WO2009061931A1 - Procede de protection brevetee et donnant lieu a une licence d'un train numerique au moyen d'un droit d'auteur - Google Patents

Procede de protection brevetee et donnant lieu a une licence d'un train numerique au moyen d'un droit d'auteur Download PDF

Info

Publication number
WO2009061931A1
WO2009061931A1 PCT/US2008/082654 US2008082654W WO2009061931A1 WO 2009061931 A1 WO2009061931 A1 WO 2009061931A1 US 2008082654 W US2008082654 W US 2008082654W WO 2009061931 A1 WO2009061931 A1 WO 2009061931A1
Authority
WO
WIPO (PCT)
Prior art keywords
copyrighted material
stream
data stream
encryption
digital
Prior art date
Application number
PCT/US2008/082654
Other languages
English (en)
Inventor
Francis Lau
John R. Haggis
Original Assignee
Aerielle Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aerielle Technologies, Inc. filed Critical Aerielle Technologies, Inc.
Publication of WO2009061931A1 publication Critical patent/WO2009061931A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Definitions

  • the present invention relates generally to streaming digital media communication systems and methods, and more particularly to a method of protecting a digital stream by interposing digital material protected by copyright into the stream content, and still more particularly to a method of incorporating copyrighted information in a digital stream such that the copyrighted information must be present to decode the digital stream, thus providing means of protecting the stream commercially by requiring a license for use of the copyrighted information.
  • High-speed digital communications devices presently use streams of data to transport vocal communication, text and other data, music, and many other payloads between and among fixed and portable devices. It is advantageous for a company to protect digital streams among its proprietary or standards-based devices for several reasons, not least of which is market control and quality assurance.
  • a secret, proprietary protocol may provide a measure of control while it can be kept secret.
  • a proprietary protocol may be easily reverse-engineered or otherwise compromised over time, as many forms of commercially- viable encryption may be decoded and emulated using common tools.
  • the originator of the protocol may wish to expand its market with licensing, production, and/or distribution, which would necessitate violating the secrecy of their protocol.
  • Protocols are impossible to copyright in the abstract, since copyright protection of software extends only to a single instance of a software-code implementation or the specific content of the stream itself, which often carries content under copyright protection owned by others. Furthermore, protocols are inherently difficult to patent due to limitations in protecting bare algorithms and business methods that do not recite sufficient transformation of a substance or object. Finally, it may often be necessary to protect a stream carried over standards-based protocols to take advantage of existing infrastructure and technology.
  • the present invention addresses these problems by providing a method for ensuring the proprietary and licensable protection of a digital stream using copyright content.
  • the present invention is a novel method for using a digitized artistic copyrighted logo or textual material (i.e., lines of software code) to protect a digital data stream of any kind of digital content.
  • the present invention includes several simple, low-overhead algorithms for carrying out the process, though the possible applications of this technique are legion.
  • the copyrighted logo data extraction scheme described herein is one example of a broader novel method for extracting a limited number of bytes from a digitized copyrighted work for use as a key.
  • the key and the encryption/scrambling algorithms described herein represent one example of a novel way of combining the copyrighted material with a digital stream in such a way that the copyrighted material must be present to decode and/or use the digital stream at its destination, typically in a portable or relatively stationary consumer electronic device.
  • FIG. 1 is a schematic block diagram showing how copyrighted material is combined in a digital stream in the method of the present invention
  • FIG. 2 is a schematic block diagram showing how the copyrighted material is used to "unlock" a receiver for receipt of a digital stream transmission; and [0011]
  • FIG. 3 is a schematic block diagram showing an exclusive-OR scrambling/descrambling process employed in the present invention.
  • the essential element among the steps of the inventive data stream protection method 10 is to combine copyrighted material 12 with the digital data stream 14 from a transmitter 16 into a combined digital stream plus copyrighted material 18, and in such a way that they are inextricable, and such that the stream cannot be decoded and/or used by a receiving device 20 without the copyrighted material itself being present in the receiving entity.
  • this step if the copyrighted material is present in the receiving entity, then that receiving entity must either have been produced by the copyright holder or licensed by the copyright holder to constitute authorized or otherwise legal use.
  • any device or other receiving entity that decodes the stream into the decrypted original digital stream 22 and decrypted copyrighted material 24 is either produced by the copyright holder, is licensed by the holder, or represents an opportunity for licensing arraangements to be made with the holder.
  • the most obvious implementation of this combination requirement is encryption.
  • the present inventors chose a simple exclusive-OR scrambling technique to decrease overhead in the resources of both the encoding and decoding system, although many other techniques may be used.
  • the same copyrighted material comprises both the encryption and the decryption "key.”
  • This application of encryption does not require high security, so it is not a concern that the key is fixed and duplicated in all transmitters and receivers. Since the key may be licensed and distributed, there is a high likelihood it cannot be used legally without licensing because of the copyrighted protection.
  • the purpose of such encryption is therefore not to protect the digital-stream content against unauthorized onlookers or interceptors; the purpose is to control commerce of devices that may participate in the communication stream, and this can be done through copyright-infringement law and licensing.
  • Another novel aspect of the present inventive method is the step of fashioning the copyrighted material and the method by which the copyrighted material can be used as an encryption key.
  • Exclusive-OR keys may be any desired length.
  • a product may call for a key of very limited, conservative length (a few dozen bytes, for instance). This requirement, therefore, calls for the creation of copyrighted material of that limited length or shorter.
  • the essence of creating copyrighted material is that it be a "creative form of expression," such as a poem, an artistic design or image, or other form of art comprising an original work of authorship meeting at least the minimal standards of originality for protection.
  • Any of a number of kinds of work may be protected, including literary works, movies, dances, musical compositions, audio recordings, paintings, drawings, sculptures, photographs, software, radio and television and broadcasts, and so forth.
  • a poem, or even simple lines of prose created by the author and copyright holder could be used as an encryption or scrambling key if the implementation allows long key lengths.
  • any creative written work is suitable for this application as long as the combining algorithm does not demand a limited key length.
  • the best mode of practicing the present invention entails treating the digital stream in such a way that the stream data cannot be used without the application of the copyrighted material.
  • the model of encryption and decryption with a copyrighted key is a common instance of this principle, and exclusive-OR scrambling and descrambling is a very efficient and economical encryption/decryption method.
  • FIG. 3 illustrates the exclusive-OR scrambling (or descrambling) process 40 employed in the present invention.
  • Scrambling and descrambling are perfectly identical: the same key 42 in the same process produces a scrambled stream 44 from a plain data input 46, and derives a plain stream output from scrambled data on the input.
  • Scrambling or descrambling may be done on a byte-by-byte (or larger word- oriented) basis rather than bit-by-bit, as depicted in the diagram.
  • To apply a short key to a relatively longer data stream one need only repeat the sequence of the key once the end is reached. As long as there is a point of synchronization, such as restarting the key sequence at 5 the beginning of each packet of the lower-order protocol, one can keep the cycling of the key synchronized between the transmitter and receiver.
  • the encrypted stream may be encapsulated 0 within another protocol, such as TCP/IP or Bluetooth, without the need for protocol customizations to support unlock codes or some other out-of-band signaling.
  • another protocol such as TCP/IP or Bluetooth
  • the copyrighted material can be as minute as a sequence of bytes forming a bit pattern of a work of creative graphic art.
  • Anyone intending to generate and send or receive and decode a compatible digital stream could therefore be required to obtain a license for the authorized use of the copyrighted material in order to comply with applicable copyright law.
  • This method works even for the complicated case of broadcasting a stream from one source to many recipients, across a wide variety of transport protocols and media. It forms a way of locking up even a universal protocol for proprietary use.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

L'invention concerne un procédé de protection d'un train de données envoyé par émetteur. Ce procédé consiste : à combiner un objet protégé par un droit d'auteur avec un train de données numériques en clair en un train numérique combiné, de sorte que ce train numérique combiné ne puisse pas être utilisé un dispositif récepteur ne disposant pas de l'objet protégé par un droit d'auteur.
PCT/US2008/082654 2007-11-08 2008-11-06 Procede de protection brevetee et donnant lieu a une licence d'un train numerique au moyen d'un droit d'auteur WO2009061931A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US98656807P 2007-11-08 2007-11-08
US60/986,568 2007-11-08

Publications (1)

Publication Number Publication Date
WO2009061931A1 true WO2009061931A1 (fr) 2009-05-14

Family

ID=40626170

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/082654 WO2009061931A1 (fr) 2007-11-08 2008-11-06 Procede de protection brevetee et donnant lieu a une licence d'un train numerique au moyen d'un droit d'auteur

Country Status (1)

Country Link
WO (1) WO2009061931A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6425081B1 (en) * 1997-08-20 2002-07-23 Canon Kabushiki Kaisha Electronic watermark system electronic information distribution system and image filing apparatus
US20050018873A1 (en) * 1993-11-18 2005-01-27 Rhoads Geoffrey B. Method and system for managing, accessing and paying for the use of copyrighted electronic media

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050018873A1 (en) * 1993-11-18 2005-01-27 Rhoads Geoffrey B. Method and system for managing, accessing and paying for the use of copyrighted electronic media
US6425081B1 (en) * 1997-08-20 2002-07-23 Canon Kabushiki Kaisha Electronic watermark system electronic information distribution system and image filing apparatus

Similar Documents

Publication Publication Date Title
CN1186731C (zh) 保护计算机系统内版权数据的装置、方法
CN101491078B (zh) 安全分发内容的方法、设备以及系统
CN100592683C (zh) 来自数字权利管理加密解密器的受保护的返回路径
CN101719910B (zh) 一种实现内容保护的终端设备及其传输方法
AU781797B2 (en) Stream continuity enforcement
US6697490B1 (en) Automatic resynchronization of crypto-sync information
EP2113152B1 (fr) Système d'accès conditionnel
WO2002080444A3 (fr) Procede et appareil d'emission en continu de donnees a l'aide de cles cryptographiques de rotation
CN101518073A (zh) 用于产生计数器块值的方法
KR100336265B1 (ko) 디지털 신호의 복제 방지를 위한 시스템 및 방법
JP2005514717A (ja) マルチメディアのマルチキャスト伝送の受信器に一意の透かしの生成
CN101572805B (zh) 一种安全的视频传输系统及其应用方法
CN100521771C (zh) 一种融合互联网和有线电视网络环境下的有条件接收系统
WO2002041101A3 (fr) Procede et systeme de transmission de donnees a securite renforcee conforme a un protocole de reseau
JP2008124935A (ja) 送信装置、受信装置、情報通信システム
WO2009061931A1 (fr) Procede de protection brevetee et donnant lieu a une licence d'un train numerique au moyen d'un droit d'auteur
Bahirat et al. Overview of secure data transmission using Steganography
EP2829072B1 (fr) Filigrane résistant au chiffrement
CN114726594B (zh) 一种基于网络传输的流媒体加密方法
KR100851016B1 (ko) 스크램블링/디스크램블링 장치 및 그를 이용한 영상 송수신 시스템
KR20060113091A (ko) 디지털 수신기의 제한 수신 방법
JP2007181017A (ja) データの配信・受信システムおよびデータの配信・受信方法
CN104113540A (zh) 面向安卓平台的数字音乐防copy系统
CN114040229B (zh) 一种视频加解密方法及装置
Iyare et al. Improved High Definition Multimedia Interface Authentication Mechanism

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08846741

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08846741

Country of ref document: EP

Kind code of ref document: A1