Reprogrammable security for controlling piracy and enabling interactive content
First Claim
1. A method of distributing audiovisual content intended for secure playback, comprising:
- (a) modifying at least a portion of the audiovisual content to thereby corrupt the video;
(b) generating program logic associated with the modified content, the program logic adapted to correct a modification applied in step (a);
(c) distributing the modified content; and
(d) distributing the program logic.
6 Assignments
0 Petitions
Accused Products
Abstract
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title'"'"'s security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities.
-
Citations
19 Claims
-
1. A method of distributing audiovisual content intended for secure playback, comprising:
-
(a) modifying at least a portion of the audiovisual content to thereby corrupt the video; (b) generating program logic associated with the modified content, the program logic adapted to correct a modification applied in step (a); (c) distributing the modified content; and (d) distributing the program logic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising program logic stored on machine-readable media, said program logic adapted for distribution in connection with audiovisual content that had been at least in part degraded in quality, said program logic adapted to:
-
(a) identify at least one characteristic of playback environment associated with a playback device seeking to play the content; (b) determine whether the at least one characteristic reflects a valid playback device, with playback device validity determined by at least one of (i) authenticating playback device manufacturer, (ii) authenticating player device model, (iii) authenticating player device firmware, and (iv) determining that playback environment does not reflect a predetermined security; and (c) process the content to restore level of quality if the at least one characteristic reflects a valid playback device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for verifying the integrity of encrypted audiovisual content on an optical medium, comprising:
-
(a) performing hashes of portions of said encrypted audiovisual content; (b) creating a hash tree from said hashes by hashing multiple of said hashes together; and (c) digitally signing said hash tree such that said signature can be verified by a playback device seeking to playback said audiovisual content.
-
Specification