The present invention relates generally to content protection and copy management.
The advantages of digitized video and music are numerous, but one significant drawback is that being digitized, the content is relatively easy to copy perfectly, without authorization of the copyright owner. Copies can be made of digital audio and video content that is provided to in-home users on media such as digital versatile disks (DVDs). Indeed, widespread copying by pirates costs content owners billions of dollars per year. Thus, the present invention understands that it is desirable to limit the unauthorized copying of digital audio and video. Consequently, many copy guard schemes have been introduced to prevent unauthorized copying of a vended CD or DVD.
The problem, however, is complicated by the desire of buyers of digitized content to make copies for personal uses. For example, a buyer of a DVD movie might have a home entertainment network that might include several DVD players, personal video recorders (PVRs), and other computing devices such as personal computers (PCs) and personal digital assistants (PDAs) on which the buyer might want to play, at various times, the purchased content. Under these circumstances, the buyer would prefer to access and copy the content over digital channels, rather than transport the purchased DVD to each device. Moreover, some of the network devices might not be configured for receiving a DVD or other media format on which the content was purchased. Assuming the appropriate controls can be established, content providers in general do not object to such copying, because it is merely a convenience for a buyer who has already purchased the content and desires to use it solely for his or her own personal enjoyment.
But as intimated above, if such functionality is permitted without constraints, unscrupulous purchasers could open their home networks to unauthorized users or make pirate copies of the content that they could then sell or give away, depriving copyright owners of compensation. The present invention has been provided with the above critical observations in mind.
A method for content protection in a private home entertainment network that has plural playback devices includes receiving discrete content from a content source. The discrete content is characterized by being playable in any playback devices that are compliant with such discrete format, including playback devices outside a particular private home entertainment network. The method then includes ingesting the discrete content into a particular private home entertainment network such that the discrete nature of the content is disabled and a “bound” version of the content exists on the private home network. Bound content is characterized by being playable only by playback devices that are legitimate members of the private home entertainment network.
Preferably, the method also includes permitting a user of the private home entertainment network to convert the bound content back to discrete content to allow the content to return to a network independent state. When this is done, the method renders unusable all copies of the corresponding bound content on the private home entertainment network by, e.g., deleting authority to access the content from the network. In a non-limiting embodiment, the discrete content is rendered into bound content by encrypting the discrete content using at least one key associated with the private home entertainment network.
In another aspect, a system for content protection in a home entertainment network that has plural playback devices includes means for receiving discrete content from a content source, and means for encrypting the content using at least one key associated with the home entertainment network to render bound content that is bound to the home entertainment network. Also, the system includes means for storing the bound content in the home entertainment network. Means are provided for making the bound content available to all network devices for playback thereon. Moreover, the system includes means for permitting a user to move the content onto a discrete media that is not bound to the network, and, if the user moves the content onto the discrete media, rendering unusable all bound copies of the content in the network.
In yet another aspect, a home entertainment system includes plural playback devices communicating in a private network. A processor executes logic for permitting a user to play discrete content on any playback device but not to make copies of the content. The logic also permits a user to convert discrete content to bound content and to make at least N copies of the bound content, wherein N≧1. In this aspect, discrete content is characterized by being playable by authorized devices inside and outside the private network, and bound content is characterized by being playable only by the playback devices inside the network.
The details of the present invention, both as to its structure and operation, can best be understood in reference to the accompanying drawings, in which like reference numerals refer to like parts, and in which:
Figure is a block diagram of the present home entertainment system architecture;
Referring initially to
As received, the content generally is in a “discrete” state. As used herein, discrete content is network independent, may be moved (but not copied) between networks and users, and may be shifted, if authorized, to the bound state as long as the discrete version of the content is no longer network independent. “Bound” content or media, on the other hand, is cryptographically or otherwise tied to one and only one private home entertainment network such that it can be played only by devices in that network. Bound content can be copied within the network, including to physical media if the content remains bound to the network, and it can be shifted to the discrete state upon authorization, at which point effectively all network copies of the bound content are rendered unusable. Compliant network devices cannot, however, transfer bound content in usable state outside the network.
More particularly,
Several network devices are shown communicating with the server 16. For example, one or more receivers 18 with associated personal video recorders (PVR) can communicate with the server 16, as can one or more personal computers (PC) 20. Also, the network 12 can include one or more gaming consoles 22, as well as one or more digital video disk (DVD) player/recorders 24. One or more portable personal digital assistants (PDA) 26 and vehicle or vehicles 28 can be members of the network 12, subject to the constraints mentioned below. A secondary residence 30 containing further network devices can also be part of the network 12.
The network 12 is private in that non-network devices cannot access bound content on the network 12. Accordingly, the network 12 can be physically separate from public networks, or it can be a virtual private network that uses public network resources but that cannot be accessed by non-networked devices in accordance with VPN principles known in the art.
Now referring to
In the preferred embodiment, the number of authorized devices is limited to a predetermined number, e.g., fifteen (15), to limit the risk that the network will be compromised. Display-only devices in the network 12 might not be counted against this number.
Portable network devices such as the PDA 26 can remain participating members of the network 12, accessing it wirelessly if desired, as long as the device is not explicitly disconnected from the network by the user and as long as it checks in with the server 16 within a predetermined time interval. Otherwise, the device will be considered disconnected and its keys timed out. Upon being disconnected from the network 12, any copies of bound content in the device are rendered unusable by, e.g., ensuring only compliant devices are authenticated at block 32 and thus are programmed to delete or erase or otherwise render unusable bound content upon network disconnection. Keys may be refreshed from time to time and upon predetermined events (such as the disconnection of a device or to render previously bound content unusable).
Proceeding to block 34, discrete content is received by the network 12 (e.g., by the server 16) as described above, and then is converted to bound content at block 36. As one non-limiting example, the discrete content may be encrypted using the keys of the network 12 such that only network devices having the keys can decrypt (and, hence, play) the content. Once converted to the bound state, no usable version of the discrete content remains. Any copies that exist are deleted or erased or otherwise rendered unusable. Thus, for example, when discrete content is to be initially received on a disk, the disk must facilitate alteration such that no discrete content remains on the disk or if it remains, it is either modified to be bound content or is rendered unusable by non-network devices.
If desired, when discrete content is received on a disk and then converted to bound, the disk may be visually marked to indicate the bound state using the marking principles set forth in U.S. Pat. No. 6,104,677, owned by the present assignee and incorporated herein by reference. Likewise, the disk may be marked to indicate a change back to the discrete state using the principles set forth further below.
Block 38 indicates that the bound content can be moved around and/or copied within the network 12, including on compliant physical media, as desired to play it on whatever network device the user chooses.
When bound content moves through the network, it preferably moves securely, in accordance with secure data movement principles known in the art. The device requesting the bound content may, e.g., decrypt the content during playing but not maintain any non-bound copy of the content. The content can move using network connections, or using portable network devices, or using distinct physical media such as Sony's Memory Stick® that is bound (or whose content is bound) to the network.
At block 40, a user may decide to unbind the content from the network 12. To do this, one bound copy is converted by, e.g., decrypting the content, and re-encrypting in the newly discrete state and then copied to, e.g., a portable disk or transmitted outside the network. All bound copies of the content in the network 12 are rendered unusable by deletion, erasure, or other mode such as preventing access to it.
At block 48, the root copy is cryptographically bound to the network 12 as disclosed above. The remaining discrete version of the content is disabled or otherwise rendered unusable. Moving to block 50, copies of the bound root version are made as necessary to support play requests from the network devices shown in
Block 52 indicates that should a user desire to provide, to a destination which is outside the network 12, content that is bound to the network 12 using, e.g., a disk, the user can so command. In response, at block 54 all bound copies are disabled from viewing, and the root version is moved or designated to be the version on the disk recorder. At block 56 the content is unbound in accordance with the above principles to convert it to the discrete state, and then copied at block 58 to, e.g., a disk that can be transported outside the network 12. All remaining bound copies including the root version are rendered unusable by devices on the network 12.
To give but two examples of how the above invention might be used, a user might download a 72 hour rental program from a content source, with the content being bound to the network upon arrival. Any network device can view the content during the rental period, but once the viewing period elapses, all copies are rendered unusable by, e.g., rendering unusable all copies from the network.
As another example, assume that discrete content is purchased and is downloaded to fixed or removable media within the network 12 (e.g., within the server 16). Once bound upon user command or automatically or otherwise, the content may be accessed and copied as necessary by any network device. If the user elects to maintain the content in its discrete state, no copying is permitted, but the content may be moved by, e.g., placing the content on a removable media and transporting the memory device from network device to network device for sequential playing as desired by the user.
While the particular SYSTEM AND METHOD FOR HOME NETWORK CONTENT PROTECTION AND COPY MANAGEMENT as herein shown and described in detail is fully capable of attaining the above-described objects of the invention, it is to be understood that it is the presently preferred embodiment of the present invention and is thus representative of the subject matter which is broadly contemplated by the present invention, that the scope of the present invention fully encompasses other embodiments which may become obvious to those skilled in the art, and that the scope of the present invention is accordingly to be limited by nothing other than the appended claims, in which reference to an element in the singular is not intended to mean “one and only one” unless explicitly so stated, but rather “one or more”. All structural and functional equivalents to the elements of the above-described preferred embodiment that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the present claims. Moreover, it is not necessary for a device or method to address each and every problem sought to be solved by the present invention, for it to be encompassed by the present claims. Furthermore, no element, component, or method step in the present disclosure is intended to be dedicated to the public regardless of whether the element, component, or method step is explicitly recited in the claims. No claim element herein is to be construed under the provisions of 35 U.S.C. §112, sixth paragraph, unless the element is expressly recited using the phrase “means for” or, in the case of a method claim, the element is recited as a “step” instead of an “act”. Absent express definitions herein, claim terms are to be given all ordinary and accustomed meanings that are not irreconcilable with the present specification and file history.
The present application is a continuation of U.S. patent application Ser. No. 10/403,993, filed Mar. 31, 2003 now U.S. Pat. No. 7,203,965 which claims priority from U.S. provisional application Ser. No. 60/434,774, filed Dec. 17, 2002, incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5805699 | Akiyama et al. | Sep 1998 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5915018 | Aucsmith | Jun 1999 | A |
5918016 | Brewer et al. | Jun 1999 | A |
6052780 | Glover | Apr 2000 | A |
6104677 | Kirihara et al. | Aug 2000 | A |
6185686 | Glover | Feb 2001 | B1 |
6295360 | Ryan et al. | Sep 2001 | B1 |
6310956 | Morito et al. | Oct 2001 | B1 |
6438692 | Kato et al. | Aug 2002 | B2 |
6530021 | Epstein et al. | Mar 2003 | B1 |
6550011 | Sims, III | Apr 2003 | B1 |
6665303 | Saito et al. | Dec 2003 | B1 |
6802003 | Gross et al. | Oct 2004 | B1 |
6986048 | Epstein et al. | Jan 2006 | B1 |
7024466 | Outten et al. | Apr 2006 | B2 |
7039801 | Narin | May 2006 | B2 |
7058414 | Rofheart et al. | Jun 2006 | B1 |
7073063 | Peinado | Jul 2006 | B2 |
7203966 | Abburi et al. | Apr 2007 | B2 |
7346687 | Lipscomb et al. | Mar 2008 | B2 |
7376840 | McCann et al. | May 2008 | B2 |
7421411 | Kontio et al. | Sep 2008 | B2 |
7483958 | Elabbady et al. | Jan 2009 | B1 |
7484103 | Woo et al. | Jan 2009 | B2 |
20010042043 | Shear et al. | Nov 2001 | A1 |
20010051928 | Brody | Dec 2001 | A1 |
20020003880 | Kato et al. | Jan 2002 | A1 |
20020016919 | Sims, III | Feb 2002 | A1 |
20020026636 | LaComte | Feb 2002 | A1 |
20020041686 | Moriyama et al. | Apr 2002 | A1 |
20020046178 | Morito et al. | Apr 2002 | A1 |
20020069420 | Russell et al. | Jun 2002 | A1 |
20020073229 | Hayashi | Jun 2002 | A1 |
20020094207 | Richards et al. | Jul 2002 | A1 |
20020107803 | Lisanke et al. | Aug 2002 | A1 |
20020107806 | Higashi et al. | Aug 2002 | A1 |
20020126842 | Hollar | Sep 2002 | A1 |
20020141577 | Ripley et al. | Oct 2002 | A1 |
20020157002 | Messerges et al. | Oct 2002 | A1 |
20030051153 | Andreaux et al. | Mar 2003 | A1 |
20030078891 | Capitant | Apr 2003 | A1 |
20030084306 | Abburi et al. | May 2003 | A1 |
20030097655 | Novak | May 2003 | A1 |
20030131252 | Barton | Jul 2003 | A1 |
20030167392 | Fransdonk | Sep 2003 | A1 |
20030187801 | Chase et al. | Oct 2003 | A1 |
20030198351 | Foster et al. | Oct 2003 | A1 |
20030212905 | Tran et al. | Nov 2003 | A1 |
20030217011 | Peinado et al. | Nov 2003 | A1 |
20030236978 | Evans et al. | Dec 2003 | A1 |
20040039707 | Ricci | Feb 2004 | A9 |
20040093372 | Chen et al. | May 2004 | A1 |
20040102987 | Takahashi et al. | May 2004 | A1 |
20040103297 | Risan et al. | May 2004 | A1 |
20040117483 | Singer et al. | Jun 2004 | A1 |
20040117635 | Karaoguz et al. | Jun 2004 | A1 |
20040139027 | Molaro | Jul 2004 | A1 |
20040143736 | Cross et al. | Jul 2004 | A1 |
20040168184 | Steenkamp et al. | Aug 2004 | A1 |
20050071375 | Houghton et al. | Mar 2005 | A1 |
20050273608 | Kamperman | Dec 2005 | A1 |
20060031257 | Lipscomb et al. | Feb 2006 | A1 |
20060085349 | Hug | Apr 2006 | A1 |
20060117379 | Bennett et al. | Jun 2006 | A1 |
20060159109 | Lamkin et al. | Jul 2006 | A1 |
20060242083 | Chavez | Oct 2006 | A1 |
20060259770 | Peinado | Nov 2006 | A1 |
20070112948 | Uhlik | May 2007 | A1 |
Number | Date | Country |
---|---|---|
H11-194987 | Jul 1999 | JP |
2002-198957 | Jul 2002 | JP |
WO 9960568 | Nov 1999 | WO |
WO 0062505 | Oct 2000 | WO |
WO 0146786 | Jun 2001 | WO |
WO 0165862 | Sep 2001 | WO |
WO 0175876 | Oct 2001 | WO |
WO 0203211 | Jan 2002 | WO |
WO 03039155 | May 2003 | WO |
Number | Date | Country | |
---|---|---|---|
20070143782 A1 | Jun 2007 | US |
Number | Date | Country | |
---|---|---|---|
60434774 | Dec 2002 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10403993 | Mar 2003 | US |
Child | 11680713 | US |