Movatterモバイル変換


[0]ホーム

URL:


USRE47772E1 - Secure content enabled hard drive system and method - Google Patents

Secure content enabled hard drive system and method
Download PDF

Info

Publication number
USRE47772E1
USRE47772E1US14/663,402US201514663402AUSRE47772EUS RE47772 E1USRE47772 E1US RE47772E1US 201514663402 AUS201514663402 AUS 201514663402AUS RE47772 EUSRE47772 EUS RE47772E
Authority
US
United States
Prior art keywords
protected
content
storage medium
information
digital rights
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US14/663,402
Inventor
Michael B. Diamond
Jonathan B. White
Piers J. Daniell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nvidia Corp
Original Assignee
Nvidia Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nvidia CorpfiledCriticalNvidia Corp
Priority to US14/663,402priorityCriticalpatent/USRE47772E1/en
Application grantedgrantedCritical
Publication of USRE47772E1publicationCriticalpatent/USRE47772E1/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present invention facilitates convenient and secure distribution of proprietary content. A present secure content enabled drive system and method permits flexible use of storage medium for both protected distribution of information and user definable storage use. In one embodiment, a computer readable storage medium includes an unprotected information portion, a protected information portion and a protection interface. The unprotected portion stores unprotected information. The protected content portion stores protected information. The protection interface protects information in the protected content portion from unauthorized access.

Description

FIELD OF THE INVENTION
The present invention relates to the field of semiconductor manufacturing. In particular, the present invention relates to a system and method for dynamically configuring operational characteristics of functional components within an integrated circuit secure content distribution. More particularly, some embodiments relate to a secure content enabled drive system and method that permits flexible use of a storage medium for both protected distribution of information and user definable storage area.
BACKGROUND OF THE INVENTION
Electronic systems and circuits have made a significant contribution towards the advancement of modern society and are utilized in a number of applications to achieve advantageous results. Numerous electronic technologies such as digital computers, calculators, audio devices, video equipment, and telephone systems facilitate increased productivity and cost reduction in analyzing and communicating data, ideas and trends in most areas of business, science, education and entertainment. Electronic systems designed to produce these results usually involve interfacing with a user and the interfacing often involves presenting information in a variety of formats (e.g., video, graphical representation of images, audio, text, etc.). The information is often proprietary and managing the distribution of proprietary information in modern electronic systems can be difficult.
Electronic systems are often utilized to present a vast variety of information for numerous different purposes. The information can be associated with a number of different activities, user experiences, presentation formats, etc. For example, electronic systems use proprietary information in the presentation of movies, music, video games, books, etc. The information can have a variety of formats and/or conform to number of different protocols. For example, information can be configured to be compatible with a variety of standards such as joint photographic expert group (JPEG) standards, moving pictures expert group (MPEG) standards, motion picture expert group audio layer3 (MP3) standards, and/or portable document format (PDF) standards.
Digital distribution of proprietary content can be problematic. Traditional information communication and storage technologies often make copying of proprietary information relatively easy. However, developers of proprietary information usually have an economic interest in the content and desire to restrict the distribution of the information to individuals that purchase a right to access the content.
Electronic systems usually store information on a memory or storage medium. The information can be stored on a variety of storage mediums such as random access memories, hard disk drives (HDD), compact disks (CDs), digital versatile disks (DVDs), etc. The manner in which proprietary information is written and read to and from a storage medium of an end use presentation system can have significant impacts on the ability to enforce proprietary rights associated with the digital information. Traditional end use electronic systems usually have a storage medium (e.g., hard disk) that a user can readily write and read information to and from. A user typically has to load or write information to the traditional end use storage medium. Loading information onto end use hard disks can be inconvenient and problematic.
One traditional method of loading information onto an end use storage medium is to utilize a network to download the information from a remote location. Conventional network access can be inconvenient especially for portable or mobile end use platforms where reliable connections are not readily available. For example, the end use mobile platform has to be connected to a network often limiting mobility to the availability of a cable connection. Even wireless connections can have service location limitations, as some areas do not have adequate transmission and/or reception facilities. In addition, a number of technical problems can be encountered such as slow connections and/or communication interruptions. Limited bandwidth and connectivity problems can significantly impact the amount of time required to download information. Waiting for information to download can be disruptive to a user experience, especially when a user desires “instant on” presentations.
Proprietary information can be loaded on a storage medium before shipment. For example, proprietary digital content such as movies, songs etc, are usually distributed in a storage medium such as a compact disk (CD) or digital video disk (DVD). However, conventional distribution of proprietary content loaded on traditionally configured storage mediums is usually limited. For example, additional proprietary content can not typically be added to the storage medium after shipment. The amount of proprietary information stored on a particular storage medium (e.g., CD) is also often relatively limited. For example, a CD is usually limited to a relatively few songs (e.g., a limited number of songs from a particular artist) without the ability to offer an increase in proprietary content access for that CD at a later date.
SUMMARY
The present invention facilitates convenient and secure distribution of proprietary content. A present secure content enabled drive system and method permits flexible use of storage medium for both protected distribution of information and user definable storage use. A significant amount of proprietary information with regulated access can be distributed on protected portion of the storage medium while still providing storage resources for discretionary utilization by an end user. In addition to protecting information in the protected information portion, seamless and intuitive authorized interaction between information the protected content and the unprotected information is permitted. In one embodiment, a computer readable storage medium includes an unprotected portion, a protected portion and a protection interface. The unprotected information portion stores unprotected information. The protected information portion stores protected information. The protection interface protects information in the protected content portion from unauthorized access. A protection interface can provide a micro-operating system that permits authorized content presentation (e.g., video, audio, etc.) without requirement of another operating system.
In one exemplary implementation, content on the protected portion resides in an ATA-5 hard disk drive (HDD) and is restricted to access by trusted devices. The HPA area includes its own partition and encrypted file system. After successfully completing a trusted machine verification handshake process, a trusted machine is able to participate in a file system decryption process. In one embodiment, each file on a protected portion of a drive is encrypted in a special a 2 pass two-pass encryptionis utilized. The first pass uses a real-time decryptable algorithm so it can be played back in real time. A second pass locks the file while access is unauthorized (e.g., unpaid for). Unlocked content can be protected by a variety of mechanisms. For example, after a file is unlocked it is marked and limited to being played back on trusted devices and the trusted devices have a limited number of output options as determined by the protected content.
DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention by way of example and not by way of limitation. The drawings referred to in this specification should be understood as not being drawn to scale except if specifically noted.
FIG. 1A is a block diagram of protectedinformation storage medium100 in accordance with one embodiment of the present invention.
FIG. 1B is a block diagram of a unified look and feel graphical user interface (GUI) in accordance with one embodiment of the present invention.
FIG. 2 is a block diagram of an exemplary computer system upon which embodiments of the present invention can be implemented.
FIG. 3 is a flow chart of a content protected storage medium method in accordance with one embodiment of the present invention.
FIG. 4A is a flow chart of digital right management method in accordance with one embodiment of the present invention.
FIG. 4B is a flow chart of a digital rights management system in accordance with one embodiment of the present invention.
FIG. 5 is a flow chart of secure content enabled drive digital rights establishment process in accordance with one embodiment.
DETAILED DESCRIPTION
Reference will now be made in detail to the preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with the preferred embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims. Furthermore, in the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be obvious to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.
Some portions of the detailed descriptions which follow are presented in terms of procedures, logic blocks, processing, and other symbolic representations of operations on data bits within a computer memory. These descriptions and representations are the means generally used by those skilled in data processing arts to effectively convey the substance of their work to others skilled in the art. A procedure, logic block, process, etc., is here, and generally, conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps include physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, magnetic, optical, or quantum signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present application, discussions utilizing terms such as “processing”, “computing”, “calculating”, “determining”, “displaying” or the like, refer to the action and processes of a computer system, or similar processing device (e.g., an electrical, optical, or quantum, computing device), that manipulates and transforms data represented as physical (e.g., electronic) quantities. The terms refer to actions and processes of the processing devices that manipulate or transform physical quantities within a computer system's component (e.g., registers, memories, other such information storage, transmission or display devices, etc.) into other data similarly represented as physical quantities within other components.
FIG. 1A is a block diagram of protectedinformation storage medium100 in accordance with one embodiment of the present invention. Protectedinformation storage medium100 includes aprotection interface110, an unprotectedinformation storage portion120 and a protected information storage portion130.Protection interface110 protects information in protected information storage portion130. For example,protection interface110 permits authorized access to information in unprotectedinformation storage portion120 and prevents unauthorized access to information in protected information storage portion130. Unprotectedinformation storage portion120 stores unprotected information. Protected information storage portion130 stores protected information and access to the protected information is restricted by protection interface110 (e.g., in accordance with a secure content enabling disk (SCED) digital rights management (DRM) protocol).
In addition to protecting information in protected information portion130,protection interface110 permits seamless and intuitive authorized interaction with information in the protected content and the unprotected information. In one exemplary implementation,protection interface110 is a micro operating system or micro kernel and provides a number of operating system functions. For example, coordinating interactions between protectedinformation storage medium100 and an information presentation system (e.g., a computer system, a video game console, an audio system, a TV system, etc.). Theprotection interface110 can also enable an “instant on” user experience in accessing the authorized information in protected information storage portion130.
In one embodiment,protection interface110 also includes instructions for providing a unified look and feel graphical user interface (GUI) with content indicators (e.g., icons, drop down menus, tabs, etc.) corresponding to access authorized content stored in the protected content portion. A GUI can be organized in a convenient hierarchical architecture.FIG. 1B is a block diagram of unified look and feel graphical user interface (GUI)150 in accordance with one embodiment of the present invention. Unified look and feel graphical user interface (GUI)150 includesmain menu170,classification menu180 andtitles menu190. When a user selects a tab (e.g., movies) in the main menu a classification menu pops up (e.g., genre menu180) and when a classification tab is selected (e.g., drama) a content list pops up (e.g., movie list190).
With reference again toFIG. 1A, in one embodiment of the present invention,protection interface110 includes a digital rights indicator that indicates access rights to information (e.g., proprietary content) included in protected information portion130. In one exemplary implementation, the digital rights indicator is a digital rights registry key (e.g., a sequence of digital values) that is utilized to track digital rights to the protected content. For example, the digital rights indicator can indicate that it is permissible for proprietary content included in protected information storage portion130 to be accessed by a trusted machine (e.g., for listening and/or viewing). In one embodiment of the present invention, proprietary content (e.g., movies, music, etc.) is preloaded onto protectedinformation storage medium100 before shipment. For example, a large number of movies and songs are preloaded in protected information portion130. The content is shipped with the medium, thereby eliminating the need to download the information. Theprotection interface110 can also permit access rights to the protected information or content to be modified.
In one embodiment, content on the protected portion is restricted to access by trusted devices. In one exemplary implementation, a protection interface (e.g., protection interface110) and a trusted device include information (e.g., digital keys and algorithm instructions) for participating in a trusted device verification protocol. The trusted device verification protocol is a secure handshake that is computationally very difficult to crack. The protection interface verifies device information corresponds to information associated with trusted machines. For example, each machine capable of interacting with the SCED includes a company ID, model ID, user ID, unique player ID and/or a secret SCED ID and the protection interface verifies the information corresponds to information associated with a trusted machine. Individual or models of trusted machines can be revoked by future releases of a SCED device if they are determined to be unsecure (e.g., get hacked, a Trojan is released, etc.)
In one exemplary implementation, a protected section or portion resides in an ATA-5 hard disk drive (HDD) called a host protected area (HPA). This limits the SCED to operating with machines that can unlock the HPA of the HDD with special ATA-5 commands. The HPA area includes its own partition and encrypted file system. The file-system is encrypted so that data in the protected partitioned portion is meaningless until the file-system is unlocked and decrypted. The protected portion includes algorithm instructions for decrypting the file system. After successfully completing a trusted machine verification handshake process, a trusted machine is able to participate in a file system decryption process. The file system decryption algorithm includes a handshaking process to unlock the file system. Initially ATA-5 HPA security handshaking protocol is performed followed by performance of an additional 3-way handshaking (e.g., 128 bit handshaking). The file-system includes protected content which can be encrypted at the file level (e.g., each individual file can be encrypted). It is appreciated that the present invention is not limited to ATA implementations and can be implemented on a wide variety of memory formats (e.g., SATA, flash, etc.).
In one embodiment, each file on a protected portion of a drive is encrypted in a special way. In one exemplary implementation, a 2 pass encryption is utilized. The first pass uses a real-time decryptable algorithm so it can be played back in real time. A second pass locks the file while access is unauthorized (e.g., unpaid for). A file can be designated as having a one of a variety of states at any given time. For example, a file can be designated as locked forever and can not be unlocked. A file can be designated as locked but available and can be unlocked. Alternatively a file can be designated as unlocked for everyone and a trusted machine and user can access the file (e.g., to play back). In one exemplary implementation, a file can be designated as unlocked restricted and only certain users or machines can view the content. Unlocked restricted can be restricted in a variety of ways, including by user, by machine, limited by time (e.g., content can be viewed until a certain expiration date or only at certain times), or play limited (e.g., content can only be viewed a certain number of times). If access rights to an unlocked file “expires” the file reverts back to a locked available designation or lock forever designation. In one embodiment, the file also has information about price and relock state.
After successfully participating in the file decryption processes a trusted machine can access authorized protected content. Unlocked content can be protected by a variety of mechanisms. In one embodiment, after a file is unlocked it is marked and limited to being played back on trusted device. For example, protected content access is limited to the trusted machine (e.g., designated with a certain ID) that unlocked and decrypted the content. In one embodiment, trusted devices have a limited number of output options as determined by the protected content. Restrictions on content output or presentation can be made in a variety of ways, including limiting output to Macrovision protected video output, non-digital video output or HDCP restricted digital video output, CGMS-A protection, quality (e.g., resolution, frequency, bits, etc.) limits on video and audio digital or analog, and/or watermarking requirements. For example, if a trusted machine detects a protected file has a watermark, the watermark identification or signaling can be utilized to determine whether a file is legitimately unlocked.
FIG. 2 is a block diagram of acomputer system200, one embodiment of a computer system upon which embodiments of the present invention can be implemented.Computer system200 includescentral processor unit201, main memory202 (e.g., random access memory), chip set203 withnorth bridge209 and south bridge205, removable protected data storage device204 (e.g., an SCED),input device207,signal communications port208, and graphics subsystem210 which is coupled todisplay220.Computer system200 includes several busses for communicatively coupling the components ofcomputer system200. Communication bus291 (e.g., a front side bus) couplesnorth bridge209 ofchipset203 tocentral processor unit201. Communication bus292 (e.g., a main memory bus) couplesnorth bridge209 ofchipset203 tomain memory202. Communication bus292 (e.g., the Advanced Graphics Port interface) couples north bridge ofchipset203 tographic subsystem210. Communication buses294-297 (e.g., a PCI bus) couple south bridge205 of chip set203 to removabledata storage device204,input device207,signal communications port208 respectively. Graphics subsystem210 includesgraphics processor211 andgraphics buffer215.
The components ofcomputer system200 cooperatively operate to conveniently and securely provide a variety of protected content.Communications bus291,292,293,294,295, and297 communicate information.Central processor201 processes information.Main memory202 stores information and instructions for thecentral processor201. Removable protecteddata storage device204 is a protected information storage medium (e.g., similar to protected information storage medium100) and stores protected information (e.g., functioning as a large reservoir of protected content).Computer system200 is utilized to present (e.g., display) authorized information from removable protecteddata storage device201.Input device206 207 provides a mechanism for inputting information and/or for pointing to or highlighting information ondisplay220.Signal communication port208 provides a communication interface to exterior devices (e.g., an interface with a network).Display device220 displays information in accordance with data stored inframe buffer215.Graphics processor211 processes graphics commands fromcentral processor201 and provides the resulting data tographics buffers215 for storage and retrieval bydisplay monitor220. In one embodiment, a graphics processor can present information from removable protecteddata storage device204 utilizing a micro operating system of a protection interface included in removable protected data storage device204 (e.g., without reliance on central processor or other operating system).
FIG. 3 is a flow chart of content protected storagemedium creation method300 in accordance with one embodiment of the present invention. Content protected storagemedium creation method300 creates a protected storage medium (e.g., a secure content enabled disk). In one embodiment, a significant amount of proprietary content is loaded on a protected portion of a secure content enabled disk. The proprietary content is protected from unauthorized access by a protection interface included in the secure content enable disk.
Instep310, a storage medium is partitioned into protected and unprotected portions. In one embodiment of the present invention, a hard disk is partitioned to reserve a percentage of available storage space for protected content and a percentage of available storage space for unprotected content. In one exemplary implementation, a portion of the storage locations are reserved for a protection interface. The portion of memory reserved for the protection interface can be a read only portion.
Atstep320, content is stored in the protected portion. In one embodiment, a variety of proprietary content is stored in the protected portion. For example, movies, songs, video games and other entertainment content can be stored in the protected portion. A variety of different proprietary content can be “bundled” for convenient distribution on a single storage medium (e.g., hard disk).
Instep330, a protection interface is loaded onto the storage medium, wherein the protection interface prevents unauthorized access to the content stored in the protected portion. In one embodiment, the protected interface also provides operating system functions including memory management functions (e.g., maintains organization of files, directories, etc.), hardware interaction functions (e.g., control a disk drive, printer, etc.), and user interface functions. The protected portion interface can include instructions for providing a unified look and feel graphical user interface (GUI) with content indicators corresponding to permissible content stored in the protected content portion.
In one embodiment of the present invention, content is locked when it is loaded in the protected portion. The content can also be encrypted in the protected portion. Instructions are included in the protection interface for authorized unlocking and decrypting the content in the protected portion. In addition an unlocked file can be marked to prevent access by an untrusted machine.
FIG. 4A is a flow chart of digitalrights management method400 in accordance with one embodiment of the present invention. Digitalrights management method400 is utilized to establish and modify digital rights to access information included in a protected portion of a protected storage medium (e.g., protected storage medium100). For example, digitalrights management method400 can be utilized to control access to distributed proprietary content loaded on a SCED.
Instep410, a protected storage medium (e.g., a secure content enabled drive) is created with protected storage locations and unprotected storage locations. In one embodiment, creating a secure content enabled drive includes performing a content protected storage medium creation method (e.g., content protected storage medium creation method300). For example, a storage medium is partitioned into protected and unprotected portions, proprietary content is stored in the protected portion, and a protection interface is loaded onto the storage medium. The protection interface prevents unauthorized access to the content stored in the protected portion. In one exemplary implementation, a content protected storage medium similar to content protectedstorage medium100 is created.
Initial digital rights authorization to access secure content stored in the protected storage locations are established instep420. In one embodiment, establishing initial digital rights authorization includes storing a digital rights indicator on the protected storage medium, wherein the digital rights indicator indicates digital rights to access information stored in the protected storage locations. The digital rights indicator can indicate certain files within the protected storage area are accessible via the protection interface and certain files are not accessible. In one embodiment, the secure content includes movies, songs and/or video games and a digital rights indicator indicates which movies, songs and/or video games are accessible. For example, a SCED is loaded with a variety of songs from a plurality of categories (e.g., classical music, rock and roll music, country western music, etc.) and a digital rights indicator is set to indicate a purchaser of the SCED is authorized to access a variety of songs from one category (e.g., can access classical music songs). In one exemplary implementation, the digital rights indicator is utilized in encryption and decryption of protected information (e.g., utilized as a decryption key).
Instep430, the initial digital rights authorization to access secure content stored in the protected storage locations are revised. In one embodiment, revising the initial digital rights authorization includes performing a secure content enabled drive digital rights revision process. For example, a digital rights indicator is altered to indicate a user can access a variety of songs from an additional category (e.g., a user can access both classical music songs and country western songs). In one exemplary implementation, the digital rights indicator is a registry key associated with the secure content enabled drive. The registry key can also be stored in a centralized system remote from the secure content enabled drive.
FIG. 4B is a flow chart of a digitalrights management system470 in accordance with one embodiment of the present invention. Digitalrights management system470 includesdigital rights server471, digital rights tracking system472 (e.g., a database) andbus473.Bus473 is communicatively coupled todigital rights server471 and digitalrights tracking system472. Digitalrights management system470 is communicatively coupled to secure content enabled drive490. Secure content enabled drive490 is removable and can be locally and remotely located. For example, secure content enabled drive490 can be loaded with protected content locally with an initial digital rights setting and shipped to a remote end user and digital rights adjusted by communicating with digitalrights management system470.
The components of digitalrights management system470 cooperatively operate to track and modify digital rights.Digital rights server471 executes instructions, including instructions for tracking and modifying digital rights to protected content on remote secure content enabled drive490 with a protected storage portion and an unprotected storage portion. Digitalrights tracking system472 stores instructions and data, including instructions for tracking and modifying digital rights to protected content on a remote secure content enabled drive with a protected storage portion and an unprotected storage portion.Bus473 communicates information betweendigital rights server471 and digitalrights tracking system472.
In one embodiment,digital rights server471 is utilized to establish initial digital rights authorization to access secure content stored in said protected storage locations. For example,digital rights server471 creates an initial registry key for indicating digital rights to protected content on an SCED (e.g., SCED490) and utilizes digitalrights tracking system472 to track the initial registry key information. In one exemplary implementation, digitalrights tracking system472 is a database and tracks digital rights indicators or keys. For example, digitalrights tracking system472 tracks the digital rights for each SCED and/or user. If a SCED is damaged or destroyed, a centralized record of SCED and user digital access rights is maintained.Digital rights server471 is also utilized to perform a secure content enabled drive digital rights revision process to revise digital rights on an SCED (e.g., SCED490).
FIG. 5 is a flow chart of secure content enabled drive digitalrights revision process500 in accordance with one embodiment. Secure content enabled drive digitalrights revision process500 facilitates alteration of digital access rights remotely. For example, if a remote user successfully completes prerequisite authorization requirements, secure content enabled drive digitalrights revision process500 provides an updated digital rights indicator permitting access to protected information via a protection interface on a protected storage medium (e.g., a SCED).
Instep510, a communication link is established for communicating a digital rights indicator to a remote protected storage medium (e.g., SCED). In one embodiment, establishing a communication link includes receiving a request for a revised digital rights indicator. For example, a digital rights server (e.g., digital rights server471) receives a request for a revised digital rights indicator and engages in a handshaking protocol to establish a communication link. It is appreciated that the present invention is readily adaptable for utilization with a variety of communication platforms, including wired connection and/or wireless connection. The communication link can be established on the Internet.
Instep520, a digital rights indicator revision authorization process for revising digital rights to a protected storage medium (e.g., SCED) is performed. In one embodiment, the digital rights indicator revision process includes verifying a request is from a valid requester (e.g., a trusted machine). A determination is made if the valid requester has successfully completed a digital rights purchase process. A digital rights purchase process includes receiving an indication of requested protected content access, forwarding a price for the requested protected content access and determining if the price is paid. If the valid requester has successfully completed a digital rights purchase process, a digital rights indicator (e.g., registry key) corresponding to purchased digital access rights is created.
In step530 a revised digital rights indicator is forwarded to the protected storage medium (e.g., SCED) if the digital rights indicator revision authorization process is successful. The digital rights indicator is loaded on the protected storage medium for use in authorized access to protected content included in the protected storage medium. For example, the digital rights indicator can include a sequence of bits (e.g., binary logical values) utilized as a key in unlocking and decrypting proprietary content included in a protected information portion of a protected storage medium.
It is appreciated that the present invention can be implemented in a variety of embodiments. In one exemplary implementation the present invention can be utilized in processing systems utilized to provide a variety of graphics applications including video games. For example, the present invention can be utilized to distribute content for use in a game console, personal computer, personal digital assistant, cell phone or any number of platforms for implementing a video game. It is also appreciated that references to video game application implementations are exemplary and the present invention is not limited to these implementations.
Thus, the present invention enables secure and convenient distribution of proprietary content on flexibly usable storage medium. A significant amount of proprietary information can be distributed on a protected portion of the storage medium while regulating access to the proprietary content and still enabling storage resources for discretionary utilization by an end user. In addition to protecting information in the protected information portion, seamless and intuitive authorized interaction between information the protected content and the unprotected information is permitted. A protection interface can provide a micro-operating system that permits authorized content presentation (e.g., video, audio, etc.) without requirement of another operating system.
The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.

Claims (28)

What is claimed is:
1. A reprogrammable non-transitory computer readable storage medium comprising:
an unprotected portion for storage of unprotected information;
a protected information portion for storing protected information, wherein said protected information portion resides on a host protection area which is restricted to access by a trusted device, wherein said computer readable storage medium is an Advanced Technology Attachment-5 (ATA-5) hard disk drive and each file on said protected information portion of said ATA-5 hard disk drive is encrypted in a special a two pass two-pass encryption comprising:
a first pass encryption using a real-time decryptable algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized; and
a protection interface for protecting information in said protected information portion, wherein said protection interface engages in a trusted device verification protocol that verifies identification information is associated with said trusted device and marks unlocked protected information to prevent access by an untrusted machine, wherein said mark is forwarded with said unlocked protected information to said trusted device.
2. A computer readable storage medium ofclaim 1 wherein said protection interface permits seamless and intuitive interaction between said authorized information in said protected content and said unprotected information.
3. The computer readable storage medium ofclaim 1 wherein said protection interface is a micro kernel and participates in a process to unlock said protected information.
4. The computer readable storage medium ofclaim 1 wherein said protection interface includes instructions that direct a unified look and feel graphical user interface with content indicators corresponding to permissible content stored in said protected content portion.
5. The computer readable storage medium ofclaim 1 wherein said protection interface includes a digital rights registry key that is utilized to track digital rights to said protected content.
6. The computer readable storage medium ofclaim 1 wherein said protection portion includes its own partition and encrypted file system.
7. The computer readable storage medium ofclaim 1 wherein said protection interface includes instructions for participating in said trusted device verification protocol.
8. A content protected storage medium method comprising:
partitioning a reprogrammable non-transitory storage medium into a protected portion and an unprotected portion;
storing content in said protected portion wherein said protected portion resides on a host protection area which is restricted to access by a trusted device, wherein said computer readable storage medium is an Advanced Technology Attachment-5 (ATA-5) hard disk drive and each file on said protected portion of said ATA-5 hard disk drive is encrypted in a special a two pass two-pass encryption comprising:
a first pass encryption using a real-time decryptable algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized; and
loading a protection interface onto said storage medium, wherein said protection interface prevents unauthorized access to said content stored in said protected portion and marks an unlocked file with an indicator to prevent access by an untrusted machine, wherein said indicator is forwarded with said unlocked protected information to said trusted device.
9. A content protected storage medium method ofclaim 8 further comprising encrypting said content in said protected portion.
10. A content protected storage medium method ofclaim 8 further comprising decrypting said content in said protected portion.
11. A content protected storage medium method ofclaim 8 wherein said protection interface provides operating system functions including memory management functions, hardware interaction functions, and user interface functions.
12. A content protected storage medium method ofclaim 8 wherein said protection interface includes instructions for unlocking and decrypting said content in said protected portion.
13. A content protected storage medium method ofclaim 8 wherein said protected portion interface includes instructions that direct a unified look and feel graphical user interface with content indicators corresponding to permissible content stored in said protected content portion.
14. A secure content enabled disk access system comprising:
a secure content enabled disk, wherein said secure content enabled disk is partitioned into a protected portion and unprotected portion and said secure content enabled disk includes a protection interface for limiting access to proprietary content stored in said protected portion, wherein said secure content enabled disk is an Advanced Technology Attachment-5 (ATA-5) hard disk drive, wherein said protected portion stores secure content including protected information, wherein said protected portion resides on a host protection area which is restricted to access by a trusted device, wherein each file on a protected portion of said secure content enabled disk drive is encrypted in a special a two pass two-pass encryption comprising:
a first pass encryption using a real-time decryptable algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized,
wherein said protection interface permits authorized access to said protected content via a unified look and feel graphical user interface with content indicators corresponding to permissible content stored in said protected content portion; and
a processor for executing instructions, including instructions associated with interacting with said protection interface and accessing said proprietary content.
15. A secure content enabled disk access system ofclaim 14 wherein access to said protected content is limited to a trusted device.
16. A secure content enabled disk access system ofclaim 14 wherein said protected protection interface includes instructions for performing operating system functions, including memory management functions, hardware interaction functions, and user interface functions.
17. A secure content enabled disk access system ofclaim 14 wherein said processor is graphics processing unit.
18. A computer readable storage medium comprising:
an unprotected portion for storage of unprotected information;
a protected information portion for storing protected information, wherein said protected information portion resides on a host protection area which is restricted to access by a trusted device in accordance with a digital rights indicator; and
a protection interface for protecting information in said protected information portion, wherein said protection interface is operable to engage in a trusted device verification protocol that verifies identification information is associated with said trusted device and said protection interface is also operable to engage in a secure content enabled drive digital rights revision process, wherein said secure content enabled drive digital rights revision process comprises:
participating in establishing a communication link for communicating a digital rights indicator to a remote device;
engaging in a digital rights indicator revision authorization process for revising digital rights to a secure content enabled drive including a protected storage portion and a protection interface, wherein said protection interface is a micro kernel and prevents unauthorized read and write access to content stored in said protected storage portion; and
forwarding a revised digital rights indicator for said secure content enabled drive device if said digital rights indicator revision authorization process is successful.
19. The computer readable storage medium of claim 18 wherein said protection interface is a micro kernel and participates in a process to unlock said protected information.
20. The computer readable storage medium of claim 18 wherein said protection interface provides operating system functions including memory management functions, hardware interaction functions, and user interface functions.
21. The computer readable storage medium of claim 18 wherein said protection interface includes a digital rights registry key that is utilized to track digital rights to said protected content.
22. The computer readable storage medium of claim 18 wherein protection interface includes instructions for participating in trusted device verification protocol.
23. The computer readable storage medium of claim 18 wherein each file on a protected portion of a drive is encrypted in a two-pass encryption comprising:
a first pass encryption using a real-time decrypt able algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized.
24. The computer readable storage medium of claim 18 wherein said protection interface includes instructions for unlocking and decrypting said content in said protected portion.
25. The computer readable storage medium of claim 18, including said secure content enabled drive digital rights revision process, wherein said participating in establishing said communication link includes receiving a request for said revised digital rights indicator.
26. The computer readable storage medium of claim 18, including said secure content enabled drive digital rights revision process, wherein said digital rights indicator revision authorization process comprises:
verifying a request for said revised digital rights indicator is from a valid requester;
determining if said valid requester has successfully completed a digital rights purchase process; and
creating a registry key corresponding to purchased digital access rights if said valid requester has successfully completed a digital rights purchase process.
27. The computer readable storage medium of claim 26, including said secure content enabled drive digital rights revision process, wherein said valid requester is a trusted machine.
28. The computer readable storage medium of claim 18, including said secure content enabled drive digital rights revision process, wherein said communication link is establish on the Internet.
US14/663,4022004-08-022015-03-19Secure content enabled hard drive system and methodExpired - Fee RelatedUSRE47772E1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/663,402USRE47772E1 (en)2004-08-022015-03-19Secure content enabled hard drive system and method

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US10/910,001US8402283B1 (en)2004-08-022004-08-02Secure content enabled drive system and method
US14/663,402USRE47772E1 (en)2004-08-022015-03-19Secure content enabled hard drive system and method

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US10/910,001ReissueUS8402283B1 (en)2004-08-022004-08-02Secure content enabled drive system and method

Publications (1)

Publication NumberPublication Date
USRE47772E1true USRE47772E1 (en)2019-12-17

Family

ID=47844856

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US10/910,001CeasedUS8402283B1 (en)2004-08-022004-08-02Secure content enabled drive system and method
US14/663,402Expired - Fee RelatedUSRE47772E1 (en)2004-08-022015-03-19Secure content enabled hard drive system and method

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US10/910,001CeasedUS8402283B1 (en)2004-08-022004-08-02Secure content enabled drive system and method

Country Status (1)

CountryLink
US (2)US8402283B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10652332B2 (en)*2018-07-092020-05-12Oracle International CorporationSystem, method, and apparatuses for dynamic authorization
US11645384B2 (en)2021-03-032023-05-09Bank Of America CorporationSystem for electronic data obfuscation and protection using independent destructible data objects

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8751825B1 (en)2004-12-152014-06-10Nvidia CorporationContent server and method of storing content
US8788425B1 (en)2004-12-152014-07-22Nvidia CorporationMethod and system for accessing content on demand
US8875309B1 (en)*2004-12-152014-10-28Nvidia CorporationContent server and method of providing content therefrom
US8893299B1 (en)2005-04-222014-11-18Nvidia CorporationContent keys for authorizing access to content
CN111723344B (en)*2020-05-262024-03-19深圳数字电视国家工程实验室股份有限公司Digital content protection method, device, electronic equipment and storage medium
GB2624164A (en)*2022-11-042024-05-15Sony Interactive Entertainment Europe LtdContextualized content identification

Citations (132)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5237616A (en)*1992-09-211993-08-17International Business Machines CorporationSecure computer system having privileged and unprivileged memories
US5552897A (en)*1994-03-071996-09-03At&T Corp.Secure communication apparatus and method
US5623546A (en)1995-06-231997-04-22Motorola, Inc.Encryption method and system for portable data
US5629980A (en)1994-11-231997-05-13Xerox CorporationSystem for controlling the distribution and use of digital works
US5721829A (en)1995-05-051998-02-24Microsoft CorporationSystem for automatic pause/resume of content delivered on a channel in response to switching to and from that channel and resuming so that a portion of the content is repeated
US5757911A (en)*1994-03-101998-05-26Mita Industrial Co., Ltd.Encryption communication process and terminal for encryption communication
US5857020A (en)1995-12-041999-01-05Northern Telecom Ltd.Timed availability of secured content provisioned on a storage medium
US5861906A (en)1995-05-051999-01-19Microsoft CorporationInteractive entertainment network system and method for customizing operation thereof according to viewer preferences
US5880733A (en)1996-04-301999-03-09Microsoft CorporationDisplay system and method for displaying windows of an operating system to provide a three-dimensional workspace for a computer system
US5973680A (en)1995-02-091999-10-26Nec CorporationMotion picture retrieval system
US6005636A (en)1997-03-271999-12-21Sharp Laboratories Of America, Inc.System for setting user-adjustable image processing parameters in a video system
US6016348A (en)1996-11-272000-01-18Thomson Consumer Electronics, Inc.Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data
US6028585A (en)1995-09-222000-02-22International Business Machines CorporationScreen display control method and a screen display control apparatus
US6069647A (en)1998-01-292000-05-30Intel CorporationConditional access and content security method
US6115819A (en)*1994-05-262000-09-05The Commonwealth Of AustraliaSecure computer architecture
US6141754A (en)1997-11-282000-10-31International Business Machines CorporationIntegrated method and system for controlling information access and distribution
US20010020274A1 (en)1997-02-122001-09-06Shambroom W. DavidPlatform-neutral system and method for providing secure remote operations over an insecure computer network
US20010021926A1 (en)1996-01-112001-09-13Paul B. SchneckSystem for controlling access and distribution of digital property
US6298445B1 (en)*1998-04-302001-10-02Netect, Ltd.Computer security
US20020002468A1 (en)1998-08-132002-01-03International Business Machines CorporationMethod and system for securing local database file of local content stored on end-user system
US20020012432A1 (en)*1999-03-272002-01-31Microsoft CorporationSecure video card in computing device having digital rights management (DRM) system
US6367019B1 (en)1999-03-262002-04-02Liquid Audio, Inc.Copy security for portable music players
US6389541B1 (en)1998-05-152002-05-14First Union National BankRegulating access to digital content
US6389538B1 (en)1998-08-132002-05-14International Business Machines CorporationSystem for tracking end-user electronic content usage
US20020077992A1 (en)2000-12-082002-06-20Tobin Christopher M.Personal transaction device with secure storage on a removable memory device
US20020077986A1 (en)2000-07-142002-06-20Hiroshi KobataControlling and managing digital assets
US20020099663A1 (en)2000-11-012002-07-25Kenji YoshinoContent delivery system and content delivery method
US20030061477A1 (en)2001-09-212003-03-27Kahn Raynold M.Method and apparatus for encrypting media programs for later purchase and viewing
US6550011B1 (en)1998-08-052003-04-15Hewlett Packard Development Company, L.P.Media content protection utilizing public key cryptography
US20030097655A1 (en)2001-11-212003-05-22Novak Robert E.System and method for providing conditional access to digital content
US20030108199A1 (en)2001-12-112003-06-12Pinder Howard G.Encrypting received content
US6580916B1 (en)*2000-09-152003-06-17Motorola, Inc.Service framework for evaluating remote services based upon transport characteristics
US6597380B1 (en)1998-03-162003-07-22Nec CorporationIn-space viewpoint control device for use in information visualization system
US20030140228A1 (en)*2001-09-062003-07-24Binder Philip A.Method and device for control by consumers over personal data
US20030149989A1 (en)2001-09-142003-08-07Hunter Charles EricBroadcast distribution of content for storage on hardware protected optical storage media
US20030152364A1 (en)2000-04-072003-08-14Wajs Andrew AugustineSystem for providing scrambled content, and system for descrambling scrambled content
US20030161473A1 (en)2000-06-162003-08-28Fransdonk Robert W.Method and system to securely distribute content via a network
US6615192B1 (en)1999-03-122003-09-02Matsushita Electric Industrial Co., Ltd.Contents copying system, copying method, computer-readable recording medium and disc drive copying contents but not a cipher key via a host computer
US6622148B1 (en)1996-10-232003-09-16Viacom International Inc.Interactive video title selection system and method
US6651171B1 (en)*1999-04-062003-11-18Microsoft CorporationSecure execution of program code
US20030215091A1 (en)2002-04-302003-11-20Toru KambayashiRendering device, copy control method and program
US20030225796A1 (en)2002-05-312003-12-04Hitachi, Ltd.Method and apparatus for peer-to-peer file sharing
US20030229845A1 (en)2002-05-302003-12-11David SalesinSystem and method for adaptive document layout via manifold content
US20040015426A1 (en)2002-03-142004-01-22Bijan TadayonSystem and method for expressing usage rights with sound signals
US6708161B2 (en)2000-09-262004-03-16I2 Technologies Us, Inc.System and method for selective database indexing
US20040083366A1 (en)*2002-10-242004-04-29Nachenberg Carey S.Securing executable content using a trusted computing platform
US6742116B1 (en)*1998-09-302004-05-25Fujitsu LimitedSecurity method, security software and security system for electronic communications
US6748537B2 (en)*2001-11-152004-06-08Sony CorporationSystem and method for controlling the use and duplication of digital content distributed on removable media
US20040133794A1 (en)2001-03-282004-07-08Kocher Paul C.Self-protecting digital content
US20040133803A1 (en)1999-05-052004-07-08Rabin Michael O.Methods and apparatus for protecting information
US20040148523A1 (en)2001-06-262004-07-29Lambert Martin RichardDigital rights management
US6772335B2 (en)1995-11-062004-08-03Xerox CorporationMultimedia coordination system
US6785820B1 (en)*2002-04-022004-08-31Networks Associates Technology, Inc.System, method and computer program product for conditionally updating a security program
US6788800B1 (en)2000-07-252004-09-07Digimarc CorporationAuthenticating objects using embedded data
US20040193902A1 (en)*2003-03-312004-09-30Vogler Dean H.Digital content rendering device and method
US6807534B1 (en)1995-10-132004-10-19Trustees Of Dartmouth CollegeSystem and method for managing copyrighted electronic media
US6823451B1 (en)*2001-05-102004-11-23Advanced Micro Devices, Inc.Integrated circuit for security and manageability
US6832319B1 (en)1998-04-242004-12-14International Business Machines CorporationContent guard system for copy protection of recordable media
US20050008130A1 (en)2003-05-302005-01-13Sony CorporationInformation processing system, information processor, information processing method, receiver, receiving method, and program
US20050025312A1 (en)2002-01-142005-02-03Rijkaert Albert Maria ArnoldDistribution of encrypted information
US20050058291A1 (en)2003-08-252005-03-17Brant CandeloreApparatus and method for an iterative cryptographic block
US20050086478A1 (en)1999-03-272005-04-21Microsoft CorporationEncrypting a digital object on a key ID selected therefor
US20050091511A1 (en)2000-05-252005-04-28Itay NaveUseability features in on-line delivery of applications
US6891953B1 (en)*2000-06-272005-05-10Microsoft CorporationMethod and system for binding enhanced software features to a persona
US20050111663A1 (en)2003-11-262005-05-26International Business Machines CorporationSystem, method, and service for delivering enhanced multimedia content on physical media
US20050119967A1 (en)2002-04-152005-06-02Ryuji IshiguroInformation processing device and method, program storage medium and program
US20050132179A1 (en)2003-12-162005-06-16Microsoft CorporationApplying custom software image updates to non-volatile storage in a failsafe manner
US6922740B2 (en)*2003-05-212005-07-26Intel CorporationApparatus and method of memory access control for bus masters
US6948073B2 (en)2001-06-272005-09-20Microsoft CorporationProtecting decrypted compressed content and decrypted decompressed content at a digital rights management client
US6957343B2 (en)2001-03-302005-10-18Intel CorporationValidating keying material by using a validation area of read-only media to prevent playback of unauthorized copies of content stored on the media
US6980652B1 (en)1999-06-232005-12-27Dphi Acquisitions, Inc.Combination mastered and writeable medium and use in electronic internet appliance
US20050289076A1 (en)2000-06-052005-12-29Sealedmedia LimitedDigital rights management
US20060005257A1 (en)2004-07-012006-01-05Nakahara TohruEncrypted contents recording medium and apparatus and method for reproducing encrypted contents
US6990513B2 (en)*2000-06-222006-01-24Microsoft CorporationDistributed computing services platform
US7003675B2 (en)1999-08-132006-02-21Microsoft CorporationEncrypted content data structure package and generation thereof
US7007300B1 (en)*2001-05-102006-02-28Advanced Micro Devices, Inc.Secure booting of a personal computer system
US7010808B1 (en)*2000-08-252006-03-07Microsoft CorporationBinding digital content to a portable storage device or the like in a digital rights management (DRM) system
US20060064605A1 (en)2000-12-272006-03-23Margent Development, Llc.Digital content security system
US7020688B2 (en)*2000-09-052006-03-28Financial Network, Inc.Methods and systems for archiving and verification of electronic communications
US7036020B2 (en)*2001-07-252006-04-25Antique Books, IncMethods and systems for promoting security in a computer system employing attached storage devices
US7035827B2 (en)2000-10-172006-04-25Sony CorporationContent receiving apparatus and method, storage medium, and server
US7043581B1 (en)*2001-05-102006-05-09Advanced Micro Devices, Inc.Resource sequester mechanism
US7047411B1 (en)*1999-12-172006-05-16Microsoft CorporationServer for an electronic distribution system and method of operating same
US7065216B1 (en)1999-08-132006-06-20Microsoft CorporationMethods and systems of protecting digital content
US7065651B2 (en)*2002-01-162006-06-20Microsoft CorporationSecure video card methods and systems
US7065506B1 (en)1999-11-192006-06-20Macrovision CorporationMethod and apparatus to inhibit illicit copying from a record carrier to a computer-readable data storage device
US7069449B2 (en)2000-08-032006-06-27Itech Group, Inc.Method and system for encrypting and storing content to a user
US7073071B1 (en)*2000-03-312006-07-04Intel CorporationPlatform and method for generating and utilizing a protected audit log
US20060149567A1 (en)2004-12-302006-07-06International Business Machines CorporationMethod, system, and computer program product for dynamic field-level access control in shared documents
US7093298B2 (en)2001-08-302006-08-15International Business Machines CorporationApparatus and method for security object enhancement and management
US7095853B2 (en)2000-02-242006-08-22Nec CorporationSystem and method for preventing an illegal copy of contents
US20060190621A1 (en)2003-07-242006-08-24Kamperman Franciscus L AHybrid device and person based authorized domain architecture
US7107462B2 (en)2000-06-162006-09-12Irdeto Access B.V.Method and system to store and distribute encryption keys
US7111169B2 (en)2001-03-292006-09-19Intel CorporationMethod and apparatus for content protection across a source-to-destination interface
US20060224902A1 (en)2005-03-302006-10-05Bolt Thomas BData management system for removable storage media
US7120250B2 (en)2002-09-092006-10-10Sony CorporationContent distribution for multiple digital rights management
US7139811B2 (en)*2001-08-012006-11-21Actona Technologies Ltd.Double-proxy remote data access system
US7150031B1 (en)2000-06-092006-12-12Scientific-Atlanta, Inc.System and method for reminders of upcoming rentable media offerings
US7152047B1 (en)2000-05-242006-12-19Esecure.Biz, Inc.System and method for production and authentication of original documents
US7159120B2 (en)2001-11-192007-01-02Good Technology, Inc.Method and system for protecting data within portable electronic devices
US20070033419A1 (en)2003-07-072007-02-08Cryptography Research, Inc.Reprogrammable security for controlling piracy and enabling interactive content
US7181016B2 (en)*2003-01-272007-02-20Microsoft CorporationDeriving a symmetric key from an asymmetric key for file encryption or decryption
US7191153B1 (en)1999-09-102007-03-13Dphi Acquisitions, Inc.Content distribution method and apparatus
US7200593B2 (en)2001-01-122007-04-03Ns Solutions CorporationDocument management system
US7216372B2 (en)*2002-11-192007-05-15Raquel Fernandez Escortell, legal representativeDisposable protector for the seat ring or upper part of a toilet
US7225333B2 (en)1999-03-272007-05-29Microsoft CorporationSecure processor architecture for use with a digital rights management (DRM) system on a computing device
US7225340B2 (en)2001-02-202007-05-29Hitachi, Ltd.Digital copying method and storage device for digital content
US7228427B2 (en)2000-06-162007-06-05Entriq Inc.Method and system to securely distribute content via a network
US7242771B2 (en)2002-06-262007-07-10Matsushita Electric Industrial Co., Ltd.Contents management system
US20070192111A1 (en)*2003-09-122007-08-16Chasen Matthew DPeer-to-peer network method and system for shipment delivery transactions
US20070208992A1 (en)2000-11-292007-09-06Dov KorenCollaborative, flexible, interactive real-time displays
US7299209B2 (en)2001-10-182007-11-20Macrovision CorporationMethod, apparatus and system for securely providing material to a licensee of the material
US7340056B2 (en)2002-10-112008-03-04Thomson LicensingRemote deactivation of decoders for accessing multimedia digital data
US7353543B2 (en)2003-01-102008-04-01Matsushita Electric Industrial Co., Ltd.Contents distribution system
US7370205B2 (en)*2002-08-012008-05-06Sony CorporationContent distribution system, content distribution method and terminal device
US7370364B2 (en)2000-07-312008-05-06Ellacoya Networks, Inc.Managing content resources
US7376624B2 (en)2002-02-272008-05-20Imagineer Software, Inc.Secure communication and real-time watermarking using mutating identifiers
US7383205B1 (en)1999-03-272008-06-03Microsoft CorporationStructure of a digital content package
US20080148063A1 (en)2003-01-132008-06-19Silicon Image, IncMethod and apparatus for content protection within an open architecture system
US7395438B2 (en)2002-04-162008-07-01Microsoft CorporationDigital rights management (DRM) encryption and data-protection for content on device without interactive authentication
US7395333B1 (en)*2000-05-092008-07-01Sun Microsystems, Inc.Method and apparatus to obtain negotiated service advertisement
US20080178081A1 (en)*2007-01-222008-07-24Eran ReshefSystem and method for guiding non-technical people in using web services
US7536386B2 (en)*2003-03-272009-05-19Microsoft CorporationSystem and method for sharing items in a computer system
US7543160B2 (en)*2004-09-032009-06-02Research In Motion LimitedSystem and method for generating a secure state indicator on a display
US7549044B2 (en)*2003-10-282009-06-16Dphi Acquisitions, Inc.Block-level storage device with content security
US7607024B2 (en)*2003-08-012009-10-20Koninklijke Phillips Electronics N.V.Record carrier comprising encryption indication information
US7606818B2 (en)*2006-12-202009-10-20Sap AgMethod and apparatus for aggregating change subscriptions and change notifications
US7606918B2 (en)*2004-04-272009-10-20Microsoft CorporationAccount creation via a mobile device
US7644446B2 (en)2003-10-232010-01-05Microsoft CorporationEncryption and data-protection for content on portable medium
US7689510B2 (en)2000-09-072010-03-30Sonic SolutionsMethods and system for use in network management of content
US7716746B2 (en)*2002-03-052010-05-11Sanyo Electric Co., Ltd.Data storing device for classified data
US7933409B2 (en)2004-03-092011-04-26Panasonic CorporationContent playback device

Patent Citations (138)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5237616A (en)*1992-09-211993-08-17International Business Machines CorporationSecure computer system having privileged and unprivileged memories
US5552897A (en)*1994-03-071996-09-03At&T Corp.Secure communication apparatus and method
US5757911A (en)*1994-03-101998-05-26Mita Industrial Co., Ltd.Encryption communication process and terminal for encryption communication
US6115819A (en)*1994-05-262000-09-05The Commonwealth Of AustraliaSecure computer architecture
US5629980A (en)1994-11-231997-05-13Xerox CorporationSystem for controlling the distribution and use of digital works
US5973680A (en)1995-02-091999-10-26Nec CorporationMotion picture retrieval system
US5721829A (en)1995-05-051998-02-24Microsoft CorporationSystem for automatic pause/resume of content delivered on a channel in response to switching to and from that channel and resuming so that a portion of the content is repeated
US5861906A (en)1995-05-051999-01-19Microsoft CorporationInteractive entertainment network system and method for customizing operation thereof according to viewer preferences
US5623546A (en)1995-06-231997-04-22Motorola, Inc.Encryption method and system for portable data
US6028585A (en)1995-09-222000-02-22International Business Machines CorporationScreen display control method and a screen display control apparatus
US6807534B1 (en)1995-10-132004-10-19Trustees Of Dartmouth CollegeSystem and method for managing copyrighted electronic media
US6772335B2 (en)1995-11-062004-08-03Xerox CorporationMultimedia coordination system
US5857020A (en)1995-12-041999-01-05Northern Telecom Ltd.Timed availability of secured content provisioned on a storage medium
US20010021926A1 (en)1996-01-112001-09-13Paul B. SchneckSystem for controlling access and distribution of digital property
US6314409B2 (en)1996-01-112001-11-06Veridian Information SolutionsSystem for controlling access and distribution of digital property
US5880733A (en)1996-04-301999-03-09Microsoft CorporationDisplay system and method for displaying windows of an operating system to provide a three-dimensional workspace for a computer system
US6622148B1 (en)1996-10-232003-09-16Viacom International Inc.Interactive video title selection system and method
US6016348A (en)1996-11-272000-01-18Thomson Consumer Electronics, Inc.Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data
US20010020274A1 (en)1997-02-122001-09-06Shambroom W. DavidPlatform-neutral system and method for providing secure remote operations over an insecure computer network
US6005636A (en)1997-03-271999-12-21Sharp Laboratories Of America, Inc.System for setting user-adjustable image processing parameters in a video system
US6141754A (en)1997-11-282000-10-31International Business Machines CorporationIntegrated method and system for controlling information access and distribution
US6069647A (en)1998-01-292000-05-30Intel CorporationConditional access and content security method
US6597380B1 (en)1998-03-162003-07-22Nec CorporationIn-space viewpoint control device for use in information visualization system
US6832319B1 (en)1998-04-242004-12-14International Business Machines CorporationContent guard system for copy protection of recordable media
US6298445B1 (en)*1998-04-302001-10-02Netect, Ltd.Computer security
US6389541B1 (en)1998-05-152002-05-14First Union National BankRegulating access to digital content
US6550011B1 (en)1998-08-052003-04-15Hewlett Packard Development Company, L.P.Media content protection utilizing public key cryptography
US6398245B1 (en)1998-08-132002-06-04International Business Machines CorporationKey management system for digital content player
US20020002468A1 (en)1998-08-132002-01-03International Business Machines CorporationMethod and system for securing local database file of local content stored on end-user system
US6389538B1 (en)1998-08-132002-05-14International Business Machines CorporationSystem for tracking end-user electronic content usage
US6742116B1 (en)*1998-09-302004-05-25Fujitsu LimitedSecurity method, security software and security system for electronic communications
US6615192B1 (en)1999-03-122003-09-02Matsushita Electric Industrial Co., Ltd.Contents copying system, copying method, computer-readable recording medium and disc drive copying contents but not a cipher key via a host computer
US6367019B1 (en)1999-03-262002-04-02Liquid Audio, Inc.Copy security for portable music players
US20050086478A1 (en)1999-03-272005-04-21Microsoft CorporationEncrypting a digital object on a key ID selected therefor
US7383205B1 (en)1999-03-272008-06-03Microsoft CorporationStructure of a digital content package
US20020012432A1 (en)*1999-03-272002-01-31Microsoft CorporationSecure video card in computing device having digital rights management (DRM) system
US7225333B2 (en)1999-03-272007-05-29Microsoft CorporationSecure processor architecture for use with a digital rights management (DRM) system on a computing device
US6651171B1 (en)*1999-04-062003-11-18Microsoft CorporationSecure execution of program code
US20040133803A1 (en)1999-05-052004-07-08Rabin Michael O.Methods and apparatus for protecting information
US6980652B1 (en)1999-06-232005-12-27Dphi Acquisitions, Inc.Combination mastered and writeable medium and use in electronic internet appliance
US7065216B1 (en)1999-08-132006-06-20Microsoft CorporationMethods and systems of protecting digital content
US7003675B2 (en)1999-08-132006-02-21Microsoft CorporationEncrypted content data structure package and generation thereof
US7191153B1 (en)1999-09-102007-03-13Dphi Acquisitions, Inc.Content distribution method and apparatus
US7065506B1 (en)1999-11-192006-06-20Macrovision CorporationMethod and apparatus to inhibit illicit copying from a record carrier to a computer-readable data storage device
US7047411B1 (en)*1999-12-172006-05-16Microsoft CorporationServer for an electronic distribution system and method of operating same
US7095853B2 (en)2000-02-242006-08-22Nec CorporationSystem and method for preventing an illegal copy of contents
US7073071B1 (en)*2000-03-312006-07-04Intel CorporationPlatform and method for generating and utilizing a protected audit log
US20030152364A1 (en)2000-04-072003-08-14Wajs Andrew AugustineSystem for providing scrambled content, and system for descrambling scrambled content
US7395333B1 (en)*2000-05-092008-07-01Sun Microsystems, Inc.Method and apparatus to obtain negotiated service advertisement
US7152047B1 (en)2000-05-242006-12-19Esecure.Biz, Inc.System and method for production and authentication of original documents
US20050091511A1 (en)2000-05-252005-04-28Itay NaveUseability features in on-line delivery of applications
US20050289076A1 (en)2000-06-052005-12-29Sealedmedia LimitedDigital rights management
US7150031B1 (en)2000-06-092006-12-12Scientific-Atlanta, Inc.System and method for reminders of upcoming rentable media offerings
US7155733B2 (en)2000-06-092006-12-26Scientific-Atlanta, Inc.System and method for expiration reminders of rentable media offerings
US20030161473A1 (en)2000-06-162003-08-28Fransdonk Robert W.Method and system to securely distribute content via a network
US7228427B2 (en)2000-06-162007-06-05Entriq Inc.Method and system to securely distribute content via a network
US7107462B2 (en)2000-06-162006-09-12Irdeto Access B.V.Method and system to store and distribute encryption keys
US6990513B2 (en)*2000-06-222006-01-24Microsoft CorporationDistributed computing services platform
US6891953B1 (en)*2000-06-272005-05-10Microsoft CorporationMethod and system for binding enhanced software features to a persona
US20020077986A1 (en)2000-07-142002-06-20Hiroshi KobataControlling and managing digital assets
US6788800B1 (en)2000-07-252004-09-07Digimarc CorporationAuthenticating objects using embedded data
US7370364B2 (en)2000-07-312008-05-06Ellacoya Networks, Inc.Managing content resources
US7069449B2 (en)2000-08-032006-06-27Itech Group, Inc.Method and system for encrypting and storing content to a user
US7010808B1 (en)*2000-08-252006-03-07Microsoft CorporationBinding digital content to a portable storage device or the like in a digital rights management (DRM) system
US7020688B2 (en)*2000-09-052006-03-28Financial Network, Inc.Methods and systems for archiving and verification of electronic communications
US7689510B2 (en)2000-09-072010-03-30Sonic SolutionsMethods and system for use in network management of content
US6580916B1 (en)*2000-09-152003-06-17Motorola, Inc.Service framework for evaluating remote services based upon transport characteristics
US6708161B2 (en)2000-09-262004-03-16I2 Technologies Us, Inc.System and method for selective database indexing
US7035827B2 (en)2000-10-172006-04-25Sony CorporationContent receiving apparatus and method, storage medium, and server
US20020099663A1 (en)2000-11-012002-07-25Kenji YoshinoContent delivery system and content delivery method
US20070208992A1 (en)2000-11-292007-09-06Dov KorenCollaborative, flexible, interactive real-time displays
US20020077992A1 (en)2000-12-082002-06-20Tobin Christopher M.Personal transaction device with secure storage on a removable memory device
US20060064605A1 (en)2000-12-272006-03-23Margent Development, Llc.Digital content security system
US7200593B2 (en)2001-01-122007-04-03Ns Solutions CorporationDocument management system
US7225340B2 (en)2001-02-202007-05-29Hitachi, Ltd.Digital copying method and storage device for digital content
US20040133794A1 (en)2001-03-282004-07-08Kocher Paul C.Self-protecting digital content
US7111169B2 (en)2001-03-292006-09-19Intel CorporationMethod and apparatus for content protection across a source-to-destination interface
US6957343B2 (en)2001-03-302005-10-18Intel CorporationValidating keying material by using a validation area of read-only media to prevent playback of unauthorized copies of content stored on the media
US7043581B1 (en)*2001-05-102006-05-09Advanced Micro Devices, Inc.Resource sequester mechanism
US7007300B1 (en)*2001-05-102006-02-28Advanced Micro Devices, Inc.Secure booting of a personal computer system
US6823451B1 (en)*2001-05-102004-11-23Advanced Micro Devices, Inc.Integrated circuit for security and manageability
US20040148523A1 (en)2001-06-262004-07-29Lambert Martin RichardDigital rights management
US6948073B2 (en)2001-06-272005-09-20Microsoft CorporationProtecting decrypted compressed content and decrypted decompressed content at a digital rights management client
US7036020B2 (en)*2001-07-252006-04-25Antique Books, IncMethods and systems for promoting security in a computer system employing attached storage devices
US7139811B2 (en)*2001-08-012006-11-21Actona Technologies Ltd.Double-proxy remote data access system
US7093298B2 (en)2001-08-302006-08-15International Business Machines CorporationApparatus and method for security object enhancement and management
US20030140228A1 (en)*2001-09-062003-07-24Binder Philip A.Method and device for control by consumers over personal data
US20030149989A1 (en)2001-09-142003-08-07Hunter Charles EricBroadcast distribution of content for storage on hardware protected optical storage media
US20030061477A1 (en)2001-09-212003-03-27Kahn Raynold M.Method and apparatus for encrypting media programs for later purchase and viewing
US7299209B2 (en)2001-10-182007-11-20Macrovision CorporationMethod, apparatus and system for securely providing material to a licensee of the material
US6748537B2 (en)*2001-11-152004-06-08Sony CorporationSystem and method for controlling the use and duplication of digital content distributed on removable media
US7159120B2 (en)2001-11-192007-01-02Good Technology, Inc.Method and system for protecting data within portable electronic devices
US20030097655A1 (en)2001-11-212003-05-22Novak Robert E.System and method for providing conditional access to digital content
US6865555B2 (en)2001-11-212005-03-08Digeo, Inc.System and method for providing conditional access to digital content
US20030108199A1 (en)2001-12-112003-06-12Pinder Howard G.Encrypting received content
US20050025312A1 (en)2002-01-142005-02-03Rijkaert Albert Maria ArnoldDistribution of encrypted information
US7065651B2 (en)*2002-01-162006-06-20Microsoft CorporationSecure video card methods and systems
US7197648B2 (en)*2002-01-162007-03-27Microsoft CorporationSecure video card methods and systems
US7376624B2 (en)2002-02-272008-05-20Imagineer Software, Inc.Secure communication and real-time watermarking using mutating identifiers
US7716746B2 (en)*2002-03-052010-05-11Sanyo Electric Co., Ltd.Data storing device for classified data
US20040015426A1 (en)2002-03-142004-01-22Bijan TadayonSystem and method for expressing usage rights with sound signals
US6785820B1 (en)*2002-04-022004-08-31Networks Associates Technology, Inc.System, method and computer program product for conditionally updating a security program
US20050119967A1 (en)2002-04-152005-06-02Ryuji IshiguroInformation processing device and method, program storage medium and program
US7395438B2 (en)2002-04-162008-07-01Microsoft CorporationDigital rights management (DRM) encryption and data-protection for content on device without interactive authentication
US20030215091A1 (en)2002-04-302003-11-20Toru KambayashiRendering device, copy control method and program
US20030229845A1 (en)2002-05-302003-12-11David SalesinSystem and method for adaptive document layout via manifold content
US7120868B2 (en)2002-05-302006-10-10Microsoft Corp.System and method for adaptive document layout via manifold content
US20030225796A1 (en)2002-05-312003-12-04Hitachi, Ltd.Method and apparatus for peer-to-peer file sharing
US7242771B2 (en)2002-06-262007-07-10Matsushita Electric Industrial Co., Ltd.Contents management system
US7370205B2 (en)*2002-08-012008-05-06Sony CorporationContent distribution system, content distribution method and terminal device
US7120250B2 (en)2002-09-092006-10-10Sony CorporationContent distribution for multiple digital rights management
US7340056B2 (en)2002-10-112008-03-04Thomson LicensingRemote deactivation of decoders for accessing multimedia digital data
US20040083366A1 (en)*2002-10-242004-04-29Nachenberg Carey S.Securing executable content using a trusted computing platform
US7216372B2 (en)*2002-11-192007-05-15Raquel Fernandez Escortell, legal representativeDisposable protector for the seat ring or upper part of a toilet
US7353543B2 (en)2003-01-102008-04-01Matsushita Electric Industrial Co., Ltd.Contents distribution system
US20080148063A1 (en)2003-01-132008-06-19Silicon Image, IncMethod and apparatus for content protection within an open architecture system
US7181016B2 (en)*2003-01-272007-02-20Microsoft CorporationDeriving a symmetric key from an asymmetric key for file encryption or decryption
US7536386B2 (en)*2003-03-272009-05-19Microsoft CorporationSystem and method for sharing items in a computer system
US20040193902A1 (en)*2003-03-312004-09-30Vogler Dean H.Digital content rendering device and method
US6922740B2 (en)*2003-05-212005-07-26Intel CorporationApparatus and method of memory access control for bus masters
US20050008130A1 (en)2003-05-302005-01-13Sony CorporationInformation processing system, information processor, information processing method, receiver, receiving method, and program
US20070033419A1 (en)2003-07-072007-02-08Cryptography Research, Inc.Reprogrammable security for controlling piracy and enabling interactive content
US20060190621A1 (en)2003-07-242006-08-24Kamperman Franciscus L AHybrid device and person based authorized domain architecture
US7607024B2 (en)*2003-08-012009-10-20Koninklijke Phillips Electronics N.V.Record carrier comprising encryption indication information
US20050058291A1 (en)2003-08-252005-03-17Brant CandeloreApparatus and method for an iterative cryptographic block
US20070192111A1 (en)*2003-09-122007-08-16Chasen Matthew DPeer-to-peer network method and system for shipment delivery transactions
US7644446B2 (en)2003-10-232010-01-05Microsoft CorporationEncryption and data-protection for content on portable medium
US7549044B2 (en)*2003-10-282009-06-16Dphi Acquisitions, Inc.Block-level storage device with content security
US20050111663A1 (en)2003-11-262005-05-26International Business Machines CorporationSystem, method, and service for delivering enhanced multimedia content on physical media
US20050132179A1 (en)2003-12-162005-06-16Microsoft CorporationApplying custom software image updates to non-volatile storage in a failsafe manner
US7933409B2 (en)2004-03-092011-04-26Panasonic CorporationContent playback device
US7606918B2 (en)*2004-04-272009-10-20Microsoft CorporationAccount creation via a mobile device
US20060005257A1 (en)2004-07-012006-01-05Nakahara TohruEncrypted contents recording medium and apparatus and method for reproducing encrypted contents
US7543160B2 (en)*2004-09-032009-06-02Research In Motion LimitedSystem and method for generating a secure state indicator on a display
US20060149567A1 (en)2004-12-302006-07-06International Business Machines CorporationMethod, system, and computer program product for dynamic field-level access control in shared documents
US20060224902A1 (en)2005-03-302006-10-05Bolt Thomas BData management system for removable storage media
US7606818B2 (en)*2006-12-202009-10-20Sap AgMethod and apparatus for aggregating change subscriptions and change notifications
US20080178081A1 (en)*2007-01-222008-07-24Eran ReshefSystem and method for guiding non-technical people in using web services

Non-Patent Citations (15)

* Cited by examiner, † Cited by third party
Title
CyberLink PowerCinema Linux Featuring Instant-On Capability Enables Digital Home Entertainment for CE and PC; Press Release on Oct. 26, 2004; http://www.cyberlink.com/eng/press_room/view_747.html.*
Felten, E. W. 2003. A skeptical view of DRM and fair use. Commun. ACM 46, 4 (Apr. 2003), 56-59.*
Licenses for your media files are corrupted, Microsoft, Aug. 21, 2007.*
Matt Blaze, A Cryptographic File System for Unix, 1993, ACM, Computer and Communication Security Nov. 1993, pp. 9-16.*
Microsoft Corporation, "A Technical Overview of Windows Media DRM 10 for Device", pp. 1-20, Retrieved from http://download.microsoft.com/download/b/7/a/b7a9aeae-d9f2-435b-a2dc-f3b0909d1d62/ A_Technical_Overview_of_WM_DRM_10_for_Devices.doc.
SearchSecurity.com, Content Scrambling System (CSS), May 2000, Retrieved from http://searchsecurity.techtarget.com/definition/Content-Scrambling-System?vgnextfmt=print.
Secure Video Processor Challenge-Response Protocol Top-Level Description, SVPLA, Apr. 15, 2004, 8 pages.
SVP Open Content Protection System Technical Overview, SVPLA, Jan. 3, 2005, 51 pages.
USPTO U.S. Appl. No. 10/910,452, filed Aug. 2, 2004; Title: Secure content enabled drive digital rights management system and method.
USPTO U.S. Appl. No. 11/013,745, filed Dec. 15, 2004; Title: Content server and method of storing content.
USPTO U.S. Appl. No. 11/014,001, filed Dec. 15, 2004; Title: Content server and method of providing content therefrom.
USPTO U.S. Appl. No. 11/112,364, filed Apr. 22, 2005; Title: Content keys for authorizing access to content.
USPTO U.S. Appl. No. 11/193,051, filed Jul. 29, 2005; Title: User interface for presentation of content.
USPTO U.S. Appl. No. 11/202,545, filed Aug. 11, 2005; Title: Method and System for Accessing Content on Demand.
USPTO U.S. Appl. No. 11/202,844, filed Aug. 11, 2005; Title: Method and System for Registering and Activating Content.

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10652332B2 (en)*2018-07-092020-05-12Oracle International CorporationSystem, method, and apparatuses for dynamic authorization
US11645384B2 (en)2021-03-032023-05-09Bank Of America CorporationSystem for electronic data obfuscation and protection using independent destructible data objects
US12105794B2 (en)2021-03-032024-10-01Bank Of America CorporationSystem for electronic data obfuscation and protection using independent destructible data objects

Also Published As

Publication numberPublication date
US8402283B1 (en)2013-03-19

Similar Documents

PublicationPublication DateTitle
USRE47772E1 (en)Secure content enabled hard drive system and method
US8396805B2 (en)Management apparatus, information processing apparatus, management method, and information processing method
US8280818B2 (en)License source component, license destination component, and method thereof
US7788271B2 (en)Content distribution server, content distribution method, and program
US10097347B2 (en)Content providing system, content reproducing device, content reproducing method, and computer program
US20060059105A1 (en)Move component, program, and move method
US7571852B2 (en)Method and apparatus for searching rights objects stored in portable storage device using object location data
US20070288391A1 (en)Apparatus, information processing apparatus, management method, and information processing method
US20090271319A1 (en)Embedded Licenses for Content
US8694799B2 (en)System and method for protection of content stored in a storage device
US20050201726A1 (en)Remote playback of ingested media content
JP4999191B2 (en) Secure information storage system and method
KR20060088501A (en) Flexible Licensing Architecture in Content Copyright Management System
KR20080003714A (en) Copyright-protected storage media, information recording apparatuses and information recording methods, information reproducing apparatuses and information reproducing methods
US20030163719A1 (en)Removable disk device with identification information
US8359332B1 (en)Secure content enabled drive digital rights management system and method
US8689011B2 (en)System and method for content protection
US20050228752A1 (en)System and method for managing encrypted multimedia content with an information handling system
US8438112B2 (en)Host device, portable storage device, and method for updating meta information regarding right objects stored in portable storage device
US20060069652A1 (en)Copy component, program and method thereof
US20060059101A1 (en)Reproduction component, program and method thereof
US20060059103A1 (en)Return component, program, and return component method
US20060059104A1 (en)Rent component, program, and rent component method
US20040015519A1 (en)Content delivery server and content delivery system having the same
HiraiA Study on Access Control Mechanism in Storage Devices for Audiovisual Contents

Legal Events

DateCodeTitleDescription
MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY


[8]ページ先頭

©2009-2025 Movatter.jp