WO2005106870A1 - Access authorization across processing devices - Google Patents
Access authorization across processing devices Download PDFInfo
- Publication number
- WO2005106870A1 WO2005106870A1 PCT/IB2005/051423 IB2005051423W WO2005106870A1 WO 2005106870 A1 WO2005106870 A1 WO 2005106870A1 IB 2005051423 W IB2005051423 W IB 2005051423W WO 2005106870 A1 WO2005106870 A1 WO 2005106870A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication information
- content material
- rendering
- transaction identifier
- identifier
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
Definitions
- This invention relates to the field of video processing, and in particular to the control of a display device to prevent unauthorized viewing of protected content material.
- a variety of techniques have been developed to prevent the unauthorized rendering of playback-protected content material.
- the device terminates the rendering of the protected content material.
- Some of the techniques used to identify the material as being playback-protected provide identifying information in the format used to encode the video information, such as alteration of MPEG-encoded bit streams.
- Other techniques provide identifying information in the ancillary information provided with the material, such as in the "header" information on a DVD recording.
- a conforming display device continually monitors the image information, and if protection information is detected without corresponding authorization information, the display device terminates the display of the image.
- the prevention of an unauthorized display of protected content material via watermarks requires an ability to distinguish between authorized and unauthorized content material. That is, the enforcing system must be able to verify that the watermark corresponds to an authorization to render the protected content material; if not, the material is not rendered.
- the security of a protection scheme is vulnerable if the device that determines the authorization is a different device than the one that determines the watermark and/or the device that verifies the authorization of the watermark.
- the security scheme can be compromised at the interface between the transformation device and the rendering device by making a copy of the authenticating information that is communicated to the rendering device during an authorized rendering, and using this copy to provide bogus authorization for unauthorized renderings . It is an object of this invention to provide a security system and protocol that is suitable for authentication of watermarks between devices. It is a further object of this invention to provide a security protocol that facilitates the authentication of security items that are encoded at different transformation levels of the protected material.
- each communication includes an item that the receiving device can verify as having been recently generated.
- FIG. 1 illustrates an example block diagram of a rendering system in accordance with this invention.
- FIG. 2 illustrates an example flow diagram of a security protocol in accordance with this invention.
- the same reference numeral refers to the same element, or an element that performs substantially the same function.
- the drawings are included for illustrative purposes and are not intended to limit the scope of the invention.
- This invention is presented in the context of a video processing system wherein authentication information is determined at one device and verification of authorization to render protected content material based on this authentication information is performed at another device.
- US patent application 09/536,944 "PROTECTING CONTENT MATERIAL FROM ILLICIT REPRODUCTION BY PROOF OF EXISTANCE OF A COMPLETE DATA SET VIA SELF-REFERENCE SECTIONS", filed 28 March 2000 for Michael A. Epstein and Antonius Starring, Attorney Docket US000040, incorporated by reference herein, presents the use of a self-referential watermark to protect content material.
- a self-referential watermark is authenticated based on the information referenced by the watermark.
- the watermark of a segment of protected material may contain a hash value of a combination of bytes in the segment, or in another segment of the protected material.
- a receiving device computes the hash of the combination of bytes in each received segment, and if the computed hash value matches the corresponding watermark, then the material is verified as being an unaltered copy of the original material.
- the hash of the received data is computed when the received content material is in digital form.
- the preferred location for enforcement of the watermark protection is at the rendering device that is providing a visual display of the information from its final analog or digital form. Assuming that the device that receives the digital information and computes the authentication information is distinct from the display device that preferably enforces the watermark protection, the receiving device must communicate the authentication information to the display device for the verification process.
- FIG. 1 illustrates an example rendering system in accordance with this invention.
- a processing device 100 receives the protected content material in a first form 105, and transforms the material into a second form 115 that is suitable for display, via a processing module 110.
- a display device 200 receives the transformed information 115 and provides a visual image on a display screen 290, via a rendering module 210.
- the processing device 100 may be a DVD player that reads digital information 105 from formatted segments of a DVD and transforms this information into a "video" format 115, such as S-video, NTSC, and so on.
- a "video" format 115 such as S-video, NTSC, and so on.
- processing device and display are used merely to identify two devices that are used to sequentially process content material during a typical rendering of the content material.
- the processing device 100 includes an authentication module 120 that is configured to derive authentication information 125 that facilitates verification that the received material 105 is authorized.
- the authentication module 120 is configured to determine the hash value of each received segment, on the assumption that authorized material will contain watermarks that correspond to these hash values, as discussed above.
- Other means of determining authentication information 125 that facilitates the verification of a watermark are common in the art.
- the watermark is determinable from the information 115.
- the processing device 100 is configured to determine the watermark from the information 115 and ceases transmission of the information 115 to the display device if the protected material is not verified as being authorized, based on the determined authentication information.
- such a protection scheme does not prevent the unauthorized viewing of protected material that is provided to the display device 200 without this verification test.
- the display device 200 enforces the copy protection whenever watermarked material 115 is provided for display, via a verification module 220. In this manner, the protection can be provided for as long as the watermark remains with the material 115, or copies of the material 115.
- the verification module For the display device 200 to enforce the protection provided by the watermark, the verification module must be provided the authentication material 125 to determine whether the watermarked material is authorized. In the example self-referential embodiment, the verification module needs the hash values of the received segments to compare with the watermarks.
- a variety of schemes are available for effecting a secure communication of the authentication information 125 from the processing device 100 to the display device 200. However, because the information 125 must be communicated between the devices, it is susceptible to interception.
- this copied authentication information could be used to allow subsequent unauthorized renderings of the material 115, or copies of the material 105 or 115.
- the example self-referential protection scheme of aforementioned US patent application 09/536,944 is intended to reduce the potential for widespread distribution of protected material by encoding it in a form that is inefficient for communications over the Internet. If the material 105 is converted to a compressed form that is suitable for efficient Internet distribution, a hash of the compressed segments, or reconstituted uncompressed segments, will not match the watermark, due to the data loss inherent in the common compression formats.
- the display device 200 and processing device 100 are configured to assure that the information transmitted 145 to the display 200 is generated contemporaneously with each display of the material 115.
- the display device 200 and processing device 100 are configured to assure that the information transmitted 145 to the display 200 is generated contemporaneously with each display of the material 115.
- the display device 200 includes a transaction identification generator 250 that is configured to generate a transaction identifier 255 for each submission of material 115 to the display device 200.
- This transaction identifier 255 is communicated to the provider 100 of the authentication information 125.
- the identifier 255 is bound to each transmission of authentication information 125.
- the binding is achieved by combining 130 the identifier 255 to the authentication information 125 prior to encryption by an encrypter 140, using a private key 151 of a public-private key pair 150 associated with the processing device 100.
- the encrypted composite 145 is transmitted to the display device, and decoded by a decoder 240.
- the decrypted composite 245 is provided to a verification module 220 that is configured to verify that each received composite 245 contains the transaction identifier 255. By verifying that the transaction identifier 255 is contained within each composite 245, it is assured that the encrypted material 145 was created after receipt of the current transaction identifier 255.
- the verification module 220 is also configured to verify that the authentication information in the composite 245 corresponds to an authorization of the material 115, based on the watermark contained within the material 115, using techniques common in the art. For example, in the aforementioned self-referential watermarking system, wherein the authentication information includes the hash values of segments of the material 105, the verification module 220 is configured to compare the watermark within the material 115 to the corresponding received hash value.
- FIG. 2 illustrates a flow diagram of a security protocol for assuring a cotemporaneous communication of authentication information from a processing device 100 to a display device 200.
- the processing device 100 communicates its public key 155 to the display device 200. This serves to alert the display device 200 to the start of a new transaction.
- the display device 200 may be configured to request the public key 155 whenever a watermark is first detected in material 115.
- the display device 200 receives the public key 155 and generates a transaction identifier 255 that is transmitted to the processing device 100.
- the transaction identifier 255 is fairly unique, such as a random number that is generated with each new transaction, a sequence number that is incremented with each transaction, a time- of-day stamp, and so on.
- the display device 200 may also be configured to verify that the public key 155 is associated with a conforming processing device 100, to further thwart unauthorized transactions.
- the processing device 100 receives the identifier 255.
- This identifier 255 is subsequently bound to each transmission of authentication information from this processing device, thereby verifying that each transmission is generated contemporaneously with the time that the display device 200 created this transaction identifier 255.
- the processing device 100 binds the identifier 255 with the authentication information 125 by encrypting a combination of both the identifier 255 and the authentication information 125 to form the encrypted information 145 that is communicated to the display device, at 340.
- the display device 200 uses the public key 155 to decrypt the encrypted combination of the identifier 255, and the authentication information 125. If, at 360, the received decrypted identifier ID' matches the transmitted session identifier ID 255, the display device 200 is assured that it is receiving cotemporaneous communications from the processing device 100, and the process continues; otherwise, the process is terminated, at 395.
- the watermark WM is extracted from the protected material.
- the decrypted information Info' is used to determine whether the watermarked material is authorized.
- the decrypted authentication information Info' is the hash value of the received segments; if the watermark WM matches the hash value of the received segments, the material is deemed authorized, and rendering continues, at 390. Otherwise, the process terminates, at 395.
- the processes 340-390 continue until this transaction is terminated, typically after the entirety of the received material is rendered. Because each transmission from the receiver 100 includes the transaction identifier 255 bound to the authentication information, the contemporaneous generation of the encrypted information 145 that is transmitted to the display device 200 is assured.
- identifier 255 is preferably bound to each transmission from the processing device, processing and transmission time may be reduced by binding the identifier 255 to fewer than the entirety of transmissions from the processing device 100.
- the particular method used to bind the identifier 255 to the transmissions may differ than illustrated in the example figures.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Editing Of Facsimile Originals (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
- Television Signal Processing For Recording (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Image Processing (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05738328A EP1745477A1 (en) | 2004-05-04 | 2005-05-02 | Access authorization across processing devices |
JP2007512635A JP4734324B2 (en) | 2004-05-04 | 2005-05-02 | Access authorization across multiple devices |
US11/568,484 US8132264B2 (en) | 2004-05-04 | 2005-05-02 | Access authorization across processing devices |
KR1020067023159A KR101177754B1 (en) | 2004-05-04 | 2005-05-02 | Access authorization across processing devices |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US56797704P | 2004-05-04 | 2004-05-04 | |
US60/567,977 | 2004-05-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005106870A1 true WO2005106870A1 (en) | 2005-11-10 |
Family
ID=34967089
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2005/051423 WO2005106870A1 (en) | 2004-05-04 | 2005-05-02 | Access authorization across processing devices |
Country Status (6)
Country | Link |
---|---|
US (1) | US8132264B2 (en) |
EP (1) | EP1745477A1 (en) |
JP (1) | JP4734324B2 (en) |
KR (1) | KR101177754B1 (en) |
CN (1) | CN1950902A (en) |
WO (1) | WO2005106870A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7587603B2 (en) | 2000-02-07 | 2009-09-08 | Koninklijke Philips Electronics N.V. | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009005255A1 (en) * | 2009-01-14 | 2010-07-15 | Khs Ag | Method for verifying a tag circuit |
US9571275B1 (en) | 2012-08-14 | 2017-02-14 | Google Inc. | Single use identifier values for network accessible devices |
EP2747445A1 (en) * | 2012-12-21 | 2014-06-25 | Nagravision S.A. | Method to enforce watermarking instructions in a receiving device |
US9288118B1 (en) | 2013-02-05 | 2016-03-15 | Google Inc. | Setting cookies across applications |
AU2014342209B2 (en) * | 2013-10-30 | 2020-09-24 | Gilbarco Inc. | Cryptographic watermarking of content in fuel dispensing environments |
US9858960B2 (en) | 2014-02-24 | 2018-01-02 | Lg Electronics Inc. | Method and apparatus for converting and reproducing contents in storage medium |
CN105260263B (en) * | 2015-09-16 | 2019-01-11 | 深圳怡化电脑股份有限公司 | A kind of the dynamic antidote and system of money-checking magnetic data |
GB201721021D0 (en) * | 2017-12-15 | 2018-01-31 | Nchain Holdings Ltd | Computer-implemented methods and systems |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5923754A (en) * | 1997-05-02 | 1999-07-13 | Compaq Computer Corporation | Copy protection for recorded media |
EP1045585A1 (en) * | 1999-04-13 | 2000-10-18 | CANAL+ Société Anonyme | Method of and apparatus for providing secure communication of digital data between devices |
WO2001059705A2 (en) * | 2000-02-07 | 2001-08-16 | Koninklijke Philips Electronics N.V. | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections |
WO2003034428A2 (en) * | 2001-10-17 | 2003-04-24 | Koninklijke Philips Electronics N.V. | Secure single drive copy method and apparatus |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7224819B2 (en) * | 1995-05-08 | 2007-05-29 | Digimarc Corporation | Integrating digital watermarks in multimedia content |
JP3260270B2 (en) * | 1996-01-12 | 2002-02-25 | キヤノン株式会社 | Video input device and video input system |
JP3540543B2 (en) * | 1996-05-20 | 2004-07-07 | 富士通株式会社 | Software copy processing apparatus, software copy processing method, and computer-readable recording medium recording program for copying software |
JP3272283B2 (en) * | 1997-11-14 | 2002-04-08 | 富士通株式会社 | Electronic data storage device |
US7162642B2 (en) * | 1999-01-06 | 2007-01-09 | Digital Video Express, L.P. | Digital content distribution system and method |
US20020012432A1 (en) * | 1999-03-27 | 2002-01-31 | Microsoft Corporation | Secure video card in computing device having digital rights management (DRM) system |
US7216232B1 (en) * | 1999-04-20 | 2007-05-08 | Nec Corporation | Method and device for inserting and authenticating a digital signature in digital data |
JP2001078013A (en) * | 1999-09-03 | 2001-03-23 | Fuji Photo Film Co Ltd | Electronic watermark compositing device and image alteration deciding device |
GB9922665D0 (en) * | 1999-09-25 | 1999-11-24 | Hewlett Packard Co | A method of enforcing trusted functionality in a full function platform |
DE60239718D1 (en) * | 2001-02-09 | 2011-05-26 | Canon Kk | Information processing apparatus and its control method, computer program, and storage medium |
JP3854804B2 (en) | 2001-02-09 | 2006-12-06 | キヤノン株式会社 | Information processing apparatus, control method therefor, computer program, and storage medium |
US6996717B2 (en) * | 2001-05-24 | 2006-02-07 | Matsushita Electric Industrial Co., Ltd. | Semi-fragile watermarking system for MPEG video authentication |
JP2003066839A (en) * | 2001-08-28 | 2003-03-05 | Dainippon Printing Co Ltd | Electronic watermark verification system and server |
GB2382177B (en) * | 2001-11-20 | 2005-09-14 | Hewlett Packard Co | Digital certificate verification |
-
2005
- 2005-05-02 KR KR1020067023159A patent/KR101177754B1/en not_active IP Right Cessation
- 2005-05-02 WO PCT/IB2005/051423 patent/WO2005106870A1/en not_active Application Discontinuation
- 2005-05-02 EP EP05738328A patent/EP1745477A1/en not_active Withdrawn
- 2005-05-02 JP JP2007512635A patent/JP4734324B2/en not_active Expired - Fee Related
- 2005-05-02 CN CNA2005800142980A patent/CN1950902A/en active Pending
- 2005-05-02 US US11/568,484 patent/US8132264B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5923754A (en) * | 1997-05-02 | 1999-07-13 | Compaq Computer Corporation | Copy protection for recorded media |
EP1045585A1 (en) * | 1999-04-13 | 2000-10-18 | CANAL+ Société Anonyme | Method of and apparatus for providing secure communication of digital data between devices |
WO2001059705A2 (en) * | 2000-02-07 | 2001-08-16 | Koninklijke Philips Electronics N.V. | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections |
WO2003034428A2 (en) * | 2001-10-17 | 2003-04-24 | Koninklijke Philips Electronics N.V. | Secure single drive copy method and apparatus |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7587603B2 (en) | 2000-02-07 | 2009-09-08 | Koninklijke Philips Electronics N.V. | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections |
Also Published As
Publication number | Publication date |
---|---|
US8132264B2 (en) | 2012-03-06 |
CN1950902A (en) | 2007-04-18 |
JP2008500671A (en) | 2008-01-10 |
KR101177754B1 (en) | 2012-08-29 |
EP1745477A1 (en) | 2007-01-24 |
KR20070006893A (en) | 2007-01-11 |
JP4734324B2 (en) | 2011-07-27 |
US20080134345A1 (en) | 2008-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7760904B2 (en) | Proprietary watermark system for secure digital media and content distribution | |
US8132264B2 (en) | Access authorization across processing devices | |
US6978370B1 (en) | Method and system for copy-prevention of digital copyright works | |
JP3779837B2 (en) | Computer and program recording medium | |
US6668246B1 (en) | Multimedia data delivery and playback system with multi-level content and privacy protection | |
KR100891222B1 (en) | Secure video system for display adaptor | |
US8363258B2 (en) | Content transmission device, content transmission method, and computer program used therewith | |
KR100493290B1 (en) | Copy protection method for digital media | |
US20030159043A1 (en) | Method and apparatus for use of a watermark and a receiver dependent reference for the purpose of copy pretection | |
JP3793009B2 (en) | Content playback device | |
KR20160002844A (en) | Method to watermark a compressed content encrypted by at least one content key | |
Katzenbeisser | On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking | |
US7603720B2 (en) | Non-repudiation watermarking protection based on public and private keys | |
GB2308282A (en) | Secret crytptographic key is split to reduce work factor | |
JP2000324096A (en) | Contents protection system | |
JP2000172648A (en) | Device and method for protecting digital information and storage medium with digital information protection program recorded therein | |
JP4017150B2 (en) | Content distribution device | |
Bloom | Digital cinema content security and the DCI | |
JP3565684B2 (en) | Video signal receiving and reproducing device | |
Katzenbeisser et al. | Malicious attacks on media authentication schemes based on invertible watermarks | |
JP2002521868A (en) | Method and apparatus for using watermarks and receiver-dependent criteria for copy protection | |
JP4674751B2 (en) | Portable terminal device, server device, and program | |
EP1191421A2 (en) | Tamper resistant software protection method with renewable security mechanism |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005738328 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11568484 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007512635 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020067023159 Country of ref document: KR Ref document number: 200580014298.0 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 1020067023159 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2005738328 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11568484 Country of ref document: US |