WO2003021907A1 - Mechanism for storing, transferring, encrypting and locking multi-media files - Google Patents
Mechanism for storing, transferring, encrypting and locking multi-media files Download PDFInfo
- Publication number
- WO2003021907A1 WO2003021907A1 PCT/GB2002/003679 GB0203679W WO03021907A1 WO 2003021907 A1 WO2003021907 A1 WO 2003021907A1 GB 0203679 W GB0203679 W GB 0203679W WO 03021907 A1 WO03021907 A1 WO 03021907A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- blocks
- subblocks
- file
- keys
- files
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Definitions
- the present invention relates to a method and apparatus for storing and transferring multi-media files in an encrypted form whereby the content is retained in a form that provides protection against unwanted copying and distribution.
- the present invention describes apparatus and a method for enabling this content to be stored and distributed electronically, for example over a network, whilst ensuring that it remains in a form that protects against unauthorised copying, distribution and usage.
- the multi-media data is decrypted and returned to a format that can be directly replayed it is passed immediately for playback and never stored in that format. It is therefore significantly more difficult for the user to locate a file that exists in a format that may be copied and distributed without copyright control.
- the system utilizes a technique of breaking the original file down into much smaller blocks. Just as a jigsaw puzzle is only complete when all the pieces have been located and re-assembled in the correct order, the multi-media file is only complete when all the individual blocks have been re-assembled. In addition, it is possible to break down each block into sub-blocks and similarly re-order the blocks.
- the technique is particularly useful where the information processing power of the playback machine is limited. It is also possible to add various standard mathematical encryption techniques to a very small segment of the content, for instance it would be possible to encrypt one single sub-block within each block.
- the innovation delivers a number of benefits to the content provider by providing an inherently high level of security throughout the storage and delivery process and by integrating easily with existing techniques to significantly increase the level of security offered.
- we provide apparatus for splitting the multi-media file into numerous blocks and re-arranging, storing, transmitting and then re-assembling these blocks according to an algorithm and an associated key as follows: a. generating a first key using a mathematical or random scheme; b. splitting the multi-media file into numerous blocks according to an algorithm and the first key; c. generating a second key using a mathematical or random scheme; d. encrypting the individual blocks and sub- blocks according to the second key; e. generating a third key using a mathematical or random scheme; f. storing the numerous blocks and sub-blocks in several places according to an algorithm and the third key; g.
- Figure 1 is a diagram of apparatus in a standard arrangement configured to replay multi-media files showing the flow of data
- Figure 2 is a diagram of apparatus operating in accordance with the present invention to replay multimedia files showing the flow of data
- Figure 3 is a diagram representing a single file of multi-media data in a standard arrangement
- Figure 4 is a diagram representing a multi-media file split into numerous blocks.
- Figure 5 is a diagram representing a multi-media file split into numerous blocks and the order of the blocks then re-arranged according to a scheme
- Figure 6 is a diagram representing a multi-media file split into numerous blocks and re-arranged and showing as an example a single block split into sub- blocks and re-arranged, all according to a scheme.
- FIG. 1 is a diagram of apparatus operating conventionally to replay multi-media files.
- Multi-media files may include various content for example video, audio, presentations, images, animations, games, software or more simple files such as text documents.
- the multi-media file would normally be stored as a disk file 4 in the original multi-media format 5 which can be played by an appropriate media player 2 and any associated codec (coder-decoder) .
- the output to the user would be passed through an appropriate replay apparatus for example a screen, games console, loudspeakers etc. It can be easily seen that anyone with the appropriate media player can copy the disk file and make unrestricted use of the same content. Thus a file may be copied and distributed extensively outside of the control of the content provider.
- FIG. 2 is a diagram of apparatus operating in accordance with the current invention.
- the Decryption Object 6 receives a request from the Media Player 2 to provide the multi-media data.
- the Decryption Object accesses the file in the encrypted format 11 and decrypts this data according to the keys passed by the Key Manager 7.
- the keys from the key manager may be provided from various sources and linked to other factors as additional security, for example they may be linked to hardware serial numbers 8, operating system serial numbers 9 or authorised from external sources 10 such as the Internet.
- the multi-media file is then passed on a continuous basis, such as streaming or in a similar manner, in the native multi-media format 5.
- the apparatus may be provided entirely as software to be loaded on to an information- processing device or as hardware to be incorporated in or attached to such a device or as a combination of both.
- Examples of such devices would include computers, personal computers, portable computers of various sizes and other devices incorporating such computing facilities such as Personal Digital Assistants, Personal Organisers and Schedulers, mobile telephone instruments etc.
- Figure 3 is a diagram representing a single multimedia file with a start 20 and an end 21.
- the native format of the file is determined by the type of content and will vary from file to file. This may include for example MPEG, WAV, MP3, AVI and MOV amongst others.
- This file is usually read by the file system from the disk store as required. It is commonly possible to copy such a multi-media file and transfer it to another similar machine without regard to copyright restrictions.
- Figure 4 shows a similar multi-media file split into blocks, with the letters identifying the correct order of the blocks A to H.
- Figure 5 shows a similar multi-media file with the blocks rearranged according to some scheme.
- the blocks may be of uniform size or may vary in size from block to block.
- the key to identify the scheme being used and therefore to unscramble the file may be included within the file or provided separately and may be suitably encrypted.
- Figure 6 shows the same multi-media file and illustrates the use of sub-blocks and a similar re- ordering process applied to these. Additional encryption may added to all blocks and sub-blocks or alternatively to a sub-set only. This has the advantage that the decryption process can be tailored to suit the power of the playback machine whilst still offering an adequate level of protection to prevent the unauthorised playback of various formats of multi-media content.
- the replay device 1 is used to physically present the multi-media content to the user and is likely to be part of the existing playback instrument, for instance a screen or loudspeakers attached to computing device.
- the multi-media player 2 takes the data file presented to it in the native format 5 and replays it in a form that can be presented to the replay device for presentation to the user. Conversion from the native format is achieved by use of an appropriate coder-decoder
- the coder-decoder (codec) 3 enables the decoding of the multi-media file's own native format.
- Various codecs may be utilised by the multi-media player to match the various native formats being played. Additional codecs may be installed to suit new native formats as these become common .
- the disk file 4 is the bulk storage method most commonly used with computing devices for long-term storage. In this example it is a data file located on a physical disk drive although this can be equally well applied to CD drives or memory arrays or other similar devices.
- the native file format 5 is any file format commonly used for multi-media files and this format may be used at various points within the system. Examples of commonly used formats would include MPEG, AVI, MOV, MP3 and WAV.
- the decryption object 6 is responsible for applying the various algorithms and schemes to the encrypted format 11 in order to translate it back into the original native format 5. This is achieved with the help of various keys provided for the purpose.
- the encrypted format file 11 is read from the disk file 4 as required.
- the translated multi-media file is provided to the multimedia player on a continuous basis as it is required and is not stored as a complete file at any time thus there never exists a complete unencrypted file that may be copied.
- the decryption object may exist as software or hardware or a combination of the two.
- the key manager 7 provides the keys from various sources as required by the decryption object.
- the source of the various keys may vary with the application:
- the hardware key 8 may be a number or identifier related to the machine being used for playback. For example this might be a processor serial number or network board address or similar. In this way the playback of the multi-media can be locked to a specific playback device.
- the software key 9 may be number or identifier related to a specific piece of software or data. For example this might be the operating system registration number or similar.
- External key 10
- the external key 10 is any key or keys that may be supplied externally. For instance this may be the keys supplied with the encrypted data file, keys subsequently provided in return for payment or various other keys entered manually or supplied automatically from a remote source such as a network or the Internet.
- the encrypted format.11 is that format supplied to the user.
- the encryption scheme will include the rearranged blocks and sub-blocks and may also include other mathematical encryption within a number of these blocks and sub-blocks.
- the encrypted format file may also include various additional control and key information related to the decryption process and this additional data may itself be encrypted.
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0119427A GB2382160A (en) | 2001-08-09 | 2001-08-09 | System for encrypting multimedia files for transmission or storage as a set of data blocks in which the re-assembly order has been encrypted |
GB0119427.3 | 2001-08-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003021907A1 true WO2003021907A1 (en) | 2003-03-13 |
Family
ID=9920091
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2002/003679 WO2003021907A1 (en) | 2001-08-09 | 2002-08-09 | Mechanism for storing, transferring, encrypting and locking multi-media files |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2382160A (en) |
WO (1) | WO2003021907A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2895183A1 (en) * | 2005-12-19 | 2007-06-22 | Canon Kk | Content e.g. audio-video data, storing method for e.g. home audio-video network, involves creating set of intermediary contents for content to be stored by combining encrypted and non encrypted data packets according to preset sequence |
US7283587B2 (en) | 2003-12-18 | 2007-10-16 | Intel Corporation | Distortion measurement |
WO2006081053A3 (en) * | 2005-01-24 | 2007-11-08 | Moderator Systems Inc | Wireless event authentication system |
US7483485B2 (en) | 2005-01-24 | 2009-01-27 | Moderator Systems, Inc. | Wireless event authentication system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0779727A2 (en) * | 1995-12-08 | 1997-06-18 | Nippon Telegraph And Telephone Corporation | Communication method and system with packet scrambling |
US5680400A (en) * | 1995-05-31 | 1997-10-21 | Unisys Corporation | System for high-speed transfer of a continuous data stream between hosts using multiple parallel communication links |
EP0864959A2 (en) * | 1997-03-12 | 1998-09-16 | Mitsubishi Corporation | Data management system |
US5926624A (en) * | 1996-09-12 | 1999-07-20 | Audible, Inc. | Digital information library and delivery system with logic for generating files targeted to the playback device |
WO2001039002A1 (en) * | 1999-11-24 | 2001-05-31 | Speedbit Ltd. | Multi-server file download |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5199066A (en) * | 1989-04-18 | 1993-03-30 | Special Effects Software, Inc. | Method and apparatus for protecting software |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
JP4392808B2 (en) * | 1998-08-04 | 2010-01-06 | 大日本印刷株式会社 | Encryption processing system |
JP2001290707A (en) * | 2000-04-05 | 2001-10-19 | Kazumi Mochizuki | Method and device for data processing and computer- readable storage medium with data processing program stored thereon |
JP2002318687A (en) * | 2001-04-18 | 2002-10-31 | Fujitsu Ltd | Information processor and computer system |
-
2001
- 2001-08-09 GB GB0119427A patent/GB2382160A/en not_active Withdrawn
-
2002
- 2002-08-09 WO PCT/GB2002/003679 patent/WO2003021907A1/en not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5680400A (en) * | 1995-05-31 | 1997-10-21 | Unisys Corporation | System for high-speed transfer of a continuous data stream between hosts using multiple parallel communication links |
EP0779727A2 (en) * | 1995-12-08 | 1997-06-18 | Nippon Telegraph And Telephone Corporation | Communication method and system with packet scrambling |
US5926624A (en) * | 1996-09-12 | 1999-07-20 | Audible, Inc. | Digital information library and delivery system with logic for generating files targeted to the playback device |
EP0864959A2 (en) * | 1997-03-12 | 1998-09-16 | Mitsubishi Corporation | Data management system |
WO2001039002A1 (en) * | 1999-11-24 | 2001-05-31 | Speedbit Ltd. | Multi-server file download |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7283587B2 (en) | 2003-12-18 | 2007-10-16 | Intel Corporation | Distortion measurement |
WO2006081053A3 (en) * | 2005-01-24 | 2007-11-08 | Moderator Systems Inc | Wireless event authentication system |
US7483485B2 (en) | 2005-01-24 | 2009-01-27 | Moderator Systems, Inc. | Wireless event authentication system |
US7496140B2 (en) | 2005-01-24 | 2009-02-24 | Winningstad C Norman | Wireless event authentication system |
US7894519B2 (en) | 2005-01-24 | 2011-02-22 | Moderator Systems, Inc. | Wireless event authentication system |
FR2895183A1 (en) * | 2005-12-19 | 2007-06-22 | Canon Kk | Content e.g. audio-video data, storing method for e.g. home audio-video network, involves creating set of intermediary contents for content to be stored by combining encrypted and non encrypted data packets according to preset sequence |
Also Published As
Publication number | Publication date |
---|---|
GB2382160A (en) | 2003-05-21 |
GB0119427D0 (en) | 2001-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11727376B2 (en) | Use of media storage structure with multiple pieces of content in a content-distribution system | |
JP4921966B2 (en) | Method and system for secure network-based content delivery | |
US7170999B1 (en) | Method of and apparatus for encrypting and transferring files | |
US6917923B1 (en) | Approved web site file downloading | |
US8595492B2 (en) | On-demand protection and authorization of playback of media assets | |
JP2008508595A (en) | System and method for enabling a device in response to rights protection | |
JP2000267940A (en) | Device and method for ciphering digital file, and recording medium therefor | |
WO2004027622A2 (en) | Method and system for secure distribution | |
JP5629162B2 (en) | Information content distribution apparatus and distribution method | |
WO2003021907A1 (en) | Mechanism for storing, transferring, encrypting and locking multi-media files | |
US10078737B2 (en) | System and method for securely retrieving and playing digital media | |
KR100320181B1 (en) | Encryption method for digital data file | |
JP2006511854A (en) | How to distribute information content | |
US20130232581A1 (en) | System and method for securely retrieving and playing digital media | |
WO2006000029A1 (en) | Content delivery system and player | |
KR100320180B1 (en) | Encryption method for digital data file | |
KR20000055721A (en) | Encryption method for digital data file | |
KR100718702B1 (en) | Digital contents integrated electronic book, distribution system and method thereof | |
KR20060065210A (en) | Encryption/decryption module for using multimedia data and contents management system program | |
WO2007000805A1 (en) | Digital video content copyright management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG US Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |