DEVICE-INDEPENDENT MANAGEMENT OF CRYPTOGRAPHIC INFORMATION

Abstract
Some embodiments provide an account-based DRM system for distributing content. The system includes several devices that are associated with one particular account. The system also includes a set of DRM computers that receives a request to access a particular piece of content on the devices associated with the particular account. The DRM computer set then generates a several keys for the devices, where each particular key of each particular device allows the particular device to access the particular piece of content on the particular device. Through a network, the DRM computer set of some embodiments sends the particular piece of content and the generated keys to the devices associated with the particular account. The network is a local area network, a wide area network, or a network of networks, such as the Internet. In some of these embodiments, the DRM computer set sends the content and keys to one device (e.g., a computer), which is used to distribute the content and the key(s) to the other devices associated with the account. In some embodiments, the DRM computer set individually encrypts each key in a format that is used during its transport to its associated device and during its use on this device.
Description
FIELD OF THE INVENTION

The invention relates to device-independent management of cryptographic information.


BACKGROUND OF THE INVENTION

The protection of digital content transferred between computers over a network is fundamentally important for many enterprises today. Enterprises attempt to secure this protection by implementing some form of Digital Rights Management (DRM) process. The DRM process often involves encrypting the piece of content (e.g., encrypting the binary form of the content) to restrict usage to those who have been granted a right to the content.


Cryptography is the traditional method of protecting data in transit across a network. In its typical application, cryptography protects communications between two mutually trusting parties from thievery by attack on the data in transit. However, for many digital file transfer applications today (e.g., for the transfer of audio or video content), the paradigm has shifted, as a party that receives the content (i.e. the “receiving party”) might try to break the DRM encryption that the party that supplied the content (i.e., the “distributing party”) applied to the content. In addition, with the proliferation of network penetration attacks, a third party may obtain access to the receiving party's computer and thus to the protected content.


In many of the DRM systems today, the weakest link in the security is not the encrypted data but rather the cryptographic key management and handling. For instance, one of the more successful DRM systems, which distribute music online, requires the receiving party's computer to maintain the unencrypted key for each piece of encrypted music in a “Keybag” that is encrypted.


This approach has two disadvantages. First, by encrypting the Keybag instead of the keys contained in the Keybag, this approach exposes the keys to a potential attack at different instances in time. For instance, each time the receiving party's computer has to store a new key for a piece of content, the computer has to decrypt the entire Keybag, add the new key to the Keybag, and then re-encrypt the Keybag. Similarly, to play a piece of content, the receiving party's computer has to decrypt the entire Keybag, retrieve the key for the piece of content, and decrypt the content with the retrieved key. In either of these situations, all the keys are exposed to a potential attacker when the Keybag is decrypted.


Second, this prior DRM approach allows different devices to use different formats for their Keybags. For instance, it allows a receiving party's computer to use a different Keybag format than a music player to which the computer downloads its music. The use of different Keybag formats for different devices further exposes the keys for decrypting the content that is transferred between the devices. For instance, when the receiving party synchronizes the music player's music library with that of the computer, the computer has to decrypt its Keybag and transfer the synchronized content and its associated keys to the music player. The music player then stores the received content in a storage device, and stores the received keys in the player's particular format in the player's Keybag. During this transfer, all the keys are exposed to a potential attacker.


Therefore, there is a need in the art for a DRM system that minimizes the exposure of cryptographic keys at various stages of the DRM process. Such a system should minimize exposure during the local storage of the cryptographic keys on the devices that will use such keys to decrypt and access content. This system should also minimize exposure of the cryptographic key while the encrypted content is being access by a receiving device. This system should further minimize exposure of the cryptographic keys while the receiving party is transferring content between two devices.


SUMMARY OF THE INVENTION

Some embodiments provide an account-based DRM system for distributing content. The system includes several devices that are associated with one particular account. The system also includes a set of DRM computers that receives a request to access a particular piece of content on the devices associated with the particular account. The DRM computer set then generates a several keys for the devices, where each particular key of each particular device allows the particular device to access the particular piece of content on the particular device.


Through a network, the DRM computer set of some embodiments sends the particular piece of content and the generated keys to the devices associated with the particular account. The network is a local area network, a wide area network, or a network of networks, such as the Internet. In some of these embodiments, the DRM computer set sends the content and keys to one device (e.g., a computer), which is used to distribute the content and the key(s) to the other devices associated with the account. In some embodiments, the DRM computer set individually encrypts each key in a format that is used during its transport to its associated device and during its use on this device.


Some embodiments provide a digital rights management (DRM) method for distributing a piece of content to a user. The user has at least two devices for accessing the content. The method sends to the user the piece of content in a protected format. From a set of DRM computers, the method also sends to the user (1) a first key that enables the user to access the protected content on the first device, and (2) a second key that enables the user to access the protected content on the second device.


In some embodiments, the first and second keys are for decrypting the piece of content. In other embodiments, the first and second keys are for decrypting another key or other keys that are used to encrypt the piece of content. The method in some embodiments individually encrypts the first and second keys before sending them to the first and second devices.


Also, in some embodiments, the first device is a user computer and the second device is another device (e.g., portable media player) that synchronizes its content with the user computer. In some of these embodiments, the user computer (1) receives the piece of content and the first and second keys, and (2) provides the received content as well as the second key to the second device subsequently when the second device synchronizes its content with the user computer. In some embodiments, the user computer provides to the second device the content and the second key in the same protected format that it received the content and the second key.


Before sending the content and the keys to the user, the method in some embodiments (1) receives a request from the user to obtain the piece of content, and (2) generates the first and second keys at the set of DRM computers. In some embodiments, the user has more than two devices for accessing the content. In some such embodiments, the method generates at the DRM computer set more than two keys for the user after receiving the user's request for the content. In such a case, each particular generated key is to enable the user to access the content on a particular device associated with the user.


Also, in some of these embodiments, the method individually encrypts each generated key in a format that is used during its transport to its associated device, and during its storage and use on this device. The transport, storage, or usage of any key in these embodiments does not require the decryption of another key that the DRM computer set generates for other devices or contents.


In some embodiments, the first device stores its encrypted keys for decrypting DRM content in a first Keybag, while the second device stores the encrypted keys for decrypting DRM content in a second Keybag. The first and second Keybags have the same format in some embodiments. Using Keybags with the same format minimizes exposure of keys during the transfer of content and keys between the first and second devices, when one of these devices synchronizes its content and keys with the other device. The exposure is minimized because it eliminates operations that are due to transforming data between two different Keybag formats. In some embodiments, the first and second devices encrypt their respective Keybags, while in other embodiments they do not encrypt their respective Keybags but only store individually encrypted keys in those Keybags.


The DRM computer set of some embodiments also sends other DRM material along with the cryptographic keys. Such other DRM data include in some embodiments data relating to the DRM system, such as the DRM type, rules, etc. The other DRM material also includes in some embodiments data relating to the cryptographic key (e.g., the nature of the key, etc.). Other embodiments might include other types of DRM material.




BRIEF DESCRIPTION OF THE DRAWINGS

The novel features of the invention are set forth in the appended claims. However, for purpose of explanation, several embodiments are set forth in the following figures.



FIG. 1 illustrates an account-based DRM system of some embodiments.



FIG. 2 illustrates an example of a transport Keybag for a user computer.



FIG. 3 illustrates a transport Keybag that includes all the cryptographic keys that a device M might receive from the user computer during a synchronization operation.



FIG. 4 illustrates that in some embodiments the cryptographic key that is used to access a particular piece of content on a particular device (1) is generated and stored on the DRM server set, and (2) is stored on the particular device.



FIG. 5 conceptually illustrates a process that the DRM server set performs to process a request from a user account to purchase or license a particular piece of content.



FIG. 6 conceptually illustrates a process that the DRM server set performs in some embodiments when it detects that a new device is being added to a user account.



FIG. 7 conceptually illustrates a process that a user computer performs when it needs to purchase or license a particular piece of content for a particular user account.




DETAILED DESCRIPTION OF THE INVENTION

In the following description, numerous details are set forth for the purpose of explanation. However, one of ordinary skill in the art will realize that the invention may be practiced without the use of these specific details. In other instances, well-known structures and devices are shown in block diagram form in order not to obscure the description of the invention with unnecessary detail.


I. Overview


Some embodiments provide a digital rights management (DRM) method for distributing a piece of content to a user. The user has at least two devices for accessing the content. The method sends to the user the piece of content in a protected format. From a set of DRM computers, the method also sends to the user (1) a first key that enables the user to access the protected content on the first device, and (2) a second key that enables the user to access the protected content on the second device.


In some embodiments, the first and second keys are for decrypting the piece of content. In other embodiments, the first and second keys are for decrypting another key or other keys that are used to encrypt the piece of content. The method in some embodiments individually encrypts the first and second keys before sending them to the first and second devices.


Also, in some embodiments, the first device is a user computer and the second device is another device (e.g., portable media player) that synchronizes its content with the user computer. In some of these embodiments, the user computer (1) receives the piece of content and the first and second keys, and (2) provides the received content as well as the second key to the second device subsequently when the second device synchronizes its content with the user computer. In some embodiments, the user computer provides to the second device the content and the second key in the same protected format that it received the content and the second key.


Before sending the content and the keys to the user, the method in some embodiments (1) receives a request from the user to obtain the piece of content, and (2) generates the first and second keys at the set of DRM computers. In some embodiments, the user has more than two devices for accessing the content. In some such embodiments, the method generates at the DRM computer set more than two keys for the user after receiving the user's request for the content. In such a case, each particular generated key is to enable the user to access the content on a particular device associated with the user.


Also, in some of these embodiments, the method individually encrypts each generated key in a format that is used during its transport to its associated device, and during its storage and use on this device. The transport, storage, or usage of any key in these embodiments does not require the decryption of another key that the DRM computer set generates for other devices or contents.


In some embodiments, the first device stores its encrypted keys for decrypting DRM content in a first Keybag, while the second device stores the encrypted keys for decrypting DRM content in a second Keybag. The first and second Keybags have the same format in some embodiments. Using Keybags with the same format minimizes exposure of keys during the transfer of content and keys between the first and second devices, when one of these devices synchronizes its content and keys with the other device. The exposure is minimized because it eliminates operations that are due to transforming data between two different Keybag formats. In some embodiments, the first and second devices encrypt their respective Keybags, while in other embodiments they do not encrypt their respective Keybags but only store individually encrypted keys in those Keybags.


The DRM computer set of some embodiments sends other DRM material along with the cryptographic keys. Such other DRM data include in some embodiments data relating to the DRM system, such as the DRM type, rules, etc. The other DRM material also includes in some embodiments data relating to the cryptographic key (e.g., the nature of the key, etc.). Other embodiments might include other types of DRM material.


II. Account-Based DRM System



FIG. 1 illustrates an account-based DRM system 100 of some embodiments. This DRM system distributes content in a manner that ensures the legal use of the content. As shown in FIG. 1, the DRM system 100 includes a set of DRM servers 110 that distribute content to several devices associated with B user accounts. This figure illustrates two sets of devices associated with two accounts, account 1 and account B. The set of devices for account 1 includes a user computer 115 and several portable media device 130. In the example illustrated in FIG. 1, the devices for the two different user accounts are mutually exclusive. This might not be the case in some embodiments. Some embodiments might allow one device (e.g., one user computer, etc.) to process DRM content for two different user accounts.


The DRM server set 110 connects to the user computers 115 and 120 through a computer network 125, such as a local area network, a wide area network, a network of networks (e.g., the Internet), etc. Through this connection, the user computers 115 and 120 communicate with the DRM server set 110 to purchase, license, update, or otherwise obtain content in some embodiments. While in some embodiments, the DRM server set 110 sells or licenses content to the user computers, this set in other embodiments does not sell or license the content. For instance, in some of embodiments, the DRM server set 110 simply enforces the distribution of content to authorized computers without having any financial objective.


In some embodiments, the DRM server set 110 includes a content caching server that provides encrypted content to a user computer 115 or 120 through the network 125, after another DRM server 110 determines that the computer 115 or 120 can obtain the content. In some embodiments, the system 100 uses multiple caching servers to cache content at various locations on the network, in order to improve the speed and efficiency of downloading content across the network.


As mentioned above, a user computer 115 or 120 that is associated with a particular account communicates with the DRM server set 110 to purchase, license, update, or otherwise obtain content through the network 125 for the particular account. In some embodiments, the DRM server set 110 (1) supplies each requested piece of content in an encrypted format, and (2) for each device associated with the requesting account, supplies a cryptographic key for decrypting the encrypted content.



FIG. 1 illustrates an example of the DRM server set 110 distributing one piece of encrypted content (content W) to the devices associated with the two different user accounts 1 and B. As shown in this figure, the DRM server set distributes the encrypted content W to both user computers 115 and 120, along with a set of cryptographic keys for accessing this content on each device associated with the user accounts 1 and B.


The DRM server set distributes the content W and each set of cryptographic keys in an encrypted format. Also, in some embodiments, each cryptographic key in the set is encrypted individually. The DRM server set 110 of some embodiments provides the cryptographic key set in a transport Keybag. A Keybag is a data storage structure that stores the cryptographic keys according to a particular format. The transport Keybag is encrypted in its entirety for the transport in some embodiments, while it is not encrypted for the transport in other embodiments.



FIG. 2 illustrates an example of such a transport Keybag 205 for the user computer 120. As shown in this figure, the user computer 120 extracts each individually encrypted key from the transport Keybag 205 and stores these keys in a Keybag 210 that it maintains. The keys in the Keybag 210 are the same as the keys in the Keybag 205 (i.e., they are individually encrypted in the same format as they appear in Keybag 205). Also, the Keybags 205 and 210 are encrypted in their entirety in some embodiments, while they are not encrypted in other embodiments.



FIG. 1 illustrates that each user computer 115 or 120 stores the received encrypted content W and the cryptographic key that it receives for accessing this content. Each user computer 115 or 120 also provides each portable media device 130 that synchronizes with it the received encrypted content W and the cryptographic key that the user computer received for the portable media device.


For instance, as shown in FIG. 1, the user computer 115 provides to device 2 for account 1 the received encrypted content W plus the cryptographic key for accessing the encrypted content W on device 2. The user computer 120, on the other hand, provides to device Z for account B the received encrypted content W plus the cryptographic key for accessing the encrypted content W on device Z.


In some embodiments, each user computer deletes a cryptographic key that it provides to another device after the synchronization operation, while in other embodiments, each user computer continues to store the cryptographic keys that it provides to devices that synchronize their content with the computer.


In some embodiments, each synchronizing device stores in a Keybag the cryptographic keys that it receives from its associated user computer. FIG. 3 illustrates an example of this for one of the device (device M) associated with the account B. Specifically, this figure illustrates a transport Keybag 305 that includes all the cryptographic keys that a device M might receive from the user computer 120 during a synchronization operation. As shown in this figure, the device M extracts each individually encrypted key from the transport Keybag 305 and stores these keys in a Keybag 310 it maintains. The keys in the Keybag 310 are the same as the keys in the Keybag 305 (i.e., they are individually encrypted in the same format as they appear in Keybag 305). Also, the Keybags 305 and 310 are encrypted in their entirety in some embodiments, while they are not encrypted in other embodiments.


In some embodiments, the Keybags 205, 210, 305, and 310 all have the same format. Using Keybags with the same format minimizes exposure of keys during the transfer of the cryptographic keys between the DRM server set, user computers, and the other devices associated with the accounts. The exposure is minimized because using the same format eliminates operations that are due to transforming data between two different Keybag formats. Also, individually encrypting each key has the advantage that a device can decrypt and use any encrypted key for a particular piece of content, without decrypting another encrypting key, which the device does not need for the particular piece of content.



FIG. 4 illustrates that in some embodiments the cryptographic key that is used to access a particular piece of content on a particular device (1) is generated and stored on the DRM server set, and (2) is stored on the particular device. Specifically, this figure illustrates a DRM architecture where the DRM server set 110 generates and stores the cryptographic keys for each piece of content that this set directly or indirectly distributes to each device associated with each user account. This figure also illustrates that the user computers 115 and 120 that initially receive the DRM content for each account store at least the cryptographic key for accessing each piece of content on the user computers. As mentioned above, each user computer in some embodiments also stores the cryptographic key for accessing the received content on each device that synchronizes with the computer.



FIG. 4 also illustrates that each device stores the cryptographic keys for accessing each piece of content that it is allowed to access. In some embodiments, each cryptographic key generated by the DRM server set for a particular device is for decrypting a piece of content on the particular device. In other embodiments, each such key is for decrypting another key or other keys that the particular device uses to decrypt content.



FIGS. 1 and 4 illustrate user computers 115 and 120 that receive content and cryptographic keys from the DRM server set and synchronize the content and cryptographic keys with other devices associated with accounts 1 and B. One of ordinary skill will realize that some embodiments might have multiple devices (e.g., computers, portable electronic or communication devices, etc.) that directly receive content from the DRM server set 110 through a communication network. Also, one of ordinary skill will realize that the user computer 115 or 120 can be embedded in any type of device, such as a consumer or commercial electronic device, a home media center or hub, etc.


As mentioned above, the DRM server set of some embodiments sends other DRM material along with the cryptographic keys. Such other DRM data include in some embodiments data relating to the DRM system, such as the DRM type, rules, etc. The other DRM material also includes in some embodiments data relating to the cryptographic key (e.g., the nature of the key, etc.). Other embodiments might include other types of DRM material.


III. Key Generation and Distribution Flow



FIGS. 5-7 conceptually illustrate several processes for generating keys and distributing content and keys in some embodiments. These processes are described in the context of a purchase or a license of a particular piece of content. One of ordinary skill will realize that these processes can be performed without any of the financial objective or transactions in other embodiments.



FIG. 5 conceptually illustrates a process 500 that the DRM server set performs to process a request from a user account to purchase or license a particular piece of content. The content may be any form of content, such as a music file, a video file, a document, an image, etc. As shown in this figure, the process 500 starts when it receives (at 505) a request for the particular content from a user computer that synchronizes all the keys and content for a particular user account.


The process then performs (at 510) a set of one or more operations to complete the purchase or license transaction. Next, the process identifies (at 515) all the devices associated with the particular user account. At 520, the process then generates a cryptographic key for each device associated with the particular user account. The cryptographic key for each particular device is the key that would allow the particular device to access an encrypted version of the particular piece of content.


At 525, the process then stores each cryptographic key that it generated at 520. Next, at 530, the process individually encrypts each key that it generated at 520. At 530, the process also stores the individually encrypted keys in a Keybag. In some embodiments, the process 500 first performs the encryption operation at 530 and then performs the storage operation at 525. At 535, the process sends the Keybag produced at 530 to the user computer, and then ends. Along with the Keybag or within the Keybag, the process in some embodiments sends (at 535) other DRM material, as discussed above.



FIG. 6 conceptually illustrates a process 600 that the DRM server set performs in some embodiments when it detects that a new device is being added to a user account. As shown in this figure, the process 600 starts (at 605) when it detects that a new device is being added to a user account. The process can detect this when a new user account is being initially set up or it can detect this when a user computer attempts to synchronize content with a new device.


At 610, the process determines whether a new device can be added to the user account. In some embodiments, this determination involves a determination whether a maximum number of devices had already been added to the user account. If the process determines (at 610) that the device cannot be added, the process ends without adding the device to the user account.


Otherwise, the process identifies (at 615) all the content that was previously purchased or licensed for the user account. For each piece of previously purchased or licensed content, the process then generates (at 620) a key for new device. The process then stores (at 625) each generated key. Next, the process individually encrypts (at 630) each key that it generated at 620. In some embodiments, the process 600 first encrypts each key and then stores the encrypted keys (i.e., first performs the encryption operation at 630 and then performs the storage operation at 625).


At 630, the process then stores the individually encrypted keys in a transport Keybag, which it then sends (at 635) to the user computer associated with the new device. Along with the Keybag or within the Keybag, the process in some embodiments sends (at 635) other DRM material, as discussed above. After 635, the process ends.



FIG. 7 conceptually illustrates a process 700 that a user computer performs when it needs to purchase or license a particular piece of content for a particular user account. As shown in this figure, the process starts (at 705) when the user computer sends a request to the DRM server set to purchase or license a particular piece of content for the particular user account. Next, at 710, the process performs one or more operations to complete the purchase or license transaction.


At 715, the process then receives the requested piece of content in an encrypted format, plus a transport Keybag that includes a cryptographic key for each device that is associated with the particular user account and that can access the encrypted content. In some embodiments, the cryptographic keys are individually encrypted in the transport Keybag.


At 720, the process extracts the cryptographic keys from the transport Keybag and stores these keys in a Keybag of the user computer. The transport Keybag and the computer Keybag have the same format in some embodiments. The process also flags (at 720) a record that it keeps for each particular synchronizing device associated with the particular user account. This flagging is to notify the user computer on the next synchronization with the particular device that the user computer needs to download newly received encrypted content and cryptographic key(s) to the particular device. After 720, the process ends.


IV. Encryption


As described above, several embodiments of the invention provide DRM processes and systems for distributing content. These processes and systems encrypt and decrypt content based on cryptographic keys. Encrypting content entails transforming the content from a decipherable form (called plaintext) into an indecipherable form (called ciphertext) based on one or more cryptographic keys. Decrypting content entails transforming encrypted content into a decipherable from by using one or more cryptographic keys.


An encryption key is a piece of information that controls the operation of a cryptography algorithm. In symmetrical encryption technology, the key that is used to encrypt content is the same key that is used to decrypt content. In asymmetric encryption technology, the same key is not used to encrypt and decrypt the content. For instance, in one scheme, an encrypting device uses a public key of a recipient to encrypt content, and the recipient uses its private key to decrypt the encrypted content.


Many of the features of the embodiments described above can be implemented according to a symmetrical or asymmetrical encryption approach. Also, in some embodiments, the encryption is applied to a binary format of the content. Although the unencrypted binary format of a piece of content may be hard for a human to decipher, it can be deciphered by an application or an operating system. On the other hand, encrypted binary format of a piece of content ideally should not be deciphered by any application or operating system, without first being decrypted by using one or more cryptographic keys.


While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. For instance, several embodiments described above illustrate the portable devices as devices that only receive DRM content through their synchronization with other user computers. One of ordinary skill will understand, however, that in some embodiments the portable players might directly access the DRM server(s) through a network, in order to obtain DRM content without interfacing with another intermediary computer that can obtain and access the DRM content. Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.

Claims
  • 1. A digital rights management (DRM) method for distributing a piece of content to a user, said user having first and second devices for accessing the content, the method comprising: a) sending to the user the piece of content in a protected format; b) from a set of DRM computers, sending to the user a first key that enables the user to access the protected content on the first device; c) from the set of DRM computers, sending to the user a second key that enables the user to access the protected content on the second device.
  • 2. The method of claim 1, wherein the first and second keys are for decrypting the piece of content.
  • 3. The method of claim 1, wherein each of the first and second keys is for decrypting a key that was used to encrypt the content.
  • 4. The method of claim 1, wherein the first device is a user computer and the second device is a portable media player that synchronizes with the user computer.
  • 5. The method of claim 1, wherein the first and second devices are devices that synchronize content and keys with a user computer that receives content and keys from the DRM computer set.
  • 6. The method of claim 5, wherein the first and second keys are individually encrypted before being sent, said first and second keys being stored separately in a Keybag on the user computer.
  • 7. The method of claim 1 further comprising: a) receiving a request to obtain the piece of content from the user; b) generating said first and second keys at the set of DRM computers.
  • 8. The method of claim 7, wherein a plurality of devices are associated with the user, wherein generating the first and second keys comprises generating, at the set of DRM computers, a key for each device associated with the user.
  • 9. The method of claim 7 further comprising encrypting each generated key separately before sending the encrypted key to the user.
  • 10. The method of claim 1, wherein the DRM computer set sends first and second DRM data sets along with the first and second keys.
  • 11. The method of claim 10, wherein said DRM data sets include data regarding the first and second keys.
  • 12. The method of claim 10, wherein said DRM data sets include data regarding the DRM method.
  • 13. A digital rights management (DRM) system for distributing content, the system comprising: a) a plurality of devices associated with one account; b) a set of DRM computers for receiving a request to access a particular piece of content on the devices associated with the account, and for generating a plurality of keys—for said devices, wherein each particular key of each particular device allows the particular device to access the particular piece of content on the particular device.
  • 14. The system of claim 13, wherein the keys are for decrypting the piece of content.
  • 15. The system of claim 13, wherein each generated key is for decrypting a key that was used to encrypt the content.
  • 16. The system of claim 13, wherein one device is a user computer and another device is a portable media player that synchronizes with the user computer.
  • 17. The system of claim 13, wherein the DRM computer set communicatively connects to the devices through a network, wherein the DRM computer set sends the generated keys to the devices through the network.
  • 18. The system of claim 17, wherein the DRM computer set individually encrypts the keys before sending the keys to the devices.
  • 19. The system of claim 13, wherein the network is a worldwide network of networks.
  • 20. The system of claim 13, wherein one device connects to at least one of the other devices, receives the key for the other device from the DRM computer set, and supplies the key for the other device to the other device.
  • 21. A digital rights management (DRM) method for distributing a particular piece of content to a plurality of users, the method comprising: a) generating a first set of keys and a second set of keys at a DRM computer; b) through a network, sending the first set of keys to a first user and the second set of keys to a second user; c) accessing the particular piece of content on first and second sets of devices associated with first and second users, wherein each particular device of each particular user uses at least one key in the set of keys for the particular user to access the particular piece of content.
  • 22. A method comprising: a) defining a plurality of keys for accessing a piece of content on a plurality of related devices; and b) providing the generated keys.
  • 23. The method of claim 22, wherein the related devices are devices related to one user.
  • 24. The method of claim 22, wherein providing the generated keys comprises providing the keys in one data storage structure.
  • 25. The method of claim 22, wherein each particular key is for accessing the piece of content in a particular device.
  • 26. The method of claim 22 further comprising individually encrypting each key in the plurality of keys for accessing the piece of content on the plurality of related devices.
  • 27. The method of claim 22, wherein defining the plurality of keys comprises generating a first key for accessing the piece of content on a first device and a second key for accessing the piece of content on a second device.
  • 28. The method of claim 27, wherein the first device is a computer and the second device a media player.
  • 29. A method comprising: a) receiving a request for a piece of content; and b) supplying the piece of content along with a first key for accessing the piece of content on a first device and a second key for accessing the piece of content on a second device.
  • 30. The method of claim 29, wherein the first and second devices are devices associated with a user that requested the piece of content.
  • 31. The method of claim 29, wherein supplying the piece of content and keys comprises supplying the keys in one data storage structure for transport.
  • 32. The method of claim 31, wherein each key is individually encrypted in the data storage structure.
  • 33. A computer readable medium storing a program for execution, the program comprising sets of instructions for: a) defining a plurality of keys for accessing a piece of content on a plurality of related devices; and b) providing the generated keys.
  • 34. The computer readable medium of claim 33, wherein the related devices are devices related to one user.
  • 35. The computer readable medium of claim 33, wherein the set of instructions for providing the generated keys comprises a set of instructions for providing the keys in one data storage structure.
  • 36. The computer readable medium of claim 33, wherein each particular key is for accessing the piece of content in a particular device.
  • 37. The computer readable medium of claim 33, wherein the program further comprises a set of instructions for individually encrypting the plurality of keys for accessing the piece of content on the plurality of related devices.
  • 38. The computer readable medium of claim 37, wherein the set of instructions for providing the individually encrypted keys comprises a set of instructions for providing the keys in a transport keybag.
  • 39. A method comprising: a) requesting a piece of content; and b) receiving (i) the piece of content, (ii) a first key for accessing the piece of content on a first device, and (iii) a second key for accessing the piece of content on a second device.
  • 40. The method of claim 39, wherein the first and second devices are devices associated with a user that requested the piece of content.
  • 41. The method of claim 39, wherein receiving the piece of content and keys comprises receiving the keys in one data storage structure for transport.
  • 42. The method of claim 41, wherein each key is individually encrypted in the data storage structure.
  • 43. The method of claim 42 further comprising extracting the encrypted keys from the data storage structure.
  • 44. The method of claim 42, wherein the first device receives the piece of content and keys, the method further comprising: a) extracting the first encrypted key from the data storage structure; and b) storing the extracted first key on a storage of the first device in the same format that the first encrypted key was stored in the data storage structure.
  • 45. The method of claim 44 further comprising: a) extracting the second key from the data storage structure; and b) supplying the extracted second encrypted key to the second device.
  • 46. A readable storage medium storing a program for execution, the program comprising sets of instructions for: a) requesting a piece of content; and b) receiving (i) the piece of content, (ii) a first key for accessing the piece of content on a first device, and (iii) a second key for accessing the piece of content on a second device.
  • 47. The readable storage medium of claim 46, wherein the first and second devices are devices associated with a user that requested the piece of content.
  • 48. The readable storage medium of claim 46, wherein the set of instructions for receiving the piece of content and keys comprises a set of instructions for receiving the keys in one data storage structure for transport.
  • 49. The readable storage medium of claim 48, wherein each key is individually encrypted in the data storage structure.
  • 50. The readable storage medium of claim 49, wherein the program further comprises a set of instructions for extracting the encrypted keys from the data storage structure.
  • 51. The readable storage medium of claim 49, wherein the first device receives the piece of content and keys, wherein the program further comprises sets of instructions for: a) extracting the first encrypted key from the data storage structure; and b) storing the extracted first encrypted key on a storage of the first device in the same format that the first encrypted key was stored in the data storage structure.
  • 52. The readable storage medium of claim 51, wherein the program further comprises sets of instructions for: a) extracting the second encrypted key from the data storage structure; and b) supplying the extracted second encrypted key to the second device.
  • 53. A method comprising: a) at a first device, receiving a piece of content, a first key for accessing the piece of content on the first device, and a second key for accessing the piece of content on a second device; b) storing the piece of content and the first key on the first device; and c) supplying the piece of content and the second key to the second device.
  • 54. A method comprising: a) receiving a piece of content; b) receiving a first key for accessing the piece of content on a first device; c) receiving a second key for accessing the piece of content on a second device; d) supplying the piece of content and the first key to the first device; and e) supplying the piece of content and the second key to the second device.
  • 55. The method of claim 54, wherein the first and second devices are devices associated with a user that requested the piece of content, wherein a third device receives the piece of content and supplies the piece of content and the keys to the first and second devices.
  • 56. The method of claim 55, wherein the first and second devices are media players while the third device is a computer.
  • 57. The method of claim 54, wherein receiving the keys comprises receiving both keys in one data storage structure for transport.
  • 58. The method of claim 57, wherein each key is individually encrypted in the data storage structure.
  • 59. The method of claim 54 further comprising: before supplying the content and keys to the devices, specifying the devices as two devices that need to receive the piece of content and their associated keys.
  • 60. The method of claim 54, wherein the first and second keys are encrypted when received, the method further comprising supplying first and second keys respectively to first and second devices in the same encrypted format that the key is received.
  • 61. The method of claim 60, wherein receiving the keys comprises receiving both keys in a first data storage structure, wherein supplying the first and second keys comprises supplying the first and second keys respectively in second and third data storage structures with the same format as the first data storage structure.
  • 62. A readable storage medium storing a program for execution, the program comprising sets of instructions for: a) receiving a piece of content, a first key for accessing the piece of content on the first device, and a second key for accessing the piece of content on a second device; b) storing the piece of content and the first key on the first device; and c) supplying the piece of content and the second key to the second device.
  • 63. A readable storage medium storing a program for execution, the program comprising sets of instructions for: a) receiving a piece of content; b) receiving a first key for accessing the piece of content on a first device; c) receiving a second key for accessing the piece of content on a second device; d) supplying the piece of content and the first key to the first device; and e) supplying the piece of content and the second key to the second device.
  • 64. The readable storage medium of claim 63, wherein the first and second devices are devices associated with a user that requested the piece of content, wherein a third device receives the piece of content and supplies the piece of content and the keys to the first and second devices.
  • 65. The readable storage medium of claim 64, wherein the first and second devices are media players while the third device is a computer.
  • 66. The readable storage medium of claim 63, wherein the set of instructions for receiving the keys comprises a set of instructions for receiving both keys in one data storage structure for transport.
  • 67. The readable storage medium of claim 66, wherein each key is individually encrypted in the data storage structure.
  • 68. A method comprising: a) individually encrypting a plurality of keys for accessing a piece of content on a plurality of related devices; and b) providing the individually encrypted keys together.
  • 69. The method of claim 68, wherein each particular key is for accessing the piece of content in a particular device.
  • 70. The method of claim 68, wherein providing the individually encrypted keys together comprises providing the keys in a transport keybag.
  • 71. The method of claim 70, wherein the transport keybag is not encrypted.
  • 72. The method of claim 70, wherein the transport keybag is encrypted.
  • 73. The method of claim 70, wherein the transport keybag has a format similar to a format of a keybag used by a particular device to store a key that is provided for the particular device.
  • 74. A computer readable medium storing a program for execution, the program comprising sets of instructions for: a) individually encrypting a plurality of keys for accessing a piece of content on a plurality of related devices; and b) providing the individually encrypted keys together.
  • 75. The computer readable medium of claim 74, wherein each particular key is for accessing the piece of content in a particular device.
  • 76. The computer readable medium of claim 74, wherein the set of instructions for providing the individually encrypted keys together comprises a set of instructions for providing the keys in a transport keybag.
  • 77. The computer readable medium of claim 76, wherein the transport keybag is not encrypted.
  • 78. The computer readable medium of claim 76, wherein the transport keybag is encrypted.
  • 79. The computer readable medium of claim 76, wherein the transport keybag has a format similar to a format of a keybag used by a particular device to store a key that is provided for the particular device.
  • 80. A method comprising: a) receiving an encrypted key in a data storage structure, the encrypted key for accessing a piece of content on a device; and b) storing the encrypted key on the device in the same format that the encrypted key was stored in the data storage structure.
  • 81. The method of claim 80 further comprising extracting the encrypted key from the data storage structure.
  • 82. A readable storage medium storing a program for execution, the program comprising sets of instructions for: a) receiving an encrypted key in a data storage structure, the encrypted key for accessing a piece of content on a device; and b) storing the encrypted key on the device in the same format that the encrypted key was stored in the data storage structure.
  • 83. The readable storage medium of claim 82, wherein the program further comprises a set of instructions for extracting the encrypted key from the data storage structure.
  • 84. The readable storage medium of claim 82, wherein the set of instructions for receiving the encrypted key comprises a set of instructions for receiving a plurality of individually encrypted keys in the data storage structure, each different encrypted key for accessing the piece of content on a different device.
  • 85. The readable storage medium of claim 84, wherein the plurality of devices comprise at least first and second devices, wherein the plurality of keys comprises first and second keys, wherein the first device receives the plurality of keys and stores the first key in a storage of the first device, wherein the program further comprises a set of instructions for providing the second key to the second device.
  • 86. The readable storage medium of claim 85, wherein the first device is a computer and the second device a media player.
  • 87. The readable storage medium of claim 84, wherein the program further comprises sets of instructions for: a) receiving the piece of content; b) providing the piece of content to at least one of the different devices; and c) providing at least one of the received keys to a device to which the piece of content is provided.
  • 88. A method comprising: a) receiving a first set of content; b) receiving a first data storage structure comprising a plurality of keys for accessing pieces of content in the first set on a device; and c) storing the plurality of keys in a second data storage structure of the device, the second data storage structure having a format that is similar to the format of the first data storage structure.
  • 89. A method comprising: a) receiving a first set of content; b) receiving a first data storage structure comprising a plurality of individually encrypted keys for accessing pieces of content in the first set on a device; and c) in a second data storage structure of the device, storing each key in the individually encrypted format of the first data storage structure.
  • 90. A readable storage medium storing a program for execution, the program comprising sets of instructions for: a) receiving a first set of content; b) receiving a first data storage structure comprising a plurality of keys for accessing pieces of content in the first set on a device; and c) storing the plurality of keys in a second data storage structure of the device, said second data storage structure having a format that is similar to the format of the first data storage structure.
  • 91. A readable storage medium storing a program for execution, the program comprising sets of instructions for: a) receiving a first set of content; b) receiving a first data storage structure comprising a plurality of individually encrypted keys for accessing pieces of content in the first set on a device; and c) in a second data storage structure of the device, storing each key in the individually encrypted format of the first data storage structure.
  • 92. A media player comprising a readable storage storing a plurality of pieces of content and a data storage structure for storing individually encrypted keys, each particular individually encrypted key for accessing a particular piece of content.
  • 93. The media player of claim 92, wherein the data storage structure is encrypted.
  • 94. The media player of claim 92, wherein the data storage structure is not encrypted.
  • 95. The media player of claim 92, wherein the player receives (i) new pieces of content and (ii) new keys in a data storage structure that has the same format as the data storage structure of the media player.
  • 96. The media player of claim 95, wherein the new keys are individually encrypted in the received data storage structure and are stored in the same format in the data storage structure of the media player.
  • 97. A data storage structure stored on a readable storage medium, the data storage structure comprising a plurality of keys, each key individually encrypted, each key for accessing a piece of content associated with a particular account.
  • 98. The data storage structure of claim 97, wherein the keys are for accessing pieces of content associated with a particular account on a particular device.
  • 99. The data storage structure of claim 97, wherein the keys are for accessing pieces of content associated with a particular account on different devices.
  • 100. The data storage structure of claim 97, wherein the data storage structure is encrypted.
  • 101. The data storage structure of claim 97, wherein the data storage structure is not encrypted.
  • 102. A method comprising: a) determining that a new device has been specified for accessing content associated with a particular account; b) for the new device, generating a key for each piece of content associated with the particular account; and c) providing each generated key.
  • 103. The method of claim 102, wherein generating the key comprises generating a plurality of keys, wherein each particular key is for accessing a particular piece of content on the new device.
  • 104. The method of claim 103, wherein providing each generated key comprises providing a plurality of keys in one data storage structure.
  • 105. The method of claim 104 further comprising encrypting each generated key individually.
  • 106. The method of claim 102, wherein providing each generated key comprises providing each key to a computer that is associated with the particular account, wherein the computer is for transferring each generated key to the new device.
  • 107. The method of claim 106, wherein the new device is a media player.
  • 108. The method of claim 102 further comprising identifying pieces of content associated with the particular account.
  • 109. The method of claim 102 further comprising determining whether the new device can be associated with the account.
  • 110. A computer readable medium storing a program for execution, the program comprising sets of instructions for: a) determining that a new device has been specified for accessing content associated with a particular account; b) for the new device, generating a key for each piece of content associated with the particular account; and c) providing each generated key.
  • 111. The computer readable medium of claim 110, wherein the set of instructions for generating the key comprises a set of instructions for generating a plurality of keys, wherein each particular key is for accessing a particular piece of content on the new device.
  • 112. The computer readable medium of claim 111, wherein the set of instructions for providing each generated key comprises a set of instructions for providing a plurality of keys in one data storage structure.
  • 113. The computer readable medium of claim 112, wherein the program further comprises a set of instructions for encrypting each generated key individually.
  • 114. The computer readable medium of claim 110, wherein the set of instructions for providing each generated key comprises a set of instructions for providing each key to a computer that is associated with the particular account, wherein the computer is for transferring each generated key to the new device.
  • 115. The computer readable medium of claim 114, wherein the new device is a media player.
  • 116. The computer readable medium of claim 110 further comprising identifying pieces of content associated with the particular account.
  • 117. The computer readable medium of claim 110 further comprising determining whether the new device can be associated with the particular account.
  • 118. A method comprising: a) receiving a plurality of keys for a device associated with a particular account, each particular key for accessing on the device a particular piece of content associated with the particular account; and b) supplying the plurality of keys to the device.
  • 119. The method of claim 118, wherein the device is a new device being associated with the particular account.
  • 120. The method of claim 118, wherein receiving the keys comprises receiving the keys in one data storage structure.
  • 121. The method of claim 120, wherein each key is individually encrypted in the data storage structure.
  • 122. A readable storage medium storing a program for execution, the program comprising sets of instructions for: a) receiving a plurality of keys for a device associated with a particular account, each particular key for accessing on the device a particular piece of content associated with the particular account; and b) supplying the plurality of keys to the device.
  • 123. The readable storage medium of claim 122, wherein the device is a new device being associated with the particular account.
  • 124. The readable storage medium of claim 122, wherein the set of instructions for receiving the keys comprises a set of instructions for receiving the keys in one data storage structure.
  • 125. The readable storage medium of claim 124, wherein each key is individually encrypted in the data storage structure.