US20080137865A1 - System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media - Google Patents
System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media Download PDFInfo
- Publication number
- US20080137865A1 US20080137865A1 US11/901,577 US90157707A US2008137865A1 US 20080137865 A1 US20080137865 A1 US 20080137865A1 US 90157707 A US90157707 A US 90157707A US 2008137865 A1 US2008137865 A1 US 2008137865A1
- Authority
- US
- United States
- Prior art keywords
- area
- content
- memory array
- accessible
- media
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims description 68
- 238000003860 storage Methods 0.000 claims description 27
- 230000003287 optical effect Effects 0.000 abstract description 3
- 230000005055 memory storage Effects 0.000 abstract 1
- 230000008569 process Effects 0.000 description 46
- 238000012545 processing Methods 0.000 description 27
- 230000006870 function Effects 0.000 description 18
- 239000008186 active pharmaceutical agent Substances 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 3
- 238000003384 imaging method Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 230000000717 retained effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1014—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to tokens
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/108—Transfer of content, software, digital rights or licenses
- G06F21/1083—Partial license transfers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00275—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored on a chip attached to the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00347—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier wherein the medium identifier is used as a key
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00362—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being obtained from a media key block [MKB]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00528—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein each title is encrypted with a separate encryption key for each title, e.g. title key for movie, song or data file
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00666—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of erasing or nullifying data, e.g. data being overwritten with a random string
- G11B20/00673—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of erasing or nullifying data, e.g. data being overwritten with a random string wherein the erased or nullified data include a cryptographic key
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
- G11B27/005—Reproducing at a different information rate from the information rate of recording
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
- G11B27/10—Indexing; Addressing; Timing or synchronising; Measuring tape travel
- G11B27/102—Programmed access in sequence to addressed parts of tracks of operating record carriers
- G11B27/105—Programmed access in sequence to addressed parts of tracks of operating record carriers of operating discs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/10537—Audio or video recording
- G11B2020/10546—Audio or video recording specifically adapted for audio data
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/60—Solid state media
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/78—Television signal recording using magnetic recording
- H04N5/781—Television signal recording using magnetic recording on disks or drums
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/84—Television signal recording using optical recording
- H04N5/85—Television signal recording using optical recording on discs or drums
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/907—Television signal recording using static stores, e.g. storage tubes or semiconductor memories
Definitions
- Source code is submitted on a compact disc according to 37 CFR 1.52 as an appendix containing the following files, each of which is hereby incorporated by this reference in its entirety: Sd_security ⁇ Sd_oem ⁇ Makefile, Nov. 05, 2001, 2KB; Sd_security ⁇ Sd_oem ⁇ Readme, Nov. 05, 2001, 3KB; Sd_security ⁇ Sd_oem ⁇ Sd_oem.c, Nov. 05, 2001, 6KB; Sd_security ⁇ Sd_oem ⁇ Sd_oem.h, Nov. 05, 2001, 1KB; Sd_security ⁇ Sd_oem ⁇ Sd_oem.inc, Nov.
- This invention relates generally and specifically to secure playback of digital audio, video or other content from memory cards, compacts disks or other media.
- the potential of electronic distribution of copyrighted music over the Internet, by other communication systems or through retail kiosks, is being limited by concerns about unauthorized copying of the music. This is also the case for other audio, as well as video, content.
- the content is typically provided to the ultimate customer in encrypted form, and the customer records the encrypted content files onto some storage media, such as a personal computer memory, a memory of a portable playing device, a writable compact disk (CD) or a non-volatile memory card.
- Some storage media such as a personal computer memory, a memory of a portable playing device, a writable compact disk (CD) or a non-volatile memory card.
- Providers of the content would like to eliminate the possibility of unauthorized copying of the content but have to be satisfied with taking steps that minimize the amount of copying that occurs.
- the protection of content stored on non-volatile memory cards is described herein, as specific examples, but the same content protection techniques can
- Non-volatile memory cards There are several commercially available non-volatile memory cards that are suitable for use as the content data storage media.
- One is the CompactFlash (CF) card
- MMC MultiMediaCard
- SD Secure Digital
- All three, and others, are available in various storage capacities from SanDisk Corporation of Milpitas, Calif., assignee of the present application.
- the physical and electrical specifications for the MMC are given in “The MultiMediaCard System Specification” that is updated and published from time-to-time by the MultiMediaCard Association (“MMCA”) of Cupertino, Calif. Versions 2.11 and 2.2 of that Specification, dated June 1999 and January 2000, respectively, are expressly incorporated herein by this reference.
- the MMC products are also described in a “MultiMediaCard Product Manual,” Revision 2 , dated April 2000, published by SanDisk corporation, which Manual is expressly incorporated herein by this reference. Certain aspects of the electrical operation of the MMC products are also described in patent applications of Thomas N. Toombs and Micky Holtzman, Ser. No. 09/185,649, now U.S. Pat. Nos. 6,279,114, and 09/186,064, now U.S. Pat. No. 6,901,457, both filed Nov. 4, 1998, and assigned to SanDisk Corporation. The physical card structure and a method of manufacturing it are described in U.S. Pat. No. 6,040,622, assigned to SanDisk Corporation. These patents are also expressly incorporated herein by this reference.
- the newer SD Card is similar to the MMC card, having the same in plan view. A primary difference between them is that the SD Card includes additional data contacts in order to enable faster data transfer between the card and a host.
- the other contacts of the SD Card are the same as those of the MMC card in order that sockets designed to accept the SD Card will also accept the MMC card.
- the electrical interface with the SD card is further made to be, for the most part, backward compatible with the MMC product described in version 2.11 of its specification referenced above, in order that few changes to the operation of the host need be made in order to accommodate both types of card.
- the electrical interface of the SD Card, and its operation, are described in co-pending patent application Ser. No. 09/641,023, filed Aug. 17, 2000, now U.S. Pat. No. 6,820,148, which application is incorporated herein in its entirety by this reference.
- Encrypted content is difficult to access, and memory cards or compact disks with encrypted content each have specific structures that require specific commands and routines to access encrypted and unencrypted content.
- the software of the present invention is a simple solution that any original equipment manufacturer (OEM) can install and run on a myriad of different types of devices having a myriad of different types of microprocessors. These devices range from personal computers to portable devices to car stereos, and include any device from which one would like to access content that may be encrypted.
- the portable devices may be portable audio players or cell phones or portable organizers or generally any microprocessor controlled portable device.
- the storage media may be flash memory or any type of recordable disk.
- the devices may have a simple or powerful microprocessor with a small or large amount of memory.
- the software utilizes and requires only a small buffer for encryption purposes and is designed to run efficiently even in environments with limited processing power and memory. It can be run by any type of general purpose microprocessor, or special purpose microprocessors such as a DSP, or an ASIC. Additionally, computationally demanding portions of the software, such as the encryption and decryption (security) engine may be executed by the DSP, while other portions of the software may be executed by another microprocessor or an ASIC.
- the software has audio, video and image interfaces to receive commands for each of the respective types of files. These interfaces can organize playback and recording, including managing playlists and other convenient features. Thus, whatever the device, it need only issue a command to an interface and the software will take care of reading or writing data from the secure media, and decoding and decompressing the data from any well known audio, video or image file formats within the audio video or image engines.
- the encryption and decryption takes place in an isolated module that is very difficult to access and thus isolated from any attempts from unauthorized persons wishing to access encryption keys in order to copy the files from the media or the device.
- Content is only decrypted in small portions, and a method of dynamic key generation and deletion minimizes exposure of decrypted keys.
- FIG. 1 is an illustration of the devices used to read and write information on a secure media.
- FIG. 2 is a schematic diagram of a device used to access the secure media.
- FIG. 3A is an abstract illustration of the layers of the secure media.
- FIG. 3B is an illustration of the physical and logical structure of the memory cells of the secure media.
- FIG. 3C is an illustration of the track structure and the component parts of a track.
- FIG. 4 is an illustration of a media key block (MKB) image broken into its component chunks.
- MKB media key block
- FIG. 5 is an illustration of a portion of the authentication and decryption process.
- FIG. 6 is an illustration of the authentication and encryption process.
- FIG. 7 is a schematic of the authentication key exchange process shown in FIG. 6 .
- FIG. 8A is a block diagram of the software of the present invention.
- FIG. 8B is a block diagram illustrating the modules of the software of the present invention.
- FIG. 8C is a flow chart overview of the pre-play and play process according to the present invention, with the related API modules/calls shown.
- FIG. 8D is an expanded flow chart of audio content initialization phase in FIG. 8C .
- FIG. 8E is an illustration of information blocks created during the pre-play process 805 of FIG. 8C .
- FIG. 9 is a flow chart overview of the playback of an audio track according to the present invention.
- FIG. 10 is a flow chart of the processing of an MKB image seen in FIG. 4 , a step of FIG. 9 .
- Encrypted content is difficult to access, and memory cards or compact disks with encrypted content each have specific structures that require specific commands and routines to access encrypted and unencrypted content.
- the software of the present invention is a simple solution that any original equipment manufacturer (OEM) can install and run on a myriad of different types of devices having a myriad of different types of microprocessors. These devices range from personal computers to portable devices to car stereos, and include any device from which one would like to access content that may be encrypted.
- the portable devices may be portable audio players or cell phones or portable organizers or generally any microprocessor controlled portable device.
- the storage media may be flash memory or any type of recordable disk.
- the devices may have a simple or powerful microprocessor with a small or large amount of memory.
- the software utilizes and requires only a small buffer for encryption purposes and is designed to run efficiently even in environments with limited processing power and memory. It can be run by any type of general purpose microprocessor, special purpose microprocessors such as a DSP, or an ASIC. Additionally, computationally demanding portions of the software, such as the encryption and decryption (security) engine may be executed by the DSP while other portions of the software may be executed by another microprocessor or an ASIC.
- the source code referred to in the Cross Reference section forms a part of this application, and is hereby expressly incorporated in its entirety by this reference.
- a host computer device 11 may be a personal computer (PC), as shown, a kiosk located in a retail store to distribute music or other content, or the like.
- An SD memory card 13 is used in this example to store music.
- the card 13 is insertable into a utilization device, in this case a portable device (PD) 15 that operates from batteries to play the music or other audio content recorded on the card 13 through personal earphones.
- the music may be stored on the card 13 when inserted into the device 15 by connecting the device 15 to the host 11 , such as through a computer universal serial bus (USB) connection 17 .
- USB computer universal serial bus
- a card writer/reader 19 may be connected to the computer through a USB connection 21 , and the card 13 inserted into it for recording music on the card. The card 13 is then removed from the writer/reader 19 and inserted into the portable device 15 to play the audio content recorded on the card.
- the host 11 is termed a licensed compliant module (LCM) when it includes the software necessary to write to and read from the card 13 content data in accordance with the security and authentication protocols of the 4C Entity and the SD Group.
- LCM licensed compliant module
- the electronic system within the example portable utilization device 15 is illustrated in FIG. 2 .
- a computing unit (MCU) 25 Operably connected together through a bus 23 are a computing unit (MCU) 25 , preferably with some non-volatile flash memory 25 A, system memory 27 , which is preferably a high speed random access memory (RAM), and interface circuits 29 for connecting with the memory card 13 .
- the USB connection 17 is also optionally provided to the MCU 25 .
- a digital signal processor (DSP) 31 is also included, when needed, for decompressing and/or decrypting content data, such as audio or video data, that is stored in a compressed and/or encrypted form.
- DSP 31 also has its own RAM memory 31 A included as part of the processor. DSP 31 may or may not be included.
- ROM 32 can store part or all of the software of the invention. Software instructions and data in ROM 32 can be executed or read directly from ROM 32 or first shadowed into any RAM memory included in the circuitry of the device.
- a memory card 13 can be thought of as having four distinct layers. Such layers may also be present in other types of secure media.
- data is stored in memory cells arranged in clusters on the physical layer 13 d of memory card 13 .
- the data is encrypted or secure if it is copyrighted material or otherwise worthy of encryption. Keys used to encrypt and decrypt the secure content are also encrypted and stored in a secure area of the physical layer.
- the software of the present invention runs within a device to allow the device to store and retrieve encrypted information without the manufacturer (OEM) having to program very specific instructions to access the memory cells containing encrypted data and keys. It contains methods of sending the encrypted data to the device, decrypting the data within the device, and decompressing and playing audio, video and image files upon requests from the device. In short, a device need only send a command such as “play track.” The software will accept the command, retrieve the encrypted data stored in the memory cells, retrieve the encrypted keys, organize and decrypt the data, decompress and format it, and play the song back.
- OEM manufacturer
- Logical layer 13 c contains the organizational structure for the memory cells and clusters of physical layer 13 d .
- the two layers 13 c and 13 d contain and logically structure the memory of card 13 .
- security layer 13 b controls and limits access to the secure data housed in the layers below.
- Application layer 13 a is the part of memory card 13 that communicates with a device accessing the content stored in the card. It does this through a device interface or contacts 39 .
- Memory card 13 preferably includes a controller that manages the operation of the card and functionality of the application layer 13 together with control of all layers 13 a - d of the card.
- the card includes an array of memory cells 33 and a memory controller 35 .
- User data, commands and status signals are communicated between the controller 35 and the memory array 33 over a circuit 37 .
- the controller 35 communicates with a host device connected to a socket in which the card is inserted through a series of electrical contacts 39 on the card.
- the memory cells of the array 33 are divided into the four non-overlapping areas of cells that are individually designated to store different types of data.
- a largest storage capacity area 41 is designated to store user data, in this case, encrypted audio, video or other data.
- the user data may or may not also include unencrypted data.
- a system area 43 of the memory stores a 64-bit media identifier (IDmedia) of the card manufacturer, and 16 media key blocks (MKB) provided by the 4C Entity, each MKB having a maximum size of 4k bytes, all being pre-recorded by the card manufacturer.
- IDmedia media identifier
- MKB media key blocks
- One of the 16 MKBs is specified for use with audio user data, another for use with video user data, another for use of image data, and so on.
- the system area 43 is a write-protected area that is accessible for reading from outside of the card.
- a hidden area 45 carries 16 pre-recorded media unique keys (Kmu) corresponding to the 16 distinct media key blocks (MKB) stored in the system area 43 .
- the hidden area 45 is a write-protected area that is accessible only by the memory card itself.
- a protected area 47 is a read/write area that is accessible only after a successful explicit mutual authentication has occurred. Randomly picked title keys (Kt) and copy control information (CCI) are stored in the protected area 47 in an encrypted form.
- Kt title keys
- CCI copy control information
- Each piece (file) of content stored in the user data area 41 is encrypted with a unique title key that is also stored in an encrypted form in the protected area 47 .
- the title keys and CCI stored in the protected area 47 are concatenated and encrypted together by the media unique key, which is unique for each memory card and stored in its hidden area 45 .
- the file system of the user data area 41 is typically an ordinary FAT file system.
- the FAT system describes what memory clusters make up what tracks and the various sub-components of the tracks.
- Audio or video tracks within user data area 41 may comprise multiple files as illustrated in FIG. 3C .
- Audio files are referred to as audio objects (AOB's) and picture files are referred to a picture objects (POB's).
- a track may comprise both.
- Track 300 for example is composed of AOB 304 and AOB 308
- track 302 is composed of AOB 306 and the last track xxx is composed of AOB xxx and POB xxx.
- Each AOB or POB is also broken down into sub components.
- AOB 304 is shown broken down into AOB blocks 312 , which are further broken down into AOB elements 316 with header 318 .
- Each element may be stored in one or more memory clusters of memory card 13 .
- AOB elements are divided into the lowest component level, AOB frames 320 .
- each two seconds may comprise a varying number of frames.
- a time search table (TMSRT) has information about the number of frames and data size which corresponds to “every two seconds” of playback. This information is used when an audio or video track and the component AOB's elements and frames are accessed for fast forward and rewind. Also, as will be discussed later with regard to FIGS.
- title key (Kt) is an a decrypted state only for the time it takes to access this “every two seconds” of content, although anywhere from less than one to ten seconds of content may be decrypted at a time.
- Kt title key
- the entire MKB image 49 is 64 Kbytes. It is broken into 128 chunks of 512 bytes, and chunk 1 , which contains all or part of the first record, and is labeled MKB chunk 50 in the figure, is enlarged to show its component parts. Chunk 50 may also contain multiple records.
- a first field 51 contains the record type, a second field 53 the total length of the record, and the remaining field 55 the key itself.
- the data in the record type and length fields 51 and 53 are not encrypted.
- Each record of the MKB is a multiple of 4 bytes in total length. As illustrated by a block 57 of FIG.
- the MKB key records are decrypted by device keys stored in the portable device (PD), licensed compliant module (LCM) or other device that utilizes a memory card for reading or programming content data stored on it.
- Device keys Kd 1 , Kd 2 , Kd 3 . . . are written into a memory of the utilization device, such as non-volatile flash memory within the MCU 25 of the portable audio player of FIG. 2 , by the manufacturer of the device.
- the device keys are provided to device manufacturers by the 4C Entity, and are maintained in confidence. The number of device keys which are stored in a given utilization device depends upon the type of the device.
- the utilization device which performs the processing of FIG. 5 calculates the media key Km as part of the decryption of block 57 , which is discussed in further detail with regard to FIGS. 9 and 10 .
- Each record ( FIG. 4 ) of the MKB read from the system area of an inserted memory card is usually processed in this manner.
- the most recently calculated Km value is taken as the secret media key output of the block 57 .
- This media key Km and the media identifier IDmedia are combined by use of a C2 one-way function, as indicated by a block 59 of FIG. 5 , to produce the media unique key Kmu. Additional details of this processing may be had by reference to the 4C Entity publications referenced previously.
- FIG. 6 illustrates all of the authentication and encryption processing that takes place when either recording audio content onto, or playing audio content from, a memory card 13 having the memory space allocation of FIG. 3 .
- Processing that takes place in a personal computer or other LCM 63 is illustrated for recording audio or other content onto the card 13 .
- the processing of a portable audio or other utilization device 65 is shown for reading the recorded content from the card 13 . Included in both is the processing described with respect to FIG. 5 , the processing blocks 57 and 59 being part of the utilization device 65 and corresponding processing blocks 57 ′ and 59 ′ being part of the content recording system 63 .
- an arbitrarily assigned title key Kt is input at a line 67 for use by an encryption module 69 to encrypt one file (piece) of audio or other content input at line 71 .
- the encrypted file is then stored in the user data area 41 of the memory card 13 .
- an encrypted version of the title key (Kt) is stored in the protected card memory area 47 , as previously described.
- An encrypted version of the title key (Kt) is also stored in either system memory 27 , RAM memory 25 A of MCU 25 , or RAM memory 31 A of DSP 31 . Storing the encrypted title key (Kt) in a memory of the device eliminates the need to access protected card memory area 47 .
- the title key Kt and copy control information CCI are encrypted by a series of encryption modules 75 , 77 and 79 in the LCM 63 , and a module 81 on the memory card 61 .
- the media unique key Kmu is used by the module 77 .
- An authentication key exchange (AKE) module 83 combines the media unique keys Kmu as calculated by the module 59 ′ and stored in the hidden area 45 of the card 61 , to generate a session key Ks that is used by each of the modules 79 and 81 .
- corresponding modules indicated with the same reference numbers but with a prime (′) added, are utilized to perform an inverse of the encryption process.
- FIG. 7 illustrates a technique for accessing the protected area 47 of a memory card, utilizing an authentication and key exchange (AKE) challenge-response protocol between a card and some LCM or utilization device.
- AKE authentication and key exchange
- the card and the other module or device share a secure common session key Ks. Additional details of the forgoing processing and protocols may be had by reference to the 4C Entity publications previously identified.
- FIGS. 8A and 8B illustrate an embodiment of a software system designed to run in a portable device or LCM in order to access information encrypted with the aforementioned processes.
- the SanDisk software, SW 100 is a complete turn-key software solution that enables OEM music players and recorders to readily support secure media including the secure digital (SD) memory card.
- SW 100 may also be installed in any licensed compliant module such as a personal computer.
- FIG. 8A at its highest level, SW 100 receives calls from device 15 , particularly a user interface of device 15 , retrieves encrypted content from the Secure Digital card 13 , and returns decrypted content to the device.
- SW 100 receives calls from device 15 , particularly a user interface of device 15 , retrieves encrypted content from the Secure Digital card 13 , and returns decrypted content to the device.
- SW 100 receives calls from device 15 , particularly a user interface of device 15 , retrieves encrypted content from the Secure Digital card 13 ,
- Performing accesses to the authentication area of the SD Memory Card requires using secret device keys that OEMs must license from the 4C Entity, as mentioned previously. Protecting these key values and restricting their exposure within SDK SW 100 software layers is one of the central considerations in the software design. Isolation of these keys (and other resultant values such as session keys) within a single internal module while enabling a secure media such as the SD memory card device driver to perform operations dependent on these values is achieved in a robust and secure interface methodology.
- the SD memory card is used to illustrate the invention; however, the invention can be used on any secure media such as CDs or other secure memory that may be in a card or even in a remotely located storage device.
- FIG. 8B illustrates the layered structure of SW 100 in more detail.
- Audio interface 105 , video interface 110 , and imaging interface 115 are the points of communication to the device. These interfaces provide a single point of communication for the device and generally receive simple commands from the device so that the device does not have to get involved with the intricacies of getting encrypted data from a secure media, then decrypting and processing the data. All of these complex processes are handled by SW 100 .
- Interfaces 105 , 110 , and 115 also manage the arrangement of playback such as managing playlists and the correlation of images such as that of an artist with the songs of the artist or the various playlists.
- Application programming interface (API) 130 A resides within command dispatcher (CD) 130 .
- CD 130 and API 130 A receive commands from interfaces 105 , 110 , and 115 , relay information to the interfaces, and organize all of the processes that take place in the SW 100 —the processes of device 15 related to the playback and recording of content stored on the secure media, with all of the requisite encryption, decryption, and compression algorithms.
- SD audio engine (SDAE) 140 , SD video engine (SDVE) 150 , and SD image engine (SDIE) 160 respectively process audio, video, and image content residing on the secure media, upon receipt of instructions from CD 130 .
- SDAE 140 can process any of the well known formats for audio, such as AAC, WMA, and MP3.
- SDVE 150 can process any of the well known formats for video clips such as Windows media files or real networks files MPEGs or any other well known type of video files.
- SDIE 160 can process any well known type of image files such as TIF, GIF, JPEG, bitmaps, etc.
- Each interface has a secure API (SAPI) and a non-secure API (NSAPI). The content processed may or may not be encrypted.
- SAPI secure API
- NSAPI non-secure API
- Encrypted content is accessed through SAPIs 140 A, 150 A, and 160 A. These SAPIs communicate with SanDisk security manager (SSM) 180 . All commands having to do with secure content are channeled through SSM 180 . Secure digital security engine (SDSE) 175 , which will be described later in further detail, handles all encryption and decryption processes. Keys used to authenticate the media and decrypt the content are contained within and handled exclusively by SDSE 175 . Unencrypted content residing on the card is accessed through NSAPI 140 B, 150 B, and 160 B. These NSAPIs communicate with a non-secure file interface (NSFI) 170 in order to access unencrypted content on the media.
- NSFI non-secure file interface
- NSFI 170 and SDSE 175 communicate with device driver 190 .
- Device driver 190 in the example of the SD card manages and drives signals to and from the device interface 39 's contacts of the SD card 13 .
- Device driver 190 will be tailored to the specific type of device interface 39 of various devices or media. In the case of a memory card device, driver 190 manages and drives signals to and from contacts located on device 15 . In the case of optical media, device driver 190 may manage and drive signals from various hardware components including an optical pick-up unit. Alternatively, in the case of a hard disk drive (hdd), device driver 190 will manage and drive the required hdd signals.
- hdd hard disk drive
- Device driver 190 contains a secure device driver interface (SDDI) 190 A, and a non-secure device driver interface (NSDDI) 190 B.
- SDDI 190 A and NSDDI 190 B are isolated from each other within device driver 190 .
- SDDI 190 A communicates exclusively with SDSE 175
- NSDDI 190 B communicates exclusively with NSFI 170 .
- SD Security engine SD security engine 175 . All manipulation of these values is solely restricted to this module. Values are never passed in or out to software layers above SDSE 175 . All requests for the security services involving these keys are controlled and monitored by SSM 180 that shields this security module. Beneath the security module, the SD Memory Card device driver 190 carries out security accesses. Requests for these driver services are made via a private driver security interface, secure device driver interface (SDDI) 190 A, that is only known to the security module. SDSE 175 uses this interface 190 A to perform special security commands such as Get Media Key Block (MKB). Non-secure device driver interface (NSDDI) 190 B also utilizes device driver 190 to access any unencrypted files in user area 41 of card 13 .
- SDDI secure device driver interface
- SW 100 The security of SW 100 architecture resides in the security of its keys. Secret “soft keys” are not stored in temporary secure areas for a long period of time, since this increases the possibility of compromising the keys and thus the encrypted content.
- SW 100 utilizes a scheme within SDSE 175 of dynamically generating the needed keys (or “soft keys”) and deleting them when there is no immediate need for those specific keys.
- SW 100 in particular, command dispatcher 130 /API 130 A have a number of API routines that can be called upon to perform a certain function. Although there are many routines, only 22 of the routines are accessed externally by device 15 . These routines are accessed by calls, which are also referred to as commands. In order to retrieve the content in memory card (or other media) 13 , the device need only send one of the 22 calls and the content will be retrieved, decrypted if necessary, and decoded. In the case of audio, for example, the device need only send the “play” call, and the music will start.
- SD Secure Digital
- FIG. 8C there is a pre-play process 805 and a play process 810 .
- the blocks of FIG. 8E are created during the processes of FIG. 8C .
- the related API modules are executed when called upon by the user interface of device 15 .
- calls to the modules are sent by the user interface of device 15 to the audio interface 105 as seen in FIG. 8B .
- the primary calls/modules that carry out the functionality listed in the flowchart are indicated on the right. Many of these modules execute other internally and externally accessed modules, and the list is not meant to be exhaustive, but is meant to be a reference to the software code on compact disc that was previously incorporated by reference and forms a part of this application. For further detail please refer to the software code.
- the device is first powered up in step 803 , after which the pre-play process 805 commences.
- the pre-play process has two major phases: a power up initialization phase 805 . 10 , and an audio content initialization phase 805 . 20 . Audio content initialization phase will be described in further detail with regard to FIG. 8D .
- pre-play process 805 the device and media are initialized and certain information from the media is read from the media and stored in a buffer of a RAM memory of device 15 .
- this RAM memory may either be system memory 27 , RAM memory 31 A of DSP 31 , or RAM memory 25 A of MCU 25 .
- SW 100 will get the drive number of the media. In some applications there may be more than one memory card or disk being accessed by device 15 . In this step it will get all the drive numbers in order that content on each of the drives can be properly accessed. This is accomplished with API routine SdInitAudioSystem, and can either be called upon by device 15 or can be internally called by SW 100 as part of a pre-play routine.
- SW 100 will then initialize SSM 180 and SDSE 175 within SW 100 . This is necessary before any encrypted keys and content from the media can be processed.
- SW 100 will also initialize the playlist and track manager in card 13 .
- step 805 B SW 100 will initialize and verify the media.
- the MKB process of FIGS. 5-7 will be performed. This MKB process can also be executed during step 805 A, and if previously executed it will not be executed again in step 805 B.
- media information values will be copied from the card 13 and stored in locations of media information block 850 of FIG. 8E in a RAM memory of device 13 .
- API routine SdMountAudio can either be called upon by device 15 or can be internally called by SW 100 as part of a pre-play routine.
- values for playlist general information (pTGInfo), the validity number of the media (SanDisk), the drive number (drivenum), the security system of the media (security) and the mounting status of the media (mounted) will be filled in their respective locations. These locations can then be subsequently read from the RAM of device 15 when called upon by any number of API calls without having to read them from card 13 .
- audio content initialization 805 . 20 commences. Generally speaking, during audio content initialization 805 . 20 , information specifying location and sequencing of the encrypted audio content of an individual track and multiple audio tracks (playlists) are copied from the card (or other media) 13 into a small buffer in a RAM of device 15 . This information, shown in blocks in FIG. 8E , is thus quickly and easily accessible within the device and does not need to be constantly read from or updated to card 13 during the subsequent play process 810 .
- This phase creates a number of structures that act as a local roadmap or directory to the encrypted content on memory card (or other media) 13 .
- step 805 C device 15 calls API module SdGetPlayListCount.
- This call and all of the following calls, are generally sent from the software of a user interface of device 15 to one of the interface modules of SW 100 .
- the call is sent from the user interface to audio interface 105 .
- the call would be sent to video interface 110 and in the case of image reproduction, the call would be sent to imaging interface 115 .
- the call is then relayed to command dispatcher 130 which contains the API modules within API 130 A.
- step 805 D SdGetPlayListCount will fill in the values for the Playlist Info block 860 by copying the information from card 13 into a RAM memory of device 15 . It will select the appropriate authorized drive(s) by referring to media info block 850 . The total number of playlists for all authorized drives will be copied into a RAM of device 15 .
- step 805 E device 15 calls API module SdGetPlaylist.
- step 805 F SdGetPlaylist will fill in the values for the playlist info block 860 by copying the information from card 13 into a RAM memory of device 15 . It will select the appropriate authorized drive where the playlist info resides by referring to media info block 850 .
- the total playback time of the selected or default playlist in milliseconds (pListTime), the number of tracks in the playlist (tracksInPlist), the index number corresponding to the current playlist (index), the playlist name string length (Length), and the playlist name (pListName) will be filled into their respective locations of Playlist Info block 860 .
- step 805 device 15 calls API module SdGetTrackInfo.
- step 805 H SdGetTrackInfo will fill in the values for the track information block 870 by copying the information from card 13 into a RAM of device 15 . It will select the appropriate authorized drive where the playlist info resides by referring to media info block 850 . It will select the tracks within each playlist by referring to the Playlist info block 860 .
- the total track time (trackTime) in milli-seconds including the related track units (“TKI's”) in the track, the total track size in bytes (bytesize), including the related TKI's, the number of TKI's in the track (tkisInTrack), the track number (tracknum), the index corresponding the current track (index), and the track information from the media (trkInformation) will be filled into their respective locations.
- I device 15 calls API module SdOpenTrack.
- step 805 J SdOpenTrack fills in some of the values for the Track Gen Info block 880 by copying the information from card 13 into a RAM of device 15 . It will select the appropriate drive by referring to media info block 850 , and it will select the tracks within the appropriate playlists and tracks by referring to Playlist Info block 860 and Track Info block 870 , the total playback time of the playlist in milliseconds (pListTime), the current playlist number (plistnum), the track number to be played (tracknum), the first AOB block for the track (firstAOB), and the current AOB being decrypted (currentAOB).
- step 805 SdOpenTrack fills Track Index Info block 875 by copying the information from card 13 into a RAM of device 15 . It will select the authorized drive where the playlist info resides by referring to media info block 850 and playlist info block 860 , and it will select the proper tracks within the proper playlists by referring to Playlist info block 860 and Track Info block 870 .
- SdOpenTrack will fill in the remaining values of Track General Info Block 880 by copying the information from card 13 into a RAM of device 15 .
- the following values will be filled into their respective locations of block 880 : a verification number for the media (SanDisk), an operation command (CMD), the audio format such as MP3, AAC, or WMA (audioformat), the codec sampling frequency (sampfreq), the application attribute, e.g., music, book image, etc.
- step 805 J will completely fill the values of Track General Info block 880 and step 805 K will be eliminated.
- Track Index Info block 875 is a subset of Track Gen Info block 880 and is designed to save space and processing time. It is meant to be referred to by the user interface of device 15 in the event that it is just browsing the information. Once the user interface has selected a particular track for playback, Track Gen info block 880 will be filled, including the subset of information contained in block 875 .
- SdOpenTrack and can either be called upon by device 15 or can be internally called by SW 100 as part of a pre-play routine.
- Having the blocks and the information of the blocks contained in a memory of the device is an advantage because if there is any failure in the playback process, it is not necessary to reset the media, i.e., perform steps 805 A or 805 B of power up initialization 805 . 10 . Also, it should normally not be necessary to read the information needed for playback from card 13 .
- the information in the blocks can be used to access the next content (audio, video etc.) frame because the information in the blocks 850 , 860 , 870 , 875 , and 880 is used as a pointer to the content contained in the next frame.
- the blocks of FIG. 8E detail the location within memory card 13 of the files, elements and frames that make up and audio or video track are located within memory card 13 , as was earlier described with regard to FIG. 3C .
- the pre-play process of step 805 can be triggered by a number of calls (the numbers in parenthesis indicate the call in Table 1).
- the external calls that will trigger audio content initialization 805 . 20 are: SdOpenTrack, SdGetPlaylistCount, SdGetPlaylist, and SdGetTrackInfo.
- SdOpenTrack ( 10 ) is internally called by SdNextTrack ( 12 ), SdStopPlay ( 13 ), and SdResetPlaylist ( 16 ).
- API modules SdGetPlaylistCount, SdGetPlaylist, and SdGetTrackInfo can also be called internally by SdOpenTrack.
- the play process 810 can commence.
- calls that will initiate, stop, or pause playback of one or more audio or video tracks are received by the audio interface 105 , video interface 110 , or imaging interface 115 of FIG. 8B in step 810 A.
- These calls can be seen in FIG. 8C next to play process 810 and are SdPlayTrack, SdNextTrack, SdStopPlay, SdPauseTrack, SdResumeTrack, SdResetPlayList, SdForward, SdAddTKItoPLM, SdDelTKItoPLM, SdDelTKItoTMG, SdConvertMP3ToSA 1 , and SdConvertAACToSA 1 .
- SdOpenTrack ( 10 ) and SdPlayTrack ( 11 ) will read the information in Track General Info block 880 in order to access the encrypted content in the memory locations of clusters of memory card 13 .
- SdOpenTrack 10
- SdNextTrack 12
- SdStopPlay 13
- SdResetPlaylist 16
- device 15 it will be called upon by device 15 for such device functions as displaying the track time, rewinding, fast forwarding, changing playlists, changing graphic user interface displays, or deleting tracks.
- SdPlayTrack ( 11 ) is the core API that plays the music or video track. It is generally used by a device when the user wants to play the current track, the next track, or when he wants to rewind or fast forward within a track. It is called upon by other API's such as SdNextTrack ( 12 ) SdResumeTrack ( 15 ) and SdForward ( 17 ). SdPlayTrack finds the AOB for the selected track, checks the audio format (MP3, AAC, or WMA etc.) and decodes the track.
- MP3, AAC, or WMA etc. the audio format
- step 810 B of FIG. 8C playback of an encrypted track, step 810 B of FIG. 8C , will now be described.
- NSFI 170 and NSAPI's 140 B, 150 B, and 160 B and NSDD 190 B will access the content.
- SSM 180 When SSM 180 receives a request for security services, it carries it out by passing the command request packet to the process_security function within SDSE 175 . Key values are never contained within the request packets or exposed at software layers above SDSE 175 .
- SDSE 175 When needed internally by SDSE 175 , device keys are retrieved via a function call into an OEM-supplied library.
- the library of SDSE 175 contains the following APIs designed to reduce the time that a decrypted key resides in the secure area of the system:
- SW 100 The functionality and the structure of SW 100 are described in the text of this application and more specifically, the functionality of APIs 1 - 5 above are shown within the flowchart of FIG. 9 .
- the APIs are shown next to the corresponding functions that they implement. Further detail of the implementation of these APIs, as well as all of SW 100 , can be seen in the source code that is submitted in an appendix of this application.
- the device key is combined with the Media Key Block (MKB) from the SD Memory Card to form the “media key.”
- MKB Media Key Block
- This value is kept within SDSE 175 for use in processing subsequent requests.
- the “unique media key” (Kmu) is never retained inside SDSE 175 .
- This value which forms the basis for all security accesses, is always calculated on a real-time basis (and never cached) as an extra security precaution. Detailed description of the processing of the keys within SDSE 175 follows.
- the encryption process is in general terms designed to stop unauthorized copying of the content located on the secure media. There are many aspects of the invention that achieve this. First, an entire file, for example, a song, is never decrypted at once and stored into memory where it may be vulnerable.
- the portable device allocates a buffer and SDSE 175 reads chunks of encrypted content at a time, decrypts it, and then writes over the same buffer over and over again until the end of the file.
- the media unique key (Kmu) and title key (Kt) are the keys finally used to decrypt the content.
- Kmu media unique key
- Kt title key
- FIG. 9 is a flow chart depicting the preferred method.
- step 205 an MKB image, which, as seen in FIG. 4 , is 64 kilobytes, is read to process the media key (Km), as seen in FIG. 6 , to yield the media unique key (Kmu).
- Km media key
- FIG. 10 This step is further detailed in FIG. 10 which will be described later.
- the AKE process is undergone to yield a session key (Ks) that can only be used during that session (as long as the device is turned on or is in an active state) in step 210 .
- the AKE process can be seen by referring once again to FIG. 6 .
- step 213 the media unique key (Kmu) is deleted.
- step 215 the session key (Ks) is used to decrypt the doubly encrypted title key E(E(Kt)) stored in protected area 47 of memory card 13 .
- the result is a singly encrypted title key (E(Kt)).
- this encrypted title key (E(Kt)) is stored in a memory of the device 15 .
- the (E(Kt)) may be stored in system memory 27 , RAM memory 25 A of MCU 25 , or RAM memory 31 A of DSP 31 .
- the title key Kt is specific for each title, referred to as a track in the realm of audio and on FIG. 9 used to illustrate the invention. Each track may be made of multiple files, for example, in the case of a long classical song.
- a title may comprise many files.
- the title key need not be retrieved from the memory card because it is stored in a local memory, and precious time and computing resources can be saved, while at the same time, the title key remains encrypted for security purposes.
- step 225 a portion of the track is played back. This portion may be in any of the files that comprise the track.
- the media unique key (Kmu) is calculated once again.
- step 225 b the encrypted title key stored in local memory is decrypted.
- step 225 c the title key is used to decrypt the content from the buffer of device 15 containing content from the user area 41 of card memory card 13 .
- the title key is deleted in step 225 d and the media unique key is deleted in step 225 e .
- steps 225 d and 225 e are not important, but it is important that both keys are only exposed for the time it takes to read a portion of the track.
- This portion may be anywhere from a fraction of a second of playback (decrypted, decompressed, and decoded) content, audio or otherwise, to about ten seconds. Preferably it is two seconds.
- the time it takes to read the portion is dependent on many factors including the processing speed and the buffer size of the device.
- SW 100 can be executed by either the MCU 25 or DSP 31 and stored in any of the memory 27 , 25 A, 31 A or 32 of device 15 , thus, the processing times can vary. This is repeated until all portions of the track are read as seen in step 230 . Once all portions have been read the system can move on to the next track, as shown in step 235 , if playback is to continue. This may be the case, for example, if the user has chosen to play an entire playlist.
- the process will begin again at step 215 and will retrieve the next doubly encrypted title key from the protected area 47 of card 13 . This is generally the case if the user has set the device in motion to play an entire playlist that includes multiple tracks. If the session is closed (i.e., device 15 has been turned on or off), then a new session key will have to be generated and the process will initiate at step 210 . If memory card is removed or freshly inserted, the device and media will have to be re-authenticated and the process will begin again at step 205 in order to read a track.
- FIG. 10 describes the operation of processing the Media Key Block, step 205 of FIG. 9 described above.
- an MKB image 49 is 64 Kbytes in length. Reading the entire image 49 at once to calculate the MKB would be inefficient, requiring a large RAM and long processing times. The present system reduces RAM requirements and decreases processing time.
- the MKB image 49 is divided into chunks 1 through 128 .
- Each chunk is 512 bytes and may contain one of four different types of records of the MKB: the verify media key record (VMKR) known as 0 ⁇ 81; the calculate media key record (CMKR) known as 0 ⁇ 01; the conditionally calculate media key record (CCMKR) known as 0 ⁇ 82; or the end media key record (EMKR) known as 0 ⁇ 02.
- VKR verify media key record
- CCMKR conditionally calculate media key record
- EKR end media key record
- the chunk length and the buffer length are the same. However, the buffer length and chunk length can both range from 256 bytes to 4096 bytes.
- Each record is examined to perform specific operations based on the record type and certain data will be saved for later to obtain the Media Key.
- the record length is added to the total length of the buffer offset every time a record is identified.
- the chunk number is calculated by dividing the total length with the chunk length.
- the chunk number is the index to the Media Key Block of a selected chunk data.
- the remainder of the total length is the offset to the selected chunk data.
- the row and column are used to figure out where the encrypted media key and the conditional encrypted media key are. Those encrypted keys are saved and the decryption C2 cipher in Electronic Codebook Mode algorithm is performed to obtain the Media Key. This Media Key is then verified for a correct final Media Key (Km).
- Each record has different length and data values.
- the information of each record can be obtained within two reads. Since there are four records, between 4 and 8 reads will be necessary to process the MKB chunk and obtain the records.
- Step 205 of FIG. 9 expanded here in FIG. 10 , is performed until a final media key is produced in step 205 . 75 or the media is rejected in step 205 . 80 .
- Processing MKB data is an operation that requires requesting a chunk of data at a time, pointing to the desired location within that specific chunk and computing the obtained values. Not all MKB data is needed.
- the algorithm depicted in FIG. 10 will provide a mathematical calculation to figure out exactly what chunk of MKB data is needed, what record should be processed and where the encrypted data is located.
- step 205 . 5 the buffer pointer is set to the data buffer and the buffer offset is cleared.
- step 205 . 10 the chunk number is checked to see if it is equal to or larger than the maximum chunk number. If it is, an error will be returned in step 205 . 15 . If it is not, the chunk number will be incremented and new data will be loaded into the buffer in step 205 . 20 . Then the buffer offset will be updated in step 205 . 25 . Thus, the pointer can be set to the correct location (the chunk number plus offset).
- step 205 . 30 the buffer pointer is set to the buffer offset.
- step 205 . 40 the buffer is read starting at the offset where the pointer is located.
- the system will then determine what type of record it is reading. As seen in step 205 . 40 , the system will first check what type of record is being read, and what record length is associated with that record. The actions that will follow differ depending upon the record type and length. The record length of each record will be used to determine where the buffer pointer should be located in reading the subsequent record. This is reflected by steps 205 . 49 , updating the buffer offset and setting the buffer pointer at the new offset.
- the system updates the buffer chunk number and offset to the correct MKB location where the encrypted media key (Km)is located in step 205 . 49 .
- Each card has 16 MKBs.
- the system will get the offset where the encrypted media key is, go to the specific MKB chunk number, allocate buffer (16 blocks ⁇ 512 bytes), and go to the offset within each block to read the encrypted media key.
- the system uses a device key (Kd) supplied from device 15 to decrypt (calculate) the media key in step 205 . 50 . Once the media key has been calculated the next step is to verify the media key.
- the media key that was previously calculated will be compared to a reference media key (Km) in step 205 . 55 .
- reference media key will first be stored locally. If the key is the same a pass will be returned, which in hex is DEADBEEF, and the system will not need to conditionally calculate the media key.
- the record length of the VMKR is used to move the buffer pointer to the next record.
- step 205 If it is not the same it then it will be calculated again when a CCMKR record is read in step 205 . 46 .
- the media key will be calculated once again in step 205 . 65 after the buffer point has been set to read at the updated buffer offset in step 205 . 49 , and then it will be subsequently verified when the next VMKR is read.
- the maximum number of times the CCMKR is calculated may be set by the system and preferably one.
- the first calculation takes place when a CMKR is found. If it is successfully calculated, as determined during the verification process initiated when a VMKR is found, then there will be no need to conditionally calculate the media key (Km). If the verification is unsuccessful then when a CCMKR is found the media key (Km) will be recalculated and re-verified. This means that there are two chances to calculate the media key. Finally, if the record is an EMKR as evaluated in step 205 . 48 , then in step 205 . 75 the system will verify that at the end of the record a valid media key (Km) is present, and in step 205 .
- the final media key (Km) will be produced, after the buffer pointer is set at a the proper offset for this type of record in step 205 . 49 . If, however, a valid media key is not returned in step 205 . 70 , the media will be rejected in step 205 . 80 . If the final media key is returned in step 205 . 70 , the processing will continue at step 210 of FIG. 9 , as shown by step 205 . 85 . Thus the MKB process is complete.
- SDDI 190 A Functions within SDSE 175 perform security accesses such as Get MKB by using a secure device driver interface (SDDI) 190 A to device driver 190 .
- SDDI 190 A also makes use of functions within SDSE 175 which it can call directly. For example, prior to issuing a read of the authentication area, SDDI 190 a must first call the sec_ake function within SDSE 175 . The sec_ake function will in turn call back into SDDI 190 A. This “dual calling relationship” which facilitates the isolation of the device key within SDSE 175 is unique to SW 100 s implementation of the SD-Audio standards.
- SDSE 175 Since SDSE 175 handles all key-oriented processing, and these values are needed when certain SD commands are received by the audio interface 105 , video interface 110 , or image interface 115 , the device driver must make use of functions within SDSE 175 which it can call directly. When carrying out the functions, SDSE module 175 must in turn call back into the device driver 190 's private security interface, SDDI 190 A. This “dual calling relationship” allows interwoven requests between SDSE 175 and device driver 190 , thus enabling key values to be isolated within the security module.
- the SDSE 175 software layer invokes security device driver services via the private interface by initiating a security driver request packet and calling the security driver interface entry point passing a request packet pointer.
- the request packet (defined in sdapi.h) consists of a data type SSMSERVE which is defined as follows:
- Command index (INT16 opCode) holds the command for the service being requested.
- Supported commands include:
- Security device driver service requests are issued from the SDSE 175 module.
- the Generate Challenge 1 function sends challenge 1 as follows:
- SSDI 190 A must rely on SDSE 175 functions to perform Authentication Key Exchange (AKE) or for decrypting data that has been transferred across the bus (note that all data sent across the bus is first encrypted using the “session key” which is generated from each AKE.)
- AKE Authentication Key Exchange
- SDSE 175 When performing the AKE, SDSE 175 must send commands to the SD Memory Card 13 , thus, it must in turn call into SDDI 190 A. This calling relationship is outlined in the diagram of FIG. 7 which depicts the steps necessary to process a read of the authentication area.
- the system and method of the present invention are advantageous over prior techniques in many ways.
- the present invention provides a turnkey solution for original equipment manufacturers to access encrypted content without having to have any knowledge of the memory structure of the storage media.
- the decryption process by itself is very complex. Furthermore, simply reading and writing to a memory card or compact disk is complex in and of itself. All a manufacturer needs to do is send a simple command such as “play” or “next track” and return the decrypted content from whatever the memory device happens to be.
- Device keys and resultant session keys are manipulated in a very isolated and protected software layer. These are never exposed in upper layers. Even the lower device driver layer is not given direct access to the keys. Device keys are retrieved from an OEM-supplied library when generating the media key. This key is retained within the security engine, but the media unique key (Kmu) which is the heart of the security scheme is never stored.
- a private interface to the security engine enables the security engine to gain low-level access to the memory card while keeping the exposure of all security-related keys (e.g., device keys, media keys, session keys) confined within the security engine.
- a “dual calling relationship” allows the security engine and the security device driver to make interwoven use of each other's services.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Multimedia (AREA)
- Finance (AREA)
- Mathematical Physics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Indexing, Searching, Synchronizing, And The Amount Of Synchronization Travel Of Record Carriers (AREA)
Abstract
A secure software package for original equipment manufacturers to run in electronic devices in order to access and dynamically decrypt encrypted audio video or other content from a memory storage device such as a memory card, optical or hard disk such that the user interface of the device need only send simple commands and the decrypted content is output.
Description
- This application is a continuation of U.S. patent application Ser. No. 10/006,554 filed Dec. 6, 2001 to Farshid Sabet-Sharghi et al., entitled “System, Method, and Device for Playing Back Recorded Audio, Video or Other Content From Non-Volatile Memory Cards, Compact Disks, or Other Media”, which claims the benefit of U.S. Provisional Patent Application Ser. No. 60/251,731 filed Dec. 7, 2000 to Farshid Sabet-Sharghi et al., entitled “Secure Software System for Playing Back Recorded Audio, Video or Other Content From Non-Volatile Memory Cards, Compact Disks or Other Media”.
- This application is related to U.S. Pat. No. 7,227,952, issued on Jun. 5, 2007 to Bahman Qawami et al. entitled “System, Method, and Device for Playing Back Recorded Audio, Video or Other Content From Non-Volatile Memory Cards, Compact Disks or Other Media” and application Ser. No. 11/809,222 filed May 31, 2007 to Bahman Qawami et al., entitled “System, Method, and Device for Playing Back Recorded Audio, Video or Other Content From Non-Volatile Memory Cards, Compact Disks or Other Media”.
- These applications are hereby incorporated by this reference in their entirety.
- Source code is submitted on a compact disc according to 37 CFR 1.52 as an appendix containing the following files, each of which is hereby incorporated by this reference in its entirety: Sd_security\Sd_oem\Makefile, Nov. 05, 2001, 2KB; Sd_security\Sd_oem\Readme, Nov. 05, 2001, 3KB; Sd_security\Sd_oem\Sd_oem.c, Nov. 05, 2001, 6KB; Sd_security\Sd_oem\Sd_oem.h, Nov. 05, 2001, 1KB; Sd_security\Sd_oem\Sd_oem.inc, Nov. 05, 2001, 1KB; Sd_security\Sd_oem\Sdtypes.h, Nov. 05, 2001, 3KB; Sd_security\Sd_oem\vssver.scc, Nov. 05, 2001, 1KB; Sd_security\Security\Tstsampl\Dotest.c, Nov. 05, 2001, 8KB; Sd_security\Security\Tstsampl\Makefile, Nov. 05, 2001, 4KB; Sd_security\Security\Tstsampl\Readme, Nov. 05, 2001, 3KB; Sd_security\Security\Tstsampl\Regress.c, Nov. 05, 2001, 26 KB; Sd_security\Security\Tstsampl\Sdls.c, Nov. 05, 2001, 10KB; Sd_security\Security\Tstsampl\Sdrm.c, Nov. 05, 2001, 5KB; Sd_security\Security\Tstsampl\Securmmc.c, Nov. 05, 2001, 6KB; Sd_security\Security\Tstsampl\Tstsampl.inc, Nov. 05, 2001, 1KB; Sd_security\Security\Tstsampl\vssver.scc, Nov. 05, 2001, 1KB; Sd_security\Security\Err.h, Nov. 05, 2001, 1KB; Sd_security\Security\Fsentry.c, Nov. 05, 2001, 7KB; Sd_security\Security\keyInfo.h, Nov. 05, 2001, 84KB; Sd_security\Security\Makefile, Nov. 05, 2001, 3KB; Sd_security\Security\Readme, Nov. 05, 2001, 4KB; Sd_security\Security\Scdrv.c, Nov. 05, 2001, 29 KB; Sd_security\Security\Scdrv.h, Nov. 05, 2001, 5KB; Sd_security\Security\Scfs.c, Nov. 05, 2001, 13KB; Sd_security\Security\Scfs.h, Nov. 05, 2001, 4KB; Sd_security\Security\Sdsec.h, Nov. 05, 2001, 5KB; Sd_security\Security\Sdsys.c, Nov. 05, 2001, 2KB; Sd_security\Security\Security.c, Nov. 05, 2001, 64KB; Sd_security\Security\Smanager.c, Nov. 05, 2001, 7KB; Sd_security\Security\Smanager.h, Nov. 05, 2001, 2KB; Sd_security\Security\Ssmapi.c, Nov. 05, 2001, 3KB; Sd_security\Security\vssver.scc, Nov. 05, 2001, 1KB; Sdaudlib\HostFunc.c, Nov. 05, 2001, 3KB; Sdaudlib\Inpoutp.c, Nov. 05, 2001, 1KB; Sdaudlib\mssccprj.scc, Nov. 05, 2001, 1KB; Sdaudlib\plmInfo.h, Nov. 05, 2001, 16KB; Sdaudlib\Sd_plm.h, Nov. 05, 2001, 5KB; Sdaudlib\Sd_tkm.h, Nov. 05, 2001, 4KB; Sdaudlib\Sd_types.h, Nov. 05, 2001, 2KB; Sdaudlib\Sdapi.h, Nov. 05, 2001, 2KB; Sdaudlib\Sdaudapi.c, Nov. 05, 2001, 91KB; Sdaudlib\Sdaudapi.h, Nov. 05, 2001, 8KB; Sdaudlib\Sdaudlib.dsp, Nov. 05, 2001, 4KB; Sdaudlib\Sdaudlib.dsw, Nov. 05, 2001, 1KB; Sdaudlib\vssver.scc, Nov. 05, 2001, 1KB.
- 1. Field of the Invention
- This invention relates generally and specifically to secure playback of digital audio, video or other content from memory cards, compacts disks or other media.
- 2. Related Art
- The potential of electronic distribution of copyrighted music over the Internet, by other communication systems or through retail kiosks, is being limited by concerns about unauthorized copying of the music. This is also the case for other audio, as well as video, content. The content is typically provided to the ultimate customer in encrypted form, and the customer records the encrypted content files onto some storage media, such as a personal computer memory, a memory of a portable playing device, a writable compact disk (CD) or a non-volatile memory card. Providers of the content would like to eliminate the possibility of unauthorized copying of the content but have to be satisfied with taking steps that minimize the amount of copying that occurs. This includes providing protection of the content on the recording media. The protection of content stored on non-volatile memory cards is described herein, as specific examples, but the same content protection techniques can be applied to compact disks or other recordable media.
- There are several commercially available non-volatile memory cards that are suitable for use as the content data storage media. One is the CompactFlash (CF) card, another is the MultiMediaCard (MMC), and yet another is the Secure Digital (SD) memory card that is closely related to the MMC card. All three, and others, are available in various storage capacities from SanDisk Corporation of Milpitas, Calif., assignee of the present application. The physical and electrical specifications for the MMC are given in “The MultiMediaCard System Specification” that is updated and published from time-to-time by the MultiMediaCard Association (“MMCA”) of Cupertino, Calif. Versions 2.11 and 2.2 of that Specification, dated June 1999 and January 2000, respectively, are expressly incorporated herein by this reference. The MMC products are also described in a “MultiMediaCard Product Manual,”
Revision 2, dated April 2000, published by SanDisk corporation, which Manual is expressly incorporated herein by this reference. Certain aspects of the electrical operation of the MMC products are also described in patent applications of Thomas N. Toombs and Micky Holtzman, Ser. No. 09/185,649, now U.S. Pat. Nos. 6,279,114, and 09/186,064, now U.S. Pat. No. 6,901,457, both filed Nov. 4, 1998, and assigned to SanDisk Corporation. The physical card structure and a method of manufacturing it are described in U.S. Pat. No. 6,040,622, assigned to SanDisk Corporation. These patents are also expressly incorporated herein by this reference. - The newer SD Card is similar to the MMC card, having the same in plan view. A primary difference between them is that the SD Card includes additional data contacts in order to enable faster data transfer between the card and a host. The other contacts of the SD Card are the same as those of the MMC card in order that sockets designed to accept the SD Card will also accept the MMC card. The electrical interface with the SD card is further made to be, for the most part, backward compatible with the MMC product described in version 2.11 of its specification referenced above, in order that few changes to the operation of the host need be made in order to accommodate both types of card. The electrical interface of the SD Card, and its operation, are described in co-pending patent application Ser. No. 09/641,023, filed Aug. 17, 2000, now U.S. Pat. No. 6,820,148, which application is incorporated herein in its entirety by this reference.
- Encrypted content is difficult to access, and memory cards or compact disks with encrypted content each have specific structures that require specific commands and routines to access encrypted and unencrypted content. The software of the present invention is a simple solution that any original equipment manufacturer (OEM) can install and run on a myriad of different types of devices having a myriad of different types of microprocessors. These devices range from personal computers to portable devices to car stereos, and include any device from which one would like to access content that may be encrypted. The portable devices may be portable audio players or cell phones or portable organizers or generally any microprocessor controlled portable device. The storage media may be flash memory or any type of recordable disk. The devices may have a simple or powerful microprocessor with a small or large amount of memory. The software utilizes and requires only a small buffer for encryption purposes and is designed to run efficiently even in environments with limited processing power and memory. It can be run by any type of general purpose microprocessor, or special purpose microprocessors such as a DSP, or an ASIC. Additionally, computationally demanding portions of the software, such as the encryption and decryption (security) engine may be executed by the DSP, while other portions of the software may be executed by another microprocessor or an ASIC.
- The software has audio, video and image interfaces to receive commands for each of the respective types of files. These interfaces can organize playback and recording, including managing playlists and other convenient features. Thus, whatever the device, it need only issue a command to an interface and the software will take care of reading or writing data from the secure media, and decoding and decompressing the data from any well known audio, video or image file formats within the audio video or image engines.
- The encryption and decryption takes place in an isolated module that is very difficult to access and thus isolated from any attempts from unauthorized persons wishing to access encryption keys in order to copy the files from the media or the device. Content is only decrypted in small portions, and a method of dynamic key generation and deletion minimizes exposure of decrypted keys.
-
FIG. 1 is an illustration of the devices used to read and write information on a secure media. -
FIG. 2 is a schematic diagram of a device used to access the secure media. -
FIG. 3A is an abstract illustration of the layers of the secure media. -
FIG. 3B is an illustration of the physical and logical structure of the memory cells of the secure media. -
FIG. 3C is an illustration of the track structure and the component parts of a track. -
FIG. 4 is an illustration of a media key block (MKB) image broken into its component chunks. -
FIG. 5 is an illustration of a portion of the authentication and decryption process. -
FIG. 6 is an illustration of the authentication and encryption process. -
FIG. 7 is a schematic of the authentication key exchange process shown inFIG. 6 . -
FIG. 8A is a block diagram of the software of the present invention. -
FIG. 8B is a block diagram illustrating the modules of the software of the present invention. -
FIG. 8C is a flow chart overview of the pre-play and play process according to the present invention, with the related API modules/calls shown. -
FIG. 8D is an expanded flow chart of audio content initialization phase inFIG. 8C . -
FIG. 8E is an illustration of information blocks created during the pre-play process 805 ofFIG. 8C . -
FIG. 9 is a flow chart overview of the playback of an audio track according to the present invention. -
FIG. 10 is a flow chart of the processing of an MKB image seen inFIG. 4 , a step ofFIG. 9 . - Encrypted content is difficult to access, and memory cards or compact disks with encrypted content each have specific structures that require specific commands and routines to access encrypted and unencrypted content. The software of the present invention is a simple solution that any original equipment manufacturer (OEM) can install and run on a myriad of different types of devices having a myriad of different types of microprocessors. These devices range from personal computers to portable devices to car stereos, and include any device from which one would like to access content that may be encrypted. The portable devices may be portable audio players or cell phones or portable organizers or generally any microprocessor controlled portable device. The storage media may be flash memory or any type of recordable disk. The devices may have a simple or powerful microprocessor with a small or large amount of memory. The software utilizes and requires only a small buffer for encryption purposes and is designed to run efficiently even in environments with limited processing power and memory. It can be run by any type of general purpose microprocessor, special purpose microprocessors such as a DSP, or an ASIC. Additionally, computationally demanding portions of the software, such as the encryption and decryption (security) engine may be executed by the DSP while other portions of the software may be executed by another microprocessor or an ASIC. The source code referred to in the Cross Reference section forms a part of this application, and is hereby expressly incorporated in its entirety by this reference.
- With reference to
FIG. 1 , an exemplary system is described in which content protection is applied to audio content such as music. Ahost computer device 11 may be a personal computer (PC), as shown, a kiosk located in a retail store to distribute music or other content, or the like. AnSD memory card 13 is used in this example to store music. Thecard 13 is insertable into a utilization device, in this case a portable device (PD) 15 that operates from batteries to play the music or other audio content recorded on thecard 13 through personal earphones. The music may be stored on thecard 13 when inserted into thedevice 15 by connecting thedevice 15 to thehost 11, such as through a computer universal serial bus (USB)connection 17. Alternatively, if theplayer device 15 is not provided with the capability of recording content onto thecard 13, or if it is otherwise desirable, a card writer/reader 19 may be connected to the computer through aUSB connection 21, and thecard 13 inserted into it for recording music on the card. Thecard 13 is then removed from the writer/reader 19 and inserted into theportable device 15 to play the audio content recorded on the card. Thehost 11 is termed a licensed compliant module (LCM) when it includes the software necessary to write to and read from thecard 13 content data in accordance with the security and authentication protocols of the 4C Entity and the SD Group. - The electronic system within the example
portable utilization device 15 is illustrated inFIG. 2 . Operably connected together through a bus 23 are a computing unit (MCU) 25, preferably with somenon-volatile flash memory 25A,system memory 27, which is preferably a high speed random access memory (RAM), andinterface circuits 29 for connecting with thememory card 13. TheUSB connection 17 is also optionally provided to theMCU 25. A digital signal processor (DSP) 31 is also included, when needed, for decompressing and/or decrypting content data, such as audio or video data, that is stored in a compressed and/or encrypted form.DSP 31 also has itsown RAM memory 31A included as part of the processor.DSP 31 may or may not be included. Furthermore, if a DSP processor is included, it may perform the functionality ofMCU 25, and thusMCU 25 may therefore be eliminated. Read only memory (ROM) 32 can store part or all of the software of the invention. Software instructions and data inROM 32 can be executed or read directly fromROM 32 or first shadowed into any RAM memory included in the circuitry of the device. - Specifications for the protection of content on recordable media have been jointly established by Intel Corporation, International Business Machines Corporation, Matsushita Electric Industrial Co., Ltd. and Toshiba Corporation (4C Entity). Particularly relevant here are the following three publications of the 4C Entity, which are expressly incorporated herein by this reference: “Content Protection for Recordable Media Specification, Introduction and Common Cryptographic Elements,” Revision 0.94, October, 2000, “Content Protection for Recordable Media Specification, SD Memory Card Book,” Revision 0.95, May, 2001, and “C2 Block Cipher Specification,” Revision 0.9, January, 2000, and “Content Protection for Recordable MediaSpecification, DVD Book,” Revision 0.95, May, 2001. Additional detailed specifications for implementing these 4C Entity specifications on SD memory cards have been established by Matsushita Electric Industrial Co., Ltd. (MEI), SanDisk Corporation and Toshiba Corporation (SD Group).
- Referring to
FIG. 3A , amemory card 13 can be thought of as having four distinct layers. Such layers may also be present in other types of secure media. - At its most basic level, data is stored in memory cells arranged in clusters on the
physical layer 13 d ofmemory card 13. The data is encrypted or secure if it is copyrighted material or otherwise worthy of encryption. Keys used to encrypt and decrypt the secure content are also encrypted and stored in a secure area of the physical layer. - The software of the present invention runs within a device to allow the device to store and retrieve encrypted information without the manufacturer (OEM) having to program very specific instructions to access the memory cells containing encrypted data and keys. It contains methods of sending the encrypted data to the device, decrypting the data within the device, and decompressing and playing audio, video and image files upon requests from the device. In short, a device need only send a command such as “play track.” The software will accept the command, retrieve the encrypted data stored in the memory cells, retrieve the encrypted keys, organize and decrypt the data, decompress and format it, and play the song back.
-
Logical layer 13 c contains the organizational structure for the memory cells and clusters ofphysical layer 13 d. The twolayers card 13. Ascard 13 is a secure card,security layer 13 b controls and limits access to the secure data housed in the layers below. -
Application layer 13 a is the part ofmemory card 13 that communicates with a device accessing the content stored in the card. It does this through a device interface orcontacts 39.Memory card 13 preferably includes a controller that manages the operation of the card and functionality of theapplication layer 13 together with control of alllayers 13 a-d of the card. - The physical and logical structure of a recording media, the
SD card 13, according to the foregoing specifications, and corresponding tolayers FIG. 3A , is illustrated inFIG. 3B . The card includes an array ofmemory cells 33 and amemory controller 35. User data, commands and status signals are communicated between thecontroller 35 and thememory array 33 over acircuit 37. Thecontroller 35 communicates with a host device connected to a socket in which the card is inserted through a series ofelectrical contacts 39 on the card. - The memory cells of the
array 33 are divided into the four non-overlapping areas of cells that are individually designated to store different types of data. A largeststorage capacity area 41 is designated to store user data, in this case, encrypted audio, video or other data. The user data may or may not also include unencrypted data. Asystem area 43 of the memory stores a 64-bit media identifier (IDmedia) of the card manufacturer, and 16 media key blocks (MKB) provided by the 4C Entity, each MKB having a maximum size of 4k bytes, all being pre-recorded by the card manufacturer. One of the 16 MKBs is specified for use with audio user data, another for use with video user data, another for use of image data, and so on. Thesystem area 43 is a write-protected area that is accessible for reading from outside of the card. A hiddenarea 45 carries 16 pre-recorded media unique keys (Kmu) corresponding to the 16 distinct media key blocks (MKB) stored in thesystem area 43. The hiddenarea 45 is a write-protected area that is accessible only by the memory card itself. A protectedarea 47 is a read/write area that is accessible only after a successful explicit mutual authentication has occurred. Randomly picked title keys (Kt) and copy control information (CCI) are stored in the protectedarea 47 in an encrypted form. Each piece (file) of content stored in theuser data area 41 is encrypted with a unique title key that is also stored in an encrypted form in the protectedarea 47. The title keys and CCI stored in the protectedarea 47 are concatenated and encrypted together by the media unique key, which is unique for each memory card and stored in its hiddenarea 45. - The file system of the
user data area 41 is typically an ordinary FAT file system. The FAT system describes what memory clusters make up what tracks and the various sub-components of the tracks. Audio or video tracks withinuser data area 41 may comprise multiple files as illustrated inFIG. 3C . Audio files are referred to as audio objects (AOB's) and picture files are referred to a picture objects (POB's). A track may comprise both. Track 300, for example is composed of AOB 304 and AOB 308, and track 302 is composed of AOB 306 and the last track xxx is composed of AOB xxx and POB xxx. Each AOB or POB is also broken down into sub components. AOB 304 is shown broken down into AOB blocks 312, which are further broken down into AOB elements 316 with header 318. Each element may be stored in one or more memory clusters ofmemory card 13. AOB elements are divided into the lowest component level, AOB frames 320. Depending on the encoding and compression of the content, each two seconds may comprise a varying number of frames. A time search table (TMSRT) has information about the number of frames and data size which corresponds to “every two seconds” of playback. This information is used when an audio or video track and the component AOB's elements and frames are accessed for fast forward and rewind. Also, as will be discussed later with regard toFIGS. 9 and 10 , at title key (Kt) is an a decrypted state only for the time it takes to access this “every two seconds” of content, although anywhere from less than one to ten seconds of content may be decrypted at a time. For further detail, please refer to the CPRM Specification, SD Memory Card Book, which was previously incorporated by reference. - The media key block (MKB), as stored in the
system area 43 of the card memory, contains a sequence of contiguous records, one such record being illustrated inFIG. 4 . Theentire MKB image 49 is 64 Kbytes. It is broken into 128 chunks of 512 bytes, andchunk 1, which contains all or part of the first record, and is labeledMKB chunk 50 in the figure, is enlarged to show its component parts.Chunk 50 may also contain multiple records. A first field 51 contains the record type, a second field 53 the total length of the record, and the remainingfield 55 the key itself. The data in the record type and length fields 51 and 53 are not encrypted. Each record of the MKB is a multiple of 4 bytes in total length. As illustrated by ablock 57 ofFIG. 5 , the MKB key records are decrypted by device keys stored in the portable device (PD), licensed compliant module (LCM) or other device that utilizes a memory card for reading or programming content data stored on it. Device keys Kd1, Kd2, Kd3 . . . are written into a memory of the utilization device, such as non-volatile flash memory within theMCU 25 of the portable audio player ofFIG. 2 , by the manufacturer of the device. The device keys are provided to device manufacturers by the 4C Entity, and are maintained in confidence. The number of device keys which are stored in a given utilization device depends upon the type of the device. - The utilization device (PD, LCM or other device) which performs the processing of
FIG. 5 calculates the media key Km as part of the decryption ofblock 57, which is discussed in further detail with regard toFIGS. 9 and 10 . Each record (FIG. 4 ) of the MKB read from the system area of an inserted memory card is usually processed in this manner. After processing of the MKB is completed, the most recently calculated Km value is taken as the secret media key output of theblock 57. This media key Km and the media identifier IDmedia are combined by use of a C2 one-way function, as indicated by ablock 59 ofFIG. 5 , to produce the media unique key Kmu. Additional details of this processing may be had by reference to the 4C Entity publications referenced previously. -
FIG. 6 illustrates all of the authentication and encryption processing that takes place when either recording audio content onto, or playing audio content from, amemory card 13 having the memory space allocation ofFIG. 3 . Processing that takes place in a personal computer orother LCM 63 is illustrated for recording audio or other content onto thecard 13. Similarly, the processing of a portable audio orother utilization device 65 is shown for reading the recorded content from thecard 13. Included in both is the processing described with respect toFIG. 5 , the processing blocks 57 and 59 being part of theutilization device 65 and corresponding processing blocks 57′ and 59′ being part of thecontent recording system 63. - As part of recording content, an arbitrarily assigned title key Kt is input at a
line 67 for use by anencryption module 69 to encrypt one file (piece) of audio or other content input atline 71. The encrypted file is then stored in theuser data area 41 of thememory card 13. In order to make the title key available for decrypting the recorded content, an encrypted version of the title key (Kt) is stored in the protectedcard memory area 47, as previously described. An encrypted version of the title key (Kt) is also stored in eithersystem memory 27,RAM memory 25A ofMCU 25, orRAM memory 31A ofDSP 31. Storing the encrypted title key (Kt) in a memory of the device eliminates the need to access protectedcard memory area 47. This is significant because it saves considerable time and processing capacity in comparison to accessing the protectedarea 47 for each read. This will be discussed later with regard toFIG. 9 . The title key Kt and copy control information CCI are encrypted by a series ofencryption modules LCM 63, and amodule 81 on the memory card 61. The media unique key Kmu is used by themodule 77. An authentication key exchange (AKE)module 83 combines the media unique keys Kmu as calculated by themodule 59′ and stored in the hiddenarea 45 of the card 61, to generate a session key Ks that is used by each of themodules utilization device 65 to decrypt the recorded encrypted content, corresponding modules, indicated with the same reference numbers but with a prime (′) added, are utilized to perform an inverse of the encryption process. -
FIG. 7 illustrates a technique for accessing the protectedarea 47 of a memory card, utilizing an authentication and key exchange (AKE) challenge-response protocol between a card and some LCM or utilization device. When this authentication is successful, the card and the other module or device share a secure common session key Ks. Additional details of the forgoing processing and protocols may be had by reference to the 4C Entity publications previously identified. -
FIGS. 8A and 8B illustrate an embodiment of a software system designed to run in a portable device or LCM in order to access information encrypted with the aforementioned processes. The SanDisk software,SW 100, is a complete turn-key software solution that enables OEM music players and recorders to readily support secure media including the secure digital (SD) memory card.SW 100 shown withinportable device 15 in order to accessSD card 13.SW 100 may also be installed in any licensed compliant module such as a personal computer. As seen inFIG. 8A , at its highest level, SW100 receives calls fromdevice 15, particularly a user interface ofdevice 15, retrieves encrypted content from theSecure Digital card 13, and returns decrypted content to the device. Thus only simple calls are required to execute many complicated processes. The complicated processes of retrieving encrypted content stored in memory locations ofcard 13, and then subsequently decrypting and formatting the content are handled bySW 100. - Performing accesses to the authentication area of the SD Memory Card requires using secret device keys that OEMs must license from the 4C Entity, as mentioned previously. Protecting these key values and restricting their exposure within
SDK SW 100 software layers is one of the central considerations in the software design. Isolation of these keys (and other resultant values such as session keys) within a single internal module while enabling a secure media such as the SD memory card device driver to perform operations dependent on these values is achieved in a robust and secure interface methodology. Once again, the SD memory card is used to illustrate the invention; however, the invention can be used on any secure media such as CDs or other secure memory that may be in a card or even in a remotely located storage device. -
FIG. 8B illustrates the layered structure ofSW 100 in more detail.Audio interface 105,video interface 110, andimaging interface 115 are the points of communication to the device. These interfaces provide a single point of communication for the device and generally receive simple commands from the device so that the device does not have to get involved with the intricacies of getting encrypted data from a secure media, then decrypting and processing the data. All of these complex processes are handled bySW 100.Interfaces CD 130 andAPI 130A receive commands frominterfaces SW 100—the processes ofdevice 15 related to the playback and recording of content stored on the secure media, with all of the requisite encryption, decryption, and compression algorithms. - SD audio engine (SDAE) 140, SD video engine (SDVE) 150, and SD image engine (SDIE) 160 respectively process audio, video, and image content residing on the secure media, upon receipt of instructions from
CD 130. This meansSDAE 140 can process any of the well known formats for audio, such as AAC, WMA, and MP3. Likewise,SDVE 150 can process any of the well known formats for video clips such as Windows media files or real networks files MPEGs or any other well known type of video files. Finally,SDIE 160 can process any well known type of image files such as TIF, GIF, JPEG, bitmaps, etc. Each interface has a secure API (SAPI) and a non-secure API (NSAPI). The content processed may or may not be encrypted. Encrypted content is accessed throughSAPIs SSM 180. Secure digital security engine (SDSE) 175, which will be described later in further detail, handles all encryption and decryption processes. Keys used to authenticate the media and decrypt the content are contained within and handled exclusively bySDSE 175. Unencrypted content residing on the card is accessed throughNSAPI - In order to read or write data in the storage media,
NSFI 170 andSDSE 175 communicate withdevice driver 190.Device driver 190 in the example of the SD card manages and drives signals to and from thedevice interface 39's contacts of theSD card 13.Device driver 190 will be tailored to the specific type ofdevice interface 39 of various devices or media. In the case of a memory card device,driver 190 manages and drives signals to and from contacts located ondevice 15. In the case of optical media,device driver 190 may manage and drive signals from various hardware components including an optical pick-up unit. Alternatively, in the case of a hard disk drive (hdd),device driver 190 will manage and drive the required hdd signals.Device driver 190 contains a secure device driver interface (SDDI) 190A, and a non-secure device driver interface (NSDDI) 190B.SDDI 190A andNSDDI 190B are isolated from each other withindevice driver 190.SDDI 190A communicates exclusively withSDSE 175, whileNSDDI 190B communicates exclusively withNSFI 170. - Device keys and other values central to the SD-Audio security scheme are housed within one restricted security software module, SD security engine (SDSE) 175. All manipulation of these values is solely restricted to this module. Values are never passed in or out to software layers above
SDSE 175. All requests for the security services involving these keys are controlled and monitored bySSM 180 that shields this security module. Beneath the security module, the SD MemoryCard device driver 190 carries out security accesses. Requests for these driver services are made via a private driver security interface, secure device driver interface (SDDI) 190A, that is only known to the security module.SDSE 175 uses thisinterface 190A to perform special security commands such as Get Media Key Block (MKB). Non-secure device driver interface (NSDDI) 190B also utilizesdevice driver 190 to access any unencrypted files inuser area 41 ofcard 13. - The security of SW100 architecture resides in the security of its keys. Secret “soft keys” are not stored in temporary secure areas for a long period of time, since this increases the possibility of compromising the keys and thus the encrypted content.
SW 100 utilizes a scheme withinSDSE 175 of dynamically generating the needed keys (or “soft keys”) and deleting them when there is no immediate need for those specific keys. - Operation of
SW 100 is now described in more detail.SW 100, in particular,command dispatcher 130/API 130A have a number of API routines that can be called upon to perform a certain function. Although there are many routines, only 22 of the routines are accessed externally bydevice 15. These routines are accessed by calls, which are also referred to as commands. In order to retrieve the content in memory card (or other media) 13, the device need only send one of the 22 calls and the content will be retrieved, decrypted if necessary, and decoded. In the case of audio, for example, the device need only send the “play” call, and the music will start. - The following listed APIs allow applications to interface to device compliant with the Secure Digital (SD) standard. Although implementation of the invention is illustrated with the SD standard, the present invention can be used with many different standards.
-
TABLE 1 API Routines/Calls Call name/API routine (as seen in appended Function of call/API routine source code) 1. Initialize audio system SdInitAudioSystem 2. Mount media (if necessary) SdMountAudio 3. Unmount audio (if necessary) SdUnMountAudio 4. Check the free space available SdDriveFreeSpace 5. Eject media SdEjectCard 6. Get number of playlists SdGetPlayListCount 7. Get playlists SdGetPlayLists 8. Get the track title (x) SdGetTrackTitle 9. Get the track information SdGetTrackInfo 10. Open the track SdOpenTrack 11. Play the track SdPlayTrack 12. Go to the next track SdNextTrack 13. Stop playback SdStopPlay 14. Pause playback SdPauseTrack 15. Resume playback SdResumeTrack 16. Reset playlist SdResetPlayList 17. Fast forward/rewind playback (+/−) SdForward 18. Add track index to playlist SdAddTKItoPLM 19. Delete track index from playlist SdDelTKItoPLM 20. Delete track index from track SdDelTKItoTMG manager 21. Covert MP3 to internal playback SdConvertMP3ToSA1 format 22. Convert AAC to internal playback SdConvertAACToSA1 format - The principle API routines which can be called by
device 15 will now be described in detail. Reference will be made toFIGS. 8A-8E . - As can be seen in
FIG. 8C , there is a pre-play process 805 and a play process 810. The blocks ofFIG. 8E are created during the processes ofFIG. 8C . The related API modules are executed when called upon by the user interface ofdevice 15. In the case of audio playback, calls to the modules are sent by the user interface ofdevice 15 to theaudio interface 105 as seen inFIG. 8B . The primary calls/modules that carry out the functionality listed in the flowchart are indicated on the right. Many of these modules execute other internally and externally accessed modules, and the list is not meant to be exhaustive, but is meant to be a reference to the software code on compact disc that was previously incorporated by reference and forms a part of this application. For further detail please refer to the software code. - The device is first powered up in step 803, after which the pre-play process 805 commences. The pre-play process has two major phases: a power up initialization phase 805.10, and an audio content initialization phase 805.20. Audio content initialization phase will be described in further detail with regard to
FIG. 8D . - Generally speaking, in pre-play process 805 the device and media are initialized and certain information from the media is read from the media and stored in a buffer of a RAM memory of
device 15. As seen previously inFIG. 2 this RAM memory may either besystem memory 27,RAM memory 31A ofDSP 31, orRAM memory 25A ofMCU 25. Instep 805A SW 100 will get the drive number of the media. In some applications there may be more than one memory card or disk being accessed bydevice 15. In this step it will get all the drive numbers in order that content on each of the drives can be properly accessed. This is accomplished with API routine SdInitAudioSystem, and can either be called upon bydevice 15 or can be internally called bySW 100 as part of a pre-play routine.SW 100 will then initializeSSM 180 andSDSE 175 withinSW 100. This is necessary before any encrypted keys and content from the media can be processed.SW 100 will also initialize the playlist and track manager incard 13. - In step 805B,
SW 100 will initialize and verify the media. In the case of the SD card illustrated here, the MKB process ofFIGS. 5-7 will be performed. This MKB process can also be executed during step 805A, and if previously executed it will not be executed again in step 805B. For further detail of this process please seeFIGS. 5-7 and the 4C documents incorporated earlier. This process will also be discussed in greater detail with regard toFIG. 10 . In step 805B, media information values will be copied from thecard 13 and stored in locations of media information block 850 ofFIG. 8E in a RAM memory ofdevice 13. This is accomplished with API routine SdMountAudio, and can either be called upon bydevice 15 or can be internally called bySW 100 as part of a pre-play routine. Thus values for playlist general information (pTGInfo), the validity number of the media (SanDisk), the drive number (drivenum), the security system of the media (security) and the mounting status of the media (mounted) will be filled in their respective locations. These locations can then be subsequently read from the RAM ofdevice 15 when called upon by any number of API calls without having to read them fromcard 13. - After the power-up initialization 805.10 is completed, audio content initialization 805.20 commences. Generally speaking, during audio content initialization 805.20, information specifying location and sequencing of the encrypted audio content of an individual track and multiple audio tracks (playlists) are copied from the card (or other media) 13 into a small buffer in a RAM of
device 15. This information, shown in blocks inFIG. 8E , is thus quickly and easily accessible within the device and does not need to be constantly read from or updated tocard 13 during the subsequent play process 810. - Referring to
FIG. 8D , the audio content initialization phase 805.20 will be described in more detail. This phase creates a number of structures that act as a local roadmap or directory to the encrypted content on memory card (or other media) 13. - In step 805C,
device 15 calls API module SdGetPlayListCount. This call, and all of the following calls, are generally sent from the software of a user interface ofdevice 15 to one of the interface modules of SW100. In this illustration of audio playback the call is sent from the user interface toaudio interface 105. In the case of video playback, the call would be sent tovideo interface 110 and in the case of image reproduction, the call would be sent toimaging interface 115. The call is then relayed tocommand dispatcher 130 which contains the API modules withinAPI 130A. - In step 805D, SdGetPlayListCount will fill in the values for the Playlist Info block 860 by copying the information from
card 13 into a RAM memory ofdevice 15. It will select the appropriate authorized drive(s) by referring to media info block 850. The total number of playlists for all authorized drives will be copied into a RAM ofdevice 15. - In step 805E,
device 15 calls API module SdGetPlaylist. - In step 805F, SdGetPlaylist will fill in the values for the playlist info block 860 by copying the information from
card 13 into a RAM memory ofdevice 15. It will select the appropriate authorized drive where the playlist info resides by referring to media info block 850. The total playback time of the selected or default playlist in milliseconds (pListTime), the number of tracks in the playlist (tracksInPlist), the index number corresponding to the current playlist (index), the playlist name string length (Length), and the playlist name (pListName) will be filled into their respective locations of Playlist Info block 860. - In
step 805G device 15 calls API module SdGetTrackInfo. - In step 805H, SdGetTrackInfo will fill in the values for the track information block 870 by copying the information from
card 13 into a RAM ofdevice 15. It will select the appropriate authorized drive where the playlist info resides by referring to media info block 850. It will select the tracks within each playlist by referring to the Playlist info block 860. The total track time (trackTime) in milli-seconds including the related track units (“TKI's”) in the track, the total track size in bytes (bytesize), including the related TKI's, the number of TKI's in the track (tkisInTrack), the track number (tracknum), the index corresponding the current track (index), and the track information from the media (trkInformation) will be filled into their respective locations. - In
step 805I device 15 calls API module SdOpenTrack. - In step 805J, SdOpenTrack fills in some of the values for the Track Gen Info block 880 by copying the information from
card 13 into a RAM ofdevice 15. It will select the appropriate drive by referring to media info block 850, and it will select the tracks within the appropriate playlists and tracks by referring to Playlist Info block 860 and Track Info block 870, the total playback time of the playlist in milliseconds (pListTime), the current playlist number (plistnum), the track number to be played (tracknum), the first AOB block for the track (firstAOB), and the current AOB being decrypted (currentAOB). - In step 805K SdOpenTrack fills Track Index Info block 875 by copying the information from
card 13 into a RAM ofdevice 15. It will select the authorized drive where the playlist info resides by referring to media info block 850 and playlist info block 860, and it will select the proper tracks within the proper playlists by referring to Playlist info block 860 and Track Info block 870. - After Track info block 870 is created, in step 805L, SdOpenTrack will fill in the remaining values of Track General Info Block 880 by copying the information from
card 13 into a RAM ofdevice 15. The following values will be filled into their respective locations of block 880: a verification number for the media (SanDisk), an operation command (CMD), the audio format such as MP3, AAC, or WMA (audioformat), the codec sampling frequency (sampfreq), the application attribute, e.g., music, book image, etc. (appAtrib), the size of the audio object in bytes (size AOB), the last AOB block for the track(lastAOB), the total number of AOB's for the track (countAOB), the current position of sync position in AOB (syncword) also known as the header, the seek position within the AOB(seekposAOB), the elapsed time of the track in milliseconds (trkElapsedTime), the total play time of the track in milliseconds (trkTotalTime), the total track size in bytes including related TKI's (bytesize), the playtime of each element in milliseconds (elementplaytime), the forward seek time (fwTime), the time to the next track (fwNext), the number of the tracks in the playlist (tracksInPlist), the size of the current element (elementsize), the offset within the current element (element offset), the current elements in the AOB (currentelement), the total number of elements n the AOB (totalelements), and the file handle of the AOB (fdAOB). In a different embodiment of the invention, step 805J will completely fill the values of Track General Info block 880 and step 805K will be eliminated. Track Index Info block 875 is a subset of Track Gen Info block 880 and is designed to save space and processing time. It is meant to be referred to by the user interface ofdevice 15 in the event that it is just browsing the information. Once the user interface has selected a particular track for playback, Track Gen info block 880 will be filled, including the subset of information contained in block 875. - SdOpenTrack and can either be called upon by
device 15 or can be internally called bySW 100 as part of a pre-play routine. - Having the blocks and the information of the blocks contained in a memory of the device is an advantage because if there is any failure in the playback process, it is not necessary to reset the media, i.e., perform steps 805A or 805B of power up initialization 805.10. Also, it should normally not be necessary to read the information needed for playback from
card 13. The information in the blocks can be used to access the next content (audio, video etc.) frame because the information in the blocks 850, 860, 870, 875, and 880 is used as a pointer to the content contained in the next frame. The blocks ofFIG. 8E detail the location withinmemory card 13 of the files, elements and frames that make up and audio or video track are located withinmemory card 13, as was earlier described with regard toFIG. 3C . - The pre-play process of step 805 can be triggered by a number of calls (the numbers in parenthesis indicate the call in Table 1). As seen in
FIG. 8C , the external calls that will trigger audio content initialization 805.20 are: SdOpenTrack, SdGetPlaylistCount, SdGetPlaylist, and SdGetTrackInfo. SdOpenTrack (10) is internally called by SdNextTrack (12), SdStopPlay (13), and SdResetPlaylist (16). API modules SdGetPlaylistCount, SdGetPlaylist, and SdGetTrackInfo can also be called internally by SdOpenTrack. Generally, it will be called upon bydevice 15 for such device functions as displaying the track time, rewinding, fast forwarding, changing playlists, changing graphic user interface displays, or deleting tracks. Once the pre-play process 805 is complete, the play process 810 can commence. - In play process 810, calls that will initiate, stop, or pause playback of one or more audio or video tracks are received by the
audio interface 105,video interface 110, orimaging interface 115 ofFIG. 8B in step 810A. These calls can be seen inFIG. 8C next to play process 810 and are SdPlayTrack, SdNextTrack, SdStopPlay, SdPauseTrack, SdResumeTrack, SdResetPlayList, SdForward, SdAddTKItoPLM, SdDelTKItoPLM, SdDelTKItoTMG, SdConvertMP3ToSA1, and SdConvertAACToSA1. - Regardless of how many API modules are executed, either internally or when called upon by the device, two primary modules will always be required in order to play an audio track. These modules are SdOpenTrack (10) and SdPlayTrack (11). SdOpenTrack (10) and SdPlayTrack (11) will read the information in Track General Info block 880 in order to access the encrypted content in the memory locations of clusters of
memory card 13. - SdOpenTrack (10) is internally called by SdNextTrack (12), SdStopPlay (13), and SdResetPlaylist (16). Generally, it will be called upon by
device 15 for such device functions as displaying the track time, rewinding, fast forwarding, changing playlists, changing graphic user interface displays, or deleting tracks. - SdPlayTrack (11) is the core API that plays the music or video track. It is generally used by a device when the user wants to play the current track, the next track, or when he wants to rewind or fast forward within a track. It is called upon by other API's such as SdNextTrack (12) SdResumeTrack (15) and SdForward (17). SdPlayTrack finds the AOB for the selected track, checks the audio format (MP3, AAC, or WMA etc.) and decodes the track.
- Referring to
FIGS. 8B , 9, and 10, playback of an encrypted track, step 810B ofFIG. 8C , will now be described. - If encrypted content is desired, then commands are issued to/from
device 15 andSW 100 which require the OEM's 4C-licensed device keys to be used. All processing of these keys is solely limited to theSDSE 175 module which is housed beneath theSSM 180. If non secure or non-encrypted content is requested,NSFI 170 and NSAPI's 140B, 150B, and 160B andNSDD 190B will access the content. - When
SSM 180 receives a request for security services, it carries it out by passing the command request packet to the process_security function withinSDSE 175. Key values are never contained within the request packets or exposed at software layers aboveSDSE 175. - When needed internally by
SDSE 175, device keys are retrieved via a function call into an OEM-supplied library. The library ofSDSE 175, security.lib, contains the following APIs designed to reduce the time that a decrypted key resides in the secure area of the system: - 1) SEC_AKE API;
- 2) SEC_ENC_TKEY API;
- 3) SEC_DEC_TKEY API;
- 4) SEC_GETCCI API;
- 5) SEC_UPDATECCI API.
- The functionality and the structure of
SW 100 are described in the text of this application and more specifically, the functionality of APIs 1-5 above are shown within the flowchart ofFIG. 9 . The APIs are shown next to the corresponding functions that they implement. Further detail of the implementation of these APIs, as well as all ofSW 100, can be seen in the source code that is submitted in an appendix of this application. - Once obtained, the device key is combined with the Media Key Block (MKB) from the SD Memory Card to form the “media key.” This value is kept within
SDSE 175 for use in processing subsequent requests. Note, however, the “unique media key” (Kmu) is never retained insideSDSE 175. This value, which forms the basis for all security accesses, is always calculated on a real-time basis (and never cached) as an extra security precaution. Detailed description of the processing of the keys withinSDSE 175 follows. - The encryption process is in general terms designed to stop unauthorized copying of the content located on the secure media. There are many aspects of the invention that achieve this. First, an entire file, for example, a song, is never decrypted at once and stored into memory where it may be vulnerable. The portable device allocates a buffer and
SDSE 175 reads chunks of encrypted content at a time, decrypts it, and then writes over the same buffer over and over again until the end of the file. - As was seen in
FIGS. 6 and 7 , the media unique key (Kmu) and title key (Kt) are the keys finally used to decrypt the content. There are many ways to protect the title key. One is to store the keys in a very secure area ofdevice 15, another is to read the title key from the protectedarea 47 ofcard 13 each time the encrypted buffer is read and decrypted.FIG. 9 is a flow chart depicting the preferred method. - Returning to
FIG. 9 , instep 205, an MKB image, which, as seen inFIG. 4 , is 64 kilobytes, is read to process the media key (Km), as seen inFIG. 6 , to yield the media unique key (Kmu). This step is further detailed inFIG. 10 which will be described later. After mutual authentication of the device and the media is complete instep 205, the AKE process is undergone to yield a session key (Ks) that can only be used during that session (as long as the device is turned on or is in an active state) instep 210. The AKE process can be seen by referring once again toFIG. 6 . Instep 213, the media unique key (Kmu) is deleted. Instep 215, the session key (Ks) is used to decrypt the doubly encrypted title key E(E(Kt)) stored in protectedarea 47 ofmemory card 13. The result is a singly encrypted title key (E(Kt)). Instep 220, this encrypted title key (E(Kt)) is stored in a memory of thedevice 15. The (E(Kt)) may be stored insystem memory 27,RAM memory 25A ofMCU 25, orRAM memory 31A ofDSP 31. The title key Kt is specific for each title, referred to as a track in the realm of audio and onFIG. 9 used to illustrate the invention. Each track may be made of multiple files, for example, in the case of a long classical song. For large video clips, a title may comprise many files. Thus, for all subsequent reading and decryption of the encrypted content of the track, the title key need not be retrieved from the memory card because it is stored in a local memory, and precious time and computing resources can be saved, while at the same time, the title key remains encrypted for security purposes. - In
step 225, a portion of the track is played back. This portion may be in any of the files that comprise the track. Instep 225 a, the media unique key (Kmu) is calculated once again. Instep 225 b, the encrypted title key stored in local memory is decrypted. Then, instep 225 c, the title key is used to decrypt the content from the buffer ofdevice 15 containing content from theuser area 41 ofcard memory card 13. Immediately after the buffer is decrypted, the title key is deleted instep 225 d and the media unique key is deleted instep 225 e. The order ofsteps SW 100 can be executed by either theMCU 25 orDSP 31 and stored in any of thememory device 15, thus, the processing times can vary. This is repeated until all portions of the track are read as seen instep 230. Once all portions have been read the system can move on to the next track, as shown instep 235, if playback is to continue. This may be the case, for example, if the user has chosen to play an entire playlist. - When the all portions of track have been read and the reading of the next track is to commence, the process will begin again at
step 215 and will retrieve the next doubly encrypted title key from the protectedarea 47 ofcard 13. This is generally the case if the user has set the device in motion to play an entire playlist that includes multiple tracks. If the session is closed (i.e.,device 15 has been turned on or off), then a new session key will have to be generated and the process will initiate atstep 210. If memory card is removed or freshly inserted, the device and media will have to be re-authenticated and the process will begin again atstep 205 in order to read a track. -
FIG. 10 describes the operation of processing the Media Key Block, step 205 ofFIG. 9 described above. As was seen inFIG. 4 , anMKB image 49 is 64 Kbytes in length. Reading theentire image 49 at once to calculate the MKB would be inefficient, requiring a large RAM and long processing times. The present system reduces RAM requirements and decreases processing time. TheMKB image 49 is divided intochunks 1 through 128. Each chunk is 512 bytes and may contain one of four different types of records of the MKB: the verify media key record (VMKR) known as 0×81; the calculate media key record (CMKR) known as 0×01; the conditionally calculate media key record (CCMKR) known as 0×82; or the end media key record (EMKR) known as 0×02. These records are described in the Content Protection for Recordable Media (CPRM) Specification of the 4C Entity, referenced above. - In this example, the chunk length and the buffer length are the same. However, the buffer length and chunk length can both range from 256 bytes to 4096 bytes. Each record is examined to perform specific operations based on the record type and certain data will be saved for later to obtain the Media Key. The record length is added to the total length of the buffer offset every time a record is identified. The chunk number is calculated by dividing the total length with the chunk length. The chunk number is the index to the Media Key Block of a selected chunk data. The remainder of the total length is the offset to the selected chunk data. The row and column are used to figure out where the encrypted media key and the conditional encrypted media key are. Those encrypted keys are saved and the decryption C2 cipher in Electronic Codebook Mode algorithm is performed to obtain the Media Key. This Media Key is then verified for a correct final Media Key (Km).
- The number of reads, T, required per MKB chunk for obtaining the Media Key (Km) from the MKB associated with the number of records is shown below:
-
Number of Records <T<(Number of records*2) -
- T: Number of times required for accessing MKB chunks
- Each record has different length and data values. The information of each record can be obtained within two reads. Since there are four records, between 4 and 8 reads will be necessary to process the MKB chunk and obtain the records.
-
- Therefore, the number of reads, T, are:
-
4<T<8 - Suppose that it takes N ms to access 512-byte of MKB data. It will take (128*N)ms to access an entire 64K MKB image to obtain the Media Key from the first method. It only takes, from the second method, (8*N)ms, as the worst case scenario, to obtain the Media Key. Thus, there is a considerable time saved using this scheme. On the average, to obtain the Media Key (Km), the number of reads would be in the range of 4 to 6, and the time necessary would be proportionately less than shown above.
- Step 205 of
FIG. 9 , expanded here inFIG. 10 , is performed until a final media key is produced in step 205.75 or the media is rejected in step 205.80. Not all of the 128 chunks need to be read, and not all of the 512 bytes per chunk need to be read in order to calculate the media key. Processing MKB data is an operation that requires requesting a chunk of data at a time, pointing to the desired location within that specific chunk and computing the obtained values. Not all MKB data is needed. The algorithm depicted inFIG. 10 will provide a mathematical calculation to figure out exactly what chunk of MKB data is needed, what record should be processed and where the encrypted data is located. - In step 205.5, the buffer pointer is set to the data buffer and the buffer offset is cleared. Next, in step 205.10, the chunk number is checked to see if it is equal to or larger than the maximum chunk number. If it is, an error will be returned in step 205.15. If it is not, the chunk number will be incremented and new data will be loaded into the buffer in step 205.20. Then the buffer offset will be updated in step 205.25. Thus, the pointer can be set to the correct location (the chunk number plus offset). In step 205.30, the buffer pointer is set to the buffer offset. In step 205.40 the buffer is read starting at the offset where the pointer is located. The system will then determine what type of record it is reading. As seen in step 205.40, the system will first check what type of record is being read, and what record length is associated with that record. The actions that will follow differ depending upon the record type and length. The record length of each record will be used to determine where the buffer pointer should be located in reading the subsequent record. This is reflected by steps 205.49, updating the buffer offset and setting the buffer pointer at the new offset.
- If the record is a CMKR as shown in step 205.42, then the system updates the buffer chunk number and offset to the correct MKB location where the encrypted media key (Km)is located in step 205.49. Each card has 16 MKBs. Thus, the system will get the offset where the encrypted media key is, go to the specific MKB chunk number, allocate buffer (16 blocks×512 bytes), and go to the offset within each block to read the encrypted media key. Then the system uses a device key (Kd) supplied from
device 15 to decrypt (calculate) the media key in step 205.50. Once the media key has been calculated the next step is to verify the media key. - If the record is a VMKR as evaluated in step 205.44, the media key that was previously calculated, either on the first attempt in step 205.50, or in a subsequent attempt in step 205.65, will be compared to a reference media key (Km) in step 205.55. In order to do this, reference media key will first be stored locally. If the key is the same a pass will be returned, which in hex is DEADBEEF, and the system will not need to conditionally calculate the media key. In order to figure out where to start reading the next record, the record length of the VMKR is used to move the buffer pointer to the next record. If it is not the same it then it will be calculated again when a CCMKR record is read in step 205.46. When this record is read, the media key will be calculated once again in step 205.65 after the buffer point has been set to read at the updated buffer offset in step 205.49, and then it will be subsequently verified when the next VMKR is read. The maximum number of times the CCMKR is calculated may be set by the system and preferably one.
- The first calculation takes place when a CMKR is found. If it is successfully calculated, as determined during the verification process initiated when a VMKR is found, then there will be no need to conditionally calculate the media key (Km). If the verification is unsuccessful then when a CCMKR is found the media key (Km) will be recalculated and re-verified. This means that there are two chances to calculate the media key. Finally, if the record is an EMKR as evaluated in step 205.48, then in step 205.75 the system will verify that at the end of the record a valid media key (Km) is present, and in step 205.75 the final media key (Km) will be produced, after the buffer pointer is set at a the proper offset for this type of record in step 205.49. If, however, a valid media key is not returned in step 205.70, the media will be rejected in step 205.80. If the final media key is returned in step 205.70, the processing will continue at
step 210 ofFIG. 9 , as shown by step 205.85. Thus the MKB process is complete. - Functions within
SDSE 175 perform security accesses such as Get MKB by using a secure device driver interface (SDDI) 190A todevice driver 190. This same device driver,SDDI 190A also makes use of functions withinSDSE 175 which it can call directly. For example, prior to issuing a read of the authentication area, SDDI 190 a must first call the sec_ake function withinSDSE 175. The sec_ake function will in turn call back intoSDDI 190A. This “dual calling relationship” which facilitates the isolation of the device key withinSDSE 175 is unique to SW 100 s implementation of the SD-Audio standards. - Since
SDSE 175 handles all key-oriented processing, and these values are needed when certain SD commands are received by theaudio interface 105,video interface 110, orimage interface 115, the device driver must make use of functions withinSDSE 175 which it can call directly. When carrying out the functions,SDSE module 175 must in turn call back into thedevice driver 190's private security interface,SDDI 190A. This “dual calling relationship” allows interwoven requests betweenSDSE 175 anddevice driver 190, thus enabling key values to be isolated within the security module. - The
SDSE 175 software layer invokes security device driver services via the private interface by initiating a security driver request packet and calling the security driver interface entry point passing a request packet pointer. - In order to clarify the appended source code which has been incorporated by reference, the following tables are provided.
- The request packet (defined in sdapi.h) consists of a data type SSMSERVE which is defined as follows:
-
TABLE 2 Variable Variable name Typedef struct _mySecuredDrv { Data buffer UCHAR *buffer Number of data blocks UINT16 noBlocks Application unique Number UINT16 mkb_ID Start address UINT16 lba Security flag INT16 securityFlag Drive number INT16 driveNo Command index INT16 opCode } - Command index (INT16 opCode) holds the command for the service being requested. Supported commands include:
-
TABLE 3 Command Functional Code Routine Device identify #define SDDRV_IDENT 0 Security identify #define SDDRV_SECIDENT 1Secure read #define SDDRV_SECRD 2Secure write #define SDDRV_SECWR 3Secure erase #define SDDRV_SECERASE 4Read MKB #define SDDRV_RDMKB 5Get MID #define SDDRV_GETMID 6 Set challenge #define SDDRV_SETCHALGE 7 Get challenge #define SDDRV_GETCHALGE 8 Set response #define SDDRV_SETRESP 9 Get response #define SDDRV_GETRESP 10 Change size of protected area #define SDDRV_CHANGESA 11 - Security device driver service requests are issued from the SDSE 175module. For example, the Generate
Challenge 1 function sendschallenge 1 as follows: -
TABLE 4 Generate Challenge 1Command Operation Call security routine SDSECURITYDRV mySecDrv Set drive number mySecDrv.driveNo = (INT16)drv Set memory address within media mySecDrv.lba = 0 Number of data blocks mySecDrv.noBlocks = 1 Set challenge mySecDrv.opCode = SDDRV_SETCHALGE Send challenge 1 mySecDrv.buffer = Chlg1 Call to device driver scDDHandler(&mySecDrv) - Because all key manipulation is confined to
SDSE 175,SSDI 190A must rely onSDSE 175 functions to perform Authentication Key Exchange (AKE) or for decrypting data that has been transferred across the bus (note that all data sent across the bus is first encrypted using the “session key” which is generated from each AKE.) - When performing the AKE,
SDSE 175 must send commands to theSD Memory Card 13, thus, it must in turn call intoSDDI 190A. This calling relationship is outlined in the diagram ofFIG. 7 which depicts the steps necessary to process a read of the authentication area. - Notice that the sec_ake function within the
SDSE 175, when called by thesecurity SDDI 190A, performs four calls back into the security device driver via the private driver interface. These four requests consist of: SDDRV_SETCHALGE, SDDRV_GETCHALGE, SDDRV_SETRESP, and SDDRV_GETRESP. This enables the security module to carry out the requisite set challenge/get challenge, set response/get response steps seen inFIG. 7 . The resultant session key is stored within the security module. This is used to decrypt data when the security device driver calls into theSDSE 175's bus_decrypt function to get information fromSDDI 190A. - The system and method of the present invention are advantageous over prior techniques in many ways. The present invention provides a turnkey solution for original equipment manufacturers to access encrypted content without having to have any knowledge of the memory structure of the storage media. The decryption process by itself is very complex. Furthermore, simply reading and writing to a memory card or compact disk is complex in and of itself. All a manufacturer needs to do is send a simple command such as “play” or “next track” and return the decrypted content from whatever the memory device happens to be.
- Device keys and resultant session keys are manipulated in a very isolated and protected software layer. These are never exposed in upper layers. Even the lower device driver layer is not given direct access to the keys. Device keys are retrieved from an OEM-supplied library when generating the media key. This key is retained within the security engine, but the media unique key (Kmu) which is the heart of the security scheme is never stored. A private interface to the security engine enables the security engine to gain low-level access to the memory card while keeping the exposure of all security-related keys (e.g., device keys, media keys, session keys) confined within the security engine. A “dual calling relationship” allows the security engine and the security device driver to make interwoven use of each other's services.
- While particular embodiments of the present invention and their advantages have been shown and described, it should be understood that various changes, substitutions, and alterations can be made therein without departing from the spirit and scope of the invention as defined by the appended claims. For example, although usage of an SD memory card has been shown to illustrate the functioning of the invention, the invention can be used on any media having encrypted content. It can also be utilized by any type of device. Furthermore, encrypted content can be decrypted from any type of memory device, whether it be fixed or removable, and whether it be solid state or rotating. The content is not limited to audio or video, but can be any content worthy of encryption.
Claims (9)
1. A method of securing a storage device and providing content to an authorized entity yet protecting the content from unauthorized duplication:
providing a flash memory array within the storage device;
providing a freely accessible read/write area within the memory array, the freely accessible read/write area being a first distinct area;
providing a read/write area within the memory array that is accessible only after a successful mutual authentication between a host device and the storage device comprising the flash memory array has occurred, the read/write area within the memory array that is accessible only after a successful mutual authentication being a second distinct area within the memory array;
providing a write protected area within the memory array that is accessible only by the storage device itself, the write protected area being a third distinct area within the memory array;
providing a write protected area that is accessible for reading from outside of the storage device, the write protected area being a fourth distinct area within the memory array; and
storing the content in an encrypted format in the freely accessible read/write area.
2. The method of claim 1 , further comprising storing a media unique key in the write protected area within the memory array that is accessible only by the storage device itself.
3. The method of claim 2 , further comprising storing title keys necessary to access content in the freely accessible read/write area within the write protected area within the memory array that is accessible only by the storage device itself.
4. The method of claim 3 , further comprising:
providing copy control information within the read/write area within the memory array that is accessible only after a successful mutual authentication; and
concatenating and encrypting the title keys and the copy control information together with the media unique key stored in the write protected area within the memory array that is accessible only by the storage device itself.
5. The method of claim 1 , further comprising storing a media identifier unique to each storage device within the write protected area that is accessible for reading from outside of the storage device.
6. The method of claim 5 , further comprising storing media key blocks within the write protected area that is accessible for reading from outside of the storage device.
7. The method of claim 6 , further comprising transferring the media key blocks from the write protected area that is accessible for reading from outside of the storage device to a portable device, the portable device having a key able to decrypt the transferred media key blocks.
8. The method of claim 7 , further comprising transferring a piece of the encrypted content from the freely accessible read/write area to the portable storage device, the portable storage device having an encrypted version of the title key used to encrypt the piece of the encrypted content.
9. A system for providing and reproducing content for an authorized entity yet protecting the content from unauthorized duplication, the system comprising:
a host device for reproducing the content;
a storage device comprising a flash memory array;
a freely accessible read/write area within the memory array, the freely accessible read/write area being a first distinct area;
a read/write area within the memory array that is accessible only after a successful mutual authentication between the host device and the storage device has occurred, the read/write area within the memory array that is accessible only after a successful mutual authentication being a second distinct area within the memory array;
a write protected area within the memory array that is accessible only by the storage device itself, the write protected area being a third distinct area within the memory array and having records ; and
a write protected area that is accessible for reading from outside of the storage device, the write protected area being a fourth distinct area within the memory array, the content being freely accessible but only reproducible if the host device can successfully mutually authenticate with the storage device and access the second distinct read/write area.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/901,577 US20080137865A1 (en) | 2000-12-07 | 2007-09-18 | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US25173100P | 2000-12-07 | 2000-12-07 | |
US10/006,554 US7840818B2 (en) | 2000-12-07 | 2001-12-06 | System, method, and device for playing back recorded content |
US11/901,577 US20080137865A1 (en) | 2000-12-07 | 2007-09-18 | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/006,554 Continuation US7840818B2 (en) | 2000-12-07 | 2001-12-06 | System, method, and device for playing back recorded content |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080137865A1 true US20080137865A1 (en) | 2008-06-12 |
Family
ID=22953171
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/006,465 Expired - Fee Related US7227952B2 (en) | 2000-12-07 | 2001-12-06 | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
US10/006,554 Expired - Lifetime US7840818B2 (en) | 2000-12-07 | 2001-12-06 | System, method, and device for playing back recorded content |
US11/809,222 Abandoned US20070237329A1 (en) | 2000-12-07 | 2007-05-31 | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
US11/901,577 Abandoned US20080137865A1 (en) | 2000-12-07 | 2007-09-18 | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
US12/927,001 Expired - Lifetime US8443208B2 (en) | 2000-12-07 | 2010-11-04 | System, method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/006,465 Expired - Fee Related US7227952B2 (en) | 2000-12-07 | 2001-12-06 | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
US10/006,554 Expired - Lifetime US7840818B2 (en) | 2000-12-07 | 2001-12-06 | System, method, and device for playing back recorded content |
US11/809,222 Abandoned US20070237329A1 (en) | 2000-12-07 | 2007-05-31 | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/927,001 Expired - Lifetime US8443208B2 (en) | 2000-12-07 | 2010-11-04 | System, method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
Country Status (8)
Country | Link |
---|---|
US (5) | US7227952B2 (en) |
EP (3) | EP2357651A3 (en) |
JP (2) | JP4219680B2 (en) |
KR (2) | KR20030060981A (en) |
CN (2) | CN1720578A (en) |
AU (2) | AU2002232494A1 (en) |
TW (2) | TW558903B (en) |
WO (2) | WO2002047080A2 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020186842A1 (en) * | 2000-12-07 | 2002-12-12 | Sandisk Corporation | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
US20060112284A1 (en) * | 2004-11-22 | 2006-05-25 | Kabushiki Kaisha Toshiba | Copyright management method, information recording/reproducing method and device, and information recording medium and method of manufacturing the medium |
US20070005625A1 (en) * | 2005-07-01 | 2007-01-04 | Nec Laboratories America, Inc. | Storage architecture for embedded systems |
US20080141381A1 (en) * | 2006-05-24 | 2008-06-12 | Walkoe Wilbur J | Integrated delivery and protection device for digital objects |
WO2011049902A1 (en) * | 2009-10-21 | 2011-04-28 | Mod Systems Incorporated | High-speed secure content transfer to sd card from kiosk |
US20110179196A1 (en) * | 2010-01-21 | 2011-07-21 | Lee Friedman | System, method and computer program product for portable multimedia content display |
US8433858B1 (en) * | 2007-07-26 | 2013-04-30 | Siliconsystems, Inc. | Multi-interface and multi-bus structured solid-state storage subsystem |
US20140223182A1 (en) * | 2013-02-07 | 2014-08-07 | Qualcomm Incorporated | Methods and devices for authentication and key exchange |
Families Citing this family (148)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6578203B1 (en) | 1999-03-08 | 2003-06-10 | Tazwell L. Anderson, Jr. | Audio/video signal distribution system for head mounted displays |
US7210160B2 (en) | 1999-05-28 | 2007-04-24 | Immersion Entertainment, L.L.C. | Audio/video programming and charging system and method |
CN1187756C (en) * | 1999-05-28 | 2005-02-02 | 松下电器产业株式会社 | Semiconductor memory card, playback appts. recording appts. playback method, recording method, and computer-readable recording medium |
US20020057364A1 (en) | 1999-05-28 | 2002-05-16 | Anderson Tazwell L. | Electronic handheld audio/video receiver and listening/viewing device |
US6585622B1 (en) | 1999-12-03 | 2003-07-01 | Nike, Inc. | Interactive use an athletic performance monitoring and reward method, system, and computer program product |
US8956228B2 (en) * | 1999-12-03 | 2015-02-17 | Nike, Inc. | Game pod |
CN100423041C (en) * | 2000-01-21 | 2008-10-01 | 索尼公司 | Data processing apparatus and method |
FR2815738B1 (en) * | 2000-10-25 | 2003-03-21 | Dolphin Integration Sa | ACCESS CONTROL TO AN INTEGRATED MEMORY WITH A MICROPROCESSOR |
JP2002328846A (en) * | 2001-02-20 | 2002-11-15 | Sony Computer Entertainment Inc | Copy management system, computer readable storage medium in which information processing program of client terminal is stored, computer readable storage medium in which information processing program of management server is stored, information processing program of client terminal, information processing program of management server, copy managing method, information processing method of client terminal and information processing method of managing server |
US20030188183A1 (en) * | 2001-08-27 | 2003-10-02 | Lee Lane W. | Unlocking method and system for data on media |
FR2830950A1 (en) * | 2001-10-11 | 2003-04-18 | Archos | MASS STORAGE SYSTEM AND METHOD, AND AUTONOMOUS AND PORTABLE MASS STORAGE UNIT USED IN SUCH A SYSTEM |
US20030145183A1 (en) * | 2002-01-31 | 2003-07-31 | Muehring Phillip T. | Applications for removable storage |
US8656178B2 (en) * | 2002-04-18 | 2014-02-18 | International Business Machines Corporation | Method, system and program product for modifying content usage conditions during content distribution |
US7367059B2 (en) * | 2002-05-30 | 2008-04-29 | Nokia Corporation | Secure content activation during manufacture of mobile communication devices |
CN101950343A (en) | 2002-08-08 | 2011-01-19 | 晟碟以色列有限公司 | Digital rights management method and integrated circuit |
JP2005536938A (en) * | 2002-08-20 | 2005-12-02 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Mobile network authentication to protect stored content |
US7979700B2 (en) * | 2002-08-23 | 2011-07-12 | Sandisk Corporation | Apparatus, system and method for securing digital documents in a digital appliance |
US20040039932A1 (en) * | 2002-08-23 | 2004-02-26 | Gidon Elazar | Apparatus, system and method for securing digital documents in a digital appliance |
US20060288407A1 (en) * | 2002-10-07 | 2006-12-21 | Mats Naslund | Security and privacy enhancements for security devices |
AU2003275466A1 (en) * | 2002-10-07 | 2004-05-04 | Immersion Entertainment, Llc | System and method for providing event spectators with audio/video signals pertaining to remote events |
KR20040034076A (en) * | 2002-10-21 | 2004-04-28 | 케이비 테크놀러지 (주) | Mp3 player and mp3 service server and mp3 playing method |
US20040083378A1 (en) * | 2002-10-29 | 2004-04-29 | Research Triangle Software, Inc. | Method, systems and devices for handling files while operated on in physically different computer devices |
JP2006504504A (en) | 2002-10-30 | 2006-02-09 | ナイキ・インコーポレーテッド | Targets used in interactive activity devices |
US8206219B2 (en) | 2002-10-30 | 2012-06-26 | Nike, Inc. | Interactive gaming apparel for interactive gaming |
US20040093509A1 (en) * | 2002-11-12 | 2004-05-13 | Gidon Elazar | Method and apparatus for connecting a storage device to a television |
US7599976B1 (en) * | 2002-11-13 | 2009-10-06 | Metrowerks Corporation | System and method for cryptographic key generation |
US7478248B2 (en) * | 2002-11-27 | 2009-01-13 | M-Systems Flash Disk Pioneers, Ltd. | Apparatus and method for securing data on a portable storage device |
JP3878542B2 (en) * | 2002-11-29 | 2007-02-07 | 株式会社東芝 | Recording device |
JP4434573B2 (en) * | 2002-11-29 | 2010-03-17 | 株式会社東芝 | License transfer device and program |
CN100542084C (en) * | 2003-01-15 | 2009-09-16 | 索尼株式会社 | Signal processing system, recording method, program, recording medium, transcriber and information processor |
EP1565867A1 (en) * | 2003-02-21 | 2005-08-24 | Matsushita Electric Industrial Co., Ltd. | Software-management system, recording medium, and information-processing device |
US11063766B2 (en) | 2003-06-13 | 2021-07-13 | Ward Participations B.V. | Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data |
AU2003304217A1 (en) | 2003-06-13 | 2005-01-04 | Orbid Limited | Method and system for performing a transaction and for performing a verification of legitimate use of digital data |
US20070206682A1 (en) * | 2003-09-29 | 2007-09-06 | Eric Hamilton | Method And Apparatus For Coding Information |
US7593687B2 (en) | 2003-10-07 | 2009-09-22 | Immersion Entertainment, Llc | System and method for providing event spectators with audio/video signals pertaining to remote events |
EP1524659A1 (en) * | 2003-10-13 | 2005-04-20 | Deutsche Thomson-Brandt Gmbh | Method and apparatus for decrypting an encrypted supplementary data set |
KR101022465B1 (en) * | 2003-11-13 | 2011-03-15 | 삼성전자주식회사 | Method of copying and decrypting encrypted digital data and apparatus therefor |
US8472792B2 (en) | 2003-12-08 | 2013-06-25 | Divx, Llc | Multimedia distribution system |
US7519274B2 (en) | 2003-12-08 | 2009-04-14 | Divx, Inc. | File format for multiple track digital data |
WO2005076576A2 (en) * | 2004-02-03 | 2005-08-18 | Sandisk Secure Content Solutions, Inc. | Protection of digital data content |
WO2005076138A1 (en) * | 2004-02-03 | 2005-08-18 | Sydney Gordon Low | A content player |
US7499550B2 (en) * | 2004-02-09 | 2009-03-03 | International Business Machines Corporation | System and method for protecting a title key in a secure distribution system for recordable media content |
FR2867582B1 (en) * | 2004-03-10 | 2006-05-05 | Michel Koenig | PORTABLE ELECTRONIC UNIT COMPRISING IN A MICROCIRCUIT A DIGITAL PROCESSOR WITH CRYPTOGRAPHIC CAPACITY, A HIGH CAPACITY FLASH MEMORY AND A SIGNAL PROCESSING PROCESSOR |
KR101100385B1 (en) * | 2004-03-22 | 2011-12-30 | 삼성전자주식회사 | Method and apparatus for digital rights management by using certificate revocation list |
TWI259957B (en) * | 2004-04-19 | 2006-08-11 | Faraday Tech Corp | System and method for accessing discrete data |
KR101224348B1 (en) | 2004-05-10 | 2013-01-21 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Personal communication apparatus capable of recording transactions secured with biometric data, and computer readable recording medium |
US20050280705A1 (en) * | 2004-05-20 | 2005-12-22 | Immersion Entertainment | Portable receiver device |
US20050262361A1 (en) * | 2004-05-24 | 2005-11-24 | Seagate Technology Llc | System and method for magnetic storage disposal |
JP4686138B2 (en) * | 2004-05-26 | 2011-05-18 | 株式会社東芝 | Storage medium conversion method, program and device |
US8393005B2 (en) * | 2004-06-30 | 2013-03-05 | Panasonic Corporation | Recording medium, and device and method for recording information on recording medium |
JP2006020154A (en) * | 2004-07-02 | 2006-01-19 | Toshiba Corp | Content management method and content management program, and electronic device |
JP2006020253A (en) * | 2004-07-05 | 2006-01-19 | Ricoh Co Ltd | Information management system, information management method, recording medium and program |
CN101015165B (en) | 2004-08-26 | 2010-05-05 | 富士通株式会社 | Content managing method and device |
JP4569228B2 (en) * | 2004-09-02 | 2010-10-27 | ソニー株式会社 | Data processing method, information recording medium manufacturing management system, recording data generation apparatus and method, and computer program |
US8627354B2 (en) * | 2004-12-17 | 2014-01-07 | Martin E. Hellman | Tiered subscription broadcast system |
US8270901B2 (en) | 2004-12-17 | 2012-09-18 | Martin E. Hellman | Dropout-resistant media broadcasting system |
US7865917B2 (en) * | 2004-12-17 | 2011-01-04 | Martin E Hellman | Security enhanced tiered subscription broadcast system |
JP2006185016A (en) * | 2004-12-27 | 2006-07-13 | Hitachi Ltd | Content movement control device and method |
KR101147763B1 (en) * | 2005-01-19 | 2012-05-25 | 엘지전자 주식회사 | Data decryption method and apparatus, recoding medium comprising encrypted data |
US20060170760A1 (en) * | 2005-01-31 | 2006-08-03 | Collegiate Systems, Llc | Method and apparatus for managing and distributing audio/video content |
US8108691B2 (en) | 2005-02-07 | 2012-01-31 | Sandisk Technologies Inc. | Methods used in a secure memory card with life cycle phases |
US8423788B2 (en) | 2005-02-07 | 2013-04-16 | Sandisk Technologies Inc. | Secure memory card with life cycle phases |
US8321686B2 (en) | 2005-02-07 | 2012-11-27 | Sandisk Technologies Inc. | Secure memory card with life cycle phases |
KR100670005B1 (en) * | 2005-02-23 | 2007-01-19 | 삼성전자주식회사 | Apparatus for verifying memory integrity remotely for mobile platform and system thereof and method for verifying integrity |
US20060248235A1 (en) * | 2005-03-21 | 2006-11-02 | Sony Corporation | Method and apparatus for data collection in a media player |
US7360057B2 (en) | 2005-03-22 | 2008-04-15 | Seagate Technology, Llc | Encryption of data in a range of logical block addresses |
US8832458B2 (en) | 2005-03-22 | 2014-09-09 | Seagate Technology Llc | Data transcription in a data storage device |
US20060265402A1 (en) * | 2005-05-20 | 2006-11-23 | Andrew Edmond | Grid network for distribution of files |
US8874082B2 (en) * | 2005-05-25 | 2014-10-28 | Qualcomm Incorporated | Apparatus and methods for protecting data on a wireless device |
US8887295B2 (en) * | 2005-06-27 | 2014-11-11 | Safend Ltd. | Method and system for enabling enterprises to use detachable memory devices that contain data and executable files in controlled and secure way |
US7748031B2 (en) | 2005-07-08 | 2010-06-29 | Sandisk Corporation | Mass storage device with automated credentials loading |
US7840178B2 (en) * | 2005-07-12 | 2010-11-23 | Martin E. Hellman | FM broadcast system competitive with satellite radio |
US8321953B2 (en) | 2005-07-14 | 2012-11-27 | Imation Corp. | Secure storage device with offline code entry |
US8015606B1 (en) | 2005-07-14 | 2011-09-06 | Ironkey, Inc. | Storage device with website trust indication |
US8438647B2 (en) | 2005-07-14 | 2013-05-07 | Imation Corp. | Recovery of encrypted data from a secure storage device |
US8335920B2 (en) | 2005-07-14 | 2012-12-18 | Imation Corp. | Recovery of data access for a locked secure storage device |
CN101243513A (en) * | 2005-08-23 | 2008-08-13 | 皇家飞利浦电子股份有限公司 | Information carrier authentication with a physical one-way function |
EP1934878A2 (en) * | 2005-09-08 | 2008-06-25 | SanDisk Corporation | Mobile memory system for secure storage and delivery of media content |
US20070061597A1 (en) | 2005-09-14 | 2007-03-15 | Micky Holtzman | Secure yet flexible system architecture for secure devices with flash mass storage memory |
US8966284B2 (en) | 2005-09-14 | 2015-02-24 | Sandisk Technologies Inc. | Hardware driver integrity check of memory card controller firmware |
WO2007123567A2 (en) | 2005-09-19 | 2007-11-01 | Ironkey, Inc. | Recovery of encrypted data from a secure storage device |
US20080025504A1 (en) * | 2005-11-23 | 2008-01-31 | Robert Rapp | Computer or digital device data encryption/decryption performed by using a random analog source |
JP2007164540A (en) | 2005-12-14 | 2007-06-28 | Samsung Electronics Co Ltd | Data storage, data storage method, and program |
US8639873B1 (en) | 2005-12-22 | 2014-01-28 | Imation Corp. | Detachable storage device with RAM cache |
US8266378B1 (en) | 2005-12-22 | 2012-09-11 | Imation Corp. | Storage device with accessible partitions |
US20070145135A1 (en) * | 2005-12-28 | 2007-06-28 | Fabrice Jogand-Coulomb | Methods used in a nested memory system with near field communications capability |
US20070145152A1 (en) * | 2005-12-28 | 2007-06-28 | Fabrice Jogand-Coulomb | Nested memory system with near field communications capability |
US7590600B2 (en) * | 2006-03-28 | 2009-09-15 | Microsoft Corporation | Self-contained rights management for non-volatile memory |
AU2006343229B2 (en) * | 2006-05-08 | 2011-11-03 | Hui Lin | A method for protecting digital content by encrypting and decrypting a memory card |
US20070288752A1 (en) * | 2006-06-08 | 2007-12-13 | Weng Chong Chan | Secure removable memory element for mobile electronic device |
US8126993B2 (en) | 2006-07-18 | 2012-02-28 | Nvidia Corporation | System, method, and computer program product for communicating sub-device state information |
JP4979312B2 (en) * | 2006-09-09 | 2012-07-18 | ソニー株式会社 | Information processing apparatus, information processing method, and computer program |
US8839005B2 (en) * | 2006-09-13 | 2014-09-16 | Sandisk Technologies Inc. | Apparatus for transferring licensed digital content between users |
US8423794B2 (en) | 2006-12-28 | 2013-04-16 | Sandisk Technologies Inc. | Method and apparatus for upgrading a memory card that has security mechanisms for preventing copying of secure content and applications |
US8069298B2 (en) * | 2007-06-29 | 2011-11-29 | Sandisk Technologies Inc. | Method of storing and accessing header data from memory |
US20090006796A1 (en) * | 2007-06-29 | 2009-01-01 | Sandisk Corporation | Media Content Processing System and Non-Volatile Memory That Utilizes A Header Portion of a File |
US20090052670A1 (en) * | 2007-08-21 | 2009-02-26 | Samsung Electronics Co., Ltd. | Method and apparatus for storing digital content in storage device |
JP4473900B2 (en) * | 2007-08-22 | 2010-06-02 | 株式会社東芝 | Semiconductor memory device |
US20090060182A1 (en) * | 2007-09-04 | 2009-03-05 | Thomas Killian | Apparatus and method for enhancing the protection of media content |
JP2009086890A (en) * | 2007-09-28 | 2009-04-23 | Toppan Printing Co Ltd | Application reception system and application reception method |
KR101453464B1 (en) * | 2007-11-09 | 2014-10-21 | 삼성전자주식회사 | Apparatus and method for management of contents right object in mobile communication terminal |
KR20100106327A (en) | 2007-11-16 | 2010-10-01 | 디브이엑스, 인크. | Hierarchical and reduced index structures for multimedia files |
KR20090052199A (en) * | 2007-11-20 | 2009-05-25 | 삼성전자주식회사 | Storage device, terminal device using the storage device, and, method thereof |
US8327051B2 (en) * | 2007-11-20 | 2012-12-04 | Sandisk Technologies Inc. | Portable handheld memory card and methods for use therewith |
US8315950B2 (en) * | 2007-12-31 | 2012-11-20 | Sandisk Technologies Inc. | Powerfully simple digital media player and methods for use therewith |
JP5025009B2 (en) * | 2008-02-15 | 2012-09-12 | 株式会社東芝 | Authentication method, host computer and recording medium |
US8695087B2 (en) * | 2008-04-04 | 2014-04-08 | Sandisk Il Ltd. | Access control for a memory device |
US8839002B2 (en) * | 2008-04-23 | 2014-09-16 | Cyberlink Corp. | Optical media recording device for protecting device keys and related method |
WO2009137371A2 (en) | 2008-05-02 | 2009-11-12 | Ironkey, Inc. | Enterprise device recovery |
US8713026B2 (en) * | 2008-06-13 | 2014-04-29 | Sandisk Technologies Inc. | Method for playing digital media files with a digital media player using a plurality of playlists |
US20090313432A1 (en) * | 2008-06-13 | 2009-12-17 | Spence Richard C | Memory device storing a plurality of digital media files and playlists |
US8009831B2 (en) * | 2008-06-30 | 2011-08-30 | Condel International Technologies Inc. | Method and system for hiding the decryption key in a dispersive way |
JP4620146B2 (en) * | 2008-07-18 | 2011-01-26 | 株式会社東芝 | Information processing apparatus and authentication method |
US8365279B2 (en) * | 2008-10-31 | 2013-01-29 | Sandisk Technologies Inc. | Storage device and method for dynamic content tracing |
CN101753683B (en) * | 2008-12-03 | 2013-09-04 | 深圳富泰宏精密工业有限公司 | Mobile phone antitheft system |
US20100162120A1 (en) * | 2008-12-18 | 2010-06-24 | Derek Niizawa | Digital Media Player User Interface |
JP2010218428A (en) * | 2009-03-18 | 2010-09-30 | Buffalo Inc | External storage device and method for controlling same |
GB2468862A (en) * | 2009-03-24 | 2010-09-29 | Steven John Kennedy | A method of protecting electronic content by encryption or deletion of consumed portions |
US8429365B2 (en) * | 2009-06-26 | 2013-04-23 | Sandisk Technologies Inc. | Memory device and method for embedding host-identification information into content |
US8745365B2 (en) | 2009-08-06 | 2014-06-03 | Imation Corp. | Method and system for secure booting a computer by booting a first operating system from a secure peripheral device and launching a second operating system stored a secure area in the secure peripheral device on the first operating system |
US8683088B2 (en) | 2009-08-06 | 2014-03-25 | Imation Corp. | Peripheral device data integrity |
US10158958B2 (en) * | 2010-03-23 | 2018-12-18 | Dolby Laboratories Licensing Corporation | Techniques for localized perceptual audio |
TWI451279B (en) * | 2010-04-07 | 2014-09-01 | Apple Inc | Content access control for real-time or near real-time streaming |
CN102479296A (en) * | 2010-11-29 | 2012-05-30 | 公安部第一研究所 | Virus and Trojan prevention method for USB (Universal Serial Bus) flash disk data |
US8533812B1 (en) * | 2011-03-03 | 2013-09-10 | Symantec Corporation | Systems and methods for securing access to kernel devices |
JP5776432B2 (en) * | 2011-08-11 | 2015-09-09 | ソニー株式会社 | Information processing apparatus, information processing method, and program |
JP5747758B2 (en) * | 2011-09-15 | 2015-07-15 | ソニー株式会社 | Information processing apparatus, information processing method, and program |
US8826459B2 (en) * | 2011-11-29 | 2014-09-02 | Jason Swist | Systems and methods of automatic multimedia transfer and playback |
JP5100884B1 (en) * | 2011-12-02 | 2012-12-19 | 株式会社東芝 | Memory device |
US8831217B2 (en) * | 2012-04-10 | 2014-09-09 | Western Digital Technologies, Inc. | Digital rights management system and methods for accessing content from an intelligent storage |
JP5377712B2 (en) * | 2012-05-31 | 2013-12-25 | 株式会社東芝 | Electronics |
US9361483B2 (en) * | 2012-07-10 | 2016-06-07 | Forcepoint Federal Llc | Anti-wikileaks USB/CD device |
JP2013118616A (en) * | 2012-09-24 | 2013-06-13 | Toshiba Corp | Memory device |
EP2903202A4 (en) * | 2012-09-28 | 2015-11-04 | Fujitsu Ltd | Information processing device and semiconductor device |
US9342699B2 (en) * | 2013-11-06 | 2016-05-17 | Blackberry Limited | Method and apparatus for controlling access to encrypted data |
US10140477B2 (en) * | 2013-12-09 | 2018-11-27 | Thales E-Security, Inc. | Obfuscating in memory encryption keys |
US20150186656A1 (en) * | 2013-12-26 | 2015-07-02 | Hui Lin | Method for protecting digital contents by using memory card encryption and decryption |
JP5870163B2 (en) * | 2014-06-30 | 2016-02-24 | 達男 眞子 | Content browsing restriction system, content browsing restriction method, content browsing restriction program, and removable media reader |
KR102230862B1 (en) | 2014-07-01 | 2021-03-24 | 삼성전자 주식회사 | Image processing apparatus and control methof thereof |
KR20160039922A (en) | 2014-10-02 | 2016-04-12 | 삼성전자주식회사 | Image processing apparatus and control method thereof |
US9626304B2 (en) * | 2014-10-21 | 2017-04-18 | Sandisk Technologies Llc | Storage module, host, and method for securing data with application information |
US10949508B2 (en) * | 2017-08-11 | 2021-03-16 | Productionpal, Llc | System and method to protect original music from unauthorized reproduction and use |
US10630652B2 (en) * | 2017-12-29 | 2020-04-21 | Janine Darling | Data-centric secure data technology, archiving, and storage system |
US11176265B2 (en) * | 2017-12-29 | 2021-11-16 | Stash America Llc | Data-centric interactive data security system |
US11017127B2 (en) | 2018-01-31 | 2021-05-25 | Seagate Technology Llc | Storage compute appliance with internal data encryption |
US10909272B2 (en) | 2018-01-31 | 2021-02-02 | Seagate Technology Llc | Storage compute appliance with user authentication and memory allocation capabilities |
WO2020051910A1 (en) * | 2018-09-14 | 2020-03-19 | Cobo Global Limited | Secure hardware cryptographic key storage device with detachable battery and anti-tamper security functionality |
US11483361B2 (en) * | 2020-06-24 | 2022-10-25 | KORD, Inc. | Audio stem access and delivery solution |
Citations (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4465901A (en) * | 1979-06-04 | 1984-08-14 | Best Robert M | Crypto microprocessor that executes enciphered programs |
US4779252A (en) * | 1984-07-02 | 1988-10-18 | U.S. Philips Corp. | Apparatus for automatically reproducing preferred selection from a record carrier |
US5604801A (en) * | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
US5790431A (en) * | 1995-11-20 | 1998-08-04 | International Business Machines Corporation | Method and system for measuring availability in a distributed network |
US5790423A (en) * | 1995-06-14 | 1998-08-04 | Audible, Inc. | Interactive audio transmission receiving and playback system |
US5805821A (en) * | 1994-09-08 | 1998-09-08 | International Business Machines Corporation | Video optimized media streamer user interface employing non-blocking switching to achieve isochronous data transfers |
US5966441A (en) * | 1996-11-18 | 1999-10-12 | Apple Computer, Inc. | Method and apparatus for creating a secure autonomous network entity of a network component system |
US6040622A (en) * | 1998-06-11 | 2000-03-21 | Sandisk Corporation | Semiconductor package using terminals formed on a conductive layer of a circuit board |
US6069952A (en) * | 1994-09-30 | 2000-05-30 | Mitsubishi Corporation | Data copyright management system |
US6151394A (en) * | 1996-10-31 | 2000-11-21 | Matsushita Electric Industrial Co., Ltd. | Encrypted communication system that limits the damage caused when a secret key has been leaked |
US6279114B1 (en) * | 1998-11-04 | 2001-08-21 | Sandisk Corporation | Voltage negotiation in a single host multiple cards system |
US6289102B1 (en) * | 1995-10-09 | 2001-09-11 | Matsushita Electric Industrial Co., Ltd. | Apparatus and method for preventing unauthorized use of information recorded on an information recording medium |
US20010021255A1 (en) * | 2000-03-13 | 2001-09-13 | Kabushiki Kaisha Toshiba | Content processing system and content protecting method |
US20010032088A1 (en) * | 1998-05-20 | 2001-10-18 | Fujitsu Limited | License devolution apparatus |
US6313386B1 (en) * | 2001-02-15 | 2001-11-06 | Sony Corporation | Music box with memory stick or other removable media to change content |
US6332175B1 (en) * | 1999-02-12 | 2001-12-18 | Compaq Computer Corporation | Low power system and method for playing compressed audio data |
US6367019B1 (en) * | 1999-03-26 | 2002-04-02 | Liquid Audio, Inc. | Copy security for portable music players |
US20020073037A1 (en) * | 1998-08-05 | 2002-06-13 | Taku Katoh | Method and system for controlling copy generations of digital data |
US20020186842A1 (en) * | 2000-12-07 | 2002-12-12 | Sandisk Corporation | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
US20030014371A1 (en) * | 1999-09-10 | 2003-01-16 | Paul Charles Turgeon | System and method for providing secure services over public and private networks using a removable portable computer-readable storage |
US6523113B1 (en) * | 1998-06-09 | 2003-02-18 | Apple Computer, Inc. | Method and apparatus for copy protection |
US6611812B2 (en) * | 1998-08-13 | 2003-08-26 | International Business Machines Corporation | Secure electronic content distribution on CDS and DVDs |
US6615192B1 (en) * | 1999-03-12 | 2003-09-02 | Matsushita Electric Industrial Co., Ltd. | Contents copying system, copying method, computer-readable recording medium and disc drive copying contents but not a cipher key via a host computer |
US6661812B1 (en) * | 2000-04-05 | 2003-12-09 | Triscend Corporation | Bidirectional bus for use as an interconnect routing resource |
US6820148B1 (en) * | 2000-08-17 | 2004-11-16 | Sandisk Corporation | Multiple removable non-volatile memory cards serially communicating with a host |
US6832293B1 (en) * | 1999-05-28 | 2004-12-14 | Matsushita Electric Industrial Co., Ltd. | Audio playback apparatus and method for resuming interrupted playback recording |
US6865431B1 (en) * | 1999-05-28 | 2005-03-08 | Matsushita Electric Industrial Co., Ltd. | Semiconductor memory card, playback apparatus, recording apparatus, playback method, recording method, and computer-readable recording medium |
US6888532B2 (en) * | 2001-11-30 | 2005-05-03 | Palmone, Inc. | Automatic orientation-based user interface for an ambiguous handheld device |
US6901457B1 (en) * | 1998-11-04 | 2005-05-31 | Sandisk Corporation | Multiple mode communications system |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS6084686A (en) | 1983-10-17 | 1985-05-14 | Toshiba Corp | Recording system of information recording medium |
US4661658A (en) | 1985-02-12 | 1987-04-28 | International Business Machines Corporation | Offline PIN validation with DES |
EP0198384A3 (en) | 1985-04-09 | 1988-03-23 | Siemens Aktiengesellschaft Berlin Und Munchen | Method and device for enciphering data |
DE3512785A1 (en) | 1985-04-10 | 1986-10-23 | Telefonbau Und Normalzeit Gmbh, 6000 Frankfurt | Method for access protection |
FR2592502B1 (en) | 1985-12-26 | 1990-03-30 | Lefevre Jean Pierre | SEQUENTIAL STORAGE CERTIFIER |
DE3601526A1 (en) | 1986-01-20 | 1987-07-23 | Rene Dipl Biol Kleinhenn | Copy protection method for computer programs using smart card |
FR2596177B1 (en) | 1986-03-19 | 1992-01-17 | Infoscript | METHOD AND DEVICE FOR QUALITATIVE BACKUP OF DIGITAL DATA |
US6118870A (en) * | 1996-10-09 | 2000-09-12 | Lsi Logic Corp. | Microprocessor having instruction set extensions for decryption and multimedia applications |
JPH11250141A (en) * | 1998-03-04 | 1999-09-17 | Nippon Telegr & Teleph Corp <Ntt> | Method for distributing real time contents |
MY123388A (en) * | 1999-03-15 | 2006-05-31 | Sony Corp | Processing method and apparatus for encrypted data transfer |
JP4161466B2 (en) * | 1999-04-22 | 2008-10-08 | 日本ビクター株式会社 | Content information recording method and content information processing apparatus |
JP3682840B2 (en) * | 1999-05-21 | 2005-08-17 | 日本ビクター株式会社 | Content information recording method and content information recording apparatus |
JP4127587B2 (en) * | 1999-07-09 | 2008-07-30 | 株式会社東芝 | Content management method, content management apparatus, and recording medium |
CN100414864C (en) * | 2000-03-09 | 2008-08-27 | 松下电器产业株式会社 | Audio data playback management system and method with editing apparatus and recording medium |
-
2001
- 2001-11-06 EP EP11003401.4A patent/EP2357651A3/en not_active Withdrawn
- 2001-11-06 CN CNA018220096A patent/CN1720578A/en active Pending
- 2001-11-06 EP EP01992016A patent/EP1512147A2/en not_active Withdrawn
- 2001-11-06 KR KR10-2003-7007607A patent/KR20030060981A/en active IP Right Grant
- 2001-11-06 AU AU2002232494A patent/AU2002232494A1/en not_active Abandoned
- 2001-11-06 JP JP2002548721A patent/JP4219680B2/en not_active Expired - Fee Related
- 2001-11-06 WO PCT/US2001/046661 patent/WO2002047080A2/en active Application Filing
- 2001-12-06 EP EP01990898A patent/EP1461808A2/en not_active Withdrawn
- 2001-12-06 US US10/006,465 patent/US7227952B2/en not_active Expired - Fee Related
- 2001-12-06 AU AU2002230658A patent/AU2002230658A1/en not_active Abandoned
- 2001-12-06 US US10/006,554 patent/US7840818B2/en not_active Expired - Lifetime
- 2001-12-06 JP JP2002548722A patent/JP4219681B2/en not_active Expired - Fee Related
- 2001-12-06 WO PCT/US2001/047014 patent/WO2002047081A2/en active Application Filing
- 2001-12-06 CN CNB018214495A patent/CN100514471C/en not_active Expired - Fee Related
- 2001-12-06 KR KR1020037007604A patent/KR100844998B1/en not_active IP Right Cessation
- 2001-12-07 TW TW090130439A patent/TW558903B/en not_active IP Right Cessation
- 2001-12-07 TW TW090130438A patent/TW544579B/en not_active IP Right Cessation
-
2007
- 2007-05-31 US US11/809,222 patent/US20070237329A1/en not_active Abandoned
- 2007-09-18 US US11/901,577 patent/US20080137865A1/en not_active Abandoned
-
2010
- 2010-11-04 US US12/927,001 patent/US8443208B2/en not_active Expired - Lifetime
Patent Citations (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4465901A (en) * | 1979-06-04 | 1984-08-14 | Best Robert M | Crypto microprocessor that executes enciphered programs |
US4779252A (en) * | 1984-07-02 | 1988-10-18 | U.S. Philips Corp. | Apparatus for automatically reproducing preferred selection from a record carrier |
US5805821A (en) * | 1994-09-08 | 1998-09-08 | International Business Machines Corporation | Video optimized media streamer user interface employing non-blocking switching to achieve isochronous data transfers |
US6069952A (en) * | 1994-09-30 | 2000-05-30 | Mitsubishi Corporation | Data copyright management system |
US5604801A (en) * | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
US5790423A (en) * | 1995-06-14 | 1998-08-04 | Audible, Inc. | Interactive audio transmission receiving and playback system |
US6289102B1 (en) * | 1995-10-09 | 2001-09-11 | Matsushita Electric Industrial Co., Ltd. | Apparatus and method for preventing unauthorized use of information recorded on an information recording medium |
US5790431A (en) * | 1995-11-20 | 1998-08-04 | International Business Machines Corporation | Method and system for measuring availability in a distributed network |
US6151394A (en) * | 1996-10-31 | 2000-11-21 | Matsushita Electric Industrial Co., Ltd. | Encrypted communication system that limits the damage caused when a secret key has been leaked |
US5966441A (en) * | 1996-11-18 | 1999-10-12 | Apple Computer, Inc. | Method and apparatus for creating a secure autonomous network entity of a network component system |
US20010032088A1 (en) * | 1998-05-20 | 2001-10-18 | Fujitsu Limited | License devolution apparatus |
US6523113B1 (en) * | 1998-06-09 | 2003-02-18 | Apple Computer, Inc. | Method and apparatus for copy protection |
US20030126445A1 (en) * | 1998-06-09 | 2003-07-03 | Apple Computer, Inc. | Method and apparatus for copy protection |
US6040622A (en) * | 1998-06-11 | 2000-03-21 | Sandisk Corporation | Semiconductor package using terminals formed on a conductive layer of a circuit board |
US20020073037A1 (en) * | 1998-08-05 | 2002-06-13 | Taku Katoh | Method and system for controlling copy generations of digital data |
US6611812B2 (en) * | 1998-08-13 | 2003-08-26 | International Business Machines Corporation | Secure electronic content distribution on CDS and DVDs |
US6279114B1 (en) * | 1998-11-04 | 2001-08-21 | Sandisk Corporation | Voltage negotiation in a single host multiple cards system |
US6901457B1 (en) * | 1998-11-04 | 2005-05-31 | Sandisk Corporation | Multiple mode communications system |
US6332175B1 (en) * | 1999-02-12 | 2001-12-18 | Compaq Computer Corporation | Low power system and method for playing compressed audio data |
US6615192B1 (en) * | 1999-03-12 | 2003-09-02 | Matsushita Electric Industrial Co., Ltd. | Contents copying system, copying method, computer-readable recording medium and disc drive copying contents but not a cipher key via a host computer |
US6367019B1 (en) * | 1999-03-26 | 2002-04-02 | Liquid Audio, Inc. | Copy security for portable music players |
US6832293B1 (en) * | 1999-05-28 | 2004-12-14 | Matsushita Electric Industrial Co., Ltd. | Audio playback apparatus and method for resuming interrupted playback recording |
US6865431B1 (en) * | 1999-05-28 | 2005-03-08 | Matsushita Electric Industrial Co., Ltd. | Semiconductor memory card, playback apparatus, recording apparatus, playback method, recording method, and computer-readable recording medium |
US20030014371A1 (en) * | 1999-09-10 | 2003-01-16 | Paul Charles Turgeon | System and method for providing secure services over public and private networks using a removable portable computer-readable storage |
US20010021255A1 (en) * | 2000-03-13 | 2001-09-13 | Kabushiki Kaisha Toshiba | Content processing system and content protecting method |
US6661812B1 (en) * | 2000-04-05 | 2003-12-09 | Triscend Corporation | Bidirectional bus for use as an interconnect routing resource |
US6820148B1 (en) * | 2000-08-17 | 2004-11-16 | Sandisk Corporation | Multiple removable non-volatile memory cards serially communicating with a host |
US20020186842A1 (en) * | 2000-12-07 | 2002-12-12 | Sandisk Corporation | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
US7227952B2 (en) * | 2000-12-07 | 2007-06-05 | Sandisk Corporation | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
US20070237329A1 (en) * | 2000-12-07 | 2007-10-11 | Bahman Qawami | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
US6313386B1 (en) * | 2001-02-15 | 2001-11-06 | Sony Corporation | Music box with memory stick or other removable media to change content |
US6888532B2 (en) * | 2001-11-30 | 2005-05-03 | Palmone, Inc. | Automatic orientation-based user interface for an ambiguous handheld device |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110191600A1 (en) * | 2000-12-07 | 2011-08-04 | Sandisk Corporation | System, Method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
US20070237329A1 (en) * | 2000-12-07 | 2007-10-11 | Bahman Qawami | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
US20020186842A1 (en) * | 2000-12-07 | 2002-12-12 | Sandisk Corporation | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
US7840818B2 (en) | 2000-12-07 | 2010-11-23 | Sandisk Corporation | System, method, and device for playing back recorded content |
US8443208B2 (en) | 2000-12-07 | 2013-05-14 | Sandisk Technologies Inc. | System, method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media |
US20060112284A1 (en) * | 2004-11-22 | 2006-05-25 | Kabushiki Kaisha Toshiba | Copyright management method, information recording/reproducing method and device, and information recording medium and method of manufacturing the medium |
US7721343B2 (en) * | 2004-11-22 | 2010-05-18 | Kabushiki Kaish Toshiba | Copyright management method, information recording/reproducing method and device, and information recording medium and method of manufacturing the medium |
US20070005625A1 (en) * | 2005-07-01 | 2007-01-04 | Nec Laboratories America, Inc. | Storage architecture for embedded systems |
US20080141381A1 (en) * | 2006-05-24 | 2008-06-12 | Walkoe Wilbur J | Integrated delivery and protection device for digital objects |
US7971071B2 (en) | 2006-05-24 | 2011-06-28 | Walkoe Wilbur J | Integrated delivery and protection device for digital objects |
US8433858B1 (en) * | 2007-07-26 | 2013-04-30 | Siliconsystems, Inc. | Multi-interface and multi-bus structured solid-state storage subsystem |
WO2011049902A1 (en) * | 2009-10-21 | 2011-04-28 | Mod Systems Incorporated | High-speed secure content transfer to sd card from kiosk |
US20110179196A1 (en) * | 2010-01-21 | 2011-07-21 | Lee Friedman | System, method and computer program product for portable multimedia content display |
US8954625B2 (en) * | 2010-01-21 | 2015-02-10 | Lee Friedman | System, method and computer program product for portable multimedia content display |
US20140223182A1 (en) * | 2013-02-07 | 2014-08-07 | Qualcomm Incorporated | Methods and devices for authentication and key exchange |
US9143331B2 (en) * | 2013-02-07 | 2015-09-22 | Qualcomm Incorporated | Methods and devices for authentication and key exchange |
Also Published As
Publication number | Publication date |
---|---|
US20110191600A1 (en) | 2011-08-04 |
WO2002047081A9 (en) | 2003-04-17 |
TW558903B (en) | 2003-10-21 |
US7840818B2 (en) | 2010-11-23 |
CN1541391A (en) | 2004-10-27 |
EP2357651A3 (en) | 2013-06-26 |
JP4219680B2 (en) | 2009-02-04 |
EP2357651A2 (en) | 2011-08-17 |
JP2005506590A (en) | 2005-03-03 |
WO2002047081A2 (en) | 2002-06-13 |
US8443208B2 (en) | 2013-05-14 |
KR20030060981A (en) | 2003-07-16 |
US7227952B2 (en) | 2007-06-05 |
EP1512147A2 (en) | 2005-03-09 |
WO2002047080A2 (en) | 2002-06-13 |
AU2002232494A1 (en) | 2002-06-18 |
KR20040055724A (en) | 2004-06-26 |
JP2005506589A (en) | 2005-03-03 |
AU2002230658A1 (en) | 2002-06-18 |
US20020176575A1 (en) | 2002-11-28 |
CN100514471C (en) | 2009-07-15 |
KR100844998B1 (en) | 2008-07-09 |
WO2002047080A3 (en) | 2005-01-13 |
EP1461808A2 (en) | 2004-09-29 |
JP4219681B2 (en) | 2009-02-04 |
US20020186842A1 (en) | 2002-12-12 |
WO2002047081A3 (en) | 2004-07-08 |
US20070237329A1 (en) | 2007-10-11 |
CN1720578A (en) | 2006-01-11 |
TW544579B (en) | 2003-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8443208B2 (en) | System, method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media | |
US6618789B1 (en) | Security memory card compatible with secure and non-secure data processing systems | |
US8393005B2 (en) | Recording medium, and device and method for recording information on recording medium | |
US6601140B1 (en) | Memory unit, data processing unit, and data processing method using memory unit type | |
JP6040234B2 (en) | Storage device, host device and method for protecting content | |
JP4395302B2 (en) | Semiconductor memory card and control method thereof | |
JP2002132585A (en) | Information recording apparatus, information reproducing apparatus, information recording medium, information recording method, information reproducing method, and program providing medium | |
JP2003505752A (en) | Methods and systems for providing copy protection on storage media and storage media used in such systems | |
JP2002539557A (en) | Copy protection of storage media by randomizing location and key for write access | |
US6990589B1 (en) | Recording and/or playback apparatus and method | |
JP2003044361A (en) | Data storage/reproduction system, data storage device, data reproducing device, data storage/reproducing method, program and medium | |
JP3882460B2 (en) | MEMORY DEVICE, DATA PROCESSING DEVICE, DATA PROCESSING SYSTEM, AND DATA PROCESSING METHOD | |
JP2000298942A (en) | Disk storage device and copy preventing system applied to this device | |
EP1585127A2 (en) | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media | |
JP2000307564A (en) | Method and device for restoring contents information and medium | |
RU2273101C2 (en) | Method and system for controlling audio data reproduction incorporating editing device and record medium | |
JP2006229277A (en) | Recording and reproducing system | |
MXPA00011207A (en) | Copy-protection on a storage medium by randomizing locations and keys upon write access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: SANDISK TECHNOLOGIES INC., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SANDISK CORPORATION;REEL/FRAME:038438/0904 Effective date: 20160324 |
|
AS | Assignment |
Owner name: SANDISK TECHNOLOGIES LLC, TEXAS Free format text: CHANGE OF NAME;ASSIGNOR:SANDISK TECHNOLOGIES INC;REEL/FRAME:038807/0980 Effective date: 20160516 |