MEDIA CONTENT PROTECTION UTILIZING PUBLIC KEY CRYPTOGRAPHY
First Claim
1. A method for preventing unauthorized utilization of content stored on a storage media, said method comprising the steps of:
- storing first information on the media, wherein said first information is stored within a controlled access portion of the media, and wherein said first information includes information with respect to at least one authorized media utilization device;
storing second information on the media, wherein said second information includes a cryptographic key of said at least one authorized media utilization device;
storing user content on the media, wherein said user content is stored within an open access portion of the media;
determining if a particular media utilization device is an acceptable media utilization device to provide said user content to, wherein said determination is at least in part made through reference to said first information; and
enabling said particular media utilization device to utilize said user content at least in part by communicating information thereto encrypted with said cryptographic key of said second information associated therewith if said particular utilization device is determined to be acceptable at said determining step.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing protection of content stored on a bulk storage media is disclosed. The technique for providing protection from unauthorized utilization of the content so stored is provided publicly in order to allow for those utilizing a conforming media device to master or generate content protected according to the present invention. Various ways in which to protect content are disclosed including verification of the authenticity of a particular media, utilization of an accepted list of media play-back devices and their corresponding published public keys in order to securely pass media content keys thereto, and utilization of an external contact to provide media content keys and/or updates of accepted media play-back devices.
82 Citations
33 Claims
-
1. A method for preventing unauthorized utilization of content stored on a storage media, said method comprising the steps of:
-
storing first information on the media, wherein said first information is stored within a controlled access portion of the media, and wherein said first information includes information with respect to at least one authorized media utilization device;
storing second information on the media, wherein said second information includes a cryptographic key of said at least one authorized media utilization device;
storing user content on the media, wherein said user content is stored within an open access portion of the media;
determining if a particular media utilization device is an acceptable media utilization device to provide said user content to, wherein said determination is at least in part made through reference to said first information; and
enabling said particular media utilization device to utilize said user content at least in part by communicating information thereto encrypted with said cryptographic key of said second information associated therewith if said particular utilization device is determined to be acceptable at said determining step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16, 17, 18, 19, 20, 21)
-
-
14. A method for preventing unauthorized utilization of content stored on a storage device, said method comprising the steps of:
-
storing first information on the storage device, wherein said first information is stored within a controlled access portion of the storage device, and wherein said first information includes a public cryptographic key;
storing user content on the storage device, wherein said user content is stored within an open access portion of the storage device;
validating a particular device operable with said method as acceptable for use with said method, wherein said validating step utilizes at least a portion of said first information; and
enabling utilization of said user content if said particular device is validated as acceptable at said validating step.
-
-
22. A system for providing protected content on a bulk storage device, said system comprising:
-
a storage device providing information storage capacity, wherein at least a portion of said storage capacity is identified as restricted access storage capacity and at least a portion of said storage capacity is identified as open access storage capacity; and
a processor operating under control of an instruction set, wherein said instruction set defines conditions under which access to said restricted access storage capacity is authorized, and wherein at least a storage device public key and information with respect to a plurality of acceptable play-back devices are stored in said restricted access storage capacity under control of said processor in accordance with said instruction set. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification