(12) United States Patent (10) Patent No.: US 8.422,684 B2 Jin Et Al
Total Page:16
File Type:pdf, Size:1020Kb
USOO8422684B2 (12) United States Patent (10) Patent No.: US 8.422,684 B2 Jin et al. (45) Date of Patent: Apr. 16, 2013 (54) SECURITY CLASSES IN A MEDIA KEY 5,345,505 A 9, 1994 Pires BLOCK 5,412,723 A 5/1995 Canetti et al. 5,592,552 A 1, 1997 Fiat (75) Inventors: Hongxia Jin, San Jose, CA (US); 2. A 8. E" al. Jeffrey Bruce Lotspiech, Henderson, 5,651,064 A 7, 1997 Newell NV (US) 5,668,873. A 9, 1997 Yamauchi 5,680,457 A 10, 1997 Bestler et al. (73) Assignee: International Business Machines (Continued) Corporation, Armonk, NY (US) FOREIGN PATENT DOCUMENTS (*) Notice: Subject to any disclaimer, the term of this WO WO99, 19822 4f1999 patent is extended or adjusted under 35 WO WOOOf 48190 8, 2000 U.S.C. 154(b) by 892 days. WO WOO1/22406 3, 2001 (21) Appl. No.: 12/192,962 OTHER PUBLICATIONS U.S. Appl.pp No. 12/131,073, filed Mayy 31, 2008, Bellwood et al. (22) Filed: Aug. 15, 2008 U.S. Appl. No. 12/131,074, filed May 31, 2008, Lotspiech. (65) Prior Publication Data (Continued) US 201O/OO4O231 A1 Feb. 18, 2010 Primary Examiner — Jung Kim Assistant Examiner — Thomas Ho (51) Int. Cl (74) Attorney, Agent, or Firm — Donald L. Wenskay; H04L 9/00 (2006.01) Moh ed Kashef (52) U.S. Cl USPC ............................................. 380/277; 380/45 (57) ABSTRACT (58) Field of Classification Search .................. 380/277,38O/45 According to one embodiment of the present invention, a See application file for complete search histo method for broadcast encryption with security classes in a pp p ry. media key block is provided. In one embodiment the method (56) References Cited includes receiving encrypted media of a first and a second class, where the media includes a common media key block, U.S. PATENT DOCUMENTS in a device of a first class and in a device of a second class. A 4,041,249 A 8, 1977 Matz et al. first media key is calculated from the common media key 4,634,807 A 1/1987 Chorley et al. block in the device of a first class. A first media key precursor 4,694,491 A 9, 1987 Horne et al. is calculated from the common media key block in the device 4,864,616 A 9, 1989 Pond et al. of a second class. The first media precursor may be used to 5,058,162 A 10, 1991 Santon et al. 5,065,429 A 11/1991 Lang decrypt media of a first class. The first media precursor may 5,081,677 A 1/1992 Green et al. also be used to calculate a second media key in the device of 5,177,791 A 1/1993 Yeh et al. a second class to decrypt content of a first class. 5,247,497 A 9, 1993 Cohn 5,272,752 A 12/1993 Myers et al. 14 Claims, 6 Drawing Sheets on 162 Class A Content with Common media block Player C 108 Device Key/MKB Processor Class B Content with Common media block 110 Class C COntent with Decrypted Common Class B media Content block Decrypted Class C Content US 8,422,684 B2 Page 2 U.S. PATENT DOCUMENTS 7,380,137 B2 5/2008 Bell et al. 7,392,392 B2 6/2008 Levy 5,708.632 1, 1998 Totsuka et al. 7,502,933 B2 * 3/2009 Jakobsson et al. ............ 713, 172 5,734,719 3, 1998 Tsevdos et al. 7.555,129 B2 * 6/2009 Yamamoto et al. ........... 38O,277 5,754,648 5, 1998 Ryan et al. 7.590,238 B2 * 9/2009 Kamijoh et al. ................ 380.45 5,754,649 5, 1998 Hasebe et al. 2002.0003881 A1 1/2002 Reitmeier et al. 5,796,824 8, 1998 Hasebe et al. 2002fOO44320 A1 4/2002 Pfeiffer et al. 5,910,987 6, 1999 Ginter et al. 2002/0104001 A1 8/2002 Lotspiech et al. 5,949,885 9, 1999 Leighton 2002/014 1582 A1 10, 2002 Kocher et al. 6,020,833 2, 2000 Herz et al. 2003/0070.083 A1 4/2003 Nessler 6,061.451 5, 2000 Muratani et al. 2003. O169885 A1 9, 2003 Rinaldi 6,118,873 9, 2000 Lotspiech 2003/0220921 A1 1 1/2003 Fagin et al. 6,134,201 10, 2000 Sako et al. 2004.0034787 A1 2/2004 Kitani 6,209,092 3, 2001 Linnartz 2004/0098593 A1 5, 2004 Muratani 6,285,774 9, 2001 Schumann et al. 2004/O111611 A1 6/2004 Jin et al. 6,289.455 9, 2001 Kocher et al. 2004/O128259 A1 7/2004 Blakeley et al. 6,347,846 2, 2002 Nakamura 2004/O133794 A1 7/2004 Kochner et al. 6,370,272 4, 2002 Shimizu 2004/O153941 A1 8, 2004 Muratani 6,381,367 4, 2002 Ryan 2005, 0021568 A1 1/2005 Pelly 6,434,535 8, 2002 Kupka et al. 2005/OO9711.0 A1 5/2005 Nishanov et al. 6,442,108 8, 2002 Kurihara et al. 2005, 0141704 A1 6/2005 Van Der Veen 6,442,626 8, 2002 Smola et al. 2005/028361.0 A1 12/2005 Metios et al. 6,535,858 3, 2003 Blaukovitsch et al. 2006.0056695 A1 3/2006 Wu et al. 6,556,679 4, 2003 Kato et al. 2006/0085343 A1 4/2006 Lisanke et al. 6,563,937 5/2003 Wendt 2006, O136728 A1 6/2006 Gentry et al. 6,587,949 T/2003 Steinberg 2006/0239503 A1 10, 2006 Petrovic et al. 6,604,072 8, 2003 Pitman et al. 2006/028.2676 A1 12/2006 Serret-Avila et al. 6,609,116 8, 2003 Lotspiech 2007, OO67242 A1 3/2007 Lotspiech et al. 6,636,966 10, 2003 Lee et al. 2007, OO67244 A1 3/2007 Jin et al. 6,738,878 5, 2004 Ripley et al. 2007/O165853 A1 7/2007 Jin et al. 6,760.445 T/2004 Schwenk et al. 2007/0174637 A1 7/2007 Lotspiech et al. 6,760,539 T/2004 Asada et al. 6,775,779 8, 2004 England et al. OTHER PUBLICATIONS 6,802,003 10, 2004 Gross et al. 6,832,319 12, 2004 Bell et al. U.S. Appl. No. 12/131,076, filed May 31, 2008, Jin et al. 6,839,436 1/2005 Garay et al. U.S. Appl. No. 12/143,061, filed Jun. 20, 2008, Jin et al. 6,856,997 2, 2005 Lee et al. U.S. Appl. No. 12/143,658, filed Jun. 20, 2008, Jin et al. 6.857,076 2, 2005 Klein U.S. Appl. No. 12/192,962, filed Aug. 15, 2008, Jin et al. 6,888.944 5/2005 Lotspiech et al. Celik et al., "Collusion-resilient fingerprinting using random 6,901,548 5/2005 Hattori et al. prewarping.” Image Processing, 2003, ICIP 2003, Proceedings, 2003 6,912,634 6, 2005 Ripley et al. 6,947,563 9, 2005 Fagin et al. International Conference vol. 1, Sep. 14-17, 2003 pp. I-509-12, vol. 6,993, 135 1, 2006 Ishibashi ....................... 38O,277 1. 6,999,947 2, 2006 Utsumi et al. Deguillaume et al., "Countermeasures for unintentional and inten 7,007,162 2, 2006 Lotspiech ..................... T13/151 tional video watermarking attacks.” Conference SPIE Int. Soc. 7,010, 125 3, 2006 Lotspiech et al. Opt. Eng. (USA), Jan. 24-26, 2000, vol. 3971, p. 346-357. 7,036,024 4, 2006 Watson Fernandez-Munoz et al., “Fingerprinting schemes for the protection 7,039,803 5, 2006 Lotspiech et al. of multimedia distribution rights. Upgrade, Security in e-Com 7,046,808 5, 2006 Petrovic et al. merce, v. III, n. 6, pp. 36-40, Dec. 2002, http://www.cepis-upgrade. 7.057,993 6, 2006 Barnard et al. org/issues/2002/6/upgrade-vII-6.pdf. 7,082,537 T/2006 Muratani Hagiwara et al., “A short random fingerprinting code against a small 7,120,901 10, 2006 Ferri et al. number of pirates' Applied Algebra, Algebraic Algorithms and 7,155,591 12, 2006 Ripley et al. 7,162,646 1/2007 Wu et al. Error-Correcting Codes, 16' International Symposium, AAEECC 7,215,629 5/2007 Eppler 16. Proceedings (Lecture Notes in Computer Science vol. 3857) pp. 7,260,834 8, 2007 Carlson ............................. T26/4 193-202 (Feb. 2-24, 2006). 7,283,633 10, 2007 Asano et al. Seol et al., “A Scalable fingerpriting scheme for tracing traitors/ 7,296,159 11/2007 Zhang et al. colluders in large scale contents distribution environments.” Intelli 7,305,711 12, 2007 Ellison et al. ................... 726/29 gent Systems Design and Applications, 2005. ISDA 2005, Proceed 7,319,752 B2 1, 2008 Asano et al. ings, 5' International Conference Sep. 8-10, 2005 pp. 228-223. 7,346,169 B2 3, 2008 Asano et al. 7,380,132 B2 5/2008 Sako et al. * cited by examiner U.S. Patent Apr. 16, 2013 Sheet 1 of 6 US 8,422,684 B2 ----------15 License Content provider agency |Unified media key | block module Egypt COntent 90 Title key Media module 50 Variant key table 45 Media player module 35 Unified broadcast encryption System U.S. Patent Apr. 16, 2013 Sheet 2 of 6 US 8,422,684 B2 U.S. Patent Apr. 16, 2013 Sheet 5 of 6 US 8,422,684 B2 164 N. 166 Receive a Common media key block in encrypted Content of a first class and in encrypted Content of a Second class in devices of a first class and of a SeCOnd Class, respectively.