WO2005076138A1 - Lecteur de contenus - Google Patents

Lecteur de contenus Download PDF

Info

Publication number
WO2005076138A1
WO2005076138A1 PCT/AU2005/000126 AU2005000126W WO2005076138A1 WO 2005076138 A1 WO2005076138 A1 WO 2005076138A1 AU 2005000126 W AU2005000126 W AU 2005000126W WO 2005076138 A1 WO2005076138 A1 WO 2005076138A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
player
file
encrypted
decryption
Prior art date
Application number
PCT/AU2005/000126
Other languages
English (en)
Inventor
Sydney Gordon Low
Original Assignee
Sydney Gordon Low
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2004900480A external-priority patent/AU2004900480A0/en
Application filed by Sydney Gordon Low filed Critical Sydney Gordon Low
Publication of WO2005076138A1 publication Critical patent/WO2005076138A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the present invention relates to a content player, and more specifically to a device that is able to play video or audio files and prohibits copying of the files stored on the device.
  • Portable audio players such as the iPodTM produced by Apple Computer, Inc, have become popular with consumers because they allow users to selectively store thousands of audio tracks on the player, which can then be played and listened to in different groups or sequences, referred to as "playlists".
  • the players are able to store the audio files in a digital form on disc or memory in a compressed format using a number of known compression schemes, such as AAC, WMV and the most popular, MPEG-1 Audio Layer 3 (or MP3).
  • One of the primary features of the current players, and one of the significant problems, is they allow users to freely make copies of content, such as an audio file or a video file, without the user having necessarily obtained permission of the owner of the copyright for the content.
  • Software is readily available on the Internet that allows users to extract or "rip" copies of video and audio files from authorised copies published on DVDs, CDs etc. Once a compressed unauthorised copy is made, a number of subsequent copies can also be made and distributed to others using the Internet, and in particular the P2P networks, such as Kazaa and Morpheus. The unauthorised copies can then be placed on the player and reused for the life of the player without the knowledge of the copyright owner or any compensation being passed to the copyright owner.
  • a content player including: a storage module for storing at least one encrypted content file; a processor for accessing the encrypted content file when selected; a decryption module for decrypting the encrypted content file; and an output module for receiving the content file decrypted and converting it to an output content signal to drive a content output device.
  • the present invention also provides a content player, including: storage means for storing at least one encrypted content file; output means for receiving the content file decrypted and converting it to an output content signal to drive a content output device; and decryption means for decrypting the encrypted content file and transferring it directly to the output means.
  • Figure 1 is a block diagram of a preferred embodiment of a content player.
  • a content player 100 has an architecture that restricts access to the content files stored on the device 100.
  • the player 100 may be portable and capable of being held in a user's hand, ie handheld.
  • the player 100 has a system address and data bus 102, a microprocessor 102, a storage unit 104, a display unit 106, and encryption and decryption modules 108, 110, which are all connected to the system bus 102.
  • the player 100 also includes an input unit 112 and an output unit 114 which are controlled and driven by the encryption and decryption modules 108 and 110, respectively.
  • the electronic hardware of the components 102, 104, 106, 112, 114 is similar to that found in a standard MP3 player, such as the iPodTM produced by Apple Computer, Inc.
  • the player 100 is only able to store content files in the storage unit 104 in an encrypted form, and includes the decryption module 110.
  • the content files stored in the memory 104 may only be accessed for playing by the device 100.
  • the player does not include any capability which enables files stored on the storage unit 104 to be copied to storage media that is external to the player 100. This is distinct from other audio players where software can be obtained to allow copying of content files for subsequent use and play on other devices.
  • the storage unit 104 stores files, such as audio and/or video files, in an encrypted form using a strong encryption scheme, such as AES (http://csrc.nist.gov/CryptoToolkit/aes . This ensures that even if the encrypted files are physically removed from the player 100 they cannot be used.
  • the files can only be decrypted by the player using a private key or decryption password accessed by the decryption module 110.
  • the storage unit 104 may be a hard disk or compact flash memory that normally cannot be removed. Alternatively the unit 104 can be a form of storage which allows the device owner to replace it with another storage unit having a different collection of encrypted content files.
  • the player 100 can advantageously be sold with the storage unit 104 having a set of encrypted content files already loaded on the device. The player 100 may also prohibit the storage of files by the device owner or user, and therefore omit the encryption module 108 and the input unit 112.
  • the microprocessor 102 is able to access a directory or list identifying the content files for display on the display unit 106, so that a user of the device 100 can select a file for play by the device.
  • the directory or list may be uncrypted or encrypted, and in the case of the latter, the microprocessor accesses it via the decryption module 110.
  • the content files may be individually encrypted or encrypted in a large partition with any directory information.
  • the selected file is accessed by the microprocessor 102 via the decryption module 110 for decryption.
  • the decryption module 110 is only able to decrypt the file after accessing the decryption password or private key and executing the decryption algorithm.
  • the decryption password or private key is stored in the player 100 or may be entered by the owner of the device using the user interface 106. Alternatively the decryption password may use a biometric code such as the fingerprint of the authorised owner of the player device.
  • the private key or the decryption password can be hard coded into circuitry of the player 100 either in an ASIC or firmware of the player 100.
  • the type of decryption password or key used will depend on the level of security used by the player, as discussed below.
  • the unencrypted version of the accessed file is passed directly by the decryption module 110 to the output unit 114 for conversion into audio and/or video signals for output on the output terminals 116 of the output unit 114.
  • the file is transcoded into pulse code modulation (PCM) format and then converted by a digital to analog converter (DAC) of the output unit 114 into an analog audio signal for output on a terminal 116 for headphones or speakers.
  • PCM pulse code modulation
  • DAC digital to analog converter
  • a video file is transcoded from an encoding format like MPEG-4 into a video signal for driving either the display screen of the display unit 106 or an external video display device, such as a LCD monitor connected to the terminals 116.
  • the video signal may be analog or digital depending on the video display device to be driven by the signal.
  • the player includes an input unit 112 with input terminals 118 and an encryption module 108
  • content files can be inputted on the terminals 118 as digital or analog signals for encryption and storage in the storage unit 104 of the device 100.
  • the input module can 112 supports file transfer communications protocols, such as Firewire and USB2.
  • file transfer communications protocols such as Firewire and USB2.
  • the encryption module 108 which applies the encryption algorithm used by the player 100 so as to store the files in an encrypted form in the storage unit 104.
  • the encryption process would typically use the public key that corresponds to the private decryption key used by the decryption module 110.
  • the decryption key may be a randomly generated private key that is part of a private and public key pair, and then the key used to generate an alphanumeric password that corresponds to the key and allows it to be reproduced when the file needs to be decrypted and the password is entered.
  • the decryption password may be typed or entered into the device using the UI unit 106.
  • the decryption key of a key pair may be generated using a biometric sensor of the UI 106, in response to the owner of the player placing a finger on the sensor and allowing the fingerprint to be read to generate the key.
  • a biometric-based decryption key or password the encrypted content file is bound to a particular person, eg the owner of the player.
  • a biometric-based password like a fingerprint, if the storage unit 104 is removed from one player into another player, it is not possible to access the content file without the content file being unlocked by the fingerprint password assigned to the content file.
  • the decryption key can also be generated using a unique identifier of the player, ie a serial number or integrated circuit identifier of the player, such that the encyrpted content file is bound to a specific player. In this manner, the content is only playable on a specific player device, and again only by persons who know the decryption password for that content and player combination.
  • the decryption key can be generated using a biometric sensor of the user interface module 106, in response to reading a fingerprint, and also on the basis of a unique identification number of the player.
  • the encrypted content file is then bound to both a specific player and a specific person, ie user of the player. A content file is then not playable by another person using the player or the person using a different player.
  • the player 100 is particularly advantageous, as it allows content publishers to distribute content files in a form whereby they can only be played on the device without additional copies of the files being made. Only the output video or audio signals can be copied with external recording equipment, such as a microphone and tape recorder or camera and video recorder, causing a significant reduction in the quality of the audio and video, and not the files themselves.
  • the player 100 also advantageously allows content to be distributed with the player, and removable storage units 104 with encrypted files to be subsequently purchased. Also the player can be configured to allow subsequent content to be purchased, downloaded into the player and stored in an encrypted form allowing only the authorised purchaser to play the content using the decryption password or key that has been coded against the purchased content and which may also be bound to the purchaser and/or the player.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un lecteur de contenus qui comprend un module de stockage (104) qui garde en mémoire au moins un fichier de contenus chiffrés, tel qu'un fichier MP3 ou MPEG-4, un processeur (102) qui accède au fichier de contenus chiffrés lorsqu'il est sélectionné, un module de déchiffrement (110) qui déchiffre le fichier de contenus chiffrés et un module de sortie (114) qui reçoit le fichier de contenus déchiffrés et le convertit en un signal de contenu de sortie pour commander un dispositif de sortie de contenu, tel que des haut-parleurs audio ou qu'un écran d'affichage vidéo. Le module de sortie (114) reçoit le fichier de contenus déchiffrés directement du module de déchiffrement (110) et le lecteur de contenus est incapable de stocker de façon persistante le fichier de contenus déchiffrés.
PCT/AU2005/000126 2004-02-03 2005-02-03 Lecteur de contenus WO2005076138A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US54107204P 2004-02-03 2004-02-03
AU2004900480A AU2004900480A0 (en) 2004-02-03 A content player
AU2004900480 2004-02-03
US60/541,072 2004-02-03

Publications (1)

Publication Number Publication Date
WO2005076138A1 true WO2005076138A1 (fr) 2005-08-18

Family

ID=34839204

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2005/000126 WO2005076138A1 (fr) 2004-02-03 2005-02-03 Lecteur de contenus

Country Status (1)

Country Link
WO (1) WO2005076138A1 (fr)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1039462A2 (fr) * 1999-03-15 2000-09-27 Sony Corporation Méthode de traitement et appareil pour le transfert de données cryptées
WO2001093000A2 (fr) * 2000-05-31 2001-12-06 Zoran Corporation Transactions electroniques securisees via internet et utilisation de musique et autres donnees importantes
US6385596B1 (en) * 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
WO2002047081A2 (fr) * 2000-12-07 2002-06-13 Sandisk Corporation Systeme, procede et dispositif permettant de reproduire du contenu audio, video ou d'un autre type enregistre sur des cartes memoires non volatiles, des disques compacts ou d'autres supports
US20020107595A1 (en) * 2000-12-05 2002-08-08 Miki Abe Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium
US6577735B1 (en) * 1999-02-12 2003-06-10 Hewlett-Packard Development Company, L.P. System and method for backing-up data stored on a portable audio player
GB2386245A (en) * 2002-03-08 2003-09-10 First 4 Internet Ltd Copy protection system
US6732275B1 (en) * 1999-03-23 2004-05-04 Samsung Electronics Co., Ltd. Securing encrypted files in a PC and PC peripheral environment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6385596B1 (en) * 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US6577735B1 (en) * 1999-02-12 2003-06-10 Hewlett-Packard Development Company, L.P. System and method for backing-up data stored on a portable audio player
EP1039462A2 (fr) * 1999-03-15 2000-09-27 Sony Corporation Méthode de traitement et appareil pour le transfert de données cryptées
US6732275B1 (en) * 1999-03-23 2004-05-04 Samsung Electronics Co., Ltd. Securing encrypted files in a PC and PC peripheral environment
WO2001093000A2 (fr) * 2000-05-31 2001-12-06 Zoran Corporation Transactions electroniques securisees via internet et utilisation de musique et autres donnees importantes
US20020107595A1 (en) * 2000-12-05 2002-08-08 Miki Abe Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium
WO2002047081A2 (fr) * 2000-12-07 2002-06-13 Sandisk Corporation Systeme, procede et dispositif permettant de reproduire du contenu audio, video ou d'un autre type enregistre sur des cartes memoires non volatiles, des disques compacts ou d'autres supports
GB2386245A (en) * 2002-03-08 2003-09-10 First 4 Internet Ltd Copy protection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JENSEN C.: "CryptoCache: a secure sharable file for roaming users.", 2000, ACM SIGOPS *

Similar Documents

Publication Publication Date Title
US8393005B2 (en) Recording medium, and device and method for recording information on recording medium
US9009497B1 (en) Secure methods for generating content and operating a drive based on identification of a system on chip
JP4219680B2 (ja) 不揮発性メモリカード、コンパクトディスクまたはその他のメディアから記録済みのオーディオ、ビデオまたはその他のコンテンツを再生するためのシステム、方法およびデバイス
RU2290767C2 (ru) Приемное устройство для защищенного сохранения единицы контента и устройство воспроизведения
US8544108B2 (en) Copyright protection storage medium, information recording apparatus and information recording method, and information playback apparatus and information playback method
KR20000060590A (ko) 디지탈데이터 플레이어의 파일 암호화 장치
KR20060106654A (ko) 콘텐츠 정보제공시스템, 콘텐츠 정보제공서버, 콘텐츠재생장치, 콘텐츠 정보제공방법, 콘텐츠 재생방법 및컴퓨터 프로그램
JP2005529422A5 (fr)
WO2006011527A1 (fr) Dispositif d’enregistrement, dispositif de traitement de cle de contenu, support d’enregistrement et procede d’enregistrement
US6732275B1 (en) Securing encrypted files in a PC and PC peripheral environment
KR20060127026A (ko) 하나의 디바이스로부터 또 다른 디바이스로의 안전한 정보포팅
WO2007013092A1 (fr) Système électromécanique empêchant la duplication de fichiers vidéo
WO2004093073A1 (fr) Procede et dispositif de stockage/reproduction de donnees numeriques
JP2003195758A (ja) データ処理装置、インタフェースボードおよびデータ秘匿方法
US6983281B1 (en) Terminal apparatus
KR100320181B1 (ko) 디지탈 데이터 파일 암호화 방법
WO2005076138A1 (fr) Lecteur de contenus
JP4950907B2 (ja) コンテンツ再生装置及びコンテンツ配信方法
JP2007287268A (ja) 記録装置
KR100320182B1 (ko) 디지탈 데이터 파일 암호화 방법
JP2004265470A (ja) 再生装置及び再生プログラム
JP4684123B2 (ja) ライセンス生成装置、ライセンス記録装置、及びコンテンツ利用装置
EP1585127A2 (fr) Système, procédé, et dispositif de lecture audio, vidéo ou d'autres contenus enregistrés à partir de cartes de mémoire non-volatile, de disques compacts ou d'autres supports
JP2008250875A (ja) データ管理方法及び装置
JP2003217228A (ja) 記録再生システム

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase