Method for controlling access to digital content

ABSTRACT

Method for utilizing digital content is provided. The method includes controlling a throughput rate for utilizing the digital content by an accessing system, wherein the throughput rate is associated with information related to the digital content stored as a file.

CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application is related to U.S. patent application, Ser. No.______, Docket Number SDK0787.001US, entitled “SYSTEM FOR CONTROLLINGACCESS TO DIGITAL CONTENT”, filed on even date herewith, the disclosureof which is incorporated herein by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to digital content, and more particularly,to controlling access to digital content.

2. Background

Digital content (may also be referred to as data) is commonly used intoday's computing environment. Digital content may be stored on astorage device (also referred to as storage system), or distributed viaelectronic communication such as the Internet, Peer-to-Peer software,electronic mail, and others. The Internet and other communicationnetworks today enable various digital appliances and systems (may alsobe referred to as Accessing Systems) to interconnect and exchangedigital content. Accessing Systems may include without limitation,personal computers, laptop computers, tablet computers, personal digitalassistants (PDAs), mobile phones, MP3 players, DVD players, gamingconsoles, digital recording devices such as digital cameras, and others.

Depending on the type of application, digital content is typicallypre-processed prior to being utilized by an Accessing System. The term“pre-processing” (or “pre-processed”) as used herein can include anyoperation that is used to enable or assist viewing, playing, listeningto, reading, displaying, executing or accessing digital content. Someexamples of pre-processing include compressing and de-compressingoperations performed by a CODEC (compressor/de-compressor) module;decryption and encryption operations performed by a cryptographicmodule; and others. It is noteworthy that pre-processing as used hereindoes not depend on actual physical transfer of digital content from onelocation to another location.

Digital content is typically stored as an electronic file. A digitalcontent file (may also be referred to as a “file”) typically includesdata that can be viewed, listened to, read, played, executed, orotherwise utilized by an end user using an appropriate application ordevice. A digital content file may include an audio file, a video file,a multi-media content file, a software file, an electronic book, adocument, a computer game, a database, an application, or any other typeof digital content. There are different file formats for storing digitalcontent. For example, the MP3, Wav, RealAudio and other file formats maybe used to store audio files, while MP4, DIVX®, RealVideo and otherformats may be used for storing both audio and video files.

Typically, most digital content file formats may include a Bit Rate thatis associated with the digital content. The Bit Rate is the data oneneeds to pre-process within a unit of time. The pre-processing dependson the file format and the type of operation. For example, to play anaudio file, a certain amount of data is pre-processed to properlyexecute the audio file with minimal latency. If the audio file is an MP3file it may have a Bit Rate of 128 kbps. This means that 128k bit ofinformation is pre-processed for each second of encoded music. The BitRate may be fixed for a file, or may be variable. The Bit Rate may alsocorrespond to the quality of encoding for some applications, typically,higher the Bit Rate, better the quality.

Different digital content files may have different Bit Rates. Thedifference in Bit Rates typically results in different file sizes. Whendigital content is utilized, the Accessing System (for example, a mediaplayer) needs data at a speed equal to or faster than the Bit Rate. MostAccessing Systems use a memory buffer (or storage space) to storecontent for uninterrupted processing, i.e. data is received from astorage system and then stored by the Accessing System in a memorybuffer. When data is not received fast enough, then the Accessing Unitmay have to interrupt processing (for example, playback) to buffer data.

Digital content may have some value to an entity, individual, businessor a combination thereof. Hence, access to digital content may belimited to authorized applications, devices or a combination thereof,for enabling and safeguarding transactions involving digital content.

Digital Rights Management (DRM) may be used to protect digital content.DRM allows one to limit access to digital content by associatingspecific permissions to content. For example, a user may be prohibitedfrom making a copy of, distributing, modifying, selling, or performing acopyrighted digital content file, without receiving proper permissionfrom the copyright owner. Examples of copyrighted digital contentinclude commercial movies, commercial music, electronic books, software,computer games, and the like. Different DRM standards may be used fordifferent content types and formats and may provide different methods todistribute digital content and the associated permissions.

Memory devices such as memory cards, Smart cards, SIM (subscriberidentity module) cards, embedded memory chips and others are becomingpopular for storing digital content. Such devices have a maximum readand write speed that is determined by the underlying related technologysuch as the type of memory used (for example, NAND flash, NOR flash,EEPROM and others) or the type of memory controller. These memorydevices can often release digital content to an Accessing System at aspeed greater than a minimum speed at which the Accessing System needsaccess to the digital content for properly utilizing the digitalcontent.

Digital content owners and providers seek to prevent digital content“piracy”, i.e. unauthorized use and distribution of digital content.Digital content owners such as recording companies and movie studioshave not been very successful in solving piracy related problems.Therefore, there is a need for a method and system to discourage piracywithout affecting authorized distribution and use of digital content.

SUMMARY OF THE INVENTION

In one embodiment, a method for utilizing digital content is provided.The method includes controlling a throughput rate for utilizing thedigital content by an accessing system, wherein the throughput rate isassociated with information related to the digital content stored as afile.

In another embodiment, a method for utilizing digital content isprovided. The method includes controlling a throughput rate forutilizing the digital content by an accessing system, wherein thethroughput rate is associated with an access parameter that is used tocontrol access to the digital content stored as a file.

In yet another embodiment, a method for utilizing digital content isprovided. The method includes controlling a throughput rate forutilizing the digital content by an accessing system, wherein thethroughput rate is associated with information related to the digitalcontent stored as a file and the throughput rate is used as a parameterto delay a pre-processing operation.

In another embodiment, a method for utilizing digital content isprovided, The method includes controlling a throughput rate forutilizing the digital content by an accessing system, wherein thethroughput rate is associated with information related to the digitalcontent stored as a file and the throughput rate is controlled by astorage system that is operationally coupled to the accessing system.

This brief summary has been provided so that the various embodimentsdisclosed herein may be understood quickly. A more completeunderstanding can be obtained by reference to the following detaileddescription of the various embodiments thereof in connection with theattached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing features and other features will now be described withreference to the drawings of the various embodiments. In the drawings,the same components have the same reference numerals. The illustratedembodiments are intended to illustrate, but not to limit the invention.The drawings include the following Figures:

FIG. 1A shows a block diagram of an Accessing System coupled to astorage system, according to one embodiment;

FIG. 1B shows examples of different types of storage systems used withan Accessing System, according to one embodiment;

FIG. 1C shows a block diagram of a system using a DRM Module, accordingto one embodiment;

FIG. 1D graphically illustrates controlling a Throughput Rate, accordingto one embodiment;

FIG. 2 shows a top-level block diagram of a Pre-Processing Module forcontrolling a Throughput Rate, according to one embodiment;

FIGS. 3 and 4 show process flow diagrams for applying delay to control aThroughput Rate, according to one embodiment;

FIG. 5 shows a process flow diagram for a DRM module controlling aThroughput Rate, according to one embodiment;

FIG. 6 shows an example of associating different Throughput Rates todifferent login accounts, according to one embodiment; and

FIG. 7 shows an example of controlling display of advertisement content,according to one embodiment.

DETAILED DESCRIPTION

Definitions:

The following definitions are provided as they are typically (but notexclusively) used in the computing environment, implementing the variousembodiments disclosed herein.

“Accessing System” (may also be referred to as a Host System or aRequesting System) means a system that requests digital content that canbe viewed, listened to, read, played, executed, or otherwise utilized bya user using an appropriate application or device. Accessing Systemincludes desktop computers, laptop computers, tablet computers, personaldigital assistants (PDAs), mobile phones, MP3 players, DVD players,gaming consoles, digital recording devices such as digital cameras, andothers.

“Bit Rate” means the amount of data that needs to be Pre-Processed by anAccessing System in a given unit of time. The Bit Rate may depend on anencoding type, format of stored digital content, content type, or acombination thereof. The Bit Rate may be fixed or variable.

“Data Rate” means the speed (for example, the number of bytes persecond) at which digital content is transferred from one location (forexample, a storage system) to another location (for example, anAccessing System), at any given time.

“Pre-Processed” (or “Pre-Processing”) means any operation for Utilizingdigital content. Some examples of Pre-Processing include compressing andde-compressing operations performed by a CODEC module; decryption andencryption operations performed by a cryptographic module; accessingcontent before it is used; and others.

“Pre-Processing Module” means a module, component or unit (usedinterchangeably throughout this specification) that performs aPre-Processing operation. The Pre-Processing Module may be implementedin hardware, software, or a combination thereof. Examples of aPre-Processing Module include a DRM module, a CODEC module, acryptographic module and others.

“Throughput Rate” means an average Data Rate within a time interval. TheThroughput Rate may be set or established to limit how much data isReleased to an Accessing System in a given time. The Throughput Rate canrepresent a maximum amount, average amount or a range of data that isReleased to an Accessing System.

“Released” means when an Accessing System is given access to digitalcontent for Utilizing the digital content. Released does not requireactual data transfer from one location to another location.

“Utilizing” (or Utilized”) means viewing, listening to, reading,playing, executing, or any other use of digital content, typically by anend user using an appropriate application or device. Typically, theseoperations are performed by an Accessing System.

The following provides an example of the foregoing defined terms. A userusing a laptop computer (Accessing System) may want to play (Utilize) anaudio/video file (digital content). The laptop computer may use asoftware application (for example, Windows Media Player available fromMicrosoft Corporation) to play the audio/video file. The laptop computerPre-Processes the digital content at a certain rate (Bit Rate) toproperly play the audio/video file. Before the digital content isReleased to the laptop computer; a cryptographic module (Pre-ProcessingModule) may decrypt (Pre-Process) the audio/video file.

In one embodiment, a Throughput Rate controls the rate at which digitalcontent is made available (Released) to an application. The ThroughputRate may be implemented at an input/output (I/O) level (i.e. implementedby a storage system) or by a Pre-Processing Module. In one embodiment,the Throughput Rate may be applied in a plurality of ways, for example,by using specific commands, a DRM content license, access parameters(for example, login credentials and security keys (for example, cipherkeys)) and others, as described below.

In one embodiment, a storage system controls the rate at which a datastream is Released to an Accessing System. The Throughput Rate definesthe rate at which data may be Released to the Accessing System in agiven time interval. The storage system notifies the Accessing Systemwhen data is available or unavailable and hence effectively controls howmuch data can be Utilized in a given time.

In another embodiment, the Throughput Rate depends on at least oneparameter that relates to digital content. For example, the ThroughputRate may depend on the Bit Rate. If the Bit Rate is variable, then anaverage Bit Rate value may be used to set the Throughput Rate. TheThroughput Rate may be equal to or higher than the Bit Rate.

The Throughput Rate sets an ideal maximum speed at which data isUtilized by the Accessing System. Thus, making an illegal copy wouldtake about as long as it takes to play (i.e. Utilize) an audio/videofile with almost the same inconvenience, for example, in recording anaudio/video file. Hence, controlling the Throughput Rate may deterdigital content piracy.

System Level Examples:

FIG. 1A shows a top-level block diagram of a generic system 100 where astorage system 105 controls the Throughput Rate, according to oneembodiment. The Throughput Rate may be determined or received by storagesystem 105, as described below.

System 100 includes an Accessing System 101 operationally coupled tostorage system 105 via an I/O link 102. Accessing system 101 typicallyincludes several functional components. These components may include aprocessor (may also be referred to as a central processing unit (CPU)),main memory, I/O devices and others. The main memory is coupled to theCPU via a system bus or a local memory bus. The main memory is used toprovide the CPU access to data and program information at executiontime. Typically, the main memory is composed of random access memory(RAM) circuits. A computer system with the CPU and main memory is oftenreferred to as a Host System.

Storage system 105 includes a memory controller 103 that interfaces withI/O logic 106 to transfer digital content to and from storage media (orcells) 104. I/O logic 106 may include an I/O memory buffer 107 wheredata is temporarily stored (or “buffered”) before being transferred toand from Accessing System 101.

In one embodiment, data is stored in I/O buffer 107 for a certainduration (i.e. a delay is added) to reach a target Throughput Rate. Thetarget Throughput Rate may depend on a type of Accessing System, type ofdigital content, intended use of digital content, and a combinationthereof. The duration may be longer than the period when data is held inan environment where the Throughput Rate is uncontrolled. Data is heldlong enough in I/O buffer 107 to meet the target Throughput Rate. Theduration (i.e. after a delay is added) is such that a minimum Data Ratebased on Accessing System 101 specifications is maintained to minimizeany interruption in data availability to Accessing System 101 due totime out or any other problems. If Accessing System 101 does not haveaccess to data beyond a certain duration then an application running onAccessing System 101 may declare a timeout, which may disrupt anoperation. For example, when an Accessing System 101 is playing an audiofile but it does not have enough data to play for certain duration(programmable), then the application may declare a timeout and abandonthe operation, or interrupt the playback operation to buffer data.

Controller 103 is aware of buffer 107 size and can keep track of time.Based on buffer 107 size and tracked time, Controller 103 refreshesbuffer 107 to meet the target Throughput Rate and hence, avoids timeoutproblems. Data is released from I/O buffer 107 in a time-controlledmanner to reach the target Throughput Rate.

A delay introduced to control the Throughput Rate may be based on aninternal clock speed for storage system 105, which helps determine thenumber of cycles storage system 105 has to wait to reach the targetThroughput Rate. The delay itself may be a variable value.

The various embodiments disclosed herein complement existing DRM systemsby providing another barrier to prevent digital content piracy. Becausetime is typically of the essence, a Throughput Rate controlled by astorage system (or a Pre-Processing Module) may discourage a would-bepirate by preventing access to digital content at a rate higher than arate specified for a digital content file. For example, even if storagesystem 105 is capable of transferring data at a higher rate, forexample, at approximately 20 megabytes per second, the storage systemcontrols the Throughput Rate, for example, to a slower average rate of128 kb/s, instead of 20 megabytes per second. Hence, 1 GB of audio datamay take about 10 hours to process using the controlled Throughput Rate,according to one embodiment. Without the using controlled ThroughputRate, it may only take about 50 seconds to access the 1 GB audio data.

In one embodiment, different types of storage systems (as describedbelow with respect to FIG. 1B) may be used to control the ThroughputRate. For example, storage system 105 includes without limitation,non-volatile memory devices (includes Smart Cards, SIM cards), harddisks, and others, including any storage system that can be accessed viaa state machine.

Different connection protocols (proprietary or standard) may be used tooperationally couple storage system 105 to Accessing System 101, forexample, universal serial bus (USB), SCSI; Bluetooth; Contactless,wireless and others. The adaptive aspects disclosed herein do not dependon any specific protocol or standard.

Storage system 105 may also use a special status signal or command tonotify Accessing System 101 to continue to wait for content as describedbelow. This reduces any timeout problems that may disrupt userexperience in Utilizing digital content.

FIG. 1B shows examples of different types of storage systems 108, 111,113 and 115 that can interface with Accessing System 101. Application101A running on Accessing System 101 Utilizes digital content that isstored in any one of the storage systems. Application 101A will dependon the type of digital content and its intended use. One example, ofApplication 101A is the Windows Media Player to play audio/videocontent.

Storage system 108 may be a hard disk that sends and receives data viaI/O link 109 and uses a dedicated link 110 (shown as I/O RDY 110) forsending and receiving commands. Storage system 108 uses link 110 tonotify Accessing System 101 of a “Busy State”. The Busy State indicatesto Accessing System 101 that storage system 108 is not ready to receivea new command, or to send or receive data.

Storage system 111 may be a non-removable, non-volatile memory system,for example, an iNAND based memory system. Storage system 111 uses I/Olink 112 to notify Accessing System 101 of a Busy State and for I/Ooperations (for example, sending and receiving data).

Storage system 113 may be a removable, non-volatile memory device and isoperationally coupled to Accessing System 101 via connector 114A.Storage system 113 uses I/O link 114 for I/O operations and fornotifying Accessing System 101 of a Busy State. Storage system 113 maybe based on Secure Digital (SD), Multi-Media Card (MMC) or any othernon-volatile memory standards.

There are currently many different types of non-volatile memory cardsthat are commercially available, examples being the CompactFlash (CF),the MMC, SD, miniSD, Memory Stick, SmartMedia and TransFlash cards.Although each of these cards has a unique mechanical interface,electrical interface or mechanical and electrical interface or any otherinterface (including a wireless interface), according to itsstandardized specifications, the flash memory included in each may bevery similar. These cards are all available from SanDisk Corporation,assignee of the present application.

SanDisk Corporation also provides a line of flash drives under itsCruzer trademark, which are hand held memory systems in small packagesthat have a Universal Serial Bus (USB) plug for connecting with a HostSystem by plugging into the Host System's USB receptacle (for example,114A). Each of these memory cards and flash drives include memorycontrollers (103) that interface with the Accessing System 101 andcontrol operation of the flash memory within them.

Storage system 115 includes Smart Cards, SIM cards and other types ofnon-volatile memory systems. A Smart Card is an integrated circuit withelectronic memory and is used for a variety of purposes, for example,storing medical records, generating network identifiers and others. ASIM card is a type of Smart Card that may be used in cellular phones forexample, for storing information and encrypting voice and datatransmissions.

Storage system 115 uses an I/O link 116 for I/O operations and fornotifying Accessing System 101 of a Busy State using status commands.For example, a Smartcard can use the standard “SW1” and “SW2” statusbytes to notify Accessing System 101 when data is not ready and whendata is ready. Furthermore after a defined status, Accessing System 101may send another command such as a “GetResponse” command to storagesystem 115 and determine the time it has to wait. If Accessing System101 requests data earlier than planned, then a status message may beused to notify Accessing System 101 that the data is still not ready andit has to wait.

Collectively and interchangeably, the processes and mechanisms fornotifying the Accessing System 101 of a Busy State may be referred to asa “busy flag”. In conventional systems, the busy flag is sent to anAccessing System based on storage system 105 capabilities to process anI/O operation, for example, when a storage system itself is not ready tosend or receive data. In one embodiment, the busy flag is sent tocontrol the Throughput Rate even though at any given time the storagesystem may be capable of sending or receiving data.

As discussed above, a DRM Module is used to control access to digitalcontent. FIG. 1C shows an example of a DRM Module 117 that verifies if auser using Accessing System 101 has the appropriate permissions toaccess certain digital content. DRM Module 117 may be implemented inhardware, software, or a combination thereof. Also shown is aCryptographic Module 118 that performs certain cryptographic functionsafter DRM Module 117 has verified the permissions. Cryptographic Module118 may be a stand alone module, a sub-system of DRM Module 117 or asub-system of storage system 105. In one embodiment, as described below,DRM Module 117 provides decryption keys and a Throughput Rate tocryptographic module 118 to delay cryptographic functions.

Determining Delay to Control the Throughput Rate:

The following provides an example of how a delay may be determined tocontrol the Throughput Rate for a file of size C. For this example, Smay be the speed (for example, in bytes/second) at which data istransferred between storage system 105 and Accessing System 101; B isthe size of I/O buffer 107 (FIG. 1A) and the expected (or desirable)Throughput rate is designated as T. The delay to access the file may berepresented by Dc, where:

$D_{c} = {C \times \frac{\left( {S - T} \right)}{S \times T}}$

In one embodiment, the file may be segmented into “n” number of chunks(or segments) and after each chunk, a delay of

$\frac{\left( D_{c} \right)}{n}$

may be added. Each chunk may be sized according to the size of I/Obuffer 107. When processing ends (for example, at the end of playing anaudio file) the actual Throughput Rate is similar to an expectedThroughput Rate. This mechanism may be used in a system where either thefile size is provided to the storage system or the storage system isaware of the file size.

In another embodiment, a delay may be added between I/O buffer 107access operations. This embodiment is useful when a file size is notknown to a storage system, (for example, storage system 113). When fileprocessing ends (for example, at the end of playing an audio file) theactual Throughput Rate is similar to the expected Throughput Rate. Thedelay is intended to control the Throughput Rate and may be designatedas D_(b), where:

$D_{b} = {B \times \frac{\left( {S - T} \right)}{S \times T}}$

In another embodiment, the delay may be added between certain timewindows (or intervals) to control the Throughput Rate. For example, ifan average time window (tw) is 1 second, then a delay,

$D_{{tw} = {1\; \sec}} = {1 - \frac{T}{S}}$

is applied after each second of data access.

FIG. 1D graphically illustrates how variable delay may be applied overtime while a file is being processed (Utilized). In this example, thefile is accessed at t=0 and the processing ends at t=t1. Variable delayallows one to reach a target Throughput Rate without affecting userexperience. Accessing System 101 may be provided immediate access tosome digital content (for example, 1% of a digital file) by applying ashort delay (or no delay) at the beginning (i.e. at t=0). Thereafter,longer delays are applied gradually (i.e. between t=0 and t=t1) to reacha target Throughput Rate. This allows Accessing System 101 to bufferdata fast enough so it can start processing content. This optimizesoverall processing time, while a pirate is not able to access the filetoo quickly.

It is noteworthy that the foregoing techniques and other techniquesdescribed below do not require a storage system to know a file systemstructure details. The file system is used to store digital content.

Throughput Rate Control by Pre-Processing Module:

In another embodiment, the Throughput Rate may be controlled by aPre-Processing Module. The Pre-Processing Module may be used to controlaccess to protected digital content, assist in processing digitalcontent, or a combination thereof. In this embodiment, the storagesystem may wait for the Pre-Processing Module to output data beforeReleasing the digital content.

FIG. 2 shows an example of a Pre-Processing Module 200 that receivesinput data 201, Pre-Processes input data 201 and then outputs data 202.Input data 201 may be protected, compressed, unprotected or decompresseddigital content. Pre-Processing Module 200 may be implemented inhardware, software, or a combination thereof.

Pre-Processing Module 200 includes without limitation a CODEC module, aDRM Module (117, FIG. 1C), a cryptographic module (118, FIG. 1C), andothers. A CODEC module is typically used to compress and decompressaudio, video and audio/video files. A DRM Module is typically used toverify if a device, application, user or a combination thereof, hasproper permissions to access digital content for certain functions, forexample, to play, move or copy a file. A cryptographic module typicallyperforms security related process steps for example, encrypting anddecrypting data.

In one example, a cryptographic module may add delay duringcryptographic calculations or after performing cryptographiccalculations. After the cryptographic module receives input data 201 (ora portion of input data 201), instead of returning the resultimmediately, the cryptographic module holds the data to reach anexpected Throughput Rate. Hence, the Throughput Rate effectivelycontrols the Pre-Processing rate.

FIG. 3 shows a top-level process flow diagram for adding delay byPre-Processing Module 200 after data has been Pre-Processed, accordingto one embodiment. The process starts in step S300 and in step S301,input data 201 is received or acquired by Pre-Processing Module 200. Instep S303, the Throughput Rate for the input data is received oracquired by Pre-Processing Module 200, as described below.

In step S303, the data is Pre-Processed. The Pre-Processing operationsdepend on the function of the Pre-Processing Module 200. For example,when a cryptographic module is the Pre-Processing Module, then thecryptographic functions are performed in step S303.

In step S304, a delay is added before output data 202 is Released instep S305. As discussed above, the amount of delay is based on anexpected Throughput Rate.

FIG. 4 shows an example for controlling the Throughput Rate by addingdelay between Pre-Processing operations, according to one embodiment.The process starts in step S400 and in step S401, input data 201 isreceived or acquired by Pre-Processing Module 200. In step S402, theThroughput Rate for the input data is received or acquired byPre-Processing Module 200 as described below.

In step S403, the input data is partially Pre-Processed. For example,for a cryptographic module, the cryptographic functions are partiallyperformed. In step S404, a delay is added. Steps S405 and S406 aresimilar to steps S403 and S404, respectively. The total delay is basedon an expected Throughput Rate and the data Pre-Processing is completedwith the appropriate delay. Thereafter, the Pre-Processed data is outputin step S407.

In one embodiment, the Throughput Rate may be controlled by a DRM Module(117, FIG. 1C). The Throughput Rate may vary with the type of access oruse, as described below. FIG. 5 shows an example of a process flowdiagram where DRM Module 117 controls the Throughput Rate. The processstarts in step S500, when DRM Module 117 receives a request for digitalcontent and for performing a certain operation, for example, to play anaudio file. A user using Accessing System 101 may request to play anaudio file via application 101A.

In step S501, DRM Module 117 parses the request. Step S501 may depend onthe type of operation, application and the type of request.

In step S502, DRM Module 117 verifies if the user has the appropriatepermissions to access the requested content or to perform the requestedoperation. If the proper permissions are not available, then the requestis denied and DRM Module 117 waits for the next request.

If permissions are available in step S503, then DRM Module 117determines if the Throughput Rate needs to be controlled. This could beindicated by a special command, by setting a field in the request or inany other manner. If the Throughput Rate does not need to be controlled,then in step S504, DRM Module 117 provides a decryption key tocryptographic module 118 and the process moves to step S507, describedbelow.

If the Throughput Rate needs to be controlled, then in step S505, DRMModule 117 acquires the Throughput Rate, as described below. Thereafter,in step S506, a decryption key and the Throughput Rate is provided tocryptographic module 118.

In step S507, cryptographic module 118 controls the Throughput Rate, asdescribed above with respect to FIGS. 3 and 4.

Determining/Receiving the Throughput Rate:

The Throughput Rate may be determined or received in a plurality ofways, for example, by using specific commands, in a DRM based contentlicense, from content Bit-Rate and others. The Throughput Rate may bedetermined when digital content is created and may be based on theformat or encoding type, or a combination thereof. The variousembodiments disclosed herein are not limited to any particular methodfor determining or receiving the Throughput Rate. The following providessome examples for determining or receiving the Throughput Rate:

-   -   (a) A storage system may be given some information (for example,        by an Accessing System) regarding a file or provided with a        direct or indirect reference to the file that is being accessed.        A direct reference is a file name. An indirect reference may be        a key identifier used by a storage system (for example, 113,        FIG. 1B) to identify a cipher key for protected content. The        Throughput Rate may be directly or indirectly associated with        the information, the reference or a combination thereof. The        storage system processor (103, FIG. 1A) uses the reference or        the information to acquire (or determine) the Throughput Rate.    -   (b) When additional information (for example, file size)        regarding a file is not provided to the storage system, then the        end of a file transfer operation (i.e. when digital content is        stored in a storage system) may be indicated by a command. This        command may be sent by the Accessing System and may be used to        provide the Throughput Rate to the storage system. In one        embodiment, this approach may be implemented with some other        security measure to prevent full speed access to stored content        when such a command is not being used. For example, the storage        system may be locked to operate at a low speed (for example, a        low default speed); and then a higher speed may only be        available after the command is received or used. In one        embodiment, specific access parameters (or login credentials)        may not be needed to access content at the lower speed.    -   (c) Some storage systems, for example, TrustedFlash based        storage devices, are able to process content security keys (for        example, cipher keys). The security keys are used to prevent        unauthorized access to stored content. A security key may be        associated with a single digital file and the Throughput rate        may be linked to the use of the key. In this case when the key        is loaded or created, a Throughput Rate may be associated with        it by using the same command or an additional command that is        used to load or create the key. Once a request to use the key is        obtained then the adequate Throughput Rate is applied.        Furthermore, storage systems based on TrustedFlash may use        authentication to access security keys. The authentication may        be based on verifying a user account. In this example, a        Throughput Rate may be provided for each account or for each        security key that is used to access content. When access is        granted to an account, an additional parameter in an existing        command or a new command may be used to provide the Throughput        Rate. The Throughput Rate is then stored by the storage system        for later use.    -   (d) Some storage systems may understand a file system structure        and are able to determine when a file is being accessed. In this        example, when a memory location is accessed, the storage system        determines what file uses that location and performs a lookup to        obtain a Throughput Rate, and thereafter, applies the associated        Throughput Rate. These storage systems may also receive the        Throughput Rate as described above.    -   (e) The Throughput Rate may be also stored in the storage system        itself. For example, in systems that use security to protect        content or that use DRM, a field associated with content may be        used to store the Throughput Rate. This field may be in addition        to other fields that are used to secure access to digital        content. For other systems, i.e. unsecured and non-DRM systems,        the Throughput Rate may be associated with any data that helps        identify a file. In another embodiment, the storage system may        have its own “database” or “table” that stores Throughput Rate        as associated with specific files.    -   (f) Some storage systems (for example, Smart Cards, SIM cards        and others) may also be able to parse digital content (i.e. a        portion thereof and determine the Bit Rate information from the        parsed digital content. The Bit Rate information may then be        used as a parameter to set the Throughput Rate. In this case the        Throughput Rate may be determined from the content itself and        the Accessing System does not need to provide the Throughput        Rate.    -   (g) Intelligent storage systems, for example, Smart Cards and        SIM cards may add a field to their own internal security        database to store the Throughput Rate. The security database is        used by these devices to store information to prevent        unauthorized access. The Throughput Rate may be determined only        once, for example, at first access and is then stored for later        use.    -   (h) In another embodiment, the Throughput Rate may be associated        with access parameters, for example, login credentials. The        access parameters allow a user to access digital content at the        associated Throughput Rate. The Throughput Rate may be included        as data in a digital certificate, for example, a certificate        extension; part of a credential name, for example, some        predefined part of a login name, or part of a credential value.        Furthermore, the Throughput Rate may be determined by using the        login credentials as a parameter. The credentials are processed        with some pre-determined functions to get the Throughput Rate to        apply. The credentials are then used for getting access to        content and setting up the Throughput Rate. For example, a user        identifier and password (access parameters) may be used to view        content at a specified Throughput Rate, while higher        authentication (for example, a PKI digital certificate used as        an access parameter) is used to copy content at a different        Throughput Rate.    -   (i) The Throughput Rate may be included with individual DRM        permissions. The Throughput Rate may be delivered with a DRM        content license. The Throughput Rate may vary depending on the        type of request. For example, the Throughput Rate may be        different for copying, moving or for digital content playback.        Most storage systems only know read and write operations and are        unaware of why content is being accessed. In one embodiment, the        purpose of content access is specified when implementing DRM.        The request type may be identified by using specific commands, a        parameter in a command, using specific accounts or any other        method. Separate predefined accounts may also be used to        indicate the type of access, for example, play, copy and others.        In this case, login with an account may be used to define the        purpose for getting data. FIG. 6 illustrates use of separate        login credentials to access content for different functions, for        example, playback, copy and move. Login X is used to playback        content at a certain Bit Rate X1. Login Y is used to copy        content at Bit Rate Y1. Login Z is used to move content at Bit        Rate Z1. Bit-rates X1, Y1 and Z1 may be different from each        other, regardless of the number of login accounts. In another        embodiment, only one account, for example Login X account, may        exist to prevent any high speed access for illegal copying.    -   (j) In another embodiment, a naming schema may be used to        identify operations and then a Throughput Rate is applied for        the operation. For example, accounts may be named in a way that        allows the storage system to recognize the type of access and        determine the purpose of getting the data. A naming convention        for access parameters (or login credentials) may be used where a        portion after a specific character may denote the type of        access, the Throughput Rate to apply, and a combination thereof.        Another option would be to set attributes related to permissions        within an account. The attributes may be set when the account is        created and the Throughput Rate is based on the attributes. Once        the storage system is aware of the type of access, it uses the        appropriate Throughput Rate.

The following provides an example of a naming schema, according to oneembodiment. Access parameters for digital content may be divided intodifferent parts, for example, the access parameters may include a uniqueidentifier (ID) and an encoded throughput rate value. The unique ID mayinclude code to specify or indicate a requested action.

The throughput rate may be encoded using standard encoding techniquestechniques. For example, 128 kb/s may be represented as 001010100 thatmay be represented as 84 decimal where: 1=>001, 2=>010 and 8=>100.

The unique ID may include bits that may be used to indicate permissionsfor different types of operations. For example, 3 bits 010 may be usedto indicate a “play” operation and 100 may indicate a copy operation.

The unique ID may also be coded to indicate how many times an operationis allowed. For example 8 bits may provide 256 different codes that maybe assigned to a specific permission for a given operation. For examplea value of “00000000” may be assigned to play an audio file once.

Based on the foregoing, 10000000 may be used as a unique ID and 128 kb/smay be represented with this unique ID as: 10000000 010 001 010100 i.e.525396 in hexadecimals

Therefore, 10000000 010 001 010100 when used as a login account, logincredential or a combination thereof, tells a storage system that 128kb/s may be used for playback.

Applying the Throughput Rate:

The Throughput Rate may be applied in a plurality of ways based on theapplication and how the Throughput Rate was determined or received. Thefollowing provides some examples of how the Throughput Rate may beapplied:

(a) Where the Throughput Rate is implemented using a DRM license, thenit may be applied by the DRM Module (or a cryptographic module) by usinga delay, as described above. In another embodiment, it may be applied atthe storage system level by controlling I/O buffer access, alsodescribed above.

(b) If the Throughput Rate is associated with access parameters (forexample, login credentials), then the Throughput Rate may be appliedwhen a login account associated with the Throughput Rate is accessed.

(c) When the Throughput Rate is associated with a login account and useof a security key (for example, a cipher key, a content license andothers) then the Throughput Rate is applied when the account is used toaccess specific content protected by the security key.

Controlling Display of Advertising Content:

In one embodiment, the Throughput Rate may be used to control howdigital advertisements (may be referred to as “advertisements”) aredisplayed to a user using Accessing System 101 (FIG. 1A), before a useris allowed access to other digital content. FIG. 7 shows an example ofassociating digital advertisement(s) 700 with various digital contentfiles (shown as Content 1, Content 2 and Content 3). A Throughput Rateis associated with advertisement 700. Advertisement 700 is displayed toa user at the associated Throughput Rate before a user can UtilizeContent 1, 2, and 3.

Access parameter 701 is associated with advertisement 700 and may beused to control access to Content 1, 2 and 3. In one embodiment, accessparameter 701 is defined by a hashing function for advertisement content700. In another embodiment, access parameter 701 may include at leastone login account or a key identifier, which may be used to gain accessto one or more of Content 1, 2 and 3. Access parameter 701 is protectedby a hash function for advertisement 700 so that advertisement 700 isdisplayed in full at a controlled Throughput Rate before other content(for example, Content 1, 2 or 3) can be accessed. Different accessparameters (shown as AP 1, AP 2 and AP 3) maybe associated withdifferent advertisement content (shown as AD #1, AD#2 and Ad#3).

The foregoing embodiments are illustrative only and not limiting. Manyother applications and embodiments of the present invention will beapparent in light of this disclosure and the following claims.

1. A method for utilizing digital content, comprising: controlling athroughput rate for utilizing the digital content by an accessingsystem, wherein the throughput rate is associated with informationrelated to the digital content stored as a file.
 2. The method of claim1, wherein the throughput rate is based on a content bit-rate.
 3. Themethod of claim 2, wherein the content bit rate is determined by astorage system that is aware of a file system structure used for storingthe digital content and the storage system is operationally coupled tothe accessing system.
 4. The method of claim 2, wherein the content bitrate is received by a storage system that is unaware of a file systemstructure used for storing the digital content and the storage system isoperationally coupled to the accessing system.
 5. The method of claim 1,wherein the throughput rate is associated with a digital rightsmanagement (DRM) permission in a content license and the content licenseis used to control access to the digital content.
 6. The method of claim5, wherein the content license uses a plurality of throughput rates fordifferent operations that are used for utilizing the digital content. 7.The method of claim 1, wherein the throughput rate is associated with acipher key that is used to pre-process the digital content before it isutilized.
 8. The method of claim 1, wherein the throughput rate isdelivered with a content license.
 9. A method for utilizing digitalcontent, comprising: controlling a throughput rate for utilizing thedigital content by an accessing system, wherein the throughput rate isassociated with an access parameter that is used to control access tothe digital content stored as a file.
 10. The method of claim 9, whereinthe access parameter is associated with an operation for utilizing thedigital content,
 11. The method of claim 9, wherein the access parameteris a login credential and a security key.
 12. A method for utilizingdigital content, comprising: controlling a throughput rate for utilizingthe digital content by an accessing system, wherein the throughput rateis associated with information related to the digital content stored asa file and the throughput rate is used as a parameter to delay apre-processing operation.
 13. The method of claim 12, wherein a delay isadded to the pre-processing operation by a pre-processing module toachieve a desired throughput rate.
 14. The method of claim 13, whereinthe delay is fixed.
 15. The method of claim 13, wherein the delay isvariable.
 16. The method of claim 13, wherein the delay is added afterthe digital content has been pre-processed by the pre-processing module.17. The method of claim 13, wherein the delay is added after the digitalcontent has been partially pre-processed by the pre-processing module.18. The method of claim 13, wherein the pre-processing module is acryptographic module performing cryptographic functions.
 19. The methodof claim 13, wherein the pre-processing module is a DRM module thatverifies if a user request to access the digital content is permitted.20. A method for utilizing digital content, comprising: controlling athroughput rate for utilizing the digital content by an accessingsystem, wherein the throughput rate is associated with informationrelated to the digital content stored as a file and the throughput rateis controlled by a storage system that is operationally coupled to theaccessing system.
 21. The method of claim 20 wherein the storage systemreceives information regarding the file and the throughput rate isassociated with the information.
 22. The method of claim 20, wherein thethroughput rate is provided to the storage system using a command. 23.The method of claim 20, wherein the storage system processes a securitykey before releasing the digital content to the accessing system and thethroughput rate is associated with the security key.
 24. The method ofclaim 23, wherein the throughput rate is set when a request to use thesecurity key is received.
 25. The method of claim 23, wherein thethroughput rate is associated with an account that is used to access thedigital content.
 26. The method of claim 20, wherein the throughput rateis stored by the storage system.
 27. The method of claim 20, wherein thethroughput rate is received by the storage system.
 28. The method ofclaim 20, wherein the throughput rate is determined by the storagesystem.
 29. The method of claim 20, wherein a naming schema indicates anoperation for utilizing the digital content and the throughput rate isassociated with the operation.
 30. The method of claim 20, wherein thestorage system uses a delay to control the throughput rate.
 31. Themethod of claim 30, wherein the delay is based on temporarily storingthe digital content in an input/output buffer for a duration beforereleasing the digital content to the accessing system.
 32. The method ofclaim 31, wherein the delay is variable.
 34. The method of claim 31,wherein a reduced delay is applied when the digital content is initiallyaccessed by the accessing system and the delay is increased as thedigital content is utilized by the accessing system.
 35. The method ofclaim 31, wherein no delay is applied when the digital content isinitially accessed by the accessing system and the delay is increased asthe digital content is utilized by the accessing system.
 36. The methodof claim 20, wherein the storage system controls sending a busy statusto the accessing system and timing for sending the busy status dependson the throughput rate for the digital content.
 37. The method of claim20, wherein the storage system is a non-volatile memory device.
 38. Themethod of claim 20, wherein the throughput rate controls display ofdigital advertisement content to a user before any non-advertisementcontent is utilized by the accessing system.