WO2005076138A1 - Lecteur de contenus - Google Patents
Lecteur de contenus Download PDFInfo
- Publication number
- WO2005076138A1 WO2005076138A1 PCT/AU2005/000126 AU2005000126W WO2005076138A1 WO 2005076138 A1 WO2005076138 A1 WO 2005076138A1 AU 2005000126 W AU2005000126 W AU 2005000126W WO 2005076138 A1 WO2005076138 A1 WO 2005076138A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- player
- file
- encrypted
- decryption
- Prior art date
Links
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 101000603420 Homo sapiens Nuclear pore complex-interacting protein family member A1 Proteins 0.000 description 1
- 102100038845 Nuclear pore complex-interacting protein family member A1 Human genes 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to a content player, and more specifically to a device that is able to play video or audio files and prohibits copying of the files stored on the device.
- Portable audio players such as the iPodTM produced by Apple Computer, Inc, have become popular with consumers because they allow users to selectively store thousands of audio tracks on the player, which can then be played and listened to in different groups or sequences, referred to as "playlists".
- the players are able to store the audio files in a digital form on disc or memory in a compressed format using a number of known compression schemes, such as AAC, WMV and the most popular, MPEG-1 Audio Layer 3 (or MP3).
- One of the primary features of the current players, and one of the significant problems, is they allow users to freely make copies of content, such as an audio file or a video file, without the user having necessarily obtained permission of the owner of the copyright for the content.
- Software is readily available on the Internet that allows users to extract or "rip" copies of video and audio files from authorised copies published on DVDs, CDs etc. Once a compressed unauthorised copy is made, a number of subsequent copies can also be made and distributed to others using the Internet, and in particular the P2P networks, such as Kazaa and Morpheus. The unauthorised copies can then be placed on the player and reused for the life of the player without the knowledge of the copyright owner or any compensation being passed to the copyright owner.
- a content player including: a storage module for storing at least one encrypted content file; a processor for accessing the encrypted content file when selected; a decryption module for decrypting the encrypted content file; and an output module for receiving the content file decrypted and converting it to an output content signal to drive a content output device.
- the present invention also provides a content player, including: storage means for storing at least one encrypted content file; output means for receiving the content file decrypted and converting it to an output content signal to drive a content output device; and decryption means for decrypting the encrypted content file and transferring it directly to the output means.
- Figure 1 is a block diagram of a preferred embodiment of a content player.
- a content player 100 has an architecture that restricts access to the content files stored on the device 100.
- the player 100 may be portable and capable of being held in a user's hand, ie handheld.
- the player 100 has a system address and data bus 102, a microprocessor 102, a storage unit 104, a display unit 106, and encryption and decryption modules 108, 110, which are all connected to the system bus 102.
- the player 100 also includes an input unit 112 and an output unit 114 which are controlled and driven by the encryption and decryption modules 108 and 110, respectively.
- the electronic hardware of the components 102, 104, 106, 112, 114 is similar to that found in a standard MP3 player, such as the iPodTM produced by Apple Computer, Inc.
- the player 100 is only able to store content files in the storage unit 104 in an encrypted form, and includes the decryption module 110.
- the content files stored in the memory 104 may only be accessed for playing by the device 100.
- the player does not include any capability which enables files stored on the storage unit 104 to be copied to storage media that is external to the player 100. This is distinct from other audio players where software can be obtained to allow copying of content files for subsequent use and play on other devices.
- the storage unit 104 stores files, such as audio and/or video files, in an encrypted form using a strong encryption scheme, such as AES (http://csrc.nist.gov/CryptoToolkit/aes . This ensures that even if the encrypted files are physically removed from the player 100 they cannot be used.
- the files can only be decrypted by the player using a private key or decryption password accessed by the decryption module 110.
- the storage unit 104 may be a hard disk or compact flash memory that normally cannot be removed. Alternatively the unit 104 can be a form of storage which allows the device owner to replace it with another storage unit having a different collection of encrypted content files.
- the player 100 can advantageously be sold with the storage unit 104 having a set of encrypted content files already loaded on the device. The player 100 may also prohibit the storage of files by the device owner or user, and therefore omit the encryption module 108 and the input unit 112.
- the microprocessor 102 is able to access a directory or list identifying the content files for display on the display unit 106, so that a user of the device 100 can select a file for play by the device.
- the directory or list may be uncrypted or encrypted, and in the case of the latter, the microprocessor accesses it via the decryption module 110.
- the content files may be individually encrypted or encrypted in a large partition with any directory information.
- the selected file is accessed by the microprocessor 102 via the decryption module 110 for decryption.
- the decryption module 110 is only able to decrypt the file after accessing the decryption password or private key and executing the decryption algorithm.
- the decryption password or private key is stored in the player 100 or may be entered by the owner of the device using the user interface 106. Alternatively the decryption password may use a biometric code such as the fingerprint of the authorised owner of the player device.
- the private key or the decryption password can be hard coded into circuitry of the player 100 either in an ASIC or firmware of the player 100.
- the type of decryption password or key used will depend on the level of security used by the player, as discussed below.
- the unencrypted version of the accessed file is passed directly by the decryption module 110 to the output unit 114 for conversion into audio and/or video signals for output on the output terminals 116 of the output unit 114.
- the file is transcoded into pulse code modulation (PCM) format and then converted by a digital to analog converter (DAC) of the output unit 114 into an analog audio signal for output on a terminal 116 for headphones or speakers.
- PCM pulse code modulation
- DAC digital to analog converter
- a video file is transcoded from an encoding format like MPEG-4 into a video signal for driving either the display screen of the display unit 106 or an external video display device, such as a LCD monitor connected to the terminals 116.
- the video signal may be analog or digital depending on the video display device to be driven by the signal.
- the player includes an input unit 112 with input terminals 118 and an encryption module 108
- content files can be inputted on the terminals 118 as digital or analog signals for encryption and storage in the storage unit 104 of the device 100.
- the input module can 112 supports file transfer communications protocols, such as Firewire and USB2.
- file transfer communications protocols such as Firewire and USB2.
- the encryption module 108 which applies the encryption algorithm used by the player 100 so as to store the files in an encrypted form in the storage unit 104.
- the encryption process would typically use the public key that corresponds to the private decryption key used by the decryption module 110.
- the decryption key may be a randomly generated private key that is part of a private and public key pair, and then the key used to generate an alphanumeric password that corresponds to the key and allows it to be reproduced when the file needs to be decrypted and the password is entered.
- the decryption password may be typed or entered into the device using the UI unit 106.
- the decryption key of a key pair may be generated using a biometric sensor of the UI 106, in response to the owner of the player placing a finger on the sensor and allowing the fingerprint to be read to generate the key.
- a biometric-based decryption key or password the encrypted content file is bound to a particular person, eg the owner of the player.
- a biometric-based password like a fingerprint, if the storage unit 104 is removed from one player into another player, it is not possible to access the content file without the content file being unlocked by the fingerprint password assigned to the content file.
- the decryption key can also be generated using a unique identifier of the player, ie a serial number or integrated circuit identifier of the player, such that the encyrpted content file is bound to a specific player. In this manner, the content is only playable on a specific player device, and again only by persons who know the decryption password for that content and player combination.
- the decryption key can be generated using a biometric sensor of the user interface module 106, in response to reading a fingerprint, and also on the basis of a unique identification number of the player.
- the encrypted content file is then bound to both a specific player and a specific person, ie user of the player. A content file is then not playable by another person using the player or the person using a different player.
- the player 100 is particularly advantageous, as it allows content publishers to distribute content files in a form whereby they can only be played on the device without additional copies of the files being made. Only the output video or audio signals can be copied with external recording equipment, such as a microphone and tape recorder or camera and video recorder, causing a significant reduction in the quality of the audio and video, and not the files themselves.
- the player 100 also advantageously allows content to be distributed with the player, and removable storage units 104 with encrypted files to be subsequently purchased. Also the player can be configured to allow subsequent content to be purchased, downloaded into the player and stored in an encrypted form allowing only the authorised purchaser to play the content using the decryption password or key that has been coded against the purchased content and which may also be bound to the purchaser and/or the player.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US54107204P | 2004-02-03 | 2004-02-03 | |
AU2004900480A AU2004900480A0 (en) | 2004-02-03 | A content player | |
AU2004900480 | 2004-02-03 | ||
US60/541,072 | 2004-02-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005076138A1 true WO2005076138A1 (fr) | 2005-08-18 |
Family
ID=34839204
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2005/000126 WO2005076138A1 (fr) | 2004-02-03 | 2005-02-03 | Lecteur de contenus |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2005076138A1 (fr) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1039462A2 (fr) * | 1999-03-15 | 2000-09-27 | Sony Corporation | Méthode de traitement et appareil pour le transfert de données cryptées |
WO2001093000A2 (fr) * | 2000-05-31 | 2001-12-06 | Zoran Corporation | Transactions electroniques securisees via internet et utilisation de musique et autres donnees importantes |
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
WO2002047081A2 (fr) * | 2000-12-07 | 2002-06-13 | Sandisk Corporation | Systeme, procede et dispositif permettant de reproduire du contenu audio, video ou d'un autre type enregistre sur des cartes memoires non volatiles, des disques compacts ou d'autres supports |
US20020107595A1 (en) * | 2000-12-05 | 2002-08-08 | Miki Abe | Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium |
US6577735B1 (en) * | 1999-02-12 | 2003-06-10 | Hewlett-Packard Development Company, L.P. | System and method for backing-up data stored on a portable audio player |
GB2386245A (en) * | 2002-03-08 | 2003-09-10 | First 4 Internet Ltd | Copy protection system |
US6732275B1 (en) * | 1999-03-23 | 2004-05-04 | Samsung Electronics Co., Ltd. | Securing encrypted files in a PC and PC peripheral environment |
-
2005
- 2005-02-03 WO PCT/AU2005/000126 patent/WO2005076138A1/fr active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6577735B1 (en) * | 1999-02-12 | 2003-06-10 | Hewlett-Packard Development Company, L.P. | System and method for backing-up data stored on a portable audio player |
EP1039462A2 (fr) * | 1999-03-15 | 2000-09-27 | Sony Corporation | Méthode de traitement et appareil pour le transfert de données cryptées |
US6732275B1 (en) * | 1999-03-23 | 2004-05-04 | Samsung Electronics Co., Ltd. | Securing encrypted files in a PC and PC peripheral environment |
WO2001093000A2 (fr) * | 2000-05-31 | 2001-12-06 | Zoran Corporation | Transactions electroniques securisees via internet et utilisation de musique et autres donnees importantes |
US20020107595A1 (en) * | 2000-12-05 | 2002-08-08 | Miki Abe | Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium |
WO2002047081A2 (fr) * | 2000-12-07 | 2002-06-13 | Sandisk Corporation | Systeme, procede et dispositif permettant de reproduire du contenu audio, video ou d'un autre type enregistre sur des cartes memoires non volatiles, des disques compacts ou d'autres supports |
GB2386245A (en) * | 2002-03-08 | 2003-09-10 | First 4 Internet Ltd | Copy protection system |
Non-Patent Citations (1)
Title |
---|
JENSEN C.: "CryptoCache: a secure sharable file for roaming users.", 2000, ACM SIGOPS * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8393005B2 (en) | Recording medium, and device and method for recording information on recording medium | |
US9009497B1 (en) | Secure methods for generating content and operating a drive based on identification of a system on chip | |
JP4219680B2 (ja) | 不揮発性メモリカード、コンパクトディスクまたはその他のメディアから記録済みのオーディオ、ビデオまたはその他のコンテンツを再生するためのシステム、方法およびデバイス | |
RU2290767C2 (ru) | Приемное устройство для защищенного сохранения единицы контента и устройство воспроизведения | |
US8544108B2 (en) | Copyright protection storage medium, information recording apparatus and information recording method, and information playback apparatus and information playback method | |
KR20000060590A (ko) | 디지탈데이터 플레이어의 파일 암호화 장치 | |
KR20060106654A (ko) | 콘텐츠 정보제공시스템, 콘텐츠 정보제공서버, 콘텐츠재생장치, 콘텐츠 정보제공방법, 콘텐츠 재생방법 및컴퓨터 프로그램 | |
JP2005529422A5 (fr) | ||
WO2006011527A1 (fr) | Dispositif d’enregistrement, dispositif de traitement de cle de contenu, support d’enregistrement et procede d’enregistrement | |
US6732275B1 (en) | Securing encrypted files in a PC and PC peripheral environment | |
KR20060127026A (ko) | 하나의 디바이스로부터 또 다른 디바이스로의 안전한 정보포팅 | |
WO2007013092A1 (fr) | Système électromécanique empêchant la duplication de fichiers vidéo | |
WO2004093073A1 (fr) | Procede et dispositif de stockage/reproduction de donnees numeriques | |
JP2003195758A (ja) | データ処理装置、インタフェースボードおよびデータ秘匿方法 | |
US6983281B1 (en) | Terminal apparatus | |
KR100320181B1 (ko) | 디지탈 데이터 파일 암호화 방법 | |
WO2005076138A1 (fr) | Lecteur de contenus | |
JP4950907B2 (ja) | コンテンツ再生装置及びコンテンツ配信方法 | |
JP2007287268A (ja) | 記録装置 | |
KR100320182B1 (ko) | 디지탈 데이터 파일 암호화 방법 | |
JP2004265470A (ja) | 再生装置及び再生プログラム | |
JP4684123B2 (ja) | ライセンス生成装置、ライセンス記録装置、及びコンテンツ利用装置 | |
EP1585127A2 (fr) | Système, procédé, et dispositif de lecture audio, vidéo ou d'autres contenus enregistrés à partir de cartes de mémoire non-volatile, de disques compacts ou d'autres supports | |
JP2008250875A (ja) | データ管理方法及び装置 | |
JP2003217228A (ja) | 記録再生システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |