U.S. patent application number 11/511410 was filed with the patent office on 2006-12-28 for read-only recording medium containing sample data and reproducing method thereof.
Invention is credited to Byung Jin Kim, Hyung Sun Kim.
Application Number | 20060294010 11/511410 |
Document ID | / |
Family ID | 36666299 |
Filed Date | 2006-12-28 |
United States Patent
Application |
20060294010 |
Kind Code |
A1 |
Kim; Hyung Sun ; et
al. |
December 28, 2006 |
Read-only recording medium containing sample data and reproducing
method thereof
Abstract
The present invention provides according to an embodiment a
method of reproducing content, comprising the steps of: (a)
checking whether information required for decrypting an encrypted
content is present; (b) requesting the information to an external
source based on URL (Uniform Resource Locator) information if the
information is not present; and (c) reproducing the encrypted
content using the information.
Inventors: |
Kim; Hyung Sun; (Seoul,
KR) ; Kim; Byung Jin; (Seoul, KR) |
Correspondence
Address: |
BIRCH STEWART KOLASCH & BIRCH
PO BOX 747
FALLS CHURCH
VA
22040-0747
US
|
Family ID: |
36666299 |
Appl. No.: |
11/511410 |
Filed: |
August 29, 2006 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
10258416 |
Oct 23, 2002 |
|
|
|
PCT/KR02/00424 |
Mar 12, 2002 |
|
|
|
11511410 |
Aug 29, 2006 |
|
|
|
Current U.S.
Class: |
705/50 ;
348/E7.056; 386/E5.004; G9B/20.002 |
Current CPC
Class: |
G11B 20/00507 20130101;
G11B 20/0071 20130101; H04N 5/85 20130101; H04N 21/42646 20130101;
G11B 2220/213 20130101; G11B 20/00673 20130101; G11B 20/00818
20130101; G11B 20/00115 20130101; G11B 20/00978 20130101; H04N
2005/91364 20130101; G11B 20/0021 20130101; G11B 20/00224 20130101;
G11B 20/00246 20130101; G11B 20/00086 20130101; H04N 7/1675
20130101; H04N 21/63345 20130101; H04N 5/765 20130101; H04N 9/8227
20130101; G06Q 20/382 20130101; H04N 21/4622 20130101; H04N 9/8205
20130101; H04N 5/913 20130101; G11B 20/00094 20130101 |
Class at
Publication: |
705/050 |
International
Class: |
G06Q 99/00 20060101
G06Q099/00 |
Foreign Application Data
Date |
Code |
Application Number |
Mar 13, 2001 |
KR |
2001-12998 |
Claims
1. A method of reproducing content, comprising: (a) checking
whether information required for decrypting an encrypted content is
present; (b) requesting the information to an external source based
on URL (Uniform Resource Locator) information if the information is
not present; and (c) reproducing the encrypted content using the
information.
2. The method of claim 1, wherein said step (b) requests the
information to a web site that provides the information.
3. The method of claim 2, wherein said step (b) requests the
information to the web site along with an identification
information, wherein the identification information is unique to
the content.
4. The method of claim 1, wherein said step (b) includes a step of
downloading the requested information from the external source.
5. The method of claim 4, wherein the downloading step downloads
the requested information in connection with an identification
information.
6. The method of claim 4, wherein the downloading step downloads
the requested information after payment for the information.
7. The method of claim 1, wherein said step (b) further requests a
management information for managing the encrypted content to the
external source, wherein the step (c) includes a step of
controlling reproduction of the content based on the management
information.
8. The method of claim 7, wherein the management information
includes at least one of a start position, an end position and size
information of the encrypted content.
9. The method of claim 1, wherein the encrypted content comprises a
plurality of digital audios or videos, wherein the step (b)
requests the information to the external source in order to decrypt
at least one digital audio or video.
10. The method of claim 1, wherein the encrypted content comprises
a plurality of digital audios or videos, wherein the step (b)
requests the information to the external source in order to decrypt
the plurality of audios or videos.
11. The method of claim 1, wherein the step (b) further comprises:
(b1) indicating a location of external source for obtaining the
information if the information is not present; and (b2) interfacing
with the external source to obtain the information, based on the
indicated location.
12. A method of reproducing content, comprising: (a) checking
whether control information for normally reproducing an encrypted
content is present, wherein the control information including key
information for decrypting the encrypted content and management
information for managing the encrypted content; (b) sending a
signal to request the control information to an external source
based on URL (Uniform Resource Locator) information if the control
information is not present; and (c) reproducing the encrypted
content using the control information.
13. The method of claim 12, wherein the step (b) includes a step of
receiving the requested information through interface with the
external source.
14. The method of claim 12, wherein the step (b) includes a step of
purchasing the requested information with charge.
15. The method of claim 12, wherein the step (c) comprises: (c1)
decrypting the encrypted content using the key information, and
(c2) playing the decrypted content based on the management
information.
16. A method of transferring information, comprising: (a) receiving
a signal to request information from a requesting part, the
information required for at least decrypting an encrypted content;
(b) identifying the requesting part based on an ID information
associated with the requesting part; and (c) determining whether to
send the information to a requesting part based on ID
information.
17. The method of claim 16, wherein the step (c) further determines
whether to send the information to the requesting part based on an
action for play-authority.
18. The method of claim 17, wherein the action includes a payment
for the information.
19. The method of claim 16, wherein the information includes a
management information to manage a reproduction of the content.
20. The method of claim 19, wherein the management information
includes at least one of a start position, an end position and size
information of the encrypted content.
21. The method of claim 16, wherein the encrypted content comprises
a plurality of digital audios or videos, the information required
for decrypting the plurality of audios or videos.
22. The method of claim 16, wherein the encrypted content comprises
a plurality of digital audios or videos, the information required
for decrypting at least one digital audio or video.
23. An apparatus for reproducing content, comprising: a controller
checking whether information required for decrypting an encrypted
content is present, and requesting the information to an external
source based on URL (Uniform Resource Locator) information if the
information is not present; and a reproducing unit reproducing the
encrypted content based on a control of the controller.
24. The apparatus of claim 23, wherein the controller requests the
information to a web site that provides the information.
25. The apparatus of claim 24, wherein the controller sends an
identification information to external source with the signal to
request the information, wherein the identification information is
unique to the content.
26. The apparatus of claim 23, further comprising: a memory for
storing the requested information to be received from the external
source.
27. The apparatus of claim 26, wherein the controller controls the
memory to store the requested information in connection with an
identification information.
28. The apparatus of claim 26, wherein the controller controls the
memory to store the requested information after payment for the
information.
29. The apparatus of claim 23, wherein the controller further
requests a management information for managing the encrypted
content to the external source, and controls the reproduction unit
to reproduce the content based on the management information.
30. The apparatus of claim 29, wherein the management information
includes at least one of a start position, an end position and size
information of the encrypted content.
31. The apparatus of claim 23, wherein the encrypted content
comprises a plurality of digital audios or videos, wherein the
controller requests the information the external source in order to
decrypt at least one digital audio or video.
32. The apparatus of claim 23, wherein the encrypted content
comprises a plurality of digital audios or videos, wherein the
controller requests the information to the external source in order
to decrypt the plurality of audios or videos.
33. The apparatus of claim 23, further comprising: a display unit
indicating a location of external source for obtaining the
information, wherein the controller controls an interface with the
external source to obtain the information, based on the indicated
location.
Description
[0001] This application is a Divisional of co-pending U.S. patent
application Ser. No. 10/258,416 filed on Oct. 23, 2002 and for
which priority is claimed under 35 U.S.C. .sctn.120, and also
claims priority benefit of Korean Application No. 2001/12998, filed
on Mar. 13, 2001 in Korea. U.S. patent application Ser. No.
10/258,416 is the national phase of PCT International Application
No. PCT/KR02/00424 filed on Mar. 12, 2002 under 35 U.S.C.
.sctn.371. The entire contents of each of the above-identified
applications are hereby incorporated by reference.
BACKGROUND OF THE INVENTION
[0002] 1. Field of the Invention
[0003] The present invention relates to a read-only recording
medium containing encrypted source data and sample data thereof.
The present invention further relates to a method of reproducing
said recording medium.
[0004] 2. Discussion of the Background Art
[0005] In these days, it is expected that on-line multi-media
contents selling methods will be widely used. In such on-line
selling methods, moving-picture data or audio data are delivered to
a buyer's recording medium such as a writable CD or DVD through a
data network and are then played back from that recording
medium.
[0006] The audio data to be provided via a network are called EMD
(Electronic Music Distribution) audio data. EMD audio data are
provided by a lot content providers. However, the content providers
encode END audio data to mutually different formats and a different
unique copy-protection keys, namely, encryption keys to EMD audio
data as well to prevent unauthorized copy and to protect their
copyright.
[0007] A decryption key adequate for downloaded EMD audio data must
be obtained from a contents provider having provided the END audio
data before playing the downloaded EMD audio data. The decryption
key is used for decrypting EMD audio data encrypted with a
corresponding copy-protection key.
[0008] Because it is nearly impossible to obtain an adequate
decryption key without lawful approval, EMD audio data can be
protected against unauthorized copy, thus its copyright can be
protected well.
[0009] To enjoy such a data protecting advantage, high-quality
moving-picture data and/or audio data will be encrypted in general
to sell them to buyers through a network. In addition, because of
such a data protecting advantage, on-line content selling methods
are expected to be spread more and more.
[0010] However, as aforementioned, encrypted EMD audio data must
require a copy-protection key, namely, a decryption key to be
played back. Therefore, a user can not play with a disk device any
piece of EMD audio data downloaded onto a writable recording medium
before he or she purchases a decryption key. In other words, a user
can not confirm at all whether the downloaded EMD audio data are
what he or she wants or whether its audio quality is better or not
than he or she expected. Consequently, a user hesitates to buy a
play-authorizing key, namely, a decryption key for the downloaded
EMD audio data.
[0011] In the meantime, when a user wants to buy his or her
favorite digital song or music, he or she makes web-surfing on
Internet to find a web site and then searches the web site for his
or her favorite song or music. If found, he or she requests it to
be downloaded to a recording medium. Theses procedures take much
time and effort, which would impede spread of the on-line selling
methods of digital contents.
SUMMARY OF THE INVENTION
[0012] It is an object of the present invention to provide a
read-only recording medium on which encrypted moving picture data
and/or audio data and non-encrypted their sample data have been
recorded.
[0013] It is another object of the present invention to provide a
method of reproducing only-non-encrypted sample data of a read-only
recording medium without a decryption key to induce a user to make
on-line purchase of the decryption key.
[0014] A read-only recording medium storing data in accordance with
an aspect of the present invention includes: a first area storing
data; and a second area storing management information for the data
stored in said first area, wherein said first area includes
encrypted source data and non-encrypted sample data that have same
contents with a part of the source data, and wherein said second
area includes location information of the non-encrypted sample
data.
[0015] A method of reproducing a recording medium containing
encrypted source data and non-encrypted sample data that have same
contents with a part of the encrypted source data in accordance
with another aspect of the present invention includes the steps of:
checking, when play of the encrypted source data is requested,
whether or not there is decrypting information for the encrypted
source data in a disk device; reading location information pointing
the non-encrypted sample data, if there is not the decrypting
information; and reproducing the non-encrypted sample data using
the read location information, instead of the encrypted source data
of which play has been requested.
[0016] Another method of reproducing a recording medium containing
encrypted source data and non-encrypted sample data that have same
contents with a part of the encrypted source data in accordance
with another aspect the present invention includes the steps of:
checking, when play of the encrypted source data is requested,
whether or not there is decrypting information for the encrypted
source data in a disk device; receiving the decrypting information
through communication with an external device and storing in the
disk device, if there is not the decrypting information; and
reproducing the encrypted source data with reference to location
information of the encrypted source data while decrypting them with
the stored decrypting information.
[0017] The present invention discussed herein enables a user to
confirm whether source data written on a read-only recording medium
are what he or she wants without buying a decryption key for the
source data. Consequently, purchase of a decryption key for
encrypted contents is naturally induced from previewing or
pre-listening sample data. In addition, on-line selling procedure
is very simple and fast because it is finished only by downloading
a decryption key.
BRIEF DESCRIPTION OF THE DRAWINGS
[0018] The present invention will become more fully understood from
the detailed description given hereinbelow and the accompanying
drawings which are given by way of illustration only, and thus are
not limitative of the present invention and wherein:
[0019] The accompanying drawings, which are included to provide a
further understanding of the present invention illustrate the
preferred embodiments of the invention, and together with the
description, serve to explain the principles of the present
invention, and wherein:
[0020] FIG. 1 is a simplified block diagram of an optical disk
device in which a data reproducing method of the present invention
is embedded;
[0021] FIG. 2 shows schematic reaction between PGCI (Program Chain
Information) and sample AOBs (Audio Objects) for source Audio
tracks recorded on a read-only disk in accordance with the present
invention;
[0022] FIG. 3 shows schematic relation between PGCI and source
tracks containing encrypted audio data recorded on a read-only disk
in accordance with the present invention;
[0023] FIG. 4 shows schematic relation between CI (Cell
Information) and encrypted source and non-encrypted sample video
object recorded on a read only disk in accordance with the present
invention;
[0024] FIGS. 5a and 5b are flow charts of an embodiment of a method
playing encrypted source or non-encrypted sample data selectively
in accordance with the present invention; and
[0025] FIG. 6 is a screen example where a play-error window is
popped up because of no decryption key.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0026] In order that the invention may be fully understood,
preferred embodiments thereof will now be described with reference
to the accompanying drawings.
[0027] FIG. 1 is a simplified block diagram of an optical disk
device in which a data reproducing method of the present invention
is embedded. The device may be a disk drive installed in a personal
computer (PC) being able to connect to Internet.
[0028] The disk device FIG. 1 comprises an optical pickup 2 reading
signals written on a read-only disk 1, e.g., a DVD-ROM; a
reproducing processor 3 processing the read signals to restore to
original data; a buffer 5 buffering temporary data, e.g., ecrypted
data produced during reproducing operation; a memory 7 for storing
navigation data, which are management information used for
reproduction control of recorded data, and a decryption key for the
recorded source data; and a system controller 4 controlling all the
elements during playback, selectively playing encrypted source or
non-encrypted sample data, and requesting/receiving a decryption
key interfacing with a connected PC, all operatively coupled and
configured.
[0029] The read-only disk 1 contains not only encrypted source
data, namely, video and/or audio contents but also non-encrypted
sample data that are same with a part of the source data.
[0030] The read-only disk 1 may be a DVD-ROM and has two zones, one
zone for source and sample data and the other for management
information thereof. If the source data are composed of a plurality
of audio tracks, sample audio data have been written for each audio
track. And, sample audio data associated with an audio track form a
sample track.
[0031] A track is managed as an audio object (AOB) so that cell
information (CI) that is, reproduction control information is
created for each AOB in the management information zone. The CI
includes location information. (namely, start and end address or
start address and duration) of an associated AOB.
[0032] Therefore, if there are N source audio tracks in the data
zone, the disk includes 2.times.N AOBs and their 2.times.N pieces
of CI.
[0033] The management information zone of the read-only disk 1 also
includes original and user-defined program chain information.
(PGCI) that includes the created CI as its own field element.
Therefore, the PGCI can index individually a plurality of AOBs
pointed by respective CI fields it includes. Namely, if a piece of
PGCI is chosen automatically or by a user, AOBs pointed by CI
contained in the selected PGCI can be searched for and played
back.
[0034] FIG. 2 shows schematic relation between PGCI and sample AOBs
for source audio tracks recorded on the read-only disk. In the
example of FIG. 2, source tracks `AOB N+1, N+2, N+3, . . . `
containing encrypted audio data have been recorded on the read-only
disk 1, and sample tracks `AOB 1, 2, 3, . . . ` also have been
recorded thereon. Each sample track has non-encrypted audio data
that are same with a part of each source track `S1, S2, S3, . . .
`. In addition, plural pieces of CI `Cell 1, 2, 3, . . . ` that
include respective location information (start `DA_S_P` and end
address `DA_E_P` or start address `DA_S_P` and, duration `DA_Dur`)
of the sample tracks `AOB 1, 2, 3, . . . ` have been written in
original PGCI. Therefore, if the original PGCI is selected, only
the sample tracks `AOB 1, 2, 3, . . . ` of the source tracks `AOB
N+1, N+2, N+3` are played back.
[0035] FIG. 3 shows schematic relation between PGCI and source
tracks containing encrypted audio data recorded on the read-only
disk 1. For the example of FIG. 3 plural pieces of CI `Cell N+1,
N+2, N+3` that include respective location information (start
`UA_S_P` and end address `UA_E_P` or start address `UA_S_P` and
duration `UA_Dur`), of the source tracks `AOB N+1, N+2, N+3, . . .
` have been written in user-defined PGCI. Therefore, if the
user-defined PGCI is selected the source tracks `AOB N+1, N+2, N+3
. . . ` are played back sequentially if there is a decryption key
for the source tracks.
[0036] Accordingly, if there is not a decryption key the system
controller 4 selects the original PGCI and then plays back
non-encrypted sample data pointed by CI included in the original
PGCI, and if there is it selects the user-defined PGCI and then
plays back source tracks while decrypting encrypted data with an
adequate decryption key stored in the memory 6.
[0037] If video contents are recorded on the data zone of the
read-only disk 1 instead of audio contents, each source track is
unitized to not AOB but VOB (Video Object). However, management
information for VOB is created the same as for AOB. Namely, as
shown in FIG. 4, a sample VOB `VOB 1` has been created for a source
VOB `VOB 2`. The sample VOB `VOB 1` has non-encrypted video data
that are same with a part of the source VOB `VOB 2` containing
encrypted video data. In addition, two pieces of CI that refer the
sample and source VOB respectively have been written different or
same PGCI.
[0038] An embodiment of a method reproducing the read-only disk 1
containing data configured as above is explained in detail
below.
[0039] FIGS. 5a and 5b are flow charts of the embodiment of the
present invention.
[0040] When the read-only disk 1 is placed in the disk device of
FIG. 1 (S10), the system controller 4 reads the above-explained
management information, namely, original and user-defined PGCI, CI,
and so on written in the management information zone of the
read-only disk 1 and stores them into the memory 6 (S11).
[0041] Then the system controller 4 will execute a suitable player
program that has been pre-written on the read-only disk 1, if
necessary (S12), and checks whether or not there is in the memory 6
a decryption key for decrypting the encrypted source data written
the read-only disk 1 (S13). The following procedures as well as the
decryption key checking procedure can be conducted by the executed
player program instead of the system controller 4.
[0042] If there is not a decryption key, the system controller 4
composes a play-error message and sends it to a connected PC (S14).
The play-error message includes explanation about decryption key
purchase as well as the cause that there is no decryption key
related with the source data.
[0043] FIG. 6 is a screen example where such a play-error message
is outputted. The play-error message displayed in FIG. 6 includes
an inquiry window that asks user whether to buy a decryption key or
not. The illustrative inquiry window also includes a URL (Uniform
Resource Locator) addressing a web site on Internet that provides
decryption keys and a download button that enables a user to buy a
decryption key related with the source data through download.
[0044] If on-line purchase of decryption key is not requested
(S15), the system controller 4 automatically selects and examines
the original PGCI, stored in the memory 6, including plural pieces
of CI `Cell 1, 2, 3, . . . ` associated with the sample data (S16).
Then, the system controller 4 knows where in the read-only disk 1
each sample AOB is (S17), based on the pair fields `DA_S_P` and
`DA_E_P` of each CI.
[0045] Afterwards, the system controller 4 searches the read-only
disk 1 for sample AOBs pointed by each pair of the fields `DA_S_P`
and `DA_E_P` through moving the optical pickup 2 inward and
outward, and it reproduces only the sample AOBs sequentially
without any decrypting operation (S18).
[0046] Consequently, a user can determine whether or not to buy a
decryption key for the source data written on the read-only disk 1
after pre-listening or previewing respective partial audio song or
movie recorded on the disk 1 without purchasing an adequate
decryption key.
[0047] If there is a decryption key (S13), the system controller 4
examines the user-defined PGCI, stored in the memory 6, including
plural pieces of CI `Cell N+1, N+2, N+3, . . . ` associated with
the source AOBs (S20). Then, the system controller 4 knows where in
the read-only disk 1 each source AOB is (S21), based on the pair
fields `UA_S_P` and `UA_E_P` of each CI in the user-defined
PGCI.
[0048] Afterwards, the system controller 4 reads out a decryption
key for the source AOBs `AOB N+1, N+2, N+3, . . . ` from the memory
6 and searches the read-only disk 1 for each source AOB pointed by,
each pair of the fields `UA_S_P` and `UA_E_P` through moving the
optical pickup 2 inward and outward. Whenever target source AOB is
found, the system controller 4 conducts reproduction operation of
the AOB while decrypting encrypted source data included in the AOB
with the read decryption key (S22).
[0049] If a user requests on-line purchase of a decryption key in
the situation that the play-error window has been displayed (S15),
the system controller 4 reads from the management zone of the
read-only disk 1 or the memory 6 both a URL (Uniform Resource
Locator), information of a web site that provides a desirable,
decryption key for the source data and disk identification, e.g.,
2-byte serial number assigned to the read-only disk 1. The read
address and disk identification are transmitted to the connected PC
(S30).
[0050] The above purchasing process is initiated by a user's
clicking the `download` button on the illustrative play-error
window shown in FIG. 6.
[0051] The web site addressed by the stored URL identifies which
decryption key is requested based on the received disk
identification. Namely, it searches its database for a decryption
key linked with the received disk identification or serial number.
If found, the web site downloads the found decryption key to the
PC. The PC delivers the downloaded decryption key to the system
controller 4 of the disk drive connected to the PC (S31). This
decryption key delivery may be conducted in accordance with a
protocol pre-specified between the web site and a PC connected to
the web site.
[0052] The URL and disk identification that have been recorded in
the management information zone of the read-only disk 1 are
retrieved into the memory 6 together with the management
information such as PGCI and CI when the disk 1 is placed in the
disk drive.
[0053] The system controller 4 stores the received decryption key
in the memory 6 (S32) in connection with the disk
identification.
[0054] Afterwards, the system controller 4 reproduces entire source
AOBs pointed by every CI in the user-defined PGCI sequentially
while decrypting encrypted source data with the stored decryption
key in the memory 6, the same as explained above.
[0055] In addition, the user-defined, PGCI may not be written in
the management information zone of the read-only disk 1. Instead,
it can be provided from a web site to download a requested
decryption key when a purchase of the decryption key is requested
with disk identification. The provided user-defined PGCI matched
with the source data of the read-only disk 1 is stored in the
memory 6 and then is referred by the system controller 4 when
playback of source AOBs are conducted.
[0056] The above-explained method is applicable to a variety of
read-only disks such as a compact disk (CD) and video CD besides a
DVD-ROM. Further, the present method can be applied to
moving-picture data and still-picture data, besides audio data.
[0057] It will be apparent to those skilled in the art that various
modifications and variations can be made in the present invention
without departing from the spirit or scope of the invention. Thus,
it is intended that the present invention cover the modifications
and variations of this invention provided they come within the
scope of the appended claims and their equivalents.
* * * * *