Abstract:
Techniques are described herein for using cryptographic elements of the Advanced Access Content System (AACS) in a client-server environment to cryptographically authenticate client applications that are executing on non-revoked AACS-compliant playback devices. The techniques described herein may be used to protect a server application from providing information to client applications executing in non-AACS-compliant or revoked environments. In one embodiment, the techniques are used to authenticate a Blu-ray Disc Java Application executing on a non-revoked AACS-compliant Blu-ray Disc Player.
Abstract:
콘텐츠를 디스크에 기록하는 과정에서 기록 장치의 오류 등으로 콘텐츠가 디스크에 제대로 기록되지 않았거나, 기록은 완료되었으나 재생이 불가능한 경우에도 기록이 완료된 것으로 처리되어 기록 가능 횟수가 감소한다는 문제가 있다. 즉, 사용자는 디스크에 기록된 콘텐츠를 재생하여 이용할 수 없음에도 콘텐츠를 기록할 수 있는 횟수가 감소하는 불이익을 얻게 된다. 콘텐츠 기록 방법 및 장치가 개시된다. 본 발명에 따른 콘텐츠 기록 방법은 디스크에 콘텐츠를 기록하는 단계, 기록에 오류가 있는지를 검증하는 단계 및 기록에 오류가 없는 경우, 콘텐츠에 대한 기록 권한 정보에 포함된 기록 가능 횟수를 1만큼 감소시키는 단계를 포함하여 기록에 오류가 있는 경우에 기록 가능 횟수가 부당하게 감소되지 않도록 하는 효과가 있다.
Abstract:
In an audio service system comprising audio data downloading and playing systems consisting of an audio server for generating audio data by encoding audios whose copyright is pr otected by being selected by each user, with the use of first encoding keys (IDl') uniquely generated for players where the audios are to be stored, and the players for downloading the audio data generated for the user-selected audios from the audio server to store the downloaded audio data, the present invention relates to the audio data downloading and playing system for downloading and using the audio data generated by uniquely encoding the user-selected audios according to each individual player, including headers assigned with fixed IDs which are unique ID values and for containing first encoding key information(IDl") generated by encoding the first encoding keys(IDl').
Abstract:
A system includes a first storage 223 for storing data associated with the same content stored in a pre-recorded area of a plurality of record carriers, such as DVDs. A second storage is used to associate data in the first s ;orage with a code. A reading device 231 includes means 433 for receiving a record carrier including a pre-recorded area and a write once area, means 436 for reading content stored in the pre-recorded area for rendering, means 435 for reading a code stored in the write-once area, and means 434 for accessing data stored in the first storage. The system verifies whether the read code corresponds to a code associated with data in the first storage and grants the reading device access to data stored in the first storage only upon a positive verification.
Abstract:
A system including: (a) a media reader 10 including a read element 11 for physical media, the physical media including digital content representing at least one media stream, the digital content being maintained in a protected form; (b) a storage element 21 coupled to the media reader 10, the storage element 21 using a storage mechanism different from the physical media, the storage element non-evanescently storing the digital content in the protected form; and (c) a playback device 31 coupled to the storage element 21, the playback device 31 receiving the digital content and outputting analog, digital, or analog and digital audiovisual content for presentation. The digital content is stored in the storage element 21 in the protected form, sent from the media reader 10 to the storage element 21 in the protected form, sent from the storage element 21 to the playback device 31 in the protected form, and output by the playback device 31 in a second protected form.
Abstract:
Falsification of management information recorded on a recording medium can be reliably detected, and the integrity of the management information can be reliably checked. An information processing device (20) for checking the integrity of a recording medium (10) having a first recording area where management information is recorded and a second recording area where the encrypted management information is recorded, comprising control sections (24, 26) for reading the management information and the encrypted management information from the recording medium and controlling the decryption of the read encrypted management information and a comparison section (25) for judging whether or not the read management information is in a predetermined correspondence with the decoded management information and judging, if affirmative, that the recording medium is not falsified.
Abstract:
A method for authenticating that a specified prerecorded media, such as a CD ROM, is in the possession of a user and then permitting said user having possession of the specified prerecorded media to download audio, video, or other information over a network of interconnected electronic devices is provided. The method comprises the steps of prompting a user to place the specified prerecorded media, e.g., a selected CD, into a drive connected to the electronic device, e.g, a CD ROM (or DVD ROM) drive of a computer, accessing information, for instance information that is descriptive of the data on the prerecorded media, in a CD ROM in the CD ROM drive, and determining whether the accessed information fits a predetermined criteria. If the prerecorded media has the predetermined information, then the user of the electronic device is allowed to download additional data via the network.
Abstract:
In an example, a method for secure publication of content is described. The method may include encrypting content with a media key. The method may also include providing the encrypted content to a client device associated with a private key and a public key. The private key may be stored at the client device. The method may also include encrypting the media key with the public key. The method may also include providing the encrypted media key to the client device.