WO2000004713A1 - Method and system for preventing unauthorized playback of broadcasted digital data streams - Google Patents

Method and system for preventing unauthorized playback of broadcasted digital data streams Download PDF

Info

Publication number
WO2000004713A1
WO2000004713A1 PCT/EP1999/004773 EP9904773W WO0004713A1 WO 2000004713 A1 WO2000004713 A1 WO 2000004713A1 EP 9904773 W EP9904773 W EP 9904773W WO 0004713 A1 WO0004713 A1 WO 0004713A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital data
ticket
data stream
watermark
playback
Prior art date
Application number
PCT/EP1999/004773
Other languages
French (fr)
Inventor
Michael A. Epstein
Michael Pasieka
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to JP2000560725A priority Critical patent/JP2002521876A/en
Priority to EP99934617A priority patent/EP1018266A1/en
Priority to KR1020007002950A priority patent/KR20010024179A/en
Publication of WO2000004713A1 publication Critical patent/WO2000004713A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark

Definitions

  • the present invention relates generally to broadcast transmissions and, in particular, to a method and system for preventing unauthorized playback of broadcasted digital data streams.
  • Copyright protection is the ability to prevent or deter the proliferation of unauthorized copies of copyrighted works.
  • a significant problem in the digital world is that an unlimited number of perfect copies may be made from any piece of digital or digitized content.
  • a perfect copy means that if the original is comprised of a given stream of numbers, then the copy matches the original, exactly, for each number in the stream. Thus, there is no degradation of the original signal during the copy operation. In an analog copy, random noise is always introduced, which degrades the copied signal.
  • Piracy has been committed for the purpose of either profit (e.g., selling such unlicensed copies) or to procure a copy of the content for personal use without having to pay for it.
  • the definition of piracy has also been extended to cover the situation when copies of protected materials are distributed without profit.
  • the problem of piracy is worse for digital content. This is because once a pirate finds a way to defeat any existing protection schemes implemented to guard against piracy, he may then make an unlimited number of copies without any degradation in the quality of the copies.
  • analog world there is generally a degradation in the content (signal) with each successive copy, thereby imposing a sort of natural limit on the volume of piracy.
  • Encryption scrambles the content which, once it has been encrypted, cannot be used until it is decrypted or unscrambled.
  • encrypted video may appear as random patterns on a screen.
  • the principle of encryption is that you are free to make as many copies as you desire, but you cannot view anything which is coherent until you decrypt it using a special key. The key is obtained upon paying for the protected content.
  • encryption schemes are not without deficiency. For example, a pirate could buy a single, encrypted copy of some content, which he is entitled to decrypt. Then, the pirate could make unlimited copies of the decrypted copy.
  • Copy protection includes various methods by which a software engineer can write software so as to determine if it has been copied and, if so, to deactivate itself. However, this scheme has been pretty much abandoned since such methods have historically been circumvented.
  • Content extension refers to any system which attaches some extra information to the original content which indicates whether or not a copy may be made.
  • a software or hardware system must be specifically built around this scheme to recognize the additional information and interpret it in an appropriate manner. Such software or hardware is generally referred to as being "compliant" with the scheme.
  • An example of a content extension system is the Serial Copyright Management System embedded in Digital Audio Tape (DAT) hardware. Under this system, additional information is stored on the disc immediately preceding each track of audio content which indicates whether or not it can be copied. The hardware reads this information and uses is accordingly.
  • DAT Digital Audio Tape
  • a watermark may be incorporated into content to be protected through the use of a watermark.
  • the idea behind a watermark is that it should not be able to be removed from the item it corresponds to without actually destroying that item.
  • a digital watermark is a imperceptible or preferably invisible identification code that is permanently embedded in the data and, thus, remains present within the data after any decryption process.
  • copyright protection techniques implementing watermarking have also been historically defeated. For example, many techniques implementing watermarking have been defeated by a technique referred to as averaging. Moreover, some watermarking techniques may be defeated by simply ignoring the watermark (i.e., by not complying with the watermarking scheme).
  • FIG. 1 is a block diagram of a conventional digital television 100.
  • the television 100 includes: a receiver 102; a conditional access (CA) module 104; and a bus 106 operatively connecting receiver 102 and CA module 104.
  • CA conditional access
  • a signal is extracted from the airwaves via an antenna 108 and input to receiver 102.
  • the receiver 102 forwards the signal to CA module 104 which decrypts the signal and then forwards the decrypted signal back to receiver 102.
  • CA module 104 Since bus 106 could be potentially tapped, a non-compliant recorder/player could masquerade as receiver 102 and make a bit-for-bit copy of, for example, a pay-per-view program, on this bus. Thus, the bit-for-bit copy would be made after the signal has been decrypted by CA module 104.
  • the non-compliant recorder/player could then masquerade as CA module 104 so that the illicitly recorded program is displayed on receiver 102. In such a case, receiver 102 is sent decrypted content (by the non-compliant recorder/player) and assumes the content is legitimate. Additionally, the recording can be transmitted to a network of non-compliant playback devices.
  • a method for preventing unauthorized playback of digital data streams comprises the steps of: embedding a watermark in a digital data stream; encrypting the digital data stream having the embedded watermark; broadcasting the encrypted digital data stream with a ticket; receiving the encrypted digital data stream and the ticket; saving the ticket and providing the encrypted digital data stream to a decryption device to decrypt the digital data stream; receiving the decrypted digital data stream from the decryption device; extracting the watermark from the decrypted digital data stream; applying a one-way cryptographic hashing function to the saved ticket; comparing the hashed ticket to the extracted watermark; and preventing playback of the digital data stream, when the hashed ticket does not match the extracted watermark.
  • a system for preventing unauthorized playback of broadcasted digital data streams comprises: a bus; a conditional access module operatively coupled to the bus configured for decrypting encrypted digital data streams; a receiver operatively coupled to the bus configured for receiving an encrypted digital data stream having a watermark embedded therein and a ticket, saving the ticket, providing the encrypted digital data stream to the conditional access module, and receiving a decrypted digital data stream from the conditional access module, the receiver comprising: an extractor configured for extracting the watermark from the decrypted digital data stream; a hashing module configured for applying a one-way cryptographic hashing function to the saved ticket; and a comparison module configured for comparing the hashed ticket to the extracted watermark; and an inhibitor configured for preventing playback of the digital data stream when the hashed ticket does not match the extracted watermark.
  • FIG. 1 is a block diagram of a conventional digital television
  • FIG. 2 is a block diagram of a digital television that prevents unauthorized playback of digital data streams in accordance with an embodiment of the present invention.
  • FIG. 3 is a block diagram illustrating a method for preventing unauthorized playback of digital data streams in accordance with an embodiment of the present invention.
  • the present invention is directed to a method and system for preventing unauthorized playback of digital data streams which are legally broadcast, such as, for example, pay-per-view programs.
  • a playback device such as, for example, a digital television, tests the copyright status of received content and refuses to play such content if it is determined to be illegally obtained (e.g., from an unauthorized copy and not a live broadcast).
  • the system and method of the present invention rely upon a digital watermark and a reference mechanism referred to herein as a "ticket".
  • Both the digital watermark and the ticket reflect various copy protection states.
  • the digital watermark, or rather the copy protection state reflected by the digital watermark is fixed.
  • the ticket, or rather the copy protection state reflected by the ticket is (cryptographically) modified as the content it is associated with is processed (e.g., played, recorded, or passed through).
  • the digital watermark is compared to the ticket. If the ticket checks against the watermark, the content may be displayed or recorded in accordance with the copy protection state. However, if the watermark and ticket do not correspond to one another, then the content is not displayable or recordable.
  • a playback control method for physical media e.g., digital video disks (DVDs) which uses digital watermarking and a ticket is described in the article "Philips Electronics Response to Call for Proposals Issued by the Data Hiding Subgroup Copy Protection Technical Working Group", by Linnartz et al., October 16, 1997.
  • the Linnartz article also describes two illustrative methods for embedding watermarks in digital data. These two methods may also be used to embed watermarks in digital video streams according to the present invention.
  • the first method embeds the watermark in the Motion Picture Expert Group (MPEG) coding of the digital video stream.
  • the second method embeds the watermark in the pixel data of the digital video stream.
  • MPEG Motion Picture Expert Group
  • methods other than the two described above may be used in accordance with the present invention. Accordingly, the above two methods and their corresponding advantages and disadvantages are not described herein in further detail herein.
  • the copy protection states used in accordance with an embodiment of the present invention are shown in Table 1. However, it is to be appreciated that the present invention is not limited to those copy protection states and other copy protection states may be used.
  • FIG. 2 is a block diagram of a digital television that prevents unauthorized playback of digital data streams (e.g., digital video streams) in accordance with an embodiment of the present invention. It is to be appreciated that while the present invention is described with reference to a digital television, it may be implemented in any playback device (e.g., analog or digital) to prevent unauthorized playback of copyrighted content (e.g., digital video or audio content).
  • any playback device e.g., analog or digital
  • the digital television 200 includes a receiver 202, a conditional access (CA) module 204, and a bus 206 for operatively coupling receiver 202 and CA module 204.
  • the receiver 202 includes: a hashing module 210; an extractor 212; a comparison module 214; and an inhibitor 216.
  • the bus 206 is intended to be identical to the bus 106 of FIG. 1.
  • receiver 202 receives a signal via an antenna 218.
  • devices other than an antenna may used such as, for example, a satellite dish.
  • the signal may be provided directly to receiver 202 via a cable or other direct transmission means.
  • receiver 202 Upon receiving the signal via antenna 218, receiver 202 forwards the signal to CA module 204 which decrypts the signal and then forwards the decrypted signal back to receiver 202.
  • CA module 204 Upon the purposes of this description, the following presumptions are made: receiver 202 is compliant (i.e., able to read a watermark and honor a set of rules for licensing the received content (the copy protection states)); CA module 204 is secure; and bus 206 is insecure (e.g., subject to tapping). As stated above, since bus 206 could be potentially tapped, a non-compliant recorder/player could masquerade as receiver 202 and make a bit-for-bit copy of, for example, a pay-per-view program, on this bus.
  • bit-for-bit copy would be made after the signal has been decrypted by CA module 204.
  • the non-compliant recorder/player could then masquerade as CA module 204 so that the illicitly recorded program is displayed on receiver 202.
  • receiver 202 is sent decrypted content (by the non-compliant recorder/player) and assumes the content is legitimate.
  • the recording can be transmitted to a network of non-compliant playback devices.
  • the present invention provides a reference "ticket" to prevent compliant receiver 202 from being fooled into accepting content that is not currently being broadcast.
  • An implementation of this ticket is shown in FIG. 3, which is a block diagram illustrating a method for preventing unauthorized playback of digital data streams in accordance with an embodiment of the present invention.
  • a watermark is embedded into the content to be protected (step 300).
  • the watermark indicates the copy protection state of the content.
  • the content is watermarked as Copy-Never.
  • the content (and watermark) is then encrypted (step 302).
  • the MPEG transport packets containing the content (and watermark) are encrypted.
  • the encrypted content and a ticket are then broadcasted (step 304).
  • the ticket is sent as un-encrypted private MPEG data.
  • the content and ticket are extracted from the airwaves via antenna 218 and input to receiver 202 of television 200 (step 306).
  • the receiver 202 saves the un-encrypted ticket in store 218 and sends the encrypted content to CA module 204.
  • the CA module 106 then decrypts the content and sends the decrypted content back to receiver 202 (step 308).
  • the extractor 212 of receiver 202 extracts the watermark from the content (step 310).
  • Hashing module 210 of receiver 202 applies a one-way cryptographic hashing function to the ticket twice (step 312).
  • the hashed ticket is then - compared to the watermark by comparison module 214 (step 314). If the hashed ticket and the watermark match, then the content is displayed (step 316). On the other hand, if the hashed ticket and the watermark do not match, then inhibitor 216 prevents the content from being displayed (step 318).
  • the inhibitor 216 may be realized as hardware or software (e.g., a piece of code which prevents/allows playback based on the result of comparison module 214.
  • Inhibitor 216 prevents receiver 202 from displaying content which is put onto bus 206 (between CA module 204 and receiver 202) by a non-compliant playback device.
  • Non-compliant playback of the decrypted content onto this bus fails due to receiver 202 not receiving a ticket from an originally broadcasted digital video stream prior to receiving the content from CA module 204. Since receiver 202 does not have a ticket, no check of the extracted watermark can be performed. Further, since the watermark indicates that the content is Copy-Never and no ticket has been saved from an original broadcast of the digital video stream, receiver 202 refuses to display the content.
  • digital information stored on physical media such as, for example, a digital video disc (DVD) may contain a "physical" mark which at least distinguishes between ROM and RAM disks.
  • the physical mark may pertain to a track unavailable to the user for the purpose of playing, but rather only available to the player for the purpose of determining the copy protection state of the disk (or a particular track(s)).
  • a broadcasted digital video stream may similarly have a "physical" mark associated therewith comprised of a sequence of numbers. It is the physical mark which is used to generate the ticket. That is, the ticket results by applying a one-way cryptographic hashing function twice to the physical mark.
  • the hashing function is applied to the ticket twice in the above example, the hashing function may be applied to the ticket any number of times to generate the watermark. It is to be further appreciated that the ticket that is acquired from the broadcast stream can optionally be destroyed. This may be done after a predefined period of time using, for example, a count down counter or a real time clock. Alternatively, the ticket may be destroyed after power to the television is turned off.
  • Use of a (cryptographic) reference ticket according to the present invention provides a significantly secure method for preventing unauthorized playback of digital data streams.
  • the playback of programs and services restricted to those who have paid for the same may be controlled.
  • piracy of such programs and services may be thwarted.
  • preventing such piracy may conceivably result in the previously pirated content being provided to legitimate consumers at a lower cost.

Abstract

A method and system are provided for preventing the unauthorized playback of broadcasted digital data streams. The method includes the step of embedding a watermark in a digital data stream. The digital data stream having the embedded watermark is encrypted. The encrypted digital data stream is broadcasted with a ticket. The encrypted digital data stream and the ticket are received. The ticket is saved and the encrypted digital data stream is provided to a decryption device to decrypt the digital data stream. The decrypted digital data stream is received from the decryption device. The watermark is extracted from the decrypted digital data stream. A one-way cryptographic hashing function is applied to the saved ticket. The hashed ticket is compared to the extracted watermark. Playback of the digital data stream is prevented, when the hashed ticket does not match the extracted watermark.

Description

Method and system for preventing unauthorized playback of broadcasted digital data streams.
The present invention relates generally to broadcast transmissions and, in particular, to a method and system for preventing unauthorized playback of broadcasted digital data streams.
In the current environment of networks and with the proliferation of digital and digitized multimedia content which may be distributed over such networks, a key issue is copyright protection. Copyright protection is the ability to prevent or deter the proliferation of unauthorized copies of copyrighted works. A significant problem in the digital world is that an unlimited number of perfect copies may be made from any piece of digital or digitized content. A perfect copy means that if the original is comprised of a given stream of numbers, then the copy matches the original, exactly, for each number in the stream. Thus, there is no degradation of the original signal during the copy operation. In an analog copy, random noise is always introduced, which degrades the copied signal.
The act of making unlicensed copies of some content, whether digital or analog, audio, video, software of other, is generally referred to as piracy. Piracy has been committed for the purpose of either profit (e.g., selling such unlicensed copies) or to procure a copy of the content for personal use without having to pay for it. The definition of piracy has also been extended to cover the situation when copies of protected materials are distributed without profit. The problem of piracy is worse for digital content. This is because once a pirate finds a way to defeat any existing protection schemes implemented to guard against piracy, he may then make an unlimited number of copies without any degradation in the quality of the copies. On the other hand, in the analog world, there is generally a degradation in the content (signal) with each successive copy, thereby imposing a sort of natural limit on the volume of piracy.
In general, three approaches have been implemented to protect copyrights. They are encryption (the process of encoding data for security purposes), copy protection, and content extensions. Copy protection and content extensions generally apply to the digital world, while a scheme related to encryption, typically referred to as scrambling, may be applied to an analog signal. This is commonly found in analog cable systems.
Encryption scrambles the content which, once it has been encrypted, cannot be used until it is decrypted or unscrambled. For example, encrypted video may appear as random patterns on a screen. The principle of encryption is that you are free to make as many copies as you desire, but you cannot view anything which is coherent until you decrypt it using a special key. The key is obtained upon paying for the protected content. However, encryption schemes are not without deficiency. For example, a pirate could buy a single, encrypted copy of some content, which he is entitled to decrypt. Then, the pirate could make unlimited copies of the decrypted copy.
Copy protection includes various methods by which a software engineer can write software so as to determine if it has been copied and, if so, to deactivate itself. However, this scheme has been pretty much abandoned since such methods have historically been circumvented. Content extension refers to any system which attaches some extra information to the original content which indicates whether or not a copy may be made. A software or hardware system must be specifically built around this scheme to recognize the additional information and interpret it in an appropriate manner. Such software or hardware is generally referred to as being "compliant" with the scheme. An example of a content extension system is the Serial Copyright Management System embedded in Digital Audio Tape (DAT) hardware. Under this system, additional information is stored on the disc immediately preceding each track of audio content which indicates whether or not it can be copied. The hardware reads this information and uses is accordingly.
Information, such as that added in a content extension scheme, may be incorporated into content to be protected through the use of a watermark. The idea behind a watermark is that it should not be able to be removed from the item it corresponds to without actually destroying that item. In the digital domain, a digital watermark is a imperceptible or preferably invisible identification code that is permanently embedded in the data and, thus, remains present within the data after any decryption process. Unfortunately, copyright protection techniques implementing watermarking have also been historically defeated. For example, many techniques implementing watermarking have been defeated by a technique referred to as averaging. Moreover, some watermarking techniques may be defeated by simply ignoring the watermark (i.e., by not complying with the watermarking scheme). The above problems are compounded by the proliferation of digital devices. For example, digital televisions (e.g., high definition television (HDTV)) are now being developed and marketed which enable playback of input digital signals, as compared to conventional televisions which receive an analog input signal. FIG. 1 is a block diagram of a conventional digital television 100. The television 100 includes: a receiver 102; a conditional access (CA) module 104; and a bus 106 operatively connecting receiver 102 and CA module 104.
In operation, a signal is extracted from the airwaves via an antenna 108 and input to receiver 102. The receiver 102 forwards the signal to CA module 104 which decrypts the signal and then forwards the decrypted signal back to receiver 102. Since bus 106 could be potentially tapped, a non-compliant recorder/player could masquerade as receiver 102 and make a bit-for-bit copy of, for example, a pay-per-view program, on this bus. Thus, the bit-for-bit copy would be made after the signal has been decrypted by CA module 104. The non-compliant recorder/player could then masquerade as CA module 104 so that the illicitly recorded program is displayed on receiver 102. In such a case, receiver 102 is sent decrypted content (by the non-compliant recorder/player) and assumes the content is legitimate. Additionally, the recording can be transmitted to a network of non-compliant playback devices.
Thus, it would be desirable and highly advantageous to have a method and system for preventing unauthorized playback of broadcasted data streams such as digital video streams.
The present invention is directed to a method and system for preventing unauthorized playback of digital data streams. In one aspect of the present invention, a method for preventing unauthorized playback of digital data streams comprises the steps of: embedding a watermark in a digital data stream; encrypting the digital data stream having the embedded watermark; broadcasting the encrypted digital data stream with a ticket; receiving the encrypted digital data stream and the ticket; saving the ticket and providing the encrypted digital data stream to a decryption device to decrypt the digital data stream; receiving the decrypted digital data stream from the decryption device; extracting the watermark from the decrypted digital data stream; applying a one-way cryptographic hashing function to the saved ticket; comparing the hashed ticket to the extracted watermark; and preventing playback of the digital data stream, when the hashed ticket does not match the extracted watermark. In another aspect of the present invention, a system for preventing unauthorized playback of broadcasted digital data streams comprises: a bus; a conditional access module operatively coupled to the bus configured for decrypting encrypted digital data streams; a receiver operatively coupled to the bus configured for receiving an encrypted digital data stream having a watermark embedded therein and a ticket, saving the ticket, providing the encrypted digital data stream to the conditional access module, and receiving a decrypted digital data stream from the conditional access module, the receiver comprising: an extractor configured for extracting the watermark from the decrypted digital data stream; a hashing module configured for applying a one-way cryptographic hashing function to the saved ticket; and a comparison module configured for comparing the hashed ticket to the extracted watermark; and an inhibitor configured for preventing playback of the digital data stream when the hashed ticket does not match the extracted watermark.
These and other aspects, features and advantages of the present invention will become apparent from the following detailed description of preferred embodiments, which is to be read in connection with the accompanying drawings.
FIG. 1 is a block diagram of a conventional digital television;
FIG. 2 is a block diagram of a digital television that prevents unauthorized playback of digital data streams in accordance with an embodiment of the present invention; and
FIG. 3 is a block diagram illustrating a method for preventing unauthorized playback of digital data streams in accordance with an embodiment of the present invention. The present invention is directed to a method and system for preventing unauthorized playback of digital data streams which are legally broadcast, such as, for example, pay-per-view programs. In its most basic form, a playback device such as, for example, a digital television, tests the copyright status of received content and refuses to play such content if it is determined to be illegally obtained (e.g., from an unauthorized copy and not a live broadcast).
To this end, the system and method of the present invention rely upon a digital watermark and a reference mechanism referred to herein as a "ticket". Both the digital watermark and the ticket reflect various copy protection states. The digital watermark, or rather the copy protection state reflected by the digital watermark, is fixed. However, the ticket, or rather the copy protection state reflected by the ticket, is (cryptographically) modified as the content it is associated with is processed (e.g., played, recorded, or passed through). When content is to be played or recorded, the digital watermark is compared to the ticket. If the ticket checks against the watermark, the content may be displayed or recorded in accordance with the copy protection state. However, if the watermark and ticket do not correspond to one another, then the content is not displayable or recordable.
A playback control method for physical media (e.g., digital video disks (DVDs)) which uses digital watermarking and a ticket is described in the article "Philips Electronics Response to Call for Proposals Issued by the Data Hiding Subgroup Copy Protection Technical Working Group", by Linnartz et al., October 16, 1997. The Linnartz article also describes two illustrative methods for embedding watermarks in digital data. These two methods may also be used to embed watermarks in digital video streams according to the present invention.
The first method embeds the watermark in the Motion Picture Expert Group (MPEG) coding of the digital video stream. The second method embeds the watermark in the pixel data of the digital video stream. However, as the method for embedding the watermark into the digital video stream is not critical to the present invention, methods other than the two described above may be used in accordance with the present invention. Accordingly, the above two methods and their corresponding advantages and disadvantages are not described herein in further detail herein.
The copy protection states used in accordance with an embodiment of the present invention are shown in Table 1. However, it is to be appreciated that the present invention is not limited to those copy protection states and other copy protection states may be used.
Figure imgf000008_0001
TABLE 1
The above four copy protection states allow for two categories of watermarks according to the embodiment of the present invention. That is, either the watermark classifies the content as "Copy-Once" or "Copy-No-More" or the watermark classifies the content as "Copy-Never". Distinction between "Copy-Once" and "Copy-No-More" is made by the ticket, as explained hereinbelow. "Copy-Freely" is implemented by the absence of a watermark. FIG. 2 is a block diagram of a digital television that prevents unauthorized playback of digital data streams (e.g., digital video streams) in accordance with an embodiment of the present invention. It is to be appreciated that while the present invention is described with reference to a digital television, it may be implemented in any playback device (e.g., analog or digital) to prevent unauthorized playback of copyrighted content (e.g., digital video or audio content).
The digital television 200 includes a receiver 202, a conditional access (CA) module 204, and a bus 206 for operatively coupling receiver 202 and CA module 204. The receiver 202 includes: a hashing module 210; an extractor 212; a comparison module 214; and an inhibitor 216. The bus 206 is intended to be identical to the bus 106 of FIG. 1. In the embodiment, receiver 202 receives a signal via an antenna 218. However, devices other than an antenna may used such as, for example, a satellite dish. Moreover, the signal may be provided directly to receiver 202 via a cable or other direct transmission means. Upon receiving the signal via antenna 218, receiver 202 forwards the signal to CA module 204 which decrypts the signal and then forwards the decrypted signal back to receiver 202. For the purposes of this description, the following presumptions are made: receiver 202 is compliant (i.e., able to read a watermark and honor a set of rules for licensing the received content (the copy protection states)); CA module 204 is secure; and bus 206 is insecure (e.g., subject to tapping). As stated above, since bus 206 could be potentially tapped, a non-compliant recorder/player could masquerade as receiver 202 and make a bit-for-bit copy of, for example, a pay-per-view program, on this bus. Thus, the bit-for-bit copy would be made after the signal has been decrypted by CA module 204. The non-compliant recorder/player could then masquerade as CA module 204 so that the illicitly recorded program is displayed on receiver 202. In such a case, receiver 202 is sent decrypted content (by the non-compliant recorder/player) and assumes the content is legitimate. Additionally, the recording can be transmitted to a network of non-compliant playback devices.
Advantageously, the present invention provides a reference "ticket" to prevent compliant receiver 202 from being fooled into accepting content that is not currently being broadcast. An implementation of this ticket is shown in FIG. 3, which is a block diagram illustrating a method for preventing unauthorized playback of digital data streams in accordance with an embodiment of the present invention.
Initially, a watermark is embedded into the content to be protected (step 300). The watermark indicates the copy protection state of the content. In the embodiment of FIG. 3, the content is watermarked as Copy-Never.
The content (and watermark) is then encrypted (step 302). In the case of MPEG video, the MPEG transport packets containing the content (and watermark) are encrypted. The encrypted content and a ticket are then broadcasted (step 304). In the case of MPEG video, the ticket is sent as un-encrypted private MPEG data. The content and ticket are extracted from the airwaves via antenna 218 and input to receiver 202 of television 200 (step 306). The receiver 202 saves the un-encrypted ticket in store 218 and sends the encrypted content to CA module 204. The CA module 106 then decrypts the content and sends the decrypted content back to receiver 202 (step 308). The extractor 212 of receiver 202 extracts the watermark from the content (step 310). Hashing module 210 of receiver 202 applies a one-way cryptographic hashing function to the ticket twice (step 312). A one-way cryptographic hashing function is an algorithm that generates a fixed string of numbers from a text message such that it is very difficult to turn the fixed string back into the text message. For example, given M, it is easy to compute h. Given h it is hard to compute M such that H(M)=h. Given M, it is hard to find another message, M', such that H(M) = H(M'). For a more detailed description of one-way hash functions, see "Applied Cryptography", Bruce Schneier, John Wiley & Sons, Inc. (1996). The hashed ticket is then - compared to the watermark by comparison module 214 (step 314). If the hashed ticket and the watermark match, then the content is displayed (step 316). On the other hand, if the hashed ticket and the watermark do not match, then inhibitor 216 prevents the content from being displayed (step 318). The inhibitor 216 may be realized as hardware or software (e.g., a piece of code which prevents/allows playback based on the result of comparison module 214.
Inhibitor 216 prevents receiver 202 from displaying content which is put onto bus 206 (between CA module 204 and receiver 202) by a non-compliant playback device. Non-compliant playback of the decrypted content onto this bus fails due to receiver 202 not receiving a ticket from an originally broadcasted digital video stream prior to receiving the content from CA module 204. Since receiver 202 does not have a ticket, no check of the extracted watermark can be performed. Further, since the watermark indicates that the content is Copy-Never and no ticket has been saved from an original broadcast of the digital video stream, receiver 202 refuses to display the content.
The following designations are used to implement the present invention:
P Physical Mark
T Ticket in the current state W Watermark (or P hashed four times)
A description of the physical mark will now be given. In general, digital information stored on physical media such as, for example, a digital video disc (DVD) may contain a "physical" mark which at least distinguishes between ROM and RAM disks. The physical mark may pertain to a track unavailable to the user for the purpose of playing, but rather only available to the player for the purpose of determining the copy protection state of the disk (or a particular track(s)). As the physical mark is represented by a sequence of numbers, a broadcasted digital video stream may similarly have a "physical" mark associated therewith comprised of a sequence of numbers. It is the physical mark which is used to generate the ticket. That is, the ticket results by applying a one-way cryptographic hashing function twice to the physical mark. This is done prior to broadcasting the digital video stream as the ticket is broadcasted with the video stream. Further, as stated above, before the ticket is compared to the watermark (in receiver 202), a one-way cryptographic hashing function is applied twice to the ticket to generate the watermark. This may be represented by the following: T = H(H(P)), W = H(H(T))
It is to be appreciated that while the hashing function is applied to the ticket twice in the above example, the hashing function may be applied to the ticket any number of times to generate the watermark. It is to be further appreciated that the ticket that is acquired from the broadcast stream can optionally be destroyed. This may be done after a predefined period of time using, for example, a count down counter or a real time clock. Alternatively, the ticket may be destroyed after power to the television is turned off.
Use of a (cryptographic) reference ticket according to the present invention provides a significantly secure method for preventing unauthorized playback of digital data streams. Thus, the playback of programs and services restricted to those who have paid for the same may be controlled. As such, piracy of such programs and services may be thwarted. Moreover, since piracy results in significant revenue loss, preventing such piracy may conceivably result in the previously pirated content being provided to legitimate consumers at a lower cost.
Although the illustrative embodiments have been described herein with reference to the accompanying drawings, it is to be understood that the present system and method is not limited to those precise embodiments, and that various other changes and modifications may be affected therein by one skilled in the art without departing from the scope or spirit of the invention. All such changes and modifications are intended to be included within the scope of the invention as defined by the appended claims.

Claims

CLAIMS:
1. A method for preventing unauthorized playback of digital data streams, comprising the steps of: broadcasting an encrypted digital data stream with a ticket, the stream having a watermark embedded therein; receiving the encrypted digital data stream and the ticket; saving the ticket and providing the encrypted digital data stream to a decryption device (204) to decrypt the digital data stream; receiving the decrypted digital data stream from the decryption device (204); extracting the watermark from the decrypted digital data stream; applying a one-way cryptographic hashing function to the saved ticket; comparing the hashed ticket to the extracted watermark; and preventing playback of the digital data stream, when the hashed ticket does not match the extracted watermark.
2. A method for preventing unauthorized playback of digital data streams, comprising the steps of: embedding a watermark in a digital data stream; encrypting the digital data stream having the embedded watermark; broadcasting the encrypted digital data stream with a ticket; receiving the encrypted digital data stream and the ticket; saving the ticket and providing the encrypted digital data stream to a decryption device (204) to decrypt the digital data stream; receiving the decrypted digital data stream from the decryption device (204); extracting the watermark from the decrypted digital data stream; applying a one-way cryptographic hashing function to the saved ticket; comparing the hashed ticket to the extracted watermark; and preventing playback of the digital data stream, when the hashed ticket does not match the extracted watermark.
3. The method according to claim 2, wherein said applying step is performed more than once.
4. The method according to claim 2, further comprising the steps of: generating the ticket by applying the one-way cryptographic hashing function to a sequence of numbers.
5. The method according to claim 4, wherein the one-way cryptographic hashing function is applied more than once to the sequence of numbers.
6. The method according to claim 2, further comprising the step of allowing playback of the digital data stream, when the hashed ticket matches the extracted watermark.
7. The method according to claim 2, further comprising the step of destroying the ticket.
8. A system for preventing unauthorized playback of broadcasted digital data streams, comprising: a bus (206); a conditional access module (204) operatively coupled to said bus configured for decrypting encrypted digital data streams; a receiver (202) operatively coupled to said bus (206) configured for receiving an encrypted digital data stream having a watermark embedded therein and a ticket, saving the ticket, providing the encrypted digital data stream to said conditional access module (204), and receiving a decrypted digital data stream from said conditional access module, the receiver (202) comprising: an extractor (212) configured for extracting the watermark from the decrypted digital data stream; a hashing module (210) configured for applying a one-way cryptographic hashing function to the saved ticket; and a comparison module (214) configured for comparing the hashed ticket to the extracted watermark; and an inhibitor (216) configured for preventing playback of the digital data stream when the hashed ticket does not match the extracted watermark.
9. The system according to claim 8, wherein said hashing module (210) applies - the one-way cryptographic hashing function to the ticket more than once.
10. The system according to claim 8, wherein said ticket is destroyed upon entering a power down mode.
11. The system according to claim 8, wherein said ticket is destroyed after a predetermined time period.
PCT/EP1999/004773 1998-07-20 1999-07-07 Method and system for preventing unauthorized playback of broadcasted digital data streams WO2000004713A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2000560725A JP2002521876A (en) 1998-07-20 1999-07-07 Method and system for preventing unauthorized reproduction of broadcast digital data stream
EP99934617A EP1018266A1 (en) 1998-07-20 1999-07-07 Method and system for preventing unauthorized playback of broadcasted digital data streams
KR1020007002950A KR20010024179A (en) 1998-07-20 1999-07-07 Method and system for preventing unauthorized playback of broadcasted digital data streams

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US9340298P 1998-07-20 1998-07-20
US09/323,808 1999-06-02
US60/093,402 1999-06-02
US09/323,808 US6530021B1 (en) 1998-07-20 1999-06-02 Method and system for preventing unauthorized playback of broadcasted digital data streams

Publications (1)

Publication Number Publication Date
WO2000004713A1 true WO2000004713A1 (en) 2000-01-27

Family

ID=26787493

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1999/004773 WO2000004713A1 (en) 1998-07-20 1999-07-07 Method and system for preventing unauthorized playback of broadcasted digital data streams

Country Status (7)

Country Link
US (1) US6530021B1 (en)
EP (1) EP1018266A1 (en)
JP (1) JP2002521876A (en)
KR (1) KR20010024179A (en)
CN (1) CN1274504A (en)
TW (1) TW518455B (en)
WO (1) WO2000004713A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001326920A (en) * 2000-05-17 2001-11-22 Sony Corp Data distribution system and its method, data receiver, data service device and its method, and data delivery device
EP1193975A1 (en) * 2000-04-04 2002-04-03 Sony Corporation Transmitter, signal transmitting method, data distributing system and its method, data receiver, data providing device and its method and data transmitter
WO2004025489A1 (en) * 2002-09-16 2004-03-25 Samsung Electronics Co., Ltd. Method for encrypting and decrypting metadata and method for managing metadata and system thereof
WO2005055075A1 (en) * 2003-12-08 2005-06-16 Daeyang Foundation Motion picture file encryption method and digital rights management method using the same
US7058809B2 (en) 2000-03-06 2006-06-06 Entriq, Inc. Method and system to uniquely associate multicast content with each of multiple recipients
US7110984B1 (en) * 1998-08-13 2006-09-19 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content
US7415440B1 (en) 2002-02-22 2008-08-19 Entriq, Inc. Method and system to provide secure key selection using a secure device in a watercrypting environment
JP2010182323A (en) * 2000-02-19 2010-08-19 Digimarc Corp Watermark encoder, decoder enabled software, and equipment

Families Citing this family (78)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7362775B1 (en) * 1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
US5613004A (en) * 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US7664263B2 (en) 1998-03-24 2010-02-16 Moskowitz Scott A Method for combining transfer functions with predetermined key creation
US6205249B1 (en) * 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
US5889868A (en) * 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7159116B2 (en) * 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
US7177429B2 (en) 2000-12-07 2007-02-13 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects
US7095874B2 (en) * 1996-07-02 2006-08-22 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7346472B1 (en) * 2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals
US7457962B2 (en) * 1996-07-02 2008-11-25 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7730317B2 (en) * 1996-12-20 2010-06-01 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US7162642B2 (en) * 1999-01-06 2007-01-09 Digital Video Express, L.P. Digital content distribution system and method
BR0008456A (en) * 1999-02-25 2002-01-29 Macrovision Corp Method and apparatus for improved audio / video services with watermarks and associated data
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
US6842190B1 (en) * 1999-07-06 2005-01-11 Intel Corporation Video bit stream extension with supplementary content information to aid in subsequent video processing
WO2001018628A2 (en) 1999-08-04 2001-03-15 Blue Spike, Inc. A secure personal content server
US6647126B1 (en) * 2000-01-28 2003-11-11 Eastman Kodak Company Authorizing the production of visual images from digital images
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US7127744B2 (en) * 2000-03-10 2006-10-24 Digimarc Corporation Method and apparatus to protect media existing in an insecure format
US20040243540A1 (en) * 2000-09-07 2004-12-02 Moskowitz Scott A. Method and device for monitoring and analyzing signals
US7127615B2 (en) * 2000-09-20 2006-10-24 Blue Spike, Inc. Security based on subliminal and supraliminal channels for data objects
US7266704B2 (en) 2000-12-18 2007-09-04 Digimarc Corporation User-friendly rights management systems and methods
US7111169B2 (en) * 2001-03-29 2006-09-19 Intel Corporation Method and apparatus for content protection across a source-to-destination interface
KR20010079245A (en) * 2001-06-27 2001-08-22 하태수 System and method for maintaining security in providing a streaming service
US6947910B2 (en) * 2001-10-09 2005-09-20 E-Cast, Inc. Secure ticketing
JP2003224556A (en) * 2002-01-28 2003-08-08 Toshiba Corp Communication equipment and communication control method
JP2005516321A (en) * 2002-02-01 2005-06-02 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Digital watermark based access control method and apparatus
DE10209461A1 (en) * 2002-03-05 2003-10-02 Bernhard Schaefer Werkzeug Und Method and device for producing an optical fiber end
US7287275B2 (en) 2002-04-17 2007-10-23 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
TWI235004B (en) * 2002-05-22 2005-06-21 Hitachi Ltd Data output apparatus and data output method
US8601504B2 (en) * 2002-06-20 2013-12-03 Verance Corporation Secure tracking system and method for video program content
JP2004064582A (en) * 2002-07-31 2004-02-26 Hitachi Ltd Broadcast content copyright protection system
EP2442566A3 (en) 2002-10-15 2012-08-08 Verance Corporation Media Monitoring, Management and Information System
KR100523054B1 (en) 2002-11-19 2005-10-24 한국전자통신연구원 Controlling apparatus for storing and playing digital broadcasting contents
US7934263B2 (en) * 2002-12-17 2011-04-26 Sony Pictures Entertainment Inc. License management in a media network environment
US7203965B2 (en) * 2002-12-17 2007-04-10 Sony Corporation System and method for home network content protection and copy management
US7616776B2 (en) 2005-04-26 2009-11-10 Verance Corproation Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US7369677B2 (en) 2005-04-26 2008-05-06 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
US9055239B2 (en) * 2003-10-08 2015-06-09 Verance Corporation Signal continuity assessment using embedded watermarks
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
TWI256212B (en) * 2003-11-05 2006-06-01 Ind Tech Res Inst Architecture and method of multilayered DRM protection for multimedia service
DE60315047D1 (en) * 2003-12-19 2007-08-30 Sgs Thomson Microelectronics Semiconductor circuit for limiting data access
US20070201820A1 (en) * 2003-12-25 2007-08-30 Matsushita Electric Industrial Co., Ltd. Television Broadcasting Receiving Device, Television Broadcasting Receiving Method, And Television Broadcasting Receiving Program
JP4294514B2 (en) * 2004-03-05 2009-07-15 シャープ株式会社 Semiconductor device and electronic device
US7702221B2 (en) * 2004-09-14 2010-04-20 Marvell World Trade Ltd. Unified control and memory for a combined DVD/HDD system
US7639927B2 (en) * 2004-09-14 2009-12-29 Marvell World Trade Ltd. Unified control and memory for a combined DVD/HDD system
US7639926B2 (en) * 2004-09-14 2009-12-29 Marvell World Trade Ltd. Unified control and memory for a combined DVD/HDD system
CN100452698C (en) * 2004-12-13 2009-01-14 清华大学 A digital content packing method with claims description
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
CN100581100C (en) * 2006-07-25 2010-01-13 国际商业机器公司 Method and system of playback for preventing skip over special contents fragment in digital media stream
EP2070328B1 (en) 2006-10-05 2011-02-16 Vestel Elektronik Sanayi ve Ticaret A.S. Watermark detection method for broadcasting
DE102008014409A1 (en) * 2008-03-14 2009-09-24 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Embedder for embedding a watermark in an information representation, detector for detecting a watermark in an information representation, method and computer program
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
CN101453333B (en) * 2008-10-16 2010-12-29 北京光线传媒股份有限公司 Copyright recognition method, apparatus and system for media file
KR101205716B1 (en) * 2008-12-19 2012-11-28 한국전자통신연구원 Apparatus for controlling the using of broadcasting program and method for the same
US20110185179A1 (en) * 2009-08-26 2011-07-28 Viswanathan Swaminathan System And Method For Digital Rights Management With A Lightweight Digital Watermarking Component
EP2416520A1 (en) * 2010-08-03 2012-02-08 Thomson Licensing Method and system for protecting by watermarking against non-authorised use original audio or video data which are to be presented
US8838978B2 (en) 2010-09-16 2014-09-16 Verance Corporation Content access management using extracted watermark information
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
TWM487509U (en) * 2013-06-19 2014-10-01 杜比實驗室特許公司 Audio processing apparatus and electrical device
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
CN105556837B (en) 2013-09-12 2019-04-19 杜比实验室特许公司 Dynamic range control for various playback environments
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
WO2015138798A1 (en) 2014-03-13 2015-09-17 Verance Corporation Interactive content acquisition using embedded codes
US11271722B2 (en) * 2019-05-07 2022-03-08 Nxp B.V. Apparatuses and methods involving authentication of radar-based digital data stream using cryptographic hashing

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0716544A2 (en) * 1994-12-08 1996-06-12 Lg Electronics Inc. Copy prevention method and apparatus of a digital magnetic recording/reproduction system
EP0750423A2 (en) * 1995-06-23 1996-12-27 Irdeto B.V. Method and apparatus for controlling the operation of a signal decoder in a broadcasting system
WO1997013248A1 (en) * 1995-10-04 1997-04-10 Philips Electronics N.V. Marking a digitally encoded video and/or audio signal
WO1997043853A1 (en) * 1996-05-15 1997-11-20 Macrovision Corporation Method and apparatus for copy protection of copyrighted material on various recording media
WO1998033325A2 (en) * 1997-01-27 1998-07-30 Koninklijke Philips Electronics N.V. Method and system for transferring content information and supplemental information relating thereto
GB2330031A (en) * 1997-09-12 1999-04-07 Ibm Copying control for watermarked digital data

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6122403A (en) * 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
WO1997024832A1 (en) 1995-12-29 1997-07-10 Scientific-Atlanta, Inc. Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
US5878135A (en) 1996-11-27 1999-03-02 Thomson Consumer Electronics, Inc. Decoding system for processing encrypted broadcast, cable or satellite video data
JP3349910B2 (en) 1997-02-12 2002-11-25 日本電気株式会社 Image data encoding system
GB2324669A (en) * 1997-04-23 1998-10-28 Ibm Controlling video or image presentation according to encoded content classification information within the video or image data
US6131162A (en) * 1997-06-05 2000-10-10 Hitachi Ltd. Digital data authentication method
US6233347B1 (en) * 1998-05-21 2001-05-15 Massachusetts Institute Of Technology System method, and product for information embedding using an ensemble of non-intersecting embedding generators

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0716544A2 (en) * 1994-12-08 1996-06-12 Lg Electronics Inc. Copy prevention method and apparatus of a digital magnetic recording/reproduction system
EP0750423A2 (en) * 1995-06-23 1996-12-27 Irdeto B.V. Method and apparatus for controlling the operation of a signal decoder in a broadcasting system
WO1997013248A1 (en) * 1995-10-04 1997-04-10 Philips Electronics N.V. Marking a digitally encoded video and/or audio signal
WO1997043853A1 (en) * 1996-05-15 1997-11-20 Macrovision Corporation Method and apparatus for copy protection of copyrighted material on various recording media
WO1998033325A2 (en) * 1997-01-27 1998-07-30 Koninklijke Philips Electronics N.V. Method and system for transferring content information and supplemental information relating thereto
GB2330031A (en) * 1997-09-12 1999-04-07 Ibm Copying control for watermarked digital data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LINNARTZ J-P, DEPOVERE G, KALKER T: "Philips Electronics response to call for proposals issued by the Data Hiding Subgroup copy protection technical working subgroup", 1997, XP002118336, Retrieved from the Internet <URL:http://www.dvcc.com/dhsg, filename "philips_dhsg.rtf" under "Proposals"> [retrieved on 19991008] *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7487128B2 (en) * 1998-08-13 2009-02-03 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content
US7110984B1 (en) * 1998-08-13 2006-09-19 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content
JP2010182323A (en) * 2000-02-19 2010-08-19 Digimarc Corp Watermark encoder, decoder enabled software, and equipment
US7058809B2 (en) 2000-03-06 2006-06-06 Entriq, Inc. Method and system to uniquely associate multicast content with each of multiple recipients
US7418735B2 (en) 2000-04-04 2008-08-26 Sony Corporation Transmitter, signal transmitting method, and data distributing system for transferring a content signal or processing copyright protection on a content signal
EP1990990A3 (en) * 2000-04-04 2009-11-04 Sony Corporation Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transferer
EP1193975A4 (en) * 2000-04-04 2005-01-26 Sony Corp Transmitter, signal transmitting method, data distributing system and its method, data receiver, data providing device and its method and data transmitter
CN1293758C (en) * 2000-04-04 2007-01-03 索尼公司 Transmitter, signal transmitting method, data distributing system and its method, data receiver, data providing device and its method and data transmitter
US7954162B2 (en) 2000-04-04 2011-05-31 Sony Corporation Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transferer
US7917960B2 (en) 2000-04-04 2011-03-29 Sony Corporation Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transferer
EP1990990A2 (en) 2000-04-04 2008-11-12 Sony Corporation Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transferer
EP2290944A3 (en) * 2000-04-04 2011-03-16 Sony Corporation Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transfer
EP1193975A1 (en) * 2000-04-04 2002-04-03 Sony Corporation Transmitter, signal transmitting method, data distributing system and its method, data receiver, data providing device and its method and data transmitter
JP2001326920A (en) * 2000-05-17 2001-11-22 Sony Corp Data distribution system and its method, data receiver, data service device and its method, and data delivery device
US7415440B1 (en) 2002-02-22 2008-08-19 Entriq, Inc. Method and system to provide secure key selection using a secure device in a watercrypting environment
US7668316B2 (en) 2002-09-16 2010-02-23 Samsung Electronics Co., Ltd. Method for encrypting and decrypting metadata
WO2004025489A1 (en) * 2002-09-16 2004-03-25 Samsung Electronics Co., Ltd. Method for encrypting and decrypting metadata and method for managing metadata and system thereof
CN100378706C (en) * 2002-09-16 2008-04-02 三星电子株式会社 Method for encrypting and decrypting metadata and method for managing metadata and system thereof
CN100449525C (en) * 2003-12-08 2009-01-07 学校法人大洋学园 Motion picture file encryption method and digital rights management method using the same
WO2005055075A1 (en) * 2003-12-08 2005-06-16 Daeyang Foundation Motion picture file encryption method and digital rights management method using the same
US8755524B2 (en) 2003-12-08 2014-06-17 Samsung Electronics Co., Ltd. Motion picture file encryption method and digital rights management method using the same

Also Published As

Publication number Publication date
KR20010024179A (en) 2001-03-26
CN1274504A (en) 2000-11-22
EP1018266A1 (en) 2000-07-12
TW518455B (en) 2003-01-21
US6530021B1 (en) 2003-03-04
JP2002521876A (en) 2002-07-16

Similar Documents

Publication Publication Date Title
US6530021B1 (en) Method and system for preventing unauthorized playback of broadcasted digital data streams
US6449367B2 (en) Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6934851B2 (en) Method and apparatus for use of a time-dependent watermark for the purpose of copy protection
Eskicioglu et al. An overview of multimedia content protection in consumer electronics devices
Bloom et al. Copy protection for DVD video
JP4456185B2 (en) Visible watermarked video recording medium with copy protection function and its creation / detection and recording / playback device
US8265276B2 (en) Method for combining transfer functions and predetermined key creation
US6539475B1 (en) Method and system for protecting digital data from unauthorized copying
JP3601698B2 (en) Method and apparatus for improved audio / video service with watermark and accompanying data
US20030159043A1 (en) Method and apparatus for use of a watermark and a receiver dependent reference for the purpose of copy pretection
JP2002521885A (en) Use of watermark for copy protection
JP2003122938A (en) Material delivery device
JP2004064582A (en) Broadcast content copyright protection system
Miller et al. Watermarking in the real world: An application to DVD
JP2002521868A (en) Method and apparatus for using watermarks and receiver-dependent criteria for copy protection
Goldschlag et al. Beyond Cryptographic Conditional Access.
Eskicioglu et al. Overview of multimedia content protection in consumer electronics devices
Furht et al. Applications of Digital Watermarking
WO2001013642A1 (en) Watermarking data streams at multiple distribution stages
Goldschlag et al. USENIX Technical Program-Paper-Smartcard 99 [Technical Program] Beyond Cryptographic Conditional Access
Doërr et al. VIDEO WATERMARKING
MXPA00002473A (en) Use of a watermark for the purpose of copy protection

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 99801172.X

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

WWE Wipo information: entry into national phase

Ref document number: 1999934617

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 1020007002950

Country of ref document: KR

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWP Wipo information: published in national office

Ref document number: 1999934617

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020007002950

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1999934617

Country of ref document: EP

WWR Wipo information: refused in national office

Ref document number: 1020007002950

Country of ref document: KR