WO2005076138A1 - A content player - Google Patents

A content player Download PDF

Info

Publication number
WO2005076138A1
WO2005076138A1 PCT/AU2005/000126 AU2005000126W WO2005076138A1 WO 2005076138 A1 WO2005076138 A1 WO 2005076138A1 AU 2005000126 W AU2005000126 W AU 2005000126W WO 2005076138 A1 WO2005076138 A1 WO 2005076138A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
player
file
encrypted
decryption
Prior art date
Application number
PCT/AU2005/000126
Other languages
French (fr)
Inventor
Sydney Gordon Low
Original Assignee
Sydney Gordon Low
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2004900480A external-priority patent/AU2004900480A0/en
Application filed by Sydney Gordon Low filed Critical Sydney Gordon Low
Publication of WO2005076138A1 publication Critical patent/WO2005076138A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the present invention relates to a content player, and more specifically to a device that is able to play video or audio files and prohibits copying of the files stored on the device.
  • Portable audio players such as the iPodTM produced by Apple Computer, Inc, have become popular with consumers because they allow users to selectively store thousands of audio tracks on the player, which can then be played and listened to in different groups or sequences, referred to as "playlists".
  • the players are able to store the audio files in a digital form on disc or memory in a compressed format using a number of known compression schemes, such as AAC, WMV and the most popular, MPEG-1 Audio Layer 3 (or MP3).
  • One of the primary features of the current players, and one of the significant problems, is they allow users to freely make copies of content, such as an audio file or a video file, without the user having necessarily obtained permission of the owner of the copyright for the content.
  • Software is readily available on the Internet that allows users to extract or "rip" copies of video and audio files from authorised copies published on DVDs, CDs etc. Once a compressed unauthorised copy is made, a number of subsequent copies can also be made and distributed to others using the Internet, and in particular the P2P networks, such as Kazaa and Morpheus. The unauthorised copies can then be placed on the player and reused for the life of the player without the knowledge of the copyright owner or any compensation being passed to the copyright owner.
  • a content player including: a storage module for storing at least one encrypted content file; a processor for accessing the encrypted content file when selected; a decryption module for decrypting the encrypted content file; and an output module for receiving the content file decrypted and converting it to an output content signal to drive a content output device.
  • the present invention also provides a content player, including: storage means for storing at least one encrypted content file; output means for receiving the content file decrypted and converting it to an output content signal to drive a content output device; and decryption means for decrypting the encrypted content file and transferring it directly to the output means.
  • Figure 1 is a block diagram of a preferred embodiment of a content player.
  • a content player 100 has an architecture that restricts access to the content files stored on the device 100.
  • the player 100 may be portable and capable of being held in a user's hand, ie handheld.
  • the player 100 has a system address and data bus 102, a microprocessor 102, a storage unit 104, a display unit 106, and encryption and decryption modules 108, 110, which are all connected to the system bus 102.
  • the player 100 also includes an input unit 112 and an output unit 114 which are controlled and driven by the encryption and decryption modules 108 and 110, respectively.
  • the electronic hardware of the components 102, 104, 106, 112, 114 is similar to that found in a standard MP3 player, such as the iPodTM produced by Apple Computer, Inc.
  • the player 100 is only able to store content files in the storage unit 104 in an encrypted form, and includes the decryption module 110.
  • the content files stored in the memory 104 may only be accessed for playing by the device 100.
  • the player does not include any capability which enables files stored on the storage unit 104 to be copied to storage media that is external to the player 100. This is distinct from other audio players where software can be obtained to allow copying of content files for subsequent use and play on other devices.
  • the storage unit 104 stores files, such as audio and/or video files, in an encrypted form using a strong encryption scheme, such as AES (http://csrc.nist.gov/CryptoToolkit/aes . This ensures that even if the encrypted files are physically removed from the player 100 they cannot be used.
  • the files can only be decrypted by the player using a private key or decryption password accessed by the decryption module 110.
  • the storage unit 104 may be a hard disk or compact flash memory that normally cannot be removed. Alternatively the unit 104 can be a form of storage which allows the device owner to replace it with another storage unit having a different collection of encrypted content files.
  • the player 100 can advantageously be sold with the storage unit 104 having a set of encrypted content files already loaded on the device. The player 100 may also prohibit the storage of files by the device owner or user, and therefore omit the encryption module 108 and the input unit 112.
  • the microprocessor 102 is able to access a directory or list identifying the content files for display on the display unit 106, so that a user of the device 100 can select a file for play by the device.
  • the directory or list may be uncrypted or encrypted, and in the case of the latter, the microprocessor accesses it via the decryption module 110.
  • the content files may be individually encrypted or encrypted in a large partition with any directory information.
  • the selected file is accessed by the microprocessor 102 via the decryption module 110 for decryption.
  • the decryption module 110 is only able to decrypt the file after accessing the decryption password or private key and executing the decryption algorithm.
  • the decryption password or private key is stored in the player 100 or may be entered by the owner of the device using the user interface 106. Alternatively the decryption password may use a biometric code such as the fingerprint of the authorised owner of the player device.
  • the private key or the decryption password can be hard coded into circuitry of the player 100 either in an ASIC or firmware of the player 100.
  • the type of decryption password or key used will depend on the level of security used by the player, as discussed below.
  • the unencrypted version of the accessed file is passed directly by the decryption module 110 to the output unit 114 for conversion into audio and/or video signals for output on the output terminals 116 of the output unit 114.
  • the file is transcoded into pulse code modulation (PCM) format and then converted by a digital to analog converter (DAC) of the output unit 114 into an analog audio signal for output on a terminal 116 for headphones or speakers.
  • PCM pulse code modulation
  • DAC digital to analog converter
  • a video file is transcoded from an encoding format like MPEG-4 into a video signal for driving either the display screen of the display unit 106 or an external video display device, such as a LCD monitor connected to the terminals 116.
  • the video signal may be analog or digital depending on the video display device to be driven by the signal.
  • the player includes an input unit 112 with input terminals 118 and an encryption module 108
  • content files can be inputted on the terminals 118 as digital or analog signals for encryption and storage in the storage unit 104 of the device 100.
  • the input module can 112 supports file transfer communications protocols, such as Firewire and USB2.
  • file transfer communications protocols such as Firewire and USB2.
  • the encryption module 108 which applies the encryption algorithm used by the player 100 so as to store the files in an encrypted form in the storage unit 104.
  • the encryption process would typically use the public key that corresponds to the private decryption key used by the decryption module 110.
  • the decryption key may be a randomly generated private key that is part of a private and public key pair, and then the key used to generate an alphanumeric password that corresponds to the key and allows it to be reproduced when the file needs to be decrypted and the password is entered.
  • the decryption password may be typed or entered into the device using the UI unit 106.
  • the decryption key of a key pair may be generated using a biometric sensor of the UI 106, in response to the owner of the player placing a finger on the sensor and allowing the fingerprint to be read to generate the key.
  • a biometric-based decryption key or password the encrypted content file is bound to a particular person, eg the owner of the player.
  • a biometric-based password like a fingerprint, if the storage unit 104 is removed from one player into another player, it is not possible to access the content file without the content file being unlocked by the fingerprint password assigned to the content file.
  • the decryption key can also be generated using a unique identifier of the player, ie a serial number or integrated circuit identifier of the player, such that the encyrpted content file is bound to a specific player. In this manner, the content is only playable on a specific player device, and again only by persons who know the decryption password for that content and player combination.
  • the decryption key can be generated using a biometric sensor of the user interface module 106, in response to reading a fingerprint, and also on the basis of a unique identification number of the player.
  • the encrypted content file is then bound to both a specific player and a specific person, ie user of the player. A content file is then not playable by another person using the player or the person using a different player.
  • the player 100 is particularly advantageous, as it allows content publishers to distribute content files in a form whereby they can only be played on the device without additional copies of the files being made. Only the output video or audio signals can be copied with external recording equipment, such as a microphone and tape recorder or camera and video recorder, causing a significant reduction in the quality of the audio and video, and not the files themselves.
  • the player 100 also advantageously allows content to be distributed with the player, and removable storage units 104 with encrypted files to be subsequently purchased. Also the player can be configured to allow subsequent content to be purchased, downloaded into the player and stored in an encrypted form allowing only the authorised purchaser to play the content using the decryption password or key that has been coded against the purchased content and which may also be bound to the purchaser and/or the player.

Abstract

A content player including a storage module (104) storing at least one encrypted content file, such as an encrypted MP3 or MPEG-4 file, a processor (102) for accessing the encrypted content file when selected, a decryption module (110) for decrypting the encrypted content file, and an output module (114) for receiving the decrypted content file decrypted and converting it to an output content signal to drive a content output device, such as audio speakers or a video display screen. The output module (114) receives the decrypted content file directly from the decryption module (110), and the content player is unable to persistently store the decrypted content file.

Description

A CONTENT PLAYER
FIELD
The present invention relates to a content player, and more specifically to a device that is able to play video or audio files and prohibits copying of the files stored on the device.
BACKGROUND
Portable audio players, such as the iPod™ produced by Apple Computer, Inc, have become popular with consumers because they allow users to selectively store thousands of audio tracks on the player, which can then be played and listened to in different groups or sequences, referred to as "playlists". The players are able to store the audio files in a digital form on disc or memory in a compressed format using a number of known compression schemes, such as AAC, WMV and the most popular, MPEG-1 Audio Layer 3 (or MP3).
Portable video players are also available, such as TAZ I from Tight Systems LLC (http://www.tightaudiosystems.com/see taz.htm), Samsung YH-999, and Creative Technology Ltd "Zen Portable Media Center", which allow users to store video files that can then be selectively played and displayed on video or television displays connected to or incorporated in the player. Again a number of video compression schemes are available for storing the files in a compressed format, such as MPEG-4, MPEG-2 and DivX.
One of the primary features of the current players, and one of the significant problems, is they allow users to freely make copies of content, such as an audio file or a video file, without the user having necessarily obtained permission of the owner of the copyright for the content. Software is readily available on the Internet that allows users to extract or "rip" copies of video and audio files from authorised copies published on DVDs, CDs etc. Once a compressed unauthorised copy is made, a number of subsequent copies can also be made and distributed to others using the Internet, and in particular the P2P networks, such as Kazaa and Morpheus. The unauthorised copies can then be placed on the player and reused for the life of the player without the knowledge of the copyright owner or any compensation being passed to the copyright owner. Purchasers of the players receive them without any content recorded, which therefore requires a user to either seek out suitable content on the limited authorised distribution channels, such as that provided by Apple's iTunes web site, or succumb to making or obtaining unauthorised copies of desired content files. Once recorded on a player, the content files can be copied to other players or computer systems. No restrictions are placed on use of the content files. For example, the iPodRip software (available at http://www.thelittleappfactory.com/software/ipodrip.php) can be used by Apple Macintosh owners to modify audio files on the Apple iPod player and allow those files to be copied from an iPod to a Macintosh computer and then onto other audio players. Accordingly, content publishers are reluctant to release content files in a format suitable for storage on the players.
It is desired to address the above or at least provide a useful alternative.
SUMMARY
In accordance with the present invention there is provided a content player, including: a storage module for storing at least one encrypted content file; a processor for accessing the encrypted content file when selected; a decryption module for decrypting the encrypted content file; and an output module for receiving the content file decrypted and converting it to an output content signal to drive a content output device.
The present invention also provides a content player, including: storage means for storing at least one encrypted content file; output means for receiving the content file decrypted and converting it to an output content signal to drive a content output device; and decryption means for decrypting the encrypted content file and transferring it directly to the output means. BRIEF DESCRIPTION OF THE DRAWING
Preferred embodiments of the present invention are hereinafter described, by way of example only, with reference to the accompanying drawing, wherein: Figure 1 is a block diagram of a preferred embodiment of a content player.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS OF THE
INVENTION
A content player 100, as shown in Figure 1, has an architecture that restricts access to the content files stored on the device 100. The player 100 may be portable and capable of being held in a user's hand, ie handheld. The player 100 has a system address and data bus 102, a microprocessor 102, a storage unit 104, a display unit 106, and encryption and decryption modules 108, 110, which are all connected to the system bus 102. The player 100 also includes an input unit 112 and an output unit 114 which are controlled and driven by the encryption and decryption modules 108 and 110, respectively. The electronic hardware of the components 102, 104, 106, 112, 114 is similar to that found in a standard MP3 player, such as the iPod™ produced by Apple Computer, Inc. A significant distinction is that the player 100 is only able to store content files in the storage unit 104 in an encrypted form, and includes the decryption module 110. The content files stored in the memory 104 may only be accessed for playing by the device 100. The player does not include any capability which enables files stored on the storage unit 104 to be copied to storage media that is external to the player 100. This is distinct from other audio players where software can be obtained to allow copying of content files for subsequent use and play on other devices.
The storage unit 104 stores files, such as audio and/or video files, in an encrypted form using a strong encryption scheme, such as AES (http://csrc.nist.gov/CryptoToolkit/aes . This ensures that even if the encrypted files are physically removed from the player 100 they cannot be used. The files can only be decrypted by the player using a private key or decryption password accessed by the decryption module 110. The storage unit 104 may be a hard disk or compact flash memory that normally cannot be removed. Alternatively the unit 104 can be a form of storage which allows the device owner to replace it with another storage unit having a different collection of encrypted content files. The player 100 can advantageously be sold with the storage unit 104 having a set of encrypted content files already loaded on the device. The player 100 may also prohibit the storage of files by the device owner or user, and therefore omit the encryption module 108 and the input unit 112.
The microprocessor 102 is able to access a directory or list identifying the content files for display on the display unit 106, so that a user of the device 100 can select a file for play by the device. The directory or list may be uncrypted or encrypted, and in the case of the latter, the microprocessor accesses it via the decryption module 110. The content files may be individually encrypted or encrypted in a large partition with any directory information. The selected file is accessed by the microprocessor 102 via the decryption module 110 for decryption. The decryption module 110 is only able to decrypt the file after accessing the decryption password or private key and executing the decryption algorithm. The decryption password or private key is stored in the player 100 or may be entered by the owner of the device using the user interface 106. Alternatively the decryption password may use a biometric code such as the fingerprint of the authorised owner of the player device. The private key or the decryption password can be hard coded into circuitry of the player 100 either in an ASIC or firmware of the player 100. The type of decryption password or key used will depend on the level of security used by the player, as discussed below. The unencrypted version of the accessed file is passed directly by the decryption module 110 to the output unit 114 for conversion into audio and/or video signals for output on the output terminals 116 of the output unit 114. For example, for an audio file encoded in the MP3 compression format, the file is transcoded into pulse code modulation (PCM) format and then converted by a digital to analog converter (DAC) of the output unit 114 into an analog audio signal for output on a terminal 116 for headphones or speakers. Similarly, a video file is transcoded from an encoding format like MPEG-4 into a video signal for driving either the display screen of the display unit 106 or an external video display device, such as a LCD monitor connected to the terminals 116. The video signal may be analog or digital depending on the video display device to be driven by the signal.
If the player includes an input unit 112 with input terminals 118 and an encryption module 108, content files can be inputted on the terminals 118 as digital or analog signals for encryption and storage in the storage unit 104 of the device 100. The input module can 112 supports file transfer communications protocols, such as Firewire and USB2. When the input module receives files from another device, such as a personal computer, using the file transfer protocols, the files are received by the encryption module 108 which applies the encryption algorithm used by the player 100 so as to store the files in an encrypted form in the storage unit 104. The encryption process would typically use the public key that corresponds to the private decryption key used by the decryption module 110. Alternatively, if the device 100 does not include the encryption module 108 or software to encrypt the files, then the input module 112 can be configured to receive encrypted files for storage on the storage unit 104, where the files may have been encrypted by the device connecting to the terminals 118, such as a personal computer or a kiosk device that sells the content files to consumers. Again, only encrypted files can be stored on the player 100 as the play components of the device 100, being the decryption module 110 and the output unit 114, can only operate on files encrypted according to the encryption scheme used by the device 100.
When a content file is encrypted, it is bound to a particular decryption key or password that allows the content to be decrypted. Generation of the key or password to be used depends on the level of security required by a content publisher and/or incorporated into the player. For example, the decryption key may be a randomly generated private key that is part of a private and public key pair, and then the key used to generate an alphanumeric password that corresponds to the key and allows it to be reproduced when the file needs to be decrypted and the password is entered. The decryption password may be typed or entered into the device using the UI unit 106. Alternatively, the decryption key of a key pair may be generated using a biometric sensor of the UI 106, in response to the owner of the player placing a finger on the sensor and allowing the fingerprint to be read to generate the key. With the use of such a biometric-based decryption key or password, the encrypted content file is bound to a particular person, eg the owner of the player. For such a biometric-based password, like a fingerprint, if the storage unit 104 is removed from one player into another player, it is not possible to access the content file without the content file being unlocked by the fingerprint password assigned to the content file. The decryption key can also be generated using a unique identifier of the player, ie a serial number or integrated circuit identifier of the player, such that the encyrpted content file is bound to a specific player. In this manner, the content is only playable on a specific player device, and again only by persons who know the decryption password for that content and player combination. As a further level of security, the decryption key can be generated using a biometric sensor of the user interface module 106, in response to reading a fingerprint, and also on the basis of a unique identification number of the player. The encrypted content file is then bound to both a specific player and a specific person, ie user of the player. A content file is then not playable by another person using the player or the person using a different player.
The player 100 is particularly advantageous, as it allows content publishers to distribute content files in a form whereby they can only be played on the device without additional copies of the files being made. Only the output video or audio signals can be copied with external recording equipment, such as a microphone and tape recorder or camera and video recorder, causing a significant reduction in the quality of the audio and video, and not the files themselves. The player 100 also advantageously allows content to be distributed with the player, and removable storage units 104 with encrypted files to be subsequently purchased. Also the player can be configured to allow subsequent content to be purchased, downloaded into the player and stored in an encrypted form allowing only the authorised purchaser to play the content using the decryption password or key that has been coded against the purchased content and which may also be bound to the purchaser and/or the player. Many modifications will be apparent to those skilled in the art without departing from the scope of the present invention as herein described with reference to the accompanying drawing. For example, a number of the hardware components, such as the decryption and encryption modules 108, 110 may be incorporated into one another, and in particular incorporated into the microprocessor 102.

Claims

1. A content player, including: a storage module for storing at least one encrypted content file; a processor for accessing the encrypted content file when selected; a decryption module for decrypting the encrypted content file; and an output module for receiving the content file decrypted and converting it to an output content signal to drive a content output device.
2. A content player as claimed in claim 1, wherein said output module receives the decrypted content file directly from the decryption module, and said content player is unable to persistently store said decrypted content file.
3. A content player as claimed in claim 2, wherein said content file is an encoded audio file, and said content output device includes audio speakers.
4. A content player as claimed in any one of the preceding claims, wherein said content file is an encoded video file and said content output device includes a video display screen.
5. A content player as claimed in any one of the preceding claims, wherein said content player is unable to transfer said decrypted file to another device or storage medium.
6. A content player as claimed in any one of the preceding claims, wherein said storage module is removable.
7. A content player as claimed in any one of the preceding claims, wherein said decryption module decrypts the file using a private key hard coded in the player.
8. A content player as claimed in any one of the preceding claims, wherein said decryption module decrypts the file using a private key derived from a decryption password provided by a user.
9. A content player as claimed in any one of the preceding claims, wherein said decryption module decrypts the file based on biometric data provided by a user.
10. A content player as claimed in any one of the preceding claims, wherein the encrypted content file is decrypted using a decryption key bound to a person.
11. A content player as claimed in any one of the preceding claims, wherein the encrypted content file is decrypted using a decryption key bound to a player.
12. A content player as claimed in any one of the preceding claims, wherein said encrypted content is stored on said player before sale of said player.
13. A content player, including : storage means for storing at least one encrypted content file; output means for receiving the content file decrypted and converting it to an output content signal to drive a content output device; and decryption means for decrypting the encrypted content file and transferring it directly to the output means.
14. A content player as claimed in claim 1 or 13, wherein said content player is a handheld device.
15. A content player as claimed in claim 13, wherein said content file is an encoded compressed content file.
16. A content player as claimed in claim 13, wherein said encrypted content is stored on said player before sale of said player.
17. A content player substantially as hereinbefore described with reference to the accompanying drawings.
PCT/AU2005/000126 2004-02-03 2005-02-03 A content player WO2005076138A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US54107204P 2004-02-03 2004-02-03
US60/541,072 2004-02-03
AU2004900480A AU2004900480A0 (en) 2004-02-03 A content player
AU2004900480 2004-02-03

Publications (1)

Publication Number Publication Date
WO2005076138A1 true WO2005076138A1 (en) 2005-08-18

Family

ID=34839204

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2005/000126 WO2005076138A1 (en) 2004-02-03 2005-02-03 A content player

Country Status (1)

Country Link
WO (1) WO2005076138A1 (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1039462A2 (en) * 1999-03-15 2000-09-27 Sony Corporation Processing method and apparatus for encrypted data transfer
WO2001093000A2 (en) * 2000-05-31 2001-12-06 Zoran Corporation Secure electronic internet delivery and use of music and other valuable data
US6385596B1 (en) * 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
WO2002047081A2 (en) * 2000-12-07 2002-06-13 Sandisk Corporation System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media
US20020107595A1 (en) * 2000-12-05 2002-08-08 Miki Abe Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium
US6577735B1 (en) * 1999-02-12 2003-06-10 Hewlett-Packard Development Company, L.P. System and method for backing-up data stored on a portable audio player
GB2386245A (en) * 2002-03-08 2003-09-10 First 4 Internet Ltd Copy protection system
US6732275B1 (en) * 1999-03-23 2004-05-04 Samsung Electronics Co., Ltd. Securing encrypted files in a PC and PC peripheral environment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6385596B1 (en) * 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US6577735B1 (en) * 1999-02-12 2003-06-10 Hewlett-Packard Development Company, L.P. System and method for backing-up data stored on a portable audio player
EP1039462A2 (en) * 1999-03-15 2000-09-27 Sony Corporation Processing method and apparatus for encrypted data transfer
US6732275B1 (en) * 1999-03-23 2004-05-04 Samsung Electronics Co., Ltd. Securing encrypted files in a PC and PC peripheral environment
WO2001093000A2 (en) * 2000-05-31 2001-12-06 Zoran Corporation Secure electronic internet delivery and use of music and other valuable data
US20020107595A1 (en) * 2000-12-05 2002-08-08 Miki Abe Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium
WO2002047081A2 (en) * 2000-12-07 2002-06-13 Sandisk Corporation System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media
GB2386245A (en) * 2002-03-08 2003-09-10 First 4 Internet Ltd Copy protection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JENSEN C.: "CryptoCache: a secure sharable file for roaming users.", 2000, ACM SIGOPS *

Similar Documents

Publication Publication Date Title
US8393005B2 (en) Recording medium, and device and method for recording information on recording medium
US9009497B1 (en) Secure methods for generating content and operating a drive based on identification of a system on chip
JP4219680B2 (en) System, method and device for playing recorded audio, video or other content from non-volatile memory cards, compact discs or other media
RU2290767C2 (en) Receiving device for protective preservation of a unit of content and reproduction device
US8544108B2 (en) Copyright protection storage medium, information recording apparatus and information recording method, and information playback apparatus and information playback method
KR20000060590A (en) File encryption apparatus for digital data player
JP2006285607A (en) Content information providing system, content information providing server, content reproducing unit, content information providing method, content reproducing method, and computer program
JP2005529422A5 (en)
WO2006011527A1 (en) Recording device, content key processing device, recording medium, and recording method
US6732275B1 (en) Securing encrypted files in a PC and PC peripheral environment
KR20060127026A (en) Secure porting of information from one device to another
WO2007013092A1 (en) An electro-mechanical system for non-duplication of video files
WO2000031744A1 (en) Copy management for data systems
WO2004093073A1 (en) Digital data storage/reproduction method and device
JP2003195758A (en) Data processor, interface board and data concealing method
KR100320181B1 (en) Encryption method for digital data file
WO2005076138A1 (en) A content player
JP2007287268A (en) Recorder
KR100320182B1 (en) Encryption method for digital data file
JP2004265470A (en) Reproducing device and reproduction program
EP1585127A2 (en) System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media
JP2008250875A (en) Data management method and device
JP2003217228A (en) Recording and reproducing system
JP2003162451A (en) Data copy management method, data copy management system, and data processing device
JP2006294091A (en) Content writing system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase