The invention relates to a method and an apparatus for authenticating static data carriers. Typical static data carriers, e.g. CDs or DVDs nowadays do not include any specific provisions to detect counterfeiting, with respect to an essentially synchronous entry of the static data carrier to market. This has proven a weak protection and specific efforts have been introduced to include anti-counterfeiting means in newer ROM disc standards, such as PlayStation 2 or XBOX. However, these means still relying on a technology, once well understood, can easily be replicated. Usually, this results in exact copies of the content made available through alternative unauthorized networks.
Furthermore, in typical current sales and rental scenarios for static media, there are barely secure methods to safeguard the static media against counterfeiting or other forms of misuse. This can result in a significant disruption of business, because unauthorized copies of the content are made available through alternative, unauthorized channels of distribution.
The static data carriers are designed to be mass-produced in a highly efficient process, which is mainly based on a pressing of a master on a blank. This pressing process is entirely physical and, once well understood, fairly easy to replicate. As a result, even ROM disc specifications including “hidden” information cannot withstand counterfeiting for long periods of time. Furthermore, it is well known to include visually appealing holograms for some pieces of content. These holograms are harder to replicate, but still subject to a difficult validation.
Hence, it is an object of the invention, to provide an improved authentication method for static data carriers, which is harder to overcome by unauthorized means.
OBJECT AND SUMMARY OF THE INVENTION
The object of the invention is achieved by methods according to the claims 1, 2, 3, 15, 16 and 17.
The object of the invention is furthermore achieved by an optical disc according to claim 25. Preferred embodiments of the invention are defined in dependent claims.
The aspects of the invention are apparent from and will be elucidated with reference to the embodiments described hereinafter.
The invention will be described in greater detail hereinafter, by way of non-limiting examples, with reference to the embodiments shown in the drawings:
The object of the present invention is achieved by a method of authenticating optical discs to a rendering device, wherein the disc comprises media content, a second database with second authentication data and a transponder, the method comprising the steps of:
By means of the method according to the invention it is advantageously possible to manage the optical discs securely. That is, for example, a distribution and handling of media contents of the optical discs can be handled in a predetermined manner. Any unauthorized usage of the optical discs can therefore be reduced significantly.
A further aspect of the invention is a method of authenticating optical discs with media content by means of an enabling device and a first database with first authentication data, wherein the optical disc further comprises a transponder. The method comprises the following steps:
Therefore, by means of the inventive method, the first authentication data arranged in a first database and a response to a challenge, wherein the response is calculated by the transponder, have to match up in order to prove an authenticity status of the optical disc. That is, the first authentication data arranged in the first database and authentication data arranged on the transponder have to match up in order to verify an authenticity status of the optical disc. The authenticity of the optical disc ensures that the optical disc is not a counterfeited one or has otherwise been placed to market by any unauthorized means.
The object of the invention is further achieved by a method of authenticating optical discs with media content to a rendering device, wherein an optical disc comprises a media content, a second database with second authentication data and a transponder. The inventive method comprises the following steps:
The object of the present invention is further achieved by an optical disc comprising a media content and a second data base with second authentication data, wherein the optical disc further comprises a transponder, and wherein at least a subset of authentication data on the transponder matches cryptographically at least a subset of the second authentication data.
By means of the optical disc according to the present invention, it is advantageously possible to support an authentication procedure of the optical disc by means of an authentication database which is arranged on the optical disc. Furthermore, the authenticity of the optical disc is supported by means of authentication data of a transponder which are arranged on the optical disc, wherein the authentication data in the database and the authentication data on the transponder have to match up cryptographically.
Firstly, in a step A, the authorizing means 60 (which can be added and/or replaced by distributing means 70 or any other licensing means) supply an encrypted media content 90 to the optical disc 10. Afterwards, the optical disc 10 is physically distributed well before an official release date of the media content 90 of the optical disc 10. Thereafter, in a step B, the authorizing means 60 deliver a cryptographic key to the transponder 30 on the optical disc 10. The delivery of the cryptographic key to the transponder 30 is preferably performed on an official release date of the optical disc 10. In a step C, the rendering device 50 requests the cryptographic key from the transponder 30, whereupon the transponder 30, in a step D, delivers the cryptographic key to the rendering device 50. In a step E, the rendering device 50 uses the cryptographic key to decrypt the media content 90. The cryptographic key, as described above, can be formed as a content key, which is used to decrypt the media content 90. A rendering device 50, not being in a possession of the content key, is therefore not capable of decrypting and rendering the media content 90. As described, a chronological order of the steps A, B, C, D and E of
Furthermore, the enabling device 40 comprises an RFID writing device 42, which is capable and intended to communicate to the transponder 30 on the optical disc 10 wirelessly. The enabling device 40 furthermore comprises a control unit 52 (embodied for example as a microprocessor which is intended to control all of the items of the enabling device 40) and an optical display 55, which is capable of signalizing any kind of information to a user of the enabling device 40.
In a step S6, the enabling device 40 looks up the received challenge in the subset of the first authentication data 21, the first authentication data 21 having been decrypted in step S4. In a step S7, the enabling device 40 sends the response, which the enabling device 40 has found in the subset of the first authentication data 21 which matches the challenge to the transponder 30 as received in step S5. In a step S8, the transponder 30 processes the challenge with the transponder key KRFID in order to obtain a response to the challenge. In the step S8, the transponder 30 further checks if the received response from the enabling device 40 matches the response as calculated in step S8. If the responses match up, the transponder 30 redeems the enabling device 40 as authentic for the optical disc 10. In more detail, in step S8, the transponder 30 calculates the response by applying a first cryptographic algorithm to the challenge by using the transponder key KRFID. Mathematically, this can be expressed as follows: response=f1(KRFID, challenge)
In a step S9, the transponder 30 determines a session key KSESS by applying a second cryptographic algorithm to the challenge by again using its transponder key KRFID. Mathematically, this can be expressed as follows: KSESS=f2(KRFID, challenge) The session key KSESS is used to transport the content key KCONT securely from and to the transponder 30. In a step S10, the enabling device 40 sends an encrypted content key KENCR to the transponder 30. Afterwards, in a step S11, the transponder 30, in order obtain the content key KCONT, applies a cryptographic algorithm to the encrypted content key KENCR using the session key KSESS as having been determined in step S9. Finally, in a step S11, the decrypted content key KCONT is stored on the transponder 30 and is ready to be accessed in a subsequent rendering procedure of the optical disc 10.
An advantageous application of the embodiment as described with respect to
The resetting of the rendering data as described with respect to step S12 can for example be performed if the rendering data exceed a certain threshold value. In this way, the present invention provides efficient means to report and to process usage patterns for a usage of static media. To this end, the rendering device 50 increases the rendering data (e.g. a playtime of the optical disc 10 or an indicated list of titles of the optical disc 10) on the transponder 30 at essential regular intervals while rendering the optical disc 10. If a customer returns the optical disc 10, the retailer will read the rendering data, and if they are below a certain threshold, the retailer has proof that the customer played only a small part (or nothing) of the optical disc 10. The retailer may then decide on a refund or allow the customer to exchange the returned optical disc 10 for another item. The retailer then resets the usage counter to zero after an authentication process.
The first database 20 from
The first authentication data 21 can be embodied as a set of enabling records (E-records), wherein each of the enabling records can contain at least two items:
In a further preferred embodiment of the inventive method, the rendering device 50 increases the rendering data of the transponder 30 at essentially regular intervals while rendering the optical disc 10. The rendering device 50 reads the rendering data from the transponder 30. If the rendering data have reached a certain defined threshold, the rendering device 50 stops the rendering of the optical disc 10 with the media content 90. When a customer rents the optical disc 10, the retailer resets this value, thus enabling optical disc 10 to be played again.
In a further preferred embodiment of the present invention the rendering device 50 increases the rendering data on the transponder 30 at essentially regular intervals while playing the optical disc 10. If the rendering data have reached a certain threshold value, the transponder 30 erases the content key KCONT, thus preventing the rendering device 50 from further rendering the optical disc 10. In a case where the customer wants to rent the optical disc 10, the retailer restores the content key KCONT and resets the rendering data, thus enabling the optical disc 10 to be played again.
In a further preferred embodiment of the present invention, the rendering device 50 sends an identification to the transponder 30 during a rendering process of the optical disc 10. The transponder 30 is thus able to count a number of different rendering devices 50. If said number has reached a certain threshold value, the rendering device 50 can stop the rendering process of the optical disc 10. When a customer wants to rent the optical disc 10, the retailer resets the player counter described above, thus enabling the optical disc 10 to be played again.
In a further preferred embodiment of the present invention, the rendering device 50 sends an identification to the transponder 30 during the rendering of the optical disc 10. The transponder 30 will count the number of different player identifications it has received from different rendering devices 50. If said number of rendering devices 50 has reached a certain threshold, the transponder 30 is able to erase the content key KCONT, thus preventing the rendering device 50 from further rendering the optical disc 10 with the media content 90. When the customer rents the optical disc 10, the retailer is able restore the content key KCONT and reset the player counter, thus enabling the optical disc 10 to be played again.
A favorable case of use of the described preferred embodiments of the inventive method could be e.g. a scenario where an optical disc 10 is manufactured “for sale only”. That is to say, the transponder 30 will keep track of how many different rendering devices 50 have accessed the optical disc 10. In this way a playability of the optical disc 10 can be limited to a defined, restricted number of rendering devices 50. This will preclude or at least strongly discourage a usage of these optical discs 10 “for sale only” in rental operations. Similarly, when an optical disc 10 is manufactured “for rental only”, its transponder 30 will keep track of how many different rendering devices 50 access it after every check-out operation, thus limiting a number of rendering devices 50 to a few number of items. This will force rental operations to perform check-in/check-out operations which can optionally be linked to a backend-reporting-infrastructure, thus enabling content owners to keep accurate track of rental events. Furthermore, if the rental store decides to perform a stock clearance and to change an optical disc 10 for definitive “sale only” use, the last check-out at the rental store can be modified such that the transponder 30 is irreversibly updated with the new usage-policy (“for sale only”).
Another favorable case of use of the discussed preferred embodiments of the inventive method could be the following. Due to the fact that the transponders 30 can be easily communicated to, it is possible that the information on the transponder 30 can be updated at the point-of-sale during a purchasing operation. Equally, it is possible to perform a similar process during check-in/check-out operations in rental operations. In this fashion, when the optical disc 10 is initially released, its associated transponder 30 will include signalling information marking it “not valid” for rendering, or omitting information making it not useable. At the point-of-sale, a sales clerk will activate the optical disc 10 by writing missing information (e.g. the content key KCONT) to the transponder 30. If an optical disc 10 is stolen from the shelf, it will therefore advantageously still remain in the invalid state and any complainant rendering device 50 will refuse to play or will be unable to play the stolen optical disc 10.
Similarly, in rental operations, optical discs 10 are marked invalid in the check-in operation and then just made available to all customers in the stores. This obliterates the need to store the optical disc 10 away from a customers reach. The transponders 30 can be communicated to at the stores e.g. by hand-held or static RFID/NFC reading devices 41. Furthermore, the transponder 30 can be communicated to at the store desk's by the static or hand-held RFID/NFC reading devices 41 during check-in/check-out operations. The transponder 30 can be communicated to inside the rendering device 50 while the optical disc 10 is played during normal playing operations. Advantageously, most of the inventive preferred embodiments as described above do not need any external connection (e.g. via networking means) to either the authorizing means 60, the distributing means 70 or any other licensing means. Rather, with the present invention it is advantageously possible, that the optical discs 10 can be authenticated only locally by means of a local authentication infrastructure.
A further favorable case of use of the present invention is the following: At an official release date of the optical disc 10, missing information, for example in the form of content KCONT, is made available to all dedicated points-of-sale through qualified means, typically in the form of an internet service access on request by the point-of-sale. At the moment of the check-out or at any time after the official release date but previous to the purchase operation, the transponder 30 on the optical disc 10 is updated with missing data (e.g. the content key KCONT). Afterwards, at the customers home, a rendering device 50 of the customer detects that some information on the optical disc 10′ is absent. Hence, the rendering device 50 reads the transponder 30 and gets the content key KCONT. In this way, the optical disc 10 can be rendered by the rendering device 50 of the customer.
Afterwards, in a step S25, the transponder 30 sends the calculated response to the rendering device 50. In a step S26, the rendering device 50 checks whether the calculated response from the transponder 30 matches the response as having been randomly selected in previous step S22. If the two responses match up, the rendering device 50 confirms the transponder 30 on the optical disc 10 as authentic. Hence, the rendering device 50, in a step S27, displays a message “optical disc authentic” by means of the display 55 of the rendering device 50. Therefore, a user of the rendering device 50 has an efficient means to be informed of an authenticity status of the optical disc 10 inside the rendering device 50.
In a step S28, the rendering device 50 requests the content KCONT from the transponder 30. As a result of this request, the transponder 30, in a step S29 firstly determines the session key KSESS by applying the second cryptographic algorithm to the challenge using the transponder key KRFID. Mathematically, said application of the second cryptographic algorithm can be expressed as follows: KSESS=f2(KRFID, challenge)
Afterwards, in a step S30, the transponder 30 calculates an encrypted content key KENCR by applying a third cryptographic algorithm to the session key KSESS (as has been determined in step S29) and to the content key KCONT. The content key KCONT is stored unencrypted on the transponder 30 and is used by the rendering device 50 in order to decrypt the media content 90 for playback. Afterwards, in a step S31, the transponder 30 sends the encrypted content key KENCR to the rendering device 50. In a step S32, the rendering device 50 determines the content key KCONT by applying a fourth cryptographic algorithm to the session key KSESS and to the encrypted content key KENCR (as having been received in previous step S31). In a step S33, the rendering device 50 reads the encrypted media content 90 and an intended content list from the second database 80 on the optical disc 10. In a step S34, the rendering device 50 determines the decrypted media content 90 by applying a fifth cryptographic algorithm to the encrypted media content 90 using the content key KCONT. Finally, in a step S35, the rendering device 50 displays the media content 90 by means of the display 55. It should be noted that the aforementioned third and fourth cryptographic algorithms are preferably identical.
Thereafter, in a step S39, the transponder 30 determines, similar to the previous embodiments, a response to the challenge and compares the determined response with the pre-calculated response from the authorizing means 60. In a step S40, the transponder 30 communicates to the authorizing means 60 a result of the authentication procedure. In more detail, the transponder 30 communicates to the authorizing means 60 whether the calculated response matches the pre-calculated response from the authorizing means 60 or not. Finally, in a step S41, the authorizing means 60 determine an authenticity status of the transponder 30 and communicate the result of this determination to the enabling device 40 in a step S42. It is obvious, that this embodiment, in order to provide a data connection between the enabling device 40 and the remote arranged authorizing means 60, needs some sort of connectivity (e.g. networking means) between the enabling device 40 and the authorizing means 60. However, this sort of connectivity is not seen as an onerous requirement for most deployments.
In a further preferred embodiment of the present invention, the transponder 30 can preferably comprise additional means to perform a distributed authentication, for example formed as a public key cryptography. Hence, the transponder 30 holds at least one certificate that has been issued by the authorizing means 60. This will improve the execution of the authentication procedure as described in the previous embodiments by enabling the transponder 30 to freely reply to any incoming challenge, and by enabling the rendering devices 50 to obtain a certificate issued by the authorizing means 60. The rendering device 50 can thus verify the authenticity of the transponder 30 in an independent manner.
In a further preferred embodiment of the invention, the rendering device 50 communicates an authenticity status of the transponder 30 by over-impressing in a section of a graphical user interface of the display 55 a symbol such that a well known “authentic”-graphic is displayed, which denotes the authenticity of the media content 90. Said symbol could e.g. be a “black-spot” or a mostly opaque graphic which completely overlaps the position of the aforementioned “authentic” graphic. The symbol can be designed such that, if the “authentic”-graphic has been pre-recorded in a counterfeit media, it will fully over-impose it, thus defeating any attempt to confuse the user.
In a further preferred embodiment of the present invention, the rendering device 50 is able to communicate the status of the transponder 30 by rendering the media content 90 of the optical disc 10 in a resolution depending on a grade of authenticity. This means, that an unauthenticated optical disc 10 can be rendered rendered in a visibly and/or audibly lower resolution than an authenticated optical disc 10.
Advantageously, due to the fact that the transponders 30 can be easily communicated to, it is possible by means of the present invention that the information on the transponders 30 can be retrieved and validated at:
A further aspect of the present invention can be seen in a method of providing secret keys for authenticating optical discs 10. To this end, the method comprises a step of providing the transponder key KRFID to the transponder 30 which is attached to the optical disc 10. Afterwards, the enabling key KENAB is supplied to the enabling device 40. Thereafter, also the first database 20 with first authentication data 21 is sent to the enabling device 40. At least a subset of the first authentication data 21 can be decrypted by the enabling device 40 using the enabling key KENAB, wherein at least a subset of the first authentication data 21 can be decrypted by the transponder 30 by applying a cryptographic algorithm to the first authentication data 21 using the transponder key KRFID.
A further aspect of the present invention can be seen in a method of providing secret keys for authenticating optical discs 10. To this end, the method provides a step of providing the transponder key KRFID to the transponder 30 which is attached to the optical disc 10. Furthermore, the driver key KDRIV is applied to the rendering device 50. Furthermore, the second database 20 with second authentication data 81 is sent to the optical disc 10. At least a subset of the second authentication data 81 can be decrypted by the rendering device 50 using its driver key KDRIV. At least a subset of the second authentication data 81 can be decrypted by the transponder 30 by applying a cryptographic algorithm to the second authentication data 81 using the transponder key KRFID.
Further, the content key KCONT is applied to the transponder 30 and the session key KSESS is applied to the rendering device 50. By means of the session key KSESS the content key KCONT is capable of being transported from and/or to the transponder 30 securely. The aforementioned secret key KCONT is provided by the authorizing means 60 on a date of an official release of the media content 90 of the optical disc 10.
Finally, it should be noted that the above mentioned preferred embodiments illustrate rather than limit the invention, and that those skilled in the art will be capable of designing many alternative embodiments without departing from the scope of the invention as defined by the appended claims. In the claims, any reference signs placed in parentheses shall not be construed as limiting the claims. The word “comprising” and “comprises”, and the like, does not exclude the presence of elements or steps other than those listed in any claim or the specification as a whole. The singular reference of an element does not exclude the plural reference of such elements and vice-versa. In a device claim enumerating several means, several of these means may be embodied by one and the same item of software or hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Number | Date | Country | Kind |
---|---|---|---|
06111508.5 | Mar 2006 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB07/50886 | 3/15/2007 | WO | 00 | 9/19/2008 |