Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information
First Claim
1. In a system for distributing information including at least a storage medium and at least an output device, said information including both distributed information (DI) and supporting information (SI), a method for preventing unauthorized use of said information on said storage medium, said storage medium having nonuniformities and uniformities, said method comprising the steps of:
- generating a signature from the nonuniformities of said storage medium without introducing any artificial indica on the medium;
incorporating said signature into an encryption key and encrypting said information prior to distributing said storage medium;
permitting access to said storage medium by said device in response to verification of said signature; and
generating a decryption key with said signature for decrypting said information and permitting access to said information by said device.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a method for preventing unauthorized copying and use of information which is stored on a storage medium and for restricting the use of such information to designated devices. Copy protection is achieved by generating a signature from a given storage medium. The signature is derived from an arbitrarily selected list of nonuniformities, uniformities and their attributes. The selected list may contain nonuniformities at any granularity level. As such, this signature is unique to a given storage medium in the same way finger prints are unique to a human being. This signature is used to derive a key for encrypting the information on the storage medium. Any copying of the distribution information from one storage medium to another results in the mutation of the signature required to decrypt the information. Therefore, the present invention obviates the need for introducing artificial indica or requiring a special hardware subsystem for achieving a copy protection scheme.
Restricting the usage of information on a distribution medium to a designated device is achieved by verifying the device ID (DID-D) of the device with the device ID (DID-S) stored in the distribution medium before the decryption and transfer of information are undertaken. Decryption of the information is accomplished by generating a key from both the signature of the distribution medium and the DID-S.
-
Citations
14 Claims
-
1. In a system for distributing information including at least a storage medium and at least an output device, said information including both distributed information (DI) and supporting information (SI), a method for preventing unauthorized use of said information on said storage medium, said storage medium having nonuniformities and uniformities, said method comprising the steps of:
-
generating a signature from the nonuniformities of said storage medium without introducing any artificial indica on the medium; incorporating said signature into an encryption key and encrypting said information prior to distributing said storage medium; permitting access to said storage medium by said device in response to verification of said signature; and generating a decryption key with said signature for decrypting said information and permitting access to said information by said device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. In a system for distributing information including at least a storage medium and at least a designated device, said device having an unique identification (ID) number, said information including both distributed information (DI) and supporting information (SI), a method for preventing unauthorized use of said information on said storage medium, said storage medium having nonuniformities and uniformities, said method comprising the steps of:
-
generating a signature from the nonuniformities of said storage medium without introducing any artificial indica on the medium; incorporating said signature and said device ID into an encryption key and encrypting said information prior to distributing said storage medium; permitting access to said storage medium by said device in response to verification of said signature and said device ID; and generating a decryption key with said signature and said device ID for decrypting said information and permitting access to said information on said device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification