`
`FOR THE PURPOSES OF INFORMATION ONLY
`
`AL
`AM
`AT
`AU
`AZ
`BA
`BB
`BR
`BF
`BG
`BJ
`BR
`BY
`CA
`CF
`Cc
`CH
`CI
`CM
`CN
`CU
`CZ
`DE
`DK
`HE
`
`Albania
`Armenia
`Austria
`Australia
`Azerbaijan
`Bosnia and Herzegovina
`Barbados
`Belgium
`Burkina Faso
`Bulgaria
`Benin
`Brazil
`Belams
`Canada
`Central African Republic
`Congo
`Switzerland
`Cite clivoirt
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`ES
`Ft
`FR
`GA
`GB
`GE
`GH
`GN
`CR
`flu
`IE
`IL
`Is
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`LI
`LK
`LR
`
`Spain
`Finland
`France
`Gabon
`Unites) Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Ireland
`Israel
`Iceland
`Italy
`Japan
`Kenya
`Kyrgyntan
`Democratic People's
`Republic of KIACII
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`IS
`LT
`LU
`LV
`MC
`MI)
`MC
`MK
`
`ML
`MN
`MR
`MW
`MX
`NE
`NL
`NO
`NZ
`FL
`PT
`RO
`RU
`SD
`SE
`SG
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`'flue former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`Singapore
`
`SI
`SIC
`SN
`SZ
`11)
`TG
`Ti
`TM
`TR
`TT
`UA
`UG
`US
`UZ
`VN
`Y U
`ZW
`
`Slovenia
`Slovakia
`Serr;gal
`Swaziland
`Chad
`Togo
`Tajikistan
`Turkmenistan
`Turkey
`Trinidad and Tobago
`Ukraine
`Uganda
`United Slates of America
`Uzbekistan
`Vies Nam
`Yugoslavia
`Zimbabwe
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2406
`
`
`
`WO 97/44736
`
`PCT/US97/08264
`
`METHOD AND APPARATUS FOR TWO-LEVEL COPY PROTECTION
`
`5
`
`the Invention
`Field of
`This invention relates to data encryption and decryption, and more
`particularly to an improved method and apparatus for using one level of
`encryption to establish a secure communication channel, then passing a
`decryption key over that channel for subsequent decryption. This invention
`includes a new method of scrambling bulk data. This invention is particularly
`10 useful for protecting bulk information intended for widespread distribution
`such as movies or music in CD or DVD formats.
`
`15
`
`the
`Background of
`Invention
`The field of data encryption has been the subject of extensive scholarly
`investigation and has been the topic of many patents in the United States and
`other countries. For general reference, the background description in each of
`United States Patent Nos. 5,497,477 (Tysen et al., 5 March 1996) and 5,438,622
`(Normile et al., 1 August 1995) discuss representative encryption schemes
`known in the art. Each of these patent applications are assigned to Apple
`20 Computer, Inc. These patents are incorporated herein by reference in their
`entirety.
`A wide variety of information is sold to consumers in various forms.
`One major category of information is computer software. Another major
`category of information is music, often in the form of CDs or tape. Still another
`25 major category of information is movies, usually over cable or satellite
`television links but often in the form of analog tape or LaserDisc. There is a
`tension in distribution of any form of information because if consumers will
`buy it from a rightful owner, other consumers are likely to buy illegal copies
`made from legitimate originals.
`Various copy protection schemes have been considered for use with
`various media. Scrambling of cable or satellite channels is common. A variety
`of anti-copying schemes are used in analog video tape. CDs or digital tape can
`be encoded with anti-copying codes.
`Distribution of various information in digital form has troubled many
`35 content providers because making the information available potentially makes
`it quite simple for a user to make one or many illegal copies of that content.
`Forms of such content include movies, music, and data such as encyclopedic
`
`30
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2407
`
`
`
`WO 97/44736
`
`PCT/US97/08264
`
`compilations. This issue has been widely discussed in relation to audio CDs,
`LaserDiscs and other formats.
`In the personal computer environment, the protection of intellectual
`property has been of interest since the beginning of the industry. In computer
`5 software, a variety of special encoding or encryption schemes have been used.
`Some software requires a hardware key to be connected in some way to the
`computer system. Use of such systems frustrates casual copiers but often has
`some negative impact on legitimate users.
`Due to the rapid growth of the industry and the technical difficulties
`10 associated with controlling information flow in an intrinsically open
`architecture, the industry players have more often than not written the
`problem off as intractable, at least in relevant time and cost frames. However,
`the problem remains. And as the convergence between entertainment and
`computing moves forward, driven by the evolution of hardware and software
`technologies, industry participants with different attitudes and requirements
`enter the discussion.
`The problem is particularly acute with the advent of the DVD
`technology as a mass storage device in computers. DVD is a new, high density
`storage medium capable of storing about 4.5 through 18 gigabytes of
`information on a single 12 centimeter disc. Commercial products have already
`been announced before May 1996 for availability before December 1996.
`The movie industry, with its high degree of sensitivity to intellectual
`property protection, is concerned that none of the new transmission
`.
`modalities, including personal computers, enable free copying of their
`25 material. Other content providers have similar concerns. Some sort of copy
`protection scheme would encourage content providers, such as the movie
`industry, to distribute information such as movies in digital format.
`The proposed protection scheme is intended to fall between a "screen
`door latch" (too weak) and a "Fort Knox" approach (too clumsy and expensive
`for mass-market products). Although it will be discussed here in the context of
`DVD, one skilled in the art will appreciate that this copy protection scheme can
`be used in many other situations or collections of elements.
`
`15
`
`20
`
`30
`
`35
`
`Invention
`the
`Summary of
`The invention provides a two-stage copy protection scheme. This is
`particularly useful where large quantities of data are to be encrypted and
`decrypted using an encryption key but that encryption key is to be carefully
`protected until the data is to be decrypted using an authorized retrieval system.
`2
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2408
`
`
`
`WO 97/44736
`
`PCT/1.1S97/08264
`
`One stage of the retrieval system includes an encryption scheme to
`assure that the retrieval is made in an authorized system, and another stage of
`the retrieval system uses a stored encryption key to decode the data of interest.
`In one preferred implementation, the encryption key is used as a descrambling
`5 code.
`
`To minimize the performance impact on the apparatus and not
`constrain use of system resources by low priority or low value data streams, the
`information flow can be broken into elements with a distinct hierarchy of
`bandwidth. For example, an MPEG stream (high bandwidth) may be merely
`10 scrambled, the scrambling control bits (much lower bandwidth) may be
`encoded, and only the MPEG-decode key information necessary to decode the
`scrambling control bits (very low bandwidth) is key encrypted.
`The scrambling can be done in any of many ways, some of which are
`discussed in detail below. For example, the order of the data within a unit of
`15 data can be reordered in a controlled way to give a scrambled signal. Each unit
`of data, such as a 64 KB block, can be scrambled in a defined way, then a
`descriptor which characterizes that scrambling can be encrypted using a key
`and the encoded descriptor can be stored with the relevant block of data. A
`single key can be used to decrypt any scrambling descriptor and the descriptor
`20 can be changed for each unit of data, that is, each unit of data can be
`independently scrambled. With a key available, it is relatively straightforward
`to correctly reorder the scrambled data into the original, "clear text" format.
`With no key, if a sufficiently complex scrambling method has been chosen, it
`can be challenging to identify the correct key by trial and error, particularly
`25 since each data unit is scrambled in a different pattern. With the key, a
`moderately complex scrambling method will not have a significant effect on
`data reconstruction rate and thus becomes transparent to the user.
`This copy protection becomes much more powerful if the key can be
`changed for different units of primary information, for example for each
`30 movie title.
`Storage and access to this key raises an interesting challenge, but this can
`be managed very conveniently by using a separate encryption mode to secure
`the key and provide it in a coordinated fashion with the program of interest.
`One way to do this is to store the key in a secure manner on the same storage
`35 medium as the scrambled information. The mechanism of this separate
`storage mode can be set at a desired level of complexity. One preferred mode is
`to make this key inaccessible by typical access operations, but readily accessible
`through special operations. Specifically, in just one preferred embodiment, the
`3
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2409
`
`
`
`WO 97/44736
`
`PCT/US97/08264
`
`10
`
`20
`
`key may be stored at a location which is inaccessible to a host computer which
`can only access a logical block address, but readily accessible to a drive control
`unit, which may be designed to access a specific physical address, preferably not
`a logical block address. This access capability can be designed into the drive
`5 control unit, and the relevant key can be stored at the corresponding location
`when the media is prepared.
`Subsequent manipulation of the key can be under close security. Since
`the key need be extracted only once, taking even several seconds to extract
`and/or transfer the key will not have a significant impact on the user.
`In one preferred embodiment, a public/private key pair is stored in a
`disk drive mechanism and a second public/private key pair is stored in a
`decryption/decode unit such as an MPEG2 decoder. The key pairs are used to
`establish a secure channel of communication between the disk drive and the
`decoder and, once the channel is secure, a message can be read safely from the
`15 storage medium into the decoder even if the data path for the channel between
`these elements is unsecure. This message is the information content or
`message protected using the high-level security scheme, but is itself the key for
`the low-level security scheme. Passing this encrypted key over a secure
`channel makes it extremely difficult to intercept the key and use it for
`improper purposes.
`This inhibits casual copying by setting up the system so that the data
`flow path between a source, such as a DVD-ROM drive, and a destination, such
`as an MPEG decoder carries only scrambled information and decryption to
`clear text occurs only in an isolated portion of the system, preferably within a
`25 special descrambler/ decoder unit. The scheme cannot be defeated except by
`system patches, and a new patch is required for each title defeated, that is for
`each new title encryption key.
`Scrambling and encrypting the primary information means that a read
`of the media by a system that does not implement correct decoding will give
`30 unintelligible results. Only the application software, with a little help from the
`operating system, can allow correct decoding of the primary information, as in
`correct decoding and display of a movie.
`Distributing the copy protection elements balances the economic and
`processing power burden so that no single part of the overall system bears all
`the cost and effort of protecting the valuable information. Modifying the
`media format to carry scrambled data and modifying the drive to take
`advantage of its closed sub-system status balances these costs.
`
`35
`
`4
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2410
`
`
`
`WO 97/44736
`
`PC17US97/08264
`
`Moving the implementation burden on the computer system toward
`the peripheries, i.e. the media, the mass storage device, and the application
`software minimizes the impact on the operating system software and
`motherboard hardware. This method and apparatus avoids the need to create
`5 new high bandwidth information flow paths and new file systems while
`providing useful protection for the valuable source information.
`One object of this invention is to provide reasonably effective
`prevention of casual copying by a user.
`Another object of this invention is to provide a copy protection scheme
`10 with little or no impact on or modification of the traditional, primary
`computer components.
`Still another object of this invention is to minimize the performance
`impact of the protection scheme by selectively protecting the most unique or
`most valuable portions of a data stream.
`This and other objects and advantages of the invention, as well as the
`details of an illustrative embodiment, will be more fully understood from the
`following specification and drawings.
`
`15
`
`Brief Description of
`the Drawings
`Figure 1 illustrates an appatatus useful in practicing this invention.
`Figures 2A, 2B and 2C illustrate a source data structure in its original
`form (2A), then formatted and addressed after scrambling (2B) and then
`formatted and addressed after encrypting the scrambling vector (2C).
`Figure 3 illustrates encryption of a 32 element scrambling vector.
`Figure 4 illustrates descrambling inside an MPEG2 decoder.
`
`20
`
`25
`
`Description of
`the Preferred Embodiments
`Representative elements and the process of a preferred implementation
`of the copy protection scheme are described below. A preferred embodiment
`30 will be described by way of example. Figure 1 gives a schematic of the complete
`system. Note that the MPEG decoder is depicted as a hardware element, but
`the copy protection method can be used, perhaps with a lesser degree of
`protection, when the MPEG decoder is a software process. A more generic
`system includes only a medium, a reader for that medium, a destination for
`information from that medium, and a channel between the reader and the
`destination.
`The medium does not need to be physically close to the destination. For
`example, the source information might be stored on a server such as a video-
`5
`
`35
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2411
`
`
`
`WO 97/44736
`
`PCT/US97/08264
`
`on-demand server, and the destination might be located many miles away, as
`in a set top box, cable decoder, or other interface. For example, the server might
`include a reader which securely transfers a decryption key to the destination in
`a user's home, then communicates a scrambled data stream over some
`5 channel to the destination where it is descrambled according to the decryption
`key.
`
`The channel for communicating the decryption key need not be the
`same as the channel for communicating the encoded, bulk information, but a
`single channel might be used for both purposes. A channel might be a data
`10 path through a computer but might also be a telephonic, television cable or
`satellite link or even a combination of two or more such links. The decoding
`can be done after any number of intervening transfers of the encoded digital
`information. One useful example would be a decoder coupled directly to a
`television set for direct and secure transmission of an encoded movie from a
`15 source to an end user.
`The channel can include several connected data paths and still safely
`transfer encoded information. For example, the primary information may be
`stored in encoded form on a server. That server might be connectable through
`several separate links, perhaps telephone or cable switching boxes, until final
`20 delivery to a decoder.
`One encoding scheme is used to encode the primary data. A key for this
`scheme is maintained according to one or more of a variety of methods. A
`second encoding scheme is used to transfer the key from a secure location to a
`location for use in decoding the primary data. In a preferred embodiment, the
`25 key for the primary data is stored with the data in a generally inaccessible
`location. This might .be in a special track or location on a disk containing the
`primary information. Alternatively, this might be maintained on a server as
`in, for example, a video-on-demand system, or in a selected-access system as in,
`for example, a pay-per-view system.
`The specific encoding scheme for the primary information may take any
`of a variety of forms. Some encoding schemes are known in the art but there
`are other, new schemes that are particularly useful. One particularly useful
`scheme is a simple scrambling scheme where the scrambling key is sufficiently
`complex to make brute-force decoding difficult, but simple enough to allow for
`rapid decryption when the correct key is available. The encoding scheme for
`the secondary information, here the scrambling or primary information key
`itself, also may take any of a variety of forms. In one preferred form, this
`secondary encoding uses two pairs of private and public keys to establish a
`6
`
`35
`
`30
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2412
`
`
`
`WO 97/44736
`
`PCT/US97/08264
`
`secure channel between the reader, for example the device where the primary
`key is maintained, and the destination, for example the device where the
`primary key is to be used.
`As illustrated in Figure 1, there are five keys involved in one preferred
`implementation of the copy protection apparatus of this invention, one for the
`primary information and four for secure transfer of that key.
`
`5
`
`Secure Transfer of the Primary Information Key
`
`10
`
`In one preferred embodiment, the primary information key is placed on
`the media during manufacture. It may be stored in a location or sub channel
`that is readily accessible to the drive controller but difficult or impossible to
`access otherwise. In a preferred embodiment, is not in an area that is
`addressable by logical block address (LBA) and thus is not accessible by devices
`15 other than the drive controller itself. This primary information key is
`transferred as the message for a public key/private key transaction through the
`open computer system to a descrambler where it is used to descramble the
`primary information.
`The drive controller is possessed of a public key and a private key, and
`20 has the capability of receiving another entity's public key. The drive can then
`encrypt a message using its private key and the received public key. This
`encrypted message can be requested by the operating system and passed to the
`owner of the non-drive public key, the destination.
`The non-drive entity can then use its own private key and the drive's
`25 public key to decrypt the received message. As noted above, the key on the
`media is the message for the second encoding system. Thus the key for the
`primary encoding is itself encoded using the second encoding system and
`transferred through the open computer system to the non-drive entity, where
`it is decoded according to the second encoding scheme. This key can then be
`loaded into the primary decoding system and used directly.
`The key encoding transaction described above uses very robust
`encryption which may be computationally intensive. However the size of the
`message is small and the transaction is a one time thing which is done at
`startup. The complexity of this encryption allows for a very high level of
`35 security. Since this encryption and decryption take place infrequently,
`preferably only at startup, there is very little penalty to taking some time. A
`typical user will not mind and may not even notice a delay of up to even a few
`
`30
`
`7
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2413
`
`
`
`WO 97/44736
`
`PCT/US97/08264
`
`seconds during the initiation or loading of a media title. One preferred
`sequence of events in just one preferred embodiment is as follows.
`The primary information is MPEG encoded data. The main channel (not
`shown - part of information stream 12) from the DVD media 11 contains
`5 MPEG encoded data. The DVD version of MPEG contains multiple
`opportunities for scrambling. Scrambling bits are defined and/or reserved bits
`exist in Video, Audio, Sub-picture, Data Search Information, and Video
`Blanking Information packs.
`The copy protection method described here scrambles the video and/or
`10 audio and/or sub pictures. An encoded version of the scrambling control bits
`are then inserted into the MPEG stream. Direct de-scrambling based on the
`inserted scrambling control bits will not give the correct results. To obtain
`correct de-scrambling, the scrambling control bit stream must be processed
`through a decoder, such as a tapped shift register.
`The primary information key includes information on the correct setup
`of the decoder, such as position of the taps for correct scrambling control bit
`decoding. This primary information key is put on the media in a sub channel
`or an area that is addressable by physical address, but not by logical block
`address.
`This last requirement means the drive controller can access the
`information needed for decoding scrambling control, but the host system 16
`cannot obtain it by a read command to a logical block address. The drive
`controller 13 is designed to pass this information over to the host system 16
`only in encrypted form using the controller's private key and the public key of
`the intended recipient. In Figure 1 the intended recipient is the MPEG decoder
`40, particularly the descrambling unit illustrated by its buffer area 41.
`The recipient, MPEG decoder 40, uses its private key and the controller's
`public key to decrypt the information that originated in the media sub channel
`or logically unaddressable regions.
`If the scrambled MPEG data stream 12 is directed to a recording device,
`the copy protection scheme is not defeated because the information to properly
`decode the scrambling control bits is not present in any form. The required
`information passes through the host in encrypted form only and is therefore
`useless even if trapped and recorded.
`The operating system brokers the exchange of public keys between the
`controller and the MPEG decoder at startup.
`At startup, the DVD-ROM device driver (not shown, part of system
`software) requests the operating system to provide the public keys of any
`8
`
`30
`
`35
`
`15
`
`20
`
`25
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2414
`
`
`
`WO 97144736
`
`PCUU597/08264
`
`installed MPEG2 decoders. The operating system obtains public keys from
`drive 10 and MPEG2 decoder 40 (if present). The operating system provides the
`public key of the decoder 40 to the drive 10 and public key of the drive 10 to the
`decoder 40. The DVD-ROM device driver refuses to accept any MPEG decoder
`5 public key except during the startup sequence. This give some extra security
`against impersonation.
`
`Use of the Primary Information Key
`
`10
`
`15
`
`During primary data transfer operation, the primary information key is
`used by the recipient, e.g. the MPEG decoder, to correctly reorder the scrambled
`logical blocks received by streaming off of the storage device, e.g. a DVD disk.
`The specific function of the primary information key depends on the specific
`scrambling scheme. One preferred scrambling scheme is described below. Once
`transferred to the recipient, the primary information key is inserted into an
`appropriate decoder, then used to unscramble the primary data stream. In a
`preferred embodiment, the primary data stream is scrambled MPEG data which
`is descrambled to give a traditional MPEG data stream which then is decoded
`to give a video image, for example, an NTSC standard image or an RGB image,
`20 which can be displayed on an appropriate monitor.
`
`Scrambling Scheme
`
`25
`
`The preferred scrambling scheme is designed to be computationally
`intensive to break if attacked as a jig saw puzzle, but easy to reorder if the key is
`available. A data unit is divided into smaller units, which are then rearranged
`according to a selected scheme. Information for reordering that data unit is
`stored for retrieval in conjunction with that data unit. This might take the
`form of a scrambling vector, which might be stored in a subheader or perhaps
`30 embedded in the scrambled data unit. The information can be further
`protected by encoding the scrambling vector according to an encryption
`scheme, using a selected primary information key. The same process can be
`repeated for subsequent data units, but each data unit can be rearranged in a
`different order. In each instance, the scrambling vector is retrievable and can be
`reassociated with its corresponding data unit. The same primary information
`key can be used to encode a series of scrambling vectors. The primary
`information key, along with each particular instance of the encoded
`
`35
`
`9
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2415
`
`
`
`WO 97/44736
`
`PCT/US97/08264
`
`10
`
`15
`
`scrambling vector, is used to decode the scrambling vector which in turn is
`used to correctly reorder the data unit.
`In one particularly preferred embodiment, a selected program, such as a
`movie title, is divided into data units, each of which is scrambled individually,
`5 and each scrambling vector is encoded using a single key. That primary
`information key can be stored with the primary program, and each program
`can use a different primary information key. The specific scrambling and
`descrambling schemes can be implemented in specialized hardware for rapid
`and convenient playback of the primary program.
`Figures 2A, 2B, 2C, 3 and 4 describe one scrambling embodiment that
`uses a scrambling vector subheader on 2 KB data blocks. If the user data stream
`(information or primary data stream) has places to put this scrambling vector
`data, it could be placed inside the user data and no subheader would be
`necessary.
`Referring to Figures 2A, 2B and 2C, Figure 2A illustrates representative,
`primary data as formatted and addressed before scrambling. The data to
`scramble is segmented into groups of 32 sequential blocks, also referred to as
`sectors, each having a logical block address (LBA), each containing 2 KB for a
`total of 64 KB. Data in this form is considered clear text. For example, if it were
`20 MPEG2 movie data, it would be directly decodable by an MPEG2 decoder
`conforming to the published standards.
`Changing the order of the sequential blocks scrambles the primary
`information. Figure 2B illustrates data as formatted and addressed after
`scrambling of LBAs and user data blocks in the 64 KB sequence. There are 32!
`25 distinct ways to randomly assign the data blocks to the 32 LBAs in each 64 KB
`sequence. The illustrated order, 5, 31, 17, ..., 22, is merely illustrative. Each
`group of 32 sectors can be scrambled independently and the correct position
`within the group given by the value of the Scrambling Vector Element (SVE)
`placed in a subheader.
`Figure 2C illustrates data as formatted and addressed after scrambling of
`LBAs and user data blocks in the 64 KB segment. The scrambled form, Sr', of
`the scrambling vector, SV, is now placed in the subheaders of the group of 32
`sectors. The SV*E user data are mastered onto the media, such as a DVD disc,
`in the sequence shown in Figure 2C. If the data stream is a scrambled MPEG2
`35 movie, a standard MPEG2 decoder will not be able to make any sense out of it
`in the scrambled form.
`Referring to Figure 3, this figure shows encryption of a 32 element
`scrambling vector. The elements of the scrambling vector are encrypted using a
`10
`
`30
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2416
`
`
`
`WO 97/44736
`
`PCI7US97/08264
`
`5
`
`reversible algorithm whose parameters are defined by the media key, KMedia •
`Recall this is the key that is only readable by the drive 10, and this key is never
`passed as clear text through the open system. There are a number of simple
`approaches available for encrypting the scrambling vector, such as tapped shift
`registers, pseudo random sequence generators, etc.
`Referring to Figure 4, descrambling is done inside MPEG2 decoder 40.
`The descrambling buffer area 41 is equal to or greater than the 64 KB of user
`data plus the 32 byte overhead of the SV*. Typical memory allocation might
`be done on 1 KB boundaries, so handling the SV* and converting it back to SV
`10 might necessitate 65 KB for the descrambling buffer area. The internal output
`is a clear text MPEG data stream which is then decoded to give final output 19
`as uncompressed video.
`Other data streams can be processed in an analogous manner.
`Another preferred scrambling scheme reorders only part of the user data
`15 block. An MPEG data stream includes high order bits that define information
`about the sequence of the user data blocks. If data blocks including this
`information were simply reordered, it would be possible to use those specific
`bits to reassemble the data in the correct order. However, if only part of the
`user block is reordered and the expected sequence information is left
`20 untouched, the user blocks will be corrupted because the first part of the user
`block will be matched with the second part of a different user block. In a
`preferred implementation, the first half of each block is untouched while the
`second half of each block is reordered as described above in connection with
`Figures 2A, 2B and 2C. The scrambling vector is prepared, encoded and stored
`25 as described above. This scheme still has 32! possible combinations. Since each
`data unit can be reordered using a different scrambling vector, descrambling
`will be difficult without the key, but simple with the correct primary
`information key.
`The size of the data unit affects the complexity of encoding and
`30 decoding. The example above describes a data unit subdivided into 32 blocks.
`This allows reordering in 32! possible combinations which gives a fairly
`complex, and thus secure, encoding scheme. In the DVD specification, a
`standard data unit is 32 KB of 2 KB subunits. This provides 16 blocks which can
`be reordered as decribed above, to give 16! possible combinations of scrambled
`35 data.
`
`A media drive controller can be designed to support this scheme at
`minimal cost impact. As far as the transferring a scrambled primary data
`stream, a traditional drive controller need not be modified at all. To support
`11
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2417
`
`
`
`WO 97/44736
`
`PCT/US97/08264
`
`the secondary encoding, the drive controller needs to maintain a public and a
`private key had be able to support the selected encryption scheme. To support
`the preferred embodiment of storing the primary information key in a special
`location on the media, the drive controller needs to be designed to achieve the
`5 needed access and transfer the key appropriately.
`The recipient similarly may need only minor modification. If the data
`stream decoder is a separate unit, there may be no need to modify the decoder.
`In a preferred embodiment, the recipient is or is coupled to a descrambler unit
`which in turn is tightly coupled to a decoder such as an MPEG decoder. The
`10 descrambler unit should support the selected scrambling scheme and should
`manage the primary information key as needed. In a preferred embodiment,
`the descrambler manages a public and a private key, interfacing with the secure
`data channel, receiving and decrypting the primary information key, and using
`the primary information key to descramble the primary information.
`A general description of the device 'and method of using the present
`invention as well as a preferred embodiment of the present invention has
`been set forth above. One skilled in the art will recognize and be able to
`practice many changes in many aspects of the device and method described
`above, including variations which fall within the teachings of this invention.
`20 The spirit and scope of the invention should be limited only as set forth in the
`claims which follow.
`
`15
`
`12
`
`DISH-Blue Spike-246
`Exhibit 1010, Page 2418
`
`
`
`WO 97/44736
`
`PCT/US97/08264
`
`Claims
`What is claimed is:
`1. An apparatus for providing two levels of copy protection, said apparatus
`comprising
`first means for copy protecting information, said first means
`including a key, and
`second means for c