Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
First Claim
1. A method including the following:
- at a first apparatus, receiving a first secure digital container including a controlled item, said controlled item including a file and information steganographically encoded into said file;
at said first apparatus, receiving a first control set made up of at least one control separately from said first secure digital container;
at said first apparatus, opening said first secure digital container; and
at said first apparatus, using said first control set to control at least one aspect of access to or use of at least a portion of said controlled item, including determining user information related to the age of a user of said first apparatus;
determining whether said user'"'"'s age is equal to or greater than a threshold;
allowing said user to complete at least one access to or use of at least a portion of said controlled item if said user'"'"'s age is equal to or greater than said threshold; and
blocking said user from completion of at least one access to or use of at least a portion of said controlled item if said user'"'"'s age is less than said threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
Electronic steganographic techniques can be used to encode a rights management control signal onto an information signal carried over an insecure communications channel. Steganographic techniques ensure that the digital control information is substantially invisibly and substantially indelibly carried by the information signal. These techniques can provide end-to-end rights management protection of an information signal irrespective of transformations between analog and digital. An electronic appliance can recover the control information and use it for electronic rights management to provide compatibility with a Virtual Distribution Environment. In one example, the system encodes low data rate pointers within high bandwidth time periods of the content signal to improve overall control information read/seek times.
874 Citations
32 Claims
-
1. A method including the following:
-
at a first apparatus, receiving a first secure digital container including a controlled item, said controlled item including a file and information steganographically encoded into said file;
at said first apparatus, receiving a first control set made up of at least one control separately from said first secure digital container;
at said first apparatus, opening said first secure digital container; and
at said first apparatus, using said first control set to control at least one aspect of access to or use of at least a portion of said controlled item, including determining user information related to the age of a user of said first apparatus;
determining whether said user'"'"'s age is equal to or greater than a threshold;
allowing said user to complete at least one access to or use of at least a portion of said controlled item if said user'"'"'s age is equal to or greater than said threshold; and
blocking said user from completion of at least one access to or use of at least a portion of said controlled item if said user'"'"'s age is less than said threshold.
-
-
2. A method including the following:
-
at a first apparatus, receiving a first secure digital container including a controlled item, said controlled item including a file and information steganographically encoded into said file;
at said first apparatus, receiving a first control set made up of at least one control separately from said first secure digital container;
at said first apparatus, opening said first secure digital container; and
at said first apparatus, using said first control set to control at least one aspect of access to or use of at least a portion of said controlled item, said use including determining whether a conversion of at least a portion of said controlled item is authorized;
converting said portion of said controlled item if said conversion is authorized and storing said converted portion; and
failing to convert said portion if said conversion is not authorized. - View Dependent Claims (3, 4, 5)
converting said controlled item portion from a first format to a second format.
-
-
4. A method as in claim 3, in which said first format comprises a digital format and said second format comprises an analog format.
-
5. A method as in claim 3, in which said first format comprises an analog format and said second format comprises a digital format.
-
6. A method including the following:
-
at a first apparatus, receiving a first secure digital container including a controlled item, said controlled item including a file and information steganographically encoded into said file;
at said first apparatus, receiving a first control set made up of at least one control separately from said first secure digital container;
at said first apparatus, opening said first secure digital container; and
at said first apparatus, using said first control set to control at least one aspect of access to or use of at least a portion of said controlled item, said use including;
gaining access to information regarding at least one aspect of a second apparatus;
determining whether transmitting said portion of said controlled item is authorized based at least in part on said second apparatus information; and
if transmitting is authorized, transmitting said portion of said controlled item from said first apparatus to said second apparatus. - View Dependent Claims (7)
-
-
8. A method including the following:
-
at a first apparatus, receiving a first secure digital container including a controlled item, said controlled item including a file and information steganographically encoded into said file;
at said first apparatus, receiving a first control set made up of at least one control separately from said first secure digital container;
at said first apparatus, opening said first secure digital container; and
at said first apparatus, using said first control set to control at least one aspect of access to or use of at least a portion of said file, said use including directly or indirectly providing payment-related information to a second apparatus.
-
-
9. A method including:
-
at a first apparatus, receiving a first secure digital container including a controlled item, said controlled item including a file and information steganographically encoded into said file, said information including a first control set made up of at least one control;
at said first apparatus, retrieving at least a portion of said controlled item from said first secure digital container;
at said first apparatus, steganographically recovering said first control set from said controlled item; and
at said first apparatus, using said first control set to control at least one aspect of access to or use of at least a portion of said controlled item, said use including;
determining user information related to the age of a user of said apparatus;
determining whether said user'"'"'s age is equal to or greater than a threshold;
allowing said user to complete at least one access to or use of at least a portion of said controlled item if said user'"'"'s age is equal to or greater than said threshold; and
blocking said user from completion of at least one access to or use of at least a portion of said controlled item if said user'"'"'s age is less than said threshold.
-
-
10. A method including:
-
at a first apparatus, receiving a first secure digital container including a controlled item, said controlled item including a file and information steganographically encoded into said file, said information including a first control set made up of at least one control;
at said first apparatus, retrieving at least a portion of said controlled item from said first secure digital container;
at said first apparatus, steganographically recovering said first control set from said controlled item; and
at said first apparatus, using said first control set to control at least one aspect of access to or use of at least a portion of said controlled item, including determining whether a conversion of at least a portion of said controlled item is authorized;
converting said portion of said controlled item if said conversion is authorized and storing said converted portion; and
failing to perform said conversion if said conversion is not authorized. - View Dependent Claims (11, 12, 13)
converting at least a portion of said controlled item from a first format to a second format.
-
-
12. A method as in claim 11, in which said first format comprises a digital format and said second format comprises an analog format.
-
13. A method as in claim 11, in which said first format comprises an analog format and said second format comprises a digital format.
-
14. A method including:
-
at a first apparatus, receiving a first secure digital container including a controlled item, said controlled item including a file and information steganographically encoded into said file, said information including a first control set made up of at least one control;
at said first apparatus, retrieving at least a portion of said controlled item from said first secure digital container;
at said first apparatus, steganographically recovering said first control set from said controlled item; and
at said first apparatus, using said first control set to control at least one aspect of access to or use of at least a portion of said controlled item, including;
gaining access to information regarding at least one aspect of a second apparatus;
determining whether transmitting said portion of said controlled item to said second apparatus is authorized based at least in part on said second apparatus information; and
if transmission is authorized, transmitting said portion from said first apparatus to said second apparatus. - View Dependent Claims (15)
-
-
16. A method including:
-
at a first apparatus, receiving a first secure digital container including a controlled item, said controlled item including a file and information steganographically encoded into said file, said information including a first control set made up of at least one control;
at said first apparatus, retrieving at least a portion of said controlled item from said first secure digital container;
at said first apparatus, steganographically recovering said first control set from said controlled item; and
at said first apparatus, using said first control set to control at least one aspect of access to or use of at least a portion of said controlled item, including directly or indirectly providing payment-related information to a second apparatus.
-
-
17. An apparatus including the following elements:
-
a portable memory reader;
a processing unit;
a memory; and
a portable memory including;
a first secure digital container, a controlled item and information steganographically encoded in said controlled item; and
control information relating to at least one aspect of control of said controlled item, including a control based at least in part based on information relating to the age of a user of said apparatus.
-
-
18. An apparatus including the following elements:
-
a portable memory reader;
a processing unit;
a memory; and
a portable memory including;
a first secure digital container, a controlled item and information steganographically encoded in said controlled item; and
control information including at least one control at least in part controlling when at least a portion of said item is capable of being converted from a first format to a second format and of being stored in said second format. - View Dependent Claims (19, 20)
-
-
21. A secure digital container including:
-
an encrypted controlled item comprising digital information;
first control information steganographically encoded into said controlled item;
second control information;
said first or second control information including information relating to the age of a user; and
a cryptographic key capable of being used to at least in part decrypt said controlled item.
-
-
22. A secure digital container including:
-
an encrypted controlled item comprising digital information;
first control information steganographically encoded into said controlled item;
second control information;
said first or second control information including at least one control at least in part controlling whether at least a portion of said item is capable of being converted from a first format to a second format and of being stored in said second format; and
a cryptographic key capable of being used to at least in part decrypt said controlled item. - View Dependent Claims (23, 24)
-
-
25. A secure digital container including:
-
encrypted controlled contents comprising digital information;
a first digital control of a first entity, said first digital control controlling at least one aspect of access to or use of at least a portion of said controlled contents;
a second digital control of a second entity different from said first entity, said second digital control controlling at least one aspect of access to or use of at least a portion of said controlled contents;
said first or second digital controls including at least one control based at least in part on information relating to the age of a user; and
information steganographically encoded in said controlled contents.
-
-
26. A secure digital container including:
-
encrypted controlled contents comprising digital information;
a first digital control of a first entity, said first digital control controlling at least one aspect of access to or use of at least a portion of said controlled contents;
a second digital control of a second entity different from said first entity, said second digital control controlling at least one aspect of access to or use of at least a portion of said controlled contents;
said first or second digital controls including at least one control at least in part controlling whether at least a portion of said item is capable of being converted from a first format to a second format and of being stored in said second format; and
information steganographicalIV encoded in said controlled contents. - View Dependent Claims (27, 28)
-
-
29. A secure digital container including:
-
a controlled item comprising digital information, said controlled item being at least in part encrypted;
a first control steganographically encoded into at least a portion of said controlled item, said first control controlling at least one aspect of access to or use of at least a portion of said controlled item;
a second control controlling at least one aspect of access to or use of at least a portion of said controlled item;
said second control being different from said first control;
said first or second controls including at least one control based at least in part on information relating to the age of a user of said apparatus.
-
-
30. A secure digital container including:
-
a controlled item comprising digital information, said controlled item being at least in part encrypted;
a first control steganographically encoded into at least a portion said controlled item, said first control controlling at least one aspect of access to or use of at least a portion of said controlled item;
a second control controlling at least one aspect of access to or use of at least a portion of said controlled item;
said second control being different from said first controlsaid first or second controls including at least one control at least in part controlling whether at least a portion of said item is capable of being converted from a first format to a second format and of being stored in said second format. - View Dependent Claims (31, 32)
-
Specification