USRE42107E1 - Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon - Google Patents
Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon Download PDFInfo
- Publication number
- USRE42107E1 USRE42107E1 US12/252,311 US25231108A USRE42107E US RE42107 E1 USRE42107 E1 US RE42107E1 US 25231108 A US25231108 A US 25231108A US RE42107 E USRE42107 E US RE42107E
- Authority
- US
- United States
- Prior art keywords
- data
- data unit
- digital data
- encrypted
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00137—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users
- G11B20/00144—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users involving a user identifier, e.g. a unique customer ID
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00137—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users
- G11B20/00152—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users involving a password
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00224—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a remote server
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00478—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier wherein contents are decrypted and re-encrypted with a different key when being copied from/to a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00855—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server
- G11B20/00869—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server wherein the remote server can deliver the content to a receiving device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/1062—Data buffering arrangements, e.g. recording or playback buffers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/1062—Data buffering arrangements, e.g. recording or playback buffers
- G11B2020/1075—Data buffering arrangements, e.g. recording or playback buffers the usage of the buffer being restricted to a specific kind of data
- G11B2020/10759—Data buffering arrangements, e.g. recording or playback buffers the usage of the buffer being restricted to a specific kind of data content data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Definitions
- the present invention relates to digital data file encryption in which an encrypted digital data file is prevented from illicit interception and decoding when digital audio data or digital video data is transmitted to a personal computer through a computer communication network and, in turn, downloaded to a digital data player such as an MP3 player.
- MP3 (shorthand for MPEG-1 Layer 3 Audio) is one of various available digital data formats for audio data.
- An MP3 player is a new notional, portable digital device capable of readily downloading and reproducing desired data from a computer communication network using an audio data compression coding technique prescribed in MPEG-1 Layer 3.
- the MP3 player has few faults and excellent sound quality because it stores a file in the form of digital data.
- the MP3 player is small in size and light in weight, thereby assuring high portability such that a user can carry it even during his physical exercise. For these reasons, this product is a viable alternative to a portable cassette tape recorder and compact disk (CD) player.
- the reference numeral 10 denotes a digital data server which assigns an identification (ID) number and password (PWD) to a personal computer 20 for user registration, and which also transmits a digital data player 22 in software form to the personal computer 20 .
- ID identification
- PWD personal computer 20
- the digital data server 10 Upon receiving a file supply request from the user, the digital data server 10 identifies the user on the basis of an ID number and password entered by him and supplies an encrypted digital data file to the user in accordance with this identification.
- the personal computer 20 stores the digital data file supplied from the digital data server 10 on a hard disk 21 therein and decrypts it through the downloaded software player 22 to reproduce the resultant unencrypted digital data file or to download it to a digital data playing device 30 .
- the digital data playing device 30 downloads the unencrypted data file from the personal computer 20 and stores it in a memory unit 40 for the reproduction thereof.
- the memory unit 40 downloads the unencrypted digital data file from the digital data playing device 30 and stores it in its internal memory 42 to output the file for a desired playing operation.
- the user In order to legally receive a desired digital data file from the digital data server 10 , the user has to register with a digital data file supplier. During user registration, the user is assigned an ID number and password from the digital data file supplier. Then, the user downloads a digital data player 22 in software form from the digital data server 10 through a communication network and installs the downloaded digital data player 22 in the personal computer 20 .
- the user transmits his ID number and password to the digital data server 10 through the personal computer 20 and communication network.
- the digital data server 10 identifies the user on the basis of the transmitted ID number and password and supplies the desired digital data file to the user in accordance with the identification.
- the digital data server 10 encrypts the digital data file using the user's ID number as an encryption key and transmits the encrypted digital data file to the personal computer 20 .
- the personal computer 20 stores the digital data file transmitted from the digital data server 10 on the hard disk 21 . Then, upon receiving a reproduction request from the user, the personal computer 20 decrypts and reproduces the stored digital data file via the digital data software player 22 . As a result, the user is able to listen to desired music through the personal computer 20 .
- the personal computer 20 decrypts the digital data file, stored on the hard disk 21 with the digital data software player 22 , and sends the decrypted digital data file to the digital data playing device 30 through a download unit 23 therein and the communication network.
- the digital data playing device 30 stores the digital data file, sent along the above path, in the memory 42 of the memory unit 40 , which is typically in the form of a removable card. If the user requests the digital data player 30 to reproduce the digital data file stored in the memory 42 , then the digital data player 30 reads the stored digital data file from the memory 42 and reproduces it through a decoder 32 therein. As a result, the user can listen to desired music anywhere using the digital data player 30 .
- the above-mentioned conventional arrangement has a disadvantage in that the digital data file may be intercepted from the communication network during downloading from the personal computer to the digital data playing device (or from the digital data playing device to the memory card) in an unencrypted condition.
- Such an interception of the unencrypted digital data file makes it impossible to protect the copyright of a music copyright holder and music copyright associates (for example, a music producer and planner taking charge of music production, duplication and distribution).
- a conventional powerful encryption method may be used to powerfully encrypt the digital data file and send it to the digital data player.
- such powerful encryption in turn, requires a powerful decryption function, thereby increasing the cost of the digital data player.
- the present invention has been made in view of the above problems, and it is an object of the present invention to provide an encryption system in which illegal outflow of a digital data file, such as MP3, downloaded from a server can be prevented, with no additional increase in cost.
- a method for encrypting digital data including decrypting digital data which has been encrypted at a high encryption level, storing a predetermined amount of the decrypted digital data in a buffer, reencrypting output digital data from the buffer at a low encryption level; and transferring the reencrypted digital data to a digital data player or a data storage medium.
- a method for encrypting digital data including determining whether digital data which has been encrypted at a high encryption level must be protected from unauthorized copying, decrypting the digital data, transferring the decrypted digital data to a digital data player or a data storage medium if the decrypted digital data need not be protected from unauthorized copying, and reencrypting the decrypted digital data at a low encryption level if the decrypted digital data must be protected from unauthorized copying.
- a program (or script) embodied on a computer-readable medium for encrypting or decrypting a digital data file
- the computer-readable-medium-embodied program including a first program code segment to receive and store digital data encrypted to a high level and an encryption key, a second program code segment to decrypt the stored digital data using the encryption key, a third program code segment to store a predetermined amount of the decrypted digital data in a buffer, and a fourth program code segment to reencrypt the digital data from the buffer to a low level and download the reencrypted digital data to a digital data player or a data storage medium.
- FIG. 1 is a block diagram of a conventional arrangement of a digital data player and the associated peripheral devices
- FIG. 2 is a block diagram of an embodiment of a digital data file encryption apparatus in accordance with the present invention.
- FIGS. 3A to 3 E are views illustrating examples of file encryption in accordance with the present invention.
- FIG. 4 is a flowchart illustrating a digital data file encryption method in accordance with the present invention.
- FIG. 5 is a block diagram of an alternative embodiment of the digital data file encryption apparatus in accordance with the present invention.
- FIG. 6 is a diagram illustrating the digital data file encryption method shown in FIG. 4 , and the flow of the data file among the components of the digital data file encryption apparatus shown in FIGS. 2 and 5 .
- FIG. 2 there is shown in block form an embodiment of a digital data file encryption system in accordance with the present invention.
- FIG. 6 illustrates the flow of the data file among the components of the digital data file encryption system. The operation of the digital data file encryption system according to the present invention will hereinafter be described in detail with reference to FIGS. 2 to 4 and 6 .
- the user must register with a digital data file supplier to legally receive a desired digital data file from a digital data server 110 ( FIG. 6 , Step 400 ).
- the user is assigned an ID number and password from the digital data file supplier ( FIG. 6 , Step 401 ).
- the user downloads a digital data player 122 in a software form from the digital data server 110 through a communication network and sets the downloaded digital data player 122 in a personal computer 120 .
- the user transmits his ID number and password to the digital data server 110 through the personal computer 120 and communication network to download a desired digital data file from the digital data server 110 through the communication network.
- the digital data server 110 identifies the user on the basis of the transmitted ID number and password and supplies the desired digital data file to the user in accordance with the identification ( FIGS. 4 and 6 , Step 430 ).
- the digital data server 110 encrypts the digital data file on the basis of a predetermined encryption key and transmits the encrypted digital data file to the personal computer 120 .
- the personal computer 120 stores the digital data file transmitted from the digital data server 110 on a hard disk 121 therein ( FIG. 6 , Step 431 ). Then, upon receiving a reproduction request from the user, the personal computer 120 decrypts and reproduces the stored digital data file through the digital data software player 122 . As a result, the user can listen to desired music through the personal computer 120 .
- the personal computer 120 has to transmit the desired digital data file to the digital data playing device 130 .
- the digital data file is powerfully encrypted and downloaded to the digital data playing device 130
- a corresponding powerful decryption function must be performed in the digital data playing device 130 .
- Such powerful decryption would result in an increase in cost of the digital data playing device 130 .
- the digital data is downloaded under the decrypted, or non-processed, condition, it is subject to illicit diversion during transmission, and subsequent uncontrolled distribution.
- the present encryption apparatus encrypts and downloads the digital data file in the following manner.
- an encrypted data file from the hard disk 121 is decrypted by an encryption decryptor 123 , temporarily stored in a buffer 124 , and then transferred to an encryption/download unit 125 ( FIGS. 4 and 6 , Steps: 470 and 480 ).
- different types of data files may be transferred to the encryption/download unit 125 along the same path.
- a digital data file to be protected in copyright has a three-minute capacity and it is normally reproducible only when being stored in the buffer 124 in the unit of two-second amounts.
- the one-second amount-unit storage of the digital data file in the buffer 124 causes the digital data file not to be normally used even when it illegally flows.
- the copyright of the digital data file can be protected.
- the output digital data from the buffer 124 need not be protected in copyright, it is downloaded directly in unencrypted form to the digital data playing device 130 through the encryption/download unit 125 ( FIGS. 4 and 6 , Step: 510 ). However, if the copyright of the output digital data from the buffer 124 must be protected, then the file is weakly encrypted and downloaded to the digital data playing device 130 by the encryption/download unit 125 .
- the encryption/download unit 125 encrypts the raw data (deencrypted data) using an encryption key, e.g., 16 BYTES E — K from the digital data playing device 130 as shown in FIGS. 2 and 5, where the encryption key is associated with a host device such as the digital data playing device 130 and/or the storage medium 140 .
- FIGS. 3A to 3 E are views illustrating examples of file encryption in accordance with the present invention.
- a strongly encrypted file as shown in FIG. 3A is partially decrypted on the basis of a predetermined encryption key and the remaining parts thereof are left strongly encrypted.
- a file encrypted and downloaded by the encryption/download unit 125 has striped, strongly encrypted areas as shown in FIG. 3 B.
- shading denotes encrypted data and no shading denotes unencrypted data.
- the file encrypted as shown in FIG. 3A may be totally decrypted as shown in FIG. 3 C and then more weakly encrypted/downloaded as shown in FIG. 3D on the basis of the predetermined encryption key.
- the unencrypted file shown in FIG. 3C may have only portions weakly encrypted as shown in FIG. 3 E.
- Any of the encryption schemes shown in FIG. 3B , 3 D, or 3 E reduce processing requirements for the digital data playing device 130 relative to a file where all of the data has been strongly encrypted.
- FIG. 6 also the encryption schemes of FIGS. 3B , 3 D, and 3 E.
- the digital data playing device 130 stores the digital data file from the personal computer 120 , encrypted and down-loaded in the above manner, in a memory 142 of a data storage medium 140 which may be in the form of a removable card. If the user requests the digital data playing device 130 to reproduce the digital data file stored in the memory 142 , then the digital data playing device 130 reads the stored digital data file from the memory 142 and reproduces it through a decoder 132 therein. At this time, the digital data file read from the data storage medium 140 has to be decrypted for the reproduction because it is in an encrypted form.
- a microcomputer 131 decrypts the digital data file read from the data storage medium 140 on the basis of the encryption key used in the above encryption procedure of the encryption/download unit 125 and outputs the decrypted digital data file to an output line through the decoder 132 . Because of the weak encryption shown, for example, in FIGS. 3B , 3 D, and 3 E, the decoder is kept low-cost. As a result, the user can listen to desired music anywhere using the digital data playing device 130 and the digital data file can be prevented from illicit diversion and distribution while being downloaded to the digital data playing device 130 .
- the above encryption method may be implemented by one program on a recording medium.
- the encryption program is configured to receive and store both digital data encrypted to a high level and an encryption key, decrypt the encrypted digital data according to the encryption key, store the decrypted digital data in a buffer in a predetermined unit of size, reencrypt output digital data from the buffer to a low level and download the reencrypted digital data to a digital data player or a data storage medium.
- This encryption program is stored on a single recording medium for use in the digital data encryption of the present invention.
- FIG. 4 is a flowchart illustrating a digital data file encryption method in accordance with the present invention.
- a user of the present invention must have previously registered and have been assigned an ID number and password, as described earlier in the description of the related art.
- a server upon receiving a digital data file download request from a personal computer at Step 410 , a server identifies the user at Step 420 to determine whether the user is legitimate. At this time, the server identifies the user on the basis of an ID code and password which are assigned from the server to the user, as stated previously. If the user is identified to be legitimate, the server downloads a desired digital data file encrypted to a high level and an encryption key to the personal computer at Step 430 . Upon downloading the desired digital data file from the server, the personal computer determines at Step 440 whether a copyright of the downloaded file must be protected.
- the downloaded digital data file need not be protected in copyright, then it is decrypted and downloaded directly to a digital data player at Step 510 . In this case, because no copyright problem is caused even when the downloaded file is hacked/diverted, there is no necessity for encrypting the downloaded file to send it to the digital data player.
- the personal computer first checks the capacity of the downloaded file at Step 450 and then sets an effective capacity of a buffer in accordance with the checked result ate Step 460 . Then, the personal computer decrypts the downloaded file according to the encryption key at Step 470 and stores the decrypted file in the buffer at Step 480 in such a manner that the decrypted file cannot be normally reproduced even when it is hacked in process of being downloaded to the digital data player.
- the digital data file stored in the buffer is encrypted to a low level at Step 490 .
- This low level encryption does not require a separate microprocessor which is typically used for the high level encryption or powerful encryption, thereby avoiding an increase in cost of the associated playing device. Then, the digital data file encrypted to the low level is downloaded to the digital data playing device at Step 500 .
- FIG. 5 there is shown in block form an alternative embodiment of the digital data file encryption system in accordance with the present invention.
- This second embodiment is substantially the same in construction as the first embodiment, with the exception that a plurality of digital data servers 110 A- 110 C are provided.
- the personal computer 120 performs the decryption operation, not using the single encryption key as shown in FIG. 2 , but using a plurality of encryption keys supplied respectively from the digital data servers. Then, the personal computer 120 reproduces the decrypted, or non-processed, digital data files or downloads them (with or without encryption) to the digital data playing device 130 for storing in the storage medium 140 in the same manner as stated previously.
- FIG. 6 is a diagram illustrating the digital data file encryption method shown in FIG. 4 , and the flow of the data file among the components of the digital data file encryption apparatus shown in FIGS. 2 and 5 .
- the downloaded digital data file need not be protected in copyright, then it is decrypted and downloaded directly to a digital data player at Step 510 .
- the digital data file stored in the buffer is encrypted to a low level at step 490 .
- any of the encryption schemes 3 B, 3 D, and 3 E may be used.
- This low level encryption does not require a separate microprocessor which is typically used for the high level encryption or powerful encryption, thereby avoiding an increase in cost of the associated playing device. Then, the digital data file encrypted to the low level is downloaded to the digital data playing device at step 500 .
- a digital data file downloaded from a single server is decrypted, stored in the buffer in a predetermined unit of size, encrypted in a somewhat simple manner and downloaded to the digital data player.
- Digital data files downloaded from a plurality of servers are decrypted in individual decryption manners, encrypted in the simple manner as mentioned above and downloaded to the digital data player. Therefore, it is possible to reliably protect the copyright of a given digital data file without increasing the cost of the digital data player due to the decryption function.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
Abstract
Description
Claims (36)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/252,311 USRE42107E1 (en) | 1999-03-17 | 2008-10-15 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1999/9014 | 1999-03-17 | ||
KR1019990009014A KR100320183B1 (en) | 1999-03-17 | 1999-03-17 | File encryption apparatus for digital data player |
US09/527,670 US7130426B1 (en) | 1999-03-17 | 2000-03-17 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
US12/252,311 USRE42107E1 (en) | 1999-03-17 | 2008-10-15 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/527,670 Reissue US7130426B1 (en) | 1999-03-17 | 2000-03-17 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE42107E1 true USRE42107E1 (en) | 2011-02-01 |
Family
ID=36773274
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/527,670 Ceased US7130426B1 (en) | 1999-03-17 | 2000-03-17 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
US12/252,295 Expired - Fee Related USRE42106E1 (en) | 1999-03-17 | 2008-10-15 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
US12/252,311 Expired - Fee Related USRE42107E1 (en) | 1999-03-17 | 2008-10-15 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
US12/252,300 Expired - Fee Related USRE42171E1 (en) | 1999-03-17 | 2008-10-15 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
US12/252,306 Expired - Fee Related USRE41942E1 (en) | 1999-03-17 | 2008-10-15 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/527,670 Ceased US7130426B1 (en) | 1999-03-17 | 2000-03-17 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
US12/252,295 Expired - Fee Related USRE42106E1 (en) | 1999-03-17 | 2008-10-15 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/252,300 Expired - Fee Related USRE42171E1 (en) | 1999-03-17 | 2008-10-15 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
US12/252,306 Expired - Fee Related USRE41942E1 (en) | 1999-03-17 | 2008-10-15 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon |
Country Status (4)
Country | Link |
---|---|
US (5) | US7130426B1 (en) |
JP (1) | JP2000267940A (en) |
KR (1) | KR100320183B1 (en) |
CN (2) | CN1783102A (en) |
Families Citing this family (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7080260B2 (en) * | 1996-11-19 | 2006-07-18 | Johnson R Brent | System and computer based method to automatically archive and retrieve encrypted remote client data files |
US6961567B1 (en) | 2000-12-07 | 2005-11-01 | Palm, Inc. | Generic activation and registration framework for wireless devices |
US7555571B1 (en) | 2001-01-05 | 2009-06-30 | Palm, Inc. | Activation of mobile computing device on a cellular network |
JP4752113B2 (en) * | 2001-01-16 | 2011-08-17 | ソニー株式会社 | Electronic device and signal transmission method |
US7526795B2 (en) * | 2001-03-27 | 2009-04-28 | Micron Technology, Inc. | Data security for digital data storage |
KR100746771B1 (en) | 2001-04-24 | 2007-08-06 | 엘지전자 주식회사 | Method for reproducing an audio file in portable audio device |
KR100430158B1 (en) | 2001-06-18 | 2004-05-04 | 지은묵 | A contents consignment sale system of the internet broadcasting and a method thereof |
JP4054190B2 (en) * | 2001-12-27 | 2008-02-27 | 松下電器産業株式会社 | Data transfer system |
GB2387505B (en) * | 2002-04-12 | 2005-11-23 | Vodafone Plc | Communication systems |
US7665110B2 (en) * | 2002-05-14 | 2010-02-16 | Lg Electronics Inc. | System and method for synchronous reproduction of local and remote content in a communication network |
WO2004022643A1 (en) | 2002-09-09 | 2004-03-18 | Nok Corporation | Hydrogenated nitrile rubber composition |
KR20040031827A (en) * | 2002-10-04 | 2004-04-14 | (주)메트로디알엠 | Sysytem for authenticating a packaged digital contents and method thereof |
US20040193871A1 (en) * | 2003-03-28 | 2004-09-30 | Broadcom Corporation | System and method for transmitting data using selective partial encryption |
KR100564731B1 (en) * | 2004-08-13 | 2006-03-28 | (주)잉카엔트웍스 | A method for providing data to a personal portable device via network and a system thereof |
JP4717398B2 (en) * | 2004-09-10 | 2011-07-06 | キヤノン株式会社 | Method for controlling data processing apparatus |
WO2006053183A2 (en) * | 2004-11-10 | 2006-05-18 | Hillcrest Laboratories, Inc. | Methods and systems for securing data processing devices |
MY143832A (en) * | 2005-05-13 | 2011-07-15 | Thomson Licensing | Security and transcoding system for transfer of content to portable devices |
JP2006339988A (en) * | 2005-06-01 | 2006-12-14 | Sony Corp | Stream controller, stream ciphering/deciphering device, and stream enciphering/deciphering method |
US7681047B2 (en) * | 2006-04-18 | 2010-03-16 | International Business Machines Corporation | Decryption of data in storage systems |
US7769176B2 (en) | 2006-06-30 | 2010-08-03 | Verint Americas Inc. | Systems and methods for a secure recording environment |
US7848524B2 (en) * | 2006-06-30 | 2010-12-07 | Verint Americas Inc. | Systems and methods for a secure recording environment |
US7853800B2 (en) * | 2006-06-30 | 2010-12-14 | Verint Americas Inc. | Systems and methods for a secure recording environment |
KR101400906B1 (en) * | 2006-07-05 | 2014-05-29 | 에이저 시스템즈 엘엘시 | Systems and methods for mobile data storage and acquisition |
KR100809664B1 (en) | 2006-07-11 | 2008-03-05 | 하나 마이크론(주) | Storage device for storing encoded content and method for providing the content |
US8452988B2 (en) * | 2006-07-24 | 2013-05-28 | Michael Sujue Wang | Secure data storage for protecting digital content |
US7953750B1 (en) | 2006-09-28 | 2011-05-31 | Verint Americas, Inc. | Systems and methods for storing and searching data in a customer center environment |
US20080082837A1 (en) | 2006-09-29 | 2008-04-03 | Protegrity Corporation | Apparatus and method for continuous data protection in a distributed computing network |
US8549619B2 (en) * | 2007-01-22 | 2013-10-01 | Dell Products L.P. | Removable hard disk with embedded security card |
US7861168B2 (en) * | 2007-01-22 | 2010-12-28 | Dell Products L.P. | Removable hard disk with display information |
US8607359B2 (en) * | 2007-01-22 | 2013-12-10 | Dell Products L.P. | Removable hard disk with front panel input |
US8572400B2 (en) * | 2007-03-26 | 2013-10-29 | Intel Corporation | Enhanced digital right management framework |
EP1978468A1 (en) * | 2007-04-04 | 2008-10-08 | Sap Ag | A method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system |
US9323956B2 (en) * | 2007-09-30 | 2016-04-26 | Lenovo (Singapore) Pte. Ltd. | Merging external NVRAM with full disk encryption |
US8225106B2 (en) | 2008-04-02 | 2012-07-17 | Protegrity Corporation | Differential encryption utilizing trust modes |
US8401155B1 (en) | 2008-05-23 | 2013-03-19 | Verint Americas, Inc. | Systems and methods for secure recording in a customer center environment |
CN101465727B (en) * | 2008-12-17 | 2011-02-02 | 成都市华为赛门铁克科技有限公司 | Method for ensuring communication safety, network appliance, device and communication system |
CN101656866B (en) * | 2009-08-14 | 2012-05-23 | 中兴通讯股份有限公司 | Receiving method, terminal equipment and receiving device for mobile digital multimedia services |
CN102055781A (en) * | 2009-10-30 | 2011-05-11 | 马杰 | Digital file distribution method based on network |
US9654810B2 (en) | 2010-07-23 | 2017-05-16 | Lattice Semiconductor Corporation | Mechanism for partial encryption of data streams |
US9019644B2 (en) | 2011-05-23 | 2015-04-28 | Lsi Corporation | Systems and methods for data addressing in a storage device |
US9049025B1 (en) * | 2011-06-20 | 2015-06-02 | Cellco Partnership | Method of decrypting encrypted information for unsecure phone |
US8964979B2 (en) | 2011-10-07 | 2015-02-24 | Silicon Image, Inc. | Identification and handling of data streams using coded preambles |
DE102011054842A1 (en) * | 2011-10-27 | 2013-05-02 | Wincor Nixdorf International Gmbh | Device for handling notes of value and / or coins and method for initializing and operating such a device |
US9413985B2 (en) | 2012-09-12 | 2016-08-09 | Lattice Semiconductor Corporation | Combining video and audio streams utilizing pixel repetition bandwidth |
KR101944062B1 (en) | 2017-09-29 | 2019-01-30 | 신재균 | Platform and method for automatically configuring ipo teams |
Citations (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH01246979A (en) | 1988-03-29 | 1989-10-02 | Kondeishiyonaru Akusesu Technol Kenkyusho:Kk | Chargeable program distributing system and cryptographic key distributing structure |
US4907275A (en) | 1987-05-20 | 1990-03-06 | Hitachi, Ltd. | Encryption apparatus |
JPH04302595A (en) | 1991-03-29 | 1992-10-26 | Pioneer Electron Corp | Catv center device for cable network |
US5323464A (en) | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
JPH06189262A (en) | 1992-12-22 | 1994-07-08 | Sony Corp | Recording device, reproducing device, vtr, and transmitting device for digital video signal |
JPH06326882A (en) | 1993-03-15 | 1994-11-25 | Toshiba Corp | Picture communication system |
JPH07297951A (en) | 1994-04-28 | 1995-11-10 | Toshiba Corp | Media information distribution system |
JPH07295892A (en) | 1994-04-26 | 1995-11-10 | Mitsubishi Electric Corp | Secure system |
JPH086879A (en) | 1994-06-23 | 1996-01-12 | Toshiba Corp | Information processing terminal |
JPH0855164A (en) | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | Software distribution system, repeating device, and user terminal device |
JPH0869419A (en) | 1994-08-30 | 1996-03-12 | Shimadzu Corp | Recording device and recording medium for digital data |
JPH0877706A (en) | 1994-07-08 | 1996-03-22 | Sony Corp | Recording/reproducing device |
JPH08107412A (en) | 1994-02-02 | 1996-04-23 | General Instr Corp Of Delaware | Method and apparatus for controlling access to digital signal |
JPH08125651A (en) | 1994-10-28 | 1996-05-17 | Hitachi Ltd | Signal processor |
JPH08130516A (en) | 1994-10-31 | 1996-05-21 | Sony Corp | Digital signal receiving system |
US5539827A (en) | 1993-05-05 | 1996-07-23 | Liu; Zunquan | Device and method for data encryption |
JPH08329011A (en) | 1995-06-02 | 1996-12-13 | Mitsubishi Corp | Data copyright management system |
US5659618A (en) * | 1995-09-29 | 1997-08-19 | Vlsi Technology, Inc. | Multi-size cryptographic key system |
JPH1013784A (en) | 1996-06-24 | 1998-01-16 | Matsushita Electric Ind Co Ltd | Broadcast signal recording and reproducing device |
JPH1013808A (en) | 1996-06-24 | 1998-01-16 | Matsushita Electric Ind Co Ltd | Information service system |
JPH10178421A (en) | 1996-10-18 | 1998-06-30 | Toshiba Corp | Packet processor, mobile computer, packet transferring method and packet processing method |
KR19980081704A (en) | 1997-04-24 | 1998-11-25 | 니시무로다이조 | Digital data playback device |
CN1205479A (en) | 1997-06-24 | 1999-01-20 | 国际商业机器公司 | Apparatus, method and computer program product for protecting copyright data within computer system |
US5867579A (en) | 1994-10-27 | 1999-02-02 | Mitsubishi Corporation | Apparatus for data copyright management system |
US5889860A (en) | 1996-11-08 | 1999-03-30 | Sunhawk Corporation, Inc. | Encryption system with transaction coded decryption key |
US5917915A (en) * | 1994-06-24 | 1999-06-29 | Sony Corporation | Scramble/descramble method and apparatus for data broadcasting |
US5991399A (en) * | 1997-12-18 | 1999-11-23 | Intel Corporation | Method for securely distributing a conditional use private key to a trusted entity on a remote system |
US5999622A (en) | 1995-11-22 | 1999-12-07 | Microsoft Corporation | Method and apparatus for protecting widely distributed digital information |
US6003135A (en) * | 1997-06-04 | 1999-12-14 | Spyrus, Inc. | Modular security device |
US6021199A (en) * | 1996-11-14 | 2000-02-01 | Kabushiki Kaisha Toshiba | Motion picture data encrypting method and computer system and motion picture data encoding/decoding apparatus to which encrypting method is applied |
WO2000027067A1 (en) * | 1998-11-02 | 2000-05-11 | Intertrust Technologies Corporation | A method and apparatus for distributing multimedia information over a network |
JP2000187935A (en) | 1998-07-22 | 2000-07-04 | Matsushita Electric Ind Co Ltd | Digital data recorder, its method and computer readable recording medium storing its program |
US6170060B1 (en) * | 1997-10-03 | 2001-01-02 | Audible, Inc. | Method and apparatus for targeting a digital information playback device |
US6289454B1 (en) * | 1998-06-29 | 2001-09-11 | Vlsi Technology, Inc. | Memory configuration which support multiple cryptographical algorithms |
US20010042043A1 (en) | 1995-02-13 | 2001-11-15 | Intertrust Technologies Corp. | Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances |
US6330675B1 (en) | 1998-02-13 | 2001-12-11 | Liquid Audio, Inc. | System and method for secure transfer of digital data to a local recordable storage medium |
US6367019B1 (en) * | 1999-03-26 | 2002-04-02 | Liquid Audio, Inc. | Copy security for portable music players |
US6385596B1 (en) | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6389534B1 (en) * | 1997-06-30 | 2002-05-14 | Taher Elgamal | Cryptographic policy filters and policy control method and apparatus |
US20020077984A1 (en) | 2000-12-19 | 2002-06-20 | Mark Ireton | Enabling protected digital media to be shared between playback devices |
US6577735B1 (en) | 1999-02-12 | 2003-06-10 | Hewlett-Packard Development Company, L.P. | System and method for backing-up data stored on a portable audio player |
US20050021477A1 (en) | 1997-01-29 | 2005-01-27 | Ganapathy Krishnan | Method and system for securely incorporating electronic information into an online purchasing application |
US6950941B1 (en) | 1998-09-24 | 2005-09-27 | Samsung Electronics Co., Ltd. | Copy protection system for portable storage media |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100202390B1 (en) * | 1995-12-29 | 1999-06-15 | 김덕중 | Variable length decoder for digital video system |
KR100196715B1 (en) * | 1995-12-29 | 1999-06-15 | 김영환 | Subscriber home automation device with copy protection function |
KR19990038305A (en) | 1997-11-04 | 1999-06-05 | 김부평 | Transmission and reception equipment inspection device and inspection method of base station |
-
1999
- 1999-03-17 KR KR1019990009014A patent/KR100320183B1/en not_active IP Right Cessation
- 1999-10-20 JP JP11298391A patent/JP2000267940A/en active Pending
- 1999-10-28 CN CNA2005101253319A patent/CN1783102A/en active Pending
- 1999-10-28 CN CN99122087A patent/CN1267856A/en active Pending
-
2000
- 2000-03-17 US US09/527,670 patent/US7130426B1/en not_active Ceased
-
2008
- 2008-10-15 US US12/252,295 patent/USRE42106E1/en not_active Expired - Fee Related
- 2008-10-15 US US12/252,311 patent/USRE42107E1/en not_active Expired - Fee Related
- 2008-10-15 US US12/252,300 patent/USRE42171E1/en not_active Expired - Fee Related
- 2008-10-15 US US12/252,306 patent/USRE41942E1/en not_active Expired - Fee Related
Patent Citations (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4907275A (en) | 1987-05-20 | 1990-03-06 | Hitachi, Ltd. | Encryption apparatus |
JPH01246979A (en) | 1988-03-29 | 1989-10-02 | Kondeishiyonaru Akusesu Technol Kenkyusho:Kk | Chargeable program distributing system and cryptographic key distributing structure |
JPH04302595A (en) | 1991-03-29 | 1992-10-26 | Pioneer Electron Corp | Catv center device for cable network |
US5323464A (en) | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
JPH06189262A (en) | 1992-12-22 | 1994-07-08 | Sony Corp | Recording device, reproducing device, vtr, and transmitting device for digital video signal |
JPH06326882A (en) | 1993-03-15 | 1994-11-25 | Toshiba Corp | Picture communication system |
US5539827A (en) | 1993-05-05 | 1996-07-23 | Liu; Zunquan | Device and method for data encryption |
JPH08107412A (en) | 1994-02-02 | 1996-04-23 | General Instr Corp Of Delaware | Method and apparatus for controlling access to digital signal |
JPH07295892A (en) | 1994-04-26 | 1995-11-10 | Mitsubishi Electric Corp | Secure system |
JPH07297951A (en) | 1994-04-28 | 1995-11-10 | Toshiba Corp | Media information distribution system |
JPH086879A (en) | 1994-06-23 | 1996-01-12 | Toshiba Corp | Information processing terminal |
US5917915A (en) * | 1994-06-24 | 1999-06-29 | Sony Corporation | Scramble/descramble method and apparatus for data broadcasting |
JPH0877706A (en) | 1994-07-08 | 1996-03-22 | Sony Corp | Recording/reproducing device |
JPH0855164A (en) | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | Software distribution system, repeating device, and user terminal device |
JPH0869419A (en) | 1994-08-30 | 1996-03-12 | Shimadzu Corp | Recording device and recording medium for digital data |
US5867579A (en) | 1994-10-27 | 1999-02-02 | Mitsubishi Corporation | Apparatus for data copyright management system |
JPH08125651A (en) | 1994-10-28 | 1996-05-17 | Hitachi Ltd | Signal processor |
JPH08130516A (en) | 1994-10-31 | 1996-05-21 | Sony Corp | Digital signal receiving system |
US20010042043A1 (en) | 1995-02-13 | 2001-11-15 | Intertrust Technologies Corp. | Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances |
JPH08329011A (en) | 1995-06-02 | 1996-12-13 | Mitsubishi Corp | Data copyright management system |
US5659618A (en) * | 1995-09-29 | 1997-08-19 | Vlsi Technology, Inc. | Multi-size cryptographic key system |
US5999622A (en) | 1995-11-22 | 1999-12-07 | Microsoft Corporation | Method and apparatus for protecting widely distributed digital information |
JPH1013808A (en) | 1996-06-24 | 1998-01-16 | Matsushita Electric Ind Co Ltd | Information service system |
JPH1013784A (en) | 1996-06-24 | 1998-01-16 | Matsushita Electric Ind Co Ltd | Broadcast signal recording and reproducing device |
JPH10178421A (en) | 1996-10-18 | 1998-06-30 | Toshiba Corp | Packet processor, mobile computer, packet transferring method and packet processing method |
US5889860A (en) | 1996-11-08 | 1999-03-30 | Sunhawk Corporation, Inc. | Encryption system with transaction coded decryption key |
US6021199A (en) * | 1996-11-14 | 2000-02-01 | Kabushiki Kaisha Toshiba | Motion picture data encrypting method and computer system and motion picture data encoding/decoding apparatus to which encrypting method is applied |
US20050021477A1 (en) | 1997-01-29 | 2005-01-27 | Ganapathy Krishnan | Method and system for securely incorporating electronic information into an online purchasing application |
KR19980081704A (en) | 1997-04-24 | 1998-11-25 | 니시무로다이조 | Digital data playback device |
US6751321B1 (en) | 1997-04-24 | 2004-06-15 | Kabushiki Kaisha Toshiba | Digital data reproduction device |
US6003135A (en) * | 1997-06-04 | 1999-12-14 | Spyrus, Inc. | Modular security device |
CN1205479A (en) | 1997-06-24 | 1999-01-20 | 国际商业机器公司 | Apparatus, method and computer program product for protecting copyright data within computer system |
US6389534B1 (en) * | 1997-06-30 | 2002-05-14 | Taher Elgamal | Cryptographic policy filters and policy control method and apparatus |
US6170060B1 (en) * | 1997-10-03 | 2001-01-02 | Audible, Inc. | Method and apparatus for targeting a digital information playback device |
US5991399A (en) * | 1997-12-18 | 1999-11-23 | Intel Corporation | Method for securely distributing a conditional use private key to a trusted entity on a remote system |
US6385596B1 (en) | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6330675B1 (en) | 1998-02-13 | 2001-12-11 | Liquid Audio, Inc. | System and method for secure transfer of digital data to a local recordable storage medium |
US6289454B1 (en) * | 1998-06-29 | 2001-09-11 | Vlsi Technology, Inc. | Memory configuration which support multiple cryptographical algorithms |
JP2000187935A (en) | 1998-07-22 | 2000-07-04 | Matsushita Electric Ind Co Ltd | Digital data recorder, its method and computer readable recording medium storing its program |
US6950941B1 (en) | 1998-09-24 | 2005-09-27 | Samsung Electronics Co., Ltd. | Copy protection system for portable storage media |
WO2000027067A1 (en) * | 1998-11-02 | 2000-05-11 | Intertrust Technologies Corporation | A method and apparatus for distributing multimedia information over a network |
US20010016836A1 (en) * | 1998-11-02 | 2001-08-23 | Gilles Boccon-Gibod | Method and apparatus for distributing multimedia information over a network |
US6577735B1 (en) | 1999-02-12 | 2003-06-10 | Hewlett-Packard Development Company, L.P. | System and method for backing-up data stored on a portable audio player |
US6367019B1 (en) * | 1999-03-26 | 2002-04-02 | Liquid Audio, Inc. | Copy security for portable music players |
US20020077984A1 (en) | 2000-12-19 | 2002-06-20 | Mark Ireton | Enabling protected digital media to be shared between playback devices |
Non-Patent Citations (2)
Title |
---|
Business Wire, "J-Bird Records Becomes First Label to Launch a C0-Branded Download Station with AT&T's a 2b music; Site Allows sampling and Purchase of CD-quality Downloads", Business Wire, New York: Jan. 19, 1999. |
Lacy, J. et al., "Music on the Internet and the Intellectual Property Protection Problem", ISIE '97, Guimaraes, Portugal, pp. SS77-SS83. |
Also Published As
Publication number | Publication date |
---|---|
JP2000267940A (en) | 2000-09-29 |
CN1267856A (en) | 2000-09-27 |
USRE42106E1 (en) | 2011-02-01 |
CN1783102A (en) | 2006-06-07 |
KR20000060590A (en) | 2000-10-16 |
US7130426B1 (en) | 2006-10-31 |
USRE42171E1 (en) | 2011-02-22 |
USRE41942E1 (en) | 2010-11-16 |
KR100320183B1 (en) | 2002-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE42107E1 (en) | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon | |
US7769174B2 (en) | Digital data file encryption apparatus and method | |
KR100746771B1 (en) | Method for reproducing an audio file in portable audio device | |
KR20000029105A (en) | Production protection system dealing with contents that are digital production | |
EP1701469A1 (en) | Information processing device | |
JP2013109826A (en) | Writing method and computer system | |
US7725945B2 (en) | Discouraging unauthorized redistribution of protected content by cryptographically binding the content to individual authorized recipients | |
US20050089164A1 (en) | System and method for the production and distribution of copy-protected and use-protected electronic audio and visual media and the data contents thereof | |
KR100748867B1 (en) | Recovery of a master key from recorded published material | |
US20030091187A1 (en) | Apparatus and method for reading or writing user data | |
EP1500103A2 (en) | Apparatus and method for rendering user data | |
JP3588593B2 (en) | Copy control method and copy control device | |
JP2000341265A (en) | Method for data recording and readout, recording device, readout device, and writing device | |
KR100513280B1 (en) | System and Method for AV-data copy protection | |
KR20020062025A (en) | Digital audio copy preventing apparatus and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LG ELECTRONICS INC., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHA, GHUN-UP;KANG, MYEONG-JOON;JUNG, HAN;REEL/FRAME:024612/0536 Effective date: 20000425 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.) |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |