A digital data file encryption system and method where digital data encrypted to a high level and an encryption key are received and stored in a computer. The stored, encrypted digital data is decrypted on the basis of the encryption key and stored in a buffer of a predetermined size. Output digital data from the buffer is reencrypted to a low level of encryption and downloaded to a digital data playing device or a data storage medium. Therefore, a digital audio or video data file is prevented from being diverted in unencrypted form from a computer communication network when it is transmitted to a personal computer through the computer communication network and, in turn, downloaded to the digital data playing device. Further, the digital data playing device is prevented from rising in cost due to the use of simple encryption for data downloaded to the playing device.
|
0. 31. A method for managing digital content data, the method being performed by at least one playing device and comprising:
receiving the digital content data which has been encrypted by a predetermined encryption method from an external source device;
determining whether or not the digital content data is to be protected based on index information of the digital content data;
decrypting the digital content data;
storing the decrypted digital content data in a buffer during a duration time;
controlling a size of the buffer for storing the decrypted digital content when the digital content data is determined to be protected;
re-encrypting the stored digital content data using a different encrypting method from the predetermined encryption method, when the digital content data is to be protected, wherein the different encrypting method is selected among a plurality of predetermined encrypting methods; and
transmitting the re-encrypted digital content data to an external target device that is configured to decrypt the re-encrypted digital content.
0. 34. An apparatus for managing digital content data, the apparatus comprising:
a buffer;
a decryptor;
an encryption unit; and
a controller programmed to:
receive the digital content data which has been encrypted by a predetermined encryption method from an external source device,
determine whether or not the digital content data is to be protected based on index information of the digital content data,
control the decryptor to decrypt the digital content data,
store the decrypted digital content data in the buffer during a duration time,
control a size of the buffer for storing the decrypted digital content when the digital content data is determined to be protected, wherein the different encrypting method is selected among a plurality of predetermined encrypting methods,
control the encryption unit to re-encrypt the stored digital content data using a different encrypting method from the predetermined encryption method, when the digital content data is to be protected, and
transmit the re-encrypted digital content data to an external target device that is configured to decrypt the re-encrypted digital content.
0. 1. A method for copy protection, comprising:
generating a partially decrypted data unit, the partially decrypted data unit including two portions, one of the two portions is encrypted having a protection level different from the other of the two portions; and
transferring the partially decrypted data unit to a target device for further decrypting based on information used in the step of generating the partially decrypted data unit; and
further comprising the steps of:
registering a computer with a data server;
transferring encrypted data from the data server to the computer the computer generating the partially decrypted data unit in a first decryption unit of the computer; and
using a second decryption unit of the target device to further decrypt the partially decrypted data unit based on the information used in the step of generating the partially decrypted data unit.
0. 2. The method of
0. 3. The method of
0. 4. The method of
0. 5. The method of
0. 6. The method of
0. 7. The method of
0. 8. The method of
0. 9. The method of
0. 10. The method of
0. 11. The method of
0. 12. The method of
sending the partially decrypted digital data unit to the digital data player;
decrypting the reencrypted data unit based on a predetermined encryption key; and
outputting the decrypted data unit to an output line of the digital data player.
0. 13. The method of
0. 14. The method of
partially decrypting the encrypted data unit in the computer is performed independently of operating the second decryption unit in the target device.
0. 15. A method for copy protection, comprising:
receiving a data unit that has been encrypted based on a predetermined encryption key;
identifying whether or not the received data unit needs to be protected;
generating an encrypted data unit having a different encryption level or method from one used to encrypt the data unit, based on a result of the identifying step; and
transferring the generated encrypted data unit having the different encryption level or method to a target device for decrypting based on information used in the step of generating the encrypted data unit; and
further comprising the steps of:
registering a computer with a data server;
transferring the data unit from the data server to the computer;
using a first decryption unit of the computer for generating the encrypted data unit having the different encryption level or method; and
using a second decryption unit of the target device for decrypting the generated encrypted data unit having the different encryption level or method based on the information used in the step of generating the generated encrypted data unit.
0. 16. The method of
0. 17. The method of
0. 18. The method of
0. 19. The method of
0. 20. The method of
0. 21. The method of
0. 22. The method of
0. 23. A method for copy protection, comprising the steps of:
enabling a registration mode for inputting a user identification;
receiving a data unit from a storage device based on the inputted user identification information, wherein the data unit has been encrypted;
generating an encrypted data unit having a different encryption level or method from one used to encrypt the data unit; and
transferring the encrypted data unit having the different encryption level or method to a target device for decrypting based on information used in the step of generating the differently encrypted data unit; and
further comprising the steps of:
registering a computer with a data server;
transferring the data unit from the data server to the computer;
using a first decryption unit of the computer for generating the encrypted data unit having the different encryption level or method; and
using a second decryption unit of the target device for decrypting the generated encrypted data unit having the different encryption level or method based on the information used in the step of generating the generated encrypted data unit.
0. 24. The method of
0. 25. The method of
0. 26. The method of
sending the generated encrypted data unit to the digital data player;
decrypting the generated encrypted data unit based on a predetermined encryption key; and
outputting the decrypted data unit to an output line of the digital data player.
0. 27. The method of
0. 28. The method of
0. 29. The method of
0. 30. A method for encrypting a digital data file, comprising:
receiving a data file from a digital data server, the data file having been encrypted in the digital data server based on a predetermined encryption key;
decrypting the data file using the predetermined encryption key;
identifying whether or not the received data file needs to be protected;
reencrypting the decrypted data file on the basis of the identified result; and
transferring the reencrypted data file to a target device,
wherein the reencrypted data file has a different level of encryption as compared to that of the received data file that was encrypted in the digital data server; and
further comprising the steps of:
registering a computer with the digital data server;
transferring the data file from the digital data server to the computer;
using a first decryption unit of the computer for generating the reencrypted data file having the different level of encryption; and
using a second decryption unit of the target device to decrypt the reencrypted data file having the different level of encryption based on the information used in the step of reencrypting the decrypted data file.
0. 32. The method of
0. 33. The method of
0. 35. The apparatus of
0. 36. The apparatus of
|
Alternatively, the file encrypted as shown in
The digital data playing device 130 stores the digital data file from the personal computer 120, encrypted and down-loaded in the above manner, in a memory 142 of a data storage medium 140 which may be in the form of a removable card. If the user requests the digital data playing device 130 to reproduce the digital data file stored in the memory 142, then the digital data playing device 130 reads the stored digital data file from the memory 142 and reproduces it through a decoder 132 therein. At this time, the digital data file read from the data storage medium 140 has to be decrypted for the reproduction because it is in an encrypted form. For this reason, in the digital data playing device 130, a microcomputer 131 decrypts the digital data file read from the data storage medium 140 on the basis of the encryption key used in the above encryption procedure of the encryption/download unit 125 and outputs the decrypted digital data file to an output line through the decoder 132. Because of the weak encryption shown, for example, in
In accordance with the present invention, the above encryption method may be implemented by one program on a recording medium. The encryption program is configured to receive and store both digital data encrypted to a high level and an encryption key, decrypt the encrypted digital data according to the encryption key, store the decrypted digital data in a buffer in a predetermined unit of size, reencrypt output digital data from the buffer to a low level and download the reencrypted digital data to a digital data player or a data storage medium. This encryption program is stored on a single recording medium for use in the digital data encryption of the present invention.
Thereafter, acccording to the present invention as shown in
On the other hand, in the case where it is determined at the above Step 440 that the copyright of the downloaded file must be protected, the personal computer first checks the capacity of the downloaded file at Step 450 and then sets an effective capacity of a buffer in accordance with the checked result ate Step 460. Then, the personal computer decrypts the downloaded file according to the encryption key at Step 470 and stores the decrypted file in the buffer at Step 480 in such a manner that the decrypted file cannot be normally reproduced even when it is hacked in process of being downloaded to the digital data player. The digital data file stored in the buffer is encrypted to a low level at Step 490. This low level encryption does not require a separate microprocessor which is typically used for the high level encryption or powerful encryption, thereby avoiding an increase in cost of the associated playing device. Then, the digital data file encrypted to the low level is downloaded to the digital data playing device at Step 500.
With reference to
If the downloaded digital data file need not be protected in copyright, then it is decrypted and downloaded directly to a digital data player at Step 510. In this case, because no copyright problem is caused even when the downloaded file is hacked/diverted, there is no necessity for encrypting the downloaded file to send it to the digital data player. On the other hand, in the case where it is determined at the above step 440 that the copyright of the downloaded file must be protected, the digital data file stored in the buffer is encrypted to a low level at step 490. As described above with reference to
According to the present invention, a digital data file downloaded from a single server is decrypted, stored in the buffer in a predetermined unit of size, encrypted in a somewhat simple manner and downloaded to the digital data player. Digital data files downloaded from a plurality of servers are decrypted in individual decryption manners, encrypted in the simple manner as mentioned above and downloaded to the digital data player. Therefore, it is possible to reliably protect the copyright of a given digital data file without increasing the cost of the digital data player due to the decryption function.
Although the preferred embodiments of the present invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims.
Jung, Han, Kang, Myeong-Joon, Cha, Ghun-Up
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
4907275, | May 20 1987 | Hitachi, Ltd. | Encryption apparatus |
5323464, | Oct 16 1992 | IBM Corporation | Commercial data masking |
5539827, | May 05 1993 | SAGETECH INC | Device and method for data encryption |
5659618, | Sep 29 1995 | NXP B V | Multi-size cryptographic key system |
5867579, | Oct 27 1994 | PIRACY PROTECTION LLC | Apparatus for data copyright management system |
5889860, | Nov 08 1996 | SUNHAWK CORPORTION, INC , A WASHINGTON CORPORATION | Encryption system with transaction coded decryption key |
5917915, | Jun 24 1994 | Sony Corporation | Scramble/descramble method and apparatus for data broadcasting |
5991399, | Dec 18 1997 | HONEYMAN CIPHER SOLUTIONS LLC | Method for securely distributing a conditional use private key to a trusted entity on a remote system |
5999622, | Nov 22 1995 | Microsoft Technology Licensing, LLC | Method and apparatus for protecting widely distributed digital information |
6003135, | Jun 04 1997 | SPEX TECHNOLOGIES, INC | Modular security device |
6021199, | Nov 14 1996 | Kabushiki Kaisha Toshiba | Motion picture data encrypting method and computer system and motion picture data encoding/decoding apparatus to which encrypting method is applied |
6170060, | Oct 03 1997 | Audible, Inc | Method and apparatus for targeting a digital information playback device |
6289454, | Jun 29 1998 | III Holdings 6, LLC | Memory configuration which support multiple cryptographical algorithms |
6330675, | Feb 13 1998 | Microsoft Technology Licensing, LLC | System and method for secure transfer of digital data to a local recordable storage medium |
6367019, | Mar 26 1999 | Microsoft Technology Licensing, LLC | Copy security for portable music players |
6385596, | Feb 06 1998 | Microsoft Technology Licensing, LLC | Secure online music distribution system |
6389534, | Jun 30 1997 | Meta Platforms, Inc | Cryptographic policy filters and policy control method and apparatus |
6577735, | Feb 12 1999 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | System and method for backing-up data stored on a portable audio player |
6751321, | Apr 24 1997 | Kabushiki Kaisha Toshiba | Digital data reproduction device |
6950941, | Sep 24 1998 | SAMSUNG ELECTRONICS CO , LTD | Copy protection system for portable storage media |
20010016836, | |||
20010042043, | |||
20020077984, | |||
20050021477, | |||
CN1205479, | |||
JP10013784, | |||
JP10013808, | |||
JP10178421, | |||
JP1246979, | |||
JP2000187935, | |||
JP4302595, | |||
JP6189262, | |||
JP6326882, | |||
JP7295892, | |||
JP7297951, | |||
JP8006879, | |||
JP8055164, | |||
JP8069419, | |||
JP8077706, | |||
JP8107412, | |||
JP8125651, | |||
JP8130516, | |||
JP8329011, | |||
KR19970057968, | |||
KR1998081704, | |||
WO27067, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 25 2000 | CHA, GHUN-UP | LG Electronics Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 024612 | /0536 | |
Apr 25 2000 | KANG, MYEONG-JOON | LG Electronics Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 024612 | /0536 | |
Apr 25 2000 | JUNG, HAN | LG Electronics Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 024612 | /0536 | |
Oct 15 2008 | LG Electronics Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Feb 04 2014 | ASPN: Payor Number Assigned. |
Jun 11 2018 | REM: Maintenance Fee Reminder Mailed. |
Dec 03 2018 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Feb 01 2014 | 4 years fee payment window open |
Aug 01 2014 | 6 months grace period start (w surcharge) |
Feb 01 2015 | patent expiry (for year 4) |
Feb 01 2017 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 01 2018 | 8 years fee payment window open |
Aug 01 2018 | 6 months grace period start (w surcharge) |
Feb 01 2019 | patent expiry (for year 8) |
Feb 01 2021 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 01 2022 | 12 years fee payment window open |
Aug 01 2022 | 6 months grace period start (w surcharge) |
Feb 01 2023 | patent expiry (for year 12) |
Feb 01 2025 | 2 years to revive unintentionally abandoned end. (for year 12) |