EP1261969A1 - Device for reading, recording and restoring digital data in a copy-protection system for said data - Google Patents
Device for reading, recording and restoring digital data in a copy-protection system for said dataInfo
- Publication number
- EP1261969A1 EP1261969A1 EP01909915A EP01909915A EP1261969A1 EP 1261969 A1 EP1261969 A1 EP 1261969A1 EP 01909915 A EP01909915 A EP 01909915A EP 01909915 A EP01909915 A EP 01909915A EP 1261969 A1 EP1261969 A1 EP 1261969A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- copy
- digital
- output
- decision module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 description 14
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000009877 rendering Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000007493 shaping process Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00884—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2838—Distribution of signals within a home automation network, e.g. involving splitting/multiplexing signals to/from different paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L12/40052—High-speed IEEE 1394 serial bus
- H04L12/40104—Security; Encryption; Content protection
Definitions
- the invention relates generally to the field of protection against copying of digital data, more particularly in a digital home network environment.
- a digital home network can carry digital data from different sources outside the network. It may be data stored on detachable media such as optical discs, for example DVD discs (from the English “Digital Versatile Disc” literally meaning “Digital Versatile Disc”), or magnetic tapes, the media being either pre-recorded or recordable.
- detachable media such as optical discs, for example DVD discs (from the English “Digital Versatile Disc” literally meaning “Digital Versatile Disc”), or magnetic tapes, the media being either pre-recorded or recordable.
- a home digital network can also be required to manage digital data stored locally, for example in a hard disk connected to the home network.
- This digital data can be separated into two main categories: on the one hand, data which does not require any particular protection (for example, that which is a personal creation of the user of the home network) and, on the other hand, data which must be protected against copying to guarantee the interests of their creator (film, music, games, etc.).
- - data encryption which consists of transforming intelligible (or “clear”) data into encrypted or scrambled data using a key, this key being either a secret key shared by the device which encrypts the data and by whoever is authorized to decrypt them, either in asymmetric cryptographic systems a private or public key;
- - watermarking of data which consists in inserting in a non-perceptible manner a watermarking (commonly called "Watermark”) attached to the data to be protected.
- the watermarking must be non-modifiable and non-erasable even in the event of transformation of the data to be protected.
- Control Word CW words
- Control Word are themselves transmitted in the stream of data broadcast after being encrypted with a K key algorithm, this K key being contained in a secure processor, for example included in a smart card, which is provided to users by the service provider to enable them to decipher the control words and therefore descramble the data.
- the first method consists in protecting the data which must be protected by encrypting / confusing them locally from one end to the other of the network (we generally speak of "end-to-end protection” - literally meaning “protection of 'end to end'), that is to say from their entry into a point in the network until the moment when they are returned to the user (display of video on a television screen, music broadcast by a speaker, etc.), all network devices using the same type of protection, specific to the home network. Data is therefore never available in the clear in the network, either on the digital bus connecting the devices to each other or in the devices themselves, except at the last moment of their restitution, generally in analog form, to the user. ;
- the second method consists in associating local protection with each type of network device (a particular type of encryption, a conditional access system, etc.) with "line protection" (or point-to-point protection). point"); in this type of method, the data is available in the clear inside the devices but is never available in the clear on the bus digital connecting the various network devices to each other; the data is indeed re-encrypted before being transmitted on the bus.
- line protection or point-to-point protection. point
- An object of the present invention is to propose a system making it possible to reconcile the different protection methods which have been proposed so far.
- the invention relates to a device for reading digital data intended to be connected to a domestic digital network and capable of receiving data representing content. According to the invention, this comprises:
- the device further comprises a decision module adapted to issue a permission or a prohibition to copy and / or read said digital data, said digital data being supplied to the first or to the second encryption means. when said decision module issues a copy ban or a single copy permission.
- said digital data is supplied directly to the first and / or to the second output without being encrypted when said decision module delivers an unlimited copy permission.
- the device does not provide any digital data to the first or to the second output when said decision module delivers a read prohibition.
- the decision module delivers unlimited copying permission when said digital data received is not encrypted.
- the decision module delivers unlimited copying permission when, in addition, said digital data received is not watermarked.
- the decision module issues a read prohibition when both said digital data received are not encrypted and are watermarked.
- the decision module delivers a copy ban when said digital data received is encrypted; that they are stored on a recordable type medium; and that copy control information contained in said data indicates that a single copy is authorized.
- the decision module delivers a read prohibition when said digital data received is encrypted; that they are stored on a recordable type medium; and that copy control information contained in said data indicates that no copying is authorized.
- the decision module delivers a single copy permission when said digital data received is encrypted; that they are stored on a medium of non-recordable type or that they are data broadcast or downloaded; and that copy control information contained in said data indicates that a single copy is authorized.
- the decision module delivers a copy ban when said digital data received is encrypted; that they are stored on a medium of non-recordable type or that they are data broadcast or downloaded; and that copy control information contained in said data indicates that no copying is authorized.
- the information of permission or prohibition of copying and / or reading of said digital data delivered by the decision module is attached to the data provided at the first or at the second output.
- the first and second outputs are respectively connected to a single connector for connecting the device to a digital bus of the home network, said bus operating in a first protected mode when the data comes from the first output and in a second unprotected mode when the data comes from the second output.
- the choice of the first or the second output for supplying the data is determined by the device connected to the network. digital home for receiving said data transmitted by the reading device on the home network.
- the invention also relates to a digital data recording device intended to be connected to a reading device as above via a digital home network.
- this recording device comprises:
- the recording device comprises means for decrypting the data according to a protection mode specific to a line with which the device is intended to be connected to the reading device, said decryption means being connected at the first entry of the recording device.
- the recording device further comprises a decision module adapted to analyze the permission or prohibition information for copying and / or reading attached to the data to be recorded.
- the recording device delivers the data to be recorded to an output when the decision module detects a copy permission.
- the recording device does not deliver any data to be recorded at said output when the decision module detects a prohibition on copying.
- the invention also relates to a device for restoring digital data intended to be connected to a reading device as above via a digital home network.
- this device comprises:
- a first input intended to receive data which have been supplied at the first output of the reading device and which is connected to a first means of decrypting the data according to a protection mode specific to a line with which the device is intended to be connected to the reading device;
- FIG. 2 shows a device for reading digital data according to the invention intended to be connected to a home network
- FIG. 3 shows a digital data recording device according to the invention intended to be connected to a home network
- FIG. 4 shows a device for restoring digital data intended to be connected to a home network
- FIG. 1 an example of a digital home network is shown. This consists of a number of devices linked together by a digital bus B, for example a bus according to the IEEE 1394 standard. These devices can be divided into three categories:
- FIG. 1 two examples of these devices are shown: the decoder 1 receiving data from a satellite antenna 6, in particular digital television programs, and the DVD player 2 capable of reading DVD discs 5;
- - data recording devices such as device 3, which are capable of recording the content of the data read by the reading devices on persistent recording media;
- the rendering devices such as the digital television set 4 of FIG. 1, which are provided for rendering the content of data read by a reading device.
- a digital television may also contain the device for reading programs broadcast in digital form, or a DVD player may also contain a recording device.
- a reading device 10 receives on its input E1 digital data representing content.
- This content can be pre-recorded content, content registered in the network, broadcast content or downloaded content.
- the digital data is received by a reception and read module 11 which is capable of interpreting the format of the data received. In fact this module is different depending on the type of device belonging to the first category.
- This module has dedicated functions depending on the type of content it receives: thus, if the playback device is a DVD Video player, module 11 will recognize the format of scrambled data according to the CSS system ("English Content Scramble System “literally meaning” Content Scrambling System ”) usually used to protect the content of DVD discs and will be able to descramble the data; if the reading device is a digital decoder, the module 11 will recognize the format of broadcast data stream protected by a conditional access system and will be able to descramble the data if the user has the necessary rights.
- the CSS system English Content Scramble System "literally meaning” Content Scrambling System ”
- the reading device also comprises a decision module 12 which performs a control on the reading of the data, that is to say it determines whether the data read as input can be freely copied (“Copy-Free” status), can only be copied once (“Copy-Once” status), can no longer be copied (“Copy-No-More” status), can never be copied (“Copy-Never” status) or if these data read represent an illegal copy and must therefore not be restored on a restitution device.
- the decision module uses a method which will be described below in connection with FIG. 5, on the basis of either the entire data stream it receives from the reception and reading module 11, or only certain information extracted from this data flow, depending on the type of implementation chosen by a person skilled in the art.
- copy generation management information for example information in CGMS format (from the English "Copy Generation Management Status" literally meaning “Status for the Management of Copy Generations"), which are then used by the recording or restoring devices to determine whether the data can be saved or copied.
- this information is transmitted to two output encryption modules 13 and 14 which, depending on the copy generation management information received, provide the data respectively to the outputs.
- the copy generation management information indicates that the data read represents an illegal copy, the encryption modules 13 or 14 will not provide any output data. It will therefore not be possible to view the content, for example if it is a film, or to save it. If this information indicates that the data has a status of "Copy-
- the reading device comprises two different output encryption modules.
- the outputs S1 and S2 of the device are digital outputs, that is to say that they are intended to be connected to a digital bus. However, they each use a different protection mode.
- the data is protected at the line level, for example according to the "DTCP” protection proposal for a digital bus according to the IEEE 1394 standard ("DTCP” is an acronym for "Digital Transmission
- the data is encrypted by the local encryption module 14.
- the outputs S1 and S2 of the reading device have been shown separately in FIG. 1 but it may in reality be a single output connector making it possible to connect the device to the bus B of the home network.
- the digital bus may include two distinct operating modes: the protected mode in which the data is encrypted for a specific link between two devices on the network and the unprotected mode in which the data is encrypted globally at the level of network. The choice of the output type depends in fact on the device intended to receive the data read by the reading device.
- the reading device of the invention is intended to be able to be used in conjunction with other devices which only support one protection mode: either that at the line level, or that at the local network level .
- the reading device knows the type of protection supported by the recipient device and can thus determine which output S1 or S2 will be chosen to transmit the data.
- the choice of the output S1 or S2 will be predetermined according to the implementation chosen by the person skilled in the art. It is also possible in this case to use the two outputs, ie to transmit the data both on the protected line and on the unprotected line, if these are physically separated.
- the first test 100 consists in checking whether the data received is encrypted. If it is not the case (exit "N"), that means that one is dealing with a content which is a creation of the user or with a content which was pirated. This is why an additional test 101 can be carried out preferentially but not compulsory, to determine whether the content is watermarked. If the answer is positive (output "O"), this means that the content has been pirated and the reading device must refuse to read it (output "STOPF '). If on the other hand, the content is not watermarked (output "N” in test 101), then the content is effectively free to copy and the status "Copy-Free" is assigned to it.
- the following test 102 consists in determining the type of medium of the content. This applies in particular for the supports detachable such as DVD which can be of the "Recordable” type (for example the formats DVD-RAM, DVD-RW, DVD-R) or of the type “Not recordable” (for example DVD-ROM or DVD video pre-recorded) .
- the data disseminated or downloaded will be by convention of the "Not recordable” type.
- the following test 103 consists in determining whether the content provider has given the right to make a single copy ("Copy-Once” status) or no copy (“Copy-Once” status). None ") of its content.
- This copy control information commonly noted CCI (acronym for "Copy Control Information") or CGMS (acronym for "Copy Generation Management System” meaning “copy generation management system” are present in the data in a form determined by the content provider and which is well known to those skilled in the art. If a medium of the "Recordable” type has a "Copy-Once" status, this means that the medium is itself the single copy and that it must no longer be authorized to copy.
- the exit status will be "Copy-No-More".
- it has a "Copy-Never” status, this means that it is a pirate copy and it must not be read by the reading device ("STOP" output).
- STOP the reading device
- the status "Copy-No-More” means that it is forbidden to make an additional generation of copies of the data received.
- This status also means, if we have local protection at the network level (for example according to the XCA proposal), that it is possible to make a local copy of the data, this copy not being readable by any device other than those of the network in which it was copied, or in other words that it is not possible to make an additional generation of copy for another home network.
- test 104 If the content medium is of the "Non-recordable” type or if the data received is broadcast or downloaded data, the same test as test 103 is carried out (test 104) and the status detected ("Copy-Once” or " Copy-Never ”) is the output status assigned to the data.
- the "Copy-Once" status also authorizes local copying at the home network level when we have a local network protection mode.
- FIG. 3 This comprises two digital inputs E2 and E3, the first E2 receiving the data by a protected line and the second E3 by an unprotected line.
- E2 and E3 can actually be a single physical connection with a digital bus capable of operating in a "protected” mode or in an "unprotected” mode.
- the choice of input depends on the type of device with which the recording device is connected and the protection modes supported by this device.
- the data is received on the input E2, it is transmitted to a decryption module 21 which performs a decryption using a line specific key, which has for example been exchanged with the reading device which sent the data on the line.
- the information relating to the status of the data is extracted from the data stream and analyzed by a decision module 22 according to the method which will be described in conjunction with FIG. 6 below. This performs copy control at the recording device.
- the recording is stopped and the decision module 22 instructs the shaping module for the recording 23 not to transmit no data output for recording.
- the decision module 22 instructs the module 23 to perform a formatting for the recording so that the data are not recorded in clear.
- This may for example be encryption according to the CPRM proposal (acronym for "Content Protection for Recordable Media” literally meaning “Copy Protection for Recordable Media” for which more details can be found at the following Internet address: http://wwwAcentity.com/4centity/tech/cprmf).
- the formatted data are then transmitted at output S3 to be stored on a recording medium 24.
- the data can be recorded in clear, that is to say without the data being formatted by the module 23.
- the module 22 has two sources of information for knowing the status of the data with respect to the management of copy generations: the information defined by the protection system at the line level - this information being analyzed in step 110 - and the information integrated into the very content of the data transmitted on the unprotected line - information analyzed in step 111.
- the two sources must provide the same data statuses, but, preferentially, and to improve the security of the system, an additional test 112 is performed to define the most restrictive status among the information received.
- the decision module 22 of the recording device will authorize the recording ("Copy-Free” or “Copy-Once” statuses) or else will not allow the recording ( "Copy-No-More” or "Copy-Never” status).
- the data received on the unprotected line can always be recorded since it already benefits from specific protection on the local network, that is to say that it is encrypted so that it cannot be read (and restored) only by a network device.
- FIG. 4 This comprises, like the recording device 20, two digital inputs E4 and E5, connected respectively to a protected line and to an unprotected line.
- E4 and E5 When the data is received on the input E4, it is decrypted by the line-specific decryption module 31. They are then transmitted to output S4 to be restored.
- the data is transmitted by means of display (cathode ray tube, plasma screen, etc.) to be viewed.
- a local decryption module 32 specific to the network in which is the device. This module constitutes the end of the protection "from one end to the other" of the network since the data are only decrypted, in this protection mode, to be restored at the output S4 of the device.
- the reading, recording and restitution devices of the invention are thus compatible with the various modes of protection existing in domestic digital networks and thus allow better interoperability of the protection systems against illegal copying.
- line means any communication channel in a digital network, whether this channel is constituted by a physical line or by a so-called “wireless communication channel” ".
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Automation & Control Theory (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0004222 | 2000-03-31 | ||
FR0004222 | 2000-03-31 | ||
PCT/FR2001/000572 WO2001075876A1 (en) | 2000-03-31 | 2001-02-28 | Device for reading, recording and restoring digital data in a copy-protection system for said data |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1261969A1 true EP1261969A1 (en) | 2002-12-04 |
Family
ID=8848798
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP01909915A Ceased EP1261969A1 (en) | 2000-03-31 | 2001-02-28 | Device for reading, recording and restoring digital data in a copy-protection system for said data |
Country Status (8)
Country | Link |
---|---|
US (1) | US20030051153A1 (en) |
EP (1) | EP1261969A1 (en) |
JP (1) | JP2003529874A (en) |
KR (1) | KR100683593B1 (en) |
CN (1) | CN1249713C (en) |
AU (1) | AU2001237506A1 (en) |
MX (1) | MXPA02009435A (en) |
WO (1) | WO2001075876A1 (en) |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3835655B2 (en) * | 1998-06-09 | 2006-10-18 | ソニー株式会社 | Information signal reproducing apparatus, information signal processing apparatus, information signal reproducing method and information signal output method |
US9613483B2 (en) | 2000-12-27 | 2017-04-04 | Proxense, Llc | Personal digital key and receiver/decoder circuit system and method |
US6973576B2 (en) | 2000-12-27 | 2005-12-06 | Margent Development, Llc | Digital content security system |
US7472280B2 (en) | 2000-12-27 | 2008-12-30 | Proxense, Llc | Digital rights management |
US7305560B2 (en) | 2000-12-27 | 2007-12-04 | Proxense, Llc | Digital content security system |
US7515730B2 (en) * | 2001-12-13 | 2009-04-07 | Digimarc Corporation | Progressive image quality control using watermarking |
WO2003092264A1 (en) * | 2002-04-26 | 2003-11-06 | Koninklijke Philips Electronics N.V. | Security modules for conditional access with restrictions |
US7181010B2 (en) * | 2002-05-24 | 2007-02-20 | Scientific-Atlanta, Inc. | Apparatus for entitling remote client devices |
US6748080B2 (en) * | 2002-05-24 | 2004-06-08 | Scientific-Atlanta, Inc. | Apparatus for entitling remote client devices |
FR2840749A1 (en) * | 2002-06-05 | 2003-12-12 | Thomson Licensing Sa | Method/system/terminal authorized access having main/secondary terminal each terminal having contents verification using information exchange principal/secondary terminals matching contents providing access secondary system. |
KR100523054B1 (en) * | 2002-11-19 | 2005-10-24 | 한국전자통신연구원 | Controlling apparatus for storing and playing digital broadcasting contents |
US8230084B2 (en) * | 2002-12-17 | 2012-07-24 | Sony Corporation | Network management in a media network environment |
KR101014912B1 (en) * | 2002-12-17 | 2011-02-15 | 소니 픽쳐스 엔터테인먼트, 인크. | Method and apparatus for access control in an overlapping multiserver network environment |
CN100459699C (en) * | 2002-12-17 | 2009-02-04 | 索尼电影娱乐公司 | System and method for home network content protection and copy management |
US7203965B2 (en) * | 2002-12-17 | 2007-04-10 | Sony Corporation | System and method for home network content protection and copy management |
FR2850223B1 (en) * | 2003-01-16 | 2006-04-21 | Canon Europa Nv | METHOD AND DEVICE FOR TRANSFERRING SECURE INFORMATION |
WO2004086370A2 (en) * | 2003-03-24 | 2004-10-07 | Matsushita Electric Industrial Co., Ltd. | Recording apparatus and content protection system |
CN1317862C (en) * | 2003-06-27 | 2007-05-23 | 联想(北京)有限公司 | A method for preventing environment mode conflict on home network |
CN1833211A (en) * | 2003-07-31 | 2006-09-13 | 皇家飞利浦电子股份有限公司 | Data carrier belonging to an authorized domain |
US9020854B2 (en) | 2004-03-08 | 2015-04-28 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
JP2006155332A (en) * | 2004-11-30 | 2006-06-15 | Toshiba Corp | Apparatus and method for outputting contents, and apparatus and method for acquiring contents |
US8291236B2 (en) * | 2004-12-07 | 2012-10-16 | Digital Keystone, Inc. | Methods and apparatuses for secondary conditional access server |
EP1829283A2 (en) | 2004-12-20 | 2007-09-05 | Proxense, LLC | Biometric personal data key (pdk) authentication |
KR100739702B1 (en) * | 2005-02-07 | 2007-07-13 | 삼성전자주식회사 | Method for generating usage rule information for broadcast channel |
US8433919B2 (en) | 2005-11-30 | 2013-04-30 | Proxense, Llc | Two-level authentication for secure transactions |
US9113464B2 (en) | 2006-01-06 | 2015-08-18 | Proxense, Llc | Dynamic cell size variation via wireless link parameter adjustment |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US9277295B2 (en) | 2006-06-16 | 2016-03-01 | Cisco Technology, Inc. | Securing media content using interchangeable encryption key |
US9137480B2 (en) | 2006-06-30 | 2015-09-15 | Cisco Technology, Inc. | Secure escrow and recovery of media device content keys |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
US7883003B2 (en) | 2006-11-13 | 2011-02-08 | Proxense, Llc | Tracking system using personal digital key groups |
JP4512579B2 (en) * | 2006-11-16 | 2010-07-28 | パイオニア株式会社 | Electronic device control system and method, and electronic device and control apparatus |
WO2009062194A1 (en) | 2007-11-09 | 2009-05-14 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
WO2009079666A1 (en) | 2007-12-19 | 2009-06-25 | Proxense, Llc | Security system and method for controlling access to computing resources |
US8508336B2 (en) | 2008-02-14 | 2013-08-13 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
EP2184739A3 (en) * | 2008-07-29 | 2011-03-16 | Hitachi Ltd. | Copy control method |
US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US8918854B1 (en) | 2010-07-15 | 2014-12-23 | Proxense, Llc | Proximity-based system for automatic application initialization |
US8857716B1 (en) | 2011-02-21 | 2014-10-14 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
WO2014183106A2 (en) | 2013-05-10 | 2014-11-13 | Proxense, Llc | Secure element as a digital pocket |
JP2014093078A (en) * | 2013-06-27 | 2014-05-19 | Mitsubishi Electric Information Systems Corp | Content data reproduction device and program |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997039552A1 (en) * | 1996-04-17 | 1997-10-23 | Intel Corporation | An apparatus and method for re-encrypting data |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL8900307A (en) * | 1989-02-08 | 1990-09-03 | Philips Nv | PUBLIC COMMUNICATION SYSTEM WITH DISTRIBUTED STATIONS, AND STATION AND SUBSTATIONS FOR USE IN SUCH A COMMUNICATION SYSTEM. |
JPH11225292A (en) * | 1998-02-04 | 1999-08-17 | Sony Corp | Digital broadcast receiver and reception method |
JPH11355265A (en) * | 1998-06-10 | 1999-12-24 | Matsushita Electric Ind Co Ltd | Method for av contents transmission and av contents reception, device for av contents transmission and av contents reception and medium |
JPH11339374A (en) * | 1998-05-26 | 1999-12-10 | Yamaha Corp | Digital recording device |
JP3925584B2 (en) * | 1998-06-09 | 2007-06-06 | ソニー株式会社 | Replication generation management method and recording / reproducing system |
JP4162294B2 (en) * | 1998-07-03 | 2008-10-08 | パイオニア株式会社 | Information reproducing apparatus having copy restriction function |
JP4208998B2 (en) * | 1998-07-03 | 2009-01-14 | パイオニア株式会社 | RECORDING / REPRODUCTION SYSTEM, RECORDING DEVICE AND REPRODUCTION DEVICE HAVING COPY LIMIT FUNCTION |
US7010685B1 (en) * | 1999-11-09 | 2006-03-07 | Sony Corporation | Method and apparatus for storing scrambled digital programs by filtering product identifier |
-
2001
- 2001-02-28 CN CNB01807216XA patent/CN1249713C/en not_active Expired - Fee Related
- 2001-02-28 EP EP01909915A patent/EP1261969A1/en not_active Ceased
- 2001-02-28 MX MXPA02009435A patent/MXPA02009435A/en active IP Right Grant
- 2001-02-28 JP JP2001573469A patent/JP2003529874A/en active Pending
- 2001-02-28 AU AU2001237506A patent/AU2001237506A1/en not_active Abandoned
- 2001-02-28 KR KR1020027012184A patent/KR100683593B1/en not_active IP Right Cessation
- 2001-02-28 US US10/221,968 patent/US20030051153A1/en not_active Abandoned
- 2001-02-28 WO PCT/FR2001/000572 patent/WO2001075876A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997039552A1 (en) * | 1996-04-17 | 1997-10-23 | Intel Corporation | An apparatus and method for re-encrypting data |
Also Published As
Publication number | Publication date |
---|---|
CN1419695A (en) | 2003-05-21 |
KR20020081584A (en) | 2002-10-28 |
US20030051153A1 (en) | 2003-03-13 |
MXPA02009435A (en) | 2003-02-12 |
WO2001075876A1 (en) | 2001-10-11 |
KR100683593B1 (en) | 2007-02-16 |
JP2003529874A (en) | 2003-10-07 |
CN1249713C (en) | 2006-04-05 |
AU2001237506A1 (en) | 2001-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1261969A1 (en) | Device for reading, recording and restoring digital data in a copy-protection system for said data | |
EP1815681B1 (en) | Digital audio/video data processing unit and method for controlling access to said data | |
EP1305948B1 (en) | Method for secure distribution of digital data representing a multimedia content | |
FR2792482A1 (en) | LOCAL DIGITAL NETWORK, ESPECIALLY DOMESTIC DIGITAL NETWORK, AND METHOD FOR CREATING AND UPDATING SUCH A NETWORK | |
FR2818062A1 (en) | METHOD FOR SECURE TRANSMISSION OF DIGITAL DATA FROM A SOURCE TO A RECEIVER | |
FR2755809A1 (en) | METHOD FOR PROTECTING INFORMATION TRANSMITTED FROM A SECURITY ELEMENT TO A DECODER AND PROTECTION SYSTEM USING SUCH A METHOD | |
WO2008012284A1 (en) | Method of storing and utilizing a broadcast audio/video event | |
EP3236632B1 (en) | Method and device allowing an access control system to be applied to the protection of streamed video in direct mode | |
EP2103123B1 (en) | Method of controlling the access to a scrambled digital content | |
EP1495637B1 (en) | Secure method of storing encrypted data on a personal digital recorder | |
EP1479233B1 (en) | Device for processing and method for transmission of encoded data for a first domain in a network pertaining to a second domain | |
EP1537738B1 (en) | Method for verifying validity of domestic digital network key | |
EP3380983B1 (en) | Method for the identification of security processors | |
EP1479234B1 (en) | Method for processing encoded data for a first domain received in a network pertaining to a second domain | |
EP1419640B1 (en) | Local digital network, methods for installing new devices and data broadcast and reception methods in such a network | |
EP1994718B2 (en) | Method and device for distributing secure digital audiovisual contents by interoperable solutions | |
EP2098073A2 (en) | Method for managing the number of visualisations, security processor and terminal for said method | |
FR3053497B1 (en) | METHOD FOR ENHANCING THE SECURITY OF A PEACE-BASED TELEVISION SYSTEM BASED ON PERIODIC PERIODIC RETRO-COMMUNICATION | |
EP2297954B1 (en) | Updating of entitlements to access a protected audiovisual content | |
FR2835378A1 (en) | TV programme conditional access information transmission having enabling message generating receiver instruction and conditional verification/action interpretation calculating enable message/local instruction. | |
WO2000011866A1 (en) | Security device for decoding compressed encrypted data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20020910 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AT BE CH CY DE ES FR GB IT LI |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: THOMSON LICENSING |
|
17Q | First examination report despatched |
Effective date: 20071213 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: THOMSON LICENSING |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20160426 |