US20020016919A1 - Media content protection utilizing public key cryptography - Google Patents

Media content protection utilizing public key cryptography Download PDF

Info

Publication number
US20020016919A1
US20020016919A1 US09/129,370 US12937098A US2002016919A1 US 20020016919 A1 US20020016919 A1 US 20020016919A1 US 12937098 A US12937098 A US 12937098A US 2002016919 A1 US2002016919 A1 US 2002016919A1
Authority
US
United States
Prior art keywords
information
media
key
content
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/129,370
Other versions
US6438235B2 (en
Inventor
J. Robert Sims
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Co filed Critical Hewlett Packard Co
Priority to US09/129,370 priority Critical patent/US6438235B2/en
Assigned to HEWLETT-PACKARD COMPANY reassignment HEWLETT-PACKARD COMPANY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SIMS, J. ROBERT III
Priority to EP99106479A priority patent/EP0978839B1/en
Priority to DE69902078T priority patent/DE69902078T2/en
Priority to JP21497299A priority patent/JP2000138664A/en
Priority to US09/414,213 priority patent/US6550011B1/en
Publication of US20020016919A1 publication Critical patent/US20020016919A1/en
Publication of US6438235B2 publication Critical patent/US6438235B2/en
Application granted granted Critical
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEWLETT-PACKARD COMPANY
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00137Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00137Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users
    • G11B20/00144Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users involving a user identifier, e.g. a unique customer ID
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00543Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein external data is encrypted, e.g. for secure communication with an external device or for encrypting content on a separate record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0071Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a purchase action
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00753Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
    • G11B20/00768Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2121Chip on media, e.g. a disk or tape with a chip embedded in its case
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering

Definitions

  • the present invention relates to protection of content stored on a bulk storage media and more particularly to a system and method for providing controlled utilization of the stored content through the use of public keys stored upon the media itself.
  • DVD media currently only protected for video content, utilizes a two part scheme: a cryptographic key for decrypting information recorded on the media is produced according to a predefined protocol and stored according to that protocol on a limited access portion of the media; and a cryptographic technique, also defined by the protocol, is utilized to securely pass that key to a play-back entity.
  • a media device i.e., media player, or media itself
  • a cryptographic technique also defined by the protocol
  • the security lies in keeping secret how the cryptographic keys are made and how the messages, i.e., the passing of the keys, are encrypted. If the protocol itself were revealed then all content, regardless of the particular entity which produced/recorded it, becomes compromised because, if the protocol were common knowledge, rogues could generate and/or intercept keys capable of decrypting protected content. Any compromise of the system will compromise all systems and media at the same time.
  • the media decryption key stored on the media is read by a media reader, i.e., DVD disk drive, only in proper circumstances, i.e., an authorized play-back device requests the media content key according to a preestablished protocol, and thereafter, provided in encrypted form for communication to the play-back device.
  • the media content key is passed after a key exchange is done such that when the key is handed from the media reader to the play-back device it is done encrypted.
  • the play-back device would send its encryption key to the media reader, the media reader would read the media content key from the media, encrypt the media content key with the play-back device's encryption key, and pass this encrypted version of the media content key to the play-back device where it may be decrypted with the play-back device's (secretly held) decryption key for use of the media content key in accessing media content as provided by the media reader.
  • the protocol for encryption of the data and the generation of keys is only revealed by license, i.e., only trusted manufacturers of content and devices which read, write, or otherwise utilize this content are provided with the secrets of the protocol, and then only under the terms of a license agreement restricting use and dissemination of this secret information.
  • Very few people or entities are able to obtain such a license, and its attendant secrets, in order to provide content and/or devices adapted in the nature of the protocol.
  • general content providers such as small entities or entities providing content for internal or limited use, cannot protect their work as they have no way of recording such a key to the media in a secure manner that prevents illegitimate copying/utilization of protected content while allowing legitimate generation of secure disk. Therefore, there is no process that one can publicly use to generate such keys and, therefore, there is no process for those other than the licensed entities to record protected content compatible with this scheme.
  • the present invention operates to provide protection in addition to the limited access of content through the use of cryptographic keys. Specifically, the present invention is able to securely identify a piece of media as being an original. Likewise, the present invention is able to securely identify a play-back device as being authorized. Accordingly, devices or users of the media may be assured that interaction therewith is authorized as each end can securely identify the other and each end can securely send data to the other end.
  • Operation of the present invention is not to allow or disallow any particular transmission, but rather to obscure the content (information or data), using cryptographic methods, such that only a legitimate recipient can make use of that data, i.e., nobody but the content owner, or those authorized by him/her, is able to copy protected media content.
  • the present invention utilizes public key algorithms well known in the art to provide cryptographic keys useful according to the present invention.
  • the present invention provides a unique system and method for managing and utilizing these cryptographic keys.
  • the media reader or disk drive honors the technique of the present invention.
  • sensitive information such as the aforementioned content key
  • media devices unaware of the scheme will not crack it, i.e., a drive that can read/write raw the standard areas won't copy the copy protection information provided in a secured area.
  • any attempt at violating the technique of the present invention is either unable to perform the technique at all, i.e., is unable to instruct a media reader to access restricted areas of the media, or if the device allows improper utilization there is a legal remedy available.
  • the present invention does allow the public at large to generate their own protected content without requiring license to the technology or requiring any secret information that they do not themselves generate. This is because the only secrets in the present technique are the keys themselves and, thus, allowing the rules for generating the keys to be public. Accordingly, media devices may be adapted to allow for limited access to secure areas of the media in order to provide for mastering of content protected by the present invention. This allows anyone to be able to generate their own protected media.
  • a public/private key pair is used where the private key is known only by the manufacturer or content provider for provision only to select, or authorized, decoders or play-back devices. Therefore, each individual device, sets of associated devices, or manufacturers devices may utilize a different private key known only to these devices. Likewise, in a preferred embodiment, a different content key would be known by each piece of media, which if compromised only presents a security risk for that media.
  • the media, or the media device operating therewith when the media is strictly a passive device needs to know the play-back device's public key.
  • the media is guaranteed that the public key does in fact belong to a particular owner, i.e., is authentic and is associated with an approved or authorized device, the system is secure. Accordingly, the owner or manufacturer of the play-back device is, in fact, best off not by keeping that public key a closely held secret but by broadcasting it to world. This public dissemination of the public key decreases the chance of a rogue fraudulently distributing a public key as belonging to an approved or authorized entity.
  • company X publishes a public key widely identifying itself as the source, it is much more difficult for company Z to latter fool the public into believing that a subsequent public key is company X's public key. Therefore, in the preferred embodiment, the public keys of approved play-back devices are actually published on the media.
  • the present invention not only operates to securely transmit information, but also provides for securely identifying either or both ends, i.e., the media and/or the play-back device, as being legitimate. Accordingly, any information storage scheme providing an area that is fully readable and an area providing controllable or restricted access may be utilized according to the present invention.
  • these secrets may be kept such that the true secrets are known only by very few people, in such a way that actually nobody knows the true secret where, for example, the secret is embedded and shipped via random generation which is then destroyed before it is ever noted, or in a hidden away where, for example, certain persons are provided partial information with respect to the keys and some plurality thereof are needed to reconstruct the key.
  • these private keys may be embedded within circuitry useful in encrypting/decrypting information according to the present invention, the private keys may not even be revealed to any party.
  • the key is securely stored by the media which actively operates to securely transmit this key to the play-back device without ever disclosing the key to the media device.
  • the active component utilized for hiding this key not in the media device or disk drive. Instead, it is a portion of the media, such as an electronic circuit including a processor and memory operating under control of an internal algorithm. Therefore, the content key, which is stored on the media within the aforementioned memory, may be hidden and, preferably utilizing the public key of the play-back device passed through the media device to the play-back device without its ever being revealed to the media device.
  • the active media of this alternative embodiment may be assured that the media key is not revealed to unauthorized entities.
  • the fact that the content key is encrypted using a public key associated with an authorized play-back device provides confidence that it may only be used by that play-back device barring a security breach of the private key.
  • Another alternative embodiment of the present invention utilizes an external source to acquire a content key, such as for “pay-per-view.” Accordingly, rather than a content key stored on the media, an identifier string, such as may be used to authenticate the media, may be stored for provision to an external source, utilizing public key encryption according to the present invention, in order to acquire a content key useful with the desired content.
  • contact with the external source may provide up-dated information with respect to authorized decoders or play-back devices suitable for use with the media.
  • a list of authorized public keys may be up-dated by such communication in order to allow a media device to securely provide a content key to a decoder not originally included as an authorized decoder.
  • a technical advantage of the present invention is that a technique known to the public, and therefore available for use by the public, may be utilized to prevent useful copying of protected content.
  • a further technical advantage of the present invention is that playability is allowed in both dedicated players and computers, as well as providing for the play-back in later authorized devices.
  • a still further technical advantage of the present invention is provided in its ability to protect both video information and computer information. Moreover, such protection may include interaction with an external authorization center, such as pay-per-view techniques, via such commonly available communication networks as phone or Internet.
  • FIG. 1 illustrates a media system adapted according to a preferred embodiment of the present invention
  • FIG. 2 illustrates a flow diagram of recording a disk including content protected according to a preferred embodiment of the present invention
  • FIGS. 3A through 3C illustrate a flow diagram of the use of content protected according to a preferred embodiment of the present invention.
  • FIG. 4 illustrates a flow diagram of the operation of an external authorization center according to a preferred embodiment of the present invention.
  • Media 100 includes unprotected storage area 102 , providing general access to information stored therein, and protected storage area 101 , providing secure or restricted access to information stored therein.
  • protected storage area 101 is a predetermined area of media 100 which media devices honoring the technique of the present invention will not provide access to the information therein except according to the present invention.
  • protected storage area 101 is an active area, i.e., includes autonomous control over the data stored therein, such as through the use of a processor unit and associated control algorithm, which itself will not provide access to the information therein except according to the present invention.
  • media device 110 which may be for example an optical or magnetic disk drive, adapted to accept media 100 and interact therewith, such as to read and/or write information.
  • Media device 110 includes interface 113 , which may be a magnetic head or laser and photo diode combination for example, adapted to interface with media 100 to allow interaction between media device 110 and media 100 .
  • Interface 113 is coupled to processor 111 which, in addition to receiving information as provided from media 100 through interface 113 and providing information through interface 113 to media 100 , operates to control the operation of interface 113 .
  • controller 1 11 may provide motion control of interface 113 in order that physical blocks and sectors of media 100 may be accessed as desired.
  • Memory 112 may provide any number of functions with respect to the operation of media device 1 10 .
  • memory 112 may store a control program utilized by processor 111 in operation, such as in performing the above mentioned motion control of interface 113 as well as to operate according to the present invention.
  • memory 112 may buffer information passed between play-back device 120 and media 100 as well as provide an environment for active functions of media device 110 such as the handling cryptographic keys and/or their encryption for secure transmission.
  • Play-back device 120 of FIG. 1 is coupled to media device 110 through bus 130 to comprise player 150 .
  • processor 121 which, in addition to receiving information as provided from media 100 through media device 110 and providing information through media device 110 to media 100 , operates to disseminate and/or accept the information communicated with media 100 .
  • processor 121 may operate to play information recorded on media 100 to a monitor (not shown) attached to play-back device 120 .
  • processor 121 may operate to accept information to be recorded on media 100 from a user interface (not shown) attached to play-back device 120 .
  • Memory 122 may provide any number of functions with respect to the operation of play-back device 120 .
  • memory 122 may store a control program utilized by processor 121 in operation, such as to operate according to the present invention.
  • memory 122 may buffer information passed between play-back device 120 and media 100 as well as provide an environment for active functions of play-back device 120 such as the handling cryptographic keys and/or decryption of media content provided to play-back device 120 .
  • processor 121 and memory 122 may operate as a decoder suitable for utilizing the content of media 100 .
  • Bus 130 coupling media device 110 and play-back device 120 may be an unsecured bus, such as a personal computer (PC) input/output (I/O) bus where media device 110 is a disk drive and play-back device 120 is a PC.
  • PC personal computer
  • I/O input/output
  • both media device 110 and play-back device 120 may be disposed within a substantially secure environment, thus providing some security to bus 130 , such as where player 150 is an integrated unit as is the case for television top DVD players.
  • processor 111 of media device 110 and processor 121 of play-back device 120 may be provided as a single processor.
  • memory 112 of media device 110 and memory 122 of play-back device 120 may be a single memory.
  • Optional communication device 140 coupled to clearing house 170 through public switched telephone network (PSTN) 160 , is shown in FIG. 1 coupled to play-back device 120 .
  • Communication device 140 may be utilized to update information stored within play-back device 120 or media device 110 , such as lists of authorized decoders and/or their associated public keys, as well as to authorize particular transactions between play-back device 120 and media 100 , such as to provide for “pay-per-view” service.
  • communication device may be coupled elsewhere in the system, such as to media device 110 , if desired.
  • PSTN 160 may be provided through any number of communication links such as a local area network (LAN), a wide area network (WAN), the Internet, a cable system, a satellite system, or the like.
  • LAN local area network
  • WAN wide area network
  • the Internet a cable system
  • satellite system or the like.
  • protected storage area 101 of media 100 is an area which provides secure or limited access to information stored therein.
  • protected storage area 101 is a predefined area of the media, such as a first or final sector of the usable area of the media, to which media device 110 does not provide general access. This restricted access to protected storage area 101 may be provided by the agreement of the manufacturer of media device 110 to honor the technique of the present invention.
  • restricted access to protected storage area 101 may be provided by altering media device 110 to enable access to a portion of standardized media not physically or generally possible to be accessed by typical prior generation media devices and, again, limiting access thereto by media device 110 by agreement of the manufacturer to honor the technique of the present invention.
  • the latter mentioned alternative provides additional security for the information of protected storage area 101 in that media devices not specifically adapted to operate according to the present invention are physically prevented from access.
  • a disadvantage to this alternative is that media protected according to the present invention would not be suitable for use in such non-conforming media devices.
  • protected storage area 101 is an active portion of media 100 , such as may be provided by a processor and associated memory. Accordingly, information, such as cryptographic keys utilized according to the present invention may be stored therein and provided externally only upon select conditions. Accordingly, reliance upon a media device honoring the present technique may be avoided and instead replaced with secure active portions of the media itself As such, the provision of cryptographic keys, or other sensitive information, may be passed through the media device to an authorized play-back device without revealing this information to the media device or its ability to use such secrets. Therefore, it shall be appreciated that, although discussed below with respect to a media device preforming these functions, the active portion of the media itself may in fact perform the functions.
  • Such an active portion of media 100 may be provided an interface to interact with media device 110 and/or play-back device 120 through electrical connections such as may be provided at a center hub portion of the media (hub 103 of FIG. 1) disposed to couple with complementary connections disposed within media device 110 .
  • electrical connections such as may be provided at a center hub portion of the media (hub 103 of FIG. 1) disposed to couple with complementary connections disposed within media device 110 .
  • media 100 may be adapted to include a surface area having active components disposed thereon adapted to provide interaction with media device 110 according to the media device's unaltered media interface.
  • protected area 101 may include circuitry, similar to the coils of a magnetic read/wright head disposed along a sector or track of media 100 , controllable to provide magnetic patterns readable by media device 110 and to receive magnetic patterns written by media device 110 to communicate selected information there through according to the present invention.
  • protected area 101 may include circuitry, such as light emitting diodes and photo diodes disposed along a sector or track of media 100 , to provide optical patterns readable by media device 110 and to receive optical pattern written by media device 110 .
  • the active portion of media 100 may be provided in components such as integrated circuits, or “chips,” containing the public key algorithms. Accordingly, these circuits may have embedded in them the private key, which may never be available externally because the chip never reveals it.
  • the basis of public key/private key encryption is that only if the private key is known, information can be decrypted with the corresponding public key. Therefore, there is no need to ever know the private key.
  • the presence of the authentic private key may be verified by generating a random number, encrypting it with the public key, sending the encrypted information to the chip, allowing the chip to decrypt the random number using the private key, and again encrypt the random number using the private key. If the random number is presented by decrypting the returned encrypted string with the public key, there must be a valid private key utilized within the chip.
  • protected area 101 is not a discrete portion of media 100 , but rather is information provided in a secured fashion within the unprotected area of media 100 .
  • information which is to be protected, or provided limited access, according to the present invention may be disbursed throughout unprotected area 102 in a manner such that its recovery is impossible or unlikely except to devices operating according to the present invention.
  • information stored in protected area 101 is encoded as errors in the information stored in unprotected area 102 . These errors are predetermined to be correctable, such as through CRC error correction algorithms known in the art, in order to provide error free utilization of the information stored in unprotected area 102 .
  • Such an embodiment may be utilized to prevent unauthorized copying as a system providing anything other than a raw data copy will likely used the CRC algorithms to “correct” those errors prior to their being written on the copy.
  • Offset Size Name 0 128 1024 bit media key (n) 128 128 Reserved 256 128 1024 bit media key (e) 384 128 Reserved 512 4 Decoder Key File CRC 516 12 Reserved 528 8 Disc Key 536 8 Reserved 544 1 SCMS count 545 1 Encryption Type 546 1 Public Key flags 547 1 Region Code 548 2 Number of Key Extents 550 26 Reserved 576 N_K * 8 Key Extents
  • the media key (n), preferably a 1024 bit key, and media key (e), also preferably a 1024 bit key, are each one half of the media public key. Generation of this key and its use will be described in detail below.
  • the media will have a list of decoders, identified through the Public Key flags of the preferred embodiment, that the author has deemed acceptable for use with the media.
  • the Public Key flags indicate which public keys, associated with authorized decoders, the drive is allowed to use to send Disc Keys. If the bit is set, as shown in the table below, the drive will allow to the Report Key command to return the Disc Key encrypted with the corresponding public key. Bit Description 0 The public key in the key sector shall be valid for reporting the Disc Key. 2-6 Reserved 7 Public Keys not listed elsewhere are acceptable.
  • the public keys indicated as allowable by the Public Key flags are preferably stored on the media itself as indicated by the Key Extents of the preferred embodiment.
  • each entry of the Key Extents is a pair of 32 bit unsigned integers.
  • the first integer specifies a sector number of an authorized decoder key and the second integer specifies a byte count of that decoder key.
  • the Number of Key Extents contains the number of extents that contain the key file. On read-only media, this number is preferably one.
  • an author or provider of content may review the products of companies X, Y and Z to determine if they have guaranteed that their product does not compromise the material that is to be protected. If it is determined that the way in which companies X and Z have protected their information, the content provider records public keys for X and Z on the media as authorized decoders and/or play-back devices and sets the Public Key flags accordingly.
  • This list of public keys may be the only one utilized in passing a content key from the media to a play-back device and, thus, only these approved decoders or play-back devices will be able to utilize the content key. Although described as the only devices authorized, it shall be appreciated that below is described a method for updating this list to allow for inclusion of later approved or developed devices.
  • the play-back device will request the media key encrypted for use with a particular decoder, i.e. X.
  • the drive will look for X as an acceptable key, as indicated in the Public Key flags, and, utilizing the Key Extents to locate and retrieve the proper public key, encrypt the media key accordingly to send it along.
  • Decoder Key File CRC preferably CRC 32 of all of the decoder keys
  • CRC the CRC will not be correct for the altered file.
  • Decoder Key File CRC is 4 bytes but could be extended, for example to as much 16 to utilize other message digest algorithms such as MD 5 .
  • the Disk Key as stored in the secure area may be used in an application specific manner. For example, in some cases it may be used to encrypt/decrypt content, i.e., content key.
  • Public key encryption is typically not desirable for a significant quantity of data because public key encryption is extremely slow and processor intensive, accordingly, the above mentioned public key algorithms may be used to transfer a key for a symmetrical encryption system, such as DES or a IDEA or any number of other algorithms wherein the key must remain secret at each end.
  • the Disk Key may be an identification string or information utilized by an external source in authorizing use of the content of the media. Use of the Disk Key in such cases is described in detail below.
  • the Disk Key field is 8 bytes which is sufficient to hold a 56 bit DES key.
  • the SCMS count is preferably used by writeable drives to determine if copies are allowed. If copies are allowed, the SCMS also provides information with respect to how many generations of copies are allowed. Preferably, the SCMS count is decremented upon the completion of an authorized copy by a media device. For example, the following sequence could be used to copy a protected disk:
  • Encryption Type is preferably a flag indicating suggested usage as shown in the table below. Accordingly, in the preferred embodiment, commands to implement all cases will work in all cases as these commands do not change their behavior if different Encryption Types are selected. For example, a disk originally designed for Standard Video can use the same sector data with the Standard ROM identification technique. Another use is to use the pay per view technique to allow playback on decoders not originally included on the media. Encryption Type Description 0 Standard Video 1 Pay per use 80h Standard data
  • the Region Code indicates in which regions the disk is to be allowed to be used. Each bit preferably corresponds to a region.
  • key type codes as set forth below are preferably utilized.
  • the Key Type specifies the type of encryption used on the disk.
  • 0h Disk is encrypted according to CSS. 1h Disk is protected by the technique of the present invention. 2h Reserved 3h Reserved
  • the SFF 8090 Report Key is as follows:
  • the Key Source specifies the source of the Disk Key as set forth below: Key Source Value Key Source Description 00h generated Disk Key is all zeroes 01h generated Disk Key is the current random number. 02h Media Disk Key is the temporary Disk Key. Initialized to zero upon AGID grant. 04h Media Disk Key is recorded in key sector 08h Media Disk Key is encoded as DSV exceptions 10h Media Disk Key is encoded as ECC exceptions 20h Media Disk Key is in user data space 40h Media Disk Key is in the sector header of the key sector 80h Media Disk Key is in the border zone
  • the Disk Key is the XOR of all requested keys.
  • the Key Format defines the type of key requested.
  • the preferred definitions for Key Format are as set forth in the table below.
  • Key Format Description 0 Request AGID. Regenerate the random number for the AGID. (common to all Key Types) 1 Report Disk Key encrypted with most recent Public Key sent. 2 Report Media Public Key 3-3Eh Reserved 3Fh Report the Key Types on the medium (common to all Key Types) Send Key: 1 Send current public key. 2 Send Disk Key. The drive shall store this value as the temporary Disk Key for the current AGID.
  • FIG. 2 Shown in FIG. 2 is a preferred embodiment of the mastering or creation of a media recorded and protected according to the present invention.
  • prime number p and q are chosen.
  • p and q are each 512 bit primes.
  • larger or smaller primes may be utilized according to the present invention depending upon the desired level of difficulty desired in breaking any cryptographic keys generated therefrom.
  • one half of the public key (e) is chosen such that e is relatively prime with respect to (p ⁇ 1) ⁇ (q ⁇ 1).
  • e and n each comprise one half of the public media key of the preferred embodiment of the present invention.
  • clear text contents (c) may be derived from secured content (s), encrypted through the use of a corresponding private key, may be derived through the relationship:
  • step 203 one half of the private key (d) is computed to satisfy the relationship:
  • n is utilized as the remaining half of the private key. Accordingly the secured content (s) encrypted utilizing the public key above may be decrypted to provide clear content (c) according to the relationship:
  • Disk Key k is generated.
  • this key may be a cryptographic key, such as a symmetric key conforming to the DES standard, utilized in encrypting and decrypting the content of media 100 provided in unsecured area 102 , i.e., a content key.
  • Disk Key k may be identification information utilized in identifying the particular media or content, such as to an external source of clearing house for provision of a proper decryption key or other information useful in utilizing the content of media 100 .
  • a list of “acceptable users,” or decoders and/or play-back devices authorized to utilize the content of the media, is compiled.
  • This list of acceptable users preferably includes both the identification of such users as well as their public keys.
  • step 206 the values of p, q, e, and k, as well as the list of “acceptable users” and other miscellaneous information, such as content information for an external source, are provided to a media device operable according to the present invention.
  • secure area 101 of the present invention is preferably only accessible through restricted access, that only when these parameters are provided in accordance with the proper operation of the present invention will a conforming media device accept and record this information on media 100 . Therefore, in the preferred embodiment the prime factors p and q must be provided to the media device, rather than the value n, in order to establish that the provider is actually the originator of the keys utilized.
  • the media device computes n from the values of p and q provided thereto. If a rogue has been able to intercept the values e and n, such as through unauthorized access to secured area 101 of media 100 , a media device operating according to the present invention will prevent a useful unauthorized copy being made as either no values for p and q will be available or the rogue will be unable to select values suitable for use with the portions of the key previously generated.
  • the media device records n, e, k, and the list of acceptable users on to media 100 within secure area 101 .
  • the present invention may utilize a portion of media 100 having intelligence disposed therein, such as a small chip set interfaced with the media device as described above. Accordingly, storage of this information may be through interaction with such an intelligence associated with the media rather than relying on the media device to restrict access and to perform operations such as the aforementioned computation of the value n.
  • step 209 it is determined whether the particular implementation of the present invention includes the encrypting of content to be stored in unsecured area 102 of media 100 . If no encryption of this content is desired, i.e. encryption is utilized for media authentication only, then operation proceeds to step 214 wherein the content is recorded to media 100 .
  • step 210 a determination is made as to whether the implementation is to utilize information provided from an external source, such as a clearing house utilized in providing “pay-per-view” services. If information from an external source is not desired, operation proceeds to step 212 wherein the content key is set to the disk key.
  • an external source such as a clearing house utilized in providing “pay-per-view” services. If information from an external source is not desired, operation proceeds to step 212 wherein the content key is set to the disk key.
  • step 211 If information from an external source is to be required in order to utilize the content of media 100 , operation proceeds to step 211 wherein the content key is selected at random, or by any other appropriate method. It shall be appreciated that the content key of step 211 is provided to the clearing house, or other external agent, in order to provide for the later use of the content of media 100 . However, this key is not stored on media 100 , thus requiring contact with the clearing house for use of the content.
  • the content to be stored within unsecured area 102 may be encrypted with the content key (step 213 ) and recorded to media 100 (step 214 ). Accordingly, both steps 211 and 212 proceed to step 213 for encryption of the content with the content key.
  • FIG. 3 wherein the utilization of content provided according to the preferred embodiment of the present invention is shown.
  • the play-back device requests the encryption type of media 100 .
  • the media device reads the encryption type from the media (step 302 ). It shall be appreciated that, although shown above in the preferred embodiment as being recorded in the secure area of the media, the encryption type information may be stored anywhere upon the media, if desired.
  • step 303 a determination is made as to whether encryption is utilized with respect to the content of the media. If it is determined that no encryption is utilized then operation proceeds to step 326 in order to determine if disk authentication is utilized according to the present invention.
  • step 304 a determination is made as to whether the encryption is “standard.” If it is determined that encryption utilized to protect the content is other than standard, operation proceeds to step 314 associated with the use of an external source in the utilization of content as described in detail below. If the encryption is standard, operation proceeds to step 305 wherein the list of“acceptable users” is requested. Thereafter, at step 306 the media device reads the list of “acceptable users” from the media and provides this information to the play-back device. The play-back device generates a list of content targets, i.e., decoders available thereto, at step 307 .
  • content targets i.e., decoders available thereto
  • the media device may establish communication with a clearing house and identify itself to the service provider, such as through the use of one of the acceptable keys on the list being that of the person who owns the content itself, i.e., the media public key. Accordingly, the media device honoring the technique of the present invention is allowed to pass the disk key to this content provider using this public key provided on the media possibly accompanied with a request to the host, either protected or not, identifying a decoder upon which play-back is desired.
  • the content provider may have a high level of confidence in this being a legitimate disk and, therefore, may send back an authorized public key for the particular decoder, or a list of authorized public keys, encrypted with the private key corresponding to the content provider's public key found on the media. The media device is then able to decrypt that list with this key.
  • the retrieval of an authorized key is automatically performed when a suitable authorized key is not found on the media, as is provided in the steps outlined above.
  • the up-dating of the authorized decoders is performed in maintenance cycle, such as may be performed at predetermined intervals, such as at night or periods of non-use of the player.
  • a request for the content key is sent identifying the matching “acceptable user.”
  • the requested “acceptable user” is validated against the list of “acceptable users” and, provided it is indeed a match, the disk key, here the content key, is read from the media (step 311 ) and encrypted with the public key of the matching “acceptable user” (step 312 ). Thereafter this encrypted disk key is provided to the play-back device decoder at step 313 to allow meaningful use of the content recorded thereon and operation according to the present invention is concluded. It shall be appreciated that, as the disk key is encrypted utilizing the public key of the particular decoder, that only this device may actually decrypt the content of media 100 even if a rogue were to emulate the above preceding steps.
  • step 304 If it is determined that encryption utilized to protect the content is other than standard (step 304 ) or if none of the decoders available to the play-back device are included in the “acceptable users” list (step 308 ), a determination is made as to whether external contact information is present on the media (step 314 ).
  • This contact information may be recorded in unsecured area 102 , as the particular clearing house contacted may provide a cryptographic key necessary in utilizing the content of media 100 which may not be defeated by fraudulently directing, i.e., surreptitiously recording contact information on media 100 , a media device and/or play-back device operating according to the present invention to a rogue external contact.
  • information provided from the clearing house is preferably encrypted utilizing the private media key, i.e., d and n discussed above, a rogue clearing house will not be able to provide a proper response unless this private key is acquired.
  • step 314 If, at step 314 , it is determined that no contact information is present, i.e., there is no available external source of information for utilizing the content of media 100 , then operation according to the present invention is concluded. However, if it is determined that contact information is present, then operation proceeds to step 315 where a determination is made as to whether the content key to be retrieved from the external source is to allow unlimited use of the content or a single use.
  • step 316 a request is made for an encrypted result of the disk key XORed with a random number.
  • the media device generates a random number, i.e., a unique value which is chosen at random for use according to the present invention and which is held only for a period of time sufficient to complete this one iteration of the present invention.
  • the disk key is XORed with the random number and, thereafter, at step 319 the XORed disk key is encrypted with the public media key.
  • step 320 a request is made for an encrypted disk key.
  • This request may include transmission of a private cryptographic key or other means by which the returned data packet may be further protected in order to present someone with the public media key for intercepting the returned data packet and decrypting its contents.
  • step 319 encrypts the disk key with the public media key.
  • the media device of the present invention may make this determination, such as through reference to information stored on media 100 , for example within a reserved area of secure area 101 . Accordingly, rather than the decision presented at step 315 , the play-back device may request a disk key and the media device XOR that key with a random number if one time use is to be provided or XOR that key with zero (0) if unlimited use is to be provided.
  • a list of the decoders available to the play-back device, as well as information identifying the media, are appended to the encrypted disk key.
  • the information identifying the media may be stored on the media either within the secured area, such as one of the reserved areas described above, or within the unsecured area, and may be provided from the media for inclusion accompanying the encrypted disk key such as at step 319 .
  • the information identifying the media, the list of available decoders and the encrypted disk key are provided to the clearing house at step 322 and a response therefrom is awaited. It shall be appreciated that this information packet may be provided to the clearing house from the player utilizing a communication device such as the aforementioned modem coupled via a public switched telephone network or the Internet. Of course other means by which data communication may be accomplished which are well known in the art or may later be developed may be utilized according to the present invention.
  • the clearing house receives the data packet from the player and preferably operates according to the embodiment described with reference to FIG. 4 described below. Accordingly, a content key suitable for use with the content of media 100 is returned to the player, preferably encrypted utilizing the private media key described above.
  • the response from the clearing house is provided to the media device where it is decrypted using the public media key (step 324 ).
  • a random number is utilized in the one time use embodiment of the present invention. This random number is utilized by the clearing house to XOR the content key for provision to the player. As such a rogue may not simply capture the data packet returned from the clearing house for later re-submission to the player for repeated use of the content as the random number, discarded after a single iteration of the present invention, is required by the media device in extracting the content key. Moreover, someone in possession of the media public key will not be able to decrypt the data packet and retrieve the content key without also knowing the random number. Accordingly, at step 324 , where the single use embodiment is utilized, the information decrypted is XORed with the random number to reveal the content key an/or other information provided thereby.
  • the media device may store the content key for repeated use, where allowed and/or may store a new or updated “acceptable user” list for subsequent use.
  • the play-back device or other host may memorize the data packet for subsequent provision to the media device at the appropriate time.
  • the present invention may operate to indicate particular ones of the decoders identified as authorized by the Public Key flags and/or Key Extents which are no longer acceptable for use according to the present invention. For example, where a particular private key has been compromised, the up-date information received from the clearing house may indicate one of the public keys may no longer be used. Accordingly, a check against such a “revoked” list may be performed, such as at step 306 , to disallow the use of such private keys.
  • step 311 operates to utilize this content key rather than the disk key stored on the media.
  • step 36 includes the up-dated information provided by the clearing house.
  • the content key and/or up-dated “acceptable user” list information acquired from the clearing house may be stored within media 100 if desired.
  • recording of this information on the media is preferably done within the secure area.
  • step 303 If it is determined that no encryption is utilized to protect the content of media 100 (step 303 ) a determination is made as to whether disk authentication according to the present invention is to be utilized (step 326 ). If no disk authentication is utilized, then operation according to the present invention is concluded and the play-back device utilizes the content of media 100 accordingly.
  • step 327 the play-back device generates a random number. Thereafter, the play-back device encrypts this random number with the private media key (step 328 ). The encrypted random number is communicated to the media device at step 329 . Thereafter, the media device decrypts the random number utilizing the public media key stored in the secure area of media 100 .
  • the play-back device requests that the random number be XORed with the disk key stored within the secure area of media 100 (step 331 ).
  • the media device XORs the random number with the disk key.
  • the media device then encrypts the result of the XORed random number and disk key with the media public key and provides this data packet to the play-back device (step 333 ).
  • the play-back device decrypts the XORed random number and disk key utilizing the private media key (step 334 ) and XORs this decrypted information with the random number (step 335 ).
  • step 336 a determination is made as to whether the disk key obtained from the media according to the above steps matches an expected or known disk key. If there is a match, the media is authentic, i.e., a simple copy of the information provided within unprotected area 102 has not been performed. However, if there is no match of the disk key, then the media is not authentic.
  • the clearing house receives the data packet of step 322 from the player.
  • the data packet is decrypted utilizing the private media key corresponding to the public media key stored on media 100 (step 402 ).
  • the particular media is identified using information within the received data packet. It shall be appreciated that the clearing house may identify the particular media through available information which does not expressly identify the media. For example a particular public key may provide sufficient identification of the media. Likewise, information gleaned from the communication, such as a uniform resource locator (URL) or automatic number identification (ANI) of the requesting player may be utilized according to the present invention.
  • URL uniform resource locator
  • ANI automatic number identification
  • the random number generated by the media device is recovered by the clearing house by XORing the decrypted disk key and random number XORed by the media device with the disk key as known by the clearing house. This random number is utilized to XOR the content key, to be utilized by the play-back device in meaningful use of the encrypted content of media 100 , for provision to the player.
  • An “acceptable user” list, or up-date thereof, may be appended to the information to be provided to the player at step 406 . Thereafter, the information to be provided to the player is encrypted using the private media key (step 407 ) and communicated to the player (step 408 ).
  • file system information of the media is not encrypted.
  • the data within files may be encrypted with the content key.
  • a control file preferably indicates which files are encrypted and which are not. This allows protected and freely distributable information to coexist on the same media, thus enabling selected content to be protected, such as movies, while allowing unprotected distribution of other content, such as promotional trailers.
  • the encryption sequence is restarted for each sector of the media. This maintains the sector addressability of the media and allows for random access of the content provided thereon.
  • a media device operating according to the present invention allows for the producing of protected content by providing for the authorized writing of information within the secure area.
  • writing to this area is performed by providing the two prime numbers that are the factor of the media key (n).
  • the disk key is provided encrypted with the private key corresponding with the public key sent.
  • the media device multiplies the two primes and record the product in the media key (n) field.
  • the media device does not need to verify that the input numbers are prime.
  • a user can generate insecure keys, but cannot reproduce a secure key.
  • the disk key will be obtained for recording upon the media by the media device by decrypting it using the public media key computed from the primes p and q.
  • the 1024 bit key may either be a prime itself or the product of two primes in which one of the primes is larger than 512 bits. This would prevent copying the key with a consumer level product even if the key could be factored.
  • the present invention may be implemented upon a dedicated player by the dedicated player reading the disk key from the secure area. If pay-per-view is supported, the dedicated players may implement the public key protocols as described above.
  • the present invention may also be implemented upon a computer system.
  • a ROM drive such as typically found in computer systems, performs no decryption of data delivered via its host interface.
  • MPEG decoder based decryption is utilized, such that decryption is performed by the MPEG decoder using the key provided by the drive.
  • the MPEG decoder should not deliver the content to any interface that allows recording.

Abstract

A system and method for providing protection of content stored on a bulk storage media is disclosed. The technique for providing protection from unauthorized utilization of the content so stored is provided publicly in order to allow for those utilizing a conforming media device to master or generate content protected according to the present invention. Various ways in which to protect content are disclosed including verification of the authenticity of a particular media, utilization of an accepted list of media play-back devices and their corresponding published public keys in order to securely pass media content keys thereto, and utilization of an external contact to provide media content keys and/or updates of accepted media play-back devices.

Description

    TECHNICAL FIELD OF THE INVENTION
  • The present invention relates to protection of content stored on a bulk storage media and more particularly to a system and method for providing controlled utilization of the stored content through the use of public keys stored upon the media itself. [0001]
  • BACKGROUND OF THE INVENTION
  • Currently there are various schemes in place for providing controlled or secure access to content recorded on bulk media. However, these schemes often suffer disadvantages in requiring that the schemes themselves be kept secret in order to maintain security. Accordingly, the schemes may be implemented only by trusted parties in order to maintain the secret. Likewise, these schemes often rely on the total secrecy of cryptographic keys used by the scheme, as publication of such a key may result in loss of security for all or multiple parties using the scheme. [0002]
  • For example, DVD media, currently only protected for video content, utilizes a two part scheme: a cryptographic key for decrypting information recorded on the media is produced according to a predefined protocol and stored according to that protocol on a limited access portion of the media; and a cryptographic technique, also defined by the protocol, is utilized to securely pass that key to a play-back entity. Accordingly, in order to produce either a media device, i.e., media player, or media itself, there must be understanding of the whole scheme, i.e., how it works. Furthermore, there must be access to the keys, that have been predefined by this scheme, themselves. There must be a globally held secret among all of the people who produce players and all the people that produce media. Here, the security lies in keeping secret how the cryptographic keys are made and how the messages, i.e., the passing of the keys, are encrypted. If the protocol itself were revealed then all content, regardless of the particular entity which produced/recorded it, becomes compromised because, if the protocol were common knowledge, rogues could generate and/or intercept keys capable of decrypting protected content. Any compromise of the system will compromise all systems and media at the same time. [0003]
  • Additionally, as the media content key associated with the protected content is stored on the media itself, the above described scenario relies on all parts of the system honoring the security of the key. Therefore, an illegally designed media reader could pass the content key through to a device or entity which is not authorized to receive that key. Likewise, an illegally designed media reader could duplicate the raw data of the media, including the encrypted content and media content key stored thereon, on a second media and thus create an unauthorized copy conforming to the protocol described above. However, a media reader provided according to this scheme will prevent such unauthorized access/activity and, therefore, provide security because not all the raw data will be available. In particular the sectors where keys are hidden will not available on any consumer product because all of these products are produced under licenses providing that if the scheme is used, the device shall not allow particular operations. [0004]
  • Accordingly, for the system to provide protection to the content, the media decryption key stored on the media is read by a media reader, i.e., DVD disk drive, only in proper circumstances, i.e., an authorized play-back device requests the media content key according to a preestablished protocol, and thereafter, provided in encrypted form for communication to the play-back device. In this scheme, the media content key is passed after a key exchange is done such that when the key is handed from the media reader to the play-back device it is done encrypted. I.e., the play-back device would send its encryption key to the media reader, the media reader would read the media content key from the media, encrypt the media content key with the play-back device's encryption key, and pass this encrypted version of the media content key to the play-back device where it may be decrypted with the play-back device's (secretly held) decryption key for use of the media content key in accessing media content as provided by the media reader. [0005]
  • For example, in a host computer (here the play-back device) coupled to a DVD disk drive (the media device) via the computer's bus structure, information communicated between the computer and drive is exposed easily to rogues, or “hackers,” and probing. Therefore, the media content key is passed over this bus only when it has been obscured by a key established through a key exchange between the drive and the host computer. However, in a stand alone player, where the media reading mechanism and the video play-back device are in one box, and the connection between them is somewhat secure, then such a key exchange and/or encryption of the media content key may be omitted in favor of decrypting the data directly internally. [0006]
  • The way this scheme is implemented, the media reader itself, as it may access the media content key, must honor the scheme and refuse to access the content key for unauthorized purposes. Likewise, as the play-back device is provided the content key, so too must the play-back device honor the protection scheme. However, in addition to relying on the security of the individual keys, details of the operation of the above described scheme itself, such as where and in what format content keys are written and the algorithm for conducting key exchanges, are kept secret in order to avoid the unauthorized retrieval/interception of keys and, therefore, compromising the security provided. Additionally, with the current scheme if an entity is able to generate legitimate protected media, that entity is also able to make illegal copies of other media as the secrets of the scheme must necessarily been revealed to this entity in order to allow the generation of legitimate protected media. [0007]
  • Accordingly, the protocol for encryption of the data and the generation of keys is only revealed by license, i.e., only trusted manufacturers of content and devices which read, write, or otherwise utilize this content are provided with the secrets of the protocol, and then only under the terms of a license agreement restricting use and dissemination of this secret information. Very few people or entities are able to obtain such a license, and its attendant secrets, in order to provide content and/or devices adapted in the nature of the protocol. As such, general content providers, such as small entities or entities providing content for internal or limited use, cannot protect their work as they have no way of recording such a key to the media in a secure manner that prevents illegitimate copying/utilization of protected content while allowing legitimate generation of secure disk. Therefore, there is no process that one can publicly use to generate such keys and, therefore, there is no process for those other than the licensed entities to record protected content compatible with this scheme. [0008]
  • A further need exists in the art for providing access to content with alternative techniques for security such as secure passing of keys stored on the media, communication with an external authorization center, and verification of the authenticity of the media. [0009]
  • A need therefore exists in the art for a technique providing secure access to the content of mass media which may be utilized by a great number of individuals and entities without risk of compromising security. [0010]
  • SUMMARY OF THE INVENTION
  • These and other objects, features and technical advantages are achieved by a system and method utilizing a technique, which itself is public, where only the individual keys used thereby need remain private. In order to be available to all desiring the protection of such a system, the rules for generating keys suitable for use according to the present invention are preferably public. As the technique itself, as well as the rules for generating cryptographic keys to be utilized therewith, are public, the present invention allows for its use by all those so desiring. Moreover, as it is the cryptographic keys themselves, or portions thereof, which are maintained securely in order to provide security according to the present invention, rather than relying on the secrecy of the technique for their use, compromise of the secret information will result in only a content provider using that particular key having access to content compromised. [0011]
  • The present invention operates to provide protection in addition to the limited access of content through the use of cryptographic keys. Specifically, the present invention is able to securely identify a piece of media as being an original. Likewise, the present invention is able to securely identify a play-back device as being authorized. Accordingly, devices or users of the media may be assured that interaction therewith is authorized as each end can securely identify the other and each end can securely send data to the other end. [0012]
  • Operation of the present invention is not to allow or disallow any particular transmission, but rather to obscure the content (information or data), using cryptographic methods, such that only a legitimate recipient can make use of that data, i.e., nobody but the content owner, or those authorized by him/her, is able to copy protected media content. To this end, the present invention utilizes public key algorithms well known in the art to provide cryptographic keys useful according to the present invention. However, the present invention provides a unique system and method for managing and utilizing these cryptographic keys. [0013]
  • Preferably, as in the above described prior art system, the media reader or disk drive (media device) honors the technique of the present invention. For example, through licensing of media device manufacturers, it may be ensured that these devices honor the technique. Therefore, sensitive information, such as the aforementioned content key, may be stored on the media without substantial fear that such information will be publically disseminated. Preferably, media devices unaware of the scheme will not crack it, i.e., a drive that can read/write raw the standard areas won't copy the copy protection information provided in a secured area. Accordingly, any attempt at violating the technique of the present invention, such as to read sensitive information stored on the media, is either unable to perform the technique at all, i.e., is unable to instruct a media reader to access restricted areas of the media, or if the device allows improper utilization there is a legal remedy available. [0014]
  • However, unlike the prior art system, where the scheme itself is secret, the present invention does allow the public at large to generate their own protected content without requiring license to the technology or requiring any secret information that they do not themselves generate. This is because the only secrets in the present technique are the keys themselves and, thus, allowing the rules for generating the keys to be public. Accordingly, media devices may be adapted to allow for limited access to secure areas of the media in order to provide for mastering of content protected by the present invention. This allows anyone to be able to generate their own protected media. [0015]
  • According to the present invention, a public/private key pair is used where the private key is known only by the manufacturer or content provider for provision only to select, or authorized, decoders or play-back devices. Therefore, each individual device, sets of associated devices, or manufacturers devices may utilize a different private key known only to these devices. Likewise, in a preferred embodiment, a different content key would be known by each piece of media, which if compromised only presents a security risk for that media. [0016]
  • However, the media, or the media device operating therewith when the media is strictly a passive device, needs to know the play-back device's public key. As long as the media is guaranteed that the public key does in fact belong to a particular owner, i.e., is authentic and is associated with an approved or authorized device, the system is secure. Accordingly, the owner or manufacturer of the play-back device is, in fact, best off not by keeping that public key a closely held secret but by broadcasting it to world. This public dissemination of the public key decreases the chance of a rogue fraudulently distributing a public key as belonging to an approved or authorized entity. For example, company X publishes a public key widely identifying itself as the source, it is much more difficult for company Z to latter fool the public into believing that a subsequent public key is company X's public key. Therefore, in the preferred embodiment, the public keys of approved play-back devices are actually published on the media. [0017]
  • By publication of the play-back device's public keys, the present invention not only operates to securely transmit information, but also provides for securely identifying either or both ends, i.e., the media and/or the play-back device, as being legitimate. Accordingly, any information storage scheme providing an area that is fully readable and an area providing controllable or restricted access may be utilized according to the present invention. [0018]
  • Unlike the aforementioned prior art scheme, there is no widely held secret, i.e., the play-back providers and the media generation providers all having to know how the whole scheme works, including the values for the keys. As the only parts of the present invention that are secret are the private keys themselves, no secrets need to be shared among parties. Accordingly, each manufacturer, whether a manufacturer of media or devices operable therewith, can keep their own secrets. Moreover, these secrets may be kept such that the true secrets are known only by very few people, in such a way that actually nobody knows the true secret where, for example, the secret is embedded and shipped via random generation which is then destroyed before it is ever noted, or in a hidden away where, for example, certain persons are provided partial information with respect to the keys and some plurality thereof are needed to reconstruct the key. Moreover, as these private keys may be embedded within circuitry useful in encrypting/decrypting information according to the present invention, the private keys may not even be revealed to any party. [0019]
  • In an alternative embodiment, rather than storing the content key in an area of limited access on the media, for retrieval by the media device and subsequent transmission to the play-back device, the key is securely stored by the media which actively operates to securely transmit this key to the play-back device without ever disclosing the key to the media device. Accordingly, the active component utilized for hiding this key not in the media device or disk drive. Instead, it is a portion of the media, such as an electronic circuit including a processor and memory operating under control of an internal algorithm. Therefore, the content key, which is stored on the media within the aforementioned memory, may be hidden and, preferably utilizing the public key of the play-back device passed through the media device to the play-back device without its ever being revealed to the media device. Through the above mentioned secure identification of the play-back device, the active media of this alternative embodiment may be assured that the media key is not revealed to unauthorized entities. Alternatively, the fact that the content key is encrypted using a public key associated with an authorized play-back device provides confidence that it may only be used by that play-back device barring a security breach of the private key. [0020]
  • Another alternative embodiment of the present invention utilizes an external source to acquire a content key, such as for “pay-per-view.” Accordingly, rather than a content key stored on the media, an identifier string, such as may be used to authenticate the media, may be stored for provision to an external source, utilizing public key encryption according to the present invention, in order to acquire a content key useful with the desired content. [0021]
  • Additionally, or alternatively, contact with the external source may provide up-dated information with respect to authorized decoders or play-back devices suitable for use with the media. For example, a list of authorized public keys may be up-dated by such communication in order to allow a media device to securely provide a content key to a decoder not originally included as an authorized decoder. [0022]
  • A technical advantage of the present invention is that a technique known to the public, and therefore available for use by the public, may be utilized to prevent useful copying of protected content. [0023]
  • A further technical advantage of the present invention is that playability is allowed in both dedicated players and computers, as well as providing for the play-back in later authorized devices. [0024]
  • A still further technical advantage of the present invention is provided in its ability to protect both video information and computer information. Moreover, such protection may include interaction with an external authorization center, such as pay-per-view techniques, via such commonly available communication networks as phone or Internet. [0025]
  • The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. [0026]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which: [0027]
  • FIG. 1 illustrates a media system adapted according to a preferred embodiment of the present invention; [0028]
  • FIG. 2 illustrates a flow diagram of recording a disk including content protected according to a preferred embodiment of the present invention; [0029]
  • FIGS. 3A through 3C illustrate a flow diagram of the use of content protected according to a preferred embodiment of the present invention; and [0030]
  • FIG. 4 illustrates a flow diagram of the operation of an external authorization center according to a preferred embodiment of the present invention. [0031]
  • DESCRIPTION OF THE INVENTION
  • In understanding the concepts of the present invention it is helpful to refer to a specific embodiment wherein the present invention is utilized. Accordingly, described herein is an embodiment where the present invention is utilized with bulk media storing information suitable for use by digital systems, such as digital video information commonly stored on DVD optical disks. However, it shall be appreciated that the present invention is not so limited and may in fact be utilized with any information storage scheme providing an area of secure or restricted access to the contents therein. [0032]
  • Directing attention to FIG. 1, a system adapted according to the present invention is shown including [0033] media 100, media device 110, and play-back device 120. Media 100 includes unprotected storage area 102, providing general access to information stored therein, and protected storage area 101, providing secure or restricted access to information stored therein. In a preferred embodiment, protected storage area 101 is a predetermined area of media 100 which media devices honoring the technique of the present invention will not provide access to the information therein except according to the present invention. In an alternative embodiment, protected storage area 101 is an active area, i.e., includes autonomous control over the data stored therein, such as through the use of a processor unit and associated control algorithm, which itself will not provide access to the information therein except according to the present invention.
  • Also shown in FIG. 1 is [0034] media device 110, which may be for example an optical or magnetic disk drive, adapted to accept media 100 and interact therewith, such as to read and/or write information. Media device 110 includes interface 113, which may be a magnetic head or laser and photo diode combination for example, adapted to interface with media 100 to allow interaction between media device 110 and media 100. Interface 113 is coupled to processor 111 which, in addition to receiving information as provided from media 100 through interface 113 and providing information through interface 113 to media 100, operates to control the operation of interface 113. For example, where media 100 is a disk, such as is well known in the art, controller 1 11 may provide motion control of interface 113 in order that physical blocks and sectors of media 100 may be accessed as desired.
  • Also coupled to [0035] processor 111 is memory 112. Memory 112 may provide any number of functions with respect to the operation of media device 1 10. For example, memory 112 may store a control program utilized by processor 111 in operation, such as in performing the above mentioned motion control of interface 113 as well as to operate according to the present invention. Additionally, memory 112 may buffer information passed between play-back device 120 and media 100 as well as provide an environment for active functions of media device 110 such as the handling cryptographic keys and/or their encryption for secure transmission.
  • Play-[0036] back device 120 of FIG. 1 is coupled to media device 110 through bus 130 to comprise player 150. Included within play-back device 120 is processor 121 which, in addition to receiving information as provided from media 100 through media device 110 and providing information through media device 110 to media 100, operates to disseminate and/or accept the information communicated with media 100. For example, processor 121 may operate to play information recorded on media 100 to a monitor (not shown) attached to play-back device 120. Likewise, processor 121 may operate to accept information to be recorded on media 100 from a user interface (not shown) attached to play-back device 120.
  • Also coupled to [0037] processor 121 is memory 122. Memory 122 may provide any number of functions with respect to the operation of play-back device 120. For example, memory 122 may store a control program utilized by processor 121 in operation, such as to operate according to the present invention. Additionally, memory 122 may buffer information passed between play-back device 120 and media 100 as well as provide an environment for active functions of play-back device 120 such as the handling cryptographic keys and/or decryption of media content provided to play-back device 120. Accordingly, processor 121 and memory 122 may operate as a decoder suitable for utilizing the content of media 100.
  • [0038] Bus 130 coupling media device 110 and play-back device 120 may be an unsecured bus, such as a personal computer (PC) input/output (I/O) bus where media device 110 is a disk drive and play-back device 120 is a PC. However, both media device 110 and play-back device 120 may be disposed within a substantially secure environment, thus providing some security to bus 130, such as where player 150 is an integrated unit as is the case for television top DVD players. In such an embodiment processor 111 of media device 110 and processor 121 of play-back device 120 may be provided as a single processor. Likewise, memory 112 of media device 110 and memory 122 of play-back device 120 may be a single memory.
  • [0039] Optional communication device 140, coupled to clearing house 170 through public switched telephone network (PSTN) 160, is shown in FIG. 1 coupled to play-back device 120. Communication device 140 may be utilized to update information stored within play-back device 120 or media device 110, such as lists of authorized decoders and/or their associated public keys, as well as to authorize particular transactions between play-back device 120 and media 100, such as to provide for “pay-per-view” service. Although shown coupled directly to play-back device 120, communication device may be coupled elsewhere in the system, such as to media device 110, if desired. Likewise, although shown as providing communication with clearing house 170 through PSTN 160, such communication may be provided through any number of communication links such as a local area network (LAN), a wide area network (WAN), the Internet, a cable system, a satellite system, or the like.
  • As described above, preferably protected [0040] storage area 101 of media 100 is an area which provides secure or limited access to information stored therein. For example, in a preferred embodiment of the present invention, protected storage area 101 is a predefined area of the media, such as a first or final sector of the usable area of the media, to which media device 110 does not provide general access. This restricted access to protected storage area 101 may be provided by the agreement of the manufacturer of media device 110 to honor the technique of the present invention.
  • Alternatively, restricted access to protected [0041] storage area 101 may be provided by altering media device 110 to enable access to a portion of standardized media not physically or generally possible to be accessed by typical prior generation media devices and, again, limiting access thereto by media device 110 by agreement of the manufacturer to honor the technique of the present invention. The latter mentioned alternative provides additional security for the information of protected storage area 101 in that media devices not specifically adapted to operate according to the present invention are physically prevented from access. However, a disadvantage to this alternative is that media protected according to the present invention would not be suitable for use in such non-conforming media devices.
  • In an alternative embodiment of the present invention protected [0042] storage area 101 is an active portion of media 100, such as may be provided by a processor and associated memory. Accordingly, information, such as cryptographic keys utilized according to the present invention may be stored therein and provided externally only upon select conditions. Accordingly, reliance upon a media device honoring the present technique may be avoided and instead replaced with secure active portions of the media itself As such, the provision of cryptographic keys, or other sensitive information, may be passed through the media device to an authorized play-back device without revealing this information to the media device or its ability to use such secrets. Therefore, it shall be appreciated that, although discussed below with respect to a media device preforming these functions, the active portion of the media itself may in fact perform the functions.
  • Such an active portion of [0043] media 100 may be provided an interface to interact with media device 110 and/or play-back device 120 through electrical connections such as may be provided at a center hub portion of the media (hub 103 of FIG. 1) disposed to couple with complementary connections disposed within media device 110. Of course, such an embodiment requires not only adaptation of media 100, but also media device 110 in order to provide operation according to the present invention. Alternatively, media 100 may be adapted to include a surface area having active components disposed thereon adapted to provide interaction with media device 110 according to the media device's unaltered media interface. For example, where media 100 is a magnetic media, protected area 101 may include circuitry, similar to the coils of a magnetic read/wright head disposed along a sector or track of media 100, controllable to provide magnetic patterns readable by media device 110 and to receive magnetic patterns written by media device 110 to communicate selected information there through according to the present invention. Likewise, where media 100 is an optical media, protected area 101 may include circuitry, such as light emitting diodes and photo diodes disposed along a sector or track of media 100, to provide optical patterns readable by media device 110 and to receive optical pattern written by media device 110.
  • The active portion of [0044] media 100 may be provided in components such as integrated circuits, or “chips,” containing the public key algorithms. Accordingly, these circuits may have embedded in them the private key, which may never be available externally because the chip never reveals it. The basis of public key/private key encryption is that only if the private key is known, information can be decrypted with the corresponding public key. Therefore, there is no need to ever know the private key. The presence of the authentic private key may be verified by generating a random number, encrypting it with the public key, sending the encrypted information to the chip, allowing the chip to decrypt the random number using the private key, and again encrypt the random number using the private key. If the random number is presented by decrypting the returned encrypted string with the public key, there must be a valid private key utilized within the chip.
  • It shall be appreciated the above exchange of a random number may be utilized in validating either end of a communication. Moreover, only one encryption/decryption cycle need be completed to prove the recipient has a key corresponding to the issuers key. However, the reencryption of the decrypted random number provides a high level of confidence that the recipient did not simply guess the correct random number. [0045]
  • It shall also be appreciated that, although the use of random numbers is described herein, other information may be utilized in such verification and the below mentioned information disguising techniques. For example, particular patterns of information, such as time and/or day information may be used. Likewise, particular information run through a hash or other algorithm to uniquely alter the data may be used. Of course, the more “random” or unpredictable the data so used is, the less likely that it may be guessed by the recipient. [0046]
  • In another alternative embodiment, protected [0047] area 101 is not a discrete portion of media 100, but rather is information provided in a secured fashion within the unprotected area of media 100. For example, information which is to be protected, or provided limited access, according to the present invention may be disbursed throughout unprotected area 102 in a manner such that its recovery is impossible or unlikely except to devices operating according to the present invention. Accordingly, in an embodiment of the present invention, information stored in protected area 101 is encoded as errors in the information stored in unprotected area 102. These errors are predetermined to be correctable, such as through CRC error correction algorithms known in the art, in order to provide error free utilization of the information stored in unprotected area 102. However, the placement of such errors and/or particular patterns of the errors are utilized to encode the information of protected area 101. Such an embodiment may be utilized to prevent unauthorized copying as a system providing anything other than a raw data copy will likely used the CRC algorithms to “correct” those errors prior to their being written on the copy.
  • It shall be appreciated that, although described above in the alternative, the embodiments of providing protected [0048] area 101 may be combined. For example, portions of the information of protected area 101 may be stored according to different ones of the above embodiments. Likewise, all the information of protected area 101 may be provided in multiple ones of the embodiments, such as to provide maximum compatibility with media devices and/or play-back devices.
  • Having described embodiments for the storage of protected information, reference is now made to the below table for an understanding of a preferred embodiment of information stored in protected [0049] area 101. Preferably, all values are recorded in Little Endian format.
    Offset Size Name
    0 128 1024 bit media key (n)
    128 128 Reserved
    256 128 1024 bit media key (e)
    384 128 Reserved
    512  4 Decoder Key File CRC
    516  12 Reserved
    528  8 Disc Key
    536  8 Reserved
    544  1 SCMS count
    545  1 Encryption Type
    546  1 Public Key flags
    547  1 Region Code
    548  2 Number of Key Extents
    550  26 Reserved
    576 N_K * 8 Key Extents
  • The media key (n), preferably a 1024 bit key, and media key (e), also preferably a 1024 bit key, are each one half of the media public key. Generation of this key and its use will be described in detail below. [0050]
  • Preferably, the media will have a list of decoders, identified through the Public Key flags of the preferred embodiment, that the author has deemed acceptable for use with the media. Accordingly, the Public Key flags indicate which public keys, associated with authorized decoders, the drive is allowed to use to send Disc Keys. If the bit is set, as shown in the table below, the drive will allow to the Report Key command to return the Disc Key encrypted with the corresponding public key. [0051]
    Bit Description
    0 The public key in the key sector shall be valid for
    reporting the Disc Key.
    2-6 Reserved
    7 Public Keys not listed elsewhere are acceptable.
  • The public keys indicated as allowable by the Public Key flags are preferably stored on the media itself as indicated by the Key Extents of the preferred embodiment. Preferably each entry of the Key Extents is a pair of 32 bit unsigned integers. The first integer specifies a sector number of an authorized decoder key and the second integer specifies a byte count of that decoder key. The Number of Key Extents contains the number of extents that contain the key file. On read-only media, this number is preferably one. [0052]
  • According to the present invention, an author or provider of content may review the products of companies X, Y and Z to determine if they have guaranteed that their product does not compromise the material that is to be protected. If it is determined that the way in which companies X and Z have protected their information, the content provider records public keys for X and Z on the media as authorized decoders and/or play-back devices and sets the Public Key flags accordingly. This list of public keys may be the only one utilized in passing a content key from the media to a play-back device and, thus, only these approved decoders or play-back devices will be able to utilize the content key. Although described as the only devices authorized, it shall be appreciated that below is described a method for updating this list to allow for inclusion of later approved or developed devices. [0053]
  • In operation, the play-back device will request the media key encrypted for use with a particular decoder, i.e. X. The drive will look for X as an acceptable key, as indicated in the Public Key flags, and, utilizing the Key Extents to locate and retrieve the proper public key, encrypt the media key accordingly to send it along. [0054]
  • As these keys of the authorized decoders are their public keys, there is no need to record them secretly on the media. Accordingly, the preferred embodiment of the present invention records these keys within [0055] unprotected area 102. However, as the proper presence of such a public key will be utilized to allow useful play-back of content, it is preferred that these keys are provided in a read only (or write once only) area of the media in order that the list is not altered to include a rogue key.
  • Additionally, in order to provide protection of the keys, and therefore the decoders, utilized with a particular media and its content, Decoder Key File CRC, preferably CRC [0056] 32 of all of the decoder keys, is utilized to detect tampering with these keys. Accordingly, if one were to edit or alter the decoder key file or the key extents, the CRC will not be correct for the altered file. In the preferred embodiment Decoder Key File CRC is 4 bytes but could be extended, for example to as much 16 to utilize other message digest algorithms such as MD5.
  • The Disk Key as stored in the secure area may be used in an application specific manner. For example, in some cases it may be used to encrypt/decrypt content, i.e., content key. Public key encryption is typically not desirable for a significant quantity of data because public key encryption is extremely slow and processor intensive, accordingly, the above mentioned public key algorithms may be used to transfer a key for a symmetrical encryption system, such as DES or a IDEA or any number of other algorithms wherein the key must remain secret at each end. However, in other cases the Disk Key may be an identification string or information utilized by an external source in authorizing use of the content of the media. Use of the Disk Key in such cases is described in detail below. Regardless of the actual form of the Disk Key, preferably its contents are never to be made available unencrypted. Preferably, the Disk Key field is 8 bytes which is sufficient to hold a 56 bit DES key. [0057]
  • The SCMS count is preferably used by writeable drives to determine if copies are allowed. If copies are allowed, the SCMS also provides information with respect to how many generations of copies are allowed. Preferably, the SCMS count is decremented upon the completion of an authorized copy by a media device. For example, the following sequence could be used to copy a protected disk: [0058]
  • (1) Insert the original disk. [0059]
  • (2) Host instructs the drive to “Read Secure Area.” If the allowed copy count field is zero, the drive generates an error. [0060]
  • (3) Drive caches information from the secure area (it is preferably NOT returned to the host). [0061]
  • (4) Insert a blank disk. [0062]
  • (5) The host instructs the drive to “Write Cached Secure Area.”[0063]
  • (6) The drive decrements the allowed count field and writes the sector to the disk. [0064]
  • Encryption Type is preferably a flag indicating suggested usage as shown in the table below. Accordingly, in the preferred embodiment, commands to implement all cases will work in all cases as these commands do not change their behavior if different Encryption Types are selected. For example, a disk originally designed for Standard Video can use the same sector data with the Standard ROM identification technique. Another use is to use the pay per view technique to allow playback on decoders not originally included on the media. [0065]
    Encryption Type Description
    0 Standard Video
    1 Pay per use
    80h Standard data
  • The Region Code indicates in which regions the disk is to be allowed to be used. Each bit preferably corresponds to a region. [0066]
  • According to a preferred embodiment of the present invention, all passing of encrypted information fits in the SFF 8090 Send Key/Report Key structure. Accordingly, key type codes as set forth below are preferably utilized. The Key Type specifies the type of encryption used on the disk. [0067]
    Key Type Description
    0h Disk is encrypted according to CSS.
    1h Disk is protected by the technique of the present invention.
    2h Reserved
    3h Reserved
  • The below descriptions are for Key Type [0068] 1 (key types of the present invention).
  • For operation according to the preferred embodiment of the present invention, the SFF 8090 Report Key is as follows: [0069]
    Figure US20020016919A1-20020207-C00001
  • where the Key Source and Key Type fields are new, allowing for multiple schemes to exist in the command space. [0070]
  • Preferably the Key Source specifies the source of the Disk Key as set forth below: [0071]
    Key
    Source Value Key Source Description
    00h generated Disk Key is all zeroes
    01h generated Disk Key is the current random number.
    02h Media Disk Key is the temporary Disk Key.
    Initialized to zero upon AGID grant.
    04h Media Disk Key is recorded in key sector
    08h Media Disk Key is encoded as DSV exceptions
    10h Media Disk Key is encoded as ECC exceptions
    20h Media Disk Key is in user data space
    40h Media Disk Key is in the sector header of the key
    sector
    80h Media Disk Key is in the border zone
  • Typically, only one or two bits are expected to be set. If two bits are set, one will usually be the current random number. In a preferred embodiment, if more than one bit is set, the Disk Key is the XOR of all requested keys. [0072]
  • The Key Format defines the type of key requested. The preferred definitions for Key Format are as set forth in the table below. [0073]
    Key Format Description
    0 Request AGID. Regenerate the random number
    for the AGID. (common to all Key Types)
    1 Report Disk Key encrypted with most recent Public
    Key sent.
    2 Report Media Public Key
    3-3Eh Reserved
    3Fh Report the Key Types on the medium (common to all
    Key Types)
    Send Key:
    1 Send current public key.
    2 Send Disk Key. The drive shall store this value as the
    temporary Disk Key for the current AGID.
  • Having described the information provided in a secured area of the media according to the present invention, a preferred embodiment of the storage of this information to the media will be described with reference to FIG. 2. Shown in FIG. 2 is a preferred embodiment of the mastering or creation of a media recorded and protected according to the present invention. [0074]
  • At [0075] step 201 prime number p and q are chosen. Preferably p and q are each 512 bit primes. Of course, larger or smaller primes may be utilized according to the present invention depending upon the desired level of difficulty desired in breaking any cryptographic keys generated therefrom.
  • At [0076] step 202 one half of the public key (e) is chosen such that e is relatively prime with respect to (p−1)×(q−1). As described below e and n each comprise one half of the public media key of the preferred embodiment of the present invention. The value n is derived from the relationship n=p×q. Accordingly, secured content (s), decryptable only through use of a corresponding private key, may be derived from clear content (c) through the relationship:
  • s pub =c e mod n
  • and clear text contents (c) may be derived from secured content (s), encrypted through the use of a corresponding private key, may be derived through the relationship:[0077]
  • c=s pvt e mod n
  • At [0078] step 203 one half of the private key (d) is computed to satisfy the relationship:
  • 1=d e mod (p−1)(q−1)
  • As with the public key above, n is utilized as the remaining half of the private key. Accordingly the secured content (s) encrypted utilizing the public key above may be decrypted to provide clear content (c) according to the relationship:[0079]
  • c=s pub d mod n
  • and secured content (s) decryptable only through use of the above described corresponding pubic key may be derived according to the relationship:[0080]
  • s pvt =c d mod n
  • At [0081] step 204 the Disk Key k is generated. As described above, this key may be a cryptographic key, such as a symmetric key conforming to the DES standard, utilized in encrypting and decrypting the content of media 100 provided in unsecured area 102, i.e., a content key. Alternatively, Disk Key k may be identification information utilized in identifying the particular media or content, such as to an external source of clearing house for provision of a proper decryption key or other information useful in utilizing the content of media 100.
  • At step [0082] 205 a list of “acceptable users,” or decoders and/or play-back devices authorized to utilize the content of the media, is compiled. This list of acceptable users preferably includes both the identification of such users as well as their public keys.
  • At [0083] step 206 the values of p, q, e, and k, as well as the list of “acceptable users” and other miscellaneous information, such as content information for an external source, are provided to a media device operable according to the present invention. It shall be appreciated, as secure area 101 of the present invention is preferably only accessible through restricted access, that only when these parameters are provided in accordance with the proper operation of the present invention will a conforming media device accept and record this information on media 100. Therefore, in the preferred embodiment the prime factors p and q must be provided to the media device, rather than the value n, in order to establish that the provider is actually the originator of the keys utilized.
  • Accordingly, at [0084] step 207, the media device computes n from the values of p and q provided thereto. If a rogue has been able to intercept the values e and n, such as through unauthorized access to secured area 101 of media 100, a media device operating according to the present invention will prevent a useful unauthorized copy being made as either no values for p and q will be available or the rogue will be unable to select values suitable for use with the portions of the key previously generated.
  • At [0085] step 208 the media device records n, e, k, and the list of acceptable users on to media 100 within secure area 101. It shall be appreciated that, although discussed with respect to the media device providing restricted access to the secured area, as described above the present invention may utilize a portion of media 100 having intelligence disposed therein, such as a small chip set interfaced with the media device as described above. Accordingly, storage of this information may be through interaction with such an intelligence associated with the media rather than relying on the media device to restrict access and to perform operations such as the aforementioned computation of the value n.
  • At [0086] step 209 it is determined whether the particular implementation of the present invention includes the encrypting of content to be stored in unsecured area 102 of media 100. If no encryption of this content is desired, i.e. encryption is utilized for media authentication only, then operation proceeds to step 214 wherein the content is recorded to media 100.
  • However, if encryption of this content is desired, then operation proceeds to step [0087] 210 wherein a determination is made as to whether the implementation is to utilize information provided from an external source, such as a clearing house utilized in providing “pay-per-view” services. If information from an external source is not desired, operation proceeds to step 212 wherein the content key is set to the disk key.
  • If information from an external source is to be required in order to utilize the content of [0088] media 100, operation proceeds to step 211 wherein the content key is selected at random, or by any other appropriate method. It shall be appreciated that the content key of step 211 is provided to the clearing house, or other external agent, in order to provide for the later use of the content of media 100. However, this key is not stored on media 100, thus requiring contact with the clearing house for use of the content.
  • Regardless of whether an external source is to be utilized or not, the content to be stored within [0089] unsecured area 102 may be encrypted with the content key (step 213) and recorded to media 100 (step 214). Accordingly, both steps 211 and 212 proceed to step 213 for encryption of the content with the content key.
  • Having described in detail the mastering of a disk according to a preferred embodiment of the present invention, reference is now made to FIG. 3 wherein the utilization of content provided according to the preferred embodiment of the present invention is shown. [0090]
  • At [0091] step 301 the play-back device requests the encryption type of media 100. In response the media device reads the encryption type from the media (step 302). It shall be appreciated that, although shown above in the preferred embodiment as being recorded in the secure area of the media, the encryption type information may be stored anywhere upon the media, if desired.
  • At step [0092] 303 a determination is made as to whether encryption is utilized with respect to the content of the media. If it is determined that no encryption is utilized then operation proceeds to step 326 in order to determine if disk authentication is utilized according to the present invention.
  • However, if it is determined that encryption is utilized to protect the content, then at step [0093] 304 a determination is made as to whether the encryption is “standard.” If it is determined that encryption utilized to protect the content is other than standard, operation proceeds to step 314 associated with the use of an external source in the utilization of content as described in detail below. If the encryption is standard, operation proceeds to step 305 wherein the list of“acceptable users” is requested. Thereafter, at step 306 the media device reads the list of “acceptable users” from the media and provides this information to the play-back device. The play-back device generates a list of content targets, i.e., decoders available thereto, at step 307.
  • At step [0094] 308 a determination is made as to whether any of the content targets available to the play-back device match those included in the list of “acceptable users” authorized to operate with the particular media. If no match is found, operation proceeds to step 314 associated with the use of an external source in the utilization of content, in order that an updated list of “acceptable users” may be utilized, such as by communicating information when coupled to the clearing house such as a list of public keys for which it is acceptable to work with. Accordingly, if a new decoder is built or authorized after a particular media is published, the new decoder public encryption key scheme may be used through communication with a third party provider to get the authorization to use a new decoder.
  • For example, the media device may establish communication with a clearing house and identify itself to the service provider, such as through the use of one of the acceptable keys on the list being that of the person who owns the content itself, i.e., the media public key. Accordingly, the media device honoring the technique of the present invention is allowed to pass the disk key to this content provider using this public key provided on the media possibly accompanied with a request to the host, either protected or not, identifying a decoder upon which play-back is desired. In receiving a legitimate disk key encrypted with the content provider's public key, the content provider may have a high level of confidence in this being a legitimate disk and, therefore, may send back an authorized public key for the particular decoder, or a list of authorized public keys, encrypted with the private key corresponding to the content provider's public key found on the media. The media device is then able to decrypt that list with this key. [0095]
  • In the preferred embodiment, the retrieval of an authorized key is automatically performed when a suitable authorized key is not found on the media, as is provided in the steps outlined above. However in an alternative embodiment, the up-dating of the authorized decoders is performed in maintenance cycle, such as may be performed at predetermined intervals, such as at night or periods of non-use of the player. [0096]
  • If a match is found as between the “acceptable user” list and the list of content targets available at the play-back device, then at step [0097] 309 a request for the content key is sent identifying the matching “acceptable user.” At step 310 the requested “acceptable user” is validated against the list of “acceptable users” and, provided it is indeed a match, the disk key, here the content key, is read from the media (step 311) and encrypted with the public key of the matching “acceptable user” (step 312). Thereafter this encrypted disk key is provided to the play-back device decoder at step 313 to allow meaningful use of the content recorded thereon and operation according to the present invention is concluded. It shall be appreciated that, as the disk key is encrypted utilizing the public key of the particular decoder, that only this device may actually decrypt the content of media 100 even if a rogue were to emulate the above preceding steps.
  • If it is determined that encryption utilized to protect the content is other than standard (step [0098] 304) or if none of the decoders available to the play-back device are included in the “acceptable users” list (step 308), a determination is made as to whether external contact information is present on the media (step 314). This contact information may be recorded in unsecured area 102, as the particular clearing house contacted may provide a cryptographic key necessary in utilizing the content of media 100 which may not be defeated by fraudulently directing, i.e., surreptitiously recording contact information on media 100, a media device and/or play-back device operating according to the present invention to a rogue external contact. Moreover, as information provided from the clearing house is preferably encrypted utilizing the private media key, i.e., d and n discussed above, a rogue clearing house will not be able to provide a proper response unless this private key is acquired.
  • If, at [0099] step 314, it is determined that no contact information is present, i.e., there is no available external source of information for utilizing the content of media 100, then operation according to the present invention is concluded. However, if it is determined that contact information is present, then operation proceeds to step 315 where a determination is made as to whether the content key to be retrieved from the external source is to allow unlimited use of the content or a single use.
  • If only a single use is to be allowed of the content, i.e., a user must request a content key each time the content is to be utilized, such as might be desirable where a fee for use is desired to be extracted for each such use, operation of the present invention proceeds to step [0100] 316. At step 316 a request is made for an encrypted result of the disk key XORed with a random number. Accordingly, at step 317, the media device generates a random number, i.e., a unique value which is chosen at random for use according to the present invention and which is held only for a period of time sufficient to complete this one iteration of the present invention. At step 318 the disk key is XORed with the random number and, thereafter, at step 319 the XORed disk key is encrypted with the public media key.
  • However, if unlimited use is to be allowed of the content, i.e., the content is to be unlocked permanently with respect to a particular play-back device upon the payment of a single fee or a verification of an authorized copy of the media, or where the information to be provided by the clearing house is “authorized user” up-date information, operation of the present invention proceeds to step [0101] 320. At step 320 a request is made for an encrypted disk key. This request may include transmission of a private cryptographic key or other means by which the returned data packet may be further protected in order to present someone with the public media key for intercepting the returned data packet and decrypting its contents. Thereafter, as described above, step 319 encrypts the disk key with the public media key.
  • It shall be appreciated that, in the alternative to the play-back device determining whether one time or unlimited use is to be allowed, the media device of the present invention may make this determination, such as through reference to information stored on [0102] media 100, for example within a reserved area of secure area 101. Accordingly, rather than the decision presented at step 315, the play-back device may request a disk key and the media device XOR that key with a random number if one time use is to be provided or XOR that key with zero (0) if unlimited use is to be provided.
  • At step [0103] 321 a list of the decoders available to the play-back device, as well as information identifying the media, are appended to the encrypted disk key. It shall be appreciated that the information identifying the media may be stored on the media either within the secured area, such as one of the reserved areas described above, or within the unsecured area, and may be provided from the media for inclusion accompanying the encrypted disk key such as at step 319.
  • The information identifying the media, the list of available decoders and the encrypted disk key are provided to the clearing house at [0104] step 322 and a response therefrom is awaited. It shall be appreciated that this information packet may be provided to the clearing house from the player utilizing a communication device such as the aforementioned modem coupled via a public switched telephone network or the Internet. Of course other means by which data communication may be accomplished which are well known in the art or may later be developed may be utilized according to the present invention.
  • The clearing house receives the data packet from the player and preferably operates according to the embodiment described with reference to FIG. 4 described below. Accordingly, a content key suitable for use with the content of [0105] media 100 is returned to the player, preferably encrypted utilizing the private media key described above.
  • At [0106] step 323 the response from the clearing house is provided to the media device where it is decrypted using the public media key (step 324). As described above, a random number is utilized in the one time use embodiment of the present invention. This random number is utilized by the clearing house to XOR the content key for provision to the player. As such a rogue may not simply capture the data packet returned from the clearing house for later re-submission to the player for repeated use of the content as the random number, discarded after a single iteration of the present invention, is required by the media device in extracting the content key. Moreover, someone in possession of the media public key will not be able to decrypt the data packet and retrieve the content key without also knowing the random number. Accordingly, at step 324, where the single use embodiment is utilized, the information decrypted is XORed with the random number to reveal the content key an/or other information provided thereby.
  • At [0107] step 325 the media device may store the content key for repeated use, where allowed and/or may store a new or updated “acceptable user” list for subsequent use. Alternatively, or additionally, where the content key provided by the clearing house is useful in unlocking the media for multiple uses, i.e., the key is not XORed with a random number retained only for a single iteration of the present invention, the play-back device or other host may memorize the data packet for subsequent provision to the media device at the appropriate time.
  • Although described with respect to up-dating an “acceptable user” list, it shall be appreciated that the present invention may operate to indicate particular ones of the decoders identified as authorized by the Public Key flags and/or Key Extents which are no longer acceptable for use according to the present invention. For example, where a particular private key has been compromised, the up-date information received from the clearing house may indicate one of the public keys may no longer be used. Accordingly, a check against such a “revoked” list may be performed, such as at [0108] step 306, to disallow the use of such private keys.
  • Operation proceeds to [0109] steps 305 through 313 as described herein above. However, it shall be appreciated that where the content key is provided in the data packet from the clearing house, i.e., pay-per-view, step 311 operates to utilize this content key rather than the disk key stored on the media. Likewise, where external information is utilized to up-date the “acceptable user” list, the information at step 306 includes the up-dated information provided by the clearing house.
  • It shall be appreciated that the content key and/or up-dated “acceptable user” list information acquired from the clearing house may be stored within [0110] media 100 if desired. However, as unauthorized recording of this information may be utilized in avoiding the protection offered according to the present invention, recording of this information on the media is preferably done within the secure area.
  • If it is determined that no encryption is utilized to protect the content of media [0111] 100 (step 303) a determination is made as to whether disk authentication according to the present invention is to be utilized (step 326). If no disk authentication is utilized, then operation according to the present invention is concluded and the play-back device utilizes the content of media 100 accordingly.
  • However, if disk authentication is utilized, at [0112] step 327 the play-back device generates a random number. Thereafter, the play-back device encrypts this random number with the private media key (step 328). The encrypted random number is communicated to the media device at step 329. Thereafter, the media device decrypts the random number utilizing the public media key stored in the secure area of media 100.
  • The play-back device requests that the random number be XORed with the disk key stored within the secure area of media [0113] 100 (step 331). In response, at step 332, the media device XORs the random number with the disk key. The media device then encrypts the result of the XORed random number and disk key with the media public key and provides this data packet to the play-back device (step 333). The play-back device decrypts the XORed random number and disk key utilizing the private media key (step 334) and XORs this decrypted information with the random number (step 335).
  • At step [0114] 336 a determination is made as to whether the disk key obtained from the media according to the above steps matches an expected or known disk key. If there is a match, the media is authentic, i.e., a simple copy of the information provided within unprotected area 102 has not been performed. However, if there is no match of the disk key, then the media is not authentic.
  • Although the above preferred embodiment describes the use of standard encryption, external authorization, and media authentication in a single embodiment, it shall be appreciated that any combination of these techniques may be utilized. For example, where a pay-per-view only device is utilized, only those steps associated with external authorization need be provided such a system. Similarly, where it is not anticipated that media authentication will be utilized, devices may be adapted to include only those steps associated with standard encryption and external authorization. [0115]
  • Directing attention to FIG. 4 a preferred embodiment of operation of the clearing house in response to a request by a player is shown. At [0116] step 401 the clearing house receives the data packet of step 322 from the player. The data packet is decrypted utilizing the private media key corresponding to the public media key stored on media 100 (step 402). At step 403 the particular media is identified using information within the received data packet. It shall be appreciated that the clearing house may identify the particular media through available information which does not expressly identify the media. For example a particular public key may provide sufficient identification of the media. Likewise, information gleaned from the communication, such as a uniform resource locator (URL) or automatic number identification (ANI) of the requesting player may be utilized according to the present invention.
  • At [0117] step 404 the random number generated by the media device is recovered by the clearing house by XORing the decrypted disk key and random number XORed by the media device with the disk key as known by the clearing house. This random number is utilized to XOR the content key, to be utilized by the play-back device in meaningful use of the encrypted content of media 100, for provision to the player. An “acceptable user” list, or up-date thereof, may be appended to the information to be provided to the player at step 406. Thereafter, the information to be provided to the player is encrypted using the private media key (step 407) and communicated to the player (step 408).
  • Preferably, file system information of the media is not encrypted. However, the data within files may be encrypted with the content key. Accordingly, a control file preferably indicates which files are encrypted and which are not. This allows protected and freely distributable information to coexist on the same media, thus enabling selected content to be protected, such as movies, while allowing unprotected distribution of other content, such as promotional trailers. [0118]
  • In the preferred embodiment, the encryption sequence is restarted for each sector of the media. This maintains the sector addressability of the media and allows for random access of the content provided thereon. [0119]
  • As described above, a media device operating according to the present invention allows for the producing of protected content by providing for the authorized writing of information within the secure area. However, to prevent such access to the secure area from enabling rogues to alter legitimately mastered media, writing to this area is performed by providing the two prime numbers that are the factor of the media key (n). The disk key is provided encrypted with the private key corresponding with the public key sent. The media device multiplies the two primes and record the product in the media key (n) field. The media device does not need to verify that the input numbers are prime. A user can generate insecure keys, but cannot reproduce a secure key. The disk key will be obtained for recording upon the media by the media device by decrypting it using the public media key computed from the primes p and q. [0120]
  • Accordingly, authoring a protected disk is possible, as the author has the primes. An illegal copy operation will not succeed because the key cannot be written without knowing the corresponding prime factors. Even if a user obtains the keys, he will not be able to record them. [0121]
  • Commercial writing may be accomplished as described above. However, for further protection, the 1024 bit key may either be a prime itself or the product of two primes in which one of the primes is larger than 512 bits. This would prevent copying the key with a consumer level product even if the key could be factored. [0122]
  • It shall be appreciated that the present invention may be implemented upon a dedicated player by the dedicated player reading the disk key from the secure area. If pay-per-view is supported, the dedicated players may implement the public key protocols as described above. [0123]
  • Additionally, it shall be appreciated that the present invention may also be implemented upon a computer system. However, a ROM drive, such as typically found in computer systems, performs no decryption of data delivered via its host interface. Preferably, MPEG decoder based decryption is utilized, such that decryption is performed by the MPEG decoder using the key provided by the drive. In order to maintain protection of the content, the MPEG decoder should not deliver the content to any interface that allows recording. [0124]
  • It shall be appreciated that, although the above example has been discussed with respect to a DVD formatted bulk storage device, the techniques described herein may be utilized with any number of such bulk storage devices. For example, the techniques of the present invention may be utilized with CD ROM formatted bulk storage devices with only simple differences as to where the secure area is hidden and how it was marked as not readable and how the disk key is hidden. [0125]
  • Additionally, it shall be appreciated that according to the preferred embodiment of the present invention, as shown above, no unique host or drive identifier is available or required. This is allow for changing hardware due to upgrades or failure. [0126]
  • Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. [0127]

Claims (33)

What is claimed is
1. A method for preventing unauthorized utilization of content stored on a storage media, said method comprising the steps of:
storing first information on the media, wherein said first information is stored within a controlled access portion of the media, and wherein said first information includes information with respect to at least one authorized media utilization device;
storing second information on the media, wherein said second information includes a cryptographic key of said at least one authorized media utilization device;
storing user content on the media, wherein said user content is stored within an open access portion of the media;
determining if a particular media utilization device is an acceptable media utilization device to provide said user content to, wherein said determination is at least in part made through reference to said first information; and
enabling said particular media utilization device to utilize said user content at least in part by communicating information thereto encrypted with said cryptographic key of said second information associated therewith if said particular utilization device is determined to be acceptable at said determining step.
2. The method of claim 1, further comprising the step of:
determining if said content information is encrypted, wherein if said content information is encrypted said information communicated to said particular media utilization device by said enabling step includes a content cryptographic key.
3. The method of claim 2, wherein said content cryptographic key is at least a portion of said first information.
4. The method of claim 2, further comprising the steps of:
determining if encryption of said content information utilizes an external contact for decryption;
establishing communication with an external contact having information useful in enabling said particular media utilization device to utilize said user content if said encryption of said content information is determined to utilize an external contact; and
retrieving said information useful in enabling said particular media utilization device to utilize said user content, wherein said information communicated to said particular media utilization device by said enabling step includes at least a portion of said retrieved information.
5. The method of claim 4, wherein said information useful in enabling said particular media utilization device to utilize said user content retrieved from said external contact includes a content cryptographic key.
6. The method of claim 1, wherein said step of determining if a particular media utilization device is an acceptable media utilization device comprises the steps of:
reviewing said first information for an indication that said particular media utilization device is an acceptable media utilization device;
determining if external contact information associated with the media is available;
establishing communication with said external contact if said external contact information is determined to be available; and
retrieving information supplemental to said first information with respect to determining if a particular media utilization device is an acceptable media utilization device.
7. The method of claim 1, wherein said second information is stored within an open access portion of the media.
8. The method of claim 7, wherein a summary indication of said at least one cryptographic key is included in said first information.
9. The method of claim 1, wherein said step of storing said first information comprises the steps of:
providing parameters with respect to said first information in a predetermined format; and
deriving at least a portion of said first information from said parameters, wherein said parameters said portion of said first information is derived from are discarded derivation of said portion of said first information.
10. The method of claim 1, wherein said controlled access portion of the media is a discrete portion of said media.
11. The method of claim 10, wherein said discrete portion of said media is a selected area physically accessible by a limited subset of media devices.
12. The method of claim 1, wherein said controlled access portion of the media is intersperse in a predetermined manner within said open access portion of said media.
13. The method of claim 1, wherein said controlled access portion of the media is an active portion of the media.
14. A method for preventing unauthorized utilization of content stored on a storage device, said method comprising the steps of:
storing first information on the storage device, wherein said first information is stored within a controlled access portion of the storage device, and wherein said first information includes a public cryptographic key;
storing user content on the storage device, wherein said user content is stored within an open access portion of the storage device;
validating a particular device operable with said method as acceptable for use with said method, wherein said validating step utilizes at least a portion of said first information; and enabling utilization of said user content if said particular device is validated as acceptable at said validating step.
15. The method of claim 14, wherein said validating step comprises the steps of:
encrypting information with a private cryptographic key corresponding to said public cryptographic key of said first information; and
decrypting said information encrypted with said private cryptographic key corresponding to said public cryptographic key of said first information with said public cryptographic key of said first information.
16. The method of claim 15, wherein said information encrypted at said encrypting step includes a random number.
17. The method of claim 15, wherein said particular device validated is said storage device.
18. The method of claim 14, further comprising the step of:
storing second information on the media, wherein said second information includes a cryptographic key of said at least one authorized media utilization device.
19. The method of claim 18, further comprising the step of:
encrypting information with said cryptographic key of said at least one authorized media utilization device of said second information.
20. The method of claim 19, wherein said information encrypted at said encrypting step is a content key associated with said content stored on the storage device.
21. The method of claim 18, wherein said particular device validated is said media utilization device.
22. A system for providing protected content on a bulk storage device, said system comprising:
a storage device providing information storage capacity, wherein at least a portion of said storage capacity is identified as restricted access storage capacity and at least a portion of said storage capacity is identified as open access storage capacity; and
a processor operating under control of an instruction set, wherein said instruction set defines conditions under which access to said restricted access storage capacity is authorized, and wherein at least a storage device public key and information with respect to a plurality of acceptable play-back devices are stored in said restricted access storage capacity under control of said processor in accordance with said instruction set.
23. The system of claim 22, wherein said information with respect to a plurality of acceptable play-back devices stored in said restricted access storage capacity includes information with respect to public keys associated with each of said acceptable play-back devices.
24. The system of claim 23, wherein said information with respect to said public keys identifies a location within said open access storage capacity where said public keys are stored.
25. The system of claim 24, wherein said information with respect to said public keys also provides information suitable for use in determining if said stored public keys have been altered.
26. The system of claim 23, wherein said information with respect to said public keys is said public keys.
27. The system of claim 22, wherein said conditions under which access to said restricted access storage capacity is authorized for storage of said device public key include providing factors from which said device public key is generated to said processor for generation of said device public key by said processor.
28. The system of claim 22, wherein a cryptographic key associated with information to be stored in said open access storage capacity is stored in said restricted access storage capacity under control of said processor in accordance with said instruction set.
29. The system of claim 22, wherein external contact information associated with an external contact having a cryptographic key associated with information to be stored in said open access storage capacity is stored in said restricted access storage capacity under control of said processor in accordance with said instruction set.
30. The system of claim 22, wherein said restricted access storage capacity is a masked portion of said open access storage capacity.
31. The system of claim 22, wherein said restricted access storage capacity is a predefined discrete area of said storage device.
32. The system of claim 22, wherein said restricted access storage capacity is associated with an active portion of said storage device, and wherein said processor is included in said active portion of said storage device.
33. The system of claim 22, wherein said storage device is a DVD formatted disk.
US09/129,370 1998-08-05 1998-08-05 Media content protection utilizing public key cryptography Expired - Lifetime US6438235B2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US09/129,370 US6438235B2 (en) 1998-08-05 1998-08-05 Media content protection utilizing public key cryptography
EP99106479A EP0978839B1 (en) 1998-08-05 1999-03-30 Media content protection utilizing public key cryptography
DE69902078T DE69902078T2 (en) 1998-08-05 1999-03-30 Media content protection with public key cryptography
JP21497299A JP2000138664A (en) 1998-08-05 1999-07-29 Protecting method of utilizing open key ciphering system
US09/414,213 US6550011B1 (en) 1998-08-05 1999-10-07 Media content protection utilizing public key cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/129,370 US6438235B2 (en) 1998-08-05 1998-08-05 Media content protection utilizing public key cryptography

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US09/414,213 Continuation-In-Part US6550011B1 (en) 1998-08-05 1999-10-07 Media content protection utilizing public key cryptography

Publications (2)

Publication Number Publication Date
US20020016919A1 true US20020016919A1 (en) 2002-02-07
US6438235B2 US6438235B2 (en) 2002-08-20

Family

ID=22439636

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/129,370 Expired - Lifetime US6438235B2 (en) 1998-08-05 1998-08-05 Media content protection utilizing public key cryptography
US09/414,213 Expired - Fee Related US6550011B1 (en) 1998-08-05 1999-10-07 Media content protection utilizing public key cryptography

Family Applications After (1)

Application Number Title Priority Date Filing Date
US09/414,213 Expired - Fee Related US6550011B1 (en) 1998-08-05 1999-10-07 Media content protection utilizing public key cryptography

Country Status (4)

Country Link
US (2) US6438235B2 (en)
EP (1) EP0978839B1 (en)
JP (1) JP2000138664A (en)
DE (1) DE69902078T2 (en)

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010008016A1 (en) * 1998-09-18 2001-07-12 Seigo Kotani Information management method and information management apparatus
US20010034715A1 (en) * 2000-04-12 2001-10-25 Osamu Shibata Decryption device
US20020013883A1 (en) * 2000-07-27 2002-01-31 Nec Corporation Disk system and medium with contents play-back restriction mechanism
US20020026580A1 (en) * 2000-07-19 2002-02-28 Fubito Igari System for access control to hidden storage area in a disk drive
US20020131594A1 (en) * 2001-03-13 2002-09-19 Sanyo Electric Co., Ltd. Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length
US20030018791A1 (en) * 2001-07-18 2003-01-23 Chia-Chi Feng System and method for electronic file transmission
US20030018907A1 (en) * 2001-07-17 2003-01-23 Imation Corp. Content protection for digital media
US20030033254A1 (en) * 2001-08-10 2003-02-13 Takahiro Tanaka Network system of distributing protected contents through secured carrier server
US20030099363A1 (en) * 2001-10-24 2003-05-29 Teruhisa Yokosawa Information recording medium, manufacturing method of its recording medium, information process unit and copyright management system
US20030188150A1 (en) * 2002-03-28 2003-10-02 International Business Machines Corporation System and method for media authentication
US20030185394A1 (en) * 2002-04-01 2003-10-02 Sony Corporation Reproducing method, reproducing apparatus, recording method, and recording apparatus
US20040013267A1 (en) * 2001-06-04 2004-01-22 Teruhisa Yokosawa Copyright protection system
US20040039907A1 (en) * 2001-07-26 2004-02-26 Yoichiro Sako Data recording apparatus and method and data reproducing apparatus and method
US20040098601A1 (en) * 2002-11-14 2004-05-20 Epstein Michael A. Secure local copy protection
US20040117643A1 (en) * 2002-12-17 2004-06-17 Sony Corporation System and method for home network content protection and copy management
US20040117440A1 (en) * 2002-12-17 2004-06-17 Singer Mitch Fredrick Media network environment
US20040151318A1 (en) * 2001-06-01 2004-08-05 Duncanson Paul T Electronic information and cryptographic key management system
US20050192902A1 (en) * 2003-12-05 2005-09-01 Motion Picture Association Of America Digital rights management using multiple independent parameters
US20050203853A1 (en) * 2004-03-11 2005-09-15 Masaya Yamamoto Encrypted-content recording medium, playback apparatus, and playback method
US20050238175A1 (en) * 2004-04-22 2005-10-27 Serge Plotkin Management of the retention and/or discarding of stored data
US20050257074A1 (en) * 2004-05-17 2005-11-17 Alkove James M Secure storage on recordable medium in a content protection system
US20070124416A1 (en) * 2005-11-30 2007-05-31 Qwest Communications International Inc. Real-time on demand server
US20070121651A1 (en) * 2005-11-30 2007-05-31 Qwest Communications International Inc. Network-based format conversion
US20070198424A1 (en) * 2004-03-09 2007-08-23 Masaya Yamamoto Content playback device
US7266691B1 (en) * 1999-10-25 2007-09-04 Sony Corporation Contents providing system
US20070220257A1 (en) * 2006-03-06 2007-09-20 Sandisk Il Ltd. Controlled-Access Recording Generator
US20070266399A1 (en) * 2006-04-28 2007-11-15 Ariff Sidi System and/or method for distributing media content
US20080205652A1 (en) * 2003-01-15 2008-08-28 Toshihisa Nakano Content protection system, key data generation apparatus, and terminal apparatus
US20090007171A1 (en) * 2005-11-30 2009-01-01 Qwest Communications International Inc. Dynamic interactive advertisement insertion into content stream delivered through ip network
US20090007176A1 (en) * 2005-11-30 2009-01-01 Qwest Communications International Inc. Content syndication to set top box through ip network
US20090063645A1 (en) * 2005-11-30 2009-03-05 Qwest Communications Internatinal Inc. System and method for supporting messaging using a set top box
US20090164804A1 (en) * 2007-12-25 2009-06-25 Sandisk Il Ltd. Secured storage device
US20090252329A1 (en) * 2008-04-02 2009-10-08 Qwest Communications International Inc. Iptv follow me content system and method
US20100125741A1 (en) * 2008-11-20 2010-05-20 Seagate Technology Llc Optical disc emulator
US20100174917A1 (en) * 2007-07-03 2010-07-08 Pioneer Corporation Information recording medium, reproducing apparatus and cumputer program
US20110093883A1 (en) * 2007-04-17 2011-04-21 Huawei Technologies Co., Ltd. System, protection method and server for implementing the virtual channel service
US20140189358A1 (en) * 2005-07-14 2014-07-03 Conax As Multimedia data protection
WO2015084305A1 (en) * 2013-12-02 2015-06-11 Intel Corporation Methods, systems, and apparatus to protect content based on persona
US10025911B2 (en) * 2014-08-28 2018-07-17 Vodafone Gmbh Replay attack prevention for content streaming system
US10102384B2 (en) * 2013-05-30 2018-10-16 Jscrambler S.A. Digital content execution control mechanism
US10489561B2 (en) * 2013-05-30 2019-11-26 Jscrambler S.A. Web application protection
US10970232B2 (en) * 2017-01-03 2021-04-06 Western Digital Technologies, Inc. Virtual root of trust for data storage device
CN113032815A (en) * 2021-05-18 2021-06-25 杭州海康威视数字技术股份有限公司 Key combination calculation management method, device and equipment
CN115297118A (en) * 2022-10-09 2022-11-04 北京航空航天大学杭州创新研究院 Data sharing method and data sharing system based on block chain

Families Citing this family (419)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5891646A (en) * 1997-06-05 1999-04-06 Duke University Methods of assaying receptor activity and constructs useful in such methods
MY132414A (en) 1998-04-14 2007-10-31 Hitachi Ltd Reproducing apparatus, recording apparatus and display apparatus
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US7436957B1 (en) * 1998-08-27 2008-10-14 Fischer Addison M Audio cassette emulator with cryptographic media distribution control
JP3481470B2 (en) * 1998-10-19 2003-12-22 日本電気株式会社 System for preventing unauthorized alteration of data and the like and encryption device used together therewith
EP1473721B1 (en) * 1998-12-11 2015-07-15 Sony Corporation Technique for controlling copying of data
US6732275B1 (en) * 1999-03-23 2004-05-04 Samsung Electronics Co., Ltd. Securing encrypted files in a PC and PC peripheral environment
US6973444B1 (en) * 1999-03-27 2005-12-06 Microsoft Corporation Method for interdependently validating a digital content package and a corresponding digital license
US7383205B1 (en) * 1999-03-27 2008-06-03 Microsoft Corporation Structure of a digital content package
JP4238410B2 (en) * 1999-04-09 2009-03-18 ソニー株式会社 Information processing system
JP4161466B2 (en) * 1999-04-22 2008-10-08 日本ビクター株式会社 Content information recording method and content information processing apparatus
JP4177514B2 (en) * 1999-04-28 2008-11-05 株式会社東芝 Computer system and content protection method
JP2001016196A (en) * 1999-04-28 2001-01-19 Fuji Soft Abc Inc Enciphering/deciphering method using multiple affine key, authenticating method and each device using the same
JP4362888B2 (en) * 1999-05-18 2009-11-11 ソニー株式会社 Information processing apparatus and method, and recording medium
US8055588B2 (en) * 1999-05-19 2011-11-08 Digimarc Corporation Digital media methods
JP2000341263A (en) * 1999-05-27 2000-12-08 Sony Corp Information processing device and its method
US7143445B1 (en) 1999-05-31 2006-11-28 Sony Corporation Information processing apparatus, information processing method, and program storage medium
WO2000077128A1 (en) * 1999-06-09 2000-12-21 Technische Universität München Lehrstuhl Für Thermische Kraftanlagen Device for the gasification of carbonaceous feedstock
US6957344B1 (en) * 1999-07-09 2005-10-18 Digital Video Express, L.P. Manufacturing trusted devices
US6981007B1 (en) * 1999-07-09 2005-12-27 Whitmyer Jr Wesley W Onsite backup for internet-based data processing
US6757825B1 (en) * 1999-07-13 2004-06-29 Lucent Technologies Inc. Secure mutual network authentication protocol
JP2001034666A (en) * 1999-07-21 2001-02-09 Sunmoretec Co Ltd Copyright information management system
US7873837B1 (en) 2000-01-06 2011-01-18 Super Talent Electronics, Inc. Data security for electronic data flash card
US7631195B1 (en) 2006-03-15 2009-12-08 Super Talent Electronics, Inc. System and method for providing security to a portable storage device
US6886098B1 (en) 1999-08-13 2005-04-26 Microsoft Corporation Systems and methods for compression of key sets having multiple keys
AU6640500A (en) 1999-08-13 2001-03-19 Microsoft Corporation Methods and systems of protecting digital content
US7065216B1 (en) 1999-08-13 2006-06-20 Microsoft Corporation Methods and systems of protecting digital content
WO2001015380A1 (en) 1999-08-20 2001-03-01 Sony Corporation Information transmission system and method, drive device and access method, information recording medium, device and method for producing recording medium
JP4300644B2 (en) * 1999-08-24 2009-07-22 ソニー株式会社 Mobile device
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US7239226B2 (en) 2001-07-10 2007-07-03 American Express Travel Related Services Company, Inc. System and method for payment using radio frequency identification in contact and contactless transactions
WO2001025948A1 (en) * 1999-10-05 2001-04-12 Zapmedia, Inc. System and method for distributing media assets to user devices and managing user rights of the media assets
US7065342B1 (en) * 1999-11-23 2006-06-20 Gofigure, L.L.C. System and mobile cellular telephone device for playing recorded music
US7412643B1 (en) 1999-11-23 2008-08-12 International Business Machines Corporation Method and apparatus for linking representation and realization data
WO2001048645A1 (en) * 1999-12-28 2001-07-05 Sony Corporation Digital data processing device and method therefor
DE19963471B4 (en) * 1999-12-29 2008-10-09 Robert Bosch Gmbh Apparatus and method for preventing piracy of computer programs
US7861312B2 (en) * 2000-01-06 2010-12-28 Super Talent Electronics, Inc. MP3 player with digital rights management
US8429041B2 (en) 2003-05-09 2013-04-23 American Express Travel Related Services Company, Inc. Systems and methods for managing account information lifecycles
US8543423B2 (en) 2002-07-16 2013-09-24 American Express Travel Related Services Company, Inc. Method and apparatus for enrolling with multiple transaction environments
US6701528B1 (en) * 2000-01-26 2004-03-02 Hughes Electronics Corporation Virtual video on demand using multiple encrypted video segments
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US6834308B1 (en) * 2000-02-17 2004-12-21 Audible Magic Corporation Method and apparatus for identifying media content presented on a media playing device
US7627531B2 (en) 2000-03-07 2009-12-01 American Express Travel Related Services Company, Inc. System for facilitating a transaction
US7028082B1 (en) 2001-03-08 2006-04-11 Music Choice Personalized audio system and method
US7275256B1 (en) 2001-08-28 2007-09-25 Music Choice System and method for providing an interactive, visual complement to an audio program
US8463780B1 (en) 2000-03-08 2013-06-11 Music Choice System and method for providing a personalized media service
US7320025B1 (en) 2002-03-18 2008-01-15 Music Choice Systems and methods for providing a broadcast entertainment service and an on-demand entertainment service
US7325043B1 (en) 2000-03-08 2008-01-29 Music Choice System and method for providing a personalized media service
US7783722B1 (en) 2000-03-08 2010-08-24 Music Choice Personalized audio system and method
US7856485B2 (en) 2000-03-08 2010-12-21 Music Choice Systems and methods for providing customized media channels
US7133924B1 (en) * 2000-03-08 2006-11-07 Music Choice Personalized audio system and method
DE60106802T2 (en) * 2000-04-06 2005-03-10 Matsushita Electric Industrial Co., Ltd., Kadoma Copyright protection system, encryption device, decryption device and recording medium
US7200230B2 (en) * 2000-04-06 2007-04-03 Macrovision Corporation System and method for controlling and enforcing access rights to encrypted media
CA2405401C (en) * 2000-04-17 2010-10-19 Nagravision S.A. Secure data transmission system and method
WO2002010907A2 (en) * 2000-05-10 2002-02-07 Convera Corporation Method of revoking_authorizations for software components
JP2001331658A (en) * 2000-05-18 2001-11-30 Yamaha Corp System and method for distributing contents, server and client used for the same distribution system, and computer-readable recording medium with recorded program applied thereto
AU2001268102A1 (en) * 2000-05-30 2001-12-11 Dataplay, Incorporated Method of decrypting data stored on a storage device using an embedded encryption/decryption means
TWI239447B (en) * 2000-06-02 2005-09-11 Koninkl Philips Electronics Nv Recordable storage medium with protected data area
US8082572B1 (en) 2000-06-08 2011-12-20 The Directv Group, Inc. Method and apparatus for transmitting, receiving, and utilizing audio/visual signals and other information
US7213266B1 (en) * 2000-06-09 2007-05-01 Intertrust Technologies Corp. Systems and methods for managing and protecting electronic content and applications
US7404084B2 (en) * 2000-06-16 2008-07-22 Entriq Inc. Method and system to digitally sign and deliver content in a geographically controlled manner via a network
EP2770455B1 (en) * 2000-06-16 2017-01-25 MIH Technology Holdings BV Method and system to exercise geographic restrictions over the distribution of content via a network
KR100354488B1 (en) * 2000-06-16 2002-10-11 주식회사 이플래닛 Apparatus for and method of preventing illegal reproduction/distribution of digital goods by use of physical goods
US6961858B2 (en) * 2000-06-16 2005-11-01 Entriq, Inc. Method and system to secure content for distribution via a network
US7228427B2 (en) * 2000-06-16 2007-06-05 Entriq Inc. Method and system to securely distribute content via a network
US7107462B2 (en) * 2000-06-16 2006-09-12 Irdeto Access B.V. Method and system to store and distribute encryption keys
US7389531B2 (en) * 2000-06-16 2008-06-17 Entriq Inc. Method and system to dynamically present a payment gateway for content distributed via a network
US7991697B2 (en) * 2002-12-16 2011-08-02 Irdeto Usa, Inc. Method and system to digitally sign and deliver content in a geographically controlled manner via a network
US7237255B2 (en) 2000-06-16 2007-06-26 Entriq Inc. Method and system to dynamically present a payment gateway for content distributed via a network
US7215771B1 (en) * 2000-06-30 2007-05-08 Western Digital Ventures, Inc. Secure disk drive comprising a secure drive key and a drive ID for implementing secure communication over a public network
US8140859B1 (en) * 2000-07-21 2012-03-20 The Directv Group, Inc. Secure storage and replay of media programs using a hard-paired receiver and storage device
US7203311B1 (en) * 2000-07-21 2007-04-10 The Directv Group, Inc. Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
US7457414B1 (en) * 2000-07-21 2008-11-25 The Directv Group, Inc. Super encrypted storage and retrieval of media programs with smartcard generated keys
US7203314B1 (en) * 2000-07-21 2007-04-10 The Directv Group, Inc. Super encrypted storage and retrieval of media programs with modified conditional access functionality
US7155616B1 (en) 2000-07-31 2006-12-26 Western Digital Ventures, Inc. Computer network comprising network authentication facilities implemented in a disk drive
US7003674B1 (en) 2000-07-31 2006-02-21 Western Digital Ventures, Inc. Disk drive employing a disk with a pristine area for storing encrypted data accessible only by trusted devices or clients to facilitate secure network communications
JP4173956B2 (en) * 2000-08-02 2008-10-29 エヌ・ティ・ティ・コミュニケーションズ株式会社 Website guidance system and website guidance device
JP3698968B2 (en) 2000-08-02 2005-09-21 株式会社ルネサステクノロジ Hub device with copyright protection function
EP1182874A1 (en) * 2000-08-24 2002-02-27 Canal+ Technologies Société Anonyme Digital content protection system
JP2002073396A (en) * 2000-08-30 2002-03-12 Toshiba Corp Recording method, reproducing method, device and information-recording medium
US6976169B1 (en) * 2000-09-05 2005-12-13 Nippon Telegraph And Telephone Corporation Undeniable digital signature scheme based on quadratic field
US8205237B2 (en) 2000-09-14 2012-06-19 Cox Ingemar J Identifying works, using a sub-linear time search, such as an approximate nearest neighbor search, for initiating a work-based action, such as an action on the internet
US8010988B2 (en) * 2000-09-14 2011-08-30 Cox Ingemar J Using features extracted from an audio and/or video work to obtain information about the work
US20020042754A1 (en) 2000-10-10 2002-04-11 Del Beccaro David J. System and method for receiving broadcast audio/video works and for enabling a consumer to purchase the received audio/video works
US7165268B1 (en) * 2000-10-17 2007-01-16 Moore Keith E Digital signatures for tangible medium delivery
JP2002132456A (en) * 2000-10-20 2002-05-10 Sony Corp Information recording device, information reproducing device, information recording method, information reproducing method, information recording medium and program providing medium
US8472627B2 (en) * 2000-10-30 2013-06-25 Geocodex Llc System and method for delivering encrypted information in a communication network using location indentity and key tables
US7120254B2 (en) * 2000-10-30 2006-10-10 Geocodex Llc Cryptographic system and method for geolocking and securing digital information
US7562012B1 (en) * 2000-11-03 2009-07-14 Audible Magic Corporation Method and apparatus for creating a unique audio signature
AU2001296667A1 (en) * 2000-11-09 2002-05-21 Macrovision Corporation Method and apparatus for determining digital a/v content distribution terms based on detected piracy levels
US7124114B1 (en) * 2000-11-09 2006-10-17 Macrovision Corporation Method and apparatus for determining digital A/V content distribution terms based on detected piracy levels
FR2818062B1 (en) * 2000-12-07 2003-04-11 Thomson Multimedia Sa METHOD FOR SECURE TRANSMISSION OF DIGITAL DATA FROM A SOURCE TO A RECEIVER
US20070156610A1 (en) * 2000-12-25 2007-07-05 Sony Corporation Digital data processing apparatus and method, data reproducing terminal apparatus, data processing terminal apparatus, and terminal apparatus
US9613483B2 (en) * 2000-12-27 2017-04-04 Proxense, Llc Personal digital key and receiver/decoder circuit system and method
JP2002196986A (en) * 2000-12-27 2002-07-12 Pioneer Electronic Corp Information processor, information processing method, information recording medium having information processing program recorded readable by computer, and recording medium
US7472280B2 (en) * 2000-12-27 2008-12-30 Proxense, Llc Digital rights management
US6973576B2 (en) 2000-12-27 2005-12-06 Margent Development, Llc Digital content security system
US7305560B2 (en) * 2000-12-27 2007-12-04 Proxense, Llc Digital content security system
BRPI0206466B1 (en) * 2001-01-16 2016-04-12 Nagracard Sa method for storing encrypted data
JP4281252B2 (en) * 2001-01-16 2009-06-17 ソニー株式会社 Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, information recording medium, and program storage medium
US7506376B2 (en) * 2001-02-05 2009-03-17 Lg Electronics Inc. Copy protection method for digital media
US7509682B2 (en) * 2001-02-05 2009-03-24 Lg Electronics Inc. Copy protection method and system for digital media
US20020112161A1 (en) * 2001-02-13 2002-08-15 Thomas Fred C. Method and system for software authentication in a computer system
KR100493311B1 (en) * 2001-02-21 2005-06-07 엘지전자 주식회사 Watermark-based copy management system and method for digital media copy protection
US7043051B2 (en) 2001-02-21 2006-05-09 Lg Electronics Inc. Proprietary watermark system for secure digital media and content distribution
TW561754B (en) * 2001-02-23 2003-11-11 Koninkl Philips Electronics Nv Authentication method and data transmission system
RU2290767C2 (en) * 2001-03-12 2006-12-27 Конинклейке Филипс Электроникс Н.В. Receiving device for protective preservation of a unit of content and reproduction device
US7058201B2 (en) 2001-03-28 2006-06-06 Lg Electronics Inc. Method of embedding watermark into digital image
US20020141577A1 (en) * 2001-03-29 2002-10-03 Ripley Michael S. Method and system for providing bus encryption based on cryptographic key exchange
WO2002082271A1 (en) 2001-04-05 2002-10-17 Audible Magic Corporation Copyright detection and protection system and method
US20020157011A1 (en) * 2001-04-20 2002-10-24 Thomas Iii Fred C. Method and apparatus for secure transmission of identifier for removable storage media
US20030023862A1 (en) * 2001-04-26 2003-01-30 Fujitsu Limited Content distribution system
US20020161997A1 (en) * 2001-04-26 2002-10-31 Fujitsu Limited Content distribution system
WO2002088911A2 (en) * 2001-04-30 2002-11-07 Nokia Corporation Protection of content reproduction using digital rights
WO2002091662A1 (en) * 2001-05-01 2002-11-14 Vasco Data Security, Inc. Use and generation of a session key in a secure socket layer connection
KR100493284B1 (en) 2001-05-11 2005-06-03 엘지전자 주식회사 Copy protection method and system for digital media
US7650314B1 (en) 2001-05-25 2010-01-19 American Express Travel Related Services Company, Inc. System and method for securing a recurrent billing transaction
US20030005317A1 (en) * 2001-06-28 2003-01-02 Audebert Yves Louis Gabriel Method and system for generating and verifying a key protection certificate
US7805378B2 (en) 2001-07-10 2010-09-28 American Express Travel Related Servicex Company, Inc. System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions
US7925535B2 (en) * 2001-07-10 2011-04-12 American Express Travel Related Services Company, Inc. System and method for securing RF transactions using a radio frequency identification device including a random number generator
US7996324B2 (en) 2001-07-10 2011-08-09 American Express Travel Related Services Company, Inc. Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7529659B2 (en) 2005-09-28 2009-05-05 Audible Magic Corporation Method and apparatus for identifying an unknown work
US8635131B1 (en) 2001-07-10 2014-01-21 American Express Travel Related Services Company, Inc. System and method for managing a transaction protocol
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US8960535B2 (en) 2001-07-10 2015-02-24 Iii Holdings 1, Llc Method and system for resource management and evaluation
US7762457B2 (en) 2001-07-10 2010-07-27 American Express Travel Related Services Company, Inc. System and method for dynamic fob synchronization and personalization
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US7746215B1 (en) 2001-07-10 2010-06-29 Fred Bishop RF transactions using a wireless reader grid
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US8284025B2 (en) 2001-07-10 2012-10-09 Xatra Fund Mx, Llc Method and system for auditory recognition biometrics on a FOB
US7503480B2 (en) 2001-07-10 2009-03-17 American Express Travel Related Services Company, Inc. Method and system for tracking user performance
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US20040236699A1 (en) 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
JP2003030145A (en) * 2001-07-16 2003-01-31 Fujitsu Ltd Information processing method and program
WO2003009285A2 (en) * 2001-07-19 2003-01-30 Koninklijke Philips Electronics N.V. Apparatus and method for reproducing user data
US7877438B2 (en) * 2001-07-20 2011-01-25 Audible Magic Corporation Method and apparatus for identifying new media content
US8972481B2 (en) 2001-07-20 2015-03-03 Audible Magic, Inc. Playlist generation method and apparatus
US7257844B2 (en) * 2001-07-31 2007-08-14 Marvell International Ltd. System and method for enhanced piracy protection in a wireless personal communication device
CN1636177A (en) * 2001-08-06 2005-07-06 松下电器产业株式会社 License management server, terminal device, license management system and usage restriction control method
DE60202568T8 (en) * 2001-08-08 2005-10-20 Matsushita Electric Industrial Co., Ltd., Kadoma Copyright protection system, recording device, and playback device
US20030188183A1 (en) * 2001-08-27 2003-10-02 Lee Lane W. Unlocking method and system for data on media
US7062045B2 (en) * 2001-09-06 2006-06-13 Clwt, Llc Media protection system and method
US20030053629A1 (en) * 2001-09-14 2003-03-20 Koninklijke Philips Electronics N.V. USB authentication interface
EP1436943B1 (en) 2001-09-21 2016-11-02 The DIRECTV Group, Inc. Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder
US20030065619A1 (en) * 2001-09-28 2003-04-03 Canon Kabushiki Kaisha Information processing device, information processing method, network system, security method for digital information, storage medium and program
JP3814508B2 (en) * 2001-09-28 2006-08-30 キヤノン株式会社 Electronic album publishing system, electronic album management apparatus and program thereof
WO2003034313A2 (en) 2001-10-18 2003-04-24 Macrovision Corporation Systems and methods for providing digital rights management compatibility
US7487363B2 (en) * 2001-10-18 2009-02-03 Nokia Corporation System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage
US20030135623A1 (en) * 2001-10-23 2003-07-17 Audible Magic, Inc. Method and apparatus for cache promotion
US20030084332A1 (en) * 2001-10-26 2003-05-01 Koninklijke Philips Electronics N.V. Method for binding a software data domain to specific hardware
US20030108205A1 (en) * 2001-12-07 2003-06-12 Bryan Joyner System and method for providing encrypted data to a device
DE60213650T2 (en) 2001-12-10 2007-08-09 International Business Machines Corp. ACCESS TO ENCRYPTED ROUND END
US7565683B1 (en) 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US7921450B1 (en) * 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US7260555B2 (en) 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US7478418B2 (en) * 2001-12-12 2009-01-13 Guardian Data Storage, Llc Guaranteed delivery of changes to security policies in a distributed system
US7631184B2 (en) * 2002-05-14 2009-12-08 Nicholas Ryan System and method for imposing security on copies of secured items
US7783765B2 (en) * 2001-12-12 2010-08-24 Hildebrand Hal S System and method for providing distributed access control to secured documents
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US7308583B2 (en) * 2002-01-25 2007-12-11 Matsushita Electric Industrial Co., Ltd. Data distribution system
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US20030154372A1 (en) * 2002-02-12 2003-08-14 Barszcz Chester J. Secure remote data acquisition method and system
WO2003073295A1 (en) * 2002-02-27 2003-09-04 Matsushita Electric Industrial Co., Ltd. Host device
US7617295B1 (en) 2002-03-18 2009-11-10 Music Choice Systems and methods for providing a broadcast entertainment service and an on-demand entertainment service
US7272858B2 (en) * 2002-04-16 2007-09-18 Microsoft Corporation Digital rights management (DRM) encryption and data-protection for content on a relatively simple device
US8613102B2 (en) 2004-03-30 2013-12-17 Intellectual Ventures I Llc Method and system for providing document retention using cryptography
US7748045B2 (en) * 2004-03-30 2010-06-29 Michael Frederick Kenrich Method and system for providing cryptographic document retention with off-line access
US8335915B2 (en) * 2002-05-14 2012-12-18 Netapp, Inc. Encryption based security system for network storage
JP2003333030A (en) * 2002-05-16 2003-11-21 Nec Corp Method for outputting time shift and device for outputting time shift
US20030226024A1 (en) * 2002-06-04 2003-12-04 Qwest Communications International Inc. Secure internet documents
US8438392B2 (en) * 2002-06-20 2013-05-07 Krimmeni Technologies, Inc. Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol
US7203844B1 (en) 2002-06-20 2007-04-10 Oxford William V Method and system for a recursive security protocol for digital copyright control
US7152166B2 (en) * 2002-06-26 2006-12-19 Microsoft Corporation Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication
US7478235B2 (en) 2002-06-28 2009-01-13 Microsoft Corporation Methods and systems for protecting data in USB systems
US20040083487A1 (en) * 2002-07-09 2004-04-29 Kaleidescape, A Corporation Content and key distribution system for digital content representing media streams
JP2005533416A (en) * 2002-07-09 2005-11-04 カレイドスケイプ・インコーポレイテッド How to securely present encrypted digital content
EP1973297B1 (en) 2002-07-26 2011-08-31 Koninklijke Philips Electronics N.V. Secure authenticated distance measurement
JP2004072214A (en) * 2002-08-02 2004-03-04 Sharp Corp Electronic seal, ic card, authentication system for personal identification, and mobile apparatus
KR20040017530A (en) * 2002-08-22 2004-02-27 엘지전자 주식회사 High density optical disc read only and method for reproducing data each regions
US7979700B2 (en) * 2002-08-23 2011-07-12 Sandisk Corporation Apparatus, system and method for securing digital documents in a digital appliance
US7512810B1 (en) 2002-09-11 2009-03-31 Guardian Data Storage Llc Method and system for protecting encrypted files transmitted over a network
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
US7174567B2 (en) * 2002-10-09 2007-02-06 Sony Ericsson Mobile Communications Ab Digital rights management apparatus, methods and multimedia products using biometric data
EP2442566A3 (en) 2002-10-15 2012-08-08 Verance Corporation Media Monitoring, Management and Information System
US7373658B1 (en) 2002-10-25 2008-05-13 Aol Llc Electronic loose-leaf remote control for enabling access to content from a media player
US7315946B1 (en) * 2003-04-14 2008-01-01 Aol Llc Out-of-band tokens for rights access
US7647277B1 (en) 2002-10-25 2010-01-12 Time Warner Inc. Regulating access to content using a multitiered rule base
GB2394573A (en) * 2002-10-26 2004-04-28 Ncr Int Inc Controlled access to software or data
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
CN1276363C (en) * 2002-11-13 2006-09-20 深圳市朗科科技有限公司 Method of actualizing safety data storage and algorithm storage in virtue of semiconductor memory device
US7225458B2 (en) * 2002-11-21 2007-05-29 The Directv Group, Inc. Method and apparatus for ensuring reception of conditional access information in multi-tuner receivers
US7000241B2 (en) * 2002-11-21 2006-02-14 The Directv Group, Inc. Method and apparatus for minimizing conditional access information overhead while ensuring conditional access information reception in multi-tuner receivers
US7478248B2 (en) * 2002-11-27 2009-01-13 M-Systems Flash Disk Pioneers, Ltd. Apparatus and method for securing data on a portable storage device
US7305711B2 (en) * 2002-12-10 2007-12-04 Intel Corporation Public key media key block
JP4099049B2 (en) 2002-12-16 2008-06-11 株式会社エヌ・ティ・ティ・ドコモ Communication method and communication system
US7706540B2 (en) * 2002-12-16 2010-04-27 Entriq, Inc. Content distribution using set of session keys
AU2003303011A1 (en) * 2002-12-17 2004-07-09 Koninklijke Philips Electronics N.V. Mobile device that uses removable medium for playback of content
US7890990B1 (en) 2002-12-20 2011-02-15 Klimenty Vainstein Security system with staging capabilities
US7801820B2 (en) * 2003-01-13 2010-09-21 Sony Corporation Real-time delivery of license for previously stored encrypted content
WO2004070998A2 (en) 2003-01-31 2004-08-19 Kaleidescape, Inc. Recovering from de-synchronization attacks against watermarking and fingerprinting
US8332326B2 (en) 2003-02-01 2012-12-11 Audible Magic Corporation Method and apparatus to identify a work received by a processing system
US7835520B2 (en) * 2003-02-20 2010-11-16 Zoran Corporation Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders
US7370212B2 (en) 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US7626609B1 (en) 2003-03-07 2009-12-01 Music Choice Method and system for displaying content while reducing burn-in of a display
US7278165B2 (en) * 2003-03-18 2007-10-02 Sony Corporation Method and system for implementing digital rights management
JP4554598B2 (en) * 2003-03-27 2010-09-29 サンディスク アイエル リミテッド A data storage device that is fully accessible by all users
US8572104B2 (en) 2003-04-18 2013-10-29 Kaleidescape, Inc. Sales of collections excluding those already purchased
US7426637B2 (en) * 2003-05-21 2008-09-16 Music Public Broadcasting, Inc. Method and system for controlled media sharing in a network
JP4222110B2 (en) * 2003-05-28 2009-02-12 ソニー株式会社 Information recording medium, information processing apparatus and method
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
EP1623420B1 (en) * 2003-06-18 2015-11-11 Panasonic Intellectual Property Management Co., Ltd. Playback apparatus, playback method, and program for reproducing an encrypted virtual package
US7647507B1 (en) * 2003-07-08 2010-01-12 Marvell International Ltd. Secure digital content distribution system and secure hard drive
WO2005013133A2 (en) * 2003-07-28 2005-02-10 Sandisk Secure Content Solutions, Inc. System, apparatus and method for controlling a storage device
GB2404487A (en) * 2003-07-31 2005-02-02 Sony Uk Ltd Access control for digital storage medium content
GB2404489A (en) * 2003-07-31 2005-02-02 Sony Uk Ltd Access control for digital storage medium content
GB2404486A (en) * 2003-07-31 2005-02-02 Sony Uk Ltd Access control for digital storage medium content
US20060248595A1 (en) * 2003-08-08 2006-11-02 Koninklijke Philips Electronics N.V. Reproducing encrypted content using region keys
US7552334B2 (en) * 2003-09-24 2009-06-23 The Boeing Company System and method for presentation integrity
US7389273B2 (en) * 2003-09-25 2008-06-17 Scott Andrew Irwin System and method for federated rights management
US20050071656A1 (en) * 2003-09-25 2005-03-31 Klein Dean A. Secure processor-based system and method
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
KR100567822B1 (en) * 2003-10-01 2006-04-05 삼성전자주식회사 Method for creating domain based on public key cryptography
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
CN1607589A (en) * 2003-10-13 2005-04-20 皇家飞利浦电子股份有限公司 Optical disc, player for optical disc playback and play back method thereof
US7644446B2 (en) * 2003-10-23 2010-01-05 Microsoft Corporation Encryption and data-protection for content on portable medium
US7580523B2 (en) * 2004-01-16 2009-08-25 The Directv Group, Inc. Distribution of video content using client to host pairing of integrated receivers/decoders
US7599494B2 (en) * 2004-01-16 2009-10-06 The Directv Group, Inc. Distribution of video content using a trusted network key for sharing content
DE602005017369D1 (en) * 2004-02-03 2009-12-10 Sandisk Secure Content Solutio PROTECTION OF DIGITAL DATA CONTENT
US7801303B2 (en) 2004-03-01 2010-09-21 The Directv Group, Inc. Video on demand in a broadcast network
US9020854B2 (en) 2004-03-08 2015-04-28 Proxense, Llc Linked account system using personal digital key (PDK-LAS)
US20050235357A1 (en) * 2004-04-19 2005-10-20 Securemedia International Preventing cloning of high value software using embedded hardware and software functionality
US7590243B2 (en) * 2004-05-04 2009-09-15 The Directv Group, Inc. Digital media conditional access system for handling digital media content
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US7707427B1 (en) 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
US8130746B2 (en) 2004-07-28 2012-03-06 Audible Magic Corporation System for distributing decoy content in a peer to peer network
US8359332B1 (en) 2004-08-02 2013-01-22 Nvidia Corporation Secure content enabled drive digital rights management system and method
US8402283B1 (en) 2004-08-02 2013-03-19 Nvidia Corporation Secure content enabled drive system and method
US7543317B2 (en) * 2004-08-17 2009-06-02 The Directv Group, Inc. Service activation of set-top box functionality using broadcast conditional access system
US20060041510A1 (en) * 2004-08-19 2006-02-23 Securemedia International Method for a secure system of content distribution for DVD applications
CN1758358B (en) * 2004-09-14 2012-04-18 马维尔国际贸易有限公司 Unified control and memory for a combined DVD/HDD system
US7639926B2 (en) 2004-09-14 2009-12-29 Marvell World Trade Ltd. Unified control and memory for a combined DVD/HDD system
US7639927B2 (en) 2004-09-14 2009-12-29 Marvell World Trade Ltd. Unified control and memory for a combined DVD/HDD system
US7702221B2 (en) * 2004-09-14 2010-04-20 Marvell World Trade Ltd. Unified control and memory for a combined DVD/HDD system
US7657160B2 (en) * 2004-09-14 2010-02-02 Marvell World Trade Ltd. Unified control and memory for a combined DVD/HDD system
US10477151B2 (en) 2004-10-18 2019-11-12 Inside Secure Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
WO2006044765A2 (en) 2004-10-18 2006-04-27 Syphermedia International, Inc. Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US7697688B1 (en) 2004-10-27 2010-04-13 Marvell International Ltd. Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
US7742594B1 (en) 2004-10-27 2010-06-22 Marvell International Ltd. Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
KR100677152B1 (en) * 2004-11-17 2007-02-02 삼성전자주식회사 Method for transmitting content in home network using user-binding
KR100823254B1 (en) * 2004-12-10 2008-04-17 삼성전자주식회사 Method for revoking a public key of content provider
US20060129821A1 (en) * 2004-12-13 2006-06-15 Microsoft Corporation Believably trustworthy enforcement of privacy enhancing technologies in data processing
US8751825B1 (en) * 2004-12-15 2014-06-10 Nvidia Corporation Content server and method of storing content
US8788425B1 (en) 2004-12-15 2014-07-22 Nvidia Corporation Method and system for accessing content on demand
US8875309B1 (en) 2004-12-15 2014-10-28 Nvidia Corporation Content server and method of providing content therefrom
US8346807B1 (en) 2004-12-15 2013-01-01 Nvidia Corporation Method and system for registering and activating content
US7536016B2 (en) 2004-12-17 2009-05-19 Microsoft Corporation Encrypted content data structure package and generation thereof
AU2005319019A1 (en) 2004-12-20 2006-06-29 Proxense, Llc Biometric personal data key (PDK) authentication
US7685636B2 (en) * 2005-03-07 2010-03-23 International Business Machines Corporation System, service, and method for enabling authorized use of distributed content on a protected media
US7849311B2 (en) * 2005-03-15 2010-12-07 Silicon Graphics International Computer system with dual operating modes
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US20080120311A1 (en) * 2005-04-07 2008-05-22 Iofy Corporation Device and Method for Protecting Unauthorized Data from being used in a Presentation on a Device
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US8893299B1 (en) 2005-04-22 2014-11-18 Nvidia Corporation Content keys for authorizing access to content
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
CN101194268A (en) * 2005-06-10 2008-06-04 松下电器产业株式会社 Information security device
WO2006138620A2 (en) * 2005-06-15 2006-12-28 Music Choice Systems and methods for facilitating the acquisition of content
US20060291660A1 (en) * 2005-12-21 2006-12-28 Telefonaktiebolaget Lm Ericsson (Publ) SIM UICC based broadcast protection
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US9325944B2 (en) * 2005-08-11 2016-04-26 The Directv Group, Inc. Secure delivery of program content via a removable storage medium
US8898452B2 (en) * 2005-09-08 2014-11-25 Netapp, Inc. Protocol translation
JP4886428B2 (en) * 2005-09-15 2012-02-29 株式会社東芝 Information providing system, content information copying apparatus, user terminal apparatus, and user management apparatus
US7958370B2 (en) * 2005-09-29 2011-06-07 Hitachi Global Storage Technologies, Netherlands, B.V. System and device for managing control data
US8433919B2 (en) * 2005-11-30 2013-04-30 Proxense, Llc Two-level authentication for secure transactions
US8078788B2 (en) 2005-12-08 2011-12-13 Sandisk Technologies Inc. Media card command pass through methods
US10380568B1 (en) * 2005-12-20 2019-08-13 Emc Corporation Accessing rights-managed content from constrained connectivity devices
US8219129B2 (en) 2006-01-06 2012-07-10 Proxense, Llc Dynamic real-time tiered client access
US11206664B2 (en) 2006-01-06 2021-12-21 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US8139768B2 (en) * 2006-01-19 2012-03-20 Microsoft Corporation Encrypting content in a tuner device and analyzing content protection policy
US9026804B2 (en) * 2006-02-24 2015-05-05 Qualcomm Incorporated Methods and apparatus for protected distribution of applications and media content
EP1999751A2 (en) * 2006-03-21 2008-12-10 Koninklijke Philips Electronics N.V. Method and apparatus for authenticating static data carriers
US20070265977A1 (en) * 2006-05-12 2007-11-15 Chris Read Method and system for improved digital rights management
US20070265973A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to protect content in home networks
US8775319B2 (en) 2006-05-15 2014-07-08 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
US8095466B2 (en) 2006-05-15 2012-01-10 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems
US8996421B2 (en) 2006-05-15 2015-03-31 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems
US7992175B2 (en) 2006-05-15 2011-08-02 The Directv Group, Inc. Methods and apparatus to provide content on demand in content broadcast systems
US8001565B2 (en) 2006-05-15 2011-08-16 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems
US20070265966A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Content delivery systems and methods to operate the same
US7970138B2 (en) 2006-05-26 2011-06-28 Syphermedia International Method and apparatus for supporting broadcast efficiency and security enhancements
US8171307B1 (en) 2006-05-26 2012-05-01 Netapp, Inc. Background encryption of disks in a large cluster
US10229276B2 (en) * 2006-06-12 2019-03-12 Adobe Inc. Method and apparatus for document author control of digital rights management
US8127149B1 (en) * 2006-06-29 2012-02-28 Symantec Corporation Method and apparatus for content based encryption
US8826023B1 (en) * 2006-06-30 2014-09-02 Symantec Operating Corporation System and method for securing access to hash-based storage systems
US20080008321A1 (en) * 2006-07-10 2008-01-10 Syphermedia International, Inc. Conditional access enhancements using an always-on satellite backchannel link
US9225761B2 (en) 2006-08-04 2015-12-29 The Directv Group, Inc. Distributed media-aggregation systems and methods to operate the same
US9178693B2 (en) 2006-08-04 2015-11-03 The Directv Group, Inc. Distributed media-protection systems and methods to operate the same
US8181011B1 (en) 2006-08-23 2012-05-15 Netapp, Inc. iSCSI name forwarding technique
US8397083B1 (en) 2006-08-23 2013-03-12 Netapp, Inc. System and method for efficiently deleting a file from secure storage served by a storage system
US7941640B1 (en) 2006-08-25 2011-05-10 Marvell International Ltd. Secure processors having encoded instructions
US20080065552A1 (en) * 2006-09-13 2008-03-13 Gidon Elazar Marketplace for Transferring Licensed Digital Content
US8839005B2 (en) * 2006-09-13 2014-09-16 Sandisk Technologies Inc. Apparatus for transferring licensed digital content between users
US7971234B1 (en) 2006-09-15 2011-06-28 Netapp, Inc. Method and apparatus for offline cryptographic key establishment
US7995759B1 (en) 2006-09-28 2011-08-09 Netapp, Inc. System and method for parallel compression of a single data stream
US20080080711A1 (en) * 2006-09-28 2008-04-03 Syphermedia International, Inc. Dual conditional access module architecture and method and apparatus for controlling same
US8042155B1 (en) 2006-09-29 2011-10-18 Netapp, Inc. System and method for generating a single use password based on a challenge/response protocol
US8190905B1 (en) 2006-09-29 2012-05-29 Netapp, Inc. Authorizing administrative operations using a split knowledge protocol
US8245050B1 (en) 2006-09-29 2012-08-14 Netapp, Inc. System and method for initial key establishment using a split knowledge protocol
US8761393B2 (en) * 2006-10-13 2014-06-24 Syphermedia International, Inc. Method and apparatus for providing secure internet protocol media services
US9277259B2 (en) 2006-10-13 2016-03-01 Syphermedia International, Inc. Method and apparatus for providing secure internet protocol media services
US8091137B2 (en) * 2006-10-31 2012-01-03 Hewlett-Packard Development Company, L.P. Transferring a data object between devices
US20080193514A1 (en) * 2006-11-02 2008-08-14 Transcu Ltd. Compostions and methods for iontophoresis delivery of active ingredients through hair follicles
US7883003B2 (en) * 2006-11-13 2011-02-08 Proxense, Llc Tracking system using personal digital key groups
US9269221B2 (en) * 2006-11-13 2016-02-23 John J. Gobbi Configuration of interfaces for a location detection system and application
US7853019B1 (en) 2006-11-30 2010-12-14 Netapp, Inc. Tape failover across a cluster
US8307217B2 (en) * 2007-02-02 2012-11-06 Lee Lane W Trusted storage
US8296240B2 (en) * 2007-03-22 2012-10-23 Sony Corporation Digital rights management dongle
US7945052B2 (en) 2007-03-29 2011-05-17 Gary Stephen Shuster Method of distributing a decryption key in fixed-content data
US8607046B1 (en) 2007-04-23 2013-12-10 Netapp, Inc. System and method for signing a message to provide one-time approval to a plurality of parties
US8611542B1 (en) 2007-04-26 2013-12-17 Netapp, Inc. Peer to peer key synchronization
US8824686B1 (en) 2007-04-27 2014-09-02 Netapp, Inc. Cluster key synchronization
US9672333B2 (en) 2007-05-25 2017-06-06 Adobe Systems Incorporated Trusted storage
US8996400B2 (en) * 2007-06-04 2015-03-31 Sony Corporation System and method for transfer of digital media
US8037524B1 (en) 2007-06-19 2011-10-11 Netapp, Inc. System and method for differentiated cross-licensing for services across heterogeneous systems using transient keys
US8006314B2 (en) 2007-07-27 2011-08-23 Audible Magic Corporation System for identifying content of digital data
JP5129053B2 (en) * 2007-07-27 2013-01-23 パナソニック株式会社 Content reproduction apparatus, content reproduction method, content reproduction program, and integrated circuit
US8196182B2 (en) 2007-08-24 2012-06-05 Netapp, Inc. Distributed management of crypto module white lists
US9774445B1 (en) 2007-09-04 2017-09-26 Netapp, Inc. Host based rekeying
US8837722B2 (en) * 2007-10-16 2014-09-16 Microsoft Corporation Secure content distribution with distributed hardware
US7983423B1 (en) 2007-10-29 2011-07-19 Netapp, Inc. Re-keying based on pre-generated keys
US8627079B2 (en) 2007-11-01 2014-01-07 Infineon Technologies Ag Method and system for controlling a device
US8908870B2 (en) * 2007-11-01 2014-12-09 Infineon Technologies Ag Method and system for transferring information to a device
WO2009062194A1 (en) 2007-11-09 2009-05-14 Proxense, Llc Proximity-sensor supporting multiple application services
US8953795B2 (en) * 2007-11-30 2015-02-10 Sony Corporation Forensic decryption tools
US8171528B1 (en) 2007-12-06 2012-05-01 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
US9032154B2 (en) 2007-12-13 2015-05-12 Sandisk Technologies Inc. Integration of secure data transfer applications for generic IO devices
WO2009079666A1 (en) 2007-12-19 2009-06-25 Proxense, Llc Security system and method for controlling access to computing resources
WO2009102979A2 (en) 2008-02-14 2009-08-20 Proxense, Llc Proximity-based healthcare management system with automatic access to private information
JP5393038B2 (en) * 2008-03-04 2014-01-22 キヤノン株式会社 Information processing apparatus, information processing method and system
US8695087B2 (en) * 2008-04-04 2014-04-08 Sandisk Il Ltd. Access control for a memory device
US11120449B2 (en) 2008-04-08 2021-09-14 Proxense, Llc Automated service-based order processing
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
CN102197623B (en) 2008-09-03 2014-01-29 4473574加拿大公司 Apparatus, method, and system for digital content and access protection
US8700072B2 (en) 2008-12-23 2014-04-15 At&T Mobility Ii Llc Scalable message fidelity
US8199651B1 (en) 2009-03-16 2012-06-12 Audible Magic Corporation Method and system for modifying communication flows at a port level
US8635442B2 (en) 2009-04-28 2014-01-21 Adobe Systems Incorporated System and method for long-term digital signature verification utilizing light weight digital signatures
US20100293095A1 (en) * 2009-05-18 2010-11-18 Christopher Alan Adkins Method for Secure Identification of a Device
US9083685B2 (en) 2009-06-04 2015-07-14 Sandisk Technologies Inc. Method and system for content replication control
US8509449B2 (en) 2009-07-24 2013-08-13 Microsoft Corporation Key protector for a storage volume using multiple keys
CA2767368C (en) 2009-08-14 2013-10-08 Azuki Systems, Inc. Method and system for unified mobile content protection
DE102009052454A1 (en) * 2009-11-09 2011-05-12 Siemens Aktiengesellschaft Method and system for confidential provision of software components
US20110131421A1 (en) * 2009-12-02 2011-06-02 Fabrice Jogand-Coulomb Method for installing an application on a sim card
TWI411281B (en) * 2010-01-29 2013-10-01 Univ Nat Taiwan Science Tech System and method for protecting data with a capacity for authentication
US9262643B2 (en) * 2010-02-22 2016-02-16 Sookasa Inc. Encrypting files within a cloud computing environment
US8977661B2 (en) 2010-02-22 2015-03-10 Sookasa Inc. System, method and computer readable medium for file management
US9418205B2 (en) 2010-03-15 2016-08-16 Proxense, Llc Proximity-based system for automatic application or data access and item tracking
US8462955B2 (en) 2010-06-03 2013-06-11 Microsoft Corporation Key protectors based on online keys
US8918854B1 (en) 2010-07-15 2014-12-23 Proxense, Llc Proximity-based system for automatic application initialization
US9607131B2 (en) 2010-09-16 2017-03-28 Verance Corporation Secure and efficient content screening in a networked environment
US9483416B1 (en) * 2010-10-21 2016-11-01 Xilinx, Inc. Secure processor operation using integrated circuit configuration circuitry
US20120124386A1 (en) * 2010-11-16 2012-05-17 Lin Jason T Method and System for Refreshing Content in a Storage Device
US8857716B1 (en) 2011-02-21 2014-10-14 Proxense, Llc Implementation of a proximity-based system for object tracking and automatic application initialization
KR101824484B1 (en) * 2011-06-30 2018-02-01 인텔 코포레이션 System and method for controlling access to protected content
US8874935B2 (en) 2011-08-30 2014-10-28 Microsoft Corporation Sector map-based rapid data encryption policy compliance
CN102364491A (en) * 2011-11-01 2012-02-29 宇龙计算机通信科技(深圳)有限公司 Method for managing data authority, and terminal
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
JP2015511050A (en) 2012-03-20 2015-04-13 クリメニ テクノロジーズ, インコーポレイテッド Method and system for process working set isolation
US9197937B1 (en) 2012-04-26 2015-11-24 Music Choice Automatic on-demand navigation based on meta-data broadcast with media content
US20140059341A1 (en) * 2012-08-21 2014-02-27 International Business Machines Corporation Creating and accessing encrypted web based content in hybrid applications
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US9081778B2 (en) 2012-09-25 2015-07-14 Audible Magic Corporation Using digital fingerprints to associate data with a work
US9135446B2 (en) * 2012-09-28 2015-09-15 Intel Corporation Systems and methods to provide secure storage
US9373001B2 (en) 2012-12-26 2016-06-21 Barracuda Networks, Inc. Distributed encryption and access control scheme in a cloud environment
US20140258373A1 (en) * 2013-03-11 2014-09-11 Say Media, Inc. Systems and Methods for Managing and Publishing Managed Content
US9262793B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9405898B2 (en) 2013-05-10 2016-08-02 Proxense, Llc Secure element as a digital pocket
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
EP3117626A4 (en) 2014-03-13 2017-10-25 Verance Corporation Interactive content acquisition using embedded codes
US10615967B2 (en) 2014-03-20 2020-04-07 Microsoft Technology Licensing, Llc Rapid data protection for storage devices
US9825945B2 (en) 2014-09-09 2017-11-21 Microsoft Technology Licensing, Llc Preserving data protection with policy
US9853812B2 (en) * 2014-09-17 2017-12-26 Microsoft Technology Licensing, Llc Secure key management for roaming protected content
US10219027B1 (en) 2014-10-24 2019-02-26 Music Choice System for providing music content to a user
US9900295B2 (en) 2014-11-05 2018-02-20 Microsoft Technology Licensing, Llc Roaming content wipe actions across devices
US10270591B2 (en) * 2015-06-30 2019-04-23 Activevideo Networks, Inc. Remotely managed trusted execution environment for digital-rights management in a distributed network with thin clients
US9853820B2 (en) 2015-06-30 2017-12-26 Microsoft Technology Licensing, Llc Intelligent deletion of revoked data
US9900325B2 (en) 2015-10-09 2018-02-20 Microsoft Technology Licensing, Llc Passive encryption of organization data
US11681781B2 (en) * 2018-02-21 2023-06-20 Comcast Cable Communications, Llc Systems and methods for content security
WO2020009718A1 (en) * 2018-07-03 2020-01-09 Esmart Tech, Inc. Cryptocurrency wallet with secure backup and restore
US20230300127A1 (en) * 2020-12-12 2023-09-21 Devin Randolph Security method and system for receiving and viewing media

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4433207A (en) * 1981-09-10 1984-02-21 Best Robert M Cryptographic decoder for computer programs
US4644493A (en) * 1984-09-14 1987-02-17 International Business Machines Corporation Implementing a shared higher level of privilege on personal computers for copy protection of software
GB2182176B (en) * 1985-09-25 1989-09-20 Ncr Co Data security device for protecting stored data
JP3080382B2 (en) * 1990-02-21 2000-08-28 株式会社日立製作所 Cryptographic communication system
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5625690A (en) * 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5740246A (en) * 1994-12-13 1998-04-14 Mitsubishi Corporation Crypt key system
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US5701343A (en) * 1994-12-01 1997-12-23 Nippon Telegraph & Telephone Corporation Method and system for digital information protection
US5590197A (en) * 1995-04-04 1996-12-31 V-One Corporation Electronic payment system and method
AU702649B2 (en) * 1995-05-12 1999-02-25 Rovi Solutions Corporation Video media security and tracking system
JP3507594B2 (en) * 1995-07-31 2004-03-15 株式会社東芝 Computer
JP3710172B2 (en) * 1995-09-01 2005-10-26 富士通株式会社 User terminal and center for software price refund
US5857021A (en) * 1995-11-07 1999-01-05 Fujitsu Ltd. Security system for protecting information stored in portable storage media
US5784460A (en) * 1996-10-10 1998-07-21 Protocall Technolgies, Inc. Secured electronic information delivery system having a three-tier structure
US5915018A (en) * 1996-11-05 1999-06-22 Intel Corporation Key management system for DVD copyright management
US5991399A (en) * 1997-12-18 1999-11-23 Intel Corporation Method for securely distributing a conditional use private key to a trusted entity on a remote system

Cited By (85)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7325247B2 (en) * 1998-09-18 2008-01-29 Fujitsu Limited Information management method using a recording medium with a secure area and a user-use area
US20010008016A1 (en) * 1998-09-18 2001-07-12 Seigo Kotani Information management method and information management apparatus
US7266691B1 (en) * 1999-10-25 2007-09-04 Sony Corporation Contents providing system
US7640436B2 (en) 2000-04-12 2009-12-29 Matsushita Electric Industrial Co., Ltd. Encryption device and method
US20010034715A1 (en) * 2000-04-12 2001-10-25 Osamu Shibata Decryption device
US20080285750A1 (en) * 2000-04-12 2008-11-20 Matsushita Electric Industrial Co., Ltd. Decryption device
US7272856B2 (en) * 2000-04-12 2007-09-18 Matsushita Electric Industrial Co., Ltd. Decryption device
US20020026580A1 (en) * 2000-07-19 2002-02-28 Fubito Igari System for access control to hidden storage area in a disk drive
US7350038B2 (en) 2000-07-27 2008-03-25 Tdk Corporation Disk system and medium with contents play-back restriction mechanism
US20020013883A1 (en) * 2000-07-27 2002-01-31 Nec Corporation Disk system and medium with contents play-back restriction mechanism
US20040215874A1 (en) * 2000-07-27 2004-10-28 Tdk Corporation Disk system and medium with contents play-back restriction mechanism
US7010809B2 (en) * 2001-03-13 2006-03-07 Sanyo Electric Co., Ltd. Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length
US20020131594A1 (en) * 2001-03-13 2002-09-19 Sanyo Electric Co., Ltd. Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length
US20040151318A1 (en) * 2001-06-01 2004-08-05 Duncanson Paul T Electronic information and cryptographic key management system
US8929552B2 (en) * 2001-06-01 2015-01-06 No Magic, Inc. Electronic information and cryptographic key management system
US20040013267A1 (en) * 2001-06-04 2004-01-22 Teruhisa Yokosawa Copyright protection system
US20030018907A1 (en) * 2001-07-17 2003-01-23 Imation Corp. Content protection for digital media
US20030018791A1 (en) * 2001-07-18 2003-01-23 Chia-Chi Feng System and method for electronic file transmission
US7594123B2 (en) * 2001-07-26 2009-09-22 Sony Corporation Data recording apparatus and method and data reproducing apparatus and method
US20040039907A1 (en) * 2001-07-26 2004-02-26 Yoichiro Sako Data recording apparatus and method and data reproducing apparatus and method
US20030033254A1 (en) * 2001-08-10 2003-02-13 Takahiro Tanaka Network system of distributing protected contents through secured carrier server
US7406605B2 (en) * 2001-10-24 2008-07-29 Fuji Electric Device Technology Co., Ltd. Information recording medium, manufacturing method of its recording medium, information process unit and copyright management system
US20030099363A1 (en) * 2001-10-24 2003-05-29 Teruhisa Yokosawa Information recording medium, manufacturing method of its recording medium, information process unit and copyright management system
US20030188150A1 (en) * 2002-03-28 2003-10-02 International Business Machines Corporation System and method for media authentication
US20080104419A1 (en) * 2002-04-01 2008-05-01 Sony Corporation Reproducing method, reproducing apparatus, recording method, and recording apparatus
US7486791B2 (en) * 2002-04-01 2009-02-03 Sony Corporation Reproducing method, reproducing apparatus, recording method, and recording apparatus
US20030185394A1 (en) * 2002-04-01 2003-10-02 Sony Corporation Reproducing method, reproducing apparatus, recording method, and recording apparatus
US7873162B2 (en) 2002-04-01 2011-01-18 Sony Corporation Reproducing method, reproducing apparatus, recording method, and recording apparatus
US20040098601A1 (en) * 2002-11-14 2004-05-20 Epstein Michael A. Secure local copy protection
US9813756B2 (en) 2002-12-17 2017-11-07 Sony Corporation Media network environment
US8589546B2 (en) 2002-12-17 2013-11-19 Sony Corporation Network management in a media network environment
US20070143782A1 (en) * 2002-12-17 2007-06-21 Brian Lakamp System and method for home network content protection and copy management
US20040117643A1 (en) * 2002-12-17 2004-06-17 Sony Corporation System and method for home network content protection and copy management
US7934263B2 (en) 2002-12-17 2011-04-26 Sony Pictures Entertainment Inc. License management in a media network environment
US8230084B2 (en) 2002-12-17 2012-07-24 Sony Corporation Network management in a media network environment
US7203965B2 (en) 2002-12-17 2007-04-10 Sony Corporation System and method for home network content protection and copy management
US8011015B2 (en) 2002-12-17 2011-08-30 Sony Corporation Content access in a media network environment
US20040139022A1 (en) * 2002-12-17 2004-07-15 Singer Mitch Fredrick Content states in a media network environment
US20040117483A1 (en) * 2002-12-17 2004-06-17 Singer Mitch Fredrick License management in a media network environment
US20040117440A1 (en) * 2002-12-17 2004-06-17 Singer Mitch Fredrick Media network environment
US20040117619A1 (en) * 2002-12-17 2004-06-17 Singer Mitch Fredrick Content access in a media network environment
US7784100B2 (en) 2002-12-17 2010-08-24 Sony Corporation System and method for home network content protection and copy management
US20100005172A1 (en) * 2002-12-17 2010-01-07 Sony Corporation Network management in a media network environment
US20080205652A1 (en) * 2003-01-15 2008-08-28 Toshihisa Nakano Content protection system, key data generation apparatus, and terminal apparatus
US8144869B2 (en) * 2003-01-15 2012-03-27 Panasonic Corporation Content protection system, key data generation apparatus, and terminal apparatus
US20050192902A1 (en) * 2003-12-05 2005-09-01 Motion Picture Association Of America Digital rights management using multiple independent parameters
US7933409B2 (en) 2004-03-09 2011-04-26 Panasonic Corporation Content playback device
US8116452B2 (en) 2004-03-09 2012-02-14 Panasonic Corporation Content playback device
US20070198424A1 (en) * 2004-03-09 2007-08-23 Masaya Yamamoto Content playback device
US20110110517A1 (en) * 2004-03-09 2011-05-12 Masaya Yamamoto Content playback device
US20050203853A1 (en) * 2004-03-11 2005-09-15 Masaya Yamamoto Encrypted-content recording medium, playback apparatus, and playback method
US7715558B2 (en) * 2004-03-11 2010-05-11 Panasonic Corporation Encrypted-content recording medium, playback apparatus, and playback method
US7593532B2 (en) 2004-04-22 2009-09-22 Netapp, Inc. Management of the retention and/or discarding of stored data
US20050238175A1 (en) * 2004-04-22 2005-10-27 Serge Plotkin Management of the retention and/or discarding of stored data
US7664966B2 (en) * 2004-05-17 2010-02-16 Microsoft Corporation Secure storage on recordable medium in a content protection system
US20050257074A1 (en) * 2004-05-17 2005-11-17 Alkove James M Secure storage on recordable medium in a content protection system
US20140189358A1 (en) * 2005-07-14 2014-07-03 Conax As Multimedia data protection
US20090007171A1 (en) * 2005-11-30 2009-01-01 Qwest Communications International Inc. Dynamic interactive advertisement insertion into content stream delivered through ip network
US8752090B2 (en) 2005-11-30 2014-06-10 Qwest Communications International Inc. Content syndication to set top box through IP network
US20090063645A1 (en) * 2005-11-30 2009-03-05 Qwest Communications Internatinal Inc. System and method for supporting messaging using a set top box
US20090007176A1 (en) * 2005-11-30 2009-01-01 Qwest Communications International Inc. Content syndication to set top box through ip network
US8621531B2 (en) 2005-11-30 2013-12-31 Qwest Communications International Inc. Real-time on demand server
US8583758B2 (en) * 2005-11-30 2013-11-12 Qwest Communications International Inc. Network based format conversion
US20070121651A1 (en) * 2005-11-30 2007-05-31 Qwest Communications International Inc. Network-based format conversion
US20070124416A1 (en) * 2005-11-30 2007-05-31 Qwest Communications International Inc. Real-time on demand server
US20070220257A1 (en) * 2006-03-06 2007-09-20 Sandisk Il Ltd. Controlled-Access Recording Generator
US20070266399A1 (en) * 2006-04-28 2007-11-15 Ariff Sidi System and/or method for distributing media content
US8438646B2 (en) * 2006-04-28 2013-05-07 Disney Enterprises, Inc. System and/or method for distributing media content
US20110093883A1 (en) * 2007-04-17 2011-04-21 Huawei Technologies Co., Ltd. System, protection method and server for implementing the virtual channel service
US20100174917A1 (en) * 2007-07-03 2010-07-08 Pioneer Corporation Information recording medium, reproducing apparatus and cumputer program
US20090164804A1 (en) * 2007-12-25 2009-06-25 Sandisk Il Ltd. Secured storage device
US9392330B2 (en) 2008-04-02 2016-07-12 Qwest Communications International Inc. IPTV follow me content system and method
US8819720B2 (en) 2008-04-02 2014-08-26 Qwest Communications International Inc. IPTV follow me content system and method
US11722735B2 (en) 2008-04-02 2023-08-08 Tivo Corporation IPTV follow me content system and method
US8238559B2 (en) 2008-04-02 2012-08-07 Qwest Communications International Inc. IPTV follow me content system and method
US20090252329A1 (en) * 2008-04-02 2009-10-08 Qwest Communications International Inc. Iptv follow me content system and method
US10206002B2 (en) 2008-04-02 2019-02-12 Qwest Communications International IPTV follow me content system and method
US20100125741A1 (en) * 2008-11-20 2010-05-20 Seagate Technology Llc Optical disc emulator
US10102384B2 (en) * 2013-05-30 2018-10-16 Jscrambler S.A. Digital content execution control mechanism
US10489561B2 (en) * 2013-05-30 2019-11-26 Jscrambler S.A. Web application protection
WO2015084305A1 (en) * 2013-12-02 2015-06-11 Intel Corporation Methods, systems, and apparatus to protect content based on persona
US10025911B2 (en) * 2014-08-28 2018-07-17 Vodafone Gmbh Replay attack prevention for content streaming system
US10970232B2 (en) * 2017-01-03 2021-04-06 Western Digital Technologies, Inc. Virtual root of trust for data storage device
CN113032815A (en) * 2021-05-18 2021-06-25 杭州海康威视数字技术股份有限公司 Key combination calculation management method, device and equipment
CN115297118A (en) * 2022-10-09 2022-11-04 北京航空航天大学杭州创新研究院 Data sharing method and data sharing system based on block chain

Also Published As

Publication number Publication date
DE69902078T2 (en) 2002-11-07
JP2000138664A (en) 2000-05-16
DE69902078D1 (en) 2002-08-14
EP0978839B1 (en) 2002-07-10
US6438235B2 (en) 2002-08-20
EP0978839A1 (en) 2000-02-09
US6550011B1 (en) 2003-04-15

Similar Documents

Publication Publication Date Title
US6438235B2 (en) Media content protection utilizing public key cryptography
US6950941B1 (en) Copy protection system for portable storage media
US6789177B2 (en) Protection of data during transfer
CN1329909C (en) Secure single drive copy method and apparatus
EP1374237B1 (en) Method and system for providing bus encryption based on cryptographic key exchange
JP5200204B2 (en) A federated digital rights management mechanism including a trusted system
US20080235810A1 (en) Method of Authorizing Access to Content
US6691229B1 (en) Method and apparatus for rendering unauthorized copies of digital content traceable to authorized copies
US20110238983A1 (en) Network integrity maintenance
US8694799B2 (en) System and method for protection of content stored in a storage device
US20020184259A1 (en) Data reproducing/recording apparatus/ method and list updating method
WO2004109972A1 (en) User terminal for receiving license
WO2004038568A2 (en) Method and device for authorizing content operations
US20020120847A1 (en) Authentication method and data transmission system
EP1412943B1 (en) Apparatus and method for reproducing user data
CN100364002C (en) Apparatus and method for reading or writing user data
KR101299807B1 (en) Secure pre-recorded digital medium
US20060277415A1 (en) Content protection method and system
US20070143594A1 (en) Method for distributing digital data and burning them on a DVD, client device and remote server associated
KR100960290B1 (en) System for secure storage
KR100695665B1 (en) Apparatus and method for accessing material using an entity locked secure registry
US20070118765A1 (en) Method and system of decrypting disc
KR20030085513A (en) Verifying the integrity of a media key block by storing validation data in the cutting area of media

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD COMPANY, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SIMS, J. ROBERT III;REEL/FRAME:009762/0854

Effective date: 19980904

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD COMPANY;REEL/FRAME:026945/0699

Effective date: 20030131

FPAY Fee payment

Year of fee payment: 12