Tiris based bios for protection of “copyrighted” program material

ABSTRACT

The invention consists of attaching or embedding a “TIRIS” transponder (or other RF or IR or barcode or other identifying device) physically into the center of the proposed DVD disk. Once a disk is input to a media player, the interrogation portion of the media player transmits an interrogation signal to the transponder located on the disk. Once empowered with the interrogation signal, the transponder accesses the predetermined address, code word, encryption algorithms, media type information, and copyright information from it&#39;s memory. Then the transponder transmits the address, the code word, encryption algorithms, media type information and copyright information to the interrogator, located within the media player, and the interrogator sends the transponder data stream to a conditional access management processor(CAMP). Simultaneously with the processing action of the CAMP, the interrogator instructs the player to access the data_word at the predetermined address on the disk and the player accesses the data_word on the disk. The media player only plays if there is a match between the read data_word and received code word and the received algorithm correctly decrypts the content of the media prior to decoding.

This application claims priority under 35 USC § 119 (e) (1) ofprovisional application No. 60/033,543, filed Dec. 20, 1996.

FIELD OF THE INVENTION

This invention relates in general to the use of RF-ID systems forsecurity purposes and more specifically for securing the intellectualproperty value of copyrighted material.

BACKGROUND OF THE INVENTION

RF-ID systems are increasingly being used for more and a wider range ofapplications. In a typical RF-ID system, an interrogator transmits aninterrogation signal, to a transponder, within read range of theinterrogator, and the transponder responds by transmitting it'sidentification number either by backscattering the interrogation signal,in a full duplex mode, or by the transponder actually transmitting it'sidentification signal after being powered up by the interrogation signalin a half duplex mode. RF-ID technology has found a niche in thesecurity market. Transponders are easily attached to security badges,toll tags, or gate passes to allow/prohibit access or even provideautomatic billing services, i.e. toll roads and parking garages, andreaders are as readily constructed into toll booths, and doorways. On aneven smaller scale, RF-ID systems can provide security and trackingcapabilities for a wide variety of goods. Warehouses, libraries, andmanufacturing plants are all potential venues with regard to thetracking aspect of RF-ID systems. However, with respect to the securityaspect of RF-ID systems, the tracking and security of Secret or TopSecret government documents, is one of the areas which focuses onallowing or prohibiting access to a physical object, i.e. document. Aneven further extension from tracking and securing an object, is to allowonly “original” copyrighted objects, i.e. Digital Video Disk (DVD) andDigital Videocassette (DV) to be played on players, i.e. DVD players.

The current methodologies available for exercising copyright/anti-tapeprotections can be characterized as mostly deterrents constitutinglittle more than “Warning Labels”. This program material is mostlyanalog, “branded” multimedia content such as prerecorded VHS tapes ofmajor studio motion pictures, CDs, cassettes, broadcast movies viacable/satellite channels, etc. Recording artists, major studios and thelike have tolerated such inadequate safeguards because until recentlythe copied product resultant was degraded in quality sufficiently suchthat it could not duplicate the quality of the original Master materialitself. In fact, there is a government act, the HRA ACT of 1992 whichallows one analog copy of a copyrighted work to be made and played at atime (i.e., if you leave your cassette in the car and it melts, the ACTallows you to make another copy for your use, but it does not permit themaking of several copies for sale).

The explosion of removable digital media in the marketplace today hasincreased the convenience of storing and using such devices for a widevariety of publication purposes. In particular optical disk mediarepresents a relatively low cost method of publishing mass quantities ofdigital data and information. The nature of this “published” or compiledinformation can vary significantly, from movie entertainment to games,to interactive training, to X-rays or other image files. The copying ofoptical disk media is the most difficult form of media copyrightviolation to protect against since making optical copies of an originaldisk also copies the protection schemes onto subsequent counterfeitmedia. In addition, if the protection scheme is digital, hackers may beable to get around the security and circumvent the protection. Unlikeanalog copies, due to the intrinsic nature of “perfect” digital copies,the duplicates cannot be differentiated from the originals.Additionally, the redistribution and or reformatting of these copies inan unauthorized manner represents a further threat of revenue loss andmisrepresentation of the legal rights of the owners'authentic property.

In one solution to the optical disk counterfeit problem, proposed inco-pending application Ser. No. 60/016,745, filed on May, 2, 1996 andassigned to Texas Instruments Inc, TIRIScypher is introduced wherein aTIRIS transponder is embedded into the media and upon insertion of themedia into a media player, the media player interrogates the transponderwhich responds with an address of a data-word, located on the mediaitself, and a code word. The media player then locates the data-word atthat particular address on the media and if there is a match between thereceived codeword and read data-word, then the media player will playthe media. TIRIScypher has the ability to deter production ofcounterfeit disks because the TIRIS transponder cannot be opticallycopied and the encryption code data is not easily hacked especially dueto zero knowledge techniques that can be employed using the RF linkbetween transponder and transceiver. This code data, if deployed using afull integrated architecture, can be prevented from appearing on thehost machine's data bus altogether, thereby isolating it from externalaccess, hacking and/or corruption. The problems associated with thissolution are that the largest portion of the financial burden lies withthe players or periphery devices which perform some function on thecopyrighted media and the greatest benefit would be conferred upon thecopyright holders, i.e. the Motion Picture Association of America. Forexample, if the media were Digital Video Disks, the only cost increaseto the copyright holders would be the addition of a transponder to themedia itself, maybe $1. On the other hand, the periphery devicemanufacturer must add an interrogator to it's DVD player and possiblyadditional circuitry which allows for the read of a particular addresson the disk at a potential incremental cost of hundreds of dollars tothe standard DVD player. Therein lies the issue.

In matters where such publication methods are employed on copyrighted orsensitive source data, some improved method of guaranteeing the controland distribution of such data needs to be employed that is independentof the actual data contained on the data tracks of the media. Further, amethod of insuring use of the copyrighted works should both be robustand highly resistant to either software or hardware hacking. A breachwould render the protection system useless and expose the rightfulowners to copyright infringement or the like. Therefore, a totallyeffective system should provide dimensions of counterfeit protection,and copy control capability.

SUMMARY OF THE INVENTION

The system of protection described below offers additional potentialbenefits for all stakeholders in the value chain, including inventorycontrol, pay-per-use pricing transactions, tiered level access controland demographic data gathering. The unique nature of the TIRIS cypher(Texas Instruments Registration and Identification System) approachenables new levels of sophistication in the control and tracking ofpackaged media material, in order to allow copyright owners to addgreater value and protection. TIRIS cypher is a flat batterylessradio-frequency semiconductor transponder package which is bonded orembedded to the center of a copyrighted DVD media. Encrypted with avariety of encoded and/or scrambled information bits that can only beread with a TIRIS transceiver, located in the player, the disk ischecked for authenticity.

The invention consists of a hard disk drive architecture which includesa level of intelligence to be downloaded from the transponder into thehard disk drive. The periphery devices of the future will be able todistinguish which form of media has been inserted into the peripherydevice. For example, upon insertion of a DVD disk into a DVD player, theplayer would read the transponder located on the media device, evenbefore enabling the player, and that read would provide the BIOS,operating set-up, necessary to play the DVD disk. Where BIOS istraditionally located on the hard drive or in this example, in theplayer, having the BIOS located on the media element transfers theresponsibility of protecting the media against counterfeit reproductionsback to the copyright holders. Within the context of the BIOS, thecopyright holders would define many operating parameters such as thetype of media to be performed upon, how many copies, if any, areallowed, at what point in time the media is enabled, i.e. to handleregional releases etc. More specifically, the decryption key(s) and/orvarious algorithms reside on the transponder itself, thereby allowing aDVD player or drive to load such a decryption algorithm (or it'spointer) into it's resident flash ROM enabling a resident ConditionalAccess Management Processor (C.A.M.P.) to perform individual contentdependent decryption and/or descrambling, decoding, etc. from disk todisk.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a block diagram of a DVD player(ROM type for publishedmedia) plus the TIRIS cypher.

FIG. 2 shows a block diagram of a DVD RAM drive (Rewritable Optical)plus the TIRIS cypher.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

A TIRIS-like embedded transponder (flat and circular type . . . about 1″in diameter and about .=0.5 mm thick) can be implemented for variousdigital storage media during the media production phase. A single pagebaseline transponder may have from 256 bits to 512 bits of memory. Thesebits will be allocated to store at least a unique ID/serial #, a codeword, media type, decryption algorithm, copyright information, and an“encoded or encrypted” address location within the media itself etc.This disk address serves as a pointer to a specific data_word which isembedded anywhere within the disk's program material. This uniquedata_word contained on the disk within the digital data stream (not yetaccessible to the viewer of the program content until afterauthentication is verified) is then compared with a preassigned codeword located in the memory of the transponder itself. If decryption ofthe code word and other transponder response signals and continuousdecryption of the DVD bit stream (including the data_word stored at thepredetermined address) occurs and there is there is a match between themedia data_word and the code word, then authentication is complete,affording play access to the content.

However, if the match between the data-word and code word fails and/orthe algorithm transmitted by the transponder fails to decrypt the DVDbit stream such that decoding is not possible, then several approachesmay be taken. Most simply, the DVD will not be played. A signal will besent to either eject the failed disk or reconfigure the Video ports suchthat the output port is disabled or otherwise reconfigured.

The invention will be described with more specificity herein. A harddisk drive architecture which includes a level of intelligence to bedownloaded from the transponder into the hard disk drive is disclosed.The periphery devices of the future will be able to distinguish whichform of media has been inserted into the periphery device. For example,upon insertion of a DVD disk into a DVD player, the player would readthe transponder located on the media device, even before enabling theplayer, and that read would provide the BIOS, operating set-up,necessary to play the DVD disk. Where BIOS is traditionally located onthe hard drive or in this example, in the player, having the BIOSlocated on the media element transfers the responsibility of protectingthe media against counterfeit reproductions back to the copyrightholders. Within the context of the BIOS, the copyright holders woulddefine many operating parameters such as the type of media to beperformed upon, how many copies, if any, are allowed, at what point intime the media is enabled, i.e. to handle regional releases etc. Morespecifically, the decryption key resides on the transponder itself,thereby allowing a DVD player or drive to load such a decryptionalgorithm (or it's pointer) into it's resident flash ROM enabling aresident Conditional Access Management Processor (C.A.M.P.) to performindividual content dependent decryption from disk to disk. In this way,the responsibility for the complexity or lack thereof of the mediacontent encryption, i.e. from none to 32 bits, is transferred back onthe copyright owners who define the encryption details when the media isbeing manufactured. Therefore the amount of security desired can bepersonally defined by each copyright holder.

The CAMP comprises at least the following elements, as depicted in FIGS.1 and 2, a conditional access logic unit and a TIRIS transponder FLASHROM buffer. A conditional access logic unit is found in the CAMP forreceiving the DVD bit streams which include the TIRIS dataword locatedat some predetermined address and all the digital content of the DVDfrom the disk reader. Even before the reading of the disk, theinterrogator within the disk reader is interrogating the transponderlocated on the disk and the transponder is transmitting back to theinterrogator the transponder response data stream comprising the CodeWord, address of the data-word, media type information, decryptionalgorithm and copyright information etc. or in other words the BIOS orset-up information for the Conditional Access Managementprocessor(CAMP). Within the CAMP, the transponder response data streamis stored in a FLASH ROM buffer which supplies a data decryptionprocessor with the stored data for preparing the player toprocess(decrypt, descramble and decode) the digital media.

The preparation of the player comprises a variety of tasks includingsetting up the MPEG-2 decoder to properly decode the digital media,configuring the ports to either eject a failed disk or reconfigureexisting ports to inhibit play, and if the media is of a legacyvariety(predates TIRIS implementation of disks), then allowing play inthe conditional legacy mode of operation. Even setting up the MPEG-2decoder takes steps because depending upon which type of media ispresented, the MPEG-2 processor must be set up differently. For example,if the media element is a digital video disk(DVD), the MPEG-2 decodermust be set up much differently than if decoding a digital music disk.In addition, the decryption algorithm defines the algorithm used todecrypt the digital content of the media, the media type informationprovides distinct set-up parameters for the processor depending upon thetype of media being played, and the copyright information provides , forexample, the number of plays allowed. Upon the transponder response datastream being input to the data decryption processor, the entiretransponder response data stream in addition to the entire DVD bitstreams(including the embedded data-word) are descrambled or decryptedprior to decoding the bit streams. A FLASH ROM buffer is the buffermemory of choice due to the capability of FLASH ROM to blow or program alarge amount of data at once. Therefore, a portion of the Drive/ServoDigital Signal Processor (DSP) can act as a “vessel” of sortsprescribing the processing dictated by the content provider(i.e. MGM) toperform the decryption or descrambling prior to decoding(i.e. MotionPictures Experts Group (MPEG)-2).

Alternatively, the illegally copied disk would be recognized withoutTIRIS and no decryption algorithm would be available to descramble theMPEG data stream. Additionally, instructions within the periphery devicecould force the disk to be ejected upon failing to meet the requiredlegacy(prior to TIRIScypher) or TIRIS authentication tests. Also, outputport disabling and or interface reconfiguration may be employed upondetection of either counterfeit media, or time/use count expired mediaor media intended for controlled or limited distribution(time or usagebased).

A legally recorded but non-encrypted disk could be allowed to playbackthe MPEG data stream, however not through the hardware MPEG decoderbuilt into the drive, but rather through MPEG software decoding ifavailable elsewhere, i.e. in the host machine microprocessor. This wouldserve to encourage Hard Disk Drive (HDD) manufacturers to include theTIRIS based configuration hardware in their drive designs in order toplayback Motion Picture Association of America (MPAA) sanctioned media(copyprotected with decryption data embedded in the media'stransponder), however, would allow other drives to be built for lesscost that would rely on software decoding and could not deal withfurther encryption except if a decryption code is carried in softwareelsewhere.

An example of an intended bit allocation scheme of the transponderresponse data stream is as follows. Note that in this example, the useof the first 32 bits of the transponder response datastream may compriseproduct tracking data which could provide detailed logging informationregarding the manufacturing and inventory control of copyrightedmaterial. Just some examples noted, are product SKU, Batch #, Date andLocation Code. The central 160 bits of data are dedicated to the 64 bitphysical address of the data_word on the DVD itself and the next 64 bitsare assigned to a TIRIS transponder code word. The final 32 bitscomprise a 32 bit algorithm used to encrypt the entire transponderresponse data stream as well as the entire DVD bit stream. Continuingwith this example, the last 64 bits (as shown in FIG. 1) could bereserved to contain post-manufactured rewritable data, such as therun/elapsed viewing; time counter to count the number of times the mediahas been played or used, i.e. to enable pay-per-view pricing, or limitthe number of authorized runs for a run-specific pricing, and also storethe number of “write” cycles. More advanced readers could make use ofthese bits to provide remotely controlled polling capability, as thetracking of media usage moves away from broadcast only based viewingmeasurement organizations such as Nielson, as well as the after ticketsales. Additionally, real-time usage data, trends from the transactionaudit trail created by this system, would enable the user real-timeNielson like(audience/user preference tracking) rating for feedback tothe copyright, content owners, retailers OEMs etc. The player with theTIRIS system can be polled real-time (through the two-way communicationlink of the network card) to provide appropriate advertising feeds tothat target audience. This is an extra benefit to the advertisers forproduct branding, promotions, etc.

An additional feature for the DVD or media player owner would be toutilize the TIRIS transponder information along with media basedinformation to create a personal media content library managementfunction.

To further protect the integrity of the security scheme, the TIRISreader/interrogator function and the matching process must be completedinternally i.e. on the internal communications bus of the interrogationIC. The Motion Pictures Expert Group (MPEG) decoder could also belocated within the intelligence of the media player as well, so thatattempts to break the code and to defeat the protection would beextremely difficult(no digital bits ‘in the clear’ to handle).Integration of the TIRIS interrogator/reader and MPEG decoder on asingle IC chip is highly desirable since such configurations would helpassure copyright protection.

In the event of a successful authentication, the usage and otheruser-bit counters, and the writable elements of the transponder can beaccessible in the value chain, such as retailers, renters, resellers,end-users and content providers or their agents, i.e. intellectualproperty/royalty collection third parties or agents, etc. In the eventof a “branded” content non-match of authenticity, the DVD player couldindicate detection of an “unauthorized program copy”. The TIRIS readerthen would switch to a prerecorded copyright warning/notice location,possibly stored as an on screen display (OSD) message.

For high end applications i.e. using read/write, multipage transponder,inventory control, logistic and retail management functionality ispossible, with implementation benefiting retailers, equipmentmanufacturers (hardware OEMs), resellers and redistributors also areality. The “prelocated origin data” such as the date/place ofmanufacture, edition/catalogue numbers, may be embedded and encryptedinto the DVD to provide excellent legacy system override for olderalready owned legitimate media. The upcoming DVD players are expected tobe able to differentiate between various media types.

If the media type is determined to be an earlier type (as in music CDsor CD ROMs), the DVD player/TIRIS reader of course would not need todecode an MPEG data stream and therefore would allow normal playback ofsuch material in the legacy mode of operation. In the legacy mode ofoperation, as shown in FIGS. 1 and 2, once the CAMP recognizes the mediaas a legacy type of media, the media content fails to be decoded and acommand is issued to the Servo/Processor to play the media. In thealternative case of an original and genuine non-TIRIScypher DVD media,(i.e. in circulation before TIRIS cypher encrypted material), theplayer/reader would detect earlier type excluded DVD embedded date codesand grant a limited number of play accesses. Beyond this number ofplays, (tracked with run counter in transponder userbit data field, seeFIG. 1), a trade-in and upgrade message could be displayed for thepurchase of conforming media or the payment of an incremental ‘use’license.

This scheme would effectively deliver pirated media material to thecopyright owners for further action and allow legitimate owners to havetheir material conformed, while supplying valuable demographicinformation to copyright owners. The foregoing combination of hardware,firmware/software sub-system methodology may be referred to as the“TIRIScypher subsystem” for copyright protection of branded content.

Another major copyright use problem is one of making a digital or analogcopy of a disk onto another media type. Here again if the user isemploying a legal copyright protected or even an unprotected disk, it isassumed that he will have full access to the MPEG data stream. Accordingto another embodiment of the invention, the best deterrent to copyingthis digital data is a combination of using a 1394 data bus withrestricted access to data that is a digital recording device. This canbe built into the memory device registers of the logical layer of thedestination peripherals, an existing part of the IEEE specification forISO-1394. Another method which can be implemented in tandem is to onlyoutput fully decoded MPEG streams on this 1394 bus so that it would beimpractical or economically unjustifiable to a large fixed storagedevice or multiple removable media as a suitable “digital bucket”.

FIG. 2, shows a rewritable or recordable(RAM) version of the SystemBlock of FIG. 1. The RAM version functions similarly to FIG. 1.

The invention outlined below addresses the copyright and secured accessprotection issues for the DVD, next generation compact/optical disks,which would essentially be storing high value, high quality, digitallycompressed content. For the purpose of simplicity, the discussion hereis limited to DVD type material only, however, the scope of theinvention herein is much broader, which may include other packaged mediatypes with associated players/appliances. In addition, the transpondercould have read-only or read/write capability, with single or multiplepage bit capacity with the cost constraints and/or system requirementsactually defining those parameters.

What is claimed is:
 1. A method of insuring only copyrighted material isplayable or usable in any digital media system comprising the steps of:integrating a radio-frequency interrogator with a media player, havingI/O ports, for transmitting an interrogation signal to a transponder andfor receiving a transponder response signal in response; attaching atransponder to a predetermined media element wherein said media elementhas a digital media content stream and wherein said transpondertransmits a transponder response signal comprising decryption algorithmsin response to receipt of said interrogation signal; receiving atransponder response signal and providing said decryption algorithms toa processor; configuring said processor according to said decryptionalgorithms in order to process said digital media content stream.
 2. Themethod according to claim 1, wherein said configuring comprises thesteps of: downloading said decryption algorithms to a non-volatilememory wherein the output of said non-volatile memory is input to saidprocessor.
 3. The method according to claim 2, wherein said non-volatilememory is a Flash ROM.
 4. The method according to claim 1, wherein saidconfiguring comprises the steps of: providing information to configuringthe I/O ports.
 5. A method of insuring only copyrighted material isplayable or usable in any digital media system comprising the steps of:integrating a radio-frequency interrogator with a media player, havingI/O ports for transmitting an interrogation signal to a transponder andfor receiving a transponder response signal in response; attaching atransponder to a predetermined media element wherein said media elementhas a digital media content stream and wherein said transpondertransmits a transponder response signal comprising pointers fordecryption algorithms in response to receiving said interrogationsignal; receiving a transponder response signal and providing saidpointers for encryption algorithms at some predetermined address to saidmedia player; reading said encryption algorithms at said predeterminedaddress or some predetermined location and providing them to aprocessor; configuring said processor according to said decryptionalgorithms in order to process said digital media content stream orprovide information on access to configuring the I/O ports.
 6. Themethod of claim 5, wherein said configuring of said processor comprisesthe steps of: providing instructions to a processor on how to configureitself to play or use the media element.
 7. The method according toclaim 5, wherein said configuring comprises the steps of: downloadingsaid decryption algorithms to a non-volatile memory wherein the outputof said non-volatile memory is input to said processor.
 8. The methodaccording to claim 7, wherein said non-volatile memory is a Flash ROM.9. The method according to claim 1, wherein said configuring comprisesthe steps of: providing information to configuring the I/O ports.