A CONTENT PLAYER
FIELD
The present invention relates to a content player, and more specifically to a device that is able to play video or audio files and prohibits copying of the files stored on the device.
BACKGROUND
Portable audio players, such as the iPod™ produced by Apple Computer, Inc, have become popular with consumers because they allow users to selectively store thousands of audio tracks on the player, which can then be played and listened to in different groups or sequences, referred to as "playlists". The players are able to store the audio files in a digital form on disc or memory in a compressed format using a number of known compression schemes, such as AAC, WMV and the most popular, MPEG-1 Audio Layer 3 (or MP3).
Portable video players are also available, such as TAZ I from Tight Systems LLC (http://www.tightaudiosystems.com/see taz.htm), Samsung YH-999, and Creative Technology Ltd "Zen Portable Media Center", which allow users to store video files that can then be selectively played and displayed on video or television displays connected to or incorporated in the player. Again a number of video compression schemes are available for storing the files in a compressed format, such as MPEG-4, MPEG-2 and DivX.
One of the primary features of the current players, and one of the significant problems, is they allow users to freely make copies of content, such as an audio file or a video file, without the user having necessarily obtained permission of the owner of the copyright for the content. Software is readily available on the Internet that allows users to extract or "rip" copies of video and audio files from authorised copies published on DVDs, CDs etc. Once a compressed unauthorised copy is made, a number of subsequent copies can also be made and distributed to others using the Internet, and in particular the P2P networks, such
as Kazaa and Morpheus. The unauthorised copies can then be placed on the player and reused for the life of the player without the knowledge of the copyright owner or any compensation being passed to the copyright owner. Purchasers of the players receive them without any content recorded, which therefore requires a user to either seek out suitable content on the limited authorised distribution channels, such as that provided by Apple's iTunes web site, or succumb to making or obtaining unauthorised copies of desired content files. Once recorded on a player, the content files can be copied to other players or computer systems. No restrictions are placed on use of the content files. For example, the iPodRip software (available at http://www.thelittleappfactory.com/software/ipodrip.php) can be used by Apple Macintosh owners to modify audio files on the Apple iPod player and allow those files to be copied from an iPod to a Macintosh computer and then onto other audio players. Accordingly, content publishers are reluctant to release content files in a format suitable for storage on the players.
It is desired to address the above or at least provide a useful alternative.
SUMMARY
In accordance with the present invention there is provided a content player, including: a storage module for storing at least one encrypted content file; a processor for accessing the encrypted content file when selected; a decryption module for decrypting the encrypted content file; and an output module for receiving the content file decrypted and converting it to an output content signal to drive a content output device.
The present invention also provides a content player, including: storage means for storing at least one encrypted content file; output means for receiving the content file decrypted and converting it to an output content signal to drive a content output device; and decryption means for decrypting the encrypted content file and transferring it directly to the output means.
BRIEF DESCRIPTION OF THE DRAWING
Preferred embodiments of the present invention are hereinafter described, by way of example only, with reference to the accompanying drawing, wherein: Figure 1 is a block diagram of a preferred embodiment of a content player.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS OF THE
INVENTION
A content player 100, as shown in Figure 1, has an architecture that restricts access to the content files stored on the device 100. The player 100 may be portable and capable of being held in a user's hand, ie handheld. The player 100 has a system address and data bus 102, a microprocessor 102, a storage unit 104, a display unit 106, and encryption and decryption modules 108, 110, which are all connected to the system bus 102. The player 100 also includes an input unit 112 and an output unit 114 which are controlled and driven by the encryption and decryption modules 108 and 110, respectively. The electronic hardware of the components 102, 104, 106, 112, 114 is similar to that found in a standard MP3 player, such as the iPod™ produced by Apple Computer, Inc. A significant distinction is that the player 100 is only able to store content files in the storage unit 104 in an encrypted form, and includes the decryption module 110. The content files stored in the memory 104 may only be accessed for playing by the device 100. The player does not include any capability which enables files stored on the storage unit 104 to be copied to storage media that is external to the player 100. This is distinct from other audio players where software can be obtained to allow copying of content files for subsequent use and play on other devices.
The storage unit 104 stores files, such as audio and/or video files, in an encrypted form using a strong encryption scheme, such as AES (http://csrc.nist.gov/CryptoToolkit/aes . This ensures that even if the encrypted files are physically removed from the player 100 they cannot be used. The files can only be decrypted by the player using a private key or
decryption password accessed by the decryption module 110. The storage unit 104 may be a hard disk or compact flash memory that normally cannot be removed. Alternatively the unit 104 can be a form of storage which allows the device owner to replace it with another storage unit having a different collection of encrypted content files. The player 100 can advantageously be sold with the storage unit 104 having a set of encrypted content files already loaded on the device. The player 100 may also prohibit the storage of files by the device owner or user, and therefore omit the encryption module 108 and the input unit 112.
The microprocessor 102 is able to access a directory or list identifying the content files for display on the display unit 106, so that a user of the device 100 can select a file for play by the device. The directory or list may be uncrypted or encrypted, and in the case of the latter, the microprocessor accesses it via the decryption module 110. The content files may be individually encrypted or encrypted in a large partition with any directory information. The selected file is accessed by the microprocessor 102 via the decryption module 110 for decryption. The decryption module 110 is only able to decrypt the file after accessing the decryption password or private key and executing the decryption algorithm. The decryption password or private key is stored in the player 100 or may be entered by the owner of the device using the user interface 106. Alternatively the decryption password may use a biometric code such as the fingerprint of the authorised owner of the player device. The private key or the decryption password can be hard coded into circuitry of the player 100 either in an ASIC or firmware of the player 100. The type of decryption password or key used will depend on the level of security used by the player, as discussed below. The unencrypted version of the accessed file is passed directly by the decryption module 110 to the output unit 114 for conversion into audio and/or video signals for output on the output terminals 116 of the output unit 114. For example, for an audio file encoded in the MP3 compression format, the file is transcoded into pulse code modulation (PCM) format and then converted by a digital to analog converter (DAC) of the output unit 114 into an analog audio signal for output on a terminal 116 for headphones or speakers. Similarly, a video file is transcoded from an encoding format like MPEG-4 into a video signal for driving either the display screen of the display unit 106 or an external video display device, such as a LCD monitor connected to the terminals 116. The video signal
may be analog or digital depending on the video display device to be driven by the signal.
If the player includes an input unit 112 with input terminals 118 and an encryption module 108, content files can be inputted on the terminals 118 as digital or analog signals for encryption and storage in the storage unit 104 of the device 100. The input module can 112 supports file transfer communications protocols, such as Firewire and USB2. When the input module receives files from another device, such as a personal computer, using the file transfer protocols, the files are received by the encryption module 108 which applies the encryption algorithm used by the player 100 so as to store the files in an encrypted form in the storage unit 104. The encryption process would typically use the public key that corresponds to the private decryption key used by the decryption module 110. Alternatively, if the device 100 does not include the encryption module 108 or software to encrypt the files, then the input module 112 can be configured to receive encrypted files for storage on the storage unit 104, where the files may have been encrypted by the device connecting to the terminals 118, such as a personal computer or a kiosk device that sells the content files to consumers. Again, only encrypted files can be stored on the player 100 as the play components of the device 100, being the decryption module 110 and the output unit 114, can only operate on files encrypted according to the encryption scheme used by the device 100.
When a content file is encrypted, it is bound to a particular decryption key or password that allows the content to be decrypted. Generation of the key or password to be used depends on the level of security required by a content publisher and/or incorporated into the player. For example, the decryption key may be a randomly generated private key that is part of a private and public key pair, and then the key used to generate an alphanumeric password that corresponds to the key and allows it to be reproduced when the file needs to be decrypted and the password is entered. The decryption password may be typed or entered into the device using the UI unit 106. Alternatively, the decryption key of a key pair may be generated using a biometric sensor of the UI 106, in response to the owner of the player placing a finger on the sensor and allowing the fingerprint to be read to generate the key. With the use of such a biometric-based decryption key or password, the encrypted content
file is bound to a particular person, eg the owner of the player. For such a biometric-based password, like a fingerprint, if the storage unit 104 is removed from one player into another player, it is not possible to access the content file without the content file being unlocked by the fingerprint password assigned to the content file. The decryption key can also be generated using a unique identifier of the player, ie a serial number or integrated circuit identifier of the player, such that the encyrpted content file is bound to a specific player. In this manner, the content is only playable on a specific player device, and again only by persons who know the decryption password for that content and player combination. As a further level of security, the decryption key can be generated using a biometric sensor of the user interface module 106, in response to reading a fingerprint, and also on the basis of a unique identification number of the player. The encrypted content file is then bound to both a specific player and a specific person, ie user of the player. A content file is then not playable by another person using the player or the person using a different player.
The player 100 is particularly advantageous, as it allows content publishers to distribute content files in a form whereby they can only be played on the device without additional copies of the files being made. Only the output video or audio signals can be copied with external recording equipment, such as a microphone and tape recorder or camera and video recorder, causing a significant reduction in the quality of the audio and video, and not the files themselves. The player 100 also advantageously allows content to be distributed with the player, and removable storage units 104 with encrypted files to be subsequently purchased. Also the player can be configured to allow subsequent content to be purchased, downloaded into the player and stored in an encrypted form allowing only the authorised purchaser to play the content using the decryption password or key that has been coded against the purchased content and which may also be bound to the purchaser and/or the player.
Many modifications will be apparent to those skilled in the art without departing from the scope of the present invention as herein described with reference to the accompanying drawing. For example, a number of the hardware components, such as the decryption and encryption modules 108, 110 may be incorporated into one another, and in particular incorporated into the microprocessor 102.