SELF-PROTECTING DIGITAL CONTENT
First Claim
1. An automated method for determining whether to allow a portion of software stored in a computer-readable memory to access to a portion of a nonvolatile memory, comprising:
- (a) receiving a reference to said portion of software wishing to receive access to said nonvolatile memory portion;
(b) computing a cryptographic hash of said software portion;
(c) comparing said computed cryptographic hash with a value stored in said nonvolatile memory;
(d) if said computed cryptographic hash matches said stored value, executing said software portion with access to said nonvolatile memory portion; and
(e) if said computed cryptographic hash does not match said stored value, not allowing said software portion to access said nonvolatile memory.
2 Assignments
0 Petitions
Accused Products
Abstract
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title'"'"'s security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities.
213 Citations
1 Claim
-
1. An automated method for determining whether to allow a portion of software stored in a computer-readable memory to access to a portion of a nonvolatile memory, comprising:
-
(a) receiving a reference to said portion of software wishing to receive access to said nonvolatile memory portion; (b) computing a cryptographic hash of said software portion; (c) comparing said computed cryptographic hash with a value stored in said nonvolatile memory; (d) if said computed cryptographic hash matches said stored value, executing said software portion with access to said nonvolatile memory portion; and (e) if said computed cryptographic hash does not match said stored value, not allowing said software portion to access said nonvolatile memory.
-
Specification