Digital rights management system and method
First Claim
1. A method for protecting digital content, comprising:
- protecting the content according to a content security scheme to form protected content;
constructing a descrambler to read said protected content; and
protecting said descrambler according to a variable descrambler security scheme to produce a protected descrambler, wherein said variable descrambler security scheme is varied according to at least one variable parameter.
10 Assignments
0 Petitions
Accused Products
Abstract
A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided through a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content. Thus, different security schemes may optionally and preferably be generated from a particular root structure. Related apparatus and methods are also provided.
-
Citations
105 Claims
-
1. A method for protecting digital content, comprising:
-
protecting the content according to a content security scheme to form protected content;
constructing a descrambler to read said protected content; and
protecting said descrambler according to a variable descrambler security scheme to produce a protected descrambler, wherein said variable descrambler security scheme is varied according to at least one variable parameter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. Protected digital content, produced according to the method of any of claims 152.
-
54. A method for protecting digital content, comprising:
-
providing a general security scheme for protecting the content;
varying said general security scheme according to each type of content to form a variable scheme, wherein said general security scheme is varied according to at least one random parameter; and
altering at least one characteristic of the content according to said variable scheme to form protected content. - View Dependent Claims (55, 56, 57, 58, 59)
-
-
60. A system for protecting digital content for transmission, comprising:
-
(a) a compiler for receiving a general security scheme and for varying said general security scheme to form a variable security scheme;
(b) a packager for scrambling the content according to said variable security scheme to form scrambled content, wherein said variable security scheme is varied separately for each type of content; and
(c) an end user device for receiving said scrambled content and for reading said scrambled content according to at least one authorization. - View Dependent Claims (61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74)
-
-
75. A method for protecting a portion of software code, comprising:
-
selecting the portion to be protected; and
altering the portion to a non-accessible format, wherein a remainder of the software code is not altered to said non-accessible format, and wherein the portion in said non-accessible format is not removed, such that said remainder of the software code is functional. - View Dependent Claims (76)
-
-
77. A method for generating a signature for an end user device, the end user device comprising at least video display hardware and video display software, the method comprising:
-
processing video data by the video display hardware and the video display software;
altering at least a portion of the video data during processing according to a characteristic of at least one of the video display hardware and the video display software to form altered data; and
forming the signature based, at least in part, on said altered data. - View Dependent Claims (78, 79)
-
-
80. A protected digital content package, comprising:
-
(a) digital content protected according to a key, said key being generated according to a variable security scheme for each instance of content; and
(b) reading software for reading said digital content at least partially by generating said key, said reading software being protected according to said variable security scheme. - View Dependent Claims (81, 82, 83, 84, 85, 86, 87)
-
- 88. A compiler for protecting code, comprising a compiler for generating a plurality of different versions of protected compiled code, each version being produced according to a security scheme being received by said compiler.
-
97. In a system for transmitting protected content, the system comprising a builder and a head-end, the head-end transmitting the protected content, providing a method for protecting the content, the method comprising:
-
protecting a descrambler to read said protected content according to a variable descrambler security scheme to produce a protected descrambler, wherein said variable descrambler security scheme is varied according to at least one variable parameter, by the builder;
protecting the content according to a content security scheme to form protected content by the head-end; and
packaging said protected content and said protected descrambler by the head-end for transmission. - View Dependent Claims (98, 99)
-
- 100. In a method for protecting software code, the method protecting the software code by obfuscating at least a portion of the software code, the improvement comprising providing a plurality of magazines, each magazine comprising at least one instruction for obfuscating at least the portion of the software code, such that a plurality of versions of the software code is produced according to said plurality of magazines.
- 104. Protected digital content, comprising digital content intimately connected to both information and software code required for accessing said digital content, wherein said connection is formed according to a variable security scheme.
Specification