Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for content replication control

A technology for copy control and content, applied in transmission systems, program/content distribution protection, data recording, etc.

Active Publication Date: 2015-06-03
SANDISK TECH LLC
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, if an unauthorized party gains access to the key used to encrypt the content, the unauthorized party will have access to the content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for content replication control
  • Method and system for content replication control
  • Method and system for content replication control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] introduce

[0014] The following embodiments provide methods and systems for content replication control and memory devices and methods for double domain encryption. While these embodiments can be used with each other, it is important to note that the content copy control embodiments can be used with memory devices other than those that provide double domain encryption, and that memory devices with double domain encryption can be used with other than content other applications outside of replication control.

[0015] The following sections provide a discussion of content replication control, followed by a discussion of memory devices featuring dual domain encryption and of content replication control using memory devices featuring dual domain encryption.

[0016] Content Copy Control

[0017] Turning now to the attached drawings, figure 1 is a representation of the content replication control system 50 of an embodiment. The system 50 includes a content replicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for content replication control are provided. In one embodiment, a content replication system receives a request to replicate content in a plurality of memory devices, wherein each memory device is associated with a respective unique identifier. For each of the plurality of memory devices, the content replication system sends a request to a transport encryption key server for a transport encryption key, the request including the unique identifier of the memory device. If the unique identifier of the memory device is authorized to receive the transport encryption key, the content replication system receives the transport encryption key and sends the transport encryption key to the memory device. The content replication system then receives encrypted content from a content server, wherein the encrypted content is encrypted with the transport encryption key. The content replication system then sends the encrypted content to the plurality of memory devices.

Description

Background technique [0001] To distribute content to optical discs and other storage devices, content owners, such as studios, distribute the content to replication tools, which replicate the content onto storage devices. Because content owners do not have much control over what happens in the reproduction facility, content owners rely on the trust and handling controls of each specific reproduction facility to ensure that illegal and unauthorized copies of content do not occur. Thus, the content provider does not have precise control over how many copies of the content are being made once the content is distributed to a replication facility. As a result, the content owner does not know whether unauthorized copying of the content is being made. Furthermore, the content is typically transferred to and stored in the memory device in encrypted form. Unfortunately, if an unauthorized party gains access to the key used to encrypt the content, the unauthorized party will have acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/10
CPCG06F21/10G11B20/00086G11B20/00224G11B20/00478G11B20/00492H04L63/0823H04L63/062H04N7/167
Inventor J.T.林F.E.乔甘德-库洛姆布
Owner SANDISK TECH LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More