CA2364263C - Secure streaming of digital audio/visual content - Google Patents
Secure streaming of digital audio/visual content Download PDFInfo
- Publication number
- CA2364263C CA2364263C CA2364263A CA2364263A CA2364263C CA 2364263 C CA2364263 C CA 2364263C CA 2364263 A CA2364263 A CA 2364263A CA 2364263 A CA2364263 A CA 2364263A CA 2364263 C CA2364263 C CA 2364263C
- Authority
- CA
- Canada
- Prior art keywords
- playback device
- authorization data
- source
- content
- digital content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 230000000007 visual effect Effects 0.000 title abstract description 7
- 238000013475 authorization Methods 0.000 claims abstract description 99
- 238000000034 method Methods 0.000 claims abstract description 17
- 230000000737 periodic effect Effects 0.000 claims description 12
- 238000012545 processing Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 238000003032 molecular docking Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 240000005020 Acaciella glauca Species 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 235000003499 redwood Nutrition 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
Abstract
A method and apparatus for secure streaming of digital audio and/or visual content (210) is described. Authorization data corresponding to the digital content (210) is received. A check is performed to determine whether a playback device (230) is authorized to play the digital content (210) based, at least in part, on the authorization data. A stream of data representing portions of the digital content (210) is played, if authorized. In one embodiment, portions of the stream of digital content (210) are intermittently checked for authorization.
Description
SECURE STREAMING OF
DIGITAL AUDIOVISUAL CONTENT
FIELD OF THE INVENTION
The invention relates to digital information playback. More particularly, the invention relates to secure streaming of digital information between a source and a playback device.
BACKGROUND OF THE INVENTION
Sources currently exist that provide digital audio and/or video content to remote playback devices. The digital content can be provided by a network, such as the Internet, or other network. The digital content can be provided as a file that is downloaded and played, or as a stream of data that can be played as received.
For digital content that is subject to a controlled distribution, a security scheme is required.
One scheme for content protection is to protect access to the content.
Access protection can be applied to both files and streams of content. For example, a user name and password may be required to access the content.
However, access protection can be defeated, for example, by disclosure of a user name and/or password, or by otherwise determining an authorized user name and password. Once an authorized user name and password are obtained, an unauthorized party can have access to the content.
Because access protection can be defeated as described above, additional and/or different content protection schemes are often necessary to provide satisfactory content protection. Therefore, what is needed is a protection scheme that provided better content protection than simple content access protection.
SUMMARY OF THE INVENTION
A method and apparatus for secure streaming of digital audio and/or visual content is described. Authorization data corresponding the digital content is received. A check is performed to determine whether a playback device is authorized to play the digital content based, at least in part, on the authorization data. A stream of data representing portions of the digital content is played, if authorized. In one embodiment, portions of the stream of digital content are intermittently checked for authorization.
In a further aspect, the present invention resides in a method comprising receiving authorization data corresponding to streamed digital content;
determining whether a playback device is authorized to play the streamed digital content based, at least in part, on the authorization data; playing a portion of the streamed digital content, if authorized; and checking portions of the streamed digital content to determine whether continued playback is authorized, wherein an interval for which authorization is checked is determined based, at least in part, on one or more of network bandwidth, processing power utilization and strength of security desired.
In another aspect, the present invention resides in an apparatus comprising means for receiving authorization data corresponding to streamed digital content;
means for determining whether a playback device is authorized to play the streamed digital content based, at least in part, on the authorization data;
means for playing a portion of the streamed digital content, if authorized, and means for checking portions of the streamed digital content to determine whether continued playback is authorized, wherein an interval for which authorization is checked is determined based, at least in part, on one or more of network bandwidth, processing power utilization and strength of security desired.
In a further aspect, the present invention resides in a machine-readable medium having stored thereon sequences of instructions that, when executed cause one or more electronic devices to receive authorization data corresponding to streamed digital content; determine whether a playback device is authorized to play the streamed digital content based, at least in part, on the authorization data; and play a portion of the streamed digital content, if authorized; and check portions of the streamed digital content to determine whether continued playback is authorized, wherein an interval for which authorization is checked is determined based, at least in part, on one or more of network bandwidth, processing power utilization and strength of security desired.
In another aspect, the present invention resides in a computer data signal embodied in a data communications medium shared among a plurality of network devices comprising sequences of instructions that, when executed, cause one or more electronic systems to receive authorization data corresponding to streamed digital content; determine whether a playback device is authorized to play the streamed digital content based, at least in part, on the authorization data;
play a portion of the streamed digital content, if authorized; and check portions of the streamed digital content to determine whether continued playback is authorized, wherein an interval for which authorization is checked is determined based, at least in part, on one or more of network bandwidth, processing power utilization and strength of security desired.
In a further aspect, the present invention provides a method comprising:
receiving, at a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data;
determining whether said source is an authorized source based on said source authorization data; determining whether said playback device is an authorized playback device based on said playback device authorization data; if both said playback device and said source are authorized, playing streamed digital content received by said playback device; and periodically checking, at said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said -2a-authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
In a still further aspect, the present invention provides an apparatus for secure streaming of digital audio and/or video content, comprising: means for receiving, in a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data; means for determining whether said source is an authorized source based on said source authorization data;
means for determining whether said playback device is an authorized playback device based on said playback device authorization data; means for playing streamed digital content received by said playback device, if both said playback device and said source are authorized; and means for periodically checking, in said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
In a further aspect, the present invention provides a machine-readable medium having stored thereon sequences of instructions that, when executed by one or more processors cause one or more electronic devices to: receive, at a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data; determine whether said source is an authorized source based on said source authorization data; determine whether said playback device is an authorized playback device based on said playback device authorization data; if both said playback device and said source are authorized, playing streamed digital content received by said playback device; and periodically check, at said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
-2b-BRIEF DESCRIPTION OF THE DRAWINGS
The invention is illustrated by way of example, and not by way of limitation in the figures of the accompanying drawings in which like reference numerals refer to similar elements.
Figure 1 is one embodiment of a computer system suitable for use with the invention.
Figure 2 is one embodiment of an architecture that provides digital information for playback suitable for use with the invention.
Figure 3 is one embodiment of a computer system running a digital information player suitable for use with the invention.
Figure 4 is a flow diagram for providing secure streaming of digital content according to one embodiment of the invention.
Figure 5 illustrates authorization data for use in providing secure streaming digital content according to one embodiment of the invention.
DETAILED DESCRIPTION
A method and apparatus for secure streaming of digital audio/visual content is described. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough -2c-understanding of the invention. It will be apparent, however, to one skilled in the art that the invention can be practiced without these specific details. In other instances, structures and devices are shown in block diagram form in order to avoid obscuring the invention.
Reference in the specification to "one embodiment" or "an embodiment"
means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention.
The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment.
The invention provides a method and apparatus for allowing secure streaming of digital audio/visual content. Secure streaming provides protection against unauthorized use of the digital content. Authorization and integrity checks are performed by a client or playback device on a set of data associated with digital content to be played. The set of data includes authorization and integrity information for content to be received from the source. Streamed content is received from the source by the playback device. The streamed content is intermittently checked for authorization and integrity. If the check is passed, playback continues; otherwise playback is halted.
Overview of an Architecture and Devices for Providing Playback of Digital Programming Figure 1 is one embodiment of a computer system suitable for use with the invention. Computer system 100 includes bus 101 or other communication device for communicating information, and processor 102 coupled to bus 101 for processing information. While computer system 100 is illustrated with a single processor, computer system 100 can include multiple processors. Computer system 100 further includes random access memory (RAM) or other dynamic storage device 104 (referred to as main memory), coupled to bus 101 for storing information and instructions to be executed by processor 102. Main memory 104 also can be used for storing temporary variables or other intermediate information during execution of instructions by processor 102. Computer system 100 also includes read only memory (ROM) and/or other static storage device 106 coupled to bus 101 for storing static information and instructions for processor 102.
Data storage device 107 is coupled to bus 101 for storing information and instructions.
Data storage device 107 such as a magnetic disk or optical disc and its corresponding drive can be coupled to computer system 100. Computer system 100 can also be coupled via bus 101 to display device 121, such as a cathode ray tube (CRT) or liquid crystal display (LCD), for displaying information to a computer user. Alphanumeric input device 122, including alphanumeric and other keys, is typically coupled to bus 101 for communicating information and command selections to processor 102. Another type of user input device is cursor control 123, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 102 and for controlling cursor movement on display 121.
In one embodiment, computer system 100 further includes playback device interface 130 that provides a communications interface between computer system 100 and a mobile playback device (not shown in Figure 1). Playback device interface 130 can be, for example, a docking station coupled to a port (not shown in Figure 1) of computer system 100 (e.g., serial port, parallel port, SCSI
interface).
The docking station is configured to receive a mobile playback device.
Playback device interface 130 allows computer system 100 to communicate licensing information, digital content, and other data to and receive data from a mobile playback device.
In one embodiment, the invention is related to the use of computer system 100 to provide secure streaming digital content playback devices. According to one embodiment, secure streaming is provided by a computer system, such as computer system 100, in response to processor 102 executing sequences of instructions contained in memory 104.
DIGITAL AUDIOVISUAL CONTENT
FIELD OF THE INVENTION
The invention relates to digital information playback. More particularly, the invention relates to secure streaming of digital information between a source and a playback device.
BACKGROUND OF THE INVENTION
Sources currently exist that provide digital audio and/or video content to remote playback devices. The digital content can be provided by a network, such as the Internet, or other network. The digital content can be provided as a file that is downloaded and played, or as a stream of data that can be played as received.
For digital content that is subject to a controlled distribution, a security scheme is required.
One scheme for content protection is to protect access to the content.
Access protection can be applied to both files and streams of content. For example, a user name and password may be required to access the content.
However, access protection can be defeated, for example, by disclosure of a user name and/or password, or by otherwise determining an authorized user name and password. Once an authorized user name and password are obtained, an unauthorized party can have access to the content.
Because access protection can be defeated as described above, additional and/or different content protection schemes are often necessary to provide satisfactory content protection. Therefore, what is needed is a protection scheme that provided better content protection than simple content access protection.
SUMMARY OF THE INVENTION
A method and apparatus for secure streaming of digital audio and/or visual content is described. Authorization data corresponding the digital content is received. A check is performed to determine whether a playback device is authorized to play the digital content based, at least in part, on the authorization data. A stream of data representing portions of the digital content is played, if authorized. In one embodiment, portions of the stream of digital content are intermittently checked for authorization.
In a further aspect, the present invention resides in a method comprising receiving authorization data corresponding to streamed digital content;
determining whether a playback device is authorized to play the streamed digital content based, at least in part, on the authorization data; playing a portion of the streamed digital content, if authorized; and checking portions of the streamed digital content to determine whether continued playback is authorized, wherein an interval for which authorization is checked is determined based, at least in part, on one or more of network bandwidth, processing power utilization and strength of security desired.
In another aspect, the present invention resides in an apparatus comprising means for receiving authorization data corresponding to streamed digital content;
means for determining whether a playback device is authorized to play the streamed digital content based, at least in part, on the authorization data;
means for playing a portion of the streamed digital content, if authorized, and means for checking portions of the streamed digital content to determine whether continued playback is authorized, wherein an interval for which authorization is checked is determined based, at least in part, on one or more of network bandwidth, processing power utilization and strength of security desired.
In a further aspect, the present invention resides in a machine-readable medium having stored thereon sequences of instructions that, when executed cause one or more electronic devices to receive authorization data corresponding to streamed digital content; determine whether a playback device is authorized to play the streamed digital content based, at least in part, on the authorization data; and play a portion of the streamed digital content, if authorized; and check portions of the streamed digital content to determine whether continued playback is authorized, wherein an interval for which authorization is checked is determined based, at least in part, on one or more of network bandwidth, processing power utilization and strength of security desired.
In another aspect, the present invention resides in a computer data signal embodied in a data communications medium shared among a plurality of network devices comprising sequences of instructions that, when executed, cause one or more electronic systems to receive authorization data corresponding to streamed digital content; determine whether a playback device is authorized to play the streamed digital content based, at least in part, on the authorization data;
play a portion of the streamed digital content, if authorized; and check portions of the streamed digital content to determine whether continued playback is authorized, wherein an interval for which authorization is checked is determined based, at least in part, on one or more of network bandwidth, processing power utilization and strength of security desired.
In a further aspect, the present invention provides a method comprising:
receiving, at a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data;
determining whether said source is an authorized source based on said source authorization data; determining whether said playback device is an authorized playback device based on said playback device authorization data; if both said playback device and said source are authorized, playing streamed digital content received by said playback device; and periodically checking, at said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said -2a-authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
In a still further aspect, the present invention provides an apparatus for secure streaming of digital audio and/or video content, comprising: means for receiving, in a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data; means for determining whether said source is an authorized source based on said source authorization data;
means for determining whether said playback device is an authorized playback device based on said playback device authorization data; means for playing streamed digital content received by said playback device, if both said playback device and said source are authorized; and means for periodically checking, in said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
In a further aspect, the present invention provides a machine-readable medium having stored thereon sequences of instructions that, when executed by one or more processors cause one or more electronic devices to: receive, at a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data; determine whether said source is an authorized source based on said source authorization data; determine whether said playback device is an authorized playback device based on said playback device authorization data; if both said playback device and said source are authorized, playing streamed digital content received by said playback device; and periodically check, at said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
-2b-BRIEF DESCRIPTION OF THE DRAWINGS
The invention is illustrated by way of example, and not by way of limitation in the figures of the accompanying drawings in which like reference numerals refer to similar elements.
Figure 1 is one embodiment of a computer system suitable for use with the invention.
Figure 2 is one embodiment of an architecture that provides digital information for playback suitable for use with the invention.
Figure 3 is one embodiment of a computer system running a digital information player suitable for use with the invention.
Figure 4 is a flow diagram for providing secure streaming of digital content according to one embodiment of the invention.
Figure 5 illustrates authorization data for use in providing secure streaming digital content according to one embodiment of the invention.
DETAILED DESCRIPTION
A method and apparatus for secure streaming of digital audio/visual content is described. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough -2c-understanding of the invention. It will be apparent, however, to one skilled in the art that the invention can be practiced without these specific details. In other instances, structures and devices are shown in block diagram form in order to avoid obscuring the invention.
Reference in the specification to "one embodiment" or "an embodiment"
means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention.
The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment.
The invention provides a method and apparatus for allowing secure streaming of digital audio/visual content. Secure streaming provides protection against unauthorized use of the digital content. Authorization and integrity checks are performed by a client or playback device on a set of data associated with digital content to be played. The set of data includes authorization and integrity information for content to be received from the source. Streamed content is received from the source by the playback device. The streamed content is intermittently checked for authorization and integrity. If the check is passed, playback continues; otherwise playback is halted.
Overview of an Architecture and Devices for Providing Playback of Digital Programming Figure 1 is one embodiment of a computer system suitable for use with the invention. Computer system 100 includes bus 101 or other communication device for communicating information, and processor 102 coupled to bus 101 for processing information. While computer system 100 is illustrated with a single processor, computer system 100 can include multiple processors. Computer system 100 further includes random access memory (RAM) or other dynamic storage device 104 (referred to as main memory), coupled to bus 101 for storing information and instructions to be executed by processor 102. Main memory 104 also can be used for storing temporary variables or other intermediate information during execution of instructions by processor 102. Computer system 100 also includes read only memory (ROM) and/or other static storage device 106 coupled to bus 101 for storing static information and instructions for processor 102.
Data storage device 107 is coupled to bus 101 for storing information and instructions.
Data storage device 107 such as a magnetic disk or optical disc and its corresponding drive can be coupled to computer system 100. Computer system 100 can also be coupled via bus 101 to display device 121, such as a cathode ray tube (CRT) or liquid crystal display (LCD), for displaying information to a computer user. Alphanumeric input device 122, including alphanumeric and other keys, is typically coupled to bus 101 for communicating information and command selections to processor 102. Another type of user input device is cursor control 123, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 102 and for controlling cursor movement on display 121.
In one embodiment, computer system 100 further includes playback device interface 130 that provides a communications interface between computer system 100 and a mobile playback device (not shown in Figure 1). Playback device interface 130 can be, for example, a docking station coupled to a port (not shown in Figure 1) of computer system 100 (e.g., serial port, parallel port, SCSI
interface).
The docking station is configured to receive a mobile playback device.
Playback device interface 130 allows computer system 100 to communicate licensing information, digital content, and other data to and receive data from a mobile playback device.
In one embodiment, the invention is related to the use of computer system 100 to provide secure streaming digital content playback devices. According to one embodiment, secure streaming is provided by a computer system, such as computer system 100, in response to processor 102 executing sequences of instructions contained in memory 104.
Instructions are provided to main memory 104 from a storage device, such as magnetic disk, CD-ROM, DVD, via a remote connection (e.g., over a network), etc. In alternative embodiments, hard-wired circuitry can be used in place of or in combination with software instructions to implement the invention.
Thus, the invention is not limited to any specific combination of hardware circuitry and software.
Figure 2 is one embodiment of an architecture that provides digital information for playback suitable for use with the invention. Server 210 is coupled to multiple playback devices, including hardware playback devices (e.g., 230) and players (e.g., 245 running on computer system 240), by network 200.
Any number of hardware playback devices and players can be coupled to server 210 by network 200.
In one embodiment, network 200 is the Internet; however, other networks can be used. For example, network 200 can be an intranet that couples only computer systems and other devices together that belong to a particular organization. Network 200 can also represent a group of networks, such and a group of local area networks.
Server 210 stores digital information defining programming as well as information about authorized users of the digital information. In one embodiment, server 210 stores a library of digital content that can be accessed by authorized playback devices. The library of digital content can include audio books, recordings of lecture series, news, plays, movies, etc.
Hardware playback device 230 stores programs from server 210 for playback. Hardware playback device 230 can store all or a portion of one or more programs. Also, hardware playback device 230 can be coupled to network 200 directly or by a computer system (not shown in Figure 2) that accesses server 210.
Computer system 240 runs player 245 and can play digital content from server 210.
Thus, the invention is not limited to any specific combination of hardware circuitry and software.
Figure 2 is one embodiment of an architecture that provides digital information for playback suitable for use with the invention. Server 210 is coupled to multiple playback devices, including hardware playback devices (e.g., 230) and players (e.g., 245 running on computer system 240), by network 200.
Any number of hardware playback devices and players can be coupled to server 210 by network 200.
In one embodiment, network 200 is the Internet; however, other networks can be used. For example, network 200 can be an intranet that couples only computer systems and other devices together that belong to a particular organization. Network 200 can also represent a group of networks, such and a group of local area networks.
Server 210 stores digital information defining programming as well as information about authorized users of the digital information. In one embodiment, server 210 stores a library of digital content that can be accessed by authorized playback devices. The library of digital content can include audio books, recordings of lecture series, news, plays, movies, etc.
Hardware playback device 230 stores programs from server 210 for playback. Hardware playback device 230 can store all or a portion of one or more programs. Also, hardware playback device 230 can be coupled to network 200 directly or by a computer system (not shown in Figure 2) that accesses server 210.
Computer system 240 runs player 245 and can play digital content from server 210.
Figure 3 is one embodiment of a computer system running a digital information player suitable for use with the invention. Processor 102 executes sequences of instruction stored in main memory 104 including sequences of instructions defining operating system 300 and player 310.
Main memory 104 further includes digital content 320 that is all or a portion of programming received from the server. Additional programs, or additional portions of digital content 320, can be stored by storage device 107 and copied to main memory 104 as necessary. For streaming digital content, only a portion of the digital content being played is stored in main memory 104.
Processor 102 retrieves data from digital content 320 and outputs audio and/or video in response to the data. Processor 102 can also retrieve digital content data from a network connection (not shown in Figure 3) for playback or for storage in main memory 104.
Overview of Secure Streaming of Digital Content Figure 4 is a flow diagram for providing secure streaming of digital content according to one embodiment of the invention. The data can be audio data, visual data, or a combination of audio and visual data. The data can be played by a software player running on a computer system or other suitable device, or the data can be played by a dedicated hardware playback device.
Authorization data is received from a source at 400. In one embodiment, the source is a server computer system accessed via a network, such as the Internet. The server can provide the digital content as well as the authorization data, or the digital content can be received from a different source, or multiple sources. One embodiment of authorization data is described in greater detail below with respect to Figure 5.
In one embodiment, the authorization data includes one or more digital signatures, one or more user identifiers and one or more content integrity values.
Other and/or different authorization data can also be used. The one or more digital signatures allow the playback device to determine the authority of the source of the authorization data. The one or more user identifiers allow the playback device to determine whether the playback device is authorized to play the associated digital content. The content integrity values allow the playback device to determine whether the digital content is valid.
The playback device checks the authorization data at 410. In one embodiment, the playback device checks the digital signature, or other source indicator, in the authorization data to determine whether the authorization data is received from an authorized source. The digital signature can be, for example, either a Digital Signature Algorithm (DSA) signature as proposed by the National Institute of Standards, or a Rivest Shamir Adleman (RSA) algorithm as described by RSA Data Security, Inc. of Redwood City California. Both of these functions are described in pages 466-494 of "Applied Cryptography: Protocols, Algorithms and Source Code in C" by Bruce Schneier, published by John Wiley & Sons, Inc.
(1996). Other signature algorithms can also be used.
The playback device determines whether it in an authorized playback device at 420. In one embodiment, the playback device has a PlayerID value.
The PlayerID value can be received via a registration process, which is described in greater detail in U.S. Patent application 09/151,384, filed September 10, 1998, entitled "CLONING PROTECTION SCHEME FOR A DIGITAL
INFORMATION PLAYBACK DEVICE," which is assigned to the corporate assignee of the invention. The PlayerID value can also be hardwired into, or otherwise provided by, a component of the playback device (e.g., a computer system, a hardware player).
If the playback device is not an authorized playback device at 420, the process stops. Otherwise, a stream of digital information is received and played at 430. In one embodiment, the stream of digital data is received form the same source as the authorization data; however, the digital data can be received from an alternative source.
Main memory 104 further includes digital content 320 that is all or a portion of programming received from the server. Additional programs, or additional portions of digital content 320, can be stored by storage device 107 and copied to main memory 104 as necessary. For streaming digital content, only a portion of the digital content being played is stored in main memory 104.
Processor 102 retrieves data from digital content 320 and outputs audio and/or video in response to the data. Processor 102 can also retrieve digital content data from a network connection (not shown in Figure 3) for playback or for storage in main memory 104.
Overview of Secure Streaming of Digital Content Figure 4 is a flow diagram for providing secure streaming of digital content according to one embodiment of the invention. The data can be audio data, visual data, or a combination of audio and visual data. The data can be played by a software player running on a computer system or other suitable device, or the data can be played by a dedicated hardware playback device.
Authorization data is received from a source at 400. In one embodiment, the source is a server computer system accessed via a network, such as the Internet. The server can provide the digital content as well as the authorization data, or the digital content can be received from a different source, or multiple sources. One embodiment of authorization data is described in greater detail below with respect to Figure 5.
In one embodiment, the authorization data includes one or more digital signatures, one or more user identifiers and one or more content integrity values.
Other and/or different authorization data can also be used. The one or more digital signatures allow the playback device to determine the authority of the source of the authorization data. The one or more user identifiers allow the playback device to determine whether the playback device is authorized to play the associated digital content. The content integrity values allow the playback device to determine whether the digital content is valid.
The playback device checks the authorization data at 410. In one embodiment, the playback device checks the digital signature, or other source indicator, in the authorization data to determine whether the authorization data is received from an authorized source. The digital signature can be, for example, either a Digital Signature Algorithm (DSA) signature as proposed by the National Institute of Standards, or a Rivest Shamir Adleman (RSA) algorithm as described by RSA Data Security, Inc. of Redwood City California. Both of these functions are described in pages 466-494 of "Applied Cryptography: Protocols, Algorithms and Source Code in C" by Bruce Schneier, published by John Wiley & Sons, Inc.
(1996). Other signature algorithms can also be used.
The playback device determines whether it in an authorized playback device at 420. In one embodiment, the playback device has a PlayerID value.
The PlayerID value can be received via a registration process, which is described in greater detail in U.S. Patent application 09/151,384, filed September 10, 1998, entitled "CLONING PROTECTION SCHEME FOR A DIGITAL
INFORMATION PLAYBACK DEVICE," which is assigned to the corporate assignee of the invention. The PlayerID value can also be hardwired into, or otherwise provided by, a component of the playback device (e.g., a computer system, a hardware player).
If the playback device is not an authorized playback device at 420, the process stops. Otherwise, a stream of digital information is received and played at 430. In one embodiment, the stream of digital data is received form the same source as the authorization data; however, the digital data can be received from an alternative source.
In one embodiment, the playback device performs a periodic check of the stream of digital information at 440. The check can be performed at regular intervals (e.g., every 20 seconds), the check can be performed at random times, or the check can be performed at varying times within predetermined timing intervals. When performing checks at regular intervals conditions such as, for example, network bandwidth, processing power and strength of security desired, can be used to determine the interval to be used.
In one embodiment, the playback device generates a hash value based on a block of content received. The playback device checks the content integrity values previously received as part of the authorization data to determine whether the hash value is included. Content integrity values other than hash values can also be used.
If the check performed at 440 passes at 450, digital information playback is continued (e.g., 430, 440, 450). If the check fails at 450, playback of digital information is stopped. Thus, an unauthorized user can play a portion (e.g., seconds) of unauthorized digital content, but the unauthorized user is prevented from continuing to play the stream of digital information.
Thus, the invention provides playback protection rather than access protection. In other words, the invention allows only authorized playback devices to play content that has been received. In contrast, access protection schemes attempt to limit access to the content that can be played by any playback device having access to the content. In providing playback protection, the invention allows greater protection to identification and authorization information as compared to access protection because authorization activities occur within the playback device rather than being distributed across a network where private information can be lost, stolen and/or sabotaged.
Figure 5 illustrates authorization data for use in providing secure streaming digital content according to one embodiment of the invention. In general, authorization data 500 includes source identifier 510, user identifiers 520 and content integrity values 530. Additional and/or different data can be used to provide authorization information.
In one embodiment, source indicator 510 is a digital signature corresponding to the source of authorization data 500. Source indicator 510 can also be multiple digital signatures indicating a chain of authorized sources through which the authorization data 500 has been received. Playback devices perform necessary checks on source indicator 510 to determine whether authorization data 500 is valid.
In one embodiment, user identifiers 520 include one or more PlayerID
values corresponding to playback devices that are authorized to play the digital information with which authorization data 500 is associated. User identifiers can also include GroupID values that correspond to groups of playback devices authorized to play the digital information. Playback devices determine whether a PlayerID or GroupID value linked to the playback device is included in user identifiers 520.
In one embodiment, content integrity values 530 are hash values corresponding to one or more portions of the digital content corresponding to authorization data 500. Content integrity values 530 are used by the playback device to determine whether the corresponding portion of digital content is valid.
Content integrity values 530 are used for periodic checking by the playback device to determine whether playback is authorized.
In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes can be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
In one embodiment, the playback device generates a hash value based on a block of content received. The playback device checks the content integrity values previously received as part of the authorization data to determine whether the hash value is included. Content integrity values other than hash values can also be used.
If the check performed at 440 passes at 450, digital information playback is continued (e.g., 430, 440, 450). If the check fails at 450, playback of digital information is stopped. Thus, an unauthorized user can play a portion (e.g., seconds) of unauthorized digital content, but the unauthorized user is prevented from continuing to play the stream of digital information.
Thus, the invention provides playback protection rather than access protection. In other words, the invention allows only authorized playback devices to play content that has been received. In contrast, access protection schemes attempt to limit access to the content that can be played by any playback device having access to the content. In providing playback protection, the invention allows greater protection to identification and authorization information as compared to access protection because authorization activities occur within the playback device rather than being distributed across a network where private information can be lost, stolen and/or sabotaged.
Figure 5 illustrates authorization data for use in providing secure streaming digital content according to one embodiment of the invention. In general, authorization data 500 includes source identifier 510, user identifiers 520 and content integrity values 530. Additional and/or different data can be used to provide authorization information.
In one embodiment, source indicator 510 is a digital signature corresponding to the source of authorization data 500. Source indicator 510 can also be multiple digital signatures indicating a chain of authorized sources through which the authorization data 500 has been received. Playback devices perform necessary checks on source indicator 510 to determine whether authorization data 500 is valid.
In one embodiment, user identifiers 520 include one or more PlayerID
values corresponding to playback devices that are authorized to play the digital information with which authorization data 500 is associated. User identifiers can also include GroupID values that correspond to groups of playback devices authorized to play the digital information. Playback devices determine whether a PlayerID or GroupID value linked to the playback device is included in user identifiers 520.
In one embodiment, content integrity values 530 are hash values corresponding to one or more portions of the digital content corresponding to authorization data 500. Content integrity values 530 are used by the playback device to determine whether the corresponding portion of digital content is valid.
Content integrity values 530 are used for periodic checking by the playback device to determine whether playback is authorized.
In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes can be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Claims (19)
1. A method comprising:
receiving, at a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data;
determining whether said source is an authorized source based on said source authorization data;
determining whether said playback device is an authorized playback device based on said playback device authorization data;
if both said playback device and said source are authorized, playing streamed digital content received by said playback device; and periodically checking, at said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
receiving, at a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data;
determining whether said source is an authorized source based on said source authorization data;
determining whether said playback device is an authorized playback device based on said playback device authorization data;
if both said playback device and said source are authorized, playing streamed digital content received by said playback device; and periodically checking, at said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
2. The method of claim 1, wherein the periodic checking is performed at regular intervals.
3. The method of claim 1, wherein the periodic checking is performed randomly.
4. The method of claim 1, wherein the periodic checking comprises:
generating a hash value for a portion of the streamed digital content;
checking the authorization data to determine whether the hash value is included; and continuing playback if the hash value is included in the authorization data.
generating a hash value for a portion of the streamed digital content;
checking the authorization data to determine whether the hash value is included; and continuing playback if the hash value is included in the authorization data.
5. The method of claim 1, wherein the streamed digital content is received from the same source as the authorization data.
6. The method of claim 1, wherein determining whether a playback device is authorized to play the digital content, further comprises:
determining whether a source indicator included in the authorization data indicates an approved source; and determining whether a user identifier in the authorization data corresponds to the playback device.
determining whether a source indicator included in the authorization data indicates an approved source; and determining whether a user identifier in the authorization data corresponds to the playback device.
7. The method of claim 1, wherein the source indicator is a digital signature.
8. The method of claim 1, wherein the user identifier is a playback device indicator.
9. An apparatus for secure streaming of digital audio and/or video content, comprising:
means for receiving, in a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data;
means for determining whether said source is an authorized source based on said source authorization data;
means for determining whether said playback device is an authorized playback device based on said playback device authorization data;
means for playing streamed digital content received by said playback device, if both said playback device and said source are authorized; and means for periodically checking, in said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
means for receiving, in a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data;
means for determining whether said source is an authorized source based on said source authorization data;
means for determining whether said playback device is an authorized playback device based on said playback device authorization data;
means for playing streamed digital content received by said playback device, if both said playback device and said source are authorized; and means for periodically checking, in said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
10. The apparatus of claim 9, wherein the means for periodically checking further comprises:
means for generating a hash value for a portion of the stream of data;
means for checking the authorization data to determine whether the hash value is included; and means for continuing playback if the hash value is included in the authorization data.
means for generating a hash value for a portion of the stream of data;
means for checking the authorization data to determine whether the hash value is included; and means for continuing playback if the hash value is included in the authorization data.
11. The apparatus of claim 9, wherein the means for determining whether the playback device is authorized to play the digital content further comprises:
means for determining whether a source indicator included in the authorization data indicates an approved source; and means for determining whether a user identifier in the authorization data corresponds to the playback device.
means for determining whether a source indicator included in the authorization data indicates an approved source; and means for determining whether a user identifier in the authorization data corresponds to the playback device.
12. A machine-readable medium having stored thereon sequences of instructions that, when executed by one or more processors cause one or more electronic devices to:
receive, at a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data;
determine whether said source is an authorized source based on said source authorization data;
determine whether said playback device is an authorized playback device based on said playback device authorization data;
if both said playback device and said source are authorized, playing streamed digital content received by said playback device; and periodically check, at said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
receive, at a playback device, authorization data associated with streamed digital content from a source, wherein said authorization data includes at least source authorization data, playback device authorization data, and content integrity data;
determine whether said source is an authorized source based on said source authorization data;
determine whether said playback device is an authorized playback device based on said playback device authorization data;
if both said playback device and said source are authorized, playing streamed digital content received by said playback device; and periodically check, at said playback device, the validity of said streamed digital content by comparing content integrity values derived from a portion of said streamed digital content with said content integrity data received with said authorization data, such that the playing of streamed content is stopped when said periodic checking indicates invalid content.
13. The machine-readable medium of claim 12, wherein the periodically checking is performed at regular intervals.
14. The-readable medium of claim 12, wherein the periodically checking is performed randomly.
15. The machine-readable medium of claim 12, wherein the periodic check comprises:
generating a hash value for a portion of the streamed digital content;
checking the authorization data to determine whether the hash value is included; and continuing playback if the hash value is included in the authorization data.
generating a hash value for a portion of the streamed digital content;
checking the authorization data to determine whether the hash value is included; and continuing playback if the hash value is included in the authorization data.
16. The machine-readable medium of claim 12, wherein the streamed digital content is received from the same source as the authorization data.
17. The machine-readable medium of claim 12 wherein the sequences of instructions that cause the electronic device to determine whether a playback device is authorized to play the digital content comprise sequences of instructions that when executed cause the electronic device to:
determining whether a source indicator included in the authorization data indicates an approved source; and determining whether a user identifier in the authorization data corresponds to the playback device.
determining whether a source indicator included in the authorization data indicates an approved source; and determining whether a user identifier in the authorization data corresponds to the playback device.
18. The machine-readable medium method of claim 17, wherein the source indicator is a digital signature.
19. The machine-readable of claim 17, wherein the user identifier is a playback device indicator.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002680469A CA2680469A1 (en) | 1999-03-02 | 1999-12-29 | Secure streaming of digital audio/visual content |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/261,055 | 1999-03-02 | ||
US09/261,055 US6480961B2 (en) | 1999-03-02 | 1999-03-02 | Secure streaming of digital audio/visual content |
PCT/US1999/031314 WO2000052583A1 (en) | 1999-03-02 | 1999-12-29 | Secure streaming of digital audio/visual content |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002680469A Division CA2680469A1 (en) | 1999-03-02 | 1999-12-29 | Secure streaming of digital audio/visual content |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2364263A1 CA2364263A1 (en) | 2000-09-08 |
CA2364263C true CA2364263C (en) | 2011-11-01 |
Family
ID=22991771
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002680469A Abandoned CA2680469A1 (en) | 1999-03-02 | 1999-12-29 | Secure streaming of digital audio/visual content |
CA2364263A Expired - Lifetime CA2364263C (en) | 1999-03-02 | 1999-12-29 | Secure streaming of digital audio/visual content |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002680469A Abandoned CA2680469A1 (en) | 1999-03-02 | 1999-12-29 | Secure streaming of digital audio/visual content |
Country Status (8)
Country | Link |
---|---|
US (1) | US6480961B2 (en) |
EP (1) | EP1166207A4 (en) |
JP (1) | JP4540854B2 (en) |
KR (1) | KR100600203B1 (en) |
AU (1) | AU2402000A (en) |
CA (2) | CA2680469A1 (en) |
HK (1) | HK1042967A1 (en) |
WO (1) | WO2000052583A1 (en) |
Families Citing this family (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7139915B2 (en) * | 1998-10-26 | 2006-11-21 | Microsoft Corporation | Method and apparatus for authenticating an open system application to a portable IC device |
US7194092B1 (en) * | 1998-10-26 | 2007-03-20 | Microsoft Corporation | Key-based secure storage |
US7174457B1 (en) * | 1999-03-10 | 2007-02-06 | Microsoft Corporation | System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party |
US6609199B1 (en) * | 1998-10-26 | 2003-08-19 | Microsoft Corporation | Method and apparatus for authenticating an open system application to a portable IC device |
US6651171B1 (en) * | 1999-04-06 | 2003-11-18 | Microsoft Corporation | Secure execution of program code |
US6775779B1 (en) * | 1999-04-06 | 2004-08-10 | Microsoft Corporation | Hierarchical trusted code for content protection in computers |
US7065342B1 (en) | 1999-11-23 | 2006-06-20 | Gofigure, L.L.C. | System and mobile cellular telephone device for playing recorded music |
US7082413B2 (en) * | 1999-11-24 | 2006-07-25 | International Business Machines Corporation | System and method for authorized compression of digitized music |
US6757824B1 (en) * | 1999-12-10 | 2004-06-29 | Microsoft Corporation | Client-side boot domains and boot rules |
US20040193900A1 (en) * | 2000-03-17 | 2004-09-30 | Mark Nair | System, method and apparatus for controlling the dissemination of digital works |
US7020781B1 (en) * | 2000-05-03 | 2006-03-28 | Hewlett-Packard Development Company, L.P. | Digital content distribution systems |
US7680912B1 (en) * | 2000-05-18 | 2010-03-16 | thePlatform, Inc. | System and method for managing and provisioning streamed data |
US7734688B2 (en) * | 2000-09-28 | 2010-06-08 | Qwest Communications International Inc. | Portable wireless player and associated method |
US6938164B1 (en) | 2000-11-22 | 2005-08-30 | Microsoft Corporation | Method and system for allowing code to be securely initialized in a computer |
US20020116519A1 (en) * | 2001-01-29 | 2002-08-22 | Enjoyweb, Inc. | Method, apparatus and system for transmitting compressed digital media in a secured manner |
US20020152874A1 (en) * | 2001-03-01 | 2002-10-24 | Andy Vilcauskas | Audio ownership system |
US7089309B2 (en) | 2001-03-21 | 2006-08-08 | Theplatform For Media, Inc. | Method and system for managing and distributing digital media |
US7213072B2 (en) * | 2001-05-08 | 2007-05-01 | Nokia Mobile Phones | Method and apparatus for transcoding content with permissible operations authorized by content creator |
US7340526B2 (en) * | 2001-10-30 | 2008-03-04 | Intel Corporation | Automated content source validation for streaming data |
US7159240B2 (en) | 2001-11-16 | 2007-01-02 | Microsoft Corporation | Operating system upgrades in a trusted operating system environment |
US7243230B2 (en) | 2001-11-16 | 2007-07-10 | Microsoft Corporation | Transferring application secrets in a trusted operating system environment |
US7137004B2 (en) | 2001-11-16 | 2006-11-14 | Microsoft Corporation | Manifest-based trusted agent management in a trusted operating system environment |
US8417827B2 (en) * | 2001-12-12 | 2013-04-09 | Nokia Corporation | Synchronous media playback and messaging system |
US20030126276A1 (en) * | 2002-01-02 | 2003-07-03 | Kime Gregory C. | Automated content integrity validation for streaming data |
US7177608B2 (en) * | 2002-03-11 | 2007-02-13 | Catch A Wave Technologies | Personal spectrum recorder |
US7614081B2 (en) * | 2002-04-08 | 2009-11-03 | Sony Corporation | Managing and sharing identities on a network |
US7478126B2 (en) * | 2002-04-08 | 2009-01-13 | Sony Corporation | Initializing relationships between devices in a network |
US20030191753A1 (en) * | 2002-04-08 | 2003-10-09 | Michael Hoch | Filtering contents using a learning mechanism |
US20030191720A1 (en) * | 2002-04-08 | 2003-10-09 | Himgan Wibisono | Electronic tracking tag |
US7890771B2 (en) | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
JP2004133576A (en) * | 2002-10-09 | 2004-04-30 | Sony Corp | Information processor, content distribution server, license server and method, and computer program |
US7793355B2 (en) * | 2002-12-12 | 2010-09-07 | Reasearch In Motion Limited | System and method of owner control of electronic devices |
WO2004074957A2 (en) * | 2003-02-21 | 2004-09-02 | Research In Motion Limited | System and method of multiple-level control of electronic devices |
US20070168287A1 (en) * | 2003-07-16 | 2007-07-19 | Digital Networks North America, Inc. | Method and apparatus for distributing media in a pay per play architecture with remote playback |
US8909712B2 (en) * | 2003-11-25 | 2014-12-09 | Sap Ag | System and method for a generic mobile synchronization framework |
JP2007513588A (en) * | 2003-12-05 | 2007-05-24 | モーション・ピクチャー・アソシエイション・オブ・アメリカ | Digital rights management using a triangulation device for geographical location |
US9160976B2 (en) * | 2003-12-23 | 2015-10-13 | The Directv Group, Inc. | Method and apparatus for distributing media in a pay per play architecture with remote playback within an enterprise |
CN101329714B (en) | 2004-04-02 | 2015-06-17 | 松下电器产业株式会社 | Unauthorized content detection system |
EP1769366B1 (en) * | 2004-04-30 | 2016-12-14 | BlackBerry Limited | System and method of operation control on an electronic device |
US7565464B2 (en) * | 2004-12-14 | 2009-07-21 | Intel Corporation | Programmable transaction initiator architecture for systems with secure and non-secure modes |
WO2006076516A2 (en) * | 2005-01-12 | 2006-07-20 | Howard Friedman | Customizable delivery of audio information |
US20060168507A1 (en) * | 2005-01-26 | 2006-07-27 | Hansen Kim D | Apparatus, system, and method for digitally presenting the contents of a printed publication |
US20080120311A1 (en) * | 2005-04-07 | 2008-05-22 | Iofy Corporation | Device and Method for Protecting Unauthorized Data from being used in a Presentation on a Device |
US8370639B2 (en) * | 2005-06-16 | 2013-02-05 | Sensible Vision, Inc. | System and method for providing secure access to an electronic device using continuous facial biometrics |
US20070055743A1 (en) * | 2005-09-02 | 2007-03-08 | Pirtle Ross M | Remote control media player |
US7995756B1 (en) * | 2005-10-12 | 2011-08-09 | Sprint Communications Company L.P. | Mobile device playback and control of media content from a personal media host device |
US8045958B2 (en) | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
JP4564464B2 (en) * | 2006-01-05 | 2010-10-20 | 株式会社東芝 | Digital content playback apparatus, method and program |
DE602006006787D1 (en) | 2006-02-27 | 2009-06-25 | Research In Motion Ltd | Method for personalizing a standardized IT policy |
US11450331B2 (en) | 2006-07-08 | 2022-09-20 | Staton Techiya, Llc | Personal audio assistant device and method |
WO2008008730A2 (en) | 2006-07-08 | 2008-01-17 | Personics Holdings Inc. | Personal audio assistant device and method |
US8452988B2 (en) * | 2006-07-24 | 2013-05-28 | Michael Sujue Wang | Secure data storage for protecting digital content |
US8230037B2 (en) | 2006-09-29 | 2012-07-24 | Audible, Inc. | Methods and apparatus for customized content delivery |
WO2008063274A2 (en) * | 2006-11-06 | 2008-05-29 | Audible, Inc. | Methods and apparatus for targeted content delivery |
US8243923B2 (en) * | 2006-12-13 | 2012-08-14 | The Directv Group, Inc. | Method and system for providing a predeactivation warning in a system having a conditional access authorization expiration in a mobile receiving device |
JP4983244B2 (en) * | 2006-12-20 | 2012-07-25 | ソニー株式会社 | Distribution system, distribution device, terminal device, and distribution method |
KR101156714B1 (en) * | 2007-02-06 | 2012-06-15 | 삼성전자주식회사 | Disc player and play method |
NL1034221C2 (en) * | 2007-08-02 | 2009-02-03 | Sekisui Alveo Ag | Synthetic turf system particularly suitable for sports fields, provided with a sports technical layer, as well as such a sports technical layer. |
US20090150259A1 (en) * | 2007-12-09 | 2009-06-11 | Arjun Yetukuri | Collection of Magazine Articles |
JP2009282751A (en) * | 2008-05-22 | 2009-12-03 | Toyota Infotechnology Center Co Ltd | Program inspection system and method |
US8191163B1 (en) * | 2008-06-27 | 2012-05-29 | Sprint Communications Company L.P. | Hybrid streaming and downloading DRM in mobile networks |
KR100897790B1 (en) * | 2008-08-07 | 2009-05-15 | (주)씨디네트웍스 | Method and apparatus for protecting digital contents by using hardware id information |
US20100088746A1 (en) * | 2008-10-08 | 2010-04-08 | Sony Corporation | Secure ebook techniques |
US8788841B2 (en) * | 2008-10-23 | 2014-07-22 | Samsung Electronics Co., Ltd. | Representation and verification of data for safe computing environments and systems |
JP4544366B2 (en) * | 2009-06-22 | 2010-09-15 | ソニー株式会社 | Content using device and information processing method |
JP5051253B2 (en) * | 2010-03-08 | 2012-10-17 | ソニー株式会社 | Content reproduction apparatus and information processing method |
JP5766783B2 (en) * | 2010-03-31 | 2015-08-19 | ローベルト ボツシユ ゲゼルシヤフト ミツト ベシユレンクテル ハフツングRobert Bosch Gmbh | Device for authenticated voice encryption |
US8650283B1 (en) * | 2010-06-07 | 2014-02-11 | Purplecomm Inc. | Content delivery technology |
US8818169B2 (en) * | 2011-03-31 | 2014-08-26 | Sony Dadc Us Inc. | Disc unlock code distribution control via remote physical action and location |
US8938796B2 (en) | 2012-09-20 | 2015-01-20 | Paul Case, SR. | Case secure computer architecture |
TWI602076B (en) * | 2016-05-13 | 2017-10-11 | 矽統科技股份有限公司 | Method for locking audio/voice processing effect and audio receiving device |
Family Cites Families (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4159417A (en) | 1977-10-28 | 1979-06-26 | Rubincam David P | Electronic book |
FR2494465B1 (en) | 1980-11-14 | 1987-02-13 | Epd Engineering Projectdevelop | POCKET COMPUTER |
USD276626S (en) | 1981-09-14 | 1984-12-04 | Lockwood Lawrence B | Combined automatic information terminal and vending machine |
IL64675A0 (en) | 1981-12-30 | 1982-03-31 | Greenberg Avigdor | Data verification system |
US4490810A (en) | 1982-02-16 | 1984-12-25 | Hon David C | Automated instruction, game and data retrieval system |
US4591974A (en) | 1984-01-31 | 1986-05-27 | Technology Venture Management, Inc. | Information recording and retrieval system |
US4575621A (en) | 1984-03-07 | 1986-03-11 | Corpra Research, Inc. | Portable electronic transaction device and system therefor |
JPS60246451A (en) | 1984-05-22 | 1985-12-06 | Sharp Corp | Information protecting device |
USD289777S (en) | 1984-08-13 | 1987-05-12 | Diebold, Incorporated | Credit card actuated terminal for controlling the dispense of motor fuel or similar article |
GB2172177A (en) | 1985-03-06 | 1986-09-10 | Philips Electronic Associated | Electronic information display systems |
US4888798A (en) * | 1985-04-19 | 1989-12-19 | Oms, Inc. | Modular software security |
US5121492A (en) | 1987-03-02 | 1992-06-09 | Meridian Data, Inc. | System for simulating access times of a CD ROM on a hard disk by slowing the operation of the hard disk |
US5203001A (en) | 1987-04-27 | 1993-04-13 | Sharp Kabushiki Kaisha | Portable computer having an updatable table of starting addresses for accessing those stored programs having been previously executed |
US5208665A (en) * | 1987-08-20 | 1993-05-04 | Telaction Corporation | Presentation player for an interactive digital communication system |
US4855725A (en) | 1987-11-24 | 1989-08-08 | Fernandez Emilio A | Microprocessor based simulated book |
US4899292A (en) | 1988-03-02 | 1990-02-06 | Image Storage/Retrieval Systems, Inc. | System for storing and retrieving text and associated graphics |
US5191573A (en) | 1988-06-13 | 1993-03-02 | Hair Arthur R | Method for transmitting a desired digital video or audio signal |
US4916441A (en) | 1988-09-19 | 1990-04-10 | Clinicom Incorporated | Portable handheld terminal |
US5065345A (en) | 1988-11-04 | 1991-11-12 | Dyned International, Inc. | Interactive audiovisual control mechanism |
US5133076A (en) | 1989-06-12 | 1992-07-21 | Grid Systems Corporation | Hand held computer |
US5333116A (en) | 1990-05-04 | 1994-07-26 | Ast Research, Inc. | Combination laptop and pad computer |
US5226080A (en) | 1990-06-22 | 1993-07-06 | Grid Systems Corporation | Method and apparatus for password protection of a computer |
US5091939A (en) | 1990-06-22 | 1992-02-25 | Tandy Corporation | Method and apparatus for password protection of a computer |
US5388196A (en) | 1990-09-07 | 1995-02-07 | Xerox Corporation | Hierarchical shared books with database |
US5963916A (en) | 1990-09-13 | 1999-10-05 | Intouch Group, Inc. | Network apparatus and method for preview of music products and compilation of market data |
USD339329S (en) | 1990-10-09 | 1993-09-14 | New York Telephone Company | Public information access terminal |
USD330544S (en) | 1990-12-17 | 1992-10-27 | Modular Instruments, Inc. | Combined electronic equipment cabinet and controls |
US5221838A (en) | 1990-12-24 | 1993-06-22 | Motorola, Inc. | Electronic wallet |
US6002720A (en) * | 1991-01-07 | 1999-12-14 | H. Lee Browne, D/B/A Greenwich Information Technologies Llc | Audio and video transmission and receiving system |
CN2103831U (en) | 1991-07-12 | 1992-05-06 | 马希光 | Separation type portable electronic computer |
WO1993009490A1 (en) | 1991-11-04 | 1993-05-13 | Vpr Systems Ltd. | Lap-top computer for retrieving and displaying text and graphic information encoded on personal library cd-rom |
US5734823A (en) | 1991-11-04 | 1998-03-31 | Microtome, Inc. | Systems and apparatus for electronic communication and storage of information |
US5506904A (en) * | 1993-08-04 | 1996-04-09 | Scientific-Atlanta, Inc. | System and method for transmitting and receiving variable length authorization control for digital services |
JPH07175868A (en) * | 1993-10-15 | 1995-07-14 | Internatl Business Mach Corp <Ibm> | Method and system for output of digital information to medium |
US5629867A (en) | 1994-01-25 | 1997-05-13 | Goldman; Robert J. | Selection and retrieval of music from a digital database |
US5442789A (en) * | 1994-03-31 | 1995-08-15 | International Business Machines Corporation | System and method for efficiently loading and removing selected functions on digital signal processors without interrupting execution of other functions on the digital signal processors |
DE4413451A1 (en) | 1994-04-18 | 1995-12-14 | Rolf Brugger | Device for the distribution of music information in digital form |
BR9507545A (en) * | 1994-04-28 | 1997-08-05 | Music Vending Inc | Music selling system |
US6005938A (en) * | 1996-12-16 | 1999-12-21 | Scientific-Atlanta, Inc. | Preventing replay attacks on digital information distributed by network service providers |
US5841979A (en) | 1995-05-25 | 1998-11-24 | Information Highway Media Corp. | Enhanced delivery of audio data |
CA2179223C (en) * | 1995-06-23 | 2009-01-06 | Manfred Von Willich | Method and apparatus for controlling the operation of a signal decoder in a broadcasting system |
US5809144A (en) * | 1995-08-24 | 1998-09-15 | Carnegie Mellon University | Method and apparatus for purchasing and delivering digital goods over a network |
US5918213A (en) | 1995-12-22 | 1999-06-29 | Mci Communications Corporation | System and method for automated remote previewing and purchasing of music, video, software, and other multimedia products |
JP3260270B2 (en) * | 1996-01-12 | 2002-02-25 | キヤノン株式会社 | Video input device and video input system |
US6088450A (en) * | 1996-04-17 | 2000-07-11 | Intel Corporation | Authentication system based on periodic challenge/response protocol |
US6141693A (en) * | 1996-06-03 | 2000-10-31 | Webtv Networks, Inc. | Method and apparatus for extracting digital data from a video stream and using the digital data to configure the video stream for display on a television set |
US5926624A (en) * | 1996-09-12 | 1999-07-20 | Audible, Inc. | Digital information library and delivery system with logic for generating files targeted to the playback device |
JP3154325B2 (en) * | 1996-11-28 | 2001-04-09 | 日本アイ・ビー・エム株式会社 | System for hiding authentication information in images and image authentication system |
US5931901A (en) | 1996-12-09 | 1999-08-03 | Robert L. Wolfe | Programmed music on demand from the internet |
JPH10271478A (en) * | 1997-03-26 | 1998-10-09 | Mitsubishi Electric Corp | Satellite broadcasting system |
US6157929A (en) * | 1997-04-15 | 2000-12-05 | Avid Technology, Inc. | System apparatus and method for managing the use and storage of digital information |
US6170060B1 (en) * | 1997-10-03 | 2001-01-02 | Audible, Inc. | Method and apparatus for targeting a digital information playback device |
US5860068A (en) | 1997-12-04 | 1999-01-12 | Petabyte Corporation | Method and system for custom manufacture and delivery of a data product |
US6044471A (en) * | 1998-06-04 | 2000-03-28 | Z4 Technologies, Inc. | Method and apparatus for securing software to reduce unauthorized use |
US5969283A (en) | 1998-06-17 | 1999-10-19 | Looney Productions, Llc | Music organizer and entertainment center |
-
1999
- 1999-03-02 US US09/261,055 patent/US6480961B2/en not_active Expired - Lifetime
- 1999-12-29 JP JP2000602936A patent/JP4540854B2/en not_active Expired - Lifetime
- 1999-12-29 EP EP99967804A patent/EP1166207A4/en not_active Ceased
- 1999-12-29 CA CA002680469A patent/CA2680469A1/en not_active Abandoned
- 1999-12-29 KR KR1020017011131A patent/KR100600203B1/en active IP Right Grant
- 1999-12-29 WO PCT/US1999/031314 patent/WO2000052583A1/en active IP Right Grant
- 1999-12-29 CA CA2364263A patent/CA2364263C/en not_active Expired - Lifetime
- 1999-12-29 AU AU24020/00A patent/AU2402000A/en not_active Abandoned
-
2002
- 2002-06-26 HK HK02104766.2A patent/HK1042967A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
JP2002538703A (en) | 2002-11-12 |
KR20020022640A (en) | 2002-03-27 |
US6480961B2 (en) | 2002-11-12 |
AU2402000A (en) | 2000-09-21 |
CA2364263A1 (en) | 2000-09-08 |
HK1042967A1 (en) | 2002-08-30 |
CA2680469A1 (en) | 2000-09-08 |
US20020004906A1 (en) | 2002-01-10 |
EP1166207A1 (en) | 2002-01-02 |
KR100600203B1 (en) | 2006-07-13 |
EP1166207A4 (en) | 2002-09-18 |
JP4540854B2 (en) | 2010-09-08 |
WO2000052583A1 (en) | 2000-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2364263C (en) | Secure streaming of digital audio/visual content | |
CA2343388C (en) | Cloning protection scheme for a digital information playback device | |
US8473739B2 (en) | Advanced content authentication and authorization | |
US7350228B2 (en) | Method for securing digital content | |
US8175977B2 (en) | License management for digital content | |
RU2449494C2 (en) | Method of multimedia data protection | |
US20070033394A1 (en) | System for identification and revocation of audiovisual titles and replicators | |
US20040010717A1 (en) | Apparatus and method for preventing digital media piracy | |
WO2009042617A1 (en) | Providing local storage service to applications that run in an application execution environment | |
US20090129588A1 (en) | Information processing apparatus | |
US9515834B2 (en) | Content protection continuity through authorized chains of components | |
US20020152396A1 (en) | Method for secure restoration of a database stroring non-secure content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20191230 |