WO1998029869A1 - Access to information using protectable authorization messages - Google Patents

Access to information using protectable authorization messages Download PDF

Info

Publication number
WO1998029869A1
WO1998029869A1 PCT/US1997/023441 US9723441W WO9829869A1 WO 1998029869 A1 WO1998029869 A1 WO 1998029869A1 US 9723441 W US9723441 W US 9723441W WO 9829869 A1 WO9829869 A1 WO 9829869A1
Authority
WO
WIPO (PCT)
Prior art keywords
valuable information
authorization message
receiving devices
protectable
legally
Prior art date
Application number
PCT/US1997/023441
Other languages
French (fr)
Inventor
Lawrence A. Leske
Original Assignee
Leske Lawrence A
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leske Lawrence A filed Critical Leske Lawrence A
Publication of WO1998029869A1 publication Critical patent/WO1998029869A1/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B23/00Record carriers not specific to the method of recording or reproducing; Accessories, e.g. containers, specially adapted for co-operation with the recording or reproducing apparatus ; Intermediate mediums; Apparatus or processes specially adapted for their manufacture
    • G11B23/28Indicating or preventing prior or unauthorised use, e.g. cassettes with sealing or locking means, write-protect devices for discs
    • G11B23/283Security features, e.g. digital codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00188Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • the present invention pertains to the field of accessing valuable information. More particularly, this invention relates to a method for accessing valuable information using legally protectable authorization messages.
  • Valuable information such as movies, videos, and audio recordings is commonly distributed to consumers using a variety of distribution media including magnetic storage media and optical storage media.
  • magnetic storage media includes magnetic tape and magnetic disk media.
  • optical storage media includes compact disks, laser disks, minidisks, as well as digital video disks and writeable optical storage disks .
  • Content providers of such valuable information usually seek to prevent unauthorized use the valuable information distributed on such media.
  • unauthorized use of such valuable information may be prohibited under the intellectual property protection laws of the United States and other countries.
  • An owner of the intellectual property rights to the valuable information is referred to as a right holder.
  • the prevention of intellectual property right violations is facilitated through formal agreements between the right holders and the manufactures of media recording/playback devices. Under one such prior agreement, a copyright indication is contained on storage media that holds valuable information which is prohibited from being copied. Typically, the manufacturers of authorized media recording/playback devices disable recording functions if the copyright indication is detected while reading the media.
  • a system and method for preventing unauthorized use of valuable information using legally protectable authorization messages.
  • a media access device that enables access to the valuable information provides the valuable information to a receiving device only if the receiving device produces the legally protectable authorization message.
  • the legally protectable authorization message may be prohibited from unauthorized use under international intellectual property laws of the United States and other countries.
  • providers of unauthorized devices violate an intellectual property rights in the legally protected authorization message if those devices produce the legally protectable authorization message.
  • an unauthorized device must generate a copyrighted authorization message in order to obtain the valuable information from the media.
  • right holders can more easily show that providers of such unauthorized devices are providing the devices in order to wrongly obtain valuable information from storage media.
  • Figure 1 illustrates a method for preventing unauthorized use of valuable information which is accessed by a media access device
  • Figure 2 illustrates a method for preventing unauthorized use of the valuable information in another embodiment
  • Figure 3 illustrates a method for preventing unauthorized use of the valuable information in yet another embodiment
  • Figure 4 illustrates a system that employs legally protectable authorization messages to prevent unauthorized use of valuable information
  • Figure 5 illustrates a media access device in one embodiment
  • Figure 6 illustrates a process by which a media access device prevents unauthorized used of valuable information by devices coupled to a communication path.
  • Figure 1 illustrates a method for preventing unauthorized use of valuable information 16 which is accessed by a media access device 10.
  • a receiving device 12 transfers a legally protectable authorization message 14 to the media access device 10 via a communication path 20.
  • the media access device 10 receives the legally protectable authorization message 14 and then transfers the valuable information 16 to the receiving device 12 via the communication path 20 if the legally protectable authorization message 14 is provided and is validated by the media access device 10.
  • Unauthorized use of the legally protectable authorization message 14 may be prohibited under intellectual property laws. If the receiving device 12 is provided by an entity not authorized to use the legally protectable authorization message 14 by the right holder to the legally protectable authorization message 14 then that entity may be liable for violating the intellectual property rights afforded to the right holder regardless of the intended or actual use of the receiving device 12.
  • the legally protectable authorization message 14 is a predefined copyrighted message.
  • the predefined copyrighted message includes a copyright notice that specifies the owner of the copyright.
  • the legally protectable authorization message 14 is an ASCII coded message.
  • the legally protectable authorization message 14 is an encrypted message.
  • the legally protectable authorization message 14 includes a predefined encryption key which is used to decode the valuable information 16. The predefined encryption key is kept secret by the right holder to the legally protectable authorization message 14 and is disclosed only to approved device providers that adhere to the present methods for accessing valuable information.
  • the predefined encryption key contained in the legally protectable authorization message 14 is ASCII encoded.
  • the predefined encryption key contained in the legally protectable authorization message 14 is an algorithmic transformation of the actual key such as the actual key minus one.
  • the media access device 10 represents a wide variety of devices capable of accessing valuable information including media players such as digital video disk or DVD players, laser disk players, compact disk players, CD-ROM players, video tape players, and audio tape players.
  • the media access device 10 also represents computer systems including personal computer systems which are capable of reading information from a variety of media including DVD media, CD-ROM media, as well as other magnetic and optical storage media.
  • the receiving device 12 represents a wide variety of devices capable of using the valuable information 16 including media recorders such as digital video recorders, video tape recorders, and audio tape recorders.
  • the receiving device 12 also represents devices capable of rendering the valuable information 16 included display devices such as display monitors, video monitors, and television monitors any of which may have audio rendering capabilities.
  • the receiving device 12 also represents computer systems including personal computer systems which are capable of recording the valuable information 16 or for manipulating the valuable information 16 or for rendering the valuable information 16 via a variety of display mechanisms.
  • the receiving device 12 also represents devices which are not authorized by the right holder of the message 14 to use the message 14. Such devices may be embodied as any of the devices listed above or specialized devices that are placed between a media access device and another unauthorized receiving device such as any of the receiving devices listed above.
  • the communication path 20 represents any communication path capable of carrying the legally protectable authorization message 14 and the valuable information 16.
  • the communication path may be embodied in a parallel communication bus structure, a serial communication bus structure, a parallel or serial communication link, a communication network, or an infrared or radio frequency communication link or communication network.
  • the communication path 20 may be a standardized communication path that is provided specifically for carrying the legally protectable authorization message 14 and the valuable information 16 and for enabling access to protected information by authorized devices.
  • the valuable information 16 may be subdivided into a series of information blocks with each block being encrypted using various encryption methods. Block transformation encryption methods may be used to sufficiently manipulate the content of the valuable information being transferred to prevent viewing or listening without appropriate decryption.
  • the content of the valuable information 16 may also be encoded according to various compression techniques including MPEG, International Standards Organization SC29 G11, approved compression standards and FCC approved compression standards.
  • FIG. 2 illustrates another method for preventing unauthorized use of the valuable information 16 which is accessed by the media access device 10.
  • the media access device 10 transmits a poll message 22 to the receiving device 12 via the communication path 20.
  • the poll message 22 includes a request authorization message.
  • the receiving device 12 responds to the poll message 22 containing the request authorization message by transferring a response message 24 via the communication path 20 that contains the legally protectable authorization message 14. Any one of a wide variety of known poll/response communication techniques may be used by the media access device 10 to poll the receiving device 12 and other devices coupled to the communication path 20.
  • the media access device 10 receives the legally protectable authorization message 14 contained in the response message 24 and then logs the receiving device 12 as an authorized receiving device if the legally protectable authorization message 14 is valid.
  • the media access device 10 may transmit the poll message 22 to the receiving device 12 at power up or whenever a media element is inserted into the media access device 10 or whenever the receiving device 12 is first detected on the communication path 12.
  • the receiving device 12 transfers a request for information from media message 30 to the media access device 10 via the communication path 20. If the media element in the media access device 10 contains valuable information which may not be used without authorization and if the receiving device 12 is logged as an authorized receiving device then the media access device 10 responds to the request 30 by transferring the valuable information 16 obtained from the media element via the communication path 20. If the media element in the media access device 10 contains information which may not be used without authorization and if the receiving device 12 is not logged as an authorized receiving device then the media access device 10 either ignores the request 30 or transfers a request denied message to the receiving device 12 via the communication path 20. In one embodiment, the media access device 10 determines whether the media element contains valuable information which may not be used without authorization by reading the media element for an indication of whether the information contained thereon may be used without authorization.
  • Figure 3 illustrates yet another method for preventing unauthorized use of the valuable information 16 which is accessed by the media access device 10.
  • the receiving device 12 transfers the request message 30 to the media access device 10 via the communication path 20. If the media element in the media access device 10 contains valuable information which may not be used without authorization then the media access device 10 transfers a request authorization message 32 to the receiving device 12 via the communication path 20.
  • the media access device 10 transfers the valuable information 16 via the communication path 20. If the receiving device 12 does not produce the legally protectable authorization message 14 in response to the request message 32 then the media access device 10 either ignores the request message 30 or transfers a request denied message to the receiving device 12 via the communication path 20.
  • FIG. 4 illustrates a system 50 that employs legally protectable authorization messages to prevent unauthorized use of valuable information.
  • the system 50 includes the media access device 10, a television system 40, a recording system 42, a computer system 44, and a pair of unauthorized receiving devices 46 and 48 all coupled to the communication path 20. Any one or more of the television system 40, the recording system 42, the computer system 44, and the unauthorized receiving devices 46 and 48 may provide the functionality of the receiving device 12 with respect to obtaining valuable information from media being accessed by the media access device 10.
  • the unauthorized receiving device 46 represents a device that does not produce the legally protectable authorization message 14 when required.
  • the unauthorized receiving device 48 represents a device that does produce the legally protectable authorization message 14 but that is provided by an entity that is not authorized to use the legally protectable authorization message 14 by the owner of the intellectual property rights in the legally protectable authorization message 14.
  • the unauthorized receiving device 48 may be manufactured by an entity not licenced by the owner of the copyright on the legally protectable authorization message 14.
  • the media access device 10 sends polling messages to each of the devices 40-48 at power up time or at the time a new media element containing valuable information which may not be used without authorization is placed into the media access device.
  • the media access device 10 maintains a log of which of the device 40-48 returned the legally protectable authorization message 14 in response to the polling messages. Thereafter, the media access device 10 uses the information in the log to either satisfy or deny any requests for valuable information received from the devices 40-48.
  • FIG. 5 illustrates the media access device 10 in one embodiment.
  • the media access device 10 includes a media access mechanism 60 for reading information from a storage media.
  • the information on the storage media may be valuable information which is protected by copyright laws and which may not be used without authorization.
  • the media access device 10 includes a communication interface 64 which enables transfer of information over the communication path 20 including the valuable information 16 obtained from the storage media and messages used to obtain authorization from the devices 40-48.
  • the media access device 10 includes a processor 62 that generates messages and that maintains a log of authorized devices in a memory 66.
  • the processor 62 and the memory 66 may in some embodiments be the same processor and memory elements in the media access device 10 which are used to access the storage media.
  • Figure 6 illustrates a process by which the media access device 10 prevents unauthorized used of valuable information by devices coupled to the communication path 20.
  • the processor 62 transfers poll messages to each of the devices 40-48 via the communication path 20.
  • the processor 62 may poll each device individually or may broadcast one poll to all devices via the communication path 20.
  • the processor 62 creates a log of authorized receiving devices.
  • a logged authorized receiving device is a receiving device on the communication path 20 that returned the legally protectable authorization message 14 in response to a poll. This log may be stored in the memory 66.
  • an information request is received from one of the devices 40-48 via the communication path 20.
  • the processor 62 determines whether the information request received at block 104 is a request for valuable information which may not be used without authorization.
  • the media being accessed through the media access mechanism 60 stores an indication of whether the media contains valuable, i.e. copyrighted, information which may not be used without authorization.
  • the processor 62 transfers the requested information to the requesting receiving device via the communication path 20 without regard as to whether the requesting receiving device is an authorized device. Otherwise, control proceeds to block 110.
  • the processor 62 determines whether the requesting receiving device is an authorized receiving device by accessing the log of authorized receiving devices contained in the memory 66. If the requesting receiving device is authorized then the processor 62 transfers the valuable information to the requesting receiving device at block 112. Otherwise, the processor 62 ignores the information request and proceeds back to block 104 to handle a next information request. In an alternative embodiment, the processor 62 ignores the information request at block 110 if any one or more of the devices 40-48 is unauthorized. This embodiment prevents unauthorized receiving devices from eavesdropping on transactions conducted by other authorized devices coupled to the communication path 20.

Abstract

A system for preventing unauthorized use of valuable information (16) using a predetermined authorization message (14) which is protectable under intellectual property laws. The system includes a media access device (10) that enables access to the valuable information (16) which provides the valuable information (16) to a receiving device (12) in the system only if the receiving device (12) produces the predetermined authorization message (14).

Description

ACCESS TO INFORMATION USING PROTECTABLE AUTHORIZATION MESSAGES
Technical Field The present invention pertains to the field of accessing valuable information. More particularly, this invention relates to a method for accessing valuable information using legally protectable authorization messages.
Background Art
Valuable information such as movies, videos, and audio recordings is commonly distributed to consumers using a variety of distribution media including magnetic storage media and optical storage media. Such magnetic storage media includes magnetic tape and magnetic disk media. Such optical storage media includes compact disks, laser disks, minidisks, as well as digital video disks and writeable optical storage disks .
Content providers of such valuable information usually seek to prevent unauthorized use the valuable information distributed on such media. Typically, unauthorized use of such valuable information may be prohibited under the intellectual property protection laws of the United States and other countries. An owner of the intellectual property rights to the valuable information is referred to as a right holder.
For example, unauthorized copying of the valuable information contained on such media may be prohibited under United States and international copyright laws. Movies, videos, and other content distributed on media such as video tape, laser disk and digital video disk are usually protected from unauthorized copying under copyright laws. The right holder of such valuable information nevertheless is faced with the prospect of preventing violations of their intellectual property rights.
Typically, the prevention of intellectual property right violations is facilitated through formal agreements between the right holders and the manufactures of media recording/playback devices. Under one such prior agreement, a copyright indication is contained on storage media that holds valuable information which is prohibited from being copied. Typically, the manufacturers of authorized media recording/playback devices disable recording functions if the copyright indication is detected while reading the media.
These efforts notwithstanding, third parties often provide devices capable of defeating such agreed safeguards against copying of valuable information. For example, such devices may filter or eliminated the copyright indication as the content of the storage media is read and transferred to a recording device. Typically, right holders seek to cut off the source of such devices to prevent copying of their valuable information.
One way to cut off the source of such devices is to bring legal actions against the providers of such devices for copyright violation. However, a defense to such an action is to argue that such devices are provided for uses other than copying of valuable information. Unfortunately, such a defense may hinder the efforts of right holders seeking to enforce their rights and cut off the supply of such devices. DISCLOSURE OF THE INVENTION
A system and method is disclosed for preventing unauthorized use of valuable information using legally protectable authorization messages. A media access device that enables access to the valuable information provides the valuable information to a receiving device only if the receiving device produces the legally protectable authorization message. The legally protectable authorization message may be prohibited from unauthorized use under international intellectual property laws of the United States and other countries.
Accordingly, providers of unauthorized devices violate an intellectual property rights in the legally protected authorization message if those devices produce the legally protectable authorization message. For example, an unauthorized device must generate a copyrighted authorization message in order to obtain the valuable information from the media. As a consequence, right holders can more easily show that providers of such unauthorized devices are providing the devices in order to wrongly obtain valuable information from storage media.
Other features and advantages of the present invention will be apparent from the detailed description that follows.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is described with respect to particular exemplary embodiments thereof and reference is accordingly made to the drawings in which:
Figure 1 illustrates a method for preventing unauthorized use of valuable information which is accessed by a media access device;
Figure 2 illustrates a method for preventing unauthorized use of the valuable information in another embodiment;
Figure 3 illustrates a method for preventing unauthorized use of the valuable information in yet another embodiment;
Figure 4 illustrates a system that employs legally protectable authorization messages to prevent unauthorized use of valuable information;
Figure 5 illustrates a media access device in one embodiment;
Figure 6 illustrates a process by which a media access device prevents unauthorized used of valuable information by devices coupled to a communication path. MODES FOR CARRYING OUT THE INVENTION
Figure 1 illustrates a method for preventing unauthorized use of valuable information 16 which is accessed by a media access device 10. A receiving device 12 transfers a legally protectable authorization message 14 to the media access device 10 via a communication path 20. The media access device 10 receives the legally protectable authorization message 14 and then transfers the valuable information 16 to the receiving device 12 via the communication path 20 if the legally protectable authorization message 14 is provided and is validated by the media access device 10.
Unauthorized use of the legally protectable authorization message 14 may be prohibited under intellectual property laws. If the receiving device 12 is provided by an entity not authorized to use the legally protectable authorization message 14 by the right holder to the legally protectable authorization message 14 then that entity may be liable for violating the intellectual property rights afforded to the right holder regardless of the intended or actual use of the receiving device 12.
In some embodiments, the legally protectable authorization message 14 is a predefined copyrighted message. The predefined copyrighted message includes a copyright notice that specifies the owner of the copyright. In one embodiment, the legally protectable authorization message 14 is an ASCII coded message. In another embodiment, the legally protectable authorization message 14 is an encrypted message. In some embodiments, the legally protectable authorization message 14 includes a predefined encryption key which is used to decode the valuable information 16. The predefined encryption key is kept secret by the right holder to the legally protectable authorization message 14 and is disclosed only to approved device providers that adhere to the present methods for accessing valuable information. In one embodiment, the predefined encryption key contained in the legally protectable authorization message 14 is ASCII encoded. In another embodiment, the predefined encryption key contained in the legally protectable authorization message 14 is an algorithmic transformation of the actual key such as the actual key minus one.
The media access device 10 represents a wide variety of devices capable of accessing valuable information including media players such as digital video disk or DVD players, laser disk players, compact disk players, CD-ROM players, video tape players, and audio tape players. The media access device 10 also represents computer systems including personal computer systems which are capable of reading information from a variety of media including DVD media, CD-ROM media, as well as other magnetic and optical storage media.
The receiving device 12 represents a wide variety of devices capable of using the valuable information 16 including media recorders such as digital video recorders, video tape recorders, and audio tape recorders. The receiving device 12 also represents devices capable of rendering the valuable information 16 included display devices such as display monitors, video monitors, and television monitors any of which may have audio rendering capabilities. The receiving device 12 also represents computer systems including personal computer systems which are capable of recording the valuable information 16 or for manipulating the valuable information 16 or for rendering the valuable information 16 via a variety of display mechanisms.
The receiving device 12 also represents devices which are not authorized by the right holder of the message 14 to use the message 14. Such devices may be embodied as any of the devices listed above or specialized devices that are placed between a media access device and another unauthorized receiving device such as any of the receiving devices listed above.
The communication path 20 represents any communication path capable of carrying the legally protectable authorization message 14 and the valuable information 16. The communication path may be embodied in a parallel communication bus structure, a serial communication bus structure, a parallel or serial communication link, a communication network, or an infrared or radio frequency communication link or communication network. The communication path 20 may be a standardized communication path that is provided specifically for carrying the legally protectable authorization message 14 and the valuable information 16 and for enabling access to protected information by authorized devices.
The valuable information 16 may be subdivided into a series of information blocks with each block being encrypted using various encryption methods. Block transformation encryption methods may be used to sufficiently manipulate the content of the valuable information being transferred to prevent viewing or listening without appropriate decryption. The content of the valuable information 16 may also be encoded according to various compression techniques including MPEG, International Standards Organization SC29 G11, approved compression standards and FCC approved compression standards.
Figure 2 illustrates another method for preventing unauthorized use of the valuable information 16 which is accessed by the media access device 10. The media access device 10 transmits a poll message 22 to the receiving device 12 via the communication path 20. The poll message 22 includes a request authorization message. The receiving device 12 responds to the poll message 22 containing the request authorization message by transferring a response message 24 via the communication path 20 that contains the legally protectable authorization message 14. Any one of a wide variety of known poll/response communication techniques may be used by the media access device 10 to poll the receiving device 12 and other devices coupled to the communication path 20.
The media access device 10 receives the legally protectable authorization message 14 contained in the response message 24 and then logs the receiving device 12 as an authorized receiving device if the legally protectable authorization message 14 is valid. The media access device 10 may transmit the poll message 22 to the receiving device 12 at power up or whenever a media element is inserted into the media access device 10 or whenever the receiving device 12 is first detected on the communication path 12.
At any time, the receiving device 12 transfers a request for information from media message 30 to the media access device 10 via the communication path 20. If the media element in the media access device 10 contains valuable information which may not be used without authorization and if the receiving device 12 is logged as an authorized receiving device then the media access device 10 responds to the request 30 by transferring the valuable information 16 obtained from the media element via the communication path 20. If the media element in the media access device 10 contains information which may not be used without authorization and if the receiving device 12 is not logged as an authorized receiving device then the media access device 10 either ignores the request 30 or transfers a request denied message to the receiving device 12 via the communication path 20. In one embodiment, the media access device 10 determines whether the media element contains valuable information which may not be used without authorization by reading the media element for an indication of whether the information contained thereon may be used without authorization.
Figure 3 illustrates yet another method for preventing unauthorized use of the valuable information 16 which is accessed by the media access device 10. The receiving device 12 transfers the request message 30 to the media access device 10 via the communication path 20. If the media element in the media access device 10 contains valuable information which may not be used without authorization then the media access device 10 transfers a request authorization message 32 to the receiving device 12 via the communication path 20.
If the receiving device 12 responds to the request message 32 with the legally protectable authorization message 14 then the media access device 10 transfers the valuable information 16 via the communication path 20. If the receiving device 12 does not produce the legally protectable authorization message 14 in response to the request message 32 then the media access device 10 either ignores the request message 30 or transfers a request denied message to the receiving device 12 via the communication path 20.
Figure 4 illustrates a system 50 that employs legally protectable authorization messages to prevent unauthorized use of valuable information. The system 50 includes the media access device 10, a television system 40, a recording system 42, a computer system 44, and a pair of unauthorized receiving devices 46 and 48 all coupled to the communication path 20. Any one or more of the television system 40, the recording system 42, the computer system 44, and the unauthorized receiving devices 46 and 48 may provide the functionality of the receiving device 12 with respect to obtaining valuable information from media being accessed by the media access device 10.
The unauthorized receiving device 46 represents a device that does not produce the legally protectable authorization message 14 when required. The unauthorized receiving device 48 represents a device that does produce the legally protectable authorization message 14 but that is provided by an entity that is not authorized to use the legally protectable authorization message 14 by the owner of the intellectual property rights in the legally protectable authorization message 14. For example, the unauthorized receiving device 48 may be manufactured by an entity not licenced by the owner of the copyright on the legally protectable authorization message 14.
In one embodiment, the media access device 10 sends polling messages to each of the devices 40-48 at power up time or at the time a new media element containing valuable information which may not be used without authorization is placed into the media access device. The media access device 10 maintains a log of which of the device 40-48 returned the legally protectable authorization message 14 in response to the polling messages. Thereafter, the media access device 10 uses the information in the log to either satisfy or deny any requests for valuable information received from the devices 40-48.
Figure 5 illustrates the media access device 10 in one embodiment. The media access device 10 includes a media access mechanism 60 for reading information from a storage media. The information on the storage media may be valuable information which is protected by copyright laws and which may not be used without authorization. The media access device 10 includes a communication interface 64 which enables transfer of information over the communication path 20 including the valuable information 16 obtained from the storage media and messages used to obtain authorization from the devices 40-48.
The media access device 10 includes a processor 62 that generates messages and that maintains a log of authorized devices in a memory 66. The processor 62 and the memory 66 may in some embodiments be the same processor and memory elements in the media access device 10 which are used to access the storage media.
Figure 6 illustrates a process by which the media access device 10 prevents unauthorized used of valuable information by devices coupled to the communication path 20. At block
100, the processor 62 transfers poll messages to each of the devices 40-48 via the communication path 20. The processor 62 may poll each device individually or may broadcast one poll to all devices via the communication path 20. At block 102, the processor 62 creates a log of authorized receiving devices. A logged authorized receiving device is a receiving device on the communication path 20 that returned the legally protectable authorization message 14 in response to a poll. This log may be stored in the memory 66.
At block 104, an information request is received from one of the devices 40-48 via the communication path 20. At block 106, the processor 62 determines whether the information request received at block 104 is a request for valuable information which may not be used without authorization. In one embodiment, the media being accessed through the media access mechanism 60 stores an indication of whether the media contains valuable, i.e. copyrighted, information which may not be used without authorization.
If the requested information is not valuable information requiring authorization then at block 108 the processor 62 transfers the requested information to the requesting receiving device via the communication path 20 without regard as to whether the requesting receiving device is an authorized device. Otherwise, control proceeds to block 110.
At block 110, the processor 62 determines whether the requesting receiving device is an authorized receiving device by accessing the log of authorized receiving devices contained in the memory 66. If the requesting receiving device is authorized then the processor 62 transfers the valuable information to the requesting receiving device at block 112. Otherwise, the processor 62 ignores the information request and proceeds back to block 104 to handle a next information request. In an alternative embodiment, the processor 62 ignores the information request at block 110 if any one or more of the devices 40-48 is unauthorized. This embodiment prevents unauthorized receiving devices from eavesdropping on transactions conducted by other authorized devices coupled to the communication path 20.
The foregoing detailed description of the present invention is provided for the purposes of illustration and is not intended to be exhaustive or to limit the invention to the precise embodiment disclosed. Accordingly, the scope of the present invention is defined by the appended claims.

Claims

CLAIMSWhat is claimed is:
1. A system for preventing unauthorized use of valuable information, comprising: receiving device that generates a legally protectable authorization message; media access device that transfers the valuable information to the receiving device in response to the legally protectable authorization message.
2. The system of claim 1, wherein the legally protectable authorization message includes a copyright notice.
3. The system of claim 2, wherein the copyright notice identifies a right holder of the legally protectable authorization message.
4. The system of claim 1, wherein the receiving device and the media access device are coupled to a communication path that carries the legally protectable authorization message and the valuable information.
5. The system of claim 1, wherein the valuable information is contained on a storage media which is read by the media access device.
6. The system of claim 5, wherein the storage media contains an indication that the valuable information may not be used without authorization.
7. The system of claim 6, wherein the media access device does not transfer the valuable information to the receiving device if the indication is present on the storage media unless the receiving device provides the legally protectable authorization message.
8. The system of claim 6, wherein the media access device transfers the valuable information to the receiving device if the indication is not present on the storage media regardless of whether the receiving device provides the legally protectable authorization message.
9. A system for preventing unauthorized use of valuable information, comprising: means for reading the valuable information from a storage media; means for obtaining a legally protectable authorization message from each of a plurality of receiving devices; means for transferring the valuable information to a requesting one of the receiving devices if the requesting one provides the legally protectable authorization message.
10. The system of claim 9, wherein the means for obtaining comprises : means for polling each of the receiving devices; means for logging the receiving devices that produce the legally protectable authorization message.
11. The system of claim 10, wherein the means for reading comprises a media player for reading the storage media.
12. The system of claim 11, wherein the means for polling comprises means for polling the receiving devices in response to the placement of the storage media into the media player.
13. The system of claim 11, wherein the means for polling comprises means for polling the receiving devices in response to the placement of the storage media into the media player if the storage media indicates that the valuable information may not be used without authorization.
14. The system of claim 10, wherein the means for transferring the valuable information comprises means for transferring the valuable information to the requesting one of the receiving devices if the requesting one is logged as one of the receiving devices that produce the legally protectable authorization message.
15. The system of claim 10, wherein the means for transferring the valuable information comprises means for transferring the valuable information to the requesting one of the receiving devices only if all of the receiving devices are logged as receiving devices that produce the legally protectable authorization message.
16. A method for preventing unauthorized use of valuable information, comprising the steps of: reading the valuable information from a storage media; obtaining a legally protectable authorization message from each of a plurality of receiving devices; transferring the valuable information to a requesting one of the receiving devices if the requesting one provides the legally protectable authorization message.
17. The method of claim 16, wherein the step of obtaining comprises the steps of: polling each of the receiving devices; logging the receiving devices that produce the legally protectable authorization message.
18. The method of claim 17, wherein the step of transferring the valuable information comprises the step of transferring the valuable information to the requesting one of the receiving devices if the requesting one is logged as one of the receiving devices that produce the legally protectable authorization message.
19. The method of claim 17, wherein the step of transferring the valuable information comprises the step of transferring the valuable information to the requesting one of the receiving devices only if all of the receiving devices are logged as receiving devices that produce the legally protectable authorization message.
PCT/US1997/023441 1996-12-17 1997-12-17 Access to information using protectable authorization messages WO1998029869A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US76821996A 1996-12-17 1996-12-17
US08/768,219 1996-12-17

Publications (1)

Publication Number Publication Date
WO1998029869A1 true WO1998029869A1 (en) 1998-07-09

Family

ID=25081882

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/023441 WO1998029869A1 (en) 1996-12-17 1997-12-17 Access to information using protectable authorization messages

Country Status (1)

Country Link
WO (1) WO1998029869A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1128381A1 (en) * 2000-02-28 2001-08-29 Ricoh Company, Ltd. Recording medium having two different root directory informations respectively stored at two different locations
EP1379936A2 (en) * 2001-03-28 2004-01-14 Cryptography Research Inc. Content security layer providing long-term renewable security
EP1942391A1 (en) * 2001-03-28 2008-07-09 Macrovision Corporation Computer-readable medium, device and method for playing encrypted digital video
US7984511B2 (en) 2001-03-28 2011-07-19 Rovi Solutions Corporation Self-protecting digital content
US8055910B2 (en) 2003-07-07 2011-11-08 Rovi Solutions Corporation Reprogrammable security for controlling piracy and enabling interactive content

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5412718A (en) * 1993-09-13 1995-05-02 Institute Of Systems Science Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information
US5416840A (en) * 1993-07-06 1995-05-16 Phoenix Technologies, Ltd. Software catalog encoding method and system
US5453968A (en) * 1989-09-21 1995-09-26 U.S. Philips Corporation Methods of and information recording devices for recording and/or inhibiting recording of an information signal having copy bits with logic values which alternate in accordance with a pattern
US5570339A (en) * 1993-07-22 1996-10-29 Victor Company Of Japan, Ltd. Optical disc and a recording and/or reproducing apparatus having copy-protection function
US5651064A (en) * 1995-03-08 1997-07-22 544483 Alberta Ltd. System for preventing piracy of recorded media
US5661703A (en) * 1995-06-27 1997-08-26 Fujitsu Limited Optical recording medium having a non-volatile identification code and method for encoding data using same
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5453968A (en) * 1989-09-21 1995-09-26 U.S. Philips Corporation Methods of and information recording devices for recording and/or inhibiting recording of an information signal having copy bits with logic values which alternate in accordance with a pattern
US5416840A (en) * 1993-07-06 1995-05-16 Phoenix Technologies, Ltd. Software catalog encoding method and system
US5570339A (en) * 1993-07-22 1996-10-29 Victor Company Of Japan, Ltd. Optical disc and a recording and/or reproducing apparatus having copy-protection function
US5412718A (en) * 1993-09-13 1995-05-02 Institute Of Systems Science Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5651064A (en) * 1995-03-08 1997-07-22 544483 Alberta Ltd. System for preventing piracy of recorded media
US5661703A (en) * 1995-06-27 1997-08-26 Fujitsu Limited Optical recording medium having a non-volatile identification code and method for encoding data using same

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1128381A1 (en) * 2000-02-28 2001-08-29 Ricoh Company, Ltd. Recording medium having two different root directory informations respectively stored at two different locations
US7092949B2 (en) 2000-02-28 2006-08-15 Ricoh Company, Ltd. Recording medium having a plurality of sections storing root directory information
EP1379936A2 (en) * 2001-03-28 2004-01-14 Cryptography Research Inc. Content security layer providing long-term renewable security
EP1379936A4 (en) * 2001-03-28 2005-05-04 Cryptography Res Inc Content security layer providing long-term renewable security
EP1942391A1 (en) * 2001-03-28 2008-07-09 Macrovision Corporation Computer-readable medium, device and method for playing encrypted digital video
US7984511B2 (en) 2001-03-28 2011-07-19 Rovi Solutions Corporation Self-protecting digital content
US7987510B2 (en) 2001-03-28 2011-07-26 Rovi Solutions Corporation Self-protecting digital content
US7996913B2 (en) 2001-03-28 2011-08-09 Rovi Solutions Corporation Self-protecting digital content
US8949624B2 (en) 2001-03-28 2015-02-03 Irdeto Usa, Inc. Method and system for secure access to non-volatile memory
US8055910B2 (en) 2003-07-07 2011-11-08 Rovi Solutions Corporation Reprogrammable security for controlling piracy and enabling interactive content
US8131646B2 (en) 2003-07-07 2012-03-06 Rovi Solutions Corporation Reprogrammable security for controlling piracy and enabling interactive content using revocation status
US8571993B2 (en) 2003-07-07 2013-10-29 Irdeto Usa, Inc. Reprogrammable security for controlling piracy and enabling interactive content

Similar Documents

Publication Publication Date Title
KR100277418B1 (en) Copy Protection System for Multimedia Devices
US7260557B2 (en) Method and apparatus for license distribution
KR100718598B1 (en) Method of and apparatus for providing secure communication of digital data between devices
US8234217B2 (en) Method and system for selectively providing access to content
RU2345497C2 (en) Method of local networking and control thereof
KR100982166B1 (en) Digital rights management method and system
US6832318B1 (en) Method and apparatus for secure distribution of information recorded on fixed media
US20040010717A1 (en) Apparatus and method for preventing digital media piracy
US7440574B2 (en) Content encryption using programmable hardware
US20050168323A1 (en) Security modules for conditional access with restrictions
US20080235810A1 (en) Method of Authorizing Access to Content
US6499106B1 (en) Method and apparatus for secure distribution of information recorded of fixed media
KR101407139B1 (en) Method of recording and securely distributing digital data, access device and recorder
US20030091187A1 (en) Apparatus and method for reading or writing user data
US20080260351A1 (en) Recording of Protected Broadcast Content with Selectable User Rights
US20060277415A1 (en) Content protection method and system
JP3846230B2 (en) Content information authentication playback device
WO1998029869A1 (en) Access to information using protectable authorization messages
CN1161923C (en) Updating a revocation list to foil an adversary
JP2005032248A (en) Multimedia storage device having area for digital writing use only
JP4213501B2 (en) Data communication system and data communication method
KR20030060449A (en) Method And Apparatus for exchanging data between external device and TV set
AU2002367530A1 (en) Apparatus and method for preventing digital media piracy
MXPA06008255A (en) Method of authorizing access to content

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): BR CA JP KR MX AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase