MMS userapplication MUA for carrying out the communication with the switchingcomponent, in particular according to the MMS, and a DRM component orDRM agent DA for managing the encrypted useful data objects.Furthermore, the mobile telephone TG1 comprises a user interface GUIwhich includes, e.g., a loudspeaker LS and a display DSP forrepresenting text and/or graphical contents. There follows anexplanation of an embodiment of the invention in relation to the receiptand analysis of a received multimedia message and assigned rightsobjects, as well as the resulting output of information for the user bythe mobile telephone TG1.

With reference to FIG. 2, the logical sequence of the information flowand the control signals in the mobile telephone TG1 (which includes anintegrated MMS user application MUA, DRM agent DA and graphical userinterface GUI) is described with reference to the numbers in the figure.At step 1, a multimedia message MM including the DRM-protected contentsor useful data objects NDO (which are contained therein) is receivedfrom the switching component VK by the mobile telephone TG1, and isprocessed and analyzed by the MMS user application MUA (which isintegrated in the mobile telephone TG1). In this case, the MMS userapplication MUA establishes that the MMS message MM containsDRM-protected content as per the “Separate Delivery” method, i.e., thatthe contents or useful data objects NDO are embedded in objects orcontainer objects having the MIME type“application/vnd.oma.drm.content.”

Furthermore, the MMS user application MUA establishes whether the MMSmessage MM contains signaling or time information s_(ABS) (e.g.,explanation below for FIGS. 5 and 6 in this regard), which indicates atime-linked delivery of the rights object(s) that are required foractivation. Both are assumed to be established in the present case. Step2 shows the behavior of a conventional MMS user application MUA, forbetter understanding, and is only included for information. The MMS userapplication MUA then passes the information relating to a receivedmultimedia message MM or a received encrypted NDO to the graphical userinterface for display to the user. According to the preferred embodimentof the invention, this behavior is prevented in the case illustratedhere. Instead, the further processing takes place as shown below.

At step 3, the MMS user application MUA first asks the DRM agent DAwhether corresponding rights objects are already present for theDRM-protected useful data object(s) NDO contained in the multimediamessage MM. This can apply, for example, in the case of a subscriptionrelating to useful data objects (e.g., regular transfer of marketinformation or football results), or if the rights objects were alreadydelivered before the multimedia message arrived. At step 4, the DRMagent DA searches for matching rights objects. In the present case, itdoes not find any and reports this back to the MMS user application MUA.

At step 5 a, the MMS user application MUA analyzes the time informations_(ABS) in the information element in the MMS message MM, and starts atime measuring entity or timer ZME using this value. Alternatively, theMMS user application MUA can form a minimal value from s_(ABS) and theupper limit of a time delay for the notification of the user in relationto received messages or useful data objects, and start the timer ZMEusing this value. At step 5 b, the MMS user application MUA starts afunction in the DRM agent DA, which function causes the DRM agent DA tosend a message to the MMS user application MUA in response to thearrival of rights objects (which allow an access to the DRM-protecteduseful data objects in the multimedia message MM). The identifier(s)(ContentID) of the DRM-protected useful data objects NDO is/are used asreference parameters. These identifiers are also contained in theassigned rights objects RO. The identifiers therefore allow recognitionof the assigned rights objects. The MMS user application MUA then goesinto a wait loop, which it leaves again in response to one of the eventsaccording to steps 7 a or 7 b.

At step 6, one or more rights objects RO are received by the mobiletelephone TG1, e.g., by means of WAP Push via a WAP Push Proxy GatewayPPG (cf. FIG. 1 again) and passed internally to the DRM agent DA. Thistakes place before the timer ZME expires in this case. At step 7 a, thetimer ZME expires and sends a notification of this to the MMS userapplication MUA. Alternatively, at step 7 b, the required rights objectsRO were received as per step 6 and the DRM agent DA notifies the MMSuser application MUA thereof.

At step 8, the MMS user application then controls the graphical userinterface GUI such that it indicates the arrival of a new multimediamessage MM (i.e. the arrival of an useful data object NDO). Depending onwhether the rights are present, the multimedia message is eitherindicated as “useable” if the rights objects are present (i.e., case 6.and 7 b), or with the advice that activation is still required if therights objects are not present (i.e., the case 7 a). The graphical userinterface GUI then outputs the above-mentioned positive (i.e., case 6.and 7 b) or negative (i.e., case 7 a) information as appropriate, e.g.,via the display DSP in the form of a text message or a correspondingsymbol and the user can access the message or useful data object in thepositive case.

FIG. 3 illustrates the internal processing and the process sequence inthe MMS user application MUA (corresponding to FIG. 1 or 2) upon receiptof an MMS multimedia message MM including DRM-protected useful dataobjects NDO. The sequence is explained below with reference to theletters designating the process steps. In step A, after the start of theprocess, the MMS user application MUA receives an MMS message MM whichcontains DRM-protected useful data objects NDO and a time informationS_(ABS) relating to the future delivery of rights objects. In step B,the MMS user application MUA checks whether the MMS message MM containsDRM-protected useful data objects NDO and contains signaling or a timeinformation s_(ABS) indicating that the assigned rights objects RO willbe delivered in addition on a separate transport path in the nearfuture.

In step C, if neither condition is met, the sequence jumps to processstep I. Otherwise, the processing continues with step D. In step D, theMMS user application MUA asks (if DRM-protected useful data objects arecontained) the DRM agent DA whether the rights objects RO (which areassigned to the DRM-protected useful data objects NDO) are alreadypresent and receives the information from the DRM agent as a reply. Instep E, if the required rights objects RO are already present, thesequence jumps to step I again, otherwise, the process continues withstep F.

In step F, the MMS user application extracts the time information or thevalue s_(ABS) from the corresponding information element of the MMSmessage MM, if this element is present. If a plurality of theseinformation elements are contained in the MMS message MM (which canoccur in the case of a plurality of DRM-protected useful data objectsNDO and individual signaling of the separate delivery of rights objects)the MMS user application MUA can reduce the information (e.g., byforming the maximal value or by adding the specified time durations intoa single time value s_(GES)).

The MMS user application MUA can then reduce the time value to a maximalvalue, which can be stored in the terminal in an implementation-specificmanner and can be adjusted by the user. Using the resulting time value,the MMS user application MUA starts a timer ZME and sets a condition atthe DRM agent DA, whereby the DRM agent DA notifies the MMS userapplication MUA of the arrival of matching rights objects RO (i.e.,which are assigned to the DRM-protected useful data objects NDO of theMMS message MM). In step G, the MMS user application MUA checks whetherall required rights objects RO for the present MMS message MM havearrived. If yes (i.e., if the DRM agent sent the MMS user applicationMUA a positive message concerning the arrival of the matching rightsobjects before expiry of the timer ZME) the process continues at step I,otherwise the process continues at step H. In step H, the MMS userapplication MUA checks whether the timer ZME has expired. If yes, theprocess continues at step I, otherwise, the process continues at step G(i.e., the loop is executed again).

In step I, the MMS user application MUA forwards the informationconcerning the received MMS message MM to the graphical user interfaceGUI for output to the user. In the positive case, the rights objects RO(which are required for using the MMS message MM) or the useful dataobjects NDO contained therein are present at this time, and the user canuse the message or the useful data objects NDO contained therein. If therequired rights objects are not yet present, a message is displayed tothe user but no use or only limited use is possible.

In summary, therefore, it can be stated that an essential point of theabove-described method for transferring useful data objects to atelecommunication terminal or mobile telephone is the controlled outputby the telecommunication terminal of information concerning receivedmultimedia messages or useful data objects and assigned rights objects.An essential aspect is the transfer of contents (useful data objects andrights objects) via two logically separate transport channels to twologically separate functional units (MMS user application and DRMagent), wherein the transfer is not synchronized relative to time.

Further aspects of the invention include the analysis of the incomingmultimedia message by the MMS user application MUA for a DRM-protecteduseful data object NDO, which is contained in the message. Additionally,other aspects of the invention include analysis of the incomingmultimedia message MM by the MMS user application MUA for informationelements (which are contained in the message and signal a delivery ofrights objects for the DRM-protected contents), wherein said deliverycan be expected in the near future. The internal communication betweenMMS user application MUA and DRM agent DA (i.e., the MMS userapplication MUA asking the DRM agent DA on the telecommunicationterminal whether assigned rights objects RO) are already present on thetelecommunication terminal for the DRM-protected useful data object(s)NDO contained in the MMS message MM.

Additional aspect of the invention include the internal control of atimer ZME by the MMS user application MUA (i.e., the starting of a timerZME by the MMS user application MUA). The information element(s) and/ortime information (for signaling a forthcoming separate delivery ofrights objects RO) contained in the MMS message MM is/are taken intoconsideration and furthermore a maximal duration of the timer is alsotaken into consideration, wherein the duration can beimplementation-specific and/or can also be selected by the user.

Another embodiment of the invention is directed to the MMS userapplication MUA waiting for the arrival of the rights object(s) assignedto an MMS message or to individual MM elements, wherein the DRM agentreceives and manages the rights objects RO directly, and/or expiry ofthe timer ZME. Additionally, another embodiment is directed to thedelayed output and signaling of the received multimedia message MMincluding the DRM-protected useful data objects NDO to the graphicaluser interface GUI of the telecommunication terminal (TG1) if either therequired rights are present (or at least one is present) and the usercan directly access and use the useful data objects of the multimediamessage or alternatively the timer ZME has expired.

As mentioned above with regard to FIG. 1, the transfer of encrypted orDRM-protected useful data objects from the switching component VK to thetelecommunication terminal TG1 can take place by means of MMS. FIG. 4illustrates the complete message flow for this between the switchingcomponent VK, in particular having the form of an MMS switching unit oran MMS relay server MRS in a telecommunication network, and the MMS userapplication MUA on the telecommunication terminal or mobile telephoneTG1.

Firstly, an MMS recipient notification M-Nind is sent from the MRS tothe MUA via WAP Push. In the illustrated case, the MUA initially answersthe message M-Nind using a confirmation M-NRind for the notification.Subsequently, the MUA sends a download request W-Greq to the MRS. Thelatter replies using a delivery message M-Rconf, in which is containedthe useful data object or multimedia content of the message. Finally,the MUA also confirms the delivery of the multimedia message using thedelivery confirmation M-Aind.

The two following examples illustrate the possible embedding of a newheader field in an MMS recipient notification M-Nind or in an MMSdelivery message M-Rconf in accordance with the invention.

EXAMPLE A

This example is directed to the integration of the additionalinformation element (time information) in the form of a header fieldinto the MMS recipient notification. The integration of an additionalinformation element for the time information into a recipientnotification takes place as an additional header field having the name“X-Mms-DRM-Separate-Delivery,” for example. Table 1 shows the headerfields for an MMS recipient notification, including the new header field“X-Mms-DRM-Separate-Delivery” in accordance with the invention. Itshould be noted that the field names and field values in the followingTable 1 are specified using the original English designations which areknown to a person skilled in the art.

TABLE 1 Field name Field Value Description X-Mms- Message-typeMandatory. Message-Type value = m- Designates the type of the MMS-PDU(Packet Data notification-ind Unit). X-Mms- Transaction-id- Mandatory.Transaction-ID value Transaction-ID for identification of the recipientnotification (M-Notification.ind or M-Nind) and the correspondingconfirmation by the recipient (M-NotifyResp.ind or M-NRind).X-Mms-Version MMS-version- Mandatory. value The MMS version number. FromFrom-value Optional. Address of the last MMS user application whichhandled the multimedia message, i.e. which either sent or forwarded themultimedia message. Subject Subject-value Optional. Subject of themultimedia message. X-Mms- Message-size-value Mandatory. Message-SizeData volume of the associated MMS delivery message (M-Rconf) in octets.. . . . . . . . . . . . X-Mms-Content- Content-location- Mandatory.Location value Reference for downloading the multimedia message.X-Mms-DRM- DRM-Separate- Optional. Separate- Delivery-value Indicatesthat one or more DRM-protected objects Delivery will be contained in theMMS delivery message, and that DRM rights objects will also betransferred to the telecommunication terminal e.g. via WAP Push, whereinoptionally the maximal delivery delay or a date/time is also described,by when the delivery will have taken place.

It should also be noted that, in the case of the MMS recipientnotification according to the above embodiment of the invention in Table1, the new header field is outlined twice. According to the embodiment,the following definitions can be specified for the value of the newheader field:X-Mms-DRM-Separate-Delivery=Value-length(Absolute-tokenDate-value|Relative-token Delta-secods-value)

Where:

-   -   Date-value: date and time by when the required rights object(s)        will be transferred to the terminal    -   Delta-secods-value: number of seconds within which the required        rights object(s) will be transferred to the terminal    -   Absolute-token=<octet 128>    -   Relative-token=<octet 129>

As a binary token for the encoding of the header field name“X-Mms-DRM-Separate-Delivery”, one of the values “0x34”, “0x35”, “0x36”,“0x37”, “0x38”, “0x39”, “0x3A”, “0x3B”, “0x3C”, “0x3D”, “0x3E” or “0x3F”is used according to the embodiment. This has the advantage of a morecompact representation and a more efficient transfer of the MMS message.On the basis of this explanation, it is now possible in principle for anMMS recipient notification to have the structure illustrated in FIG. 5,wherein the header fields are represented as text for the sake ofclarity. However, binary codes are used in the case of astandard-compliant transfer to the telecommunication terminal.

In the example shown in FIG. 5, a header field having the name“X-Mms-DRM Separate-Delivery” is embedded in the MMS recipientnotification. The value includes the first information item, indicatingthe number of subsequent characters in the header field, a second value(“<129>”) (which indicates that the following value is a“Delta-seconds-value”), and a third value namely the“Delta-seconds-value” (“300”) (which indicates the number of secondsuntil all associated rights objects should be received). The proposedvariant has the advantage that, as soon as the MMS recipientnotification has been delivered, it is obvious to the MMS userapplication that the MMS message will contain DRM-protected objects anda recipient-specific method can be derived from this, according to which(e.g., all messages including DRM-protected useful data objects areimmediately downloaded onto the telecommunication terminal, or similar).

Backwards compatibility for MMS user applications without support forthe additional DRM functionality is easily possible using the methodwhich is proposed here. According to the OMAIWAP specification, MMS userapplications should simply ignore unrecognized header fields and discardtheir contents.

EXAMPLE B

Integration of the additional information element (time information) inthe form of a header field into the MMS delivery message. The followingexample demonstrates the integration of an additional informationelement into an MMS delivery message. This is done analogously toExample A. The following Table 2 shows the definition of the claimed newheader field “X-Mms-DRM-Separate-Delivery” as illustrated previously inTable 1.

TABLE 2 Field name Field value Description . . . . . . . . . X-Mms-DRM-Separate- Optional. DRM- Delivery-value Indicates that one or moreDRM-protected Separate- objects will be contained in the MMS Deliverydelivery message, and that DRM rights objects will also be transferredto the telecommunication terminal e.g. via WAP Push, wherein optionallythe maximal delivery delay or a date/time is also described, by when thedelivery will have taken place.

The example of a textually encoded MMS delivery message in FIG. 6 isanalogous to the MMS recipient notification which is illustrated above,and again contains the claimed new header field“X-Mms-DRM-Separate-Delivery” —this time with a reduced“Delta-seconds-value” due to the somewhat later delivery.

It should be understood that various changes and modifications to thepresently preferred embodiments described herein will be apparent tothose skilled in the art. Such changes and modifications can be madewithout departing from the spirit and scope of the present invention andwithout diminishing its intended advantages. It is therefore intendedthat such changes and modifications be covered by the appended claims.

What is claimed is:
 1. A method for transferring encrypted data objectsto a first telecommunication terminal comprising: transferring at leastone encrypted data object to the first telecommunication terminal from aswitching component of a telecommunication network; transferring a timeinformation to the first telecommunication terminal from the switchingcomponent, specifying the time-point by when a rights object will alsohave arrived at the first telecommunication terminal, said rights objectbeing assigned to the at least one encrypted data object and containingthe key and the usage rights for the assigned data object; the firsttelecommunication terminal receiving a rights object which is assignedto the at least one data object; the first telecommunication terminalnot outputting a signal via a user interface which has been assigned tothis first telecommunication terminal, said signal concerning thereceipt of a data object, until either the time-point specified in thetime information has passed or a predefined time-point in the firsttelecommunication terminal following receipt of the data object haspassed, or the at least one rights object which is received foractivating the data object has been received.
 2. The method as claimedin claim 1, according to which if a rights object is received before thetime-point which is specified in the time information or before apredefined time-point in the telecommunication terminal, the userinterface outputs a signal concerning the receipt of a useable dataobject.
 3. The method as claimed in claim 1, according to which if thetime-point which is specified in the time information or the predefinedtime-point in the telecommunication terminal is passed before a rightsobjects is received, the user interface merely outputs a signalconcerning the receipt of an encrypted data object.
 4. The method asclaimed in claim 1, according to which the at least one encrypted dataobject together with the time information is transferred to the firsttelecommunication terminal by means of a delivery message.
 5. The methodas claimed in claim 1, according to which the time information istransferred to the first telecommunication terminal by means of anotification message which specifies that a data object is available atthe switching component for delivery to the first telecommunicationterminal.
 6. The method as claimed claim 1, according to which the atleast one encrypted data object is sent by a data provision component ofthe telecommunication network or by a second telecommunication terminalto the switching component for forwarding to the first telecommunicationterminal.
 7. The method as claimed in claim 6, according to which thedata provision component is designed as a server of a content provider.8. The method as claimed in claim 1, according to which followingreceipt of the time information the first telecommunication terminalinstructs a time measuring entity, which is assigned to said firsttelecommunication terminal, to measure the time until the time-pointwhich is specified in the time information or until the time-point whichis predefined in the telecommunication device.
 9. The method as claimedin claim 1, according to which the first telecommunication terminal hasa communication entity for carrying out the communication with theswitching component and a management entity, which is connected to thecommunication entity, for managing the encrypted data objects.
 10. Themethod as claimed in claim 9, according to which following receipt ofthe at least one encrypted data object, the communication entity asksthe management entity whether a rights object is already present for theat least one encrypted data object and, if not, instructs the timemeasuring entity to measure the time.
 11. The method as claimed in claim1, according to which the at least one encrypted data object and therelevant assigned rights object are transferred to the firsttelecommunication terminal via two different transport channels.
 12. Themethod as claimed in claim 1, according to which the messages and dataare transferred between the switching component and the firsttelecommunication terminal in the context of the Multimedia MessagingService.
 13. The method as claimed in claim 12, according to which thedelivery message is an MMS delivery message and/or the notificationmessage is an MMS recipient notification, wherein the MMS deliverymessage and/or MMS recipient notification have a separate header fieldto which the time information is assigned as a field value.
 14. Themethod as claimed in claim 1, according to which data to and from thefirst and/or second telecommunication terminal is sent via an airinterface.
 15. The method as claimed in claim 14, according to which thefirst and/or second telecommunication terminal includes a radio moduleand is designed in particular as a mobile telephone, a cordlesstelephone, or a portable computer.
 16. The method as claimed in claim14, according to which the transfer of messages to and from the firstand/or second telecommunication terminal takes place by means of WAPprotocols or the Hypertext Transfer Protocol (http).
 17. The method asclaimed in claim 1, according to which the first telecommunicationterminal is part of a first telecommunication network.
 18. The method asclaimed in claim 17, according to which the first telecommunicationnetwork is implemented as a mobile radio network which works inparticular according to the GSM or UMTS standard.
 19. The method asclaimed in claim 17, according to which. the switching component isdesigned as part of a second telecommunication network which isconnected to the first telecommunication network, said secondtelecommunication network being implemented in particular as atelecommunication network which is based on Internet protocols such asthe Hypertext Transfer Protocol.
 20. The method as claimed in claim 19,according to which the first and the second telecommunication networksare connected together by means of a connection component which isimplemented in particular as a WAP gateway.
 21. The method as claimed inclaim 1, according to which the data object contains text information,audio information, video information, an executable, program, a softwaremodule or a combination of these information elements.
 22. The method asclaimed 1, in claim wherein the data object comprises at least one oftext data, image data, video data, audio data, executable programs,software components, and multimedia data.
 23. A telecommunicationarrangement comprising a switching component and at least one firsttelecommunication terminal, wherein the telecommunication arrangement isdesigned to carry out a method comprising: at least one encrypted dataobject is transferred to the first telecommunication terminal by aswitching component of a telecommunication network; a time informationis transferred to the first telecommunication terminal by the switchingcomponent, specifying the time-point by when a rights object will alsohave arrived at the first telecommunication terminal, said rights objectbeing assigned to the at least one encrypted data object and containingthe key and the usage rights for the assigned data object; the firsttelecommunication terminal receives a rights object which is assigned tothe at least one data object; the first telecommunication terminal doesnot output a signal via a user interface which has been assigned to thisfirst telecommunication terminal, said signal concerning the receipt ofa data object, until either the time-point specified in the timeinformation has passed or a predefined time-point in the firsttelecommunication terminal following receipt of the data object haspassed, or the at least one rights object which is received foractivating the data object has been received.
 24. A method fortransferring encrypted data objects to a first telecommunicationterminal, comprising: transferring at least one encrypted data object tothe first telecommunication terminal by a switching component of atelecommunication network; transferring a time information to the firsttelecommunication terminal by the switching component specifying thetime-point when a rights object will also have arrived at the firsttelecommunication terminal, said rights object being assigned to the atleast one encrypted data object and containing the key and the usagerights for the assigned data object; receiving at the firsttelecommunication terminal a rights object, which is assigned to the atleast one data object; and outputting from the first telecommunicationterminal a signal via a user interface which has been assigned to thisfirst telecommunication terminal, said signal concerning the receipt ofa data object, when either the time-point specified in the timeinformation has passed or a predefined time-point in the firsttelecommunication terminal following receipt of the data object haspassed, or the at least one rights object which is received foractivating the data object has been received.
 25. The method accordingto claim 24, wherein if the rights object is received before thetime-point which is specified in the time information or before apredefined time-point in the telecommunication terminal, the userinterface outputs a signal concerning the receipt of a useable dataobject.
 26. The method according to claim 24, wherein if the time-pointwhich is specified in the time information or the predefined time-pointin the telecommunication terminal is passed before a rights objects isreceived, the user interface merely outputs a signal concerning thereceipt of an encrypted data object.
 27. The method according to claim24, wherein at least one encrypted data object together with the timeinformation is transferred to the first telecommunication terminal bymeans of a delivery message.
 28. The method according to claim 24,wherein the time information is transferred to the firsttelecommunication terminal by means of a notification message whichspecifies that a data object is available at the switching component fordelivery to the first telecommunication.
 29. The method according toclaim 24, wherein at least one encrypted data object is sent by a dataprovision component of the telecommunication network or by a secondtelecommunication terminal to the switching component for forwarding tothe first telecommunication terminal.
 30. The method according to claim24, wherein following receipt of the time information the firsttelecommunication terminal instructs a time measuring entity, which isassigned to said first telecommunication terminal, to measure the timeuntil the time-point which is specified in the time information or untilthe time-point which is predefined in the telecommunication device. 31.The method according to claim 24, wherein the first telecommunicationterminal has a communication entity for carrying out the communicationwith the switching component and a management entity, which is connectedto the communication entity, for managing the encrypted data objects.32. The method according to claim 31, wherein following receipt of theat least one encrypted data object, the communication entity asks themanagement entity whether a rights object is already present for the atleast one encrypted data object and, if not, instructs the timemeasuring entity to measure the time.
 33. The method according to claim24, wherein at least one encrypted data object and the relevant assignedrights object are transferred to the first telecommunication terminalvia two different transport channels.
 34. The method according to claim33, wherein the messages and data are transferred between the switchingcomponent and the first telecommunication terminal in the context of theMultimedia Messaging Service.
 35. The method according to claim 34,wherein the delivery message is an MMS delivery message and/or thenotification message is an MMS recipient notification, wherein the MMSdelivery message and/or MMS recipient notification have a separateheader field to which the time information is assigned as a field value.36. The method according to claim 24, wherein data to and from the firstand/or second telecommunication terminal is sent via an air interface.37. The method according to claim 36, wherein the first and/or secondtelecommunication terminal includes a radio module and is designed inparticular as a mobile telephone, a cordless telephone, or a portablecomputer.
 38. The method according to claim 37, wherein the transfer ofmessages to and from the first and/or second telecommunication terminaltakes place by means of WAP protocols or the Hypertext Transfer Protocol(http).
 39. The method according to claim 24, wherein the firsttelecommunication terminal is part of a first telecommunication network.40. The method according claim 39, wherein the first telecommunicationnetwork is implemented as a mobile radio network which works inparticular according to the GSM or UMTS standard.
 41. The methodaccording to claims 40, wherein the switching component is designed aspart of a second telecommunication network which is connected to thefirst telecommunication network, said second telecommunication networkbeing implemented In particular as a telecommunication network which isbased on Internet protocols such as the Hypertext Transfer Protocol. 42.The method according to claim 41, wherein the first and the secondtelecommunication networks are connected together by means of aconnection component which is implemented in particular as a WAPgateway.
 43. The method according to claim 42, wherein the dataprovision component is designed as a server of a content provider. 44.The method according to claim 43, wherein the data object contains textinformation, audio information, video information, an executableprogram, a software module or a combination of these informationelements.
 45. A telecommunication arrangement comprising a switchingcomponent and at least one first telecommunication terminal, wherein thetelecommunication arrangement is designed to carry out a method asclaimed in the claims 24.