Secure distribution of digital data

ABSTRACT

A secure digital data distribution system ( 100 ) for preventing unauthorized access to digital data. The system utilizes an identification system module ( 116 ) embedded in a digital storage media ( 114 ) to grant authorization to media players ( 118 ). Prior to reading the digital data recorded on the media ( 114 ), an identification system interrogator ( 122 ) reads authorization data from the identification system module ( 116 ) to determine whether the media player ( 118 ) is authorized to read the media ( 114 ). If the authorization data matches the media player&#39;s unique identifier, authorization is granted and the media player ( 118 ) commences to read the media ( 114 ).

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority under 35 U.S.C. § 119 (e)(1) ofprovisional application No. 60/061,799 filed Oct. 14, 1997.

The following patents and/or commonly assigned patent applications arehereby incorporated herein by reference:

Patent No. Filing Date Issue Date Title 5,053,774 Feb. 13, 1991 Oct. 1,1991 Transponder System 08/850,535 May 2, 1997 A TIRIS Based Kernel forProtection of Copyrighted” Program Material 60/033,543 Dec. 20, 1996 ATIRIS Based BIOS for Protection of “Copyrighted” Program Material60/048,266 Jun. 2, 1997 Data Protection System

FIELD OF THE INVENTION

This invention relates to the field of data distribution systems, moreparticularly to methods and systems for distributing recorded digitaldata, still more particularly to methods and systems for distributingdigital electronic cinema data recorded on optical discs.

BACKGROUND OF THE INVENTION

Motion picture film no longer is a convenient medium by which todistribute video information. Producing copies of a film is a timeconsuming process which, while not prohibitively expensive or difficult,is much more expensive than modern alternatives such manufacturingoptical discs. Film is also a relatively heavy medium which, at 25pounds a canister, represents a significant shipping expense. Film'sdisadvantages do not end with production and distribution, display ofthe films requires a trained projectionist to assemble the films withtrailers and to operate the projection system. Furthermore, film quicklydegrades, often with more than 80% of the scratches and dirtaccumulating on a film within the first two days of release.

In addition to all of the physical drawbacks involved with the use offilm to distribute motion pictures, there are also significant securityconcerns involved with the use of film. These security drawbacks centeraround the economic structure of the motion picture industry. Motionpictures represent an tremendous investment of capital by the productionstudios. The production studios rely on a stream of income over anextended period of time to recoup this investment and return a profit.This income stream is fed by admission charges during the initialtheater showings of new releases and through various other outlets forolder motion pictures such as sales of video cassettes and royaltiesfrom television broadcasts.

Unlike many other industries where there are underlying assets such asfactories or secret production methodologies which prevent others fromcompeting directly with the original producers of a product, the motionpicture industry releases a product that may be easily and cheaplyreproduced, or reused, without the necessity of a large capitalinvestment. These reproductions compete directly with the originalcopies for audiences and markets—without generating additional revenuefor the production studios. In the past, these unauthorizedreproductions were typically of inferior quality—a trait that limitedthe demand for the unauthorized reproductions. As motion picturedistribution transitions from a photographic-based medium to a digitalcomputer-based medium, however, the unauthorized copies typically willbe perfect copies of the original.

Furthermore, since the distribution agreements generally call for aroyalty payment based on the number of showings, simply makingunauthorized showings of the original also avoids royalty charges.Unauthorized reproductions and additional showings not only deprive themotion picture studios of royalty income, they also reduce the studio'scontrol over the release and publicity of the movie. Advertising heavilyinfluences the motion picture viewing public. The motion pictureindustry carefully orchestrates the release of each picture tocoordinate the distribution with the associated advertising campaign.Box office receipts control the amount of advertising a particular filmreceives, as well as the number of screens which will show the film.Furthermore, films almost always are released in the United Statesfirst, since it is the largest market, and released in other countriesseveral weeks, or often months, later. Unauthorized copies generatedfrom U.S. versions of a film sometimes are shown in foreign theaters aslittle as one week after the U.S. release date.

Intellectual property laws protect producers of valuable technical andcreative information. Specifically, copyright laws are designed toprotect the content of motion pictures from unauthorized duplication andperformance, both in the United States and internationally. In spite ofthe protection available through intellectual property laws, motionpicture producers have been vulnerable to copyright infringement both inthe United States and abroad. This infringement may be perpetrated bythe motion picture distributor, theater owner, or even an independentparty who gains access to the film. Therefore, the motion pictureindustry is in need of a system of distribution that improves thesecurity of the motion picture content.

SUMMARY OF THE INVENTION

It is a primary object of the present invention to provide a system andmethod of distributing digital data which provides data security througha multi-tiered system of safeguards. According to one embodiment of thedisclosed invention, a secure digital image projection system isprovided which has at least one identification code identifying theimage projection system, and comprises: an identification systeminterrogator for reading an authorization code from an identificationsystem module associated with a data storage medium, a verification unitfor verifying the authorization code matches the identification code, areader for reading digital data stored on the data storage medium, and aprojection engine for displaying the digital data on the condition thatthe authorization code matches the identification code. Examples ofidentification systems include an RF identification systems and a TexasInstruments Registration and Identification System (TIRIS®) transponder.Variations on this embodiment include systems utilizing encrypted data,compressed data, separate media players and projectors, and tamper-proofcartridges enclosing the storage media.

According to another embodiment of the present invention, a securedigital data media player is disclosed. The secure digital data mediacomprising: an identification system interrogator for readingauthorization information from an identification system module attachedto a digital data storage medium and verifying the authorizationinformation authorizes the media player to read the digital data storagemedium, and a media reader for reading data from the digital datastorage medium and outputting the data on the condition theauthorization information authorizes the media player to read thedigital data storage medium. Examples of identification system modulesinclude an RF identification system module and a TIRIS transponder.Variations on this embodiment include systems utilizing encrypted data,compressed data, separate media players and projectors, and tamper-proofcartridges enclosing the storage media.

According to another embodiment of the disclosed invention, a securedata storage medium is disclosed. The secure data storage mediumcomprising: a digital storage medium for storing digital data and anidentification system module corresponding to the digital storagemedium. The identification system module contains an authorization codedescribing which media players are authorized to read digital data fromthe digital storage medium. Variations to this embodiment include theuse of an optical disc, an RF identification system, and a TIRISresponder.

According to yet another embodiment of the disclosed invention, a methodof securely distributing digital data is disclosed. The disclosed methodof securely distributing digital data comprises: writing digital dataonto a digital storage medium, and attaching an identification systemmodule to the digital storage medium. According to this embodiment, theidentification system module contains an authorization code indicatingwhich media readers are authorized to read the digital storage medium.Variations to this embodiment include the use of an optical disc, an RFidentification system, and a TIRIS responder.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention, and theadvantages thereof, reference is now made to the following descriptionstaken in conjunction with the accompanying drawings, in which:

FIG. 1 is a block diagram of one embodiment of an improved distributionsystem showing the production of the digital media, the distribution ofthe media, and the playback of media and projection of the resultingimage.

FIG. 2 is a schematic representation of a three-chip DMD-basedprojection system.

FIG. 3 is a block diagram of one embodiment of an improved distributionsystem showing a tamper-proof disc cartridge, and a combined mediaplayer and projector.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

An improved distribution system has been developed that providesimproved image quality, improved media durability, reduced mediaduplication and distribution costs, improved bookkeeping capability, anddramatically improved security. The distribution system is based ondigital recording technologies which enable the use of all-digital imageprojection techniques.

An all-digital image distribution and projection system provides manyadvantages over traditional analog or mixed digital-analog systems.First, the all-digital nature of the disclosed distribution andprojection system provides a higher level of security than possibleusing analog techniques. The all-digital distribution and projectionsystem enables the use of encryption and decryption schemes which makeintercepted data virtually useless to unauthorized parties. Second,because all processing necessary to display the digitized movie data isperformed in the digital domain, non-linearities, signal cross-coupling,noise degradation, bandwidth limitations, color impurities, temperaturevariations, and other degrading artifacts often associated with analogdisplay means are eliminated or significantly reduced. Data errors whichdo occur are detected and corrected through the use of traditional errordetection and correction techniques.

The disclosed distribution system is enabled by the rapid advance indigital communication technologies which have dramatically reduced theamount of information necessary to store and create electronic cinemaimages, advances in radio frequency (RF) identification technologies,and the availability of true digital imaging technologies. Furthermore,the disclosed secure distribution techniques, while widely applicableoutside the motion picture industry, are ideally suited to use in motionpicture distribution due to the unique characteristics of the motionpicture industry. The disclosed distribution system is ideally suitedfor implementation in the motion picture industry since there is ademand for the highest possible image quality, a relatively small numberof display projectors compared to other markets such as home theater ortelevision, and because of the high cost of existing media duplicationand distribution techniques.

FIG. 1 is a block diagram of the improved distribution system showingproduction of the digital media 102, distribution of the media 117, andplayback of media 118 and projection of the resulting image 128. Thedisclosed data distribution system uses storage media 114, typicallyoptical storage media, which has been coupled with a tamper-proofidentification system. The optical data storage medium is preferably ahigh quality digital optical disk, herein referred to as “theatricaloptical discs.” Theatrical optical discs are similar to consumer digitalvideo discs (DVD) which are now widely available. Like consumer DVDs,theatrical optical discs provide dense storage of digital informationand are relatively inexpensive to produce while providing a high levelof physical durability.

Double-sided dual-layer consumer DVDs hold approximately 15.96 gigabytesof information, allowing a two-hour movie to average 2.217 megabytes persecond and still fit on a single DVD. Single-sided, single-layerconsumer DVDs hold approximately 4.38 gigabytes, limiting a two-hourmovie to an average of 608 kilobytes per second. Theater-quality moviesrequire approximately 78.6 megabytes of data per second. Assuming asingle theatrical optical disc holds the same amount of data as adouble-sided, dual-layer consumer DVD, a compression ratio of 36:1 isnecessary to allow a single theatrical optical disc to hold an entiremovie. Lower capacities, or lower compression ratios, require severaldiscs to hold a single theater-quality movie.

Coupled with the storage media 114 is a tamper-proof identificationsystem 116. The tamper-proof identification system allows information tobe transferred to media players 118 without reading the storage media114. Many different identification systems are available. The desiredcharacteristics of the identification system are low cost, read/writecapability, and the capability to accurately interrogate one device inthe presence of other devices without the need for direct contact. Oneidentification system that meets these criteria is the Texas InstrumentsRegistration and Identification System (TIRIS®) which is capable ofstoring digital information and transmitting that information whenexposed to an RF energy source. The remainder of this disclosure willassume the identification system is a TIRIS® module.

The TIRIS transponder system, which is further disclosed in U.S. Pat.No. 5,053,774 is comprised of two portions, an RF responder module 116which is embedded in or attached to the object to be identified ortracked, an identification module interrogator 122. In use, the RFinterrogator 122 energizes the RF module 116 by irradiating the modulewith a beam of RF energy. The RF module 116 then emits an RFtransmission in which information is encoded. The information includesthe serial number of the RF module and additional information stored inthe RF module 116. This additional information may be read out by theinterrogator 122 or stored in the module 116 by the interrogator 122.Depending on the design of the RF module 116, the memory provided by theRF module 116 may be read-only memory, read/write memory, orwrite-once-read-many memory. Current TIRIS designs are available with atleast 1024 bits of memory.

As shown by FIG. 1, the first step in preparing optical media isdigitally mastering 106 the source material 104. Typical theater imagesgenerally utilize display resolutions of between 1280×1024 and 2048×1024pixels, with between 20 and 42 bits per pixel. At 24 frames per second,these resolutions require a data transfer rate between 0.629 and 2.11gigabits per second—much too high to be cost effective. To lower thedata rate and data storage requirements, the digital data must becompressed. Referring to FIG. 1, the digitally mastered data iscompressed 104, using any of the available image compression techniques.

Consumer DVD systems use MPEG2 digital data compression to reduce atwo-hour movie to an average 4.7 megabits per second data rate. MPEG2,however, may not provide the high quality images required for largescreen theaters. Other methods such as high bit rate MPEG and wavelettransforms are used by various embodiments. To further enhance securityof the data, a non-consumer compression algorithm is chosen. The use ofa non-consumer compression algorithm reduces the availability ofdecompression algorithms and circuitry and increases the effort andexpense of defeating the disclosed security system.

Some embodiments of the disclosed invention add a digital watermark tothe digital electronic cinema data prior to the compression step 108. Adigital watermark is formed by changing some of the bits in an image.Ideally, a viewer will not be able to detect the changes in the imagedata, but when the image data is compared with the original image datathe changed bits are evident. A digital watermark does not enhancesecurity, but does provide traceability. Since each copy, or set ofcopies, of a motion picture has a unique watermark any unauthorizedcopies seized are easily traced to the source. Alternative embodimentsof the disclosed system insert watermark information as the media player118 reads the electronic cinema data, or as the projector 128 processesand displays the data. Using multiple watermarks, added by the source,media player, and media projector, pinpoints where in the distributionchain an unauthorized copy of the data stream was made.

The compressed digital data is then encrypted 110 to preventunauthorized access to the digitally mastered data. Although anyencryption algorithm will suffice, the level of security will varygreatly depending on the algorithm chosen since some encryptiontechniques are much easier to defeat, or crack, than other encryptionalgorithms. For a given encryption technique, the length of the key, orcode the receiver must know in order to decrypt the encrypted data,determines the strength of the encryption since each bit added to thekey length doubles the number of possible key words. To further enhancethe strength of the encryption, one embodiment of the present inventionchanges the encryption algorithm or key within a given set of discs. Forexample, according to one embodiment of the present invention each ofthe theatrical optical discs required for a full-length motion pictureuses a different encryption algorithm, and even portions of a singletheatrical optical disc use different algorithms and keys. Assuming asufficiently strong encryption technique is selected, once the digitaldata is encrypted, the information contained in the digitally compresseddata is relatively safe from unauthorized duplication.

Once the digital electronic cinema data is compressed and encrypted, itis written to one or more storage devices 114, shown in FIG. 1 astheatrical optical discs. At least one of the theatrical optical discsincludes an identification module 116, typically an identificationmodule such as a TIRIS module, which further increases the security ofthe distribution system. According to one embodiment, a TIRIS module isembedded in each of the theatrical optical discs. The identificationmodule 116 preferably is attached to or embedded in the media 114, butneed only be associated with the media 114 to derive the benefits of thedisclosed invention. For example, various embodiments of the disclosedinvention foresee including the identification module 116 in thepackaging material holding the media 114 and forming a separatecartridge with the identification module 116 which is sometimes even beshipped separately.

The identification module 116 is typically preloaded with several typesof information, including information about the theatrical optical disccontents, information about the encryption algorithm used to encode thedata, information about which media players and projectors areauthorized to read and decode the information on the theatrical opticaldiscs, and information concerning the number of times the media may beused. According to various embodiments of the disclosed invention, theTIRIS module includes the key or keys necessary to decrypt the data onthe theatrical optical discs. Including the decryption keys with themedia, however, weakens the security of the overall system and is notpreferred. Alternatives to including the decryption keys with the mediawill be discussed below.

After the electronic cinema data is stored on the theatrical opticaldiscs and the necessary information is stored in the identificationmodule, the discs are shipped to the theaters. Since the theatricaloptical discs are much smaller and lighter than the canisters of filmpreviously used, and because the security techniques disclosed hereinreduce or eliminate the need for in-transit protection of the theatricaloptical discs, theatrical optical discs produced according to theprocess shown in FIG. 1 incur much lower shipping costs compared tocorresponding canisters of film.

Once the storage media 114 are received by a theater, it is read by amedia player 118 equipped with an identification module interrogator122. Although shown as two separate components in FIG. 1, the mediaplayer 118 and projector 128 are combined as a single unit according tosome embodiments of the present invention. Alternative embodiments movesome functions from one component to the other with various effects onthe level of security provided by the system.

The identification module interrogator 122 reads the authorization data,or authorization code, from the identification module 116 located on thestorage media 114 and compares the authorization data to a uniqueidentifier, such as the serial number, of the media player 118. If theauthorization data in the RF transponder 116 and the unique identifieragree, the media player 118 will read the media 114. If theauthorization data and the unique identifier do not match, the mediaplayer 118 does not read the media 114. Requiring a match between theauthorization data and the media player 118 reduces or eliminates thevalue realized by the theft of the media 114 and therefore reduces theamount of physical security required to protect the media 114 duringtransit.

The authorization data contained in the identification module 116 andthe media player's unique identifier need not be identical to beconsidered a “match.” As long as there is a relationship between theauthorization data and the unique identifier that allows the mediaplayer 118 to determine whether it is authorized, a match occurs whenthe media player 118 determines it is authorized to read the data fromthe media 114. For example, according to one embodiment a blankauthorization code matches any identification code and authorizes allmedia players to read the media 114.

Alternative embodiments use multiple authorizations codes or specialgroup authorization codes to authorize a group of media players to readthe media 114. Including multiple authorization codes, or group codes,enables a data distributor to authorize all of the projectors at aparticular theater, or chain of theaters, to read the media, grantingthe theater management flexibility to shift movies between screens basedon ticket sales without the need to move equipment. Likewise, the use ofa group code allows release of a title for viewing on home theater-classprojectors, but not on commercial movie theater-class projectors—thuspreserving the commercial market for royalty producing sales.

Assuming the media player authorization code matches the media player'sunique identifier, the projector authorization code, which is also readfrom the identification module 116 embedded in the media 114, and theencrypted electronic cinema data read from the media 114 are sent by themedia player 118 to the projector 128. The projector 128 compares theprojector authorization code received from the media player 118 with theprojector's unique identifier. If the authorization code received fromthe media player matches the projector's unique identifier, theprojector 128 will decrypt the electronic cinema data and decompress thedecrypted data. The decompressed data, which is an exact copy of thedigital master, is then displayed by the projector 128.

One of the major advantages of digital electronic cinema data is theability of the data stream to describe itself. For example, headers inthe electronic cinema data stream are used to describe the format of theelectronic cinema data stream including the intended screen resolution,frame rate, and data word size, as well as the encryption andcompression algorithms used. Once this information is known by the mediaplayer and projector, the electronic cinema data is reformatted, ifnecessary, to optimize the display of the data on the screen. For thisreason, the particular algorithms used and the particular design of themedia player and projector are not critical to the implementation of thedisclosed invention.

According to one embodiment of the disclosed invention, a digital lightprocessing (DLP®) projection engine is used to display the electroniccinema data signal. To achieve a suitable image quality for motionpicture theater images, a three-chip digital micromirror device (DMD)design is envisioned, having a resolution of approximately 1280×1024pixels or higher. FIG. 2 is a block diagram of a three-chip DMD imageprojection system 200 capable of producing theater-quality true digitalimages. In FIG. 2, a dichroic prism assembly 202 splits a beam of whitelight 204 from a light source 206 into three separate single-color lightbeams 208, 210, 212. Three DMDs 214, 216, 218 modulate these threesingle-color light beams and reflect the modulated light back to theprism assembly 202 where the modulated light is recombined into afull-color modulated light beam 220 and focused by lens 222 onto aprojection screen (not shown). Prism assembly 202 is typically comprisedof several individual prisms which have dichroic filters on varioussurfaces and which utilize total internal reflection to separate certainwavelengths of light from the remainder of the light beam.

One feature of the system of FIG. 1, which further increases thedifficulty of defeating the security system, is that decrypted data isnever available at any connector external to the projector unit 128 ormedia player 118. Some embodiments of the projector 128 include displaydevices 138 which are integrated on a single integrated circuit with thedecompress/format functions 134 and memory 136 so that the decrypteddata is not even available outside an integrated circuit. Preventingaccess to the decrypted data prevents owners and users of projector 128from recording the decrypted information during a playback of therecorded material.

As discussed above, a decryption code, or key, is crucial to theefficient decryption and playback of the media 114. Therefore, thetransmission of the key from the media producer, typically theproduction studio, to the media user, typically the theater, addsanother dimension to the strength of the security measures. The simplestmethod of providing the key to the theater is to simply include the keywith the media 114, either as part of the data recorded on the media 114or as part of the security codes written into the identification module116. Since the key is provided to whoever gains possession of the media114, this approach relies only on the authorization codes sent with themedia 114, and the design of the media players 118, to preventunauthorized access to the recorded data.

Data security is enhanced by transmitting the key to the media player118 through a separate distribution channel. According to variousembodiments of the present invention, copies of the encryption key aresent to the media player 118 through various other channels includingthe U.S. Postal Service or other mail carrier, dial-up or on-linetelecommunication links, and direct satellite broadcasts. Each of thesecommunications channels is utilized autonomously by the media player118, or independently by a projectionist.

In addition to providing increased data security, the disclosed securitysystem also provides a convenient means for collecting informationregarding media usage by the theaters. The type of information collectedfrom the theaters is limited only by the imagination, but will generallydeal with the types of information that effect either the royalties paidby the theaters or the marketing strategies of the distributors. Suchinformation will be referred to as usage information for the purposes ofthis disclosure.

For example, the identification module interrogator 122 may store usageinformation about how many times a particular disc has been read, orwhen the disc was read, in the identification module 116 embedded in themedia 114. If more than one projector 128 or media reader 118 isauthorized to read the media 114, the identification module interrogator122 may store usage information about which media player 118 orprojector 128 actually did read the media 114 in the identificationmodule's memory. Usage information concerning the time and date of theshowing, or the number attending the showing could also be stored in theidentification module 116.

All of the usage information stored by the theaters during the use ofthe media 114 may be read by an information collection agency uponreturn of the media 114. Information collection agencies include thepotion picture studios, distributors, theaters, or marketing agencies.The usage information is used to determine royalty and other paymentsowed by or to the theaters, advertising agencies, or other entities, andpossibly to refine marketing strategies for future releases. By storingthe usage information in the identification module 116 instead of on themedia 114 itself, the usage information can be read even if the media114 intentionally is destroyed prior to return shipment to thedistributor. Destruction of the media 114 prior to reshipment eliminatesthe risk of theft since the media 114 would be of no value to potentialthieves.

Alternatively, the usage information is transferred to the informationcollection agency by the media player 118 or projector 128 using a wiredor wireless communications link. For example, the media player 118 orprojector 128 may use a dial-up service, internet access, or a satellitelink to transmit the information to the information collection agency.

An additional level of security is provided by packaging the media 114in a tamper-proof cartridge 302 as shown in FIG. 3. The tamper-proofcartridge 302 is designed to prevent unauthorized access to the media114. A first cartridge design prevents the cartridge 302 from beingopened except by a media player 304. This design is further strengthenedby designing the media player 204 to open cartridges 302 only afterreceiving the proper authorization code from the media's identificationmodule 116 or a separate cartridge identification module 310. A secondcartridge design includes a separate authentication means within thecartridge 302 which will not allow the cartridge 302 to be opened unlessthe authentication means receives the proper code from the media player304. In addition to merely preventing the cartridges 302 from opening,some embodiments of the tamper-proof cartridges 302 damage or destroythe media 114 contained within the cartridge 302. For example, variousembodiments damage the media by dyeing, scratching, or breaking themedia 114, or by erasing the data stored in the identification systemmodule, including the encryption key if stored in the identificationsystem module.

The media player/projector 308 shown in FIG. 3 also provides a separateinput for video signals. These video signals bypass the decryption anddecompression blocks and are merely reformatted for display on the DLPprojection engine. Alternative embodiments route the alternate videoinputs through the decryption and decompression blocks as needed. Thealternate video path is used for video sources which are incompatiblewith the media 304. For example, a theater can show a pay-per-viewboxing match to patrons using a separate video receiver and thealternate video signal path.

The media player/projector 308 shown in FIG. 3 also includes outputsfrom the system controller which enable the player/projector 308 tocontrol other theater equipment. According to one embodiment, theplayer/projector dims the lights and opens the theater curtain as amovie starts. Additionally, the player/projector is capable ofprojecting commercial, previews, and trailers selected by the localtheater before and after a movie showing, without the need for operatorintervention.

Thus, although there has been disclosed to this point a particularembodiment for system for the secure transmission of digital data, andmethod therefore, which greatly increases the distributor's control overaccess to the digital data, it is not intended that such specificreferences be considered as limitations upon the scope of this inventionexcept insofar as set forth in the following claims. Furthermore, havingdescribed the invention in connection with certain specific embodimentsthereof, it is to be understood that further modifications may nowsuggest themselves to those skilled in the art, it is intended to coverall such modifications as fall within the scope of the appended claims.

1. A secure digital image projection system having at least oneidentification code identifying said image projection system, said imageprojection system comprising: an identification system interrogator forreading an authorization code from an identification system moduleassociated with a data storage medium; a verification unit for verifyingsaid authorization code matches said identification code; a media playerfor reading digital data stored on said data storage medium; and aprojection unit for displaying said digital data on the condition thatsaid authorization code matches said identification code.
 2. The securedigital image projection system of claim 1, said identification systemmodule comprising an RF identification system module.
 3. The securedigital image projection system of claim 1, said identification systemmodule comprising a TIRIS transponder.
 4. The secure digital imageprojection system of claim 1, wherein said digital data stored on saidmedium is encrypted, said projection system further comprising: adecryption unit for decrypting said encrypted digital data prior todisplay of said digital data.
 5. The secure digital image projectionsystem of claim 1, said image projection system further comprising: amedia jukebox for opening a tamper-proof cartridge containing said datastorage medium, and for accessing said data storage medium.
 6. Thesecure digital image projection system of claim 1, wherein saidprojection system adds a digital watermark to said digital data readfrom said data storage medium.
 7. The secure digital image projectionsystem of claim 1, wherein said media player adds a digital watermark tosaid digital data read from said data storage medium.
 8. The securedigital image projection system of claim 1, wherein said projection unitadds a digital watermark to said digital data read from said datastorage medium.
 9. The secure digital image projection system of claim1, wherein said projection system stores usage information on saididentification system module.
 10. The secure digital image projectionsystem of claim 9, wherein said usage information comprises at least onesaid identification code identifying said image projection system. 11.The secure digital image projection system of claim 1, wherein saidprojection system transmits usage information to a collection agency.12. The secure digital image projection system of claim 11, wherein saidusage information comprises at least one said identification codeidentifying said image projection system.
 13. The secure digital imageprojection system of claim 1: said media player having a firstidentification code; said projector unit having a second identificationcode; and said verification unit comprising a first verification unit insaid media player and a second verification unit in said projector unit,said authorization code comprising a first and a second authorizationcode, said media player only reading said digital data from said datastorage medium on the condition that said first authorization codematches said first identification code, and said projector unit onlydisplaying said digital data on the condition that said secondauthorization code matches said second identification code.
 14. A securedigital data media player comprising: an identification systeminterrogator for reading authorization information from anidentification system module attached to a digital data storage mediumand verifying said authorization information authorizes said mediaplayer to read said digital data storage medium; and a media reader forreading data from said digital data storage medium and outputting saiddata on the condition said authorization information authorizes saidmedia player to read said digital data storage medium.
 15. The securedigital data media player of claim 14, said identification system modulecomprising an RF identification system module.
 16. The secure digitaldata media player of claim 14, said identification system modulecomprising a TRIS transponder.
 17. The secure digital data media playerof claim 14, wherein said digital data stored on said medium isencrypted, said media player-projector further comprising: a decryptionunit for decrypting said encrypted digital data prior to display of saiddigital data.
 18. The secure digital data media player of claim 14,further comprising: a media jukebox for opening a tamper-proof cartridgecontaining said data storage medium, and for accessing said data storagemedium.
 19. The secure digital data media player of claim 14, whereinsaid media player adds a digital watermark to said data read from saiddigital data storage medium.
 20. The secure digital data media player ofclaim 14, wherein said projection system stores usage information onsaid identification system module.
 21. The secure digital data mediaplayer of claim 20, wherein said usage information comprises at leastone said identification code identifying said secure digital data mediaplayer.
 22. The secure digital data media player of claim 14, whereinsaid projection system transmits usage information to a collectionagency.
 23. The secure digital data media player of claim 22, whereinsaid usage information comprises the at least one said identificationcode identifying said secure digital data media player.
 24. A securedata storage medium comprising: a digital storage medium for storingdigital data; and an identification system module corresponding to saiddigital storage medium, said identification system module containing anauthorization code describing which media players are authorized to readdigital data from said digital storage medium.
 25. The secure datastorage medium of claim 24, said digital storage medium comprising anoptical disc.
 26. The secure data storage medium of claim 24, saididentification system module comprising a TIRIS transponder.
 27. Thesecure data storage medium of claim 24, said identification systemmodule comprising a radio frequency transponder.
 28. The secure datastorage medium of claim 24, wherein said identification system storesusage information.
 29. The secure data storage medium of claim 28,wherein said usage information comprises information concerning thenumber of times said digital data has been read.
 30. A method ofsecurely distributing digital data, said method comprising: writingdigital data onto a digital storage medium; attaching an identificationsystem module to said digital storage medium, said identification systemmodule containing an authorization code indicating which media readersare authorized to read said digital storage medium; and transferringsaid digital storage medium to a user.
 31. The method of claim 30, saidwriting step comprising the step of writing digital data onto an opticaldisc.
 32. The method of claim 30, said attaching step comprising thestep of attaching an RF identification system to said digital storagemedium.
 33. The method of claim 30, said attaching step comprising thestep of attaching a TIRIS responder to said digital storage medium. 34.The method of claim 30, further comprising the step of: adding a digitalwatermark to said digital data; and wherein said step of writing digitaldata onto a digital storage medium comprises the step of writing saiddigital data containing said digital watermark onto said digital storagemedium.
 35. The method of claim 30, further comprising the step of:reading said digital data from said digital storage medium; and storingusage information on said digital storage medium.
 36. The method ofclaim 31, further comprising the step of: reading said digital data fromsaid digital storage medium; and transmitting usage information to acollection agency.
 37. A secure data storage medium comprising: adigital storage medium for storing digital data; and an identificationsystem module corresponding to said digital storage medium, saididentification system module containing an authorization code, saidauthorization code operable to authorize certain media players to readsaid digital data when an identifier code in said media player matchessaid authorization code.
 38. The secure data storage medium of claim 37,said digital storage medium comprising an optical disc.
 39. The securedata storage medium of claim 37, said identification system modulecomprising a radio frequency transponder.
 40. The secure data storagemedium of claim 37, wherein said identification system stores usageinformation.
 41. The secure data storage medium of claim 40, whereinsaid usage information comprises information concerning the number oftimes said digital data has been read.
 42. A method of securelydistributing digital data, said method comprising: writing digital dataonto a digital storage medium; attaching an identification system moduleto said digital storage medium, said identification system modulecontaining an authorization code, said authorization code operable toauthorize certain media players to read said digital data when anidentifier code in said media player matches said authorization code;and transferring said digital storage medium to a user.
 43. The methodof claim 42, said writing step comprising the step of writing digitaldata onto an optical disc.
 44. The method of claim 42, said attachingstep comprising the step of attaching an RF identification system tosaid digital storage medium.
 45. The method of claim 42, furthercomprising the step of: adding a digital watermark to said digital data;and wherein said step of writing digital data onto a digital storagemedium comprises the step of writing said digital data containing saiddigital watermark onto said digital storage medium.
 46. The method ofclaim 42, further comprising the step of: reading said digital data fromsaid digital storage medium; and storing usage information on saiddigital storage medium.
 47. The method of claim 42, further comprisingthe step of: reading said digital data from said digital storage medium;and transmitting usage information to a collection agency.