The present invention relates to a technique for restricting the transfer of data to between hosts located within the very same local area network. In particular, the present invention relates to a technique inhibiting a data transfer from a local area network to a host of a further local area network, a wide area network or a public network.
The present state of the art in digital technology allows to transfer content, i.e. movies, music, video games, software or the like, between devices of a home environment or between consumers which are connected by a public network like for instance the Internet. Unlike analogue copies which degrade with each sequential copy that is made, a digital copy of a given content remains as good as the original. The content industry is therefore looking for comprehensive copy protection facilities, which restrict the technical possibilities of copying content corresponding to legal regulations.
As digital home networks become more widespread, it is necessary to apply copy protection to content in the consumer domain. Certain types of digital network technology exist, e.g. IEE1394 with DTCP (Digital Transmission Content Protection), to provide a secure home environment for commercially valuable content in digital home networks. But such measures rely in part on the physical limitations of the underlying network technology for their acceptance. With other network technologies, e.g. those using IP (Internet Protocol), it is much more difficult to impose the usage rule of confinement to the user's home network.
One common component of a copy-protection system is network “link encryption”. In such a system, devices on a network which are to exchange copy-protected content first authenticate each other as being compliant to the link encryption system, then the content exchange is carried out on the network such that only the previously authenticated devices can usefully decrypt and use the content.
A respective copy-protection system does not completely resolve all remaining threats like e.g. the “dormitory threat”, where two users do indeed connect devices on the same IP sub-net to exchange content. It also does not prevent the “tunnel threat”, where the original network protocol is encapsulated with the same or different network protocol for the purpose of by-passing the local network restriction.
Besides putting a stop to any unauthorized redistribution of high value content, most industry as well as private users are generally interested in preventing any unauthorized data transfer beyond the limits of their trusted local domain, particularly when confidential data are concerned. As fraudulent distribution of copy-protected data is a major issue in consumer domains means are required to inhibit illegal data transfers in a consumer domain.
It is therefore an object of the present invention to provide a technique for inhibiting an unauthorized data transfer over network connections.
The above object is achieved by the invention as defined in the independent claims.
The invention includes a method for enforcing a confinement of a data transfer to devices within a private-use local area network with steps of identifying the source network address of a device providing the data on occasion of a data request, verifying that the source network address is a private-use local network address, identifying the destination network address of the device being intended for receiving the data, verifying that the destination network address is a private-use local area network address, verifying that the source network address belongs to the same private-use local area network as the destination network address, and effecting a data transfer only for all three verifications being affirmed.
The invention is further represented by a data transfer confinement software program product comprising a series of physical state elements which are adapted to be processed by a data processing means of a network node as for instance a host or other devices in a private-use local network or the like, such that a method according to present invention is implemented on the network or within devices in the network.
The above object is also achieved by a host for use in a private-use local area network, with a data providing means for providing data which transfer is to be confined to the private-use local area network the host is connected to, and a network connection parameter examination means for examining the admissibility of data transfer in correspondence to a method according to present invention.
The above object is further advantageously achieved by a private-use local area network comprising a data transfer confinement means for confining a data transfer from a first node on the network to a second node on the network according to a method of the present invention.
The invention advantageously utilises that any device connected to a private-use local area network is uniquely identifiable therein by its network address for implementing usage right and access right restrictions as well as data security policies with a minimum of technical expenditure. A data transfer path is limited to within a given private-use local area network when the data source device and the data receiving device are both connected to the same local area network.
Additional advantageous features of the present invention are claimed in the respective sub-claims.
A data transfer to a public or Wide Area Network is successfully prevented by inhibiting a data transfer when verifying that the source network address is not a private-use local area network address or that the destination network address is not a private-use local area network address. For preventing data being transferred over further local area networks or further subnets of a present local area network, a data transfer is preferably inhibited when verifying that the source network address and the destination network address belong to different networks or subnets within a local network.
To prevent any manipulation of the local network destination address in the data packets, the network connection parameters are preferably protected prior to effecting the data transfer, whereby this protection may effectively be implemented by applying a standard protection protocol like the IPsec Authentication Header protocol.
To improve systems for enforcing copy protection of data or content, the data to be transferred are advantageously checked in a first step if they require a confinement to the private-use local area network and upon a confinement not being required, the data transfer is effected without a confinement to the local area network or subnet.
In the following description, the present invention is explained in more detail with respect to special embodiments and in relation to the enclosed drawings, in which
In the representation of
As part of a copy protection system, the source device 3 and the sink devices 4 and/or 5 will establish trust to exchange the content. This may be done by way of authentication and/or a key exchange for content encryption. As shown in
Upon receiving a request for transmitting content in step S0, the source device which is defined as the device providing content to a network, first checks in step S1 that the sink device which is defined as the device receiving the respective content via a network is qualified to receive the content. If this is the case, then the content transfer is allowed to proceed. If the receiving device is not qualified to receive the content, the content transfer would not be allowed to take place and is aborted in step S4.
Copyright restrictions typically require that the right to use the content is restricted to the authorised user only. A duplication of the content within a sphere of a non-authorised user or a distribution of the content to such a user is not allowed. The content is required to remain within the domain of the authorised user. In the given case, the user's domain is represented by his personal private network, a LAN (Local Area Network) which is composed of a set of devices, owned e.g. by a given person or a household. According to the present invention, the network connection is checked in step S2 followed by step S3 verifying that both ends of the connection, the source device as well as the sink device are located within the same LAN. On a negative verification the content transmission is aborted in step S4. For positive verification the process continues with step S5 where the network connection parameters are protected against manipulation by circumvention methods and devices.
In step S6 it is checked if an encryption of the content is required and if so, the content stream is protected accordingly in step S7 before the content transmission is finally started in step S8. If no encryption is required, the process proceeds directly from step S6 to step S8.
It is to be noted that the procedure described above is only applied to data which transfer is to be confined to within a local area network. Therefore the data to be transferred are checked beforehand in a first step if they require a confinement to the local area network.
If no respective confinement of the data to the local area network is required, the data transfer is effected without a confinement to the local network.
A more detailed representation of a method according to the present invention is given in
What has been described above with reference to
As also the destination address, i.e. the network address of the sink device in the local area network, must be permissible, step S2-2 checks next, if it is in the private range. If the destination address is not in the private range, the data transmission is aborted in step S2-6.
For a unicast data transmission, the destination address must be in the same network or subnet as the local source address. Step S2-3 therefore checks if the local source address and the destination address are in the same network or subnet. If not, the data transmission is aborted in step S2-6. Broadcast and multicast data transmissions which include destinations outside the local home network and which will pass step S2-2 are now being confined to destination addresses within the network hosting the source device.
Before proceeding with further processes required to accomplish the data transfer in step S2-5, step S24 applies the IPsec Authentication Header protocol to prevent manipulation of local source and destination IP addresses. The IPsec Authentication Header protocol is described in “IETF RFC 2402, IP Authentication Header, November 1998”, and hereby included by reference.
An application of the present invention to an IPv6 home network is illustrated in
The representation of
The procedure starts with step S3-0 when a sink device requests data like for instance a content stream from a source device. First it is checked in step S3-1, if the local source address is in the link-local or site local unicast address range. If not, the data transmission is aborted in step S3-6. Else, the procedure continues with step S3-2, where the destination address is checked for being a link-local or a site-local address as this is required for a unicast transmission. A multicast transmission may be allowed within the local network, e.g. to a different subnet. If the destination address turns out to be of a different type, the data transmission is then aborted in step S3-6. Else, the next step S3-3 checks whether both, the source local and the destination address belong to the same subnet. This step may be bypassed for a multicast transmission. If they don't, the data transmission is subsequently aborted in step S3-6. Else, a manipulation of local source and destination address IP addresses may be prevented in step S34 by applying an IPsec Authentication Header protocol before the data transfer is continued in step S3-5.
Number | Date | Country | Kind |
---|---|---|---|
03011343.5 | May 2003 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP04/04916 | 5/7/2004 | WO | 11/17/2005 |