Media content protection utilizing public key cryptography
First Claim
1. A method for preventing unauthorized access to content stored on a media, comprising:
- receiving a request to access content stored on a media from a particular play-back device including an identifier indicative of a type of device of said particular play-back device;
matching said identifier to a list of authorized play-back device types, said list being stored on said media; and
when said identifier matches one entry of said list of authorized play-back device types, performing the steps of;
(i) retrieving a public key associated with said one entry from said media;
(ii) retrieving a content key utilized to encrypt said content from said media;
(iii) encrypting said content key with said public key, and (iv) communicating said encrypted content key to said particular play-back device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing protection of content stored on a bulk storage media is disclosed. The technique for providing protection from unauthorized utilization of the content so stored is provided publicly in order to allow for those utilizing a conforming media device to master or generate content protected according to the present invention. Various ways in which to protect content are disclosed including verification of the authenticity of a particular media, utilization of an accepted list of media play-back devices and their corresponding published public keys in order to securely pass media content keys thereto, and utilization of an external contact to provide media content keys and/or updates of accepted media play-back devices.
178 Citations
29 Claims
-
1. A method for preventing unauthorized access to content stored on a media, comprising:
-
receiving a request to access content stored on a media from a particular play-back device including an identifier indicative of a type of device of said particular play-back device;
matching said identifier to a list of authorized play-back device types, said list being stored on said media; and
when said identifier matches one entry of said list of authorized play-back device types, performing the steps of;
(i) retrieving a public key associated with said one entry from said media;
(ii) retrieving a content key utilized to encrypt said content from said media;
(iii) encrypting said content key with said public key, and (iv) communicating said encrypted content key to said particular play-back device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
controlling a drive unit reading said media to prevent said particular play-back device from directly accessing portions of said media which contain the content key.
-
-
3. The method of claim 2 wherein said content key is interspersed at different portions of said media.
-
4. The method of claim 1 wherein said content key is encoded as errors on said media via an error correction code.
-
5. The method of claim 1 wherein said content key is stored on an active portion of said media.
-
6. The method of claim 5 wherein said active portion includes a processor which is operable to only communicate said content key in encrypted form.
-
7. The method of claim 1 wherein said content key is a private key.
-
8. The method of claim 1 further comprising the steps of:
-
receiving an encrypted random number from said particular play-back device; and
decrypting said encrypted random number;
wherein said step of encrypting said content key with said public key, includes the sub-step of performing an exclusive-or (XOR) operation with said content key and said random number.
-
-
9. The method of claim 1 wherein said media is a mass distributed media.
-
10. A system for preventing unauthorized utilization of content, comprising:
-
a processor operating under a set of instructions to control access to content stored on a media utilizing access information stored on said media and validation information received from a particular play-back device;
said content being encrypted with a media cryptographic key, said media cryptographic key being stored on said media;
said access information including a list of identifiers of a plurality of authorized play-back device types;
said access information further including a respective device cryptographic key for each authorized play-back device type of said plurality of authorized play-back device types;
said set of instructions including code to receive said validation information from said particular play-back device in a request to read said content on said media;
said set of instructions including code to determine whether said received validation information matches one of said identifiers of said list of identifiers; and
said set of instructions including code to communicate said media cryptographic key encrypted by said respective device cryptographic key associated with said particular play-back device type to said particular play-back device when said validation information matches one of said identifiers. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for preventing unauthorized access to content, comprising:
-
storing content on a media encrypted with a content key, wherein said content key is stored on said media, and wherein said media is distributed in mass;
storing information indicative of authorized media player types on said media;
storing a respective public key for each authorized media player type of said authorized media player types on said media;
receiving from a particular media player a request to access said content from said media, wherein said request includes an identifier specifying a type of said particular media player;
validating said particular media player by matching said identifier against said information indicative of authorized media player types; and
when said validating step determines said particular media player is authorized, sending said content key encrypted by said respective public key associated with said particular media player to said particular media player. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
controlling a drive unit to access data stored on said media.
-
-
24. The method of claim 23 wherein said step of controlling a drive unit prevents said particular media player from directly accessing portions of said media which store said content key.
-
25. The method of claim 22 wherein said content key is interspersed through different portions of said media.
-
26. The method of claim 25 wherein said content key is encoded as errors in an error correction code.
-
27. The method of claim 22 wherein said content key is a private key.
-
28. The method of claim 22 wherein said steps of receiving, validating, and sending are performed by a processor on an active portion of said media.
-
29. The method of claim 22 wherein the step of sending further comprises:
-
receiving an encrypted random number;
decrypting said random number; and
performing an exclusive-or (XOR) operation on said content key.
-
Specification