Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Content security layer providing long-term renewable security

a content security and long-term renewable technology, applied in the field of content security layer providing long-term renewable security, can solve the problems of participants (manufacturers, publishers, artists, etc., with unparalleled flexibility in making decisions about security and functionality, and achieve the effect of unrivalled flexibility

Inactive Publication Date: 2002-10-03
ROVI SOLUTIONS CORP
View PDF26 Cites 273 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0037] An exemplary player usable with the system (i.e., a device that wishes to decrypt or otherwise gain access to protected content) includes several components. The first is a data or media input interface, such as for an optical disc drive. To initiate playback, the player loads a sequence of data processing commands from the input interface and begins executing these commands using an interpreter or other execution module. This execution environment preferably provides a Turing-complete language (one that can execute any algorithm, subject to the player's memory, user interface, and performance limitations). From the execution environment, the content can query the player to determine the configuration of the playback environment and to perform cryptographic operations using the player's keys. Content can thus be designed so that playback will only proceed on players that provide satisfactory responses to queries. Publishers can also provide limited playback. For example, less secure platforms could provide CD-quality stereo audio or regular-definition images, while more secure platforms could offer more audio channels, high-definition images, higher sampling rates, and higher-quality compression. Even after playback begins, playback can remain under the control of the content's data processing commands. One exemplary embodiment includes the capability to perform robust, essentially on-the-fly watermarking. Enabling the content itself to control what data regions are played, makes it possible to embed information in the output by selecting between output data versions with tiny differences. Pirate copies can be traced back to a specific player by analyzing these differences.

Problems solved by technology

The system provides participants (manufacturers, publishers, artists, and / or consumers, etc.) with unparalleled flexibility to make decisions about security and functionality.
Publishers can also provide limited playback.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content security layer providing long-term renewable security
  • Content security layer providing long-term renewable security
  • Content security layer providing long-term renewable security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] FIG. 2 shows an exemplary embodiment of a player using physical media 200. The playback process is controlled by processor 210, which can access media 200 via media interface 205. When media 200 is mounted (e.g., when it is first inserted, or the system is re-initialized, etc.), processor 210 begins by initializing the media interface, reading the media's table of contents, and recognizing the protection system supported. If so, the processor loads a small initial portion of media 200 into execution and data RAM 220.

[0044] Using interpreter 215, processor 210 begins performing the data processing operations specified by the loaded media portion. Interpreter 215 provides a set of predetermined data processing operations from which more complex tasks can be accomplished. The interpreted language is preferably Turing-Complete. Turing-Complete programming languages are characterized in that algorithms implementable in one such language can be implemented in any other, and the imp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption / playback, and / or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player. Features to enable migration from legacy formats are also provided.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001] This application claims the benefit of U.S. Provisional Application No. 60 / 279,323, filed Mar. 28, 2001.FIELD[0002] This application relates generally to securing the distribution of digital content against piracy and other unauthorized use or redistribution.BACKGROUND[0003] A wide variety of systems have been proposed for protecting digital content. Most such schemes encrypt the content to protect it against unauthorized use and copying while it is stored on media or sent over untrusted communication channels. Decryption algorithms and keys are then managed by trusted, tamper-resistant software or hardware modules, which are designed to enforce access control rules (which may be fixed or configurable) specifying how the content can be used.[0004] Content protection schemes are generally customized for a particular playback environment. For example, anti-piracy systems in software-only streaming content players designed for personal compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F1/00G06Q50/00G06Q30/00G09C1/00G11B20/00G11B20/10G11B20/12G11B27/00H04L9/08H04L9/30H04N5/91H04N5/913H04N21/266H04N21/41H04N21/418H04N21/432H04N21/4405H04N21/442H04N21/4627H04N21/8355H04N21/8358
CPCG11B20/00086H04N2005/91342G11B20/00173G11B20/0021G11B20/00246G11B20/00659G11B20/00818G11B20/0084G11B20/00884H04L9/0891H04L9/3247H04L2209/603H04L2209/608H04N5/913H04N21/26613H04N21/4135H04N21/4181H04N21/4325H04N21/4405H04N21/44236H04N21/4627H04N21/8355H04N21/8358H04N2005/91335G11B20/00166
Inventor KOCHER, PAUL C.JAFFE, JOSHUA M.JUN, BENJAMIN C.CARTER, MATTHEW T.PEARSON, PETER K.
Owner ROVI SOLUTIONS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products