Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
First Claim
1. A system comprising:
- a first electronic appliance configured to receive a request from a user to use protected information, the first electronic appliance including a rights management component configured to determine whether the first electronic appliance has sufficient rights to grant the request; and
one or more other appliances, each of the one or more other appliances including a rights management component;
wherein the rights management component of the first electronic appliance is configured to obtain, from at least one of the one or more other appliances, rights that the first electronic appliance needs to grant the request.
0 Assignments
0 Petitions
Accused Products
Abstract
A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations. A secure “software container” can be used to protectively encapsulate (e.g., by cryptographic techniques) various digital property content (e.g., audio, video, game, etc.) and control object (i.e., set of rules) information. A standardized container format is provided for general use on/with various mediums and platforms. In addition, a special purpose container may be provided for DVD medium and appliances (e.g., recorders, players, etc.) that contains DVD program content (digital property) and DVD medium specific rules. The techniques, systems and methods disclosed herein are capable of achieving compatibility with other protection standards, such as for example, CGMA and Matsushita data protection standards adopted for DVDs. Cooperative rights management may also be provided, where plural networked rights management arrangements collectively control a rights management event on one or more of such arrangements.
121 Citations
31 Claims
-
1. A system comprising:
-
a first electronic appliance configured to receive a request from a user to use protected information, the first electronic appliance including a rights management component configured to determine whether the first electronic appliance has sufficient rights to grant the request; and
one or more other appliances, each of the one or more other appliances including a rights management component;
wherein the rights management component of the first electronic appliance is configured to obtain, from at least one of the one or more other appliances, rights that the first electronic appliance needs to grant the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method performed by tamper-resistant hardware and/or software running on a first electronic appliance, the method comprising:
-
receiving a request from a user of the first electronic appliance to make a requested use of protected information;
determining whether the user has sufficient rights to make the requested use of the protected information; and
upon determining that the user has insufficient rights to make the requested use of the protected information, obtaining one or more rights from at least one other appliance communicatively coupled to the first electronic appliance, the one or more rights being sufficient, either alone or in combination with other rights, to enable the user to make the requested use of the protected information. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification