Copy protection method for digital media
First Claim
1. A copy protection method for digital media, the method comprising the steps of:
- (a) encrypting an original media data set with a media key having a symmetric algorithm and encrypting said media key with each public key of compliant devices;
(b) delivering said encrypted media data set and said encrypted media key to a compliant playing device;
(c) decrypting said delivered media key with a private key of said playing device;
(d) decrypting said delivered media data set with said decrypted media key;
(e) adding a player watermark to said decrypted media data set if said decrypted data set is not marked with “
free copy”
, said player watermark containing a player identification of said playing device and player copy-control information;
(f) encrypting said watermark-added media data set with said decrypted media key and encrypting said decrypted media key with said each public key of compliant devices; and
(g) passing said media data set and media key encrypted in the step (f) to a compliant recording device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of digital media copy protection is disclosed. The method of the present invention is applicable to any type of digital media data and makes no assumptions on any specific media properties. The method includes a process of protecting digital media data with a public key using a hybrid cryptographic technique, a process of watermarking the media data, and an output device compliance testing process through an authenticated handshake protocol. Because of the media data protection with the hybrid cryptographic technique, a non-compliant playing device is not able to play or read a protected media data set. The output device compliance testing protocol is used to prevent the media signal from being copied to any non-compliant device. These features of the present invention are used to reduce the possibility of making any illegal copies on any nonstandard equipment. In addition, the data watermarking is used to modify the played and recorded media signals, to keep track of the identification information of the related devices for detecting any illegal copy maker, and to separate legal media data sets from the illegal data sets.
91 Citations
9 Claims
-
1. A copy protection method for digital media, the method comprising the steps of:
-
(a) encrypting an original media data set with a media key having a symmetric algorithm and encrypting said media key with each public key of compliant devices;
(b) delivering said encrypted media data set and said encrypted media key to a compliant playing device;
(c) decrypting said delivered media key with a private key of said playing device;
(d) decrypting said delivered media data set with said decrypted media key;
(e) adding a player watermark to said decrypted media data set if said decrypted data set is not marked with “
free copy”
, said player watermark containing a player identification of said playing device and player copy-control information;
(f) encrypting said watermark-added media data set with said decrypted media key and encrypting said decrypted media key with said each public key of compliant devices; and
(g) passing said media data set and media key encrypted in the step (f) to a compliant recording device. - View Dependent Claims (2, 3, 4)
-
-
5. A copy protection method for digital media, the method comprising the steps of:
-
(a) encrypting an original media data set with a media key having a symmetric algorithm and encrypting said media key with each public key of compliant devices;
(b) delivering said encrypted media data set and said encrypted media key to a compliant playing device;
(c) decrypting said delivered media key with a private key of said playing device;
(d) decrypting said delivered media data set with said decrypted media key;
(e) adding a player watermark to said decrypted media data set if said decrypted data set is not marked with “
free copy”
, said player watermark containing a player identification of said playing device and player copy-control information.(f) performing a compliance test through an authentication handshake process between said playing device and a displaying device; and
(g) transferring said watermark-added media data set to and displaying device only if said displaying device passes said test. - View Dependent Claims (6, 7, 8, 9)
-
Specification