Title of Invention

A MEDIA PLAYER FOR PROVIDING MEDIA SECURITY PROTECTION TO A MEDIUM AND METHOD THEREOF

Abstract A software computing based environment for providing secured authentication of media downloaded from a network or loaded from a media player includes two peer-mode operating virtual machines. The low-level virtual machine provides decoding and decryption functions whereas the high-level virtual machine provides application level functions such as user interface, input/output.
Full Text [0001] 1. Field of the invention:
[0002] The disclosure relates to A media player for providing media security protection to a medium, the media player comprising: a security virtual machine (22) configured to perform security decryption and decoding functions for the media player; an application virtual machine (24) configured to perform application level functions for the media player and to provide a user interface, and wherein the application virtual machine is a high level virtual machine and the security virtual machine is a low level virtual machine; and a processing unit (26) configured to run the security virtual machine and the application virtual machine.
[0003] 2. General Background and State of the Art:
[0004] A virtual machine (VM) is a term used to describe software that acts as an interface between compiler code and the microprocessor (or"hardware platform") that actually performs the program's instructions. A compiler is a special program that processes statements written in a particular programming language and turns them into binary machine language or"code"that a computer's processor uses.
[0005] Sun Microsystems, developers of the Java programming language and runtime environment, is well known for their development of the Java Virtual Machine. A Java virtual machine interprets compiled Java binary code (called byte code) for a computer's processor (or"hardware platform") so that it can perform a Java program's instructions.
[0006] Java was designed to allow application programs to be built that could be run on any platform without having to be rewritten or recompiled by the programmer for each separate platform. Once a Java virtual machine has been provided for a platform, any Java program can run on that platform. A Java virtual machine makes this possible because it is aware of the specific instruction lengths and other particularities of the platform.
[0007] A virtual machine is an abstract computing machine. Like a real computing machine, it has an instruction set and manipulates various memory areas at run time. It is reasonably common to implement a programming language using a virtual

machine; the best-known virtual machine may be the P-Code machine of UCSD Pascal.
[0008] A virtual machine can otherwise more generally describe either an operating system or any program that runs a computer.
[0009] There has been a long felt need to develop improved methods of copy protection in next generation media players, such as a DVD or CD player.
[0010] One known content security system used for DVD's is the Content Scramble System (CSS) whereby the data on a DVD is encrypted. The DVD player then decrypts the data as it reads the disc using a 40 bit decryption key. A fatal flaw of CSS, however, proved to be that its keys and algorithms were static. The encryption algorithm was reverse engineered, and every possible decryption key that would play existing DVD discs was made available. Once the secret escaped, the system was forever compromised since there was no way to renew the security algorithms or keys. There are now many programs available to consumers which remove all security from DVD content with a single "click".
[0011] Content owners do not want this to happen again, especially as the fidelity of the content increases. The next content security system should therefore not be vulnerable in this way.
[0012] Software vendors have also faced their share of piracy, but given the nature of computers, they have taken a different approach than that used in the entertainment industry for DVDs. Historically, packaged software program (i.e. computer games) manufacturers have protected their content with "procedural security". That is, there is no static pre-defined method for securing programs, instead each software producer writes or procures a "security code" to secure their content. This procedural security code varies in complexity and technique on a program by program basis, but most importantly, since each program has a different security software implementation, it is not possible to write a general purpose 'remove security* program, like those written to circumvent DVD security.
[0013] Another known method of copy protection is writing hardware specific instructions. The problem with such a method is that this is extremely limiting. With
this method, a different set of instructions must be rendered for each hardware configuration. This is somewhat impractical.
[0014] Therefore, a method of providing copy protection to hardware such as media players, that is not hardware specific, is desired.
SUMMARY
[0015] The disclosure relates to A media player for providing media security protection to a medium, the media player comprising: a security virtual machine (22) configured to perform security decryption and decoding functions for the media player; an application virtual machine (24) configured to perform application level functions for the media player and to provide a user interface, and wherein the application virtual machine is a high level virtual machine and the security virtual machine is a low level virtual machine; and a processing unit (26) configured to run the security virtual machine and the application virtual machine. A system and method of platform independent procedural copy protection is therefore provided to media players. The present disclosure proposes a solution whereby a dual virtual machine architecture is provided to next generation media players. The present disclosure further proposes utilizing a hardware-based embedded security subsystem such as a trusted platform module (TPM) to interface with certain aspects of the virtual machine architecture.
[0016] The dual virtual machine architecture in accordance with the present disclosure consists of a high level virtual machine and a low level virtual machine.
The low-level virtual machine is designed to support low-level media decryption and decoding functions, whereas the high level virtual machine is designed to handle application layer activities. The architecture therefore partitions security software from application software.
[0017] In general, a virtual machine that is best suited for procedural security more closely resembles the instruction set of an actual hardware CPU. That is, it supports pointers, and no underlying distinction is made between executable code and data.
This first type of virtual machine is therefore named a "low-level VM", or" Security-

VM. "The low-level virtual machine is designed to resemble a conventional CPU supporting tamper resistant software techniques.
[0018] The downside to a virtual machine like this is that programming errors or unexpected runtime conditions tend to be fatal. For a security system, this can be considered a strength, but for applications (which are much more complicated, and typically have less intensive test coverage) this is a liability.
[0019] For applications, a "high-level VM" that manages more of the computational details "behind-the-scenes" allows more dependable application programs to be developed that behave in a more predictable and robust fashion. A typical example

of a "high-level virtual machine is Java. For instance, Java does not have support for the concepts of "pointer" or explicit memory management (which are common sources of programming errors), but dCLAIMoes support "exception handling" which helps programs and programmers handle unexpected runtime conditions in a predictable way.
[0020] The high-level, or application level virtual machine is designed to be full featured, and provide for a rich application interface.
[0021] Therefore, it is ideal to combine the benefits of both a low-level VM and a high-level VM in order to provide platform independent security functions that work in combination with other applications. Furthermore, a trusted platform module provides hardware based root of trust by securely querying and validating the execution environment.
[0022] In an exemplary embodiment, the present disclosure is used for the purposes of renewable security and copy protection in DVD and CD players. However, such an architecture also supports the playback of media stored on a hard drive, solid state memory or that which is delivered over a network.
[0023] As mentioned above, the low-level virtual machine is designed to support low-level media decryption and decoding functions. In next generation media (NGM) applications, this low-level virtual machine would also be responsible for bootstrapping the high-level VM. The high-level VM handles application layer activities, like advanced user interfaces, misc. IO, and network activities.
[0024] The dual VM architecture of the present disclosure is novel. The dual VM architecture provides a "peer" relationship unlike the conventional "stacked VM" relationship. One example of a stacked relationship of one VM running on top of another, would be a PowerPC (like in a Mac), running a windows emulator (x86 emulator or VM), which in turn executes Java VM.
[0025] Furthermore, the combination of such a dual VM architecture with a hardware based trusted computing module is novel.
[0026] The present disclosure extends the use of procedural security to media such as CD's and DVD's. In addition, procedural security also allows the content owner much more flexible rights management than declarative systems. This flexibility can
be used to implement full fledged Digital Rights Management (DRM) systems, as opposed to simple Copy Protection (CP) provided by prior art static security systems like CSS.
[0027] The foregoing and other objects, features, and advantages of the present disclosure will be become apparent from a reading of the following detailed description of exemplary embodiments thereof, which illustrate the features and advantages of the disclosure.
BRIEF DESCRIPTION OF THE DRAWINGS
[0028] FIG. 1 is a diagram of a media player architecture in a computing environment according to an exemplary embodiment.
[0029] FIG. 2 is a block diagram depicting the interaction and functionalities of the low-level virtual manager and the high-level virtual manager according to an exemplary embodiment.
[0030] It should be appreciated that for simplicity and clarity of illustration, elements shown in the Figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements are exaggerated relative to each other for clarity. Further, where considered appropriate, reference numerals have been repeated among the Figures to indicate corresponding elements.
DETAILED DESCRIPTION
[0031] Detailed descriptions are disclosed herein; however, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure in virtually any appropriately detailed structure. Reference will now be made in detail to that disclosure which is illustrated in the accompanying drawing (Figs. 1-2).
[0032] The system and method of the present disclosure provides a dual virtual machine architecture for use media players. One VM is designed to support security
functions such as media decryption and decoding. In next-generation media applications, the low-level VM may be responsible for bootstrapping the application level VM. The high-level or application level VM handles application layer activities, like advanced user interfaces, misc. 10, and network activities.
[0033] FIGs. 1 and 2 depict of a media player architecture in a computing environment 10 according to an exemplary embodiment. Specifically, shown therein is a media source (e.g., a DVD, an optical disk, a solid-state device, or a network) that includes media data or content 18, security codes 12 for permitting the media to be played back on the media player, and boot codes 16.
[0034] The media playback device in accordance with the present disclosure contains a central processing unit 26 capable of running at leas one Virtual Machine (VM). The Virtual Machine, in an exemplary embodiment, is a dual virtual machine architecture, comprising a low-level VM (e.g., a security VM) 22 and a high-level VM (e.g., an application VM) 24 running on the CPU 26. Programs that are run in the VM may execute and enforce usage rules as well as update cryptographic algorithms. The computing environment 10 may also include Application Program Interfaces (API's) 40-44 which are a set of routines or protocols for permitting various programs to communicate with each other.
[0035] In one aspect any one of the VM (22 or 24) may control the other VM. in another aspect, the high-level and low-level virtual machines function as peers, in a non-hierarchical manner, passing messages between themselves. These messages may be implemented as "foreign-function calls", where one virtual machine calls a routine in the other virtual machine, or as conventional messages passed along a communications channel.
[0036] For instance, the application VM (or high-level VM) 24 would call the security-VM (or low-level VM) 22 in order to start playback (and hence transparent decoding) of media content 18.
[0037] Likewise, code in the security VM 22 would call the application VM 24 to let it know about synchronization events or decoding problems (for example security or permission problems).
[0038] For example, in the situation where media has been copied off of if s original optical media, the security VM 22 would inform the application VM 24 that it needs a key in order to continue playing, in response, the application VM 24 would display a message, via the application level functions 25, notifying the user that they may "rent" this movie for a certain duration through the user interface 27. If the user chooses to do this, the user must engage in a transaction with a studio server to obtain an 'opaque message* (only understandable by the VM) that contains the key. The application VM 24 then passes the message containing the key back to the security VM 22 and the copy protection algorithms 23 for authentication.
[0039] The media playback device further contains a processing module (e.g., a Trusted Processing Module or TPM) 32. The TPM specification is part of the Trusted Computing Platform Alliance (TCPA) specification created by the Trusted Computing Group (TCG) (htttp://www.trustedcomputinggroup.org). The TPM 32 contains decryption keys and handles secure cryptographic computations. The media playback device further contains API's 40,42 allowing any program running in the Virtual Machine to query the device's I/O hardware and TPM. This allows a program executing in the VM to make intelligent choices for usage rules. A decoding module 34, attached to the CPU 26, is further provided for unpacking encoded audio/video streams.
[0040] In general, a trusted platform enables an entity to determine the state of the software or computing environment 10 in that platform and to seal data to a particular software environment in that platform. The entity deduces whether the state of the computing environment is acceptable and performs some transaction with that platform. If the transaction involves sensitive data that must be stored on the platform, the entity can ensure that that data is held in a confidential format unless the state of the computing environment in that platform is acceptable to the entity.
[0041] To enable this, a Trusted Platform provides information to enable the entity to deduce the software environment in a Trusted Platform. That information is reliably measured and reported to the entity. At the same time, a Trusted Platform provides a means to encrypt cryptographic keys and to state the software environment that must be in place before the keys can be decrypted.
[0042] A "trusted measurement roof measures certain platform characteristics, logs the measurement data in a measurement store, and stores the final result in a TPM (which contains the root of trust for storing and reporting integrity metrics). The TPM is therefore a secure storage location for all decryption keys. The TPM also handles most cryptographic computations and functions.
[0043] The media playback device furthermore has secure, protected inputs and outputs 28, the ability to network with other players 30, memory devices (e.g., RAM 36 and ROM 38).
[0044] Thus, according to the exemplary embodiment, separate virtual machines (VM) run in the same computing environment that includes a CPU. The present architecture partitions two virtual managers (viz., the high-level or application VM and the low-level or security VM), wherein the application and security virtual managers communicate through standardized APIs. The functionalities of the application virtual manager includes providing network services to the security code being executed in the security virtual manager, whereas media access and decoding functions are mediated by the security VM such that content security is transparent to application authors.
[0045] With regards to the computational complexity, the security VM has low impact on system resources, is a simple, light-weight, low-level, and secure, and appropriate software for this VM may be provided by security vendors. The application VM has relatively larger CPU and memory impact and is responsible for user Interface and input/output functions.
[0046] The present disclosure is not limited to use in media players such as conventional CD and DVD players, but could be expanded to run on a PC, or more generalized hardware system which includes functionality to play removable media.
[0047] The foregoing description of the preferred embodiments of the disclosure has been presented for the purposes of illustration and description. Other objects, features, and advantages of the present disclosure will be become apparent from a reading of the following Appendix. It is not intended to be exhaustive or to limit the disclosure to the precise form disclosed. Many modifications and variations are possible in light of the above teaching.







We Claim:
1. A media player for providing media security protection to a medium, the media player
comprising:
a security virtual machine (22) adapted to perform security decryption and decoding
functions for the media player;
an application virtual machine (24) adapted to perform application level functions for the
media player and to provide a user interface, and wherein the application virtual machine
is a high level virtual machine and the security virtual machine is a low level virtual
machine; and
a processing unit (26) adapted to run the security virtual machine and the application
virtual machine.
2. The media player of claim 1, wherein the security virtual machine further supports a first request set and the application virtual machine further supports a second request set, and wherein the first request set is of the low level virtual machine and the second request set is of the high level virtual machine.
3. The media player of claim 1 further comprising: an application program interface (API) permitting the security virtual machine and the application virtual machine to
communicate with each other through the API..
4. The media player of claim 1, wherein the security virtual machine is further adapted to bootstrap the application virtual machine.
5. The media player of claim i, wherein the medium includes security codes, and wherein the application virtual machine delivers the security codes to the security virtual machine.
6. The media player of claim 1, wherein the security virtual machine is adapted to decrypt a boot code in the medium.
7. The media player of claim 1, wherein the security virtual machine is adapted to deliver information related to synchronization events to the application virtual machine.
. 8. The media player of claim 1, wherein the security virtual machine and the application
virtual machine have a peer relationship. 9. The media player of claim 1, wherein the security virtual machine do not have an exception handling capability, and wherein the application virtual machine has the exception handling capability.
10. The media player of claim 1, wherein the security virtual machine provides copy
protection.
11. The media player of claim 1, wherein the processing unit has a processing unit request set,
wherein the security virtual machine supports a first request set and the application virtual machine supports a second request set and the processing unit request set as both first request set and the processing unit request set support pointers, and wherein the second request set does not support pointers.
12. The media player of claim 1, wherein the security virtual machine uses a security request
set for performing the security decryption and decoding functions and the application
virtual machine uses an application request set for performing the application level
functions, and wherein the security request set for performing the security decryption
and decoding functions is different than the application request set for performing the
application level functions.
13. A method of providing media security protection to a medium using a media player of
any of claims 1 through 12, the method comprising:
performing security decryption and decoding functions- for the media player using a
security virtual machine running on a processing unit;
performing application level functions for the media player using the application virtual
machine running on the processing unit; and
wherein the application virtual machine provides a user interface, and wherein the
application virtual machine is a high level virtual machine than and the security virtual
machine is a low level virtual machine.


Documents:

164-DELNP-2006-Abstract-(21-08-2009).pdf

164-delnp-2006-abstract.pdf

164-DELNP-2006-Claims-(12-09-2011).pdf

164-DELNP-2006-Claims-(21-08-2009).pdf

164-delnp-2006-claims.pdf

164-delnp-2006-Complete Specification Granted.pdf

164-DELNP-2006-Correspondence Others-(12-09-2011).pdf

164-DELNP-2006-Correspondence-Others-(21-08-2009).pdf

164-delnp-2006-correspondence-others.pdf

164-DELNP-2006-Description (Complete)-(21-08-2009).pdf

164-delnp-2006-description (complete).pdf

164-delnp-2006-drawings.pdf

164-DELNP-2006-Form-1-(21-08-2009).pdf

164-delnp-2006-form-1.pdf

164-delnp-2006-form-18.pdf

164-DELNP-2006-Form-2-(21-08-2009).pdf

164-delnp-2006-form-2.pdf

164-delnp-2006-form-3.pdf

164-delnp-2006-form-5.pdf

164-delnp-2006-gpa.pdf

164-delnp-2006-pct-210.pdf

164-delnp-2006-pct-220.pdf

164-delnp-2006-pct-237.pdf

164-delnp-2006-pct-304.pdf


Patent Number 249013
Indian Patent Application Number 164/DELNP/2006
PG Journal Number 39/2011
Publication Date 30-Sep-2011
Grant Date 21-Sep-2011
Date of Filing 10-Jan-2006
Name of Patentee DISNEY ENTERPRISES, INC.
Applicant Address 500 SOUTH BUENA VISTA STREET, ROOM 111K, BURBANK, CALIFORNIA 91521-0158, U.S.A.
Inventors:
# Inventor's Name Inventor's Address
1 WATSON, SCOTT 15355 MICHAEL CREST DRIVE, SANTA CLARITA, CALIFORNIA 91387, U.S.A.
PCT International Classification Number G06F 11/30
PCT International Application Number PCT/US2004/021048
PCT International Filing date 2004-06-28
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 60/481,066 2003-07-07 U.S.A.
2 60/493,072 2003-08-05 U.S.A.
3 60/481,034 2003-06-27 U.S.A.