WO1998029869A1 - Access to information using protectable authorization messages - Google Patents
Access to information using protectable authorization messages Download PDFInfo
- Publication number
- WO1998029869A1 WO1998029869A1 PCT/US1997/023441 US9723441W WO9829869A1 WO 1998029869 A1 WO1998029869 A1 WO 1998029869A1 US 9723441 W US9723441 W US 9723441W WO 9829869 A1 WO9829869 A1 WO 9829869A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- valuable information
- authorization message
- receiving devices
- protectable
- legally
- Prior art date
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 73
- 238000004891 communication Methods 0.000 claims description 37
- 238000000034 method Methods 0.000 claims description 19
- 230000004044 response Effects 0.000 claims description 9
- 230000003287 optical effect Effects 0.000 description 4
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000009877 rendering Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B23/00—Record carriers not specific to the method of recording or reproducing; Accessories, e.g. containers, specially adapted for co-operation with the recording or reproducing apparatus ; Intermediate mediums; Apparatus or processes specially adapted for their manufacture
- G11B23/28—Indicating or preventing prior or unauthorised use, e.g. cassettes with sealing or locking means, write-protect devices for discs
- G11B23/283—Security features, e.g. digital codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00188—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
A system for preventing unauthorized use of valuable information (16) using a predetermined authorization message (14) which is protectable under intellectual property laws. The system includes a media access device (10) that enables access to the valuable information (16) which provides the valuable information (16) to a receiving device (12) in the system only if the receiving device (12) produces the predetermined authorization message (14).
Description
ACCESS TO INFORMATION USING PROTECTABLE AUTHORIZATION MESSAGES
Technical Field The present invention pertains to the field of accessing valuable information. More particularly, this invention relates to a method for accessing valuable information using legally protectable authorization messages.
Background Art
Valuable information such as movies, videos, and audio recordings is commonly distributed to consumers using a variety of distribution media including magnetic storage media and optical storage media. Such magnetic storage media includes magnetic tape and magnetic disk media. Such optical storage media includes compact disks, laser disks, minidisks, as well as digital video disks and writeable optical storage disks .
Content providers of such valuable information usually seek to prevent unauthorized use the valuable information distributed on such media. Typically, unauthorized use of such valuable information may be prohibited under the intellectual property protection laws of the United States and other countries. An owner of the intellectual property rights to the valuable information is referred to as a right holder.
For example, unauthorized copying of the valuable information contained on such media may be prohibited under United States and international copyright laws. Movies, videos, and other content distributed on media such as video tape, laser disk and digital video disk are usually protected from unauthorized copying under copyright laws. The right holder of such valuable information nevertheless is faced
with the prospect of preventing violations of their intellectual property rights.
Typically, the prevention of intellectual property right violations is facilitated through formal agreements between the right holders and the manufactures of media recording/playback devices. Under one such prior agreement, a copyright indication is contained on storage media that holds valuable information which is prohibited from being copied. Typically, the manufacturers of authorized media recording/playback devices disable recording functions if the copyright indication is detected while reading the media.
These efforts notwithstanding, third parties often provide devices capable of defeating such agreed safeguards against copying of valuable information. For example, such devices may filter or eliminated the copyright indication as the content of the storage media is read and transferred to a recording device. Typically, right holders seek to cut off the source of such devices to prevent copying of their valuable information.
One way to cut off the source of such devices is to bring legal actions against the providers of such devices for copyright violation. However, a defense to such an action is to argue that such devices are provided for uses other than copying of valuable information. Unfortunately, such a defense may hinder the efforts of right holders seeking to enforce their rights and cut off the supply of such devices.
DISCLOSURE OF THE INVENTION
A system and method is disclosed for preventing unauthorized use of valuable information using legally protectable authorization messages. A media access device that enables access to the valuable information provides the valuable information to a receiving device only if the receiving device produces the legally protectable authorization message. The legally protectable authorization message may be prohibited from unauthorized use under international intellectual property laws of the United States and other countries.
Accordingly, providers of unauthorized devices violate an intellectual property rights in the legally protected authorization message if those devices produce the legally protectable authorization message. For example, an unauthorized device must generate a copyrighted authorization message in order to obtain the valuable information from the media. As a consequence, right holders can more easily show that providers of such unauthorized devices are providing the devices in order to wrongly obtain valuable information from storage media.
Other features and advantages of the present invention will be apparent from the detailed description that follows.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is described with respect to particular exemplary embodiments thereof and reference is accordingly made to the drawings in which:
Figure 1 illustrates a method for preventing unauthorized use of valuable information which is accessed by a media access device;
Figure 2 illustrates a method for preventing unauthorized use of the valuable information in another embodiment;
Figure 3 illustrates a method for preventing unauthorized use of the valuable information in yet another embodiment;
Figure 4 illustrates a system that employs legally protectable authorization messages to prevent unauthorized use of valuable information;
Figure 5 illustrates a media access device in one embodiment;
Figure 6 illustrates a process by which a media access device prevents unauthorized used of valuable information by devices coupled to a communication path.
MODES FOR CARRYING OUT THE INVENTION
Figure 1 illustrates a method for preventing unauthorized use of valuable information 16 which is accessed by a media access device 10. A receiving device 12 transfers a legally protectable authorization message 14 to the media access device 10 via a communication path 20. The media access device 10 receives the legally protectable authorization message 14 and then transfers the valuable information 16 to the receiving device 12 via the communication path 20 if the legally protectable authorization message 14 is provided and is validated by the media access device 10.
Unauthorized use of the legally protectable authorization message 14 may be prohibited under intellectual property laws. If the receiving device 12 is provided by an entity not authorized to use the legally protectable authorization message 14 by the right holder to the legally protectable authorization message 14 then that entity may be liable for violating the intellectual property rights afforded to the right holder regardless of the intended or actual use of the receiving device 12.
In some embodiments, the legally protectable authorization message 14 is a predefined copyrighted message. The predefined copyrighted message includes a copyright notice that specifies the owner of the copyright. In one embodiment, the legally protectable authorization message 14 is an ASCII coded message. In another embodiment, the legally protectable authorization message 14 is an encrypted message.
In some embodiments, the legally protectable authorization message 14 includes a predefined encryption key which is used to decode the valuable information 16. The predefined encryption key is kept secret by the right holder to the legally protectable authorization message 14 and is disclosed only to approved device providers that adhere to the present methods for accessing valuable information. In one embodiment, the predefined encryption key contained in the legally protectable authorization message 14 is ASCII encoded. In another embodiment, the predefined encryption key contained in the legally protectable authorization message 14 is an algorithmic transformation of the actual key such as the actual key minus one.
The media access device 10 represents a wide variety of devices capable of accessing valuable information including media players such as digital video disk or DVD players, laser disk players, compact disk players, CD-ROM players, video tape players, and audio tape players. The media access device 10 also represents computer systems including personal computer systems which are capable of reading information from a variety of media including DVD media, CD-ROM media, as well as other magnetic and optical storage media.
The receiving device 12 represents a wide variety of devices capable of using the valuable information 16 including media recorders such as digital video recorders, video tape recorders, and audio tape recorders. The receiving device 12 also represents devices capable of rendering the valuable information 16 included display devices such as display monitors, video monitors, and television monitors any of which may have audio rendering capabilities. The receiving device 12 also represents computer systems including personal computer systems which
are capable of recording the valuable information 16 or for manipulating the valuable information 16 or for rendering the valuable information 16 via a variety of display mechanisms.
The receiving device 12 also represents devices which are not authorized by the right holder of the message 14 to use the message 14. Such devices may be embodied as any of the devices listed above or specialized devices that are placed between a media access device and another unauthorized receiving device such as any of the receiving devices listed above.
The communication path 20 represents any communication path capable of carrying the legally protectable authorization message 14 and the valuable information 16. The communication path may be embodied in a parallel communication bus structure, a serial communication bus structure, a parallel or serial communication link, a communication network, or an infrared or radio frequency communication link or communication network. The communication path 20 may be a standardized communication path that is provided specifically for carrying the legally protectable authorization message 14 and the valuable information 16 and for enabling access to protected information by authorized devices.
The valuable information 16 may be subdivided into a series of information blocks with each block being encrypted using various encryption methods. Block transformation encryption methods may be used to sufficiently manipulate the content of the valuable information being transferred to prevent viewing or listening without appropriate decryption. The content of the valuable information 16 may also be encoded according to various compression techniques including
MPEG, International Standards Organization SC29 G11, approved compression standards and FCC approved compression standards.
Figure 2 illustrates another method for preventing unauthorized use of the valuable information 16 which is accessed by the media access device 10. The media access device 10 transmits a poll message 22 to the receiving device 12 via the communication path 20. The poll message 22 includes a request authorization message. The receiving device 12 responds to the poll message 22 containing the request authorization message by transferring a response message 24 via the communication path 20 that contains the legally protectable authorization message 14. Any one of a wide variety of known poll/response communication techniques may be used by the media access device 10 to poll the receiving device 12 and other devices coupled to the communication path 20.
The media access device 10 receives the legally protectable authorization message 14 contained in the response message 24 and then logs the receiving device 12 as an authorized receiving device if the legally protectable authorization message 14 is valid. The media access device 10 may transmit the poll message 22 to the receiving device 12 at power up or whenever a media element is inserted into the media access device 10 or whenever the receiving device 12 is first detected on the communication path 12.
At any time, the receiving device 12 transfers a request for information from media message 30 to the media access device 10 via the communication path 20. If the media element in the media access device 10 contains valuable information which may not be used without authorization and
if the receiving device 12 is logged as an authorized receiving device then the media access device 10 responds to the request 30 by transferring the valuable information 16 obtained from the media element via the communication path 20. If the media element in the media access device 10 contains information which may not be used without authorization and if the receiving device 12 is not logged as an authorized receiving device then the media access device 10 either ignores the request 30 or transfers a request denied message to the receiving device 12 via the communication path 20. In one embodiment, the media access device 10 determines whether the media element contains valuable information which may not be used without authorization by reading the media element for an indication of whether the information contained thereon may be used without authorization.
Figure 3 illustrates yet another method for preventing unauthorized use of the valuable information 16 which is accessed by the media access device 10. The receiving device 12 transfers the request message 30 to the media access device 10 via the communication path 20. If the media element in the media access device 10 contains valuable information which may not be used without authorization then the media access device 10 transfers a request authorization message 32 to the receiving device 12 via the communication path 20.
If the receiving device 12 responds to the request message 32 with the legally protectable authorization message 14 then the media access device 10 transfers the valuable information 16 via the communication path 20. If the receiving device 12 does not produce the legally protectable authorization message 14 in response to the request message
32 then the media access device 10 either ignores the request message 30 or transfers a request denied message to the receiving device 12 via the communication path 20.
Figure 4 illustrates a system 50 that employs legally protectable authorization messages to prevent unauthorized use of valuable information. The system 50 includes the media access device 10, a television system 40, a recording system 42, a computer system 44, and a pair of unauthorized receiving devices 46 and 48 all coupled to the communication path 20. Any one or more of the television system 40, the recording system 42, the computer system 44, and the unauthorized receiving devices 46 and 48 may provide the functionality of the receiving device 12 with respect to obtaining valuable information from media being accessed by the media access device 10.
The unauthorized receiving device 46 represents a device that does not produce the legally protectable authorization message 14 when required. The unauthorized receiving device 48 represents a device that does produce the legally protectable authorization message 14 but that is provided by an entity that is not authorized to use the legally protectable authorization message 14 by the owner of the intellectual property rights in the legally protectable authorization message 14. For example, the unauthorized receiving device 48 may be manufactured by an entity not licenced by the owner of the copyright on the legally protectable authorization message 14.
In one embodiment, the media access device 10 sends polling messages to each of the devices 40-48 at power up time or at the time a new media element containing valuable information which may not be used without authorization is
placed into the media access device. The media access device 10 maintains a log of which of the device 40-48 returned the legally protectable authorization message 14 in response to the polling messages. Thereafter, the media access device 10 uses the information in the log to either satisfy or deny any requests for valuable information received from the devices 40-48.
Figure 5 illustrates the media access device 10 in one embodiment. The media access device 10 includes a media access mechanism 60 for reading information from a storage media. The information on the storage media may be valuable information which is protected by copyright laws and which may not be used without authorization. The media access device 10 includes a communication interface 64 which enables transfer of information over the communication path 20 including the valuable information 16 obtained from the storage media and messages used to obtain authorization from the devices 40-48.
The media access device 10 includes a processor 62 that generates messages and that maintains a log of authorized devices in a memory 66. The processor 62 and the memory 66 may in some embodiments be the same processor and memory elements in the media access device 10 which are used to access the storage media.
Figure 6 illustrates a process by which the media access device 10 prevents unauthorized used of valuable information by devices coupled to the communication path 20. At block
100, the processor 62 transfers poll messages to each of the devices 40-48 via the communication path 20. The processor 62 may poll each device individually or may broadcast one poll to all devices via the communication path 20.
At block 102, the processor 62 creates a log of authorized receiving devices. A logged authorized receiving device is a receiving device on the communication path 20 that returned the legally protectable authorization message 14 in response to a poll. This log may be stored in the memory 66.
At block 104, an information request is received from one of the devices 40-48 via the communication path 20. At block 106, the processor 62 determines whether the information request received at block 104 is a request for valuable information which may not be used without authorization. In one embodiment, the media being accessed through the media access mechanism 60 stores an indication of whether the media contains valuable, i.e. copyrighted, information which may not be used without authorization.
If the requested information is not valuable information requiring authorization then at block 108 the processor 62 transfers the requested information to the requesting receiving device via the communication path 20 without regard as to whether the requesting receiving device is an authorized device. Otherwise, control proceeds to block 110.
At block 110, the processor 62 determines whether the requesting receiving device is an authorized receiving device by accessing the log of authorized receiving devices contained in the memory 66. If the requesting receiving device is authorized then the processor 62 transfers the valuable information to the requesting receiving device at block 112. Otherwise, the processor 62 ignores the information request and proceeds back to block 104 to handle a next information request.
In an alternative embodiment, the processor 62 ignores the information request at block 110 if any one or more of the devices 40-48 is unauthorized. This embodiment prevents unauthorized receiving devices from eavesdropping on transactions conducted by other authorized devices coupled to the communication path 20.
The foregoing detailed description of the present invention is provided for the purposes of illustration and is not intended to be exhaustive or to limit the invention to the precise embodiment disclosed. Accordingly, the scope of the present invention is defined by the appended claims.
Claims
1. A system for preventing unauthorized use of valuable information, comprising: receiving device that generates a legally protectable authorization message; media access device that transfers the valuable information to the receiving device in response to the legally protectable authorization message.
2. The system of claim 1, wherein the legally protectable authorization message includes a copyright notice.
3. The system of claim 2, wherein the copyright notice identifies a right holder of the legally protectable authorization message.
4. The system of claim 1, wherein the receiving device and the media access device are coupled to a communication path that carries the legally protectable authorization message and the valuable information.
5. The system of claim 1, wherein the valuable information is contained on a storage media which is read by the media access device.
6. The system of claim 5, wherein the storage media contains an indication that the valuable information may not be used without authorization.
7. The system of claim 6, wherein the media access device does not transfer the valuable information to the receiving device if the indication is present on the storage media unless the receiving device provides the legally protectable authorization message.
8. The system of claim 6, wherein the media access device transfers the valuable information to the receiving device if the indication is not present on the storage media regardless of whether the receiving device provides the legally protectable authorization message.
9. A system for preventing unauthorized use of valuable information, comprising: means for reading the valuable information from a storage media; means for obtaining a legally protectable authorization message from each of a plurality of receiving devices; means for transferring the valuable information to a requesting one of the receiving devices if the requesting one provides the legally protectable authorization message.
10. The system of claim 9, wherein the means for obtaining comprises : means for polling each of the receiving devices; means for logging the receiving devices that produce the legally protectable authorization message.
11. The system of claim 10, wherein the means for reading comprises a media player for reading the storage media.
12. The system of claim 11, wherein the means for polling comprises means for polling the receiving devices in response to the placement of the storage media into the media player.
13. The system of claim 11, wherein the means for polling comprises means for polling the receiving devices in response to the placement of the storage media into the media player if the storage media indicates that the valuable information may not be used without authorization.
14. The system of claim 10, wherein the means for transferring the valuable information comprises means for transferring the valuable information to the requesting one of the receiving devices if the requesting one is logged as one of the receiving devices that produce the legally protectable authorization message.
15. The system of claim 10, wherein the means for transferring the valuable information comprises means for transferring the valuable information to the requesting one of the receiving devices only if all of the receiving devices are logged as receiving devices that produce the legally protectable authorization message.
16. A method for preventing unauthorized use of valuable information, comprising the steps of: reading the valuable information from a storage media; obtaining a legally protectable authorization message from each of a plurality of receiving devices; transferring the valuable information to a requesting one of the receiving devices if the requesting one provides the legally protectable authorization message.
17. The method of claim 16, wherein the step of obtaining comprises the steps of: polling each of the receiving devices; logging the receiving devices that produce the legally protectable authorization message.
18. The method of claim 17, wherein the step of transferring the valuable information comprises the step of transferring the valuable information to the requesting one of the receiving devices if the requesting one is logged as one of the receiving devices that produce the legally protectable authorization message.
19. The method of claim 17, wherein the step of transferring the valuable information comprises the step of transferring the valuable information to the requesting one of the receiving devices only if all of the receiving devices are logged as receiving devices that produce the legally protectable authorization message.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US76821996A | 1996-12-17 | 1996-12-17 | |
US08/768,219 | 1996-12-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998029869A1 true WO1998029869A1 (en) | 1998-07-09 |
Family
ID=25081882
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1997/023441 WO1998029869A1 (en) | 1996-12-17 | 1997-12-17 | Access to information using protectable authorization messages |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO1998029869A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1128381A1 (en) * | 2000-02-28 | 2001-08-29 | Ricoh Company, Ltd. | Recording medium having two different root directory informations respectively stored at two different locations |
EP1379936A2 (en) * | 2001-03-28 | 2004-01-14 | Cryptography Research Inc. | Content security layer providing long-term renewable security |
EP1942391A1 (en) * | 2001-03-28 | 2008-07-09 | Macrovision Corporation | Computer-readable medium, device and method for playing encrypted digital video |
US7984511B2 (en) | 2001-03-28 | 2011-07-19 | Rovi Solutions Corporation | Self-protecting digital content |
US8055910B2 (en) | 2003-07-07 | 2011-11-08 | Rovi Solutions Corporation | Reprogrammable security for controlling piracy and enabling interactive content |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5412718A (en) * | 1993-09-13 | 1995-05-02 | Institute Of Systems Science | Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information |
US5416840A (en) * | 1993-07-06 | 1995-05-16 | Phoenix Technologies, Ltd. | Software catalog encoding method and system |
US5453968A (en) * | 1989-09-21 | 1995-09-26 | U.S. Philips Corporation | Methods of and information recording devices for recording and/or inhibiting recording of an information signal having copy bits with logic values which alternate in accordance with a pattern |
US5570339A (en) * | 1993-07-22 | 1996-10-29 | Victor Company Of Japan, Ltd. | Optical disc and a recording and/or reproducing apparatus having copy-protection function |
US5651064A (en) * | 1995-03-08 | 1997-07-22 | 544483 Alberta Ltd. | System for preventing piracy of recorded media |
US5661703A (en) * | 1995-06-27 | 1997-08-26 | Fujitsu Limited | Optical recording medium having a non-volatile identification code and method for encoding data using same |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
-
1997
- 1997-12-17 WO PCT/US1997/023441 patent/WO1998029869A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5453968A (en) * | 1989-09-21 | 1995-09-26 | U.S. Philips Corporation | Methods of and information recording devices for recording and/or inhibiting recording of an information signal having copy bits with logic values which alternate in accordance with a pattern |
US5416840A (en) * | 1993-07-06 | 1995-05-16 | Phoenix Technologies, Ltd. | Software catalog encoding method and system |
US5570339A (en) * | 1993-07-22 | 1996-10-29 | Victor Company Of Japan, Ltd. | Optical disc and a recording and/or reproducing apparatus having copy-protection function |
US5412718A (en) * | 1993-09-13 | 1995-05-02 | Institute Of Systems Science | Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5651064A (en) * | 1995-03-08 | 1997-07-22 | 544483 Alberta Ltd. | System for preventing piracy of recorded media |
US5661703A (en) * | 1995-06-27 | 1997-08-26 | Fujitsu Limited | Optical recording medium having a non-volatile identification code and method for encoding data using same |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1128381A1 (en) * | 2000-02-28 | 2001-08-29 | Ricoh Company, Ltd. | Recording medium having two different root directory informations respectively stored at two different locations |
US7092949B2 (en) | 2000-02-28 | 2006-08-15 | Ricoh Company, Ltd. | Recording medium having a plurality of sections storing root directory information |
EP1379936A2 (en) * | 2001-03-28 | 2004-01-14 | Cryptography Research Inc. | Content security layer providing long-term renewable security |
EP1379936A4 (en) * | 2001-03-28 | 2005-05-04 | Cryptography Res Inc | Content security layer providing long-term renewable security |
EP1942391A1 (en) * | 2001-03-28 | 2008-07-09 | Macrovision Corporation | Computer-readable medium, device and method for playing encrypted digital video |
US7984511B2 (en) | 2001-03-28 | 2011-07-19 | Rovi Solutions Corporation | Self-protecting digital content |
US7987510B2 (en) | 2001-03-28 | 2011-07-26 | Rovi Solutions Corporation | Self-protecting digital content |
US7996913B2 (en) | 2001-03-28 | 2011-08-09 | Rovi Solutions Corporation | Self-protecting digital content |
US8949624B2 (en) | 2001-03-28 | 2015-02-03 | Irdeto Usa, Inc. | Method and system for secure access to non-volatile memory |
US8055910B2 (en) | 2003-07-07 | 2011-11-08 | Rovi Solutions Corporation | Reprogrammable security for controlling piracy and enabling interactive content |
US8131646B2 (en) | 2003-07-07 | 2012-03-06 | Rovi Solutions Corporation | Reprogrammable security for controlling piracy and enabling interactive content using revocation status |
US8571993B2 (en) | 2003-07-07 | 2013-10-29 | Irdeto Usa, Inc. | Reprogrammable security for controlling piracy and enabling interactive content |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100277418B1 (en) | Copy Protection System for Multimedia Devices | |
US7260557B2 (en) | Method and apparatus for license distribution | |
KR100718598B1 (en) | Method of and apparatus for providing secure communication of digital data between devices | |
US8234217B2 (en) | Method and system for selectively providing access to content | |
RU2345497C2 (en) | Method of local networking and control thereof | |
KR100982166B1 (en) | Digital rights management method and system | |
US6832318B1 (en) | Method and apparatus for secure distribution of information recorded on fixed media | |
US20040010717A1 (en) | Apparatus and method for preventing digital media piracy | |
US7440574B2 (en) | Content encryption using programmable hardware | |
US20050168323A1 (en) | Security modules for conditional access with restrictions | |
US20080235810A1 (en) | Method of Authorizing Access to Content | |
US6499106B1 (en) | Method and apparatus for secure distribution of information recorded of fixed media | |
KR101407139B1 (en) | Method of recording and securely distributing digital data, access device and recorder | |
US20030091187A1 (en) | Apparatus and method for reading or writing user data | |
US20080260351A1 (en) | Recording of Protected Broadcast Content with Selectable User Rights | |
US20060277415A1 (en) | Content protection method and system | |
JP3846230B2 (en) | Content information authentication playback device | |
WO1998029869A1 (en) | Access to information using protectable authorization messages | |
CN1161923C (en) | Updating a revocation list to foil an adversary | |
JP2005032248A (en) | Multimedia storage device having area for digital writing use only | |
JP4213501B2 (en) | Data communication system and data communication method | |
KR20030060449A (en) | Method And Apparatus for exchanging data between external device and TV set | |
AU2002367530A1 (en) | Apparatus and method for preventing digital media piracy | |
MXPA06008255A (en) | Method of authorizing access to content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): BR CA JP KR MX AM AZ BY KG KZ MD RU TJ TM |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |