Digital rights management system and methods for accessing content from an intelligent storage
First Claim
1. A storage device configured to provide content to a player system for rendering of the content, said storage device comprising:
- a storage medium comprising a user area that is accessible by the player system and a non-user area that is not accessible by the player system; and
a controller comprising a cryptographic module providing a hardware root of trust and a secured memory, wherein the controller is configured to;
authenticate the player system;
establish a secured communication channel with the player system based on the authentication;
provide, to the player system, a first cryptographic key, wherein the first cryptographic key is unique to the storage device, the first cryptographic key based at least partly on defect information of the storage medium and cryptographic data stored on the non-user area;
provide, to the player system, a second cryptographic key that is associated with the content, wherein the second cryptographic key is based at least partly on cryptographic data previously obtained, over a communication network, from an audit system distinct from the player system; and
provide, to the player system, the content in encrypted form from the user area of the storage medium,wherein the content is accessible based on a cryptographic combination of the first cryptographic key and the second cryptographic key.
8 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to accessing content stored on a storage device and protecting the content with a digital rights management (DRM) scheme. The storage device may be a disk drive, or network attached storage. The storage device can perform cryptographic operations and provide a hardware root of trust. The DRM employs a binding key, a content key, and an access key. The binding key binds the content to the storage device and is based on a key concealed on the storage device. The binding key itself is not stored anywhere on the storage device. The content key is a key assigned to the content. The access key is determined based on a cryptographic combination of the content key and binding key. In one embodiment, the content is encrypted based on the access key and stored in encrypted form in the storage device.
20 Citations
22 Claims
-
1. A storage device configured to provide content to a player system for rendering of the content, said storage device comprising:
-
a storage medium comprising a user area that is accessible by the player system and a non-user area that is not accessible by the player system; and a controller comprising a cryptographic module providing a hardware root of trust and a secured memory, wherein the controller is configured to; authenticate the player system; establish a secured communication channel with the player system based on the authentication; provide, to the player system, a first cryptographic key, wherein the first cryptographic key is unique to the storage device, the first cryptographic key based at least partly on defect information of the storage medium and cryptographic data stored on the non-user area; provide, to the player system, a second cryptographic key that is associated with the content, wherein the second cryptographic key is based at least partly on cryptographic data previously obtained, over a communication network, from an audit system distinct from the player system; and provide, to the player system, the content in encrypted form from the user area of the storage medium, wherein the content is accessible based on a cryptographic combination of the first cryptographic key and the second cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A player system configured to play encrypted content, said system comprising:
-
a first interface configured to communicate with a storage device storing encrypted content; and a processor configured to; authenticate the storage device; establish a secured communication channel with the storage device via the first interface; receive, from the storage device, a binding cryptographic key that is unique to the storage device, the binding cryptographic key based at least partly on defect information of a storage medium of the storage device; receive, from the storage device, a second cryptographic key that is associated with the content, wherein the second cryptographic key is based at least partly on cryptographic data previously obtained, over a communication network, from an audit system distinct from the player system; determine an access key for the content based on a cryptographic combination of the binding cryptographic key and the second cryptographic key; receive, from the storage device, the encrypted content; and decrypt the content based on the access key. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of accessing encrypted content from a storage device, said method comprising:
-
receiving, from the storage device, a binding cryptographic key that binds the content to the storage device, the binding cryptographic key based at least partly on defect information of a storage medium of the storage device; receiving, from the storage device, a second cryptographic key that is associated with the content, wherein the second cryptographic key is based at least partly on cryptographic data previously obtained, over a communication network, from an audit system distinct from a player system; determining an access key for the content based on a cryptographic combination of the binding cryptographic key and the second cryptographic key; receiving, from the storage device, the encrypted content; and decrypting the content based on the access key. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification