BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic diagram of an arrangement for the physical delivery of digital media according to the inventions.
FIG. 2 is a schematic diagram of an embodiment of the inventions illustrating how keys and secrets can be utilized during manufacturing on secure ROM and/or secure flash memory, to provide a key system that can be used to uniquely encrypt selected keys for selected content so that the resulting keys for content can only be utilized by the specific target player.
FIG. 3 is a schematic diagram of an embodiment of the inventions illustrating regional distribution of content and how users can deliver and receive portable cartridges.
FIG. 4 is a schematic diagram illustrating the capability of the system to re-encrypt content and push it out to all current users of the specific content.
FIG. 5 is a schematic diagram depicting an arrangement whereby a self-contained hard drive or other writable device can utilize block read and write techniques (such as in defrag utilities) to read blocks of data, decrypt them, then, re-encrypt them with a different key and/or algorithm.
FIG. 6 is a schematic diagram illustrating an arrangement in which local tethered content can be archived or copied to another writeable media for backup reasons, or for playability on another device such as a portable player.
FIG. 7 is a schematic diagram illustrating the use of Secure Flash/Processor that contains clock and calendar capability that can be utilized in the physical digital media device to ensure a player has the correct time, date and time zone settings.
FIG. 8 is a schematic diagram of an embodiment in which a clock/date/time-zone processor is managed so that that specific Time, Date and Time-Zone Settings will only be applied to the correct and specific player or players.
FIG. 9 is a schematic diagram illustrating how keys can be stored with additional metadata that apply to rights management such as allowable time to view.
FIG. 10 is a schematic diagram that depicts a method of delivering secured content to the player with a second/additional local encryption applied during the transfer of the data to the player.
FIG. 11 shows a sample menu of content to be copied and content that will be erased along with a request for the user to approve the updates.
FIG. 12 is a schematic diagram that illustrates the use of a tension based tamper resistant security “lock box” for highly secure components in the player.