Abstract:
Systems and methods for controlling the use and duplication of digital content distributed on removable media are described. In accordance with embodiments of the present invention digital content is protected by allowing a particular number of protected (e.g., encrypted) copies of the digital content to be made (202, 203). Typically, these copies may only be used on and moved between authorized devices (204, 205, 206). In one embodiment, if copies are desired, the maximum number of allowable copies of the protected digital content are made and stored on a computer's hard drive when the storage medium (e.g., a CD) containing the content is inserted into the computer (201, 202, 203). Each copy can then be moved but not copied to other devices (e.g., portable solid state devices) (204, 205, 206). In an alternative embodiment, the storage medium containing the digital content is writable (e.g., a CD-R). When the storage medium is inserted into the computer, the computer writes information to the storage medium which regulates future copying and playing of the digital content on the storage medium (404).
Abstract:
A data transfer apparatus referred to as a primary-recording-medium apparatus implements proper system operations by acquisition of information on a secondary recording medium mounted on a secondary-recording-medium apparatus to serve as a destination of a transfer (or a check-out) of a content. If a medium adopting its own unique management technique as is the case with a mini disc is used as the secondary recording medium serving as a destination of a check-out, the primary-recording-medium apparatus acquires information on the secondary recording medium from the secondary-recording-medium apparatus, which is typically a data-recording apparatus. The information includes an indicator as to whether or not the secondary recording medium has been mounted on the data-recording apparatus, the name of the secondary recording medium, the name of each content stored in the secondary recording medium, the number of contents stored in the secondary recording medium and attributes of each content stored in the secondary recording medium.
Abstract:
A system for controlling use and distribution of composite digital works. A digital work is comprised of a description part (700) and a content part. The description part contains control information for the composite digital work. The content part stores the actual digital data comprising the composite digital work. The description part (700) is logically organized in an acyclic structure, e.g. a tree structure. For a composite digital work each node of the acyclic structure represents an individual digital work or some distribution interest in the composite digital work. A node in the acyclic structure is comprised of an identifier (701) of the individual work, usage rights (704) for the individual digital work and a pointer (705,706) to the digital work. Composite digital works are stored in repositories. A repository has two primary operating modes, a server mode and a requester mode. When operating in a server mode, the repository is responding to requests to access digital works. When operating in requester mode, the repository is requesting access to a digital work. A repository will process each request to access a composite digital work by examining the usage rights for each individual digital work found in the description part of the composite digital work.
Abstract:
A system for controlling use and distribution of composite digital works. A digital work is comprised of a description part (700) and a content part. The description part contains control information for the composite digital work. The content part stores the actual digital data comprising the composite digital work. The description part (700) is logically organized in an acyclic structure, e.g. a tree structure. For a composite digital work each node of the acyclic structure represents an individual digital work or some distribution interest in the composite digital work. A node in the acyclic structure is comprised of an identifier (701) of the individual work, usage rights (704) for the individual digital work and a pointer (705,706) to the digital work. Composite digital works are stored in repositories. A repository has two primary operating modes, a server mode and a requester mode. When operating in a server mode, the repository is responding to requests to access digital works. When operating in requester mode, the repository is requesting access to a digital work. A repository will process each request to access a composite digital work by examining the usage rights for each individual digital work found in the description part of the composite digital work.
Abstract:
A data nullification device for nullifying target data recorded on a recording medium is provided. The target data is made up of a plurality of data blocks. A judging unit (111) judges, in units of data blocks, whether the target data needs to be nullified. A nullifying unit nullifies, when a predetermined number of data blocks are judged as needing to be nullified or when one or more data blocks whose total amount of data reaches a predetermined amount are judged as needing to be nullified, the judged data blocks.
Abstract:
A library display section (80) and a PD display section (110) are displayed in a management window (70) on a PD edit screen. By selecting conditions to be retrieved by a retrieval condition setting section (81) and clicking a retrieval key in a retrieval key setting section (82), a music data storage section is retrieved and relevant contents are displayed on a library list display section (87). By selecting contents displayed on the library list display section (87) and operating an add button (88), the selected contents are transmitted to the PD and displayed in a PD contents list display section (112). At this time, the contents-transferable number of times that is displayed in the list of the library list display section (87) is decreased by one. If the contents-transferable number of times is managed, the number of duplicated contents can be limited.
Abstract:
The CPU 11 of the personal computer 1 controls the CPU 32 of the adaptor 26 made of a semiconductor IC to compute a hash value of a content-managing music data base recorded in the HDD 21 and store it into the nonvolatile memory 34. When playing back a content recorded in the HDD 21, the CPU 11 computes the hash value of the music data base recorded in the HDD 21, compares it with hash values stored cumulatively in the nonvolatile memory 34, and controls the playback of the content from the HDD 21 based on the result of the comparison.
Abstract:
In a limited-copy protection scheme, a check-out/check-in system is configured to a) verify that the receiving device is a certified conforming device, and b) verify that the device that checks-in content material is the same device that checked-out the content material. The verification of the receiving device is effected via a conventional certification process. The verification that the same device is used for check-in and check-out is effected via a secure challenge-response protocol. As contrast to a conventional contemporaneous challenge-response protocol, the system provides a challenge that is specific to the receiving device when the content material is checked-out, and verifies the appropriate response when the content material is checked-in. Because the challenge-response is specific to the receiving device, only the device that receives the challenge when the content material is checked-out can provide the appropriate response when the content material is checked-in.
Abstract:
A picture control device (100) comprises: first decoding means (4) for decoding an input picture data stream; encoding means (5, 6) for encoding the output of said first decoding means (4) with a plurality of bit-rates; output means (18, 19) for outputting the picture data encoded with a first bit-rate for recording; second decoding means (16) for decoding the same picture data encoded at a second bit-rate by said encoding means (5, 6); and control means (20) to determine said second bit-rate based on said first bit-rate. This device is capable of enabling viewing/listening of copy-restricted content, even when the content has been moved to external media using a different bit rate.
Abstract:
In a limited-copy protection scheme, a check-out/check-in system is configured to a) verify that the receiving device is a certified conforming device, and b) verify that the device that checks-in content material is the same device that checked-out the content material. The verification of the receiving device is effected via a conventional certification process. The verification that the same device is used for check-in and check-out is effected via a secure challenge-response protocol. As contrast to a conventional contemporaneous challenge-response protocol, the system provides a challenge that is specific to the receiving device when the content material is checked-out, and verifies the appropriate response when the content material is checked-in. Because the challenge-response is specific to the receiving device, only the device that receives the challenge when the content material is checked-out can provide the appropriate response when the content material is checked-in.