EP2132677A1 - Méthode et système de contrôle d'accès à un contenu numérique - Google Patents
Méthode et système de contrôle d'accès à un contenu numériqueInfo
- Publication number
- EP2132677A1 EP2132677A1 EP08744359A EP08744359A EP2132677A1 EP 2132677 A1 EP2132677 A1 EP 2132677A1 EP 08744359 A EP08744359 A EP 08744359A EP 08744359 A EP08744359 A EP 08744359A EP 2132677 A1 EP2132677 A1 EP 2132677A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- digital content
- throughput rate
- storage system
- delay
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims description 66
- 238000007781 pre-processing Methods 0.000 claims description 46
- 230000008569 process Effects 0.000 claims description 15
- 230000006870 function Effects 0.000 claims description 12
- 230000026676 system process Effects 0.000 claims 2
- 238000012545 processing Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 238000012546 transfer Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 208000037656 Respiratory Sounds Diseases 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 206010037833 rales Diseases 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00818—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction limits the signal quality, e.g. by low-pass filtering of audio signals or by reducing the resolution of video signals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00833—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction limits the data access speed, e.g. by defining a maximum bit rate of the I/O interface
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00847—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction is defined by a licence file
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/10537—Audio or video recording
- G11B2020/10546—Audio or video recording specifically adapted for audio data
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/1062—Data buffering arrangements, e.g. recording or playback buffers
- G11B2020/10675—Data buffering arrangements, e.g. recording or playback buffers aspects of buffer control
- G11B2020/10703—Data buffering arrangements, e.g. recording or playback buffers aspects of buffer control processing rate of the buffer, e.g. by accelerating the data output
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/1062—Data buffering arrangements, e.g. recording or playback buffers
- G11B2020/1075—Data buffering arrangements, e.g. recording or playback buffers the usage of the buffer being restricted to a specific kind of data
- G11B2020/10759—Data buffering arrangements, e.g. recording or playback buffers the usage of the buffer being restricted to a specific kind of data content data
Definitions
- Th? present invention relates to digital content, and more particularly, to controlling access to digital content.
- Digital content (may also be referred to as data) is commonly used in today's computing environment. Digital content may be stored on a storage device (also referred to as storage system), or distributed via electronic communication such as the Internet, Peer-to-Peer software, electronic mail, and others.
- the Internet and other communication networks today enable various digital appliances and systems (may also be referred to as Accessing Systems) to interconnect and exchange digital content. Accessing Systems may include without limitation, personal computers, laptop computers, tablet computers, personal digital assistants (PDAs), mobile phones. MP3 players, DVD players, gaming consoles, digital recording devices such as digital cameras, and others.
- PDAs personal digital assistants
- digital content is typically pre-processed prior to being utilized by an Accessing System.
- pre-processing can include any operation that is used to enable or assist viewing, playing, listening to, reading, displaying, executing or accessing digital content.
- Some examples of pre-processing include compressing and de -compressing operations performed by a CODEC (compressor/de-compressor) module: decryption and encryption operations performed by a cryptographic module; and others, ⁇ t is noteworthy that pre- processing as used herein does not depend on actual physical transfer of digital content from one location to another location.
- CODEC compressor/de-compressor
- Digital content is typically stored as an electronic file.
- a digital content file (may also be referred to as a ''file”) typically includes data that can be viewed, listened to, read, played, executed, or otherwise utilized by an end user using an appropriate application or device.
- a digital content file may include an audio file, a video file, a multi-media content file, a software file, an electronic book, a document, a computer game, a database, an application, or any other type of digital content.
- There are different file formats for storing digital content For example, the MP3, Wav, RealAudio and other file formats may be used to store audio files, while MP4. DIVX 1 S 1 . RealVideo and other formats may be used for storing both audio and video files.
- most digital content file formats may include a Bit Rate that is associated with the digital content.
- the Bit Rate is the data one needs to pre-process within a unit of time. The pre-processing depends on the file format and the type of operation. For example, to play an audio file, a certain amount of data is pre-processed to properly execute the audio file with minimal latenc) . If the audio file is an MP3 file it may have a Bit Rate of 128 kbps. This means that 128k bit of information is pre- processed for each second of encoded music.
- the Bit Rate may be fixed for a file, or may be variable.
- the Bit Rate may also correspond to the quality of encoding for some applications, typically, higher the Bit Rate, better the quality.
- Bit Rates Different digital content files may have different Bit Rates. The difference in Bit Rates typically results in different file sizes.
- the Accessing System for example, a media player
- Most Accessing Systems use a memory buffer (or storage space) to store content for uninterrupted processing, i.e. data is received from a storage system and then stored by the Accessing System in a memory buffer.
- the Accessing Unit may have to interrupt processing (for example, playback) to buffer data.
- Digital content may have some value to an entity, individual, business or a combination thereof.
- DRM Digital Rights Management
- DRM allows one to limit access to digital content by associating specific permissions to content. For example, a user may be prohibited from making a copy of, distributing, modifying, selling, or performing a copyrighted digital content file, without receiving proper permission from the copyright owner. Examples of copyrighted digital content include commercial movies, commercial music, electronic books, software, computer games, and the like. Different DRM standards may be used for different content types and formats and may provide different methods to distribute digital content and the associated permissions.
- Memory devices such as memory cards.
- Smart cards, SIM (subscriber identity module) cards, embedded memory chips and others are becoming popular for storing digital content.
- Such devices have a maximum read and write speed that is determined by the underlying related technology such as the type of memory used (for example, NAND flash, NOR flash. EEPROM and others) or the type of memory controller.
- These memory devices can often release digital content to an Accessing System at a speed greater than a minimum speed at which the Accessing System needs access to the digital content for properly utilizing the digital content.
- Digital content owners and providers seek to prevent digital content "piracy”. i.e. unauthorized use and distribution of digital content.
- Digital content owners such as recording companies and movie studios have not been very successful in solving piracy related problems. Therefore, there is a need for a method and system to discourage piracy without affecting authorized distribution and use of digital content.
- a storage system includes a memory controller for controlling a throughput rate for utilizing digital content by an accessing system, wherein the throughput rate is associated with information related to the digital content stored as a file.
- a system for utilizing digital content is provided. The system includes an accessing system for utilizing the digital content, wherein the digital content is released to the accessing system at a controlled throughput rate and the throughput rate is associated with information related to the digital content stored as a file.
- a system for utilizing digital content includes an accessing system for utilizing the digital content, wherein the digital content is released to the accessing system at a controlled throughput rate and the throughput rate is associated with an access parameter that is used to control access to the digital content stored as a file.
- Figure IA shows a block diagram of an Accessing System coupled to a storage system, according to one embodiment
- Figure IB shows examples of different types of storage systems used with an Accessing System, according to one embodiment
- Figure 1C shows a block diagram of a system using a DRM Module, according to one embodiment
- Figure ID graphically illustrates controlling a Throughput Rate, according to one embodiment
- Figure 2 shows a top-level block diagram of a Pre-Processing Module for controlling a Throughput Rate, according to one embodiment
- Figures 3 and 4 show," process flow diagrams for applying delay to control a
- Figure 5 shows a process flow diagram for a DRM module controlling a Throughput Rate, according to one embodiment
- Figure 6 shows an example of associating different Throughput Rates to different login accounts, according to one embodiment.
- Figure 7 shows an example of controlling display of advertisement content, according to one embodiment.
- Accessing System (may also be referred to as a Host System or a Requesting
- Accessing System means a system that requests digital content that can be viewed, listened to. read. played, executed, or otherwise utilized by a user using an appropriate application or device.
- Accessing System includes desktop computers, laptop computers, tablet computers, personal digital assistants (PDAs), mobile phones. MP3 players. DVD players, gaming consoles, digital recording devices such as digital cameras, and others, [0031] "Bit Rate " means the amount of data that needs to be Pre-Processed by an Accessing System in a given unit of time.
- the Bit Rate may depend on an encoding type. format of stored digital content, content type, or a combination thereof.
- the Bit Rate may be fixed or variable.
- ""Data Rate” means the speed (for example, the number of bytes per second) at which digital content is transferred from one location (for example, a storage system) to another location (for example, an Accessing System), at any given time.
- Pre-Processed means any operation for Utilizing digital content. Some examples of Pre-Processing include compressing and de-compressing operations performed by a CODEC module; decryption and encryption operations performed by a cryptographic module; accessing content before it is used; and others.
- ""Pre-Processing Module” means a module, component or unit (used interchangeably throughout this specification) that performs a Pre-Processing operation.
- the Pre-Processing Module may be implemented in hardware, software, or a combination thereof. Examples of a Pre-Processing Module include a DRM module, a CODEC module, a cryptographic module and others.
- '"Throughput Rate means an average Data Rate within a time interval. The Throughput Rate may be set or established to limit how much data is Released to an Accessing System in a given time. The Throughput Rate can represent a maximum amount, average amount or a range of data that is Released to an Accessing System.
- "Released"' means when an Accessing System is given access to digital content for Utilizing the digital content. Released does not require actual data transfer from one location to another location.
- "Utilizing” means viewing, listening to. reading, playing. executing, or any other use of digital content, typically by an end user using an appropriate application or device. Typically, these operations are performed by an Accessing System.
- a user using a laptop computer may want to play (Utilize) an audio/video file (digital content).
- the laptop computer may use a software application (for example. Windows Media Player available from Microsoft Corporation) to play the audio/video file.
- the laptop computer Pre-Processes the digital content at a certain rate (Bit Rate) to properly play the audio/video file.
- a cryptographic module Pre-Processing Module
- a Throughput Rate controls the rate at which digital content is made available (Released) to an application.
- the Throughput Rate may be implemented at an input/output (I/O) level (i.e. implemented by a storage system) or by a Pre-Processing Module.
- the Throughput Rate may be applied in a plurality of ways, for example, by using specific commands, a DRM content license, access parameters (for example, login credentials and security keys (for example, cipher kevs)) and others, as described below.
- a storage system controls the rate at which a data stream is Released to an Accessing System.
- the Throughput Rate defines the rate at which data may be Released to the Accessing System in a given time interval. The storage system notifies the Accessing System when data is available or unavailable and hence effectively controls how much data can be Utilized in a given time.
- the Throughput Rate depends on at least one parameter that relates to digital content.
- the Throughput Rate may depend on the Bit Rate. If the Bit Rate is variable, then an average Bit Rate value may be used to set the Throughput Rate. The Throughput Rate may be equal to or higher than the Bit Rate.
- the Throughput Rate sets an ideal maximum speed at which data is Utilized by the Accessing System. Thus, making an illegal copy would take about as long as it takes to play (i.e. Utilize) an audio/video file with almost the same inconvenience, for example, in recording an audio/video file. Hence, controlling the Throughput Rate may deter digital content piracy.
- Figure IA shows a top-level block diagram of a generic system 100 where a storage system 105 controls the Throughput Rate, according to one embodiment.
- the Throughput Rate may be determined or received by storage system 105, as described below.
- System 100 includes an Accessing System 101 operationally coupled to storage system 105 via an I/O link 102.
- Accessing system 101 typically includes several functional components. These components may include a processor (may also be referred to as a central processing unit (CPU)), main memory, I/O devices and others.
- the main memory is coupled to the CPU via a system bus or a local memory bus.
- the main memory is used to provide the CPU access to data and program information at execution time.
- the main memory is composed of random access memory (RAM) circuits.
- RAM random access memory
- Storage system 105 includes a memory controller 103 that interfaces with I/O logic 106 to transfer digital content to and from storage media (or cells) 104.
- I/O logic 106 may include an I/O memory buffer 107 where data is temporarily stored (or “buffered") before being transferred to and from Accessing System 101.
- data is stored in I/O buffer 107 for a certain duration (i.e. a delay is added) to reach a target Throughput Rate.
- the target Throughput Rate may depend on a type of Accessing System, type of digital content, intended use of digital content, and a combination thereof.
- the duration ma ⁇ ' be longer than the period when data is held in an environment where the Throughput Rate is uncontrolled. Data is held long enough in I/O buffer 107 to meet the target Throughput Rate.
- the duration i.e. after a delay is added) is such that a minimum Data Rate based on Accessing System 101 specifications is maintained to minimize any interruption in data availability to Accessing System 101 due to time out or any other problems.
- Controller 103 is aware of buffer 107 size and can keep track of time. Based on buffer 107 size and tracked time, Controller 103 refreshes buffer 107 to meet the target Throughput Rate and hence, avoids timeout problems. Data is released from VO buffer 107 in a time-controlled manner to reach the target Throughput Rale.
- a delay introduced to control the Throughput Rate may be based on an internal clock speed for storage system 105, which helps determine the number of cycles storage system 105 has to wait to reach the target Throughput Rate, The delay itself may be a variable value.
- a Throughput Rate controlled by a storage system may discourage a would-be pirate by preventing access to digital content at a rate higher than a rate specified for a digital content file. For example, even if storage system 105 is capable of transferring data at a higher rate, for example, at approximately 20 megabytes per second, the storage system controls the Throughput Rate, for example, to a slower average rate of 128 kb/s. instead of 20 megabytes per second. Hence, 1 GB of audio data may take about 10 hours to process using the controlled Throughput Rate, according to one embodiment.
- storage system 105 includes without limitation, non-volatile memory devices (includes Smart Cards, SIM cards), hard disks, and others, including any storage system that can be accessed via a state machine.
- Storage system 105 may also use a special status signal or command to notify Accessing System 101 to continue to wait for content as described below. This reduces any timeout problems that may disrupt user experience in Utilizing digital content.
- Figure IB shows examples of different types of storage systems 108. I l l, 1 13 and 115 that can interface with Accessing System 101.
- Application 101 A running on Accessing System 101 Utilizes digital content that is stored in any one of the storage systems. Application 101 A will depend on the type of digital content and its intended use.
- One example, of Application 101 A is the Windows Media Player to play audio/video content.
- Storage system 108 may be a hard disk that sends and receives data via I/O link 109 and uses a dedicated link 110 (shown as JO RDY 110) for sending and receiving commands.
- Storage system 108 uses link 110 to notify Accessing System 101 of a "Busy State " .
- the Busy State indicates to Accessing System 101 that storage system 108 is not ready to receive a new command, or to send or receive data.
- Storage system 1 1 1 1 may be a non-removable, non-volatile memory system. for example, an iNAND based memory system.
- Storage system 1 1 1 1 uses FO link 1 12 to notify Accessing System 101 of a Busy State and for IO operations (for example, sending and receiving data).
- Storage system 113 may be a removable, non-volatile memory device and is operationally coupled to Accessing System 101 via connector 114A. Storage system 113 uses I/O link 114 for I/O operations and for notifying Accessing System 101 of a Busy State. Storage system 113 may be based on Secure Digital (SD). Multi-Media Card (MMC) or any other non-volatile memory standards.
- SD Secure Digital
- MMC Multi-Media Card
- Non-volatile memory cards There are currently many different types of non-volatile memory cards that are commercially available, examples being the CompactFlash (CF). the MMC, SD. miniSD. Memory Stick. SmartMedia and TransFlash cards. Although each of these cards has a unique mechanical interface, electrical interface or mechanical and electrical interface or any other interface (including a wireless interface), according to its standardized specifications, the flash memory included in each may be very similar. These cards are all available from SanDisk Corporation, assignee of the present application.
- CF CompactFlash
- MMC CompactFlash
- TransFlash cards Flash memory included in each may be very similar.
- SanDisk Corporation also provides a line of flash drives under its Cruzer trademark, which are hand held memory systems in small packages that have a Universal Serial Bus (USB) plug for connecting with a Host System by plugging into the Host System's USB receptacle (for example, 114A).
- USB Universal Serial Bus
- Each of these memory cards and flash drives include memory controllers (103) that interface with the Accessing System 101 and control operation of the flash memory within them.
- Storage system 1 15 includes Smart Cards. SIM cards and other types of nonvolatile memory systems.
- a Smart Card is an integrated circuit with electronic memory and is used for a variety of purposes, for example, storing medical records, generating network identifiers and others.
- a SIM card is a type of Smart Card that may be used in cellular phones for example, for storing information and encrypting voice and data transmissions.
- Storage system 115 uses an I/O link 1 16 for I ' ' O operations and for notifying Accessing System 101 of a Busy State using status commands. For example, a Smartcard can use the standard "SWl " ' and "SWT " status bytes to notify Accessing System 101 when data is not ready and when data is read ⁇ '. Furthermore after a defined status.
- Accessing System 101 may send another command such as a "GetResponse " ' command to storage system 115 and determine the time it has to wait. If Accessing System 101 requests data earlier than planned, then a status message may be used to notify Accessing System 101 that the data is still not ready and it has to wait.
- the processes and mechanisms for notifying the Accessing System 101 of a Busy State may be referred to as a "busy flag".
- the busy flag is sent to an Accessing System based on storage system 105 capabilities to process an I/O operation, for example, when a storage system itself is not ready to send or receive data.
- the busy flag is sent to control the Throughput Rate even though at any given time the storage system may be capable of sending or receiving data.
- a DRM Module is used to control access to digital content.
- Figure 1C shows an example of a DRM Module 1 17 that verifies if a user using Accessing System 101 has the appropriate permissions to access certain digital content.
- DRM Module 117 may be implemented in hardware, software, or a combination thereof.
- ShO 1 Wn is a Cryptographic Module 1 18 that performs certain cryptographic functions after DRM Module 117 has verified the permissions.
- Cryptographic Module 1 18 may be
- DRM Module 1 17 provides
- Determining delay to Control the Throughput Rate [0065] The following provides an example of how a delay may be determined to
- S may be the speed (for example, in bytes/second) at which data is transferred between storage system 105
- B is the size of I/O buffer 107 ( Figure IA) and the expected (or desirable) Throughput rate is designated as T,
- T The delay to access the file
- the file may be segmented into "n" number of chunks (or
- Each chunk may be sized n according to the size of I/O buffer 107.
- the actual Throughput Rate is similar to an expected Throughput Rate. This mechanism may be used in a system where either the file size is provided to
- the storage system or the storage system is aware of the file size.
- a delay may be added between I/O buffer 107 access operations.
- This embodiment is useful when a file size is not known to a storage system. (for example, storage system 1 13), When file processing ends (for example, at the end of playing an audio file) the actual Throughput Rate is similar to the expected Throughput Rate.
- the delay is intended to control the Throughput Rate and may be designated as D b.
- the delay may be added between certain time windows (or intervals) to control the Throughput Rate. For example, if an average time
- FIG. 1 graphically illustrates how variable delay may be applied over time while a file is being processed (Utilized).
- Variable delay allows one to reach a target Throughput Rate without affecting user experience.
- Throughput Rate Control by Pre-Processing Module [0072] In another embodiment, the Throughput Rate may be controlled by a Preprocessing Module. The Pre-Processing Module may be used to control access to protected digital content, assist in processing digital content, or a combination thereof.
- Figure 2 shows an example of a Pre-Processing Module 200 that receives input data 201. Pre-Processes input data 201 and then outputs data 202. Input data 201 may be protected, compressed, unprotected or decompressed digital content. Pre- Processing Module 200 may be implemented in hardware, software, or a combination thereof.
- Pre-Processing Module 200 includes without limitation a CODEC module, a DRM Module (117, Figure 1C), a cryptographic module (118. Figure 1C), and others.
- a CODEC module is typically used to compress and decompress audio, video and audio/video files.
- a DRM Module is typically used to verify if a device, application, user or a combination thereof, has proper permissions to access digital content for certain functions, for example, to play, move or copy a file.
- a cryptographic module typically performs security related process steps for example, encrypting and decrypting data.
- a cryptographic module may add delay during cryptographic calculations or after performing cryptographic calculations.
- FIG. 3 shows a top-level process flow diagram for adding delay by Preprocessing Module 200 after data has been Pre-Processed. according to one embodiment.
- the process starts in step S300, and in step S301, input data 201 is received or acquired by Pre-Processing Module 200.
- step S303 the Throughput Rate for the input data is received or acquired by Pre-Processing Module 200, as described below.
- step S303 the data is Pre-Processed.
- the Pre-Processing operations depend on the function of the Pre-Processing Module 200. For example, when a cryptographic module is the Pre-Processing Module, then the cryptographic functions are performed in step S303.
- step S304 a delay is added before output data 202 is Released in step S305. As discussed above, the amount of delay is based on an expected Throughput Rate.
- Figure 4 shows an example for controlling the Throughput Rate by adding delay between Pre-Processing operations, according to one embodiment. The process starts in step S400. and in step S401, input data 201 is received or acquired by Pre- Processing Module 200. In step S402.
- the Throughput Rate for the input data is received or acquired by Pre-Processing Module 200 as described below.
- the input data is partially Pre-Processed. For example, for a cryptographic module, the cryptographic functions are partially performed.
- step S404. a delay is added.
- Steps S405 and S406 are similar to steps S403 and S404, respectively. The total delay is based on an expected Throughput Rate and the data Pre-Processing is completed with the appropriate delay. Thereafter, the Pre-Processed data is output in step S407.
- the Throughput Rate may be controlled by a DRM Module (117. Figure 1C).
- the Throughput Rate may vary with the type of access or use, as described below.
- FIG. 5 shows an example of a process flow diagram where DRM Module 117 controls the Throughput Rate.
- the process starts in step S500, when DRM Module 1 17 receives a request for digital content and for performing a certain operation. for example, to play an audio file.
- a user using Accessing System 10 ! may request to play an audio file via application 101 A.
- step S501 DRM Module 1 17 parses the request. Step S501 may depend on the type of operation, application and the type of request. [0083] In step S502, DRM Module 117 verifies if the user has the appropriate permissions to access the requested content or to perform the requested operation. If the proper permissions are not available, then the request is denied and DRM Module 1 17 waits for the next request. [0084] If permissions are available in step S503, then DRM Module 1 17 determines if the Throughput Rate needs to be controlled. This could be indicated by a special command, by setting a field in the request or in any other manner. If the Throughput Rate does not need to be controlled, then in step S504. DRM Module 1 17 provides a decryption key to cryptographic module 1 18 and the process moves to step S507, described below. [0085] If the Throughput Rate needs to be controlled, then in step S505, DRM
- Step S506 a decryption key and the Throughput Rate is provided to cryptographic module 1 18.
- step S507 cryptographic module 1 18 controls the Throughput Rate, as described above with respect to Figures 3 and 4.
- the Throughput Rate may be determined or received in a plurality of ways, for example, by using specific commands, in a DRM based content license, from content Bit-Rate and others.
- the Throughput Rate may be determined when digital content is created and may be based on the format or encoding type, or a combination thereof.
- the various embodiments disclosed herein are not limited to any particular method for determining or receiving the Throughput Rate. The following provides some examples for determining or receiving the Throughput Rate:
- a storage system may be given some information (for example, by an Accessing System) regarding a file or provided with a direct or indirect reference to the file that is being accessed.
- a direct reference is a file name.
- An indirect reference may be a key identifier used by a storage system (for example, 1 13. Figure IB) to identify a cipher key for protected content.
- the Throughput Rate may be directly or indirectly- associated with the information, the reference or a combination thereof.
- the storage system processor (103, Figure IA) uses the reference or the information to acquire (or determine) the Throughput Rate.
- additional information for example, file size
- file transfer operation i.e.
- a command when digital content is stored in a storage system may be indicated by a command.
- This command may be sent by the Accessing System and may be used to provide the Throughput Rate to the storage system.
- this approach may be implemented with some other security measure to prevent full speed access to stored content when such a command is not being used.
- the storage system may be locked to operate at a low speed (for example, a low default speed); and then a higher speed may only be available after the command is received or used.
- specific access parameters or login credentials
- Some storage systems for example. TrustedFlash based storage devices. are able to process content security keys (for example, cipher keys).
- the security keys are used to prevent unauthorized access to stored content.
- a security key may be associated with a single digital file and the Throughput rate may be linked to the use of the key.
- a Throughput Rate may be associated with it by using the same command or an additional command that is used to load or create the key. Once a request to use the key is obtained then the adequate Throughput Rate is applied.
- storage systems based on TrustedFlash may use authentication to access security keys. The authentication may be based on verifying a user account. In this example, a Throughput Rate may be provided for each account or for each security key that is used to access content. When access is granted to an account, an additional parameter in an existing command or a new command may be used to provide the Throughput Rate.
- the Throughput Rate is then stored by the storage system for later use.
- Some storage systems may understand a file system structure and are able to determine when a file is being accessed. In this example, when a memory location is accessed, the storage system determines what file uses that location and performs a lookup to obtain a Throughput Rate, and thereafter, applies the associated Throughput Rate. These storage systems may also receive the Throughput Rate as described above.
- the Throughput Rate may be also stored in the storage system itself. For example, in systems that use security to protect content or that use DRM, a field associated with content may be used to store the Throughput Rate. This field may be in addition to other fields that are used to secure access to digital content. For other systems, i.e.
- the Throughput Rate may be associated with any data that helps identify a file.
- the storage system may have its own “database” or “table " that stores Throughput Rate as associated with specific files.
- Some storage systems for example. Smart Cards. SIM cards and others
- Intelligent storage systems for example.
- Smart Cards and SIM cards may add a field to their own internal security database to store the Throughput Rate.
- the security database is used by these devices to store information to prevent unauthorized access.
- the Throughput Rate may be determined only once, for example, at first access and is then stored for later use.
- the Throughput Rate may be associated with access parameters, for example, login credentials.
- the access parameters allow a user to access digital content at the associated Throughput Rate.
- the Throughput Rate may be included as data in a digital certificate, for example, a certificate extension; part of a credential name, for example, some predefined part of a login name, or part of a
- the Throughput Rate may be determined by using the login credentials as a parameter.
- the credentials are processed with some pre-determined functions to get the Throughput Rate to apply.
- the credentials are then used for getting access to content and setting up the Throughput Rate.
- a user identifier and password access parameters
- the Throughput Rate may be included with individual DRM permissions.
- the Throughput Rate may be delivered with a DRM content license.
- the Throughput Rate may vary depending on the type of request.
- the Throughput Rate may be different for copying- moving or for digital content playback.
- Most storage systems only know read and write operations and are unaware of why content is being accessed.
- the purpose of content access is specified when implementing DRM.
- the request type may be identified by using specific commands, a parameter in a command, using specific accounts or an ⁇ " other method. Separate predefined accounts may also be used to indicate the type of access, for example, play, copy and others.
- login with an account may be used to define the purpose for getting data.
- Figure 6 illustrates use of separate login credentials to access content for different functions, for example, playback, copy and move.
- Login X is used to playback content at a certain Bit Rate Xl .
- Login Y is used to copy content at Bit Rate Yl .
- Login Z is used to move content at Bit Rate Zl.
- Bit-rates Xl, Yl and Zl may be different from each other, regardless of the number of login accounts.
- only one account, for example Login X account, may exist to prevent any high speed access for illegal copying.
- a naming schema may be used to identify operations and then a Throughput Rate is applied for the operation. For example. accounts may be named in a way that allows the storage system to recognize the type of access and determine the purpose of getting the data.
- a naming convention for access parameters may be used where a portion after a specific character may denote the type of access, the Throughput Rate to apply, and a combination thereof. Another option would be to set attributes related to permissions within an account. The attributes may be set when the account is created and the Throughput Rate is based on the attributes. Once the storage system is aware of the type of access, it uses the appropriate Throughput Rate.
- Access parameters for digital content may be divided into different parts, for example, the access parameters may include a unique identifier (ID) and an encoded throughput rate value.
- the unique ID may include code to specify or indicate a requested action.
- the unique ID may include bits that may be used to indicate permissions for different types of operations. For example, 3 bits 010 may be used to indicate a "play" operation and 100 may indicate a copy operation.
- the unique ID may also be coded to indicate how many times an operation is allowed. For example 8 bits may provide 256 different codes that may be assigned to a specific permission for a given operation. For example a value of "00000000" may be assigned to play an audio file once.
- 10000000 may be used as a unique ID and 128 kb/s may be represented with this unique ID as: 10000000 010 001 010100 i.e. 525396 in hexadecimals
- the Throughput Rate may be applied in a plurality of ways based on the application and how the Throughput Rate was determined or received. The following provides some examples of how the Throughput Rate may be applied:
- the Throughput Rate is implemented using a DRM license, then it may be applied by the DRM Module (or a cryptographic module) by using a delay, as described above. In another embodiment, it may be applied at the storage system level by controlling I/O buffer access, also described above.
- the Throughput Rate is associated with access parameters (for example. login credentials), then the Throughput Rate be applied when a login account associated with the Throughput Rate is accessed.
- access parameters for example. login credentials
- the Throughput Rate be applied when a login account associated with the Throughput Rate is accessed.
- a security key for example, a cipher key, a content license and others
- Controlling Display of Advertising Content is applied when the account is used to access specific content protected by the security kev.
- the Throughput Rate may be used to control how digital advertisements (may be referred to as "advertisements ** ) are displayed to a user using Accessing System 101 ( Figure IA), before a user is allowed access to other digital content.
- Figure 7 shows an example of associating digital advertisement(s) 700 with various digital content files (shown as Content 1. Content 2 and Content 3).
- a Throughput Rate is associated with advertisement 700.
- Advertisement 700 is displayed to a user at the associated Throughput Rate before a user can Utilize Content 1. 2, and 3.
- Access parameter 701 is associated with advertisement 700 and may be used to control access to Content 1. 2 and 3.
- access parameter 701 is defined by a hashing function for advertisement content 700.
- access parameter 701 may include at least one login account or a key identifier, which may be used to gain access to one or more of Content 1, 2 and 3.
- Access parameter 701 is protected by a hash function for advertisement 700 so that advertisement 700 is displayed in full at a controlled Throughput Rate before other content (for example, Content L 2 or 3) can be accessed.
- Different access parameters shown as AP 1, AP 2 and AP 3 maybe associated with different advertisement content (shown as AD #1. AD#2 and Ad*3).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11194684A EP2434425A1 (fr) | 2007-03-30 | 2008-03-26 | Procédé et système de contrôle des accès à un contenu numérique |
EP11194701A EP2434426A1 (fr) | 2007-03-30 | 2008-03-26 | Procédé et système de contrôle des accès à un contenu numérique |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/694,868 US20080243755A1 (en) | 2007-03-30 | 2007-03-30 | System for controlling access to digital content |
US11/694,866 US8566695B2 (en) | 2007-03-30 | 2007-03-30 | Controlling access to digital content |
PCT/US2008/058202 WO2008121639A1 (fr) | 2007-03-30 | 2008-03-26 | Méthode et système de contrôle d'accès à un contenu numérique |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2132677A1 true EP2132677A1 (fr) | 2009-12-16 |
Family
ID=39472499
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11194701A Withdrawn EP2434426A1 (fr) | 2007-03-30 | 2008-03-26 | Procédé et système de contrôle des accès à un contenu numérique |
EP11194684A Withdrawn EP2434425A1 (fr) | 2007-03-30 | 2008-03-26 | Procédé et système de contrôle des accès à un contenu numérique |
EP08744359A Ceased EP2132677A1 (fr) | 2007-03-30 | 2008-03-26 | Méthode et système de contrôle d'accès à un contenu numérique |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11194701A Withdrawn EP2434426A1 (fr) | 2007-03-30 | 2008-03-26 | Procédé et système de contrôle des accès à un contenu numérique |
EP11194684A Withdrawn EP2434425A1 (fr) | 2007-03-30 | 2008-03-26 | Procédé et système de contrôle des accès à un contenu numérique |
Country Status (5)
Country | Link |
---|---|
EP (3) | EP2434426A1 (fr) |
JP (1) | JP2010527465A (fr) |
KR (1) | KR20100014767A (fr) |
TW (1) | TW200903295A (fr) |
WO (1) | WO2008121639A1 (fr) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8566695B2 (en) | 2007-03-30 | 2013-10-22 | Sandisk Technologies Inc. | Controlling access to digital content |
CN101917318A (zh) * | 2010-02-11 | 2010-12-15 | 深圳市国微电子股份有限公司 | 一种高低速总线系统连接装置及高低速总线系统 |
US8954597B2 (en) | 2010-06-28 | 2015-02-10 | Hulu, LLC | Method and apparatus for synchronizing paused playback across platforms |
JP5833114B2 (ja) * | 2010-06-28 | 2015-12-16 | フル・エルエルシー | Httpライブストリーミングと両立できるようにストリーミングメディアプログラムおよび目標とされた広告を供給する方法および装置 |
US9448723B2 (en) | 2010-06-28 | 2016-09-20 | Hulu, LLC | Method and apparatus for intuitive navigation of a media program |
US9721254B2 (en) | 2010-06-28 | 2017-08-01 | Hulu, LLC | Method and apparatus for providing streaming media programs and targeted advertisements using multiple advertisement version segments |
ES2363355B2 (es) * | 2010-12-24 | 2012-11-16 | Universidad Politécnica de Madrid | Sistema de ralentización de la tasa de transferencia de un dispositivo por método criptográfico. |
JP2013016221A (ja) * | 2011-07-01 | 2013-01-24 | Funai Electric Co Ltd | 転送制御装置及び再生装置 |
KR102284557B1 (ko) | 2013-08-02 | 2021-07-30 | 쇼와덴코머티리얼즈가부시끼가이샤 | 감광성 수지 조성물 |
KR20240128527A (ko) | 2023-02-17 | 2024-08-26 | 광운대학교 산학협력단 | 주요 경로 추출을 통한 넷리스트 간소화 장치 및 방법 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6801964B1 (en) * | 2001-10-25 | 2004-10-05 | Novell, Inc. | Methods and systems to fast fill media players |
US20050198681A1 (en) * | 2004-03-08 | 2005-09-08 | Sharp Laboratories Of America, Inc. | Playout buffer management to minimize startup delay |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
EP1473721B1 (fr) * | 1998-12-11 | 2015-07-15 | Sony Corporation | Méthode pour contrôler la copie de données |
JP4025941B2 (ja) * | 1998-12-28 | 2007-12-26 | ソニー株式会社 | 情報信号の複製制御システムおよび情報出力装置 |
JP4245865B2 (ja) * | 2002-07-04 | 2009-04-02 | シャープ株式会社 | 情報処理装置および情報処理方法 |
CN1669086A (zh) * | 2002-07-17 | 2005-09-14 | 皇家飞利浦电子股份有限公司 | 利用数字限速槛的复制控制 |
US7313814B2 (en) * | 2003-04-01 | 2007-12-25 | Microsoft Corporation | Scalable, error resilient DRM for scalable media |
US20040250065A1 (en) * | 2003-05-24 | 2004-12-09 | Browning James V. | Security software code |
-
2008
- 2008-03-26 EP EP11194701A patent/EP2434426A1/fr not_active Withdrawn
- 2008-03-26 KR KR1020097016571A patent/KR20100014767A/ko not_active Application Discontinuation
- 2008-03-26 EP EP11194684A patent/EP2434425A1/fr not_active Withdrawn
- 2008-03-26 EP EP08744359A patent/EP2132677A1/fr not_active Ceased
- 2008-03-26 WO PCT/US2008/058202 patent/WO2008121639A1/fr active Application Filing
- 2008-03-26 JP JP2010501177A patent/JP2010527465A/ja active Pending
- 2008-03-28 TW TW097111552A patent/TW200903295A/zh unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6801964B1 (en) * | 2001-10-25 | 2004-10-05 | Novell, Inc. | Methods and systems to fast fill media players |
US20050198681A1 (en) * | 2004-03-08 | 2005-09-08 | Sharp Laboratories Of America, Inc. | Playout buffer management to minimize startup delay |
Also Published As
Publication number | Publication date |
---|---|
TW200903295A (en) | 2009-01-16 |
JP2010527465A (ja) | 2010-08-12 |
EP2434425A1 (fr) | 2012-03-28 |
EP2434426A1 (fr) | 2012-03-28 |
KR20100014767A (ko) | 2010-02-11 |
WO2008121639A1 (fr) | 2008-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9876797B2 (en) | Controlling access to digital content | |
EP2434425A1 (fr) | Procédé et système de contrôle des accès à un contenu numérique | |
US8761402B2 (en) | System and methods for digital content distribution | |
US8839005B2 (en) | Apparatus for transferring licensed digital content between users | |
US20080065552A1 (en) | Marketplace for Transferring Licensed Digital Content | |
US8533807B2 (en) | Methods for accessing content based on a session ticket | |
US8763110B2 (en) | Apparatuses for binding content to a separate memory device | |
US20080115211A1 (en) | Methods for binding content to a separate memory device | |
EP2410456A1 (fr) | Procédés et appareils pour lier le contenu à un dispositif mémoire séparé | |
US20080112566A1 (en) | Apparatuses for accessing content based on a session ticket | |
US20080243755A1 (en) | System for controlling access to digital content | |
US20080114686A1 (en) | Apparatuses for linking content with license | |
US20080112562A1 (en) | Methods for linking content with license | |
EP2062190A2 (fr) | Transfert entre des utilisateurs de contenu numérique autorisé par une licence | |
KR101464960B1 (ko) | 라이센스와 콘텐트를 연결하기 위한 방법과 장치 | |
KR101450131B1 (ko) | 세션 티켓을 바탕으로 콘텐트에 액세스하기 위한 방법과 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20090721 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR |
|
17Q | First examination report despatched |
Effective date: 20100120 |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SANDISK TECHNOLOGIES INC. |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20140123 |