Method for binding a software data domain to specific hardware
First Claim
Patent Images
1. A system for binding copy protection to a device comprising:
- a key derived in part from at least one preselected unique or distinctive hardware, software or firmware identifier within the device and in part from a random or pseudo-random number; and
a copy protection program securely holding protected content which validates the device based upon the key when employed to access the protected content.
1 Assignment
0 Petitions
Accused Products
Abstract
A copy protection program for securely holding digital audio and/or video content is bound to a particular device via a key derived in part from unique or distinctive hardware, software and/or firmware identifiers within the device and in part from a random or pseudo-random number. The key is checked or rebuilt whenever the copy protection program is employed to access protected digital content, either authorizing/prohibiting such access to the content or enabling/precluding proper decoding of the content. Therefore the digital content need not be directly bound to the device while circumvention of the copy protection is frustrated.
-
Citations
20 Claims
-
1. A system for binding copy protection to a device comprising:
-
a key derived in part from at least one preselected unique or distinctive hardware, software or firmware identifier within the device and in part from a random or pseudo-random number; and
a copy protection program securely holding protected content which validates the device based upon the key when employed to access the protected content. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A device for storing or playing protected content comprising:
-
at least one hardware, software or firmware component within the device having associated therewith a unique or distinctive identifier; and
a copy protection program selectively executable within the device and securely holding the protected content, wherein the copy protection program, when employed to access the protected content, validates the device based upon a key derived in part from the identifier for the at least one hardware, software or firmware component and in part from a random or pseudo-random number. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for storing or playing protected content within a device having at least one hardware, software or firmware component with a unique or distinctive identifier associated therewith comprising:
executing a copy protection program within the device which securely holds the protected content, wherein the copy protection program, when employed to access the protected content, validates the device based upon a key derived in part from the identifier for the at least one hardware, software or firmware component and in part from a random or pseudo-random number. - View Dependent Claims (12, 13, 14, 15)
-
16. A software key for binding copy protection to a device and transmitted within a signal to the device comprising:
-
a first portion derived from at least one preselected unique or distinctive hardware, software or firmware identifier within the device; and
a second portion derived from a random or pseudo-random number, wherein the key is employed by a copy protection program securely holding protected content within the device to validate the device when employed to access the protected content. - View Dependent Claims (17, 18, 19, 20)
-
Specification