Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS20060294010 A1
Publication typeApplication
Application numberUS 11/511,410
Publication dateDec 28, 2006
Filing dateAug 29, 2006
Priority dateMar 13, 2001
Also published asCN1280817C, CN1459107A, CN1783305A, CN1783306A, CN100594547C, EP1368811A1, EP1368811A4, EP1368811B1, US7225162, US7650311, US7680740, US7788178, US20030105717, US20060294009, US20080222180, US20080240442, WO2002073616A1
Publication number11511410, 511410, US 2006/0294010 A1, US 2006/294010 A1, US 20060294010 A1, US 20060294010A1, US 2006294010 A1, US 2006294010A1, US-A1-20060294010, US-A1-2006294010, US2006/0294010A1, US2006/294010A1, US20060294010 A1, US20060294010A1, US2006294010 A1, US2006294010A1
InventorsHyung Kim, Byung Kim
Original AssigneeKim Hyung S, Kim Byung J
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Read-only recording medium containing sample data and reproducing method thereof
US 20060294010 A1
Abstract
The present invention provides according to an embodiment a method of reproducing content, comprising the steps of: (a) checking whether information required for decrypting an encrypted content is present; (b) requesting the information to an external source based on URL (Uniform Resource Locator) information if the information is not present; and (c) reproducing the encrypted content using the information.
Images(6)
Previous page
Next page
Claims(33)
1. A method of reproducing content, comprising:
(a) checking whether information required for decrypting an encrypted content is present;
(b) requesting the information to an external source based on URL (Uniform Resource Locator) information if the information is not present; and
(c) reproducing the encrypted content using the information.
2. The method of claim 1, wherein said step (b) requests the information to a web site that provides the information.
3. The method of claim 2, wherein said step (b) requests the information to the web site along with an identification information, wherein the identification information is unique to the content.
4. The method of claim 1, wherein said step (b) includes a step of downloading the requested information from the external source.
5. The method of claim 4, wherein the downloading step downloads the requested information in connection with an identification information.
6. The method of claim 4, wherein the downloading step downloads the requested information after payment for the information.
7. The method of claim 1, wherein said step (b) further requests a management information for managing the encrypted content to the external source, wherein the step (c) includes a step of controlling reproduction of the content based on the management information.
8. The method of claim 7, wherein the management information includes at least one of a start position, an end position and size information of the encrypted content.
9. The method of claim 1, wherein the encrypted content comprises a plurality of digital audios or videos, wherein the step (b) requests the information to the external source in order to decrypt at least one digital audio or video.
10. The method of claim 1, wherein the encrypted content comprises a plurality of digital audios or videos, wherein the step (b) requests the information to the external source in order to decrypt the plurality of audios or videos.
11. The method of claim 1, wherein the step (b) further comprises:
(b1) indicating a location of external source for obtaining the information if the information is not present; and
(b2) interfacing with the external source to obtain the information, based on the indicated location.
12. A method of reproducing content, comprising:
(a) checking whether control information for normally reproducing an encrypted content is present, wherein the control information including key information for decrypting the encrypted content and management information for managing the encrypted content;
(b) sending a signal to request the control information to an external source based on URL (Uniform Resource Locator) information if the control information is not present; and
(c) reproducing the encrypted content using the control information.
13. The method of claim 12, wherein the step (b) includes a step of receiving the requested information through interface with the external source.
14. The method of claim 12, wherein the step (b) includes a step of purchasing the requested information with charge.
15. The method of claim 12, wherein the step (c) comprises:
(c1) decrypting the encrypted content using the key information, and
(c2) playing the decrypted content based on the management information.
16. A method of transferring information, comprising:
(a) receiving a signal to request information from a requesting part, the information required for at least decrypting an encrypted content;
(b) identifying the requesting part based on an ID information associated with the requesting part; and
(c) determining whether to send the information to a requesting part based on ID information.
17. The method of claim 16, wherein the step (c) further determines whether to send the information to the requesting part based on an action for play-authority.
18. The method of claim 17, wherein the action includes a payment for the information.
19. The method of claim 16, wherein the information includes a management information to manage a reproduction of the content.
20. The method of claim 19, wherein the management information includes at least one of a start position, an end position and size information of the encrypted content.
21. The method of claim 16, wherein the encrypted content comprises a plurality of digital audios or videos, the information required for decrypting the plurality of audios or videos.
22. The method of claim 16, wherein the encrypted content comprises a plurality of digital audios or videos, the information required for decrypting at least one digital audio or video.
23. An apparatus for reproducing content, comprising:
a controller checking whether information required for decrypting an encrypted content is present, and requesting the information to an external source based on URL (Uniform Resource Locator) information if the information is not present; and
a reproducing unit reproducing the encrypted content based on a control of the controller.
24. The apparatus of claim 23, wherein the controller requests the information to a web site that provides the information.
25. The apparatus of claim 24, wherein the controller sends an identification information to external source with the signal to request the information, wherein the identification information is unique to the content.
26. The apparatus of claim 23, further comprising:
a memory for storing the requested information to be received from the external source.
27. The apparatus of claim 26, wherein the controller controls the memory to store the requested information in connection with an identification information.
28. The apparatus of claim 26, wherein the controller controls the memory to store the requested information after payment for the information.
29. The apparatus of claim 23, wherein the controller further requests a management information for managing the encrypted content to the external source, and controls the reproduction unit to reproduce the content based on the management information.
30. The apparatus of claim 29, wherein the management information includes at least one of a start position, an end position and size information of the encrypted content.
31. The apparatus of claim 23, wherein the encrypted content comprises a plurality of digital audios or videos, wherein the controller requests the information the external source in order to decrypt at least one digital audio or video.
32. The apparatus of claim 23, wherein the encrypted content comprises a plurality of digital audios or videos, wherein the controller requests the information to the external source in order to decrypt the plurality of audios or videos.
33. The apparatus of claim 23, further comprising:
a display unit indicating a location of external source for obtaining the information, wherein the controller controls an interface with the external source to obtain the information, based on the indicated location.
Description
  • [0001]
    This application is a Divisional of co-pending U.S. patent application Ser. No. 10/258,416 filed on Oct. 23, 2002 and for which priority is claimed under 35 U.S.C. §120, and also claims priority benefit of Korean Application No. 2001/12998, filed on Mar. 13, 2001 in Korea. U.S. patent application Ser. No. 10/258,416 is the national phase of PCT International Application No. PCT/KR02/00424 filed on Mar. 12, 2002 under 35 U.S.C. §371. The entire contents of each of the above-identified applications are hereby incorporated by reference.
  • BACKGROUND OF THE INVENTION
  • [0002]
    1. Field of the Invention
  • [0003]
    The present invention relates to a read-only recording medium containing encrypted source data and sample data thereof. The present invention further relates to a method of reproducing said recording medium.
  • [0004]
    2. Discussion of the Background Art
  • [0005]
    In these days, it is expected that on-line multi-media contents selling methods will be widely used. In such on-line selling methods, moving-picture data or audio data are delivered to a buyer's recording medium such as a writable CD or DVD through a data network and are then played back from that recording medium.
  • [0006]
    The audio data to be provided via a network are called EMD (Electronic Music Distribution) audio data. EMD audio data are provided by a lot content providers. However, the content providers encode END audio data to mutually different formats and a different unique copy-protection keys, namely, encryption keys to EMD audio data as well to prevent unauthorized copy and to protect their copyright.
  • [0007]
    A decryption key adequate for downloaded EMD audio data must be obtained from a contents provider having provided the END audio data before playing the downloaded EMD audio data. The decryption key is used for decrypting EMD audio data encrypted with a corresponding copy-protection key.
  • [0008]
    Because it is nearly impossible to obtain an adequate decryption key without lawful approval, EMD audio data can be protected against unauthorized copy, thus its copyright can be protected well.
  • [0009]
    To enjoy such a data protecting advantage, high-quality moving-picture data and/or audio data will be encrypted in general to sell them to buyers through a network. In addition, because of such a data protecting advantage, on-line content selling methods are expected to be spread more and more.
  • [0010]
    However, as aforementioned, encrypted EMD audio data must require a copy-protection key, namely, a decryption key to be played back. Therefore, a user can not play with a disk device any piece of EMD audio data downloaded onto a writable recording medium before he or she purchases a decryption key. In other words, a user can not confirm at all whether the downloaded EMD audio data are what he or she wants or whether its audio quality is better or not than he or she expected. Consequently, a user hesitates to buy a play-authorizing key, namely, a decryption key for the downloaded EMD audio data.
  • [0011]
    In the meantime, when a user wants to buy his or her favorite digital song or music, he or she makes web-surfing on Internet to find a web site and then searches the web site for his or her favorite song or music. If found, he or she requests it to be downloaded to a recording medium. Theses procedures take much time and effort, which would impede spread of the on-line selling methods of digital contents.
  • SUMMARY OF THE INVENTION
  • [0012]
    It is an object of the present invention to provide a read-only recording medium on which encrypted moving picture data and/or audio data and non-encrypted their sample data have been recorded.
  • [0013]
    It is another object of the present invention to provide a method of reproducing only-non-encrypted sample data of a read-only recording medium without a decryption key to induce a user to make on-line purchase of the decryption key.
  • [0014]
    A read-only recording medium storing data in accordance with an aspect of the present invention includes: a first area storing data; and a second area storing management information for the data stored in said first area, wherein said first area includes encrypted source data and non-encrypted sample data that have same contents with a part of the source data, and wherein said second area includes location information of the non-encrypted sample data.
  • [0015]
    A method of reproducing a recording medium containing encrypted source data and non-encrypted sample data that have same contents with a part of the encrypted source data in accordance with another aspect of the present invention includes the steps of: checking, when play of the encrypted source data is requested, whether or not there is decrypting information for the encrypted source data in a disk device; reading location information pointing the non-encrypted sample data, if there is not the decrypting information; and reproducing the non-encrypted sample data using the read location information, instead of the encrypted source data of which play has been requested.
  • [0016]
    Another method of reproducing a recording medium containing encrypted source data and non-encrypted sample data that have same contents with a part of the encrypted source data in accordance with another aspect the present invention includes the steps of: checking, when play of the encrypted source data is requested, whether or not there is decrypting information for the encrypted source data in a disk device; receiving the decrypting information through communication with an external device and storing in the disk device, if there is not the decrypting information; and reproducing the encrypted source data with reference to location information of the encrypted source data while decrypting them with the stored decrypting information.
  • [0017]
    The present invention discussed herein enables a user to confirm whether source data written on a read-only recording medium are what he or she wants without buying a decryption key for the source data. Consequently, purchase of a decryption key for encrypted contents is naturally induced from previewing or pre-listening sample data. In addition, on-line selling procedure is very simple and fast because it is finished only by downloading a decryption key.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0018]
    The present invention will become more fully understood from the detailed description given hereinbelow and the accompanying drawings which are given by way of illustration only, and thus are not limitative of the present invention and wherein:
  • [0019]
    The accompanying drawings, which are included to provide a further understanding of the present invention illustrate the preferred embodiments of the invention, and together with the description, serve to explain the principles of the present invention, and wherein:
  • [0020]
    FIG. 1 is a simplified block diagram of an optical disk device in which a data reproducing method of the present invention is embedded;
  • [0021]
    FIG. 2 shows schematic reaction between PGCI (Program Chain Information) and sample AOBs (Audio Objects) for source Audio tracks recorded on a read-only disk in accordance with the present invention;
  • [0022]
    FIG. 3 shows schematic relation between PGCI and source tracks containing encrypted audio data recorded on a read-only disk in accordance with the present invention;
  • [0023]
    FIG. 4 shows schematic relation between CI (Cell Information) and encrypted source and non-encrypted sample video object recorded on a read only disk in accordance with the present invention;
  • [0024]
    FIGS. 5 a and 5 b are flow charts of an embodiment of a method playing encrypted source or non-encrypted sample data selectively in accordance with the present invention; and
  • [0025]
    FIG. 6 is a screen example where a play-error window is popped up because of no decryption key.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • [0026]
    In order that the invention may be fully understood, preferred embodiments thereof will now be described with reference to the accompanying drawings.
  • [0027]
    FIG. 1 is a simplified block diagram of an optical disk device in which a data reproducing method of the present invention is embedded. The device may be a disk drive installed in a personal computer (PC) being able to connect to Internet.
  • [0028]
    The disk device FIG. 1 comprises an optical pickup 2 reading signals written on a read-only disk 1, e.g., a DVD-ROM; a reproducing processor 3 processing the read signals to restore to original data; a buffer 5 buffering temporary data, e.g., ecrypted data produced during reproducing operation; a memory 7 for storing navigation data, which are management information used for reproduction control of recorded data, and a decryption key for the recorded source data; and a system controller 4 controlling all the elements during playback, selectively playing encrypted source or non-encrypted sample data, and requesting/receiving a decryption key interfacing with a connected PC, all operatively coupled and configured.
  • [0029]
    The read-only disk 1 contains not only encrypted source data, namely, video and/or audio contents but also non-encrypted sample data that are same with a part of the source data.
  • [0030]
    The read-only disk 1 may be a DVD-ROM and has two zones, one zone for source and sample data and the other for management information thereof. If the source data are composed of a plurality of audio tracks, sample audio data have been written for each audio track. And, sample audio data associated with an audio track form a sample track.
  • [0031]
    A track is managed as an audio object (AOB) so that cell information (CI) that is, reproduction control information is created for each AOB in the management information zone. The CI includes location information. (namely, start and end address or start address and duration) of an associated AOB.
  • [0032]
    Therefore, if there are N source audio tracks in the data zone, the disk includes 2ŚN AOBs and their 2ŚN pieces of CI.
  • [0033]
    The management information zone of the read-only disk 1 also includes original and user-defined program chain information. (PGCI) that includes the created CI as its own field element. Therefore, the PGCI can index individually a plurality of AOBs pointed by respective CI fields it includes. Namely, if a piece of PGCI is chosen automatically or by a user, AOBs pointed by CI contained in the selected PGCI can be searched for and played back.
  • [0034]
    FIG. 2 shows schematic relation between PGCI and sample AOBs for source audio tracks recorded on the read-only disk. In the example of FIG. 2, source tracks ‘AOB N+1, N+2, N+3, . . . ’ containing encrypted audio data have been recorded on the read-only disk 1, and sample tracks ‘AOB 1, 2, 3, . . . ’ also have been recorded thereon. Each sample track has non-encrypted audio data that are same with a part of each source track ‘S1, S2, S3, . . . ’. In addition, plural pieces of CI ‘Cell 1, 2, 3, . . . ’ that include respective location information (start ‘DA_S_P’ and end address ‘DA_E_P’ or start address ‘DA_S_P’ and, duration ‘DA_Dur’) of the sample tracks ‘AOB 1, 2, 3, . . . ’ have been written in original PGCI. Therefore, if the original PGCI is selected, only the sample tracks ‘AOB 1, 2, 3, . . . ’ of the source tracks ‘AOB N+1, N+2, N+3’ are played back.
  • [0035]
    FIG. 3 shows schematic relation between PGCI and source tracks containing encrypted audio data recorded on the read-only disk 1. For the example of FIG. 3 plural pieces of CI ‘Cell N+1, N+2, N+3’ that include respective location information (start ‘UA_S_P’ and end address ‘UA_E_P’ or start address ‘UA_S_P’ and duration ‘UA_Dur’), of the source tracks ‘AOB N+1, N+2, N+3, . . . ’ have been written in user-defined PGCI. Therefore, if the user-defined PGCI is selected the source tracks ‘AOB N+1, N+2, N+3 . . . ’ are played back sequentially if there is a decryption key for the source tracks.
  • [0036]
    Accordingly, if there is not a decryption key the system controller 4 selects the original PGCI and then plays back non-encrypted sample data pointed by CI included in the original PGCI, and if there is it selects the user-defined PGCI and then plays back source tracks while decrypting encrypted data with an adequate decryption key stored in the memory 6.
  • [0037]
    If video contents are recorded on the data zone of the read-only disk 1 instead of audio contents, each source track is unitized to not AOB but VOB (Video Object). However, management information for VOB is created the same as for AOB. Namely, as shown in FIG. 4, a sample VOB ‘VOB 1’ has been created for a source VOB ‘VOB 2’. The sample VOB ‘VOB 1’ has non-encrypted video data that are same with a part of the source VOB ‘VOB 2’ containing encrypted video data. In addition, two pieces of CI that refer the sample and source VOB respectively have been written different or same PGCI.
  • [0038]
    An embodiment of a method reproducing the read-only disk 1 containing data configured as above is explained in detail below.
  • [0039]
    FIGS. 5 a and 5 b are flow charts of the embodiment of the present invention.
  • [0040]
    When the read-only disk 1 is placed in the disk device of FIG. 1 (S10), the system controller 4 reads the above-explained management information, namely, original and user-defined PGCI, CI, and so on written in the management information zone of the read-only disk 1 and stores them into the memory 6 (S11).
  • [0041]
    Then the system controller 4 will execute a suitable player program that has been pre-written on the read-only disk 1, if necessary (S12), and checks whether or not there is in the memory 6 a decryption key for decrypting the encrypted source data written the read-only disk 1 (S13). The following procedures as well as the decryption key checking procedure can be conducted by the executed player program instead of the system controller 4.
  • [0042]
    If there is not a decryption key, the system controller 4 composes a play-error message and sends it to a connected PC (S14). The play-error message includes explanation about decryption key purchase as well as the cause that there is no decryption key related with the source data.
  • [0043]
    FIG. 6 is a screen example where such a play-error message is outputted. The play-error message displayed in FIG. 6 includes an inquiry window that asks user whether to buy a decryption key or not. The illustrative inquiry window also includes a URL (Uniform Resource Locator) addressing a web site on Internet that provides decryption keys and a download button that enables a user to buy a decryption key related with the source data through download.
  • [0044]
    If on-line purchase of decryption key is not requested (S15), the system controller 4 automatically selects and examines the original PGCI, stored in the memory 6, including plural pieces of CI ‘Cell 1, 2, 3, . . . ’ associated with the sample data (S16). Then, the system controller 4 knows where in the read-only disk 1 each sample AOB is (S17), based on the pair fields ‘DA_S_P’ and ‘DA_E_P’ of each CI.
  • [0045]
    Afterwards, the system controller 4 searches the read-only disk 1 for sample AOBs pointed by each pair of the fields ‘DA_S_P’ and ‘DA_E_P’ through moving the optical pickup 2 inward and outward, and it reproduces only the sample AOBs sequentially without any decrypting operation (S18).
  • [0046]
    Consequently, a user can determine whether or not to buy a decryption key for the source data written on the read-only disk 1 after pre-listening or previewing respective partial audio song or movie recorded on the disk 1 without purchasing an adequate decryption key.
  • [0047]
    If there is a decryption key (S13), the system controller 4 examines the user-defined PGCI, stored in the memory 6, including plural pieces of CI ‘Cell N+1, N+2, N+3, . . . ’ associated with the source AOBs (S20). Then, the system controller 4 knows where in the read-only disk 1 each source AOB is (S21), based on the pair fields ‘UA_S_P’ and ‘UA_E_P’ of each CI in the user-defined PGCI.
  • [0048]
    Afterwards, the system controller 4 reads out a decryption key for the source AOBs ‘AOB N+1, N+2, N+3, . . . ’ from the memory 6 and searches the read-only disk 1 for each source AOB pointed by, each pair of the fields ‘UA_S_P’ and ‘UA_E_P’ through moving the optical pickup 2 inward and outward. Whenever target source AOB is found, the system controller 4 conducts reproduction operation of the AOB while decrypting encrypted source data included in the AOB with the read decryption key (S22).
  • [0049]
    If a user requests on-line purchase of a decryption key in the situation that the play-error window has been displayed (S15), the system controller 4 reads from the management zone of the read-only disk 1 or the memory 6 both a URL (Uniform Resource Locator), information of a web site that provides a desirable, decryption key for the source data and disk identification, e.g., 2-byte serial number assigned to the read-only disk 1. The read address and disk identification are transmitted to the connected PC (S30).
  • [0050]
    The above purchasing process is initiated by a user's clicking the ‘download’ button on the illustrative play-error window shown in FIG. 6.
  • [0051]
    The web site addressed by the stored URL identifies which decryption key is requested based on the received disk identification. Namely, it searches its database for a decryption key linked with the received disk identification or serial number. If found, the web site downloads the found decryption key to the PC. The PC delivers the downloaded decryption key to the system controller 4 of the disk drive connected to the PC (S31). This decryption key delivery may be conducted in accordance with a protocol pre-specified between the web site and a PC connected to the web site.
  • [0052]
    The URL and disk identification that have been recorded in the management information zone of the read-only disk 1 are retrieved into the memory 6 together with the management information such as PGCI and CI when the disk 1 is placed in the disk drive.
  • [0053]
    The system controller 4 stores the received decryption key in the memory 6 (S32) in connection with the disk identification.
  • [0054]
    Afterwards, the system controller 4 reproduces entire source AOBs pointed by every CI in the user-defined PGCI sequentially while decrypting encrypted source data with the stored decryption key in the memory 6, the same as explained above.
  • [0055]
    In addition, the user-defined, PGCI may not be written in the management information zone of the read-only disk 1. Instead, it can be provided from a web site to download a requested decryption key when a purchase of the decryption key is requested with disk identification. The provided user-defined PGCI matched with the source data of the read-only disk 1 is stored in the memory 6 and then is referred by the system controller 4 when playback of source AOBs are conducted.
  • [0056]
    The above-explained method is applicable to a variety of read-only disks such as a compact disk (CD) and video CD besides a DVD-ROM. Further, the present method can be applied to moving-picture data and still-picture data, besides audio data.
  • [0057]
    It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention cover the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US5138925 *Jun 29, 1990Aug 18, 1992Casio Computer Co., Ltd.Apparatus for playing auto-play data in synchronism with audio data stored in a compact disc
US5319705 *Oct 21, 1992Jun 7, 1994International Business Machines CorporationMethod and system for multimedia access control enablement
US5594794 *Oct 18, 1994Jan 14, 1997General Instrument Corporation Of DelawareMethod and apparatus for free previews of communication network services
US5646992 *Sep 23, 1993Jul 8, 1997Digital Delivery, Inc.Assembly, distribution, and use of digital information
US5715403 *Nov 23, 1994Feb 3, 1998Xerox CorporationSystem for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5729549 *Jun 19, 1995Mar 17, 1998Bell Atlantic Network Services, Inc.Simulcasting digital video programs for broadcast and interactive services
US5798991 *Sep 18, 1997Aug 25, 1998Sony CorporationData processing method and data processing apparatus
US5805551 *Apr 25, 1997Sep 8, 1998Matsushita Electric Industrial Co., Ltd.Method and apparatus for preventing illegal copy or illegal installation of information of optical recording medium
US5812661 *Aug 1, 1995Sep 22, 1998Fujitsu LimitedSoftware reproduction apparatus
US5825876 *Feb 12, 1996Oct 20, 1998Northern TelecomTime based availability to content of a storage medium
US5933498 *Nov 5, 1997Aug 3, 1999Mrj, Inc.System for controlling access and distribution of digital property
US5991399 *Dec 18, 1997Nov 23, 1999Intel CorporationMethod for securely distributing a conditional use private key to a trusted entity on a remote system
US6011761 *Jun 19, 1998Jan 4, 2000Sony CorporationDownloading compressed audio data from a server and detecting recording inhibiting information
US6041345 *Mar 7, 1997Mar 21, 2000Microsoft CorporationActive stream format for holding multiple media streams
US6044047 *Oct 21, 1997Mar 28, 2000Sony CorporationStoring CD Segments for quick scanning in multi-CD players
US6075862 *Jul 30, 1996Jun 13, 2000Kabushiki Kaisha ToshibaDecryption key management scheme for software distribution system
US6125229 *Jun 2, 1997Sep 26, 2000Philips Electronics North America CorporationVisual indexing system
US6140565 *Jun 7, 1999Oct 31, 2000Yamaha CorporationMethod of visualizing music system by combination of scenery picture and player icons
US6252964 *Jan 20, 2000Jun 26, 2001Scientific-Atlanta, Inc.Authorization of services in a conditional access system
US6278836 *Aug 26, 1997Aug 21, 2001Matsushita Electric Industrial Co., Ltd.Information reproducing apparatus for reproducing video signals and program information which are recorded in information recording media
US6351442 *Jun 1, 1999Feb 26, 2002Matsushita Electric Industrial Co., Ltd.Recording medium, recording apparatus and reproduction apparatus with reproduction path flag information
US6385389 *Jan 20, 1999May 7, 2002Kabushiki Kaisha ToshibaInformation recording medium, method for recording information, and method for reproduction information
US6453459 *Jan 21, 1998Sep 17, 2002Apple Computer, Inc.Menu authoring system and method for automatically performing low-level DVD configuration functions and thereby ease an author's job
US6510502 *Jul 17, 2000Jan 21, 2003Kabushiki Kaisha Sega EnterprisesInformation processing device and method for reading information recorded on an information recording medium
US6567371 *Jan 22, 1999May 20, 2003Kabushiki Kaisha ToshibaAudio data structure, recording media, and processor
US6567567 *Jan 24, 2000May 20, 2003Arch Development Corp.Sampling and reconstruction of RF signals
US6675179 *Jan 30, 2001Jan 6, 2004Sony CorporationRecording and/or reproducing apparatus, portable recording and reproducing apparatus, data transfer system, data transfer method, and data recording and reproducing method
US6868403 *Mar 9, 2000Mar 15, 2005Microsoft CorporationSecure online music distribution system
US6889327 *Aug 22, 2000May 3, 2005Victor Company Of Japan, LimitedCopyrighted digital data management method, contents provider, user terminal, and data recording medium
US6901385 *Feb 15, 2001May 31, 2005Matsushita Electric Industrial Co., Ltd.Semiconductor memory card that records contents for trial and purchase, recording apparatus, reproducing apparatus, and sales method
US6920567 *Apr 7, 2000Jul 19, 2005Viatech Technologies Inc.System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files
US6931451 *Mar 28, 2000Aug 16, 2005Gotuit Media Corp.Systems and methods for modifying broadcast programming
US6938162 *Apr 28, 2000Aug 30, 2005Matsushita Electric Industrial Co., Ltd.Optical disk, optical disk recording and reproducing apparatus, method for recording, reproducing and deleting data on optical disk, and information processing system
US6988144 *Sep 18, 2000Jan 17, 2006International Business Machines CorporationPacket scheduling system and method for multimedia data
US7058977 *Aug 14, 2000Jun 6, 2006Sony CorporationCopyright control of encrypted data using uncorrected errors in an error correcting code
US7072260 *Aug 25, 2000Jul 4, 2006Sony CorporationData recording medium, data reproducing method and reproducing device, and data processing system
US7073063 *Jun 27, 2001Jul 4, 2006Microsoft CorporationBinding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like
US7076468 *Apr 27, 2001Jul 11, 2006Hillegass James CMethod and system for licensing digital works
US7092911 *Mar 24, 2000Aug 15, 2006Sony CorporationReproducing apparatus and reproducing method
US7103574 *Apr 12, 1999Sep 5, 2006Microsoft CorporationEnforcement architecture and method for digital rights management
US7113983 *May 18, 2000Sep 26, 2006Yamaha CorporationSystem and method for downloading content files using a communication network and for automatically reproducing the content files in a predefined sequence
US7117179 *Mar 12, 2002Oct 3, 2006Lg Electronics Inc.Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium
US7124303 *Jan 2, 2002Oct 17, 2006Sony CorporationElementary stream partial encryption
US7191153 *Sep 10, 1999Mar 13, 2007Dphi Acquisitions, Inc.Content distribution method and apparatus
US7225162 *Mar 12, 2002May 29, 2007Lg Electronics Inc.Read-only recording medium containing sample data and reproducing method thereof
US7380135 *Aug 15, 2003May 27, 2008Nippon Hoso KyokaiDiligent control of preview of stored contents
US7499993 *Nov 6, 2002Mar 3, 2009Lg Electronics Inc.Media contents monitoring apparatus and method thereof
US7519274 *Dec 8, 2003Apr 14, 2009Divx, Inc.File format for multiple track digital data
US7542656 *Jun 20, 2002Jun 2, 2009Lg Electronics Inc.Method and apparatus of recording a multi-channel stream, and a recording medium containing a multi-channel stream recorded by said method
US7587368 *Jul 5, 2001Sep 8, 2009David Paul FelsherInformation record infrastructure, system and method
US20010013022 *Jul 7, 1998Aug 9, 2001Philips CorporationArrangement for independently requesting a playing authorization for a reproduced encrypted information signal
US20010026618 *Feb 23, 2001Oct 4, 2001Intertrust Technologies Corp.Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US20020010679 *Jul 5, 2001Jan 24, 2002Felsher David PaulInformation record infrastructure, system and method
US20020023010 *Mar 20, 2001Feb 21, 2002Rittmaster Ted R.System and process for distribution of information on a communication network
US20020032747 *Sep 12, 2001Mar 14, 2002Nec CorporationSystem, method, device, and program for distributing data, and data reproduction device
US20020077988 *Dec 19, 2000Jun 20, 2002Sasaki Gary D.Distributing digital content
US20020107809 *Jun 4, 2001Aug 8, 2002Biddle John DentonSystem and method for licensing management
US20020112226 *Jan 21, 1998Aug 15, 2002Rainer BrodersenMenu authoring system and methd for automatically performing low-level dvd configuration functions and thereby ease an author's job
US20020157521 *Jun 20, 2001Oct 31, 2002Elihai ShahalMethod and system for learning to play a musical instrument
US20020172366 *Oct 26, 2001Nov 21, 2002General Instrument, Inc.Initial viewing period for scalable authorization of streaming multimedia content
US20030048293 *Aug 5, 2002Mar 13, 2003Creative Edge Internet Services Pty. Ltd.Internet advertising system
US20030051151 *Aug 7, 2002Mar 13, 2003Sony CorporationInformation processing apparatus, information processing method and program
US20030105717 *Mar 12, 2002Jun 5, 2003Kim Hyung SunRead-only recording medium containing sample data and reproducing method thereof
US20040024688 *Nov 6, 2001Feb 5, 2004Depeng BiDigital content distribution and subscription system
US20040088183 *Dec 26, 2001May 6, 2004Naoya NakanishiComputer-readable information storage medium having content-data stored therein and content charging system
US20040255330 *Jan 29, 2004Dec 16, 2004Gotuit Audio, Inc.CD and DVD players
US20050036763 *Sep 13, 2004Feb 17, 2005Motoki KatoMethod of processing multiplexed program data using entry points and time units
US20050084251 *Oct 14, 2004Apr 21, 2005Matsushita Electric Industrial Co., Ltd.Digital content reproducing apparatus and method for reproducing digital content
US20050096983 *Dec 8, 2004May 5, 2005Creative Edge Internet Services Pty. Ltd.Internet advertising system
US20050238057 *Jun 17, 2003Oct 27, 2005Tadamasa TomaMultiplexing device and demultiplexing device
US20060059128 *Sep 16, 2004Mar 16, 2006Ruggle Matthew JDigital content licensing toolbar
US20060095381 *Dec 8, 2005May 4, 2006Teppei YokotaReproducing apparatus and reproducing method
US20070174568 *Apr 14, 2006Jul 26, 2007Manabu KiiReproducing apparatus, reproduction controlling method, and program
US20070180534 *Apr 4, 2007Aug 2, 2007Toshihiro IshizakaRecording apparatus that records information for protecting intangible property right, recording method thereof, record medium thereof, and program thereof
US20080034222 *Dec 5, 2006Feb 7, 2008Yuishi TorisakiMobile terminal, encrypted contents reproduction method and plaintext data generation method employed for the same
US20090086966 *Sep 24, 2008Apr 2, 2009Kabushiki Kaisha ToshibaReproduction apparatus, reproduction method and information recording medium
US20090172598 *Nov 1, 2005Jul 2, 2009Sony Computer Entertainment Inc.Multimedia reproducing apparatus and menu screen display method
US20090287837 *Jul 22, 2009Nov 19, 2009David Paul FelsherInformation record infrastructure, system and method
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US7681245Aug 30, 2002Mar 16, 2010Avaya Inc.Remote feature activator feature extraction
US7707405Sep 21, 2004Apr 27, 2010Avaya Inc.Secure installation activation
US7747851Sep 30, 2004Jun 29, 2010Avaya Inc.Certificate distribution via license files
US7814023Sep 8, 2005Oct 12, 2010Avaya Inc.Secure download manager
US7844572Oct 30, 2007Nov 30, 2010Avaya Inc.Remote feature activator feature extraction
US7885896Jul 9, 2002Feb 8, 2011Avaya Inc.Method for authorizing a substitute software license server
US7890997Jan 20, 2003Feb 15, 2011Avaya Inc.Remote feature activation authentication file system
US7913301Oct 30, 2006Mar 22, 2011Avaya Inc.Remote feature activation authentication file system
US7966520Aug 30, 2002Jun 21, 2011Avaya Inc.Software licensing for spare processors
US8041642Jul 10, 2002Oct 18, 2011Avaya Inc.Predictive software license balancing
US8229858Feb 4, 2005Jul 24, 2012Avaya Inc.Generation of enterprise-wide licenses in a customer environment
US8620819Oct 30, 2009Dec 31, 2013Avaya Inc.Remote feature activator feature extraction
US20070219926 *Oct 18, 2006Sep 20, 2007Stanley KornSecure method and system of identity authentication
US20090036099 *Jul 23, 2008Feb 5, 2009Samsung Electronics Co., Ltd.Content providing method and system
Classifications
U.S. Classification705/50, 348/E07.056, G9B/20.002, 386/E05.004
International ClassificationG11B20/10, H04N5/85, G11B20/12, H04N5/93, H04N9/82, G11B27/00, G11B20/00, H04N5/913, G06F12/14, G06F21/24, G06Q99/00
Cooperative ClassificationH04N21/42646, G11B2220/213, G11B20/00673, H04N5/913, H04N9/8227, H04N5/765, G11B20/00818, G11B20/00086, H04N7/1675, H04N5/85, G06Q20/382, G11B20/00246, H04N2005/91364, G11B20/00978, H04N21/63345, H04N21/4622, G11B20/0071, H04N9/8205, G11B20/00094, G11B20/00115, G11B20/00507, G11B20/0021, G11B20/00224
European ClassificationH04N21/6334K, H04N21/462S, H04N21/426D, G11B20/00P18, G11B20/00P5, G11B20/00P11C, G06Q20/382, G11B20/00P1C, G11B20/00P8A, G11B20/00P5G1B, G11B20/00P5A2, G11B20/00P1, G11B20/00P10, G11B20/00P5A5, G11B20/00P, H04N5/913, H04N7/167D