WO2007063432A2 - Record carrier with copy protection means - Google Patents

Record carrier with copy protection means Download PDF

Info

Publication number
WO2007063432A2
WO2007063432A2 PCT/IB2006/053664 IB2006053664W WO2007063432A2 WO 2007063432 A2 WO2007063432 A2 WO 2007063432A2 IB 2006053664 W IB2006053664 W IB 2006053664W WO 2007063432 A2 WO2007063432 A2 WO 2007063432A2
Authority
WO
WIPO (PCT)
Prior art keywords
rom
record carrier
mark
marks
player
Prior art date
Application number
PCT/IB2006/053664
Other languages
French (fr)
Other versions
WO2007063432A3 (en
Inventor
Antonius A. M. Staring
Johan C. Talstra
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to CN2006800447343A priority Critical patent/CN101317227B/en
Priority to US12/095,136 priority patent/US20080291801A1/en
Priority to EP20060809526 priority patent/EP1958194A2/en
Priority to JP2008541850A priority patent/JP2009517788A/en
Publication of WO2007063432A2 publication Critical patent/WO2007063432A2/en
Publication of WO2007063432A3 publication Critical patent/WO2007063432A3/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/12Formatting, e.g. arrangement of data block or words on the record carriers
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00188Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • G11B20/0026Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored as a barcode
    • G11B20/00268Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored as a barcode said barcode being recorded in a burst cutting area [BCA]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • G11B20/00326Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being embossed on the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • G11B20/00376Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored by varying the pit format, e.g. depth, width, length or edge positions
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • G11B20/00384Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being derived from a physical signature of the record carrier, e.g. unique feature set
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • G11B20/00405Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored by varying characteristics of the recording track, e.g. by altering the track pitch or by modulating the wobble track
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00492Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
    • G11B20/00528Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein each title is encrypted with a separate encryption key for each title, e.g. title key for movie, song or data file
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00492Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
    • G11B20/00536Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein encrypted content data is subjected to a further, iterated encryption, e.g. interwoven encryption
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00579Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the data encoding, e.g., modulation schemes violating run-length constraints, causing excessive DC content, or involving uncommon codewords or sync patterns
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00586Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00586Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium
    • G11B20/00594Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium wherein the shape of recording marks is altered, e.g. the depth, width, or length of pits
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00586Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium
    • G11B20/00601Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium wherein properties of tracks are altered, e.g., by changing the wobble pattern or the track pitch, or by adding interruptions or eccentricity
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00876Circuits for prevention of unauthorised reproduction or copying, e.g. piracy wherein physical copy protection means are attached to the medium, e.g. holograms, sensors, or additional semiconductor circuitry
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0092Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors
    • G11B20/00927Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files

Definitions

  • the invention relates to a system, comprising a record carrier and players, wherein measures are in place for preventing illicit copy of copy-protected material present on the record carrier.
  • CD Compact Disc
  • VCD Video CD
  • SVCD Super Video CD
  • a DVD has a storage capacity that is around seven times larger than that of a CD, which is large enough to accommodate the DVD-Video format with its superior user experience, as compared to VHS tapes and [S]VCD.
  • the intended successor of DVD i.e. the Blu-ray disc (BD)
  • BD Blu-ray disc
  • ROM marks known in the art are variations in the radial position, width or height of the track, in the density of data present along the track, in special patterns of correctable errors, in which case such ROM mark, is also known as side channel or hidden channel; this is described for example in EP 0930614 Bl.
  • Other examples of ROM marks known in the art are holograms, stamped patterns, and barcodes in the BCA.
  • an original disc can easily be distinguished from a copy, and access to the content information can be granted simply upon the detection of the ROM mark, or upon extraction of some kind of information from said ROM mark which is essential to allow access to the content information, e.g. a decryption key.
  • the plurality of player apparatuses thereby comprises groups of player apparatuses differentiated one from another according to the detector they are provided with. Each player allows access to the content material upon detection of the ROM mark corresponding to the detector it is provided with. Once professional pirates should manage to replicate a ROM mark, pirated discs would only be readable by the group of players having the corresponding detector, whereas for all other players, i.e. for most of the players, the pirated discs would still be unreadable.
  • the plurality of ROM marks may comprise:
  • ROM marks relying on a variations of different physical parameters
  • ROM marks relying on a variation of the same physical parameter, but at different locations
  • ROM mark relying on a variation of the same physical parameter, but where the same physical parameter is modulated according to different encoding rules, at the same or different locations, and/or
  • each ROM mark relying on a variation of the same physical parameter, based on spread spectrum techniques, where each ROM mark uses a different spreading sequence, at the same or different locations.
  • each ROM mark needs a suitable ad-hoc detector, capable of reconstructing a signal from the relevant physical variations.
  • the same detector may be used to detect several ROM marks, when these ROM marks rely on a variation of the same physical parameter either at different locations, or, based on spread spectrum techniques, each ROM mark using a different spreading sequence.
  • such same detector may be enabled to detect only one individual ROM mark by means of either an adequate instruction or hard-coded information.
  • Player apparatuses will normally be provided with one type of detector only. However they may also be provided with more than one detector, for example to increase robustness, i.e. the capability to access the content even if detection of one particular ROM mark fails, not due to the absence of the ROM mark but for example due to deterioration of the same, however the number of detectors present on a same player apparatus should definitely be small compared to the total number of ROM marks.
  • the access to the content information may be granted simply upon detection of the corresponding ROM mark: in this case the ROM marks are not required to carry any particular information or payload, and the decision to allow access is simply based on the presence or absence of the corresponding ROM mark. The main consequence is that the player needs to be compliant.
  • the technique used to store the ROM mark is kept secret and measures are put in place to prevent tampering of the functionalities of the player.
  • the access to the content information may be granted upon extraction of some information from said ROM mark which is essential to allow access to the content information, e.g. a decryption key. This provides a stronger protection system, since in this case there is no need to rely on compliance of the players. In this case however care is required so that the same information can be consistently extracted from a ROM mark.
  • the proposed solution can be combined with a broadcast encryption system, i.e. a key block, thereby providing a mechanism allowing revocation of player apparatuses by groups or individually.
  • a broadcast encryption system i.e. a key block
  • An important consequence is that in this way it is not required that all ROM marks present on a record carrier carry the same information or payload: in fact they may have each a different payload, which could then be used, in conjunction with the information present in the key block, to extract a common content decryption key.
  • the object is also achieved by a record carrier as claimed in claim 10 and by a player apparatus as claimed in claim 12.
  • Fig. 1 illustrates the basic principle of the invention
  • Figs. 2 to 6 show various embodiments of the system according to the invention, comprising a record carrier and a player,
  • Fig. 7 shows an embodiment specifically concerning a key hierarchy.
  • a record carrier 10 comprises content information 11 and a plurality of ROM marks M 1 , M 2 , .... , M n .
  • This record carrier 10 can be accessed by a plurality of players, P 1 , P 2 , .... , P n , each representative of a respective larger group op players.
  • Each of the players of the same group as Pi comprises a detector Di capable of detecting only respective ROM marks M 1
  • each of the players of the same group as P 2 comprises a detector D 2 capable of detecting only respective ROM marks M 2 , and so forth.
  • Each of the players also comprises a control unit 12 designed to allow access to the content information 11 depending on if the respective detector has detected the respective ROM mark.
  • the professional pirates would become capable of controllably reproducing one of the marks, for example M 1 , thereby producing illegal record carriers having the ROM mark M 1
  • these record carriers would be able to be played only by the players belonging to the same group as Pi, not by any other player, and this would result in frustration of the effort to produce illegal record carriers.
  • Security of this system increases with the number of ROM marks, which should preferably be in the order of tens, hundreds or even thousands. Preferably it should be hidden to what group a player belongs, and players of the same group should be scattered among players of other groups, and not be concentrated for example in some particular geographical area.
  • the access to the content information 11 can be granted simply on the detection of the respective ROM mark, in which case the ROM mark does not need to carry any particular information or payload, and the control unit 12 is basically a switch allowing access to the content information 11 depending on whether the respective ROM mark has been detected by the respective detector or not.
  • the access to the content information 11 is possible upon extraction of some information from said ROM mark M which is essential to allow access to the content information 11, e.g. a content decryption key 23, in which case the control unit is a decryption unit 20.
  • FIG. 2b A variation of this embodiment is shown in Fig 2b, wherein, differently from Fig. 2a, the content decryption key 23 is not directly extracted from the ROM mark M, but reconstructed by a key reconstruction unit 21 on the basis of information extracted from the ROM mark M and of auxiliary information 24 retrieved from the record carrier 10 by a suitable auxiliary information retrieval unit 22.
  • This embodiment is preferable to the one shown in Fig. 2a, because it does not require that all ROM marks carry the same payload, which fact would represent both a complication during production and a weakness from the security point of view.
  • the key reconstruction unit 21 may be another decryption block wherein, an encrypted version of the content decryption key is decrypted using a suitable decryption key, the encrypted version of the content decryption key being present in the auxiliary information 24 and the suitable decryption key being extractable from the ROM mark, or vice versa.
  • the auxiliary information 24 may contain as many encrypted versions of the content decryption key or suitable decryption keys as there are ROM marks, in which case the auxiliary information 24 will be hereinafter referred as key block.
  • Fig. 3 shows a further embodiment of the system according to the invention.
  • the auxiliary information is specifically represented by a key block 24'
  • the auxiliary information retrieval unit is specifically represented by a key block processing unit 22', which retrieves and processes the key block 24', selects from the key block 24 that information which is relevant for the player P, hereinafter called key reconstruction information 25, and passes it to the key reconstruction unit 21 in order to allow reconstruction of the content decryption key 23.
  • the key block processing unit 22' operates also in dependence of a device ID and/or device keys 31 stored in the player P. As is common in broadcast encryption, some of these devices keys may be shared with other devices.
  • the group ID 32 uniquely defines a group of devices to which a particular player P belongs and indicates which ROM mark contained on the record carrier 10 the player P must proceed to read.
  • the set of ROM marks may comprise or even entirely consist of ROM marks relying on a variation of the same physical parameter, but for example residing at different locations, e.g. several ROM marks stored in the form of pit-wobble, at different positions along the track.
  • a same detector i.e. a common detection unit, will be able to detect any of these ROM marks, once it is adequately informed on which group the player belongs to. For this reason, it is shown in Fig. 3 that the key block processing unit 22' provides to the detector D the group ID 32 information.
  • the group ID 32 may be the same as or a part of the device ID. As an alternative though, the group ID 32 may also be yielded by the processing of the key block 24'. This opens up the possibility to assign players to the different ROM Marks dynamically, i.e. a given player or group of players may correspond to a first ROM mark in respect of a first record carrier, whereas it may correspond to a second ROM mark in respect of a second record carrier.
  • the key block processing unit 22' provides information directly to the key reconstruction unit 21, it shall be appreciated that in a variation of this embodiment, the key block processing unit 22' may provide only the group ID 32 to the detector D.
  • the ROM mark M could be placed at a range of positions on the record carrier 10, and the record carrier may further comprise position information 40, sometimes referred to as "salt", to instruct the ROM mark detector D on the position where to look for the ROM mark M.
  • position information 40 sometimes referred to as "salt"
  • a ROM mark location unit 41 determines, based on the group ID 32 and the position information 40 the location on the record carrier 10 at which the detector D has to look for the ROM mark M.
  • the salt is used to change the position of a group's ROM mark on the record carrier in the case different record carriers use a key block with the same groups.
  • the salt may be a simple, single number, a look-up table, or an even more complex data structure.
  • the ROM mark location unit 41 may comprise a hash function, or a more complex function, and its output may be the starting address on the disc where ROM mark detection should commence. Note that with this mechanism the salt guarantees that generally, when averaged over many titles, all devices have to spend an equal amount of time on jumps to the appropriate ROM mark.
  • the number of groups in the key block may be larger than the number of ROM marks on the record carrier.
  • the set of ROM marks may comprise or even entirely consist of ROM marks relying on a variation of the same physical parameter, but stored on the basis of different spreading sequences.
  • ROM marks relying on a variation of the same physical parameter, but stored at different positions
  • a same detector will be able to detect any of these ROM marks, once it is adequately informed on the spreading sequence associated to a given ROM mark.
  • the common detection unit may be implemented in all or in part as a software routine, receiving as an input a given position or spreading sequence.
  • the spreading sequence may be recorded on the record carrier, either in full or in compress form, e.g. as a key for seeding a pseudo random number generator.
  • the ROM mark detector can only detect the ROM mark that is addressed to the device, and none of the other ROM marks. Moreover, the ROM mark detector cannot detect any ROM mark if the player has been revoked.
  • Fig. 5 shows a further embodiment of the system according to the invention.
  • a "seed" 51 is present on the record carrier 10.
  • the seed 51 may be used to randomize the group ID 32 prior to passing it to the detector D. This is advantageous in case the key block 24' on different record carriers 10 is identical, so that the key block processing unit 22' yields the same set of group IDs 32 over and over again.
  • the use of different seeds 51 on different record carriers ensures that the same detector D uses different spreading sequences on different record carriers 10. Note that this is different from the use of a salt 40, which only changes the position of the ROM mark M.
  • the key block processing unit 22' may yield two outputs: the key reconstruction information 25 to be passed to the key reconstruction unit 21, and an additional key reconstruction information to be passed to the ROM mark detector D.
  • the additional key reconstruction information might comprise in particular the spreading sequence by means of which the relevant ROM mark M can be detected.
  • the key block 24' may contain special data structures for this purpose.
  • an encrypted version of the content decryption key 23 may be stored in part in the key block 24' and in part in the ROM mark M.
  • the record carrier 10 may also comprises a public key signature of the key block 24' and the player would check this signature in order to avoid forged key blocks. Otherwise, it would suffice for pirates to reverse engineer only a few devices, and construct key blocks that contain only a small number of groups.
  • the record carrier may also comprise a digital signature of the content material. The digital signatures of the content material 11 and of the key block 24' may be combined in a single signature.
  • the seed 51 may be based on hashes of the encrypted content material 11 , and those content hashes may be digitally signed.
  • the reason for including content hashes into the key hierarchy is to make sure that licensed disc mastering facilities cannot abuse their equipment for legitimate discs using a copy protection system based on the techniques disclosed in this document to also author illicit content (e.g. ripped from DVD). If a disc mastering facility were to do this anyway, the signature verification or key generation step would produce incorrect results.
  • a further embodiment of the system according to the invention, reflecting an approach alternative to the one explained with reference to Fig. 3, is shown in Fig. 6. In contrast with the embodiment shown in Fig. 3 the ROM mark M does not contain any payload, i.e.
  • the key block processing unit 22' directly produces the content decryption key 23.
  • the ROM mark detector D determines whether or not to pass the content decryption key 23 to the decryption unit 20, if the ROM mark is detected.
  • An advantage of this embodiment is that a payload-less ROM mark may be significantly smaller than a payload-carrying variant. This means that the disc can accommodate more ROM marks, which can be read-out more quickly as well. In addition, a larger number of ROM marks on the disc means a higher security level.
  • a disadvantage is that decision based systems might be easier to hack than information based systems, unless extra safeguards are in place to prevent tampering of the player apparatus.
  • Fig 6 can be combined the various improvements and variations already described with reference to Fig. 3 to 5, like for example the already described check on a public key signature of the content material and/or key block 24'.
  • a key block in the record carrier 10 provides various advantages, in particular the possibility to revoke either groups or players or even individual players. To do this, it is sufficient for the content distributor not to include in the key block the information, e.g. decryption keys, relevant to the revoked groups or devices.
  • the key block could be based for example on the VCPS technology 0.
  • a VCPS key block As a background information, the main features of a VCPS key block are herewith explained with reference to Fig. 7.
  • devices are represented by the leaves.
  • a cryptographic key also known as a node key, is assigned to each of the nodes of this tree. Every device contains all node keys on the path from its leaf to the root of the tree.
  • Each node key is shared by the group of devices contained in the subtree rooted at that particular node.
  • a VCPS of key block consists of the same message, e.g. the content encryption key, encrypted multiple times with different node keys: (E ⁇ node i[K],...,E ⁇ node n [K] ⁇ .
  • the set of node keys K no d e i,...,K no d e n determines which devices can get hold of K and which are excluded (revoked).
  • the object KA 1 E ⁇ n O de i[K] is called an authorization key.
  • the set of nodes used ⁇ nodei,...,node n ⁇ is referred to as the tag part, whereas the collection of authorization keys (KAi,...,KA n ) is referred to as the key part.
  • the content decryption key 23 is referred to as "root key” and the decryption key reconstruction information is referred to as "sub-root key”.
  • the VCPS key block is modified as follows: the authorization keys as defined in 0 do not decrypt to a single root key. Instead, each authorization key decrypts to a sub-root key, where different groups in the key block may yield different sub-root keys, i.e. , the key part has the form ⁇ E ⁇ node i [Ki ] , ... ,E ⁇ node n[K m ] ⁇ .
  • the different sub-root keys Ki,...,K m can then be used to detect m different ROM-marks.
  • ROM marks such as wobbles, lateral deviations in the spiral with lands and pits in an optical disc
  • An additional level of security is that the detection of the side channel information requires knowledge of a certain secret, which must be hidden well in authorized players.
  • the present invention proposes that instead of a single ROM mark, many ROM marks are applied to a disc. Further, devices are divided into groups, and each group has the capability to only detect one mark from the group. This way, if a secret is obtained from a device, the disc can be duplicated, but only a limited number of devices will be able to use this disc. Creating a disc that can be played in any device requires the hacking of one device from every group.
  • Video Content Protection System for the DVD+R/+RW Video Recording Format version 1.34, available from http://www.licensing.philips.com/vcps.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Optical Recording Or Reproduction (AREA)
  • Storage Device Security (AREA)

Abstract

In summary, ROM marks (such as wobbles, lateral deviations in the spiral with lands and pits in an optical disc) are used on optical media to ensure consumer-grade copying devices cannot duplicate original media. An additional level of security is that the detection of the side channel information requires knowledge of a certain secret, which must be hidden well in authorized players. If the secret leaks, a professional pirate will be able to detect the ROM mark and duplicate the original medium with the side channel information intact. The present invention proposes that instead of a single ROM mark, many ROM marks are applied to a disc. Further, devices are divided into groups, and each group has the capability to only detect one mark from the group. This way, if a secret is obtained from a device, the disc can be duplicated, but only a limited number of devices will be able to use this disc. Creating a disc that can be played in any device requires the hacking of one device from every group.

Description

Record carrier with copy protection means
FIELD OF THE INVENTION
The invention relates to a system, comprising a record carrier and players, wherein measures are in place for preventing illicit copy of copy-protected material present on the record carrier.
BACKGROUND OF THE INVENTION
Record carriers, such as optical discs have become the preferred media for distribution of audio -visual entertainment content. The success story began with the introduction of the Compact Disc (CD) in the early 1980s. Whereas the CD was initially designed for playback of audio in consumer devices, it was quickly enhanced for computer use as well. The result was the CD-ROM format, which still is the most popular publishing format for computer data such as application and games software. In the early 1990s, when efficient video codecs became available, first the Video CD (VCD) and later the improved Super Video CD (SVCD) formats were added to the CD family. Digital Versatile Discs (DVD), introduced around the mid 1990s, have been broadly accepted. A DVD has a storage capacity that is around seven times larger than that of a CD, which is large enough to accommodate the DVD-Video format with its superior user experience, as compared to VHS tapes and [S]VCD. The intended successor of DVD, i.e. the Blu-ray disc (BD), will offer an even larger storage capacity, by a factor of six, an enhanced video quality, and extensive user interaction features.
The dark side to this success story is the phenomenon of large-scale professional piracy and widespread home copying of published discs. There are several driving factors behind these phenomena, where the most important one probably is the immense popularity of optical discs. With respect to professional piracy, another major factor is that mass production of optical discs is very cheap, while production equipment is readily available. In addition, legal action against counterfeit products is not high on the government's priority list in some parts of the world. With respect to home copying, an additional driving factor is the availability of cheap recordable media such as CD-R, DVD+R, etc., in combination with the capabilities of modern PCs and the convenience of the Internet.
This has made evident the need for copy-protection measures to be applied to optical discs. There is a variety of approaches to copy-protection; according to one of these approaches the disc is provided with an additional feature, the so-called "ROM mark", which when a copy is made with consumer equipment, e.g. a CD-R/W drive, is not passed to the copy.
Some examples of ROM marks known in the art, in particular in relation to optical discs such as CDs, DVDs and BDs, are variations in the radial position, width or height of the track, in the density of data present along the track, in special patterns of correctable errors, in which case such ROM mark, is also known as side channel or hidden channel; this is described for example in EP 0930614 Bl. Other examples of ROM marks known in the art are holograms, stamped patterns, and barcodes in the BCA.
According to this approach, an original disc can easily be distinguished from a copy, and access to the content information can be granted simply upon the detection of the ROM mark, or upon extraction of some kind of information from said ROM mark which is essential to allow access to the content information, e.g. a decryption key.
This type of approach is very effective in preventing normal users from making copies of prerecorded discs, and it puts a serious burden on professional pirates who want to produce pirated discs because such professional pirates need first of all to understand how the ROM mark is stored and then devise a method to replicate it, which requires a considerable amount of time and effort. However, once the pirates succeed in reproducing discs with the ROM mark, the entire copy protection system is severely compromised, and there is no way to recover and install new hurdles for the pirates.
SUMMARY OF THE INVENTION
It is an object of the present invention to introduce a system comprising a record carrier and a plurality of player apparatuses for accessing the record carrier based on the presence of a ROM mark on the record carrier, whereby should a method to replicate a ROM mark become available, the impact on the entire copy protection system relied upon is less severe.
This object is achieved by a system as claimed in claim 1. The plurality of player apparatuses thereby comprises groups of player apparatuses differentiated one from another according to the detector they are provided with. Each player allows access to the content material upon detection of the ROM mark corresponding to the detector it is provided with. Once professional pirates should manage to replicate a ROM mark, pirated discs would only be readable by the group of players having the corresponding detector, whereas for all other players, i.e. for most of the players, the pirated discs would still be unreadable. The plurality of ROM marks may comprise:
ROM marks relying on a variations of different physical parameters, ROM marks relying on a variation of the same physical parameter, but at different locations,
ROM mark relying on a variation of the same physical parameter, but where the same physical parameter is modulated according to different encoding rules, at the same or different locations, and/or
ROM mark relying on a variation of the same physical parameter, based on spread spectrum techniques, where each ROM mark uses a different spreading sequence, at the same or different locations. In principle, in order to be detected each ROM mark needs a suitable ad-hoc detector, capable of reconstructing a signal from the relevant physical variations. However, the same detector may be used to detect several ROM marks, when these ROM marks rely on a variation of the same physical parameter either at different locations, or, based on spread spectrum techniques, each ROM mark using a different spreading sequence. In this case, such same detector may be enabled to detect only one individual ROM mark by means of either an adequate instruction or hard-coded information. In the following, when reference is made to multiple detectors, this shall be intended to include the case of the same type of detectors, but adapted to detect different ROM marks.
Player apparatuses will normally be provided with one type of detector only. However they may also be provided with more than one detector, for example to increase robustness, i.e. the capability to access the content even if detection of one particular ROM mark fails, not due to the absence of the ROM mark but for example due to deterioration of the same, however the number of detectors present on a same player apparatus should definitely be small compared to the total number of ROM marks. In the players, the access to the content information may be granted simply upon detection of the corresponding ROM mark: in this case the ROM marks are not required to carry any particular information or payload, and the decision to allow access is simply based on the presence or absence of the corresponding ROM mark. The main consequence is that the player needs to be compliant. In this case preferably the technique used to store the ROM mark is kept secret and measures are put in place to prevent tampering of the functionalities of the player. As an alternative, the access to the content information may be granted upon extraction of some information from said ROM mark which is essential to allow access to the content information, e.g. a decryption key. This provides a stronger protection system, since in this case there is no need to rely on compliance of the players. In this case however care is required so that the same information can be consistently extracted from a ROM mark.
Advantageously, the proposed solution can be combined with a broadcast encryption system, i.e. a key block, thereby providing a mechanism allowing revocation of player apparatuses by groups or individually. An important consequence is that in this way it is not required that all ROM marks present on a record carrier carry the same information or payload: in fact they may have each a different payload, which could then be used, in conjunction with the information present in the key block, to extract a common content decryption key. Advantageous embodiments of the system according to the invention are claimed in the dependent claims.
The object is also achieved by a record carrier as claimed in claim 10 and by a player apparatus as claimed in claim 12.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other aspects of the system, record carrier and player apparatus according to the invention will be further elucidated and described with reference to the drawings. In the drawings:
Fig. 1 illustrates the basic principle of the invention, Figs. 2 to 6 show various embodiments of the system according to the invention, comprising a record carrier and a player,
Fig. 7 shows an embodiment specifically concerning a key hierarchy.
DETAILED DESCRIPTION OF THE EMBODIMENTS In Fig. 1, a record carrier 10 comprises content information 11 and a plurality of ROM marks M1, M2, .... , Mn. This record carrier 10 can be accessed by a plurality of players, P1, P2, .... , Pn, each representative of a respective larger group op players. Each of the players of the same group as Pi comprises a detector Di capable of detecting only respective ROM marks M1, each of the players of the same group as P2 comprises a detector D2 capable of detecting only respective ROM marks M2, and so forth. Each of the players also comprises a control unit 12 designed to allow access to the content information 11 depending on if the respective detector has detected the respective ROM mark. In the event that the professional pirates would become capable of controllably reproducing one of the marks, for example M1, thereby producing illegal record carriers having the ROM mark M1, these record carriers would be able to be played only by the players belonging to the same group as Pi, not by any other player, and this would result in frustration of the effort to produce illegal record carriers. Security of this system increases with the number of ROM marks, which should preferably be in the order of tens, hundreds or even thousands. Preferably it should be hidden to what group a player belongs, and players of the same group should be scattered among players of other groups, and not be concentrated for example in some particular geographical area.
In an embodiment the access to the content information 11 can be granted simply on the detection of the respective ROM mark, in which case the ROM mark does not need to carry any particular information or payload, and the control unit 12 is basically a switch allowing access to the content information 11 depending on whether the respective ROM mark has been detected by the respective detector or not.
In an alternative embodiment, represented in Fig 2a, the access to the content information 11 is possible upon extraction of some information from said ROM mark M which is essential to allow access to the content information 11, e.g. a content decryption key 23, in which case the control unit is a decryption unit 20.
A variation of this embodiment is shown in Fig 2b, wherein, differently from Fig. 2a, the content decryption key 23 is not directly extracted from the ROM mark M, but reconstructed by a key reconstruction unit 21 on the basis of information extracted from the ROM mark M and of auxiliary information 24 retrieved from the record carrier 10 by a suitable auxiliary information retrieval unit 22. This embodiment is preferable to the one shown in Fig. 2a, because it does not require that all ROM marks carry the same payload, which fact would represent both a complication during production and a weakness from the security point of view. The key reconstruction unit 21 may be another decryption block wherein, an encrypted version of the content decryption key is decrypted using a suitable decryption key, the encrypted version of the content decryption key being present in the auxiliary information 24 and the suitable decryption key being extractable from the ROM mark, or vice versa. In general the auxiliary information 24 may contain as many encrypted versions of the content decryption key or suitable decryption keys as there are ROM marks, in which case the auxiliary information 24 will be hereinafter referred as key block.
Fig. 3 shows a further embodiment of the system according to the invention. In this embodiment the auxiliary information is specifically represented by a key block 24', and the auxiliary information retrieval unit is specifically represented by a key block processing unit 22', which retrieves and processes the key block 24', selects from the key block 24 that information which is relevant for the player P, hereinafter called key reconstruction information 25, and passes it to the key reconstruction unit 21 in order to allow reconstruction of the content decryption key 23. In this embodiment, the key block processing unit 22' operates also in dependence of a device ID and/or device keys 31 stored in the player P. As is common in broadcast encryption, some of these devices keys may be shared with other devices. The group ID 32 uniquely defines a group of devices to which a particular player P belongs and indicates which ROM mark contained on the record carrier 10 the player P must proceed to read.
It has been said that the set of ROM marks may comprise or even entirely consist of ROM marks relying on a variation of the same physical parameter, but for example residing at different locations, e.g. several ROM marks stored in the form of pit-wobble, at different positions along the track. In this case a same detector, i.e. a common detection unit, will be able to detect any of these ROM marks, once it is adequately informed on which group the player belongs to. For this reason, it is shown in Fig. 3 that the key block processing unit 22' provides to the detector D the group ID 32 information.
The group ID 32 may be the same as or a part of the device ID. As an alternative though, the group ID 32 may also be yielded by the processing of the key block 24'. This opens up the possibility to assign players to the different ROM Marks dynamically, i.e. a given player or group of players may correspond to a first ROM mark in respect of a first record carrier, whereas it may correspond to a second ROM mark in respect of a second record carrier.
Although in Fig. 3 it is shown that the key block processing unit 22' provides information directly to the key reconstruction unit 21, it shall be appreciated that in a variation of this embodiment, the key block processing unit 22' may provide only the group ID 32 to the detector D.
Such a system can be further enhanced in various ways. The ROM mark M could be placed at a range of positions on the record carrier 10, and the record carrier may further comprise position information 40, sometimes referred to as "salt", to instruct the ROM mark detector D on the position where to look for the ROM mark M. This situation is depicted in Fig 4, where a ROM mark location unit 41 determines, based on the group ID 32 and the position information 40 the location on the record carrier 10 at which the detector D has to look for the ROM mark M. Basically the salt is used to change the position of a group's ROM mark on the record carrier in the case different record carriers use a key block with the same groups. The salt may be a simple, single number, a look-up table, or an even more complex data structure. The ROM mark location unit 41 may comprise a hash function, or a more complex function, and its output may be the starting address on the disc where ROM mark detection should commence. Note that with this mechanism the salt guarantees that generally, when averaged over many titles, all devices have to spend an equal amount of time on jumps to the appropriate ROM mark. In addition, note that the number of groups in the key block may be larger than the number of ROM marks on the record carrier.
It has been said that the set of ROM marks may comprise or even entirely consist of ROM marks relying on a variation of the same physical parameter, but stored on the basis of different spreading sequences. Like in the case of ROM marks relying on a variation of the same physical parameter, but stored at different positions, also in this case a same detector will be able to detect any of these ROM marks, once it is adequately informed on the spreading sequence associated to a given ROM mark. It shall be understood that the common detection unit may be implemented in all or in part as a software routine, receiving as an input a given position or spreading sequence. The spreading sequence may be recorded on the record carrier, either in full or in compress form, e.g. as a key for seeding a pseudo random number generator. In particular it might be present in the key block, in which case it might be extracted and passed to the detector D by the key block processing unit 22'. In this way the ROM mark detector can only detect the ROM mark that is addressed to the device, and none of the other ROM marks. Moreover, the ROM mark detector cannot detect any ROM mark if the player has been revoked.
Fig. 5 shows a further embodiment of the system according to the invention. In addition to what is already shown in Fig. 3, a "seed" 51 is present on the record carrier 10. The seed 51 may be used to randomize the group ID 32 prior to passing it to the detector D. This is advantageous in case the key block 24' on different record carriers 10 is identical, so that the key block processing unit 22' yields the same set of group IDs 32 over and over again. The use of different seeds 51 on different record carriers ensures that the same detector D uses different spreading sequences on different record carriers 10. Note that this is different from the use of a salt 40, which only changes the position of the ROM mark M.
Numerous improvements and variations are possible in respect with the embodiments presented in Figs. 3, 4 and 5. In a first variation, the key block processing unit 22' may yield two outputs: the key reconstruction information 25 to be passed to the key reconstruction unit 21, and an additional key reconstruction information to be passed to the ROM mark detector D. In systems where the plurality of ROM marks comprises or consists of ROM mark relying on a variation of the same physical parameter, based on spread spectrum techniques, where each ROM mark uses a different spreading sequence, the additional key reconstruction information might comprise in particular the spreading sequence by means of which the relevant ROM mark M can be detected. The key block 24' may contain special data structures for this purpose.
In a second variation, an encrypted version of the content decryption key 23 may be stored in part in the key block 24' and in part in the ROM mark M.
In a third variation, the record carrier 10 may also comprises a public key signature of the key block 24' and the player would check this signature in order to avoid forged key blocks. Otherwise, it would suffice for pirates to reverse engineer only a few devices, and construct key blocks that contain only a small number of groups. In a fourth variation, the record carrier may also comprise a digital signature of the content material. The digital signatures of the content material 11 and of the key block 24' may be combined in a single signature.
In yet another variation, the seed 51 may be based on hashes of the encrypted content material 11 , and those content hashes may be digitally signed. The reason for including content hashes into the key hierarchy is to make sure that licensed disc mastering facilities cannot abuse their equipment for legitimate discs using a copy protection system based on the techniques disclosed in this document to also author illicit content (e.g. ripped from DVD). If a disc mastering facility were to do this anyway, the signature verification or key generation step would produce incorrect results. A further embodiment of the system according to the invention, reflecting an approach alternative to the one explained with reference to Fig. 3, is shown in Fig. 6. In contrast with the embodiment shown in Fig. 3 the ROM mark M does not contain any payload, i.e. the only thing that matters is whether it is present on the disc or not. In this case, the key block processing unit 22' directly produces the content decryption key 23. The ROM mark detector D determines whether or not to pass the content decryption key 23 to the decryption unit 20, if the ROM mark is detected. An advantage of this embodiment is that a payload-less ROM mark may be significantly smaller than a payload-carrying variant. This means that the disc can accommodate more ROM marks, which can be read-out more quickly as well. In addition, a larger number of ROM marks on the disc means a higher security level. A disadvantage is that decision based systems might be easier to hack than information based systems, unless extra safeguards are in place to prevent tampering of the player apparatus.
The embodiment of Fig 6 can be combined the various improvements and variations already described with reference to Fig. 3 to 5, like for example the already described check on a public key signature of the content material and/or key block 24'.
The presence of a key block in the record carrier 10 provides various advantages, in particular the possibility to revoke either groups or players or even individual players. To do this, it is sufficient for the content distributor not to include in the key block the information, e.g. decryption keys, relevant to the revoked groups or devices. The key block could be based for example on the VCPS technology 0. As a background information, the main features of a VCPS key block are herewith explained with reference to Fig. 7. In the binary tree depicted in Fig. 7, devices are represented by the leaves. A cryptographic key, also known as a node key, is assigned to each of the nodes of this tree. Every device contains all node keys on the path from its leaf to the root of the tree. Each node key is shared by the group of devices contained in the subtree rooted at that particular node. A VCPS of key block consists of the same message, e.g. the content encryption key, encrypted multiple times with different node keys: (Eκnode i[K],...,Eκnode n[K]}. The set of node keys Knode i,...,Knode n determines which devices can get hold of K and which are excluded (revoked). The object KA1 = EκnOde i[K] is called an authorization key. Within a VCPS key block, the set of nodes used {nodei,...,noden} is referred to as the tag part, whereas the collection of authorization keys (KAi,...,KAn) is referred to as the key part.
In this case the content decryption key 23 is referred to as "root key" and the decryption key reconstruction information is referred to as "sub-root key".
In an advantageous embodiment, the VCPS key block is modified as follows: the authorization keys as defined in 0 do not decrypt to a single root key. Instead, each authorization key decrypts to a sub-root key, where different groups in the key block may yield different sub-root keys, i.e. , the key part has the form { Eκnode i [Ki ] , ... ,Eκnode n[Km] } . The different sub-root keys Ki,...,Km can then be used to detect m different ROM-marks. In summary, ROM marks (such as wobbles, lateral deviations in the spiral with lands and pits in an optical disc) are used on optical media to ensure consumer-grade copying devices cannot duplicate original media. An additional level of security is that the detection of the side channel information requires knowledge of a certain secret, which must be hidden well in authorized players.
If the secret leaks, a professional pirate will be able to detect the ROM mark and duplicate the original medium with the side channel information intact.
The present invention proposes that instead of a single ROM mark, many ROM marks are applied to a disc. Further, devices are divided into groups, and each group has the capability to only detect one mark from the group. This way, if a secret is obtained from a device, the disc can be duplicated, but only a limited number of devices will be able to use this disc. Creating a disc that can be played in any device requires the hacking of one device from every group.
REFERENCES:
Video Content Protection System for the DVD+R/+RW Video Recording Format, version 1.34, available from http://www.licensing.philips.com/vcps.

Claims

CLAIMS:
1. System comprising a record carrier (10) and a plurality of player apparatuses
(Pl, P2, ... , Pn) for accessing the record carrier, the record carrier comprising content material (11) and bearing a set of ROM marks (Ml, M2, ... , Mn), each of the set of ROM marks being detectable by means of a respective corresponding detector out of a set of corresponding detectors (Dl, D2, ... , Dn), any player (P) out of the plurality of player apparatuses having a detector (D) out the set of corresponding detectors, the player being designed for allowing access to the content material upon detection of the ROM mark (M) to which the detector (D) present in the player (P) respectively corresponds.
2. System as claimed in claim 1, wherein the set of ROM marks (Ml, M2, ... ,
Mn) rely on a variation of a same physical parameter.
3. System as claimed in claim 2, and the corresponding detectors (Dl, D2, ... , Dn) are formed as instances of a common detection unit, enabled, according to which of the corresponding detectors is to be implemented, to detect only the corresponding ROM mark (M).
4. System as claimed in claim 3, wherein the common detection unit has an input to receive enabling information, thereby being enabled to detect the corresponding ROM mark (M).
5. System as claimed in claim 1, wherein the content material (11) is encrypted and the player apparatus (P) comprises a decryption unit (20) for decrypting the content material based upon a content decryption key (23).
6. System as claimed in claim 5, wherein the content decryption key (23) is extractable from the ROM mark (M).
7. System as claimed in claim 5, wherein the content decryption key (23) is determinable upon auxiliary information (24) present in the record carrier (10).
8. System as claimed in claim 2, wherein the apparatuses comprise a content decryption key reconstruction unit (21) for determining the content decryption key (23) upon a combination of information extractable from the ROM mark (M) and auxiliary information (24) present in the record carrier (10).
9. System as claimed in claims 7 or 8, wherein the record carrier (10) further comprises a digital signature of the auxiliary information (24) and/or of the content material
(11).
10. Record carrier (10) comprising content material (11) and bearing a set of ROM marks (Ml, M2, ... , Mn), each of the set of ROM marks being detectable by means of a corresponding detector (Dl, D2, ... , Dn).
11. Record carrier (10) as claimed in claim 10, wherein the set of ROM marks (Ml, M2, ... , Mn) rely on a variation of a same physical parameter.
12. Player apparatus (P) for accessing a record carrier (10) as claimed in claim 11, the player comprising a detector (D) for detecting a respective corresponding ROM mark (M) among the set of ROM marks (Ml, M2, ... , Mn), the detector being formed as a detection unit, enabled to detect only the ROM mark (M) to which it respectively corresponds.
PCT/IB2006/053664 2005-11-29 2006-10-06 Record carrier with copy protection means WO2007063432A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN2006800447343A CN101317227B (en) 2005-11-29 2006-10-06 Player equipment and system containing record carrier and player equipment
US12/095,136 US20080291801A1 (en) 2005-11-29 2006-10-06 Record Carrier with Copy Protection Means
EP20060809526 EP1958194A2 (en) 2005-11-29 2006-10-06 Record carrier with copy protection means
JP2008541850A JP2009517788A (en) 2005-11-29 2006-10-06 Record carrier having copy protection means

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP05111456.9 2005-11-29
EP05111456 2005-11-29

Publications (2)

Publication Number Publication Date
WO2007063432A2 true WO2007063432A2 (en) 2007-06-07
WO2007063432A3 WO2007063432A3 (en) 2007-10-25

Family

ID=38092638

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2006/053664 WO2007063432A2 (en) 2005-11-29 2006-10-06 Record carrier with copy protection means

Country Status (7)

Country Link
US (1) US20080291801A1 (en)
EP (1) EP1958194A2 (en)
JP (1) JP2009517788A (en)
KR (1) KR20080071199A (en)
CN (1) CN101317227B (en)
TW (1) TW200739344A (en)
WO (1) WO2007063432A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009077977A1 (en) * 2007-12-18 2009-06-25 Koninklijke Philips Electronics N.V. Drive apparatus
WO2010001544A1 (en) * 2008-07-01 2010-01-07 パナソニック株式会社 Drive device, content reproduction device, recording device, data readout method, program, recording medium, and integrated circuit

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7162035B1 (en) 2000-05-24 2007-01-09 Tracer Detection Technology Corp. Authentication method and system
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
US7995196B1 (en) 2008-04-23 2011-08-09 Tracer Detection Technology Corp. Authentication method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0930614A1 (en) * 1991-12-02 1999-07-21 Koninklijke Philips Electronics N.V. "Closed information system with physical copy protection"
WO2001003136A2 (en) * 1999-07-02 2001-01-11 Koninklijke Philips Electronics N.V. Addition of watermark keys according to a flexible format
EP1093124A2 (en) * 1999-10-13 2001-04-18 Matsushita Electric Industrial Co., Ltd. Optical disk for recording copyrighted information, and method and apparatus for reproducing information recorded in optical disk
EP1187391A2 (en) * 2000-09-07 2002-03-13 Sony Corporation Encrypted information recording
WO2004075187A1 (en) * 2003-02-20 2004-09-02 Koninklijke Philips Electronics N.V. Information carrier comprising access information
US20050174915A1 (en) * 2000-10-27 2005-08-11 Takahiro Nagai Optical disc, recording apparatus and method, and reproduction apparatus and method

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69523139T2 (en) * 1994-11-17 2002-01-31 Matsushita Electric Ind Co Ltd DEVICE FOR GENERATING A MARK, METHOD FOR GENERATING A LASER MARKING ON AN OPTICAL PLATE, OPTICAL PLATE AND METHOD FOR THE PRODUCTION THEREOF
KR100817227B1 (en) * 2000-05-10 2008-03-27 코닌클리케 필립스 일렉트로닉스 엔.브이. Copy protection system
JP3922424B2 (en) * 2000-07-25 2007-05-30 パイオニア株式会社 Optical recording medium, optical recording medium manufacturing apparatus, and optical recording medium manufacturing method
JP2002132457A (en) * 2000-10-26 2002-05-10 Victor Co Of Japan Ltd Information recording device, information reproducing device and information recording/reproducing device
HU0104183D0 (en) * 2001-10-09 2001-12-28 Optilink Ab Method and apparatus for the engryption of data
TWI229855B (en) * 2002-11-29 2005-03-21 Lite On It Corp Determination method of optical medium
JP4690306B2 (en) * 2003-01-23 2011-06-01 エルジー エレクトロニクス インコーポレイティド Recording medium having intermittent or alternating wobble pits, and apparatus and method for forming, recording and reproducing data on the recording medium
JP4355293B2 (en) * 2003-01-24 2009-10-28 イントリンシック アイディー ベスローテン フェンノートシャップ Reliable access control method and apparatus for storage medium
KR101051000B1 (en) * 2003-02-19 2011-07-26 엘지전자 주식회사 High Density Optical Discs and the Illegal Copy Determination Method
KR100974448B1 (en) * 2003-04-24 2010-08-10 엘지전자 주식회사 Method for managing a copy protection information of optical disc
WO2005010695A2 (en) * 2003-07-16 2005-02-03 Josh Hogan A copy protected mastering system
JP4110530B2 (en) * 2003-10-22 2008-07-02 ソニー株式会社 Information recording processing apparatus, information reproducing processing apparatus, information recording medium and method, and computer program
WO2005050907A1 (en) * 2003-11-14 2005-06-02 Sonic Solutions Secure transfer of content to writable media
JP4614744B2 (en) * 2003-11-28 2011-01-19 パナソニック株式会社 Management device, terminal device and copyright protection system
JP4114605B2 (en) * 2003-12-24 2008-07-09 ソニー株式会社 Information processing apparatus, information recording medium, information processing method, and computer program
JP2007524183A (en) * 2004-02-25 2007-08-23 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Record carrier identification using asymmetric modulation
JP4576853B2 (en) * 2004-03-05 2010-11-10 ソニー株式会社 Information processing apparatus, authentication processing method, and computer program
US7355944B2 (en) * 2004-11-12 2008-04-08 General Electric Company Authenticatable media and method of authenticating
JP2009508280A (en) * 2005-09-09 2009-02-26 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ BD9 hybrid disk and its anti-duplication system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0930614A1 (en) * 1991-12-02 1999-07-21 Koninklijke Philips Electronics N.V. "Closed information system with physical copy protection"
WO2001003136A2 (en) * 1999-07-02 2001-01-11 Koninklijke Philips Electronics N.V. Addition of watermark keys according to a flexible format
EP1093124A2 (en) * 1999-10-13 2001-04-18 Matsushita Electric Industrial Co., Ltd. Optical disk for recording copyrighted information, and method and apparatus for reproducing information recorded in optical disk
EP1187391A2 (en) * 2000-09-07 2002-03-13 Sony Corporation Encrypted information recording
US20050174915A1 (en) * 2000-10-27 2005-08-11 Takahiro Nagai Optical disc, recording apparatus and method, and reproduction apparatus and method
WO2004075187A1 (en) * 2003-02-20 2004-09-02 Koninklijke Philips Electronics N.V. Information carrier comprising access information

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
PHILIPS: "VCPS specifications Version 1.34, Video Content Protection System for the DVD+R/+RW Video Recording Format, System Description Version 1.34" INTERNET CITATION, [Online] April 2006 (2006-04), XP002438684 Retrieved from the Internet: URL:http://www.ip.philips.com/licensing/vcps/documents1024.html> [retrieved on 2007-06-20] cited in the application *
PHILIPS: "Video Content Protection System for the DVD+R/+RW Video Recording Format System Description Version 1.3" INTERNET CITATION, [Online] July 2005 (2005-07), XP002381336 Retrieved from the Internet: URL:http://www.ip.philips.com/licensing/vcps/documents1024.html> [retrieved on 2007-06-20] *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009077977A1 (en) * 2007-12-18 2009-06-25 Koninklijke Philips Electronics N.V. Drive apparatus
WO2010001544A1 (en) * 2008-07-01 2010-01-07 パナソニック株式会社 Drive device, content reproduction device, recording device, data readout method, program, recording medium, and integrated circuit

Also Published As

Publication number Publication date
WO2007063432A3 (en) 2007-10-25
EP1958194A2 (en) 2008-08-20
JP2009517788A (en) 2009-04-30
US20080291801A1 (en) 2008-11-27
KR20080071199A (en) 2008-08-01
TW200739344A (en) 2007-10-16
CN101317227A (en) 2008-12-03
CN101317227B (en) 2011-12-14

Similar Documents

Publication Publication Date Title
CN100397501C (en) Optical disc and a reproduction mothod reproduction apparatus and recording apparatus for the same
KR100817227B1 (en) Copy protection system
US20050038997A1 (en) Contents recording method, recording medium and contents recording device
JP4613739B2 (en) Information processing apparatus, information processing method, information recording medium, and computer program
US7545943B2 (en) Apparatus, method, and computer program product for playing back content
CN1764969A (en) Recording medium, apparatus for forming the recording medium, and apparatus and method for reproducing the recording medium
WO2006044301A2 (en) Method and apparatus for dvd copy protection with selective data pattern insertion
WO2000026912A1 (en) Optical disk, method of reproducing and copying optical disk, and method of preventing illegal use of optical disk
JP4824730B2 (en) Information carrier with access information
US20080291801A1 (en) Record Carrier with Copy Protection Means
JPWO2003030167A1 (en) Optical disc, optical disc and / or license protection system for optical disc device, optical disc device, and recording / reproducing method
US20020141583A1 (en) Copy protection using a preformed ID and a unique ID on a programmable CD-ROM
JP4110530B2 (en) Information recording processing apparatus, information reproducing processing apparatus, information recording medium and method, and computer program
JP2002203369A (en) Optical disk, reproducing method and apparatus and recorder for the optical disk
US20100271914A1 (en) Drive apparatus
JP4161896B2 (en) Information processing apparatus, information recording medium, information processing method, and computer program
JP4665974B2 (en) Information recording medium
US8739299B1 (en) Content unlocking
KR20060017762A (en) Method and apparatus for the protection of permanent storage media
JP2002184098A (en) Recording medium, recording device, reproducing device, and recording/reproducing method

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200680044734.3

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2006809526

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2008541850

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 12095136

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 3304/CHENP/2008

Country of ref document: IN

Ref document number: 1020087015659

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 2006809526

Country of ref document: EP