`a2) Patent Application Publication 0) Pub. No.: US 2004/0255139 Al
`(43) Pub. Date:
`Dec. 16, 2004
`Giobbi
`
`US 20040255139A1
`
`(54) DIGITAL CONTENT SECURITY SYSTEM
`
`Publication Classification
`
`(76)
`
`Inventor:
`
`John J. Giobbi, Bend, OR (US)
`
`Correspondence Address:
`Michael J. Blankstein
`2014 Harrison Street
`Evanston, IL 60201 (US)
`
`(21) Appl. No.:
`
`10/847,135
`
`(22)
`
`Filed:
`
`May17, 2004
`
`Related U.S. Application Data
`
`(63) Continuation-in-part of application No. 10/715,035,
`filed on Nov. 17, 2003, which is a continuation-in-part
`of application No. 10/153,979, filed on May 23, 2002,
`which is a continuation-in-part of application No.
`09/750,487, filed on Dec. 27, 2000, and which is a
`continuation-in-part of application No. 10/016,857,
`filed on Dec. 14, 2001.
`
`Ente C17 ceccecccecsecsecsensee GO6F 12/14; HO4L 9/00
`(51)
`(52) US. Ch.
`cecesccsessessesssse 713/193; 380/231; 705/51
`
`(57)
`
`ABSTRACT
`
`A Personal Digital Key Digital Content Security System
`(PDK-DCSS) is used to protect computers from unautho-
`rized use and protect the digital content stored on computers
`from being wrongfully accessed, copied, and/or distributed.
`The basic components of the PDK-DCSSare (1) a standard
`hard drive device, with the addition of a PDK Receiver/
`Decoder Circuit (PDK-RDC) optionally integrated into the
`hard drive’s controller, and (2) a PDK-Key associated with
`the PDK-RDC. The PDK-Key and RDC technology is
`utilized to provide two categories of protection: (1) hard
`drive access control for providing Drive-Level and Sector-
`Level protection and (2) operating system-level independent
`file protection for providing File-Level and Network-Level
`protection.
`
`WITH KEY CODE
`FROM KEY PROVIDER
`
`KEY PROVIDER
`ESTABLISHES NEW
`USER ACCOUNT
`
`
` USER REQUESTS KEY
`
`
`
`
`
`
`
`
`
`KEY PROVIDER
`SENDS KEY
`TO USER
`
`
`
`
`PLAYING DEVICE
`
`
`USER REQUESTS TO
`DECRYPTS AND PLAYS
`
`
`PURCHASE DIGITAL
`DIGITAL CONTENT IF
`
`
`
`CONTENT FROM
`KEY CODE MATCHES
`
`
`
`CONTENT PROVIDER
`UNLOCK CODE
`
`
`
`
`
`
`CONTENT PROVIDER
`
`
`PLAYING DEVICE
`
`
`REQUESTS KEY
`
`READS KEY CODE
`
`AND UNLOCK CODE
`PROVIDER TO
`VALIDATE KEY
`
`
`
`
`
`
`KEY PROVIDER
`USER ENTERS
`VERIFIES KEY
`DIGITAL CONTENT
`
`
`IF VALID
`INTO PLAYING DEVICE
`
`
`
`
`
`
`CONTENT PROVIDER
`CONTENT PROVIDER
`
`
`PULLS AND ENCRYPTS
`DELIVERS ENCRYPTED
`
`
`DIGITAL CONTENT
`DIGITAL CONTENT
`
`
`
`WITH UNLOCK CODE
`TO USER
`
`
`
`
`1
`
`MICROSOFT 1006
`
`1
`
`MICROSOFT 1006
`
`
`
`US 2004/0255139 Al
`
`FIG. 1
`
`Patent Application Publication Dec. 16,2004 Sheet 1 of 13
`
`TO USER
`
`USER REQUESTS KEY
`WITH KEY CODE
`FROM KEY PROVIDER
`
`KEY PROVIDER
`ESTABLISHES NEW
`USER ACCOUNT
`
`KEY PROVIDER
`SENDS KEY
`
`10
`
`2
`
`7
`
`16
`
`18
`
`20
`
`
`
`
`
`
`
`USER REQUESTS TO
`PURCHASE DIGITAL
`
`CONTENT FROM
`
`
`CONTENT PROVIDER
`
`
`
`CONTENT PROVIDER
`REQUESTS KEY
`
`
`PROVIDER TO
`VALIDATE KEY
`
`KEY PROVIDER
`VERIFIES KEY
`IF VALID
`
`
`
`PLAYING DEVICE
`
`DECRYPTS AND PLAYS
`
`DIGITAL CONTENT IF
`
`
`KEY CODE MATCHES
`
`
`
`UNLOCK CODE
`
`PLAYING DEVICE
`READS KEY CODE
`AND UNLOCK CODE
`
`USER ENTERS
`DIGITAL CONTENT
`
`30
`
`—28
`
`26
`
`24
`
`
`
`INTO PLAYING DEVICE
`
`
`
`
`CONTENT PROVIDER
`PULLS AND ENCRYPTS
`DIGITAL CONTENT
`
`
`WITH UNLOCK CODE
`
`
`
`--22
`
`
`
`CONTENT PROVIDER
`DELIVERS ENCRYPTED
`
`DIGITAL CONTENT
`
`
`TO USER
`
`
`
`2
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 2 of 13
`
`US 2004/0255139 Al
`
`USER
`ACCOUNTS
`102
`100
`
`
`
`
`STEP 10
`
`_—__ PROVIDER
`
`
`
`
`STEP 14
`
`
`STEP 12
`
`
`
`
`KEY
`
`104
`
`FIG. 2
`
`100.
`
`106
`
`102
`
`STEP 16
`
`
`
`
`
`CONTENT
`
`
`
`CODE} CODE| CODE
`
`
`
`STEP 30
`
`
`
`12
`
`DVD PLAYER
`
`CELL PHONE
`
`STEP 28
`
`tt
`
`Ker]
`N14
`
`3
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 3 of 13
`
`US 2004/0255139 Al
`
`G‘Old
`
`GANYOMLAN
`
`LNSLNOD
`
`ANOTV-GNVLS
`
`IN3LNO9
`
`LNVITIdNOD-ASay
`
`IN3SLNOO
`
`Lsvoqavoug
`
`INALNOD
`
`“dYOLS
`
`LHONOG
`
`AINSLNOO
`
`dgaqgvoINMOG
`
`IN3SLNOO
`
`4
`
`
`
`
`
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 4 of 13
`
`US 2004/0255139 Al
`
`LN3LNOO
`
`AaSVEVLVG
`
`LNNODOV
`
`asvavivd
`
`SAVIOANI
`
`—_—
`
`[oooo0]
`
`
`
`orl
`
`5
`
`
`
`
`
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 5 of 13
`
`US 2004/0255139 Al
`
`
`
`OS
`ba wy
`Eo
`
`, wa|e eal jga|) = (©
`
`
`
`a
`O-
`of
`LL
`Og
`°
`Od
`RE
`ea
`e—-\j/<a
`a
`
`8=
`
`INVOICES
`
`172
`
`(80)F
`
`174
`
`170
`
`6
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 6 of 13
`
`US 2004/0255139 Al
`
`
`
`
`FIG.8
` 202
`DATABASE
`RSCDATABASE
`ACCOUNT
`
`
`Y)
`Lu
`
`OO
`
`>
`
`S
`
`N
`
`o
`~
`
`o
`
`=
`
`«
`
`196
`
`<
`
`7
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 7 of 13
`
`US 2004/0255139 Al
`
`iss}
`ao
`
`o
`LL.
`
`2
`Oo
`
`o
`LL.
`
`
` [aTTP[1ft)
`220,
`
`222
`
`8
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 8 of 13
`
`US 2004/0255139 Al
`
`25 °“=
`Oo
`LL.
`
`a
`
`NN©
`
`TS
`S
`oe
`
`a\\
`E
`
`-
`
`wv-
`o
`
`g
`
`wt
`
`N©
`
`Q
`a
`o
`
`o
`38
`
`¢S
`
`R ean
`| Cl
`
`1
`
`=z
`o
`
`315
`
`~~
`
`wv
`-
`
`“+4
`
`wv
`e-
`©
`
`Ss
`
`(
`
`N=“
`
`7
`
`326
`
`0
`©
`a*o*
`
`We
`Co
`
`:
`
`|
`.) eee TM
`
`ROTTEN|
`WT LPR)
`
`318
`
`9
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 9 of 13
`
`US 2004/0255139 Al
`
`cee
`
`eALGpleH
`
`LL‘Sls
`
`10
`
`10
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 10 of 13
`
`US 2004/0255139 Al
`
`332
`
`336
` 334
` HardDrive
`
`FIG.12
`
`11
`
`11
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 11 of 13
`
`US 2004/0255139 Al
`
`it',‘
`
`aqejdwog
`
`pex07-un
`
`PUBWWOSaJoUub)
`
`pue
`
`
`
`aBessawwmnyes
`
`QPURTSUlBANG,
`
`PHEA
`
`éleubis
`
`ddwoyad
`
`yoays-jeubis
`
`aaug
`
`EPax207
`
`
`
`0}@AuDJag
`0}AUP13g
` uannoaxa
`0}BAUJagBAUON\PuBWWwOD
`
` tiy‘'11'''J0198SBIeyepidésougepuewwos
`
`'!'[62sounONpeey
`
`
`Pax9072pex907}zenenbul
`
`peyx207
`
`SOA
`
`
`
`PUeWLOSYyo}a4
`
`12
`
`12
`
`
`
`
`
`
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 12 of 13
`
`US 2004/0255139 Al
`
`x
`
`froaOo
`
`x
`
`332 336
` 338
`HardDrive
`
`Controller
`
`13
`
`FIG.14
`
`13
`
`
`
`Patent Application Publication Dec. 16,2004 Sheet 13 of 13
`
`US 2004/0255139 Al
`
`Ove
`
`
`
`
`
`
`
`(9a)uogeaiyjddySIEMYOSJ9[]01UODJUBWINI0GgWad
`
`BITACBAN weryAy
`
`
` BITADSgIspASybooo#
`dnosg
`
`SIs
`
`
`
`
`
`U000#dnoln
`
`Sl
`
`14
`
`14
`
`
`
`
`US 2004/0255139 Al
`
`Dec. 16, 2004
`
`DIGITAL CONTENT SECURITY SYSTEM
`
`REFERENCE TO RELATED APPLICATIONS
`
`[0001] This application is a continuation-in-part of U.S.
`patent application Ser. No. 10/715,035 filed Nov. 17, 2003,
`which is a continuation-in-part of U.S. patent application
`Ser. No. 10/153,979 filed May 23, 2002, which is a con-
`tinuation-in-part of U.S. patent application Ser. No. 09/750,
`487 filed Dec. 27, 2000 and Ser. No. 10/016,857 filed Dec.
`14, 2001, all of which are incorporated herein by reference
`in their entirety.
`
`FIELD OF THE INVENTION
`
`[0002] The present invention relates generally to digital
`content security systems and, more particularly, to a digital
`content security system and method that provides different
`levels of protection of a computer or other storage device
`and the digital content stored thereon.
`
`BACKGROUND OF THE INVENTION
`
`[0003] The market for downloading digital content online
`is rapidly climbing because distribution of such content is
`inexpensive, fast, and easy and the quality of the content
`itself is acceptable. The market, however, remains disorga-
`nized due to competing standards, competing companies,
`discontented artists and producers, and outright
`theft of
`digital content.
`
`[0004] Digital rights management (DRM) companies seek
`to solve the foregoing problems by delivering the digital
`content from the real producers to the right customers and
`ensuring that everyone who should be paid in fact is paid.
`DRMseeksto get everyone paid by managing the multiple
`steps for distributing digital content (music,video, software)
`online: watermarking, encryption, transaction management,
`and rights management. Some DRM companiesperform all
`these steps, while other DRM companies specialize in one or
`two steps of the process.
`
`[0005] First, watermarking stamps each piece of digital
`content with a digital mark so it can be tracked whereverit
`goes. Digital watermarks are just like paper watermarks,
`except they cannot be seen or heard. Special software is
`required to read a digital watermark.
`
`[0006] Second, encryption scrambles watermarkeddigital
`contentandstores it inside a digital safe for shipment around
`the Internet. The safe protects the content during shipping by
`allowing only those with the right software key to the safe
`to decrypt and use the content.
`
`[0007] Third, transaction managementhandles actual pay-
`ments for the digital content using credit card techniques
`found elsewhere in e-commerce. An orderis placed,a credit
`card number is taken, account status is checked, and the
`exchange is authorized.
`
`[0008] Finally, rights management manages the informa-
`tion about the digital content itself: what it is, who getsit,
`how it is delivered, how many times it may be used, how
`long the rights last, who gets paid, how muchthey get paid,
`and how. This information travels with the digital content in
`something called a digital permit. The permits rests on top
`of the digital content as it travels the Internet and allows
`legal users to enjoy the digital content for as long as the
`rights last.
`
`[0009] The primary objective of DRM companies is to
`deploy technologies that protect digital content as it
`is
`distributed online. Some of these proposed technologies and
`DRM in general are discussed in the article “Digital Rights
`Management May Solvethe Napster ‘Problem’,” Zechnology
`Investor, October 2000, pp. 24-27. Although such technolo-
`gies should reduce the amountofdigital theft, they generally
`favor the content provider at the expense of the consumeror
`favor the consumerat the expense of the content provider.
`That is,
`the rights of either the content provider or the
`consumer are compromised. For example, some technolo-
`gies severely limit the consumer’s ability to make extra
`copies of digital content even when the digital content is
`solely for personal use. Other technologies facilitate the
`making of copies of digital content which can be used by
`different consumers without
`the content provider being
`compensated by each consumer. The present inventor has
`discovered an improved DRM system and method that
`effectively balances and protects the rights of both the
`consumer and the content provider. In addition, the present
`inventor has discovered an associated digital content secu-
`rity system for protecting computers and other storage
`devices from unauthorized use and protecting the digital
`content stored on computers and other storage devices from
`being wrongfully accessed, copied, and/or distributed.
`
`SUMMARYOF THE INVENTION
`
`In accordance with the foregoing,there is disclosed
`[0010]
`a Personal Digital Key Digital Content Security System
`(PDK-DCSS) for protecting computers from unauthorized
`use and protecting the digital content stored on computers
`from being wrongfully accessed, copied, and/or distributed.
`The basic components of the PDK-DCSSare (1) a standard
`hard drive device, with the addition of a PDK Receiver/
`Decoder Circuit (PDK-RDC) optionally integrated into the
`hard drive’s controller, and (2) a PDK-Key associated with
`the PDK-RDC. The PDK-Key and RDC technology is
`utilized to provide two categories of protection: (1) hard
`drive access control for providing Drive-Level and Sector-
`Level protection and (2) operating system-level independent
`file protection for providing File-Level and Network-Level
`protection. A number of alternative embodiments are also
`disclosed.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0011] The foregoing and other advantages of the inven-
`tion will become apparent upon reading the following
`detailed description and upon reference to the drawings in
`which:
`
`[0012] FIG. 1 is a flow chart of a method of managing
`digital rights in accordance with the present invention;
`
`[0013] FIGS. 2, 3, and 4 are block diagramsof portions of
`a DRMsystem for implementing the method in FIG. 1;
`
`[0014] FIG. 5 is a conceptual model of core options for
`acquiring digital content that can be encoded to produce
`key-secured content and core options for playing back the
`key-secured content;
`
`FIG.6 is a block diagram for implementing a core
`[0015]
`acquisition option of downloaded content;
`
`FIG.7 is a block diagram for implementing a core
`[0016]
`acquisition option of store-bought content;
`
`15
`
`15
`
`
`
`US 2004/0255139 Al
`
`Dec. 16, 2004
`
`FIG.8 is a block diagram for implementing a core
`[0017]
`acquisition option of broadcast content;
`
`[0018] FIGS. 9a and 9b are block diagrams for imple-
`menting a core playback option of stand-alone devices;
`
`[0019] FIG. 10 is a block diagram for implementing a core
`playback option of networked devices;
`
`[0020] FIG. 11 is a block diagram of a standard computer
`hard drive incorporating an integrated PDK-RDC (receiver/
`decoder circuit) for the purpose of enabling multiple meth-
`ods of securing digital content;
`
`[0021] FIG. 12 is a block diagram for implementing
`Drive-Level protection and Sector-Level protection in con-
`nection with the computer hard drive;
`
`[0022] FIG. 13 is a flow chart of the logic executed by the
`PDK-RDC for implementing Drive-Level protection and
`Sector-Level protection;
`
`[0023] FIG. 14 is a block diagram for implementing
`File-Level protection in connection with the computer hard
`drive; and
`
`[0024] FIG. 15 is a block diagram for implementing
`Network-Level protection by expanding File-Level protec-
`tion to a network environment.
`
`[0025] While the invention is susceptible to various modi-
`fications and alternative forms, specific embodiments have
`been shown by way of example in the drawings and will be
`described in detail herein. However, it should be understood
`that
`the invention is not
`intended to be limited to the
`
`particular forms disclosed. Rather, the invention is to cover
`all modifications, equivalents, and alternatives falling within
`the spirit and scope of the invention as defined by the
`appended claims.
`
`DESCRIPTION OF SPECIFIC EMBODIMENTS
`
`[0026] Turning now to the drawings and referringinitially
`to FIG. 1, there is depicted a method of managing digital
`rights in accordance with the present invention. First, a new
`user requests a physical electronic key or data unit from a
`key provider (step 10). The key provider may offer a web
`site on the Internet, a toll free telephone number, and/or
`retail outlet where the key may be acquired. In addition, the
`key provider may allow a key to be requested in writing,
`preferably using a form designed by the key provider.In one
`model the user may acquire as many keys as desired, while
`in another model each useris only entitled to a single key.
`
`in response to the user’s request for a
`[0027] Second,
`physical key,
`the key provider establishes a new secure
`account for that new user in a secure user account database
`(step 12). The new account may include the following data
`fields: account number, password, software encryption key,
`user label, number of users (linked to account), address,
`telephone number, e-mail address, and custom fields. The
`custom fields may, for example, include demographic infor-
`mation such as the user’s age, gender, marital status, income
`level, interests, hobbies, etc. The physical key may include
`the following data fields: user label, account number, soft-
`ware decryption key, and a custom storage area. The user
`label and the account numberserveasa first activation code
`(or key code) for the acquired physical key. All data fields
`on the physical key, except for the user label, are preferably
`
`encrypted. To allow the user to view his or her accountin the
`future, the user is preferably assigned a login name and the
`above-noted password.
`
`the key provider ships the physical elec-
`[0028] Third,
`tronic key to the new user via a package courier such as the
`U.S. Postal Service, United Parcel Service, or Federal
`Express (step 14). In one pricing model the physical key is
`sent to the user at no charge, while in another pricing model
`the physical key must be purchased by the user. If the
`physical key must be purchased bythe user, either the user
`must provide credit/debit card information to the key pro-
`vider in step 10 to pay with a credit/debit card, or the key
`provider includes an invoice with the shipped key in step 14.
`
`[0029] FIG. 2 is a block diagram of a system for imple-
`menting steps 10, 12, and 14 of the method of managing
`digital rights. The system includes the new user 100, the key
`provider’s website 102, and the user account database 104.
`
`[0030] Referring back to FIG. 1, fourth, the user transmits
`his or her activation code in the physical key to a digital
`content provider, who may have a cooperative relationship
`with the key provider, and requests to purchase digital
`content (music, video, or software) from that content pro-
`vider (step 16). The content provider mayoffer a website on
`the Internet containing a listing of digital content available
`for purchase. To transmit the activation code to the content
`provider via the web site, the user may manually enter the
`activation code onto a secure page of the web site. Alterna-
`tively,
`the transmission of the activation code may be
`automatically implemented with wireless technology. Spe-
`cifically, the user’s computer may be outfitted with a detec-
`tor that detects the activation code in the user’s physical key
`and then relays the activation code to the content provider
`via the web site. The content provider maybe affiliated with
`the key provider or may be separate from the key provider
`but have an arrangement therewith.
`
`[0031] Fifth, the content provider requests the key pro-
`vider to verify the activation code transmitted by the user
`(step 18). The content provider may send this requestto the
`key provider’s web site. Sixth,
`the key provider in turn
`accesses the user’s account in the user account database and
`determines whether the activation codeis in fact valid (step
`20). The key provider may also determine whether the
`activation code is associated with the user that transmitted
`
`the activation code to the content provider. If the activation
`code is rejected as being invalid, the content provider is so
`informed and the content provider in turn will not honor any
`request by the user to purchase digital content. If, however,
`the activation code is accepted as being valid, the content
`provider is so informed and the purchase transaction pro-
`ceeds. As used herein, the term “key provider” generically
`refers to the entity or entities that manufacture, distribute,
`and validate the physical keys. These functions mayactually
`be performed by multiple entities at different locations or by
`a single entity at a single location.
`
`[0032] Seventh, after securing validation of the first acti-
`vation code in the physical key, the content provider pulls
`the requested digital content from a digital content database/
`library, marks the digital content with a second activation
`code (or unlock code) associated with the first activation
`code in the physical key, and encrypts the marked digital
`content (step 22). The second activation code in the digital
`content may simply be the sameasthe first activation code
`
`16
`
`16
`
`
`
`US 2004/0255139 Al
`
`Dec. 16, 2004
`
`least partially encrypted for
`in the physical key, but at
`security. In one embodiment, the “key-secured” contentfile
`includes the following data fields: user label, account num-
`ber, and digital content. The user label and the account
`number serve as the second activation code for the digital
`content. If the content is merely for sampling (described in
`connection with FIG. 6), the file may include such addi-
`tional data fields as a receiver/decoder circuit identification
`number, hour stamp, and life hours. All data fields on the
`content
`file, except
`for
`the user
`label, are preferably
`encrypted.
`
`[0033] Eighth, the content provider delivers the encrypted
`digital content to the user (step 24). The encrypted digital
`content may be delivered by downloading the encrypted
`digital content to the user’s computer while the user is online
`at the content provider’s web site, by attaching the digital
`content to an e-mail addressed to the user, or by shipping a
`disk containing the encrypted digital content to the user via
`a package courier. The user may payfor the digital content
`either by providing credit/debit card information to the
`content provider in step 16 or by paying off of an invoice
`included with delivered digital content. If the digital content
`is delivered online, the user is preferably required to provide
`the credit/debit card information and have such information
`approved as a prerequisite to delivery of the digital content.
`If the user possesses more than one physical electronic key
`and would like the acquired digital content to function with
`each ofthe user’s keys,all of the activation codesare applied
`to the digital content. The content provider charges the user
`based on the number of keys with which the user would like
`the digital content to function. For example, the user may be
`charged the same amountfor each activation code, or may
`be charged a larger amountfor one activation code and lesser
`amounts (e.g., surcharges) for additional activation codes.
`
`[0034] FIG. 3 is a block diagram of a system for imple-
`menting steps 16, 18, 20, 22, and 24 of the method of
`managing digital rights. The system includes the new user
`100, the content provider 106, the key provider’s website
`102,
`the digital content database 108, and the acquired
`digital content 110.
`
`the user enters the
`[0035] Returning to FIG. 1, ninth,
`encrypted digital content into a playing device of a type
`suitable for playing the digital content (step 26). The device
`may, for example, be an MP3 player, a personal computer,
`a DVD player, a CD player, a cellular phone, or other
`portable device. In one embodiment, the device contains a
`wireless transceiver adapted to receive a radio frequency
`signal transmitted by a corresponding wireless transceiver in
`the user’s physical electronic key. The wireless transceiver
`in the device is optionally tracked and “secured” for audit
`purposes by permanently including a unique identifier
`assigned by the device manufacturer in the transceiver.
`
`[0036] Tenth, with the user’s physical electronic key
`within a short range (e.g., few meters) of the playing device,
`the playing device reads (1) the first activation code carried
`in a secure radio frequency signal transmitted by the trans-
`ceiverin the physical key to the transceiver in the device and
`(2) the second activation code marked on the encrypted
`digital content (step 28). The device contains decryption
`software or hardware for decrypting the encrypted digital
`content to the extent necessary to read any encrypted portion
`of the second activation code.
`
`the playing device compares the first
`[0037] Eleventh,
`activation code and the second activation code and deter-
`mines whetherthefirst activation code is associated with the
`
`second activation code (step 30). Steps 29 and 30 may be
`performed, for example, when the user presses a “play”
`button on the playing device or whentheuserfirst enters the
`encrypted digital content into the playing device. If the first
`activation code is associated with the second activation
`
`code, the device decrypts and plays the digital content. If the
`first activation code is not associated with the second
`
`activation code, the device does not play the digital content.
`If the second activation code is simply the sameasthefirst
`activation code, then the foregoing comparison determines
`whether there is a match between thefirst activation code
`and the second activation code. In a preferred embodiment,
`the device continues to play the digital content only while
`the physical key is sufficiently close to the device to com-
`municatethe first activation code to the device and allow the
`
`device to compare the first activation code to the second
`activation code at least partially encrypted with the digital
`content even while the digital content is being played. If the
`physical key is moved out of range, the device is no longer
`enabled to decrypt and play the digital content.
`In an
`alternative embodiment, once the device is initially enabled
`to decrypt and play the digital content, the device remains
`enabled until either the “play” function is stopped, a play
`track/song ends, or the digital content is removed from the
`device, even if the physical key is moved out of range such
`that the key can no longer communicate the first activation
`code to the device.
`
`[0038] FIG. 4 is a block diagram of a system for imple-
`menting steps 26, 28, and 30 of the method of managing
`digital rights. The system includes the encrypted digital
`content 110, the key-enabled playing devices 112, and the
`user’s physical electronic key 114.
`
`[0039] As stated above, the user’s physical electronic key
`and the key-enabled playing device contain respective wire-
`less transceivers to communicate the activation code in the
`key to the device. In a preferred embodiment, the transceiv-
`ers are small, inexpensive Bluetooth radio chips that operate
`in the unlicensed ISM band at 2.4 GHz and avoid interfer-
`ence from other signals by hopping to a new frequencyafter
`transmitting or receiving a packet. The radio chips are
`plugged into electronic devices, which can then communi-
`cate over short distances and through obstacles by meansof
`radio waves. Bluetooth is a term used to describe the
`protocol of a short range (e.g., about 10 meters) frequency-
`hopping radio link between devices containing the radio
`chips. These devices are then termed “Bluetooth-enabled.”
`The secure radio link replaces a cable that would otherwise
`be used to connect the devices. Further details concerning
`Bluetooth wireless technology may be obtained from www-
`-bluetooth.com.
`
`[0040] Wireless technologies other than Bluetooth may be
`used to communicate the activation code from the user’s
`physical electronic key to the playing device. One example
`of an alternative wireless technology is known by a trade
`term “Wi-Fi,” which is short for wireless fidelity and is
`another name for IEEE 802.11b. Products certified as Wi-Fi
`by the Wireless Ethernet Compatibility Alliance (WECA)
`are interoperable with each other even if they are from
`different manufacturers. A user with a Wi-Fi product can use
`
`17
`
`17
`
`
`
`US 2004/0255139 Al
`
`Dec. 16, 2004
`
`any brand of access point with any other brand of client
`hardwarethat is built to the Wi-Fi standard.
`
`In other alternative embodiments, the communica-
`[0041]
`tion between the user’s physical electronic key and the
`playing device is not wireless. Rather, in one alternative
`embodiment, the user’s physical electronic key communi-
`cates the activation code to the playing device via a trans-
`mission line such as a serial cable that plugs into the key at
`one end and the playing device at the other end. In another
`alternative embodiment, the key is a smart card or magnetic
`card into which the activation code is encoded, and the key
`is configured to physically fit into a card reader slot on the
`playing device.
`[0042] The above-described DRM method and system for
`implementing the method are advantageous in that
`they
`afford the key holder with tremendousversatility in copying
`and using encrypted digital content for personal use. At the
`same time, the rights of the content provider are protected
`because only the key holder with a key-enabled device can
`use the encrypted digital content. The key holder can copy
`the encrypted digital content as many times as desired, but
`can only play the encrypted digital content on a key-enabled
`device that is enabled with the physical electronic key coded
`to decrypt the encrypted digital content. Thus, the digital
`content, even when copied, remains personal to the key
`holder. Individuals other than the key holder cannot use the
`encrypted digital content, even if they copy it, because both
`the original and copies of the encrypted digital content are
`still encrypted and the individuals do not hold the physical
`electronic key coded to decrypt the digital content.
`[0043] A core element of the present
`invention is the
`concept of a portable, physical electronic keythat is personal
`to a particular user. The physical key represents a DRM
`solution that fully addresses the needs of both consumers
`and publishers of digital content. The physical key is per-
`manently associated with a user’s digital content library. At
`the time of content acquisition, the physical key becomes
`permanently associated with the newly acquired content.
`The user is now “linked” to that acquired content. A user
`(e.g., individual or family) may own as many physical keys
`as desired, but every piece of encrypted digital content
`purchased is tied to one specific key. The user may duplicate
`or transfer the acquired content to any media or device for
`playback as many timesas desired, as long as the associated
`physical key is present. Thus, the present invention guaran-
`tees that the acquired content is played only by the user who
`has legitimately paid for it. The present invention gives
`consumers unprecedented freedoms and conveniencesto use
`legitimately purchased content while still fully protecting
`content providers’ rights.
`the present invention fully
`[0044] Referring to FIG. 5,
`supports the use of “key-secured” digital content 125 with
`all core content acquisition options and all core playback
`options. The key-secured digital content 125 is encoded with
`a second activation code associated with a first activation
`code stored on the user’s physical electronic key. The core
`acquisition options include downloaded content 120, store-
`bought content 122, and broadcast content 124. The core
`playback options include stand-alone devices 126 and net-
`worked devices 128. Each of these options are described in
`further detail below.
`
`invention is its use in the downloading of digital content
`from the Internet. A consumer shops a content distributor’s
`website and selects a piece of content they wish to purchase
`(music, movies, software, E-books, etc.). The consumer then
`provides the web site with standard on-line purchase infor-
`mation including the selection’s title and method of pay-
`ment, as well as their physical electronic key information.
`Transparent to the consumer, the distributor’s website links
`to the key provider’s website and transmits the physical key
`information for validation. The key provider’s web site then
`provides the distributor’s web site with the information
`required to prepare the acquired content for secure shipment
`to the consumer(or notification that the physical key was
`invalid). The key provider’s web site records the transaction
`for later billing. Finally, the distributor’s web site retrieves
`a copy of the digital content from its library, permanently
`links it to the consumer’s physical key (by using the key’s
`information to encryptit), and transmits the secured content
`to the consumer. The consumeris now free to duplicate the
`content as often as desired, and to play the content on any
`key-enabled playback device.
`
`[0046] Referring to the specifics of FIG.6, the process of
`implementing the core acquisition option of downloaded
`digital content 120 (see FIG.5) proceeds asfollows. At step
`130, a receiver/decoder circuit 140 retrieves an account
`number from a consumer’s physical key (transponder) 142
`over a secure RFlink. At step 131, the consumerenters such
`data as a password, purchase selection, and method of
`payment via the consumer’s personal computer 144. The
`data is transmitted to a content distributor’s web site 146
`
`from the consumer’s personal computer 144. At step 132,
`the content distributor’s web site 146 transmits the account
`
`number and password to a key provider’s web site 148. At
`step 133, the key provider’s web site 148 authenticates all
`data against its database 150 and,if authentic, returns such
`information as the account number, user label, number of
`users, and software encryption key to the distributor’s web
`site 146. If the data is not valid, the key provider’s website
`148 sends a message to the distributor’s web site 146
`indicating the same. A counter, used for the key provider’s
`billing purposes, is incremented. At step 134, the distribu-
`tor’s web site 146 pulls the purchased contentfile from its
`database 152, encrypts it with the software encryption keyit
`received in step 133, and builds a final key-secured content
`file that
`is then transmitted to the consumer’s personal
`computer 144. Charges are assessed based on the numberof
`users, etc. and billed to the consumer according to the
`method of payment. At step 135, invoices 154 are generated
`and sent to content distributors by the key provider’s web
`site 148 on a regular cycle.
`
`to enable content providers to offer
`[0047] Optionally,
`sample content (e.g., limiting playback to the device on
`whichthe content wasoriginally downloaded,for a specified
`period of time) a special “enhanced” version of a receiver/
`decoder circuit 140 can be produced. These enhanced
`receiver/decoder circuits (primarily for PC’s) would each
`incl