In a method for providing copy-protection services on a storage medium (for instance a solid state memory module), the data are arranged in sectors to which a field (S4T) is associated, where said field contains a random value Ri which is changed randomly when writing data to said sector. By encrypt
In a method for providing copy-protection services on a storage medium (for instance a solid state memory module), the data are arranged in sectors to which a field (S4T) is associated, where said field contains a random value Ri which is changed randomly when writing data to said sector. By encrypting the data stored on the medium using a key which depends critically on said random numbers, bit-by-bit copies (apart from said random numbers, which can not be deterministically changed by an application) to a second storage medium or recopies from some intermediate storage medium, can not be decrypted because the values of said random numbers will have changed, thus preventing unauthorized duplication and replay attacks.
대표청구항▼
1. A process for providing copy-protection on a memory device, wherein stored data is arranged in sectors, each having a tagging part associated therewith, where the tagging part of each sector comprises at least one field wherein a value in said at least one field is randomly changed with each writ
1. A process for providing copy-protection on a memory device, wherein stored data is arranged in sectors, each having a tagging part associated therewith, where the tagging part of each sector comprises at least one field wherein a value in said at least one field is randomly changed with each write access to at least one of said sectors wherein said field is read-only for external access, and said stored data is stored in encrypted form on said memory device, and wherein decryption of said stored data requires use of the randomly changed value. 2. The process as claimed in claim 1, characterized in that the memory device is a removable memory module. 3. The process as claimed in claim 1, characterized in that an encryption key used to encrypt stored data is derived from the values of the at least one field associated with sectors in which rights and/or usage information is stored. 4. The process as claimed in claim 3, characterized in that the encryption key is in addition derived from values of the at least one field associate with sectors in which the content is stored. 5. A system arranged for implementing a process as claimed in claim 1 comprising a controller unit for choosing the values at random. 6. A player for playing from a memory device prepared according to a process as claimed in claim 1. 7. A memory device prepared according to a method as claimed in claim 1 comprising a controller unit for choosing the random values. 8. A process utilizing a controller for providing copy-protection for data stored in data sectors on a memory device, a read-only for external access field being associated with each data sector for storing a value Ri, the process comprising using the controller to: encrypt data written into at least a part of the data sectors on the memory device on the basis of an encrypted key which the controller encrypts, at least in part, using the value Ri associated with said data sectors; andrandomly change the stored value Ri associated with a data sector each time that the respective data sector on the memory device is written. 9. The process of claim 8 further comprising the step of using the controller to decrypt data read from storage in a data sector on the basis of the key that the controller derives, at least in part from the stored value Ri associated with the sector. 10. The process of claim 8 wherein the controller is physically integrated within the memory device. 11. The process of claim 8 wherein the controller is located in a part of a data storage unit which is physically detachable from the memory device. 12. The process of claim 8 wherein the memory device is a disk. 13. The process of claim 9 wherein the memory device is a disk. 14. The process of claim 11 wherein the memory device is a disk. 15. A process utilizing a controller for providing copy-protection for data which is stored in data sectors on a memory device, a read-only for external access field being associated with each data sector for storing a value Ri, the process comprising using the controller to perform steps which, in combination: function to encrypt data written into at least a part of the data sectors on the memory device on the basis of a key which the controller encrypts, at least in part, from the value Ri associated with said data sector; andfunction to randomly change the stored value Ri associated with a data sector each time that the respective data sector on the memory device is accessed to write data. 16. A copy-protection system comprising in combination: a data storage medium, which is organized to store data in data sectors, and data fields which are associated with each data sector for storing a respective value Ri, associated with said associated data sector, the data fields being read-only for external access and therefore cannot be modified deterministically by devices using the system;a controller for providing copy-protection for data which is stored in the data sectors on the data storage medium, the controller including means which function to encrypt data written into at least a part of the data sectors on the storage medium on the basis of a key and means by which the controller functions to encrypt the key, at least in part, from the value Ri associated with said data sector; andmeans which function to randomly change the stored value Ri associated with a data sector each time that the respective data sector on the storage medium is accessed to write data. 17. The system of claim 16 wherein the storage medium is a removable random access storage module. 18. The system of claim 16 wherein the storage medium is a disk. 19. A process for providing copy-protection services on a memory device, wherein stored data is arranged in sectors, a tagging part being associated with each sector, where the tagging part of said sector comprises at least one field that stores a value, that is randomly changed with each write access to said sector, wherein said field value is read-only for external access, and said stored data is stored in encrypted form on said data storage medium with a key that is at least in part derived from values of at least some of said fields. 20. A process for providing copy-protection on a memory device wherein stored data is arranged in sectors, a tagging part being associated with each sector, and the tagging part of each sector comprises at least one field that is randomly changed with each write access to at least one of said sectors, wherein said field is read-only for external access, and said stored data is stored in encrypted form on said memory device for decryption with a key and wherein said key is calculated using said randomly changed field. 21. A copy-protection system comprising in combination: a data storage medium, organized to store data in read-write data sectors which are accessible by end-users and protected data fields which are inaccessible by end users;a drive comprising means for reading data from and writing data to and from the data storage medium and for transmitting said data for external access by end-users and the read-write data sectors without restriction, and for reading and writing protected data from and to the protected data fields for restricted access by the drive, but not for access by the end-users; anda controller for providing cryptographic copy-protection control for data which is stored in the read write data sectors, the controller including means which function to encrypt data written into at least a part of the read write data sectors at least in part, on the basis of a protected data value Ri stored in the protected data fields and means that function to randomly change the protected data value Ri and for writing the changed value into the protected data fields each time that the data written into the read-write data sectors is encrypted by the controller. 22. The process according to claim 1, wherein the memory device is a disk. 23. The process according to claim 1, wherein the memory device is a solid state memory module. 24. The process according to claim 1, wherein the memory device is an optical disc. 25. The process according to claim 8, wherein the memory device is a solid state memory module. 26. The process according to claim 8, wherein the memory device is a removable memory module. 27. The process according to claim 8, wherein the memory device is an optical disc. 28. The process according to claim 15, wherein the memory device is a disk. 29. The process according to claim 15, wherein the memory device is a solid state memory module. 30. The process according to claim 15, wherein the memory device is a removable memory module. 31. The process according to claim 15, wherein the memory device is an optical disc. 32. The process according to claim 19, characterized in that the memory device is a disk. 33. The process according to claim 19, wherein the memory device is a solid state memory module. 34. The process according to claim 19, wherein the memory device is a removable memory module. 35. The process according to claim 19, wherein the memory device is an optical disc. 36. The process according to claim 20, characterized in that the memory device is a disk. 37. The process according to claim 20, wherein the memory device is a solid state memory module. 38. The process according to claim 20, wherein the memory device is a removable memory module. 39. The process according to claim 20, wherein the memory device is an optical disc.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (14)
Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Code protection using cryptography.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Takenaka Masahiko,JPX ; Hasebe Takayuki,JPX ; Torii Naoya,JPX ; Iwayama Noboru,JPX, File protection system, software utilization system using the file protection system and storage medium used in the sof.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.