WO2008021594A2 - Distribution en borne numérique de stockage sécurisée - Google Patents

Distribution en borne numérique de stockage sécurisée Download PDF

Info

Publication number
WO2008021594A2
WO2008021594A2 PCT/US2007/067910 US2007067910W WO2008021594A2 WO 2008021594 A2 WO2008021594 A2 WO 2008021594A2 US 2007067910 W US2007067910 W US 2007067910W WO 2008021594 A2 WO2008021594 A2 WO 2008021594A2
Authority
WO
WIPO (PCT)
Prior art keywords
content
player
storage device
mass storage
kiosk
Prior art date
Application number
PCT/US2007/067910
Other languages
English (en)
Other versions
WO2008021594A3 (fr
Inventor
Eran Shen
Reuven Elhamias
Original Assignee
Sandisk Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/382,184 external-priority patent/US20070260615A1/en
Application filed by Sandisk Corporation filed Critical Sandisk Corporation
Publication of WO2008021594A2 publication Critical patent/WO2008021594A2/fr
Publication of WO2008021594A3 publication Critical patent/WO2008021594A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Definitions

  • the present application is generally related to the usage of flash based mass storage devices for delivering, storing, and reproducing encoded and copy protected movies and other content in a secure fashion.
  • movies are recorded on a medium such as a DVD or a videocassette, and the movies are then distributed upon the medium. For example, a consumer will travel to a store and rent a movie, or more recently, a DVD containing a movie is mailed to the consumer. While for quite some time now, although digital content has been available to download over the internet to home computers, the copyright owners of major movies have not allowed the movies to be purchased or rented for home download. This is primarily because of fears of unauthorized duplication and the associated loss of revenue.
  • one aspect of the present invention relates to a system and method of supplying content to an individual.
  • a memory card or USB flash drive is received at a (std. or contactless) receptacle of a kiosk for distributing the content.
  • a first verification is then performed, the first verification of the authenticity of the memory card, and occurring while at the receptacle of the kiosk, by comparing first and second keys of an RSA key pair.
  • a second verification is then performed, the second verification of the memory card and the user, by verifying a public key certificate chain issued by a certificate authority. Then if both the first and second verification are successful a container file is created, and a media file is placed in the container file together with a pluggable decoding module. The container file is then transferred from the kiosk to the memory card.
  • one aspect of the present invention relates to supplying content to an individual in an encoding format that is supported by a user's player.
  • An indication of one or more encoding formats supported by a player used with the memory card is stored in the memory card when it is connected with the user's player.
  • a first verification is performed.
  • the first verification is of the authenticity of the memory card and takes place while connected to the kiosk by comparing first and second keys of an RSA key pair.
  • a second verification is then performed, the second verification is of the memory card and the user and involves verifying a public key certificate chain issued by a certificate authority.
  • the content is transferred from the kiosk to the memory card in one or more of the supported content encoding formats. In this way, the problem where the content is provided in a format that cannot be decoded by the user's hardware is eliminated.
  • FIG. IA is block diagram of distribution and rendering system 5.
  • FIG. IB is a schematic diagram of MSD 10 seen in FIG. IA.
  • FIG. 1C is a block diagram of authentication entities coupled to network 50.
  • FIG. 2A is a high level flowchart of a method 200A of providing content according to an embodiment of the present invention.
  • FIG. 2B is a high level flowchart of a method 200B of providing content according to an embodiment of the present invention.
  • FIG. 3A is flowchart of a method 300 of providing content according to an embodiment of the present invention.
  • FIG. 3B is a flowchart of an embodiment of an encryption/decryption process than can be used in the kiosk and card/player.
  • FIG. 4 is a flowchart illustrating an embodiment of step 230 of FIG. 2 A.
  • FIG. 5 is a schematic diagram illustrating a container file with the media file and the codec file as it is transferred from the kiosk.
  • FIG. 6 is a flowchart illustrating an embodiment of step 250 of FIG. 2 A. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • FIG. IA is block diagram of distribution and rendering system 5.
  • MSD 10 is used as a medium to store content received from a secure digital kiosk.
  • MSD 10 may be a memory card or universal serial bus (“USB”) flash drive, and comprises connector 12.
  • USB universal serial bus
  • mass storage memory cards such as the Compact Flash (“CF) Card, Secure Digital (“SD”) Card, Multi Media Card (“MMC”), mini SD card, micro SD card, various forms of memory sticks, XD card etc.
  • CF Compact Flash
  • SD Secure Digital
  • MMC Multi Media Card
  • mini SD card mini SD card
  • micro SD card various forms of memory sticks
  • XD card various forms of memory sticks
  • XD card XD card etc.
  • Connector 12 comprises the contacts and contact pattern of a USB connector or memory card depending upon the embodiment.
  • the kiosk may communicate with the MSD through near field communications ("NFC") rather than through the connector 12.
  • Kiosk 40 also comprises a compatible connector to receive MSD 10. It therefore also comprises an NFC capable transceiver (not shown). Kiosk 40 is a distribution point for content. That is to say that someone desirous of content can travel to the kiosk and load the content onto MSD 10. Later, that user can then render or "playback" the content from MSD 10 with player 30. Player 30 also has a connector 32 compatible with connector 12 to interface with MSD 10.
  • Kiosk 40 may comprise conventional computing components such as a microprocessor, display, human interface devices, and storage devices (not shown) but is not a personal computer ("PC"), but rather a publicly available computer, preferably, but not necessarily, dedicated to providing content and performing the transaction for the content, whether as a sale or limited duration license.
  • the kiosk may also comprise a credit card reader or means for accepting cash payments, including debits from the MSD itself if it is equipped to act as an "electronic wallet” and carry out transactions.
  • kiosk 40 and player 30 are connected to network 50 which has access to the Internet and various entities that can be accessed via the Internet. Security mechanisms within the kiosk, storage device, and player, as well as the entities accessed via the Internet, will ensure that content is only provided to authorized users and/or devices, as will be described later.
  • MSD small form factor
  • movies could be loaded onto MSD 10 rather than on DVD's or video tapes for that matter.
  • FIG. IB illustrates the main components of an embodiment of MSD 10.
  • MSD 10 comprises a memory controller 18, which controls read/write operations from flash EEPROM 16 via bus 24.
  • An optional ROM 14 may also be included for storage of microcode.
  • Host interface bus 26 communicates with a host device such as kiosk 40 or player 30.
  • memory controller 18 comprises a hardware based encryption engine 40 and a firmware integrity circuit 21. These are used, among other things, to encrypt the firmware when it is stored in flash EEPROM 16 and may therefore otherwise be vulnerable to tampering or replacement with fraudulent firmware that circumvents copy protection mechanisms.
  • U.S. Patent Application No. 11/285,600 Hardware Driver Integrity Check Of Memory Card Controller Firmware to M. Holtzman et al.
  • Certain embodiments of the MSD may also comprise NFC circuitry including and NFC controller and antenna in order to transmit data with various hosts without using the contacts of the MSD.
  • NFC circuitry including and NFC controller and antenna in order to transmit data with various hosts without using the contacts of the MSD.
  • NFC hardware for further information on incorporation of NFC hardware in MSD 100, please refer to U.S. Patent Application No. 11/321,833 to F. Jogand Coulomb, entitled "Methods Used in a Nested Memory System With Near Field Communications Capability.”
  • FIG. 1C is a block diagram of authentication entities coupled to network 50.
  • PKI public key infrastructure
  • arrangements enable users to be authenticated to each other, and to use the information in identity certificates (i.e., each other's public keys) to encrypt and decrypt messages travelling to and fro.
  • identity certificates i.e., each other's public keys
  • the foundation or framework for the PKI is defined in the ITU-T X.509 Recommendation which is incorporated by this reference it is entirety.
  • a PKI consists of client software, server software such as a certificate authority, hardware and operational procedures.
  • a user may digitally sign messages using his private key, and another user can check that signature (using the public key contained in that user's certificate issued by a certificate authority within the PKI). This enables two (or more) communicating parties to establish confidentiality, message integrity and user authentication without having to exchange any secret information in advance.
  • FIG. 1C shows one possible implementation of the embodiment that utilizes the public key infrastructure for verification/authorization of credentials.
  • End Entities are sometimes thought of as end-users. Although this is often the case, the term End Entity is meant to be much more generic.
  • An End Entity can be an end-user, a device such as a router or a server, a process, or anything that can be identified in the subject name of a public key certificate.
  • End Entities can also be thought of as consumers of the PKI -related services.
  • the end entity may be any of: mass storage device 10, alone or together with player 30; player 30; and kiosk 40 or users of any of these pieces of hardware.
  • Public keys are distributed in the form of public key certificates by CA 52.
  • a certificate may be required from MSD 10 before KIOSK 40 or validating entity would allow a user of MSD 10 to receive content from KIOSK 40.
  • Public key certificates are digitally signed by the issuing CA 53 (which effectively binds the subject name to the public key) and stored in repository 61.
  • CAs are also responsible for issuing certificate revocation lists ("CRLs") unless this has been delegated to a separate CRL Issuer. CAs may also be involved in a number of administrative tasks such as end-user registration, but these are often delegated to a separate registration authority (“RA”) which is optional and not shown in FIG. 1C.
  • RA registration authority
  • CA 52 or another CA can also serve as the key backup and recovery facility although this function can also be delegated to a separate component.
  • CAs are often thought of as the "source of trust" in a PKI.
  • End Entities are configured with one or more "trust anchors" which are then used as the starting point to validate a given certification path.
  • trust anchors Once trust is established via the PKI interface between kiosk 40 and MSD 10, alone or in combination with player 30, loading into the MSD can take place.
  • PKI authentication between MSD 10 and player 30 may also be required in some embodiments before rendering or playback can take place.
  • FIG. 2A is a flowchart of method 200A.
  • step 210 the codecs supported by a user's player are determined. The player can be instructed, through menus of the player, to save an indication of the supported codecs to the card. Then an indication of the supported codecs is written to the mass storage device.
  • step 230 the user selected content is loaded into the portable flash mass storage device in one of the supported encoding formats, as determined in step 210.
  • the MSD will be loaded into or otherwise connected to the kiosk when this takes place.
  • the stored indication will be read by the kiosk in order to select the proper encoding format for the content.
  • step 250 when the MSD is coupled or inserted into the player, the content on the MSD will be rendered (decoded) using the appropriate codec.
  • the content can first be copied to a memory of the player, and decoded from that memory, given that the player and card have mutually authenticated each other and determined that the player has adequate copy protection safeguards.
  • FIG. 2B is a flowchart of method 200B, according to another embodiment of the present invention.
  • step 215 content encoded in a given format will be packaged with the appropriate codec required to later decode it when playback is desired. In this way, the situation where the player does not have the proper decoder to decode the encoded content is avoided.
  • step 235 the packaged content and codec are loaded into the mass storage device.
  • step 245 the codec is transferred from the mass storage device into the player and stored in the appropriate location so that it may be accessed as necessary. This is preferably in a library of a media player application and will be described below in more detail with regard to FIG. 5.
  • FIG. 3 A is a flowchart of method 300.
  • the user connects the MSD with a player, typically by plugging the MSD into a receptacle of the player. As mentioned earlier, connection may alternatively be through near field communications.
  • the player stores its credentials, preferably in the form of a certificate chain, along with an indication of the codecs supported by the player, in a memory of the MSD. The player may also store the bit rates that it supports.
  • the kiosk may store an indication that it supports the MP4 video format at bit rates up to 60 fps and/or the MP3 audio format at bit rates up to 128 kbps.
  • the kiosk reads the player credentials stored in the card and authenticates the player. If the player is not authenticated, the process will not go forward, in order to avoid providing content to a source that may duplicate or distribute the content in an unauthorized manner.
  • step 312 the player is authenticated, i.e. the certificate chain is verified, the process will then go forward.
  • step 316 the kiosk will then display a list of movies available in the codec supported by the player.
  • the list will preferably contain movies that can be provided at the appropriate bit rate. In order to do this it reads an indication of the supported codecs/formats from the memory of the MSD.
  • step 320 the user then selects the movie(s) he wishes to receive (rent or buy) from the kiosk.
  • step 324 the selected movie(s) are downloaded to the player encrypted in a way only the player can decipher or decrypt.
  • the file containing the movie is encrypted using the public key of the player.
  • a certificate is also provided with the movie and loaded into the MSD.
  • the certificate preferably includes an indication of the validity period of the movie.
  • the movie may only be playable for a finite period of time (e.g. 90 days) from the date it was loaded into the MSD.
  • the player checks the certificate validity and plays the movie if within the validity period.
  • FIG. 3B is a flowchart of an embodiment of an encryption/decryption process than can be used in the kiosk and card/player.
  • the content is encrypted with a product of the RSA key pair.
  • an AES content key is encrypted with the public key of the RSA key pair. This occurs on the kiosk side.
  • the content key is decrypted with the private key of the RSA key pair in step 356. Once this takes, place, in step 360 the content itself is decrypted with the decrypted content key.
  • FIG. 4 is a flowchart illustrating one embodiment of step 230 of FIG. 2A.
  • the user inserts the MSD into a receptacle of the digital kiosk.
  • step 408 the kiosk and MSD mutually authenticate each other as trusted devices.
  • Step 408 is optional and is performed according to the well known SD card authentication protocol, in embodiments where the MSD employs the SD protocol.
  • step 412 RSA keys of the MSD and kiosk are compared. Of course, before they are compared they would have been stored in each of the respective devices. If the RSA keypair comparison is not successful, then the process will terminate. If a match is determined, the process will proceed to step 420, and the kiosk will verify the MSD certificate by accessing a trusted authority (e.g. CA 52 or repository 61). In step 424, the kiosk will then check the indication on the MSD of the supported codecs, and the preferred bit rates if present.
  • a trusted authority e.g. CA 52 or repository 61
  • Steps 408, 412, and 420 may all be considered authentication processes.
  • the kiosk will load the content in the supported format, and at a preferred bit rate if such indication was present, along with an indication of the validity period of the content, into the MSD.
  • the kiosk may also check a certificate revocation list to ensure that the certificate of the MSD has not been revoked, as will be discussed later with regard to FIG. 6.
  • FIG. 5 is a schematic diagram illustrating a container file with the media file and the codec file as it is transferred from the kiosk in some embodiments.
  • the content whether it be a movie or some other type of content, will be in the form of a media file.
  • the media file 501 will be placed in container file 523.
  • the media file will be encoded, as mentioned earlier, in a specific format dependent upon what type of encoder was utilized to encode the media file.
  • the codec 521 necessary to decode the media file 501 is also placed in container file 523.
  • the container file 523 is then loaded into MSD 10, which is eventually placed in player 30.
  • Codec 521 which is preferably a plug-in type codec is then transferred to the code library 511 of media application 507.
  • Media application 507 is the software application of player 30 that is used to render or play back content, and optionally to encode content depending upon the nature of player 30.
  • a device 30 capable of recording audio or video would also include an encoder to digitally encode the content before it is recorded.
  • Application 507 outputs the content which is eventually reproduced by a screen and/or speakers of device 30, or devices coupled thereto, as represented by arrow 525.
  • FIG. 6 illustrates one possible embodiment of steps that may take place as part or playing content, as depicted in step 250 of FIG. 2A.
  • the player checks the validity period of the content the user wishes to play.
  • the player checks if the content is still within the validity period. If it is not, in step 610, an error condition will be present and may be displayed to the user. If, however, the content is still within the validity period, in step 612, the player optionally checks a certificate revocation list.
  • the revocation list may be stored in a memory of the player or MSD, or if the player has access to the Internet, it may be instantaneously checked with a trusted authority.
  • step 614 If, as seen in step 614, the certificate of the content has been revoked, the player will not play the content, but an error condition will again be present and indicated as represented by step 610. If, however, the certificate has not been revoked, in step 618 the player will decrypt the content using a private key of the player.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

Le procédé et le système proposés permettent de fournir des films ou d'autres contenus utilisant un lecteur flash ou une carte à mémoire flash au lieu de DVD ou autres formats. Un utilisateur reçoit le contenu sur le lecteur flash à partir d'une borne. Le système s'assure qu'un codeur-décodeur (codec) pris en charge par le lecteur de l'utilisateur sera utilisé pour coder le contenu ; ou bien, dans certains modes de réalisation, un codeur-décodeur correspondant est fourni avec le film. Des mécanismes d'authentification et de cryptage assurent que le film est fourni uniquement à une carte et/ou à un joueur authentiques à partir d'une borne, de sorte que les films ne puissent pas être fournis à des dispositifs flash qui ne disposent pas de mécanismes de sécurité appropriés pour sauvegarder le contenu ou à des personnes non autorisées à recevoir le film autrement.
PCT/US2007/067910 2006-05-08 2007-05-01 Distribution en borne numérique de stockage sécurisée WO2008021594A2 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US11/382,184 US20070260615A1 (en) 2006-05-08 2006-05-08 Media with Pluggable Codec
US11/382,184 2006-05-08
US11/532,420 US20070282747A1 (en) 2006-05-08 2006-09-15 Secure storage digital kiosk distribution
US11/532,431 US20070267474A1 (en) 2006-05-08 2006-09-15 Secure storage digital kiosk distribution methods
US11/532,420 2006-09-15
US11/532,431 2006-09-15

Publications (2)

Publication Number Publication Date
WO2008021594A2 true WO2008021594A2 (fr) 2008-02-21
WO2008021594A3 WO2008021594A3 (fr) 2008-04-17

Family

ID=38969335

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/067910 WO2008021594A2 (fr) 2006-05-08 2007-05-01 Distribution en borne numérique de stockage sécurisée

Country Status (1)

Country Link
WO (1) WO2008021594A2 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010141175A1 (fr) * 2009-06-04 2010-12-09 Sandisk Corporation Procédé et système de commande de réplication de contenu
EP2428908A1 (fr) * 2010-09-14 2012-03-14 NCR Corporation Contenu multimédia sur un kiosque de téléchargement numérique
US8761402B2 (en) 2007-09-28 2014-06-24 Sandisk Technologies Inc. System and methods for digital content distribution
US8875283B2 (en) 2012-04-10 2014-10-28 Blackberry Limited Restricted access memory device providing short range communication-based security features and related methods

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001014981A1 (fr) * 1999-08-19 2001-03-01 Audiobase, Inc. Systeme et procede permettant de fournir la livraison d'un contenu audio/video sur un reseau
WO2003023676A1 (fr) * 2001-09-07 2003-03-20 Entriq Limited Bvi Reseau distribue de gestion de droits numeriques et procedes permettant d'acceder a ce reseau, de l'utiliser et de le mettre en oeuvre
US6647389B1 (en) * 1999-08-30 2003-11-11 3Com Corporation Search engine to verify streaming audio sources
US20050132209A1 (en) * 2003-12-14 2005-06-16 Hug Joshua D. Certificate based digital rights management

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001014981A1 (fr) * 1999-08-19 2001-03-01 Audiobase, Inc. Systeme et procede permettant de fournir la livraison d'un contenu audio/video sur un reseau
US6647389B1 (en) * 1999-08-30 2003-11-11 3Com Corporation Search engine to verify streaming audio sources
WO2003023676A1 (fr) * 2001-09-07 2003-03-20 Entriq Limited Bvi Reseau distribue de gestion de droits numeriques et procedes permettant d'acceder a ce reseau, de l'utiliser et de le mettre en oeuvre
US20050132209A1 (en) * 2003-12-14 2005-06-16 Hug Joshua D. Certificate based digital rights management

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"Matsushita electric, Sandisk and Toshiba agree to join forces to develop and promote next generation secure memory card - SD (secure digital) memory card expected to unleash wave of new digital AV (audio/video) consumer products and enable internet and wireless e-commerce" INTERNET CITATION, [Online] 2001, XP002989940 Retrieved from the Internet: URL:http://web.archive.org/web/20010210202809/www.sdcard.org/news-5.htm> [retrieved on 2003-08-04] *
BECKER M ET AL: "A study of the DVD content scrambling system (CSS) algorithm" SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, 2004. PROCEEDINGS OF THE FOURTH IEEE INTERNATIONAL SYMPOSIUM ON ROME, ITALY DEC. 18-21, 2004, PISCATAWAY, NJ, USA,IEEE, 18 December 2004 (2004-12-18), pages 353-356, XP010800526 ISBN: 0-7803-8689-2 *
MENEZES ET AL: "HANDBOOK OF APPLIED CRYPTOGRAPHY" HANDBOOK OF APPLIED CRYPTOGRAPHY, CRC PRESS SERIES ON DISCRETE MATHEMATICES AND ITS APPLICATIONS, BOCA RATON, FL, CRC PRESS, US, 1997, pages 403-405,506-515,570, XP002165287 ISBN: 0-8493-8523-7 *
SCHNEIER B: "APPLIED CRYPTOGRAPHY" APPLIED CRYPTOGRAPHY. PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C, NEW YORK, JOHN WILEY & SONS, US, 1996, pages 574-577, XP002922914 ISBN: 0-471-11709-9 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8761402B2 (en) 2007-09-28 2014-06-24 Sandisk Technologies Inc. System and methods for digital content distribution
WO2010141175A1 (fr) * 2009-06-04 2010-12-09 Sandisk Corporation Procédé et système de commande de réplication de contenu
US9083685B2 (en) 2009-06-04 2015-07-14 Sandisk Technologies Inc. Method and system for content replication control
EP2428908A1 (fr) * 2010-09-14 2012-03-14 NCR Corporation Contenu multimédia sur un kiosque de téléchargement numérique
US10296726B2 (en) 2010-09-14 2019-05-21 Ncr Corporation Multi-media content at a digital download kiosk
US8875283B2 (en) 2012-04-10 2014-10-28 Blackberry Limited Restricted access memory device providing short range communication-based security features and related methods

Also Published As

Publication number Publication date
WO2008021594A3 (fr) 2008-04-17

Similar Documents

Publication Publication Date Title
US20070267474A1 (en) Secure storage digital kiosk distribution methods
TW514845B (en) Data storage regenerator and data storage processing method and program providing media
US6950941B1 (en) Copy protection system for portable storage media
US7124443B2 (en) Information transaction system
KR101362380B1 (ko) 디지털 저작권 관리 방법 및 장치
CN101903889B (zh) 数字版权管理的设备和方法
JP4740157B2 (ja) デジタルデータコンテンツの保護
KR100434634B1 (ko) 디지털 저작물인 콘텐트를 처리하는 저작물 보호시스템
EP2158716B1 (fr) Liaison de licences de contenu à des dispositifs de stockage portables
CN101714195A (zh) 一种基于数字证书的新型数字版权保护方法和装置
US20040243488A1 (en) Storage medium rental system
JP2003115163A (ja) 認証のためのハイブリッド光ディスクを使用する、ネットワークを介した電子的コンテンツの配送
US20050027991A1 (en) System and method for digital rights management
JP4455053B2 (ja) 制御ワードを用いて暗号化されたサービスに選択的にアクセスするデバイス及び方法並びにスマートカード
US20050033956A1 (en) Method and system for the authorised decoding of encoded data
JP2004362547A (ja) スマートカードを用いた装置認証によりホームドメインを構成する方法、及びホームドメインを構成するためのスマートカード
JP2010267240A (ja) 記録装置
JP2001094554A (ja) 情報送信システム、情報送信装置、情報受信装置、情報送信方法
US20030217271A1 (en) Use of smart card technology in the protection of fixed storage entertainment assets
US20040243815A1 (en) System and method of distributing and controlling rights of digital content
WO2008021594A2 (fr) Distribution en borne numérique de stockage sécurisée
KR101858562B1 (ko) 이트레이닝 컨텐츠 사용을 위한 암호화 시스템
JP3684179B2 (ja) セキュリティ機能を有するメモリカード
KR100996992B1 (ko) Drm이 적용된 컨텐츠를 저장 및 사용하기 위한 포터블저장매체 그리고 이를 구현하기 위한 방법 및 시스템
JP2002149061A (ja) レンタルコンテンツ流通システムおよびその方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07840160

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07840160

Country of ref document: EP

Kind code of ref document: A2