Cryptographic methods, apparatus and systems for storage media electronic right management in closed and connected appliances
First Claim
1. A method comprising:
- at a first site, packaging an electronic content item in a first secure digital container;
distributing the first secure digital container from the first site to an electronic appliance at a second site, the electronic appliance including tamper-resistant software and/or hardware operable to govern use of the electronic content item in accordance with one or more rules;
contacting a third site to obtain a first set of one or more rules expressing one or more permitted uses of the electronic content item;
receiving the first set of one or more rules at the electronic appliance;
receiving a request from a user of the electronic appliance to make a use of the electronic content item; and
using the tamper-resistant software and/or hardware to selectively grant the request in accordance with the first set of one or more rules.
0 Assignments
0 Petitions
Accused Products
Abstract
A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations. A secure “software container” can be used to protectively encapsulate (e.g., by cryptographic techniques) various digital property content (e.g., audio, video, game, etc.) and control object (i.e., set of rules) information. A standardized container format is provided for general use on/with various mediums and platforms. In addition, a special purpose container may be provided for DVD medium and appliances (e.g., recorders, players, etc.) that contains DVD program content (digital property) and DVD medium specific rules. The techniques, systems and methods disclosed herein are capable of achieving compatibility with other protection standards, such as for example, CGMA and Matsushita data protection standards adopted for DVDs. Cooperative rights management may also be provided, where plural networked rights management arrangements collectively control a rights management event on one or more of such arrangements.
110 Citations
30 Claims
-
1. A method comprising:
-
at a first site, packaging an electronic content item in a first secure digital container;
distributing the first secure digital container from the first site to an electronic appliance at a second site, the electronic appliance including tamper-resistant software and/or hardware operable to govern use of the electronic content item in accordance with one or more rules;
contacting a third site to obtain a first set of one or more rules expressing one or more permitted uses of the electronic content item;
receiving the first set of one or more rules at the electronic appliance;
receiving a request from a user of the electronic appliance to make a use of the electronic content item; and
using the tamper-resistant software and/or hardware to selectively grant the request in accordance with the first set of one or more rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method performed by a first electronic appliance, the method comprising:
-
receiving, at the first electronic appliance, a protected electronic content item from a first remote site, the protected electronic content item being encrypted at least in part, the first electronic appliance including tamper-resistant software and/or hardware operable to govern use of the protected electronic content item in accordance with one or more electronic rules;
using a telecommunications network to contact a second electronic appliance to obtain a first set of one or more electronic rules, the first set of one or more electronic rules expressing one or more permitted uses of the protected electronic content item;
receiving the first set of one or more electronic rules at the first electronic appliance;
receiving a request from a user of the first electronic appliance to make a use of the protected electronic content item; and
using the tamper-resistant software and/or hardware to selectively grant the request in accordance with the first set of one or more electronic rules. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. An electronic appliance comprising:
-
tamper-resistant software and/or hardware operable to govern use of a protected electronic content item in accordance with one or more electronic rules expressing one or more permitted uses of the protected electronic content item;
a network connection operable to obtain the one or more electronic rules from a first remote site;
memory for storing the one or more electronic rules;
a user input for receiving a request from a user to use the protected electronic content item; and
an output for presenting the protected electronic content item to the user. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification