CN1099070C - Data control system - Google Patents

Data control system Download PDF

Info

Publication number
CN1099070C
CN1099070C CN98119127A CN98119127A CN1099070C CN 1099070 C CN1099070 C CN 1099070C CN 98119127 A CN98119127 A CN 98119127A CN 98119127 A CN98119127 A CN 98119127A CN 1099070 C CN1099070 C CN 1099070C
Authority
CN
China
Prior art keywords
data
control
token
controlled flag
copy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN98119127A
Other languages
Chinese (zh)
Other versions
CN1218928A (en
Inventor
三和邦彦
森本典繁
清水周一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CN1218928A publication Critical patent/CN1218928A/en
Application granted granted Critical
Publication of CN1099070C publication Critical patent/CN1099070C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • G11B20/00898Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm based on a hash function
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/24Systems for the transmission of television signals using pulse code modulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0064Image watermarking for copy protection or copy management, e.g. CGMS, copy only once, one-time copy

Abstract

The present invention provides a system and method for effecting a secure data control using an electronic watermarking with a low manufacturing cost. The data control system comprises apparatuses having functions of; embedding a control flag indicating to control data using an electronic watermarking technique, preparing a token having information as to how to control the data by using the content of the data, distributing the token appended to the data, detecting the control flag from the distributed data, reading the token appended to the data when the control flag is detected, and controlling the data according to a predefined control rule of the token or the control flag.

Description

Data control system
Technical field
The present invention is relevant with the data control system that utilizes eletric watermark (data concealment) technology.Specifically, the present invention relates to a kind ofly utilize a token (token) with information of controlled flag that indication needs implementation data control and relevant controlling data mode to make data can be subjected to the method that desired Data Control controls such as (for example copy, reset) receptions is handled in transmission place.
Technical background
Along with the extensive exploitation of multimedia environment is used, protect the problem of the data that copyright is arranged more and more outstanding.Although digital video disk (DVD), top setting box (set top box STB), closed-circuit television system and distribution network etc. have fully detailed specification at the hardware aspect of issue drama film; do not make the enough satisfied technical manual of content providers protect content but also provide, particularly forbid content illegal reproduction (copy) problem.This is because also do not provide an effective standard to prevent this class problem, have to allow the data content of numerical data be copied easily and revises.The invention provides a kind of mechanism of utilizing the many interesting contents of these media safety ground issue and a kind of controlling mechanism is embedded in method in the content itself, make content under the condition that only allows to copy once, issuing.
More existing so far data control methods are used for protecting content and forbid that content is copied and resets.For example, PUPA6-4026 discloses a kind of technology: produce the code of a code 2 as an indication respective classes License Info from a code that suitably produces 1 by a monotonic transformation f, code 1 and code 2 are shown when the indication permission, and code 2 only is shown when indication is forbidden, thereby make the generation of License Status comparatively difficult.Yet this method allows repeatedly to copy, and needs only code 1 is preserved, and illustrates with code 2 later on to get final product.
For another example, PUPA6-309239 has disclosed a kind of and has been permitted copy method once.In this method, utilized a logo file that the designation data file is not copied as yet, a ciphered data file only just can be transformed into an original data file when having this logo file, and logo file is just wiped after this data file is copied.Yet, because logo file is a file that separates with data file in this method, therefore be easy to repeatedly copy, as long as logo file is preserved to get off to be reproduced.In addition and since determine sign do not match or non-existent situation under forbid resetting, even therefore content is taken or produced by the author, also belong to the row of being prohibited.
These methods of prior art have been used a code or a sign that separates with data basically in carrying out Data Control.In such certain methods, this code that separates or sign be in case just be identified and can be used, so these methods have anti-third party and have a mind to shortcoming a little less than the invasive ability.So wishing to have a kind of Data Control technology that does not have these shortcomings.In addition, wish the data control method of a kind of novelty of exploitation, this method was not only independent fully but also can be compatible up or down with traditional data control method, did not influence the mechanism of existing vision signal distribution system or equipment.
The eletric watermark technology is used to provide the copyright protection of rest image, animation and voice.The eletric watermark technology is a kind of technology that is also referred to as data concealments (TM).Briefly, this is a kind of certain information to be embedded in collective's title of the technology in other medium (rest image, animation and voice etc.), and purpose is that the information and the medium of the information of embedding are become one, rather than uses the cipher mode secret information.That is to say, utilize a kind of method will wish that the information of concealment is embedded in the media data by the processing to media data.This means, in view data, be not that the information of master data is carried such as the such pixel value of brightness by revising for example.It is to be noted that in passing employed in the present invention term " embedding " is meant to revise this form of data itself hides additional information.
One of principal character of eletric watermark is that it is a kind of mark-on technology of non-visual or non-audible.In with the process in the information embedding media, available data is made amendment so that naked eyes detect not come out rather than additional data bits, make total amount of data not increase because having embedded additional information.For example, data are embedded in one by the quantity that does not increase pixel in the image of 640 * 480 pixels.In addition, by text message or voice messaging are embedded in the image, for storage side, it is just enough to handle single medium of planting.One of the most outstanding characteristics are the inseparabilities of the information of being embedded into.Because eletric watermark directly is embedded in additional information in the data structure of medium rather than leader or file, therefore as long as the quality of former data is guaranteed, even platform or data layout difference, the information that is embedded into also can detect.
Provide an example that utilizes the data control method of eletric watermark technology below.No matter adopt this method, be in the record, copy and the playback that send the data place or in the radio wave broadcast data, can both control whether allow to receive data (receiving control) in a similar fashion fully.This method comprises the following steps:
(1) utilize the eletric watermark technology that the controlled flag (CF) of an instruction content protection level is embedded in the video data;
(2) detect the CF that is embedded in the described content, determine whether to allow record or playback of video signal, with suitable controlling recording or playback (just stop the video record if in record, detect the CF that an indication forbids writing down, and if the medium of in playback, resetting be used to write down and detect the CF that an indication forbids writing down and just determine that this vision signal is thereby that illegal copies stop to reset);
(3) when detecting an indication and only allow once CF of record, allow record, and the mark that stays next this vision signal of indication to be recorded, thereby when the content attempt that playback is write down is write down once more, because the mark that CF is arranged and note is just forbidden record once more.
Step (1) and (2) can utilize the eletric watermark technology in advance a CF to be embedded in the content when preparing content and realize.Step (3) also can utilize eletric watermark to realize with step (1) and (2) similar mode, to forbid record once more.Yet, have a problem in this case.Usually, video recording equipment nearly all is that terminal user oneself is all, therefore must do compactly, and price is not high.Yet, in the limited equipment of this processing power, to consider picture quality and be detained signal intensity and realize that the eletric watermark of additional record mark embeds and be actually unusual difficulty.
In target video data for example is under the situation of the view data that MPEG compresses, and must recover to have embedded the view data of record mark.For this reason, except the separating video data to detect the CF, also image restored data and other data (speech data, auxiliary image data etc.) to be lumped together again.Therefore the required buffer and the summation of circuit will arrive greatly more than the twice of CF testing circuit, so be not feasible solution.In addition, owing to the video data of the processing that embedded is made up of the I frame, so the information that when data decompression, is not embedded in other frames (B and P), this is a shortcoming.
Summary of the invention
Therefore, the purpose of this invention is to provide a kind of low-cost system and method for utilizing the eletric watermark technology to realize safe and reliable Data Control.
Another object of the present invention provides a kind of system and method that utilizes copy, playback and the reception of eletric watermark technical security ground control data.
Another purpose of the present invention provides the method and system of the premeditated invasion and attack of a kind of third party of preventing.
It is lower but compared with prior art still have and equate or multi-purpose data control method and system that another purpose of the present invention provides a kind of cost.
A further object of the present invention provide a kind of fully with existing data control method independently but still can with the data control method and the system of the novelty of existing method compatibility.
In order to achieve the above object, Data Control of the present invention (comprise copy, reset and receive control) system comprises the device of following each function of some execution: utilize the eletric watermark technology to embed the controlled flag of an indication control data; Utilize the content of described data to formulate one and how to have the token of the information (as copy and playback number of times, reproducing device and user's sign etc.) of control data; Distribute described data with described token; From the data of distributing, detect described controlled flag; When detecting described controlled flag, read the described token that invests described data; And control described data according to the predetermined described token or the control law (according to the rule of token, sign and medium type synthetic determination control types) of described controlled flag.
In addition, also restrained later Data Control by in the control data process, revising token (deletion token, the quantity of change token is revised formulation right target image section according to this).
The situation of formulating token and Data Control will be described respectively below.The process flow diagram of formulation right target process is shown in Fig. 7.In step 700, utilize the eletric watermark technology that a CF is embedded in the raw data.Here used data comprise image, voice, rest image and animation.Secondly, in step 710, utilize embedded key to formulate the required partial data of token from the extracting data that embeds CF.In step 720, utilize an one-way function to make a token from this part data of being extracted.This token also can utilize an asymmetric key to replace one-pass key to formulate from extract part.Perhaps, also can utilize some different keys to make a plurality of token.In step 730, utilize a user data area to invest the data that embed CF the token of formulating.
The process flow diagram of Data Control process is shown in Fig. 8.In step 800, determine whether a CF who utilizes the eletric watermark technology to embed is arranged in the data of issue.If do not detect CF, just carry out the control of no any restriction, as copy, record, playback etc. in step 800.If detect a CF, then determine whether with a token (can also verify at this whether token is effective) in step 820 in step 800.If definite result of step 820 is NO, then forbidden data control.That is to say and not carry out copying, write down or reset that process stops.If definite result of step 820 is YES, then carry out Data Control (copy, record or playback etc.) according to the predetermined token or the control law of above controlled flag in step 830.Predetermined control rule described here is a kind of rule according to regulation control content such as token and sign and data recording/reproducing medium types.Control content is determined by the combination that is listed in some parameters in the table usually.The mode of this combination is well-known, does not therefore elaborate.Those skilled in the art that are easy to rules modification to be become finer form, to realize various controls.If necessary, handle, to revise later Data Control in step 840 pair token.Handle token and be meant the quantity that changes token, and delete, forbid and revise token with the restriction copy number.In addition, formulation right target part according to this in also can deal with data.For the sake of security, also Data Control pre-treatment token can carried out with token.
The effect of controlled flag and token is identical, except only having the Data Control that just can be scheduled under the situation of controlled flag.The information of control data (as allowing copy number etc.) can be included in controlled flag or the token, also can be included in controlled flag and the token.
Description of drawings
In the accompanying drawing of this explanation:
Fig. 1 shows the embodiment of data control system hardware configuration;
Fig. 2 is the synoptic diagram of the data control system of the external DVD driver of use;
Fig. 3 is the synoptic diagram of the data control system of dress DVD driver in having;
Fig. 4 is the block scheme of DVD-R data control system;
Fig. 5 shows the copy control system of utilizing one-way hash function in the digital picture issue;
Fig. 6 shows the copy control system of utilizing unsymmetrical key in the digital picture issue;
Fig. 7 is the process flow diagram of token production process; And
Fig. 8 is the process flow diagram of Data Control process.
Embodiment
Below in conjunction with the description of drawings embodiments of the invention.Fig. 1 shows the embodiment that is used for Data Control of the present invention (comprise copy, reset and receive control, and formulate token) system hardware configuration.System 100 comprises CPU (central processing unit) (CPU) 1 and storer 4.CPU1 and storer 4 by IDE controller 25 be connected as the hard disk unit 13 of auxilary unit (or the recording medium drive such as MO, CD-ROM 26 and DVD32).Equally, CPU1 and storer 4 by scsi controller 27 be connected as the hard disk unit 30 of auxilary unit (or the recording medium drive such as MO28, CD-ROM 29 and DVD31).Diskette unit 20 is connected to bus 2 by Floppy Disk Controller 19.
A floppy disk is inserted in the diskette unit 20.Under the cooperation of operating system, realize that for CPU and so on provides instruction computer program code of the present invention is recorded in floppy disk, hard disk unit 13 and 30 (or the recording medium such as MO, CD-ROM and DVD) and the ROM14, carried out by load memory 4.Computer program code can be compressed, perhaps is divided into some fragments and is recorded in a plurality of medium.
In addition, system 100 also is furnished with user interface hardware, comprises indication device 7 (Genius mouse, control lever etc.), the keyboard 6 that is used to import and is used for display 12 to user's intuitive display data.In addition, can also be connected with printer, be connected with modulator-demodular unit by serial port 15 by parallel port 16.System 100 can receive on the network by serial port and modulator-demodular unit or communication adapter 18 (Ethernet token ring card), communicates with other computing machines and so on.In the present invention, except by the media releasing such as floppy disk, also can or receive the data of issuing by serial port 16 and modulator-demodular unit or communication adapter transmission.In addition, far the transceiver on ground can be received by infrared or radio-wave radiation and is used to the serial port 15 or the parallel port 16 that send/receive.
Loudspeaker 23 receives the sound signal that Audio Controller 21 is sent here through amplifier 22, output sound.21 pairs of acoustic informations that receive from acoustic pickup 24 of Audio Controller carry out A/D (analog/digital) conversion, and the system that makes can the outer acoustic information of detection system.
Like this, understand easily, data control system of the present invention can be with traditional personal computer (PC), workstation, notebook PC, hand held PC, network computer, household electrical appliance such as the televisor that can join computing machine and facsimile recorder, and the various communication terminals that comprise game machine with communication function, telephone set, facsimile recorder, portable telephone, PHS, electronic memo, perhaps the combination of these parts realizes.Yet being to be noted that it is exemplary providing these ingredients, is not that all these parts all are requisite ingredients of the present invention.
The following describes the embodiment of the DVD-R system that formulates token and control data.DVD31 or DVD-32 that Fig. 2 shows system 100 are external situations, and Fig. 3 to show be the situation of interior dress.The external DVD-R driver 40 and the DVD-R driver 50 of interior dress are connected with system 100 by IDE (ATAPI:ATA packet interface) interface (also can pass through SCSI).The block scheme of DVD-R system as shown in Figure 4.
In Fig. 4, CD 210 is driven by the motor 214 that is connected with driving circuit 212, and the data that are recorded on the CD 210 are read by photometer head 216.Driving circuit 212 carries out work according to the order that DVD controll block 218 is sent.The signal that photometer head 216 is read is delivered to decoding block 220 after delivering to 218 amplifications of DVD controll block, conversion (words if necessary).220 pairs of signals of decoding block carry out modulation and demodulation and error correction.DVD controll block 218 comprises a servo circuit 218B, and its receives from the control signal of decoding block or is recorded in servo data on the CD, control Driver Circuit 212.DVD controll block 218 also comprises a signal read circuit 218A.
Deliver to data control block 230 behind buffer 220A, the MPU220B that the data that decoding block 220 receives are connected by a common bus and demoder 220C error correction and the real-time decoding in decoding block.In data control block 230, utilize the eletric watermark technology to carry out following operation: to produce a token, token is invested target data, detect CF information, carry out Data Control, and handle token with token.View data is delivered to system 100 by ATAPI interface 222, and voice data is delivered to system 100 by DAC (digital-to-analog converter) 224.
In recording process, data with read the situation counter current, from ATAPI interface 222 by data control block 230 and decoding block 220 to DVD controll blocks 218.Photometer head 216 plays a part record-header at this moment.Though above DVD-R data control system and data handling system 100 cooperatings, one independently DVD playback machine or one independently the DVD logging machine also can work, and without prejudice to spirit of the present invention.
Fig. 5 shows the embodiment that utilizes the copy control system of one-way hash function in the digital picture issue.Say that summarily this is a system that forbids copying once more or writing down by the numerical data that token is invested broadcasting, utilize eletric watermark technology control copy or record, after data are copied or write down, just destroy token.Because token can comprise the information of relevant control data mode and (allow copy number as CF (controlled flag), allow the playback number, reproducing device sign and user ID etc.), so in order to illustrate for simplicity whether tentation data can copy to depend on whether there is token in Fig. 5 and Fig. 6.In addition, the quantity of token can be according to realizing that environment change is institute's requested number (token quantity may be prescribed as the limit that for example allows copy or playback number of times).
In this embodiment of Fig. 5, copy CF once is embedded in the content to utilize the eletric watermark technology to allow an indication at most.When detecting this CF, allow logging machine only to copy once.The arithmetic operation results of one piece of digital content is invested such as on some such data contents of digital picture, digital audio-video (comprising such packed data stream such as MPEG).The result of this arithmetical operation is called " token (token) ".Permission copy or reset just depend on whether there is this token whether.
To describe this copy control system below in detail.In Fig. 5, token is one to be utilized the Bit String that an one-way hash function calculates from part (or all) view data and is recorded in or remains on a presumptive area as comment field or user data, issues with view data.The one-way hash function that produces token is well-known, comprises MD5 or CRC (cyclic redundancy check (CRC)).Token produces the function of token or the part that is subjected to arithmetical operation in the image and maintains secrecy, in case can produce the user side.
Select to implement the view data of one-way hash function by embedded key.This part the used view data and the initial value of hash arithmetical operation are maintained secrecy, need with hash function itself then be disclosed.Be recorded in an additional data area (user data area in MPEG2 for example can use 8 * n bit of every unit 8 bits) by the token that will be produced and add this token.On the other hand, one-way hash function is typically expressed as:
H=H (M) wherein, M is a segment length message (numerical value) arbitrarily, h is a length fixed numeric values, and H is the hash function of a regulation.One-way hash function is defined as the function that also satisfies following condition except above condition:
Give regularly at M, be easy to calculate h;
Give regularly at h, be difficult to calculate M (inverse transformation);
Give regularly at M, be difficult to find a M ', satisfy H (M)=H (M ').
This feature is used for labelling to data in the electronics mode, identifies or detect whether modification is arranged.Input message M can be a plurality of units.As an example, available following method produces a hash:
H i=H(I i,H i-1) (I 0=k)
That is to say M iBe I 1, I 2..., I nWith first a kind of combination to i hashed value.I iBe a video data block, and n piece I 1To I nSelected by an embedded key.H iBe the hashed value of i video data block, and a hashed value is with I iWith those until (n-1) individual hashed value (h I-1) repeating as input that this arithmetical operation obtains, multiplicity equals to be subjected to the video data block number (n) of arithmetical operation.I 0Represent by a constant, equally with embedded key also maintain secrecy.
In producing the process of token, only under can copying once situation, the CF instruction content that embeds with the electronics digital watermark just adds an effective token.Token also according to from the marker detection that embeds with the electronics digital watermark to signal produce.In this case, utilization identifies that the user side signal that the eletric watermark detecting device provides in the token produces a token or extracts part.
The token that is produced writes user data (UD) district of the growth data of the order header that for example is in mpeg format.The token that is produced can be with an asymmetric-key encryption.In this case, even premeditated invasion and attack person can know which parts of images information producing token with can not produce token.
The user side, only under the CF instruction content that utilizes the eletric watermark technology to embed can copy once situation, it was effective that token just is accredited as.In the kind equipment of logging machine, from the image of an issue, produce a token in a similar fashion, verify that whether this token is with consistent with that token of image issue.If inconsistent, just forbid record.In addition, also, prevent from analog form is copied by simulation guard signal or CGMS-A data being appended to the simulation output of DVD playback machine.If two token unanimities, just record is left out or the data stream after the token of having banned and destroied.The token of banning and destroying makes it to lose efficacy and only needs to form one and get final product with arithmetic operation results is unmatched.Perhaps, also can revise the part that is used for producing token (if produce token from the image of having revised, this token just can't pass checking so, because it is not real token).When attempt copied once more, owing to there has not been effective token, therefore record was forbidden.
A content that wherein has a respective token must not be a copy.Therefore, if detect token at one from the data stream that can write DVD output, then this must be non-method copy, thereby just forbids resetting.
As another embodiment of copy control system in the digital picture issue, figure 6 illustrates a system that produces token with unsymmetrical key according to the part of extracting from compressed image.Basic mechanism is identical with the situation of using one-way hash function.Be that principal feature under the situation about producing with unsymmetrical key is to maintain secrecy from extracting the method that part produces token in token, produce from token that to extract part then be disclosed.The user side, make the extraction part with a disclosed key from the token of issue, again with it with one like the images category of issue the extraction of formulating partly compare, verify whether mate.Even CF does not allow copy once when a token is effective, also forbid copy.Then, this token was lost efficacy.
Be not confined to Data Control, invest certain right and this token was lost efficacy to realize that with similar mode a kind of token exercises the system of disposable right by an additional token.For example, can realize a kind of like this method: additional token on electronic money makes it lose efficacy when having paid currency.
The following describes the method that in STB, copies control with simple structure as application of the present invention.As a kind of method, existing grand TV (Macrovision) according to charge digital broadcasting (as satellite broadcasting) of paying message pick-up and control analog image record.Yet, in STB, also do not have the output record of a kind of control figure of method easily signal in the digital recorder such as DVD-RAM.Utilize the classic method of grand TV control analog image record as follows:
Figure C9811912700161
Cai in order only to make in the charge digital broadcasting such as satellite broadcasting and to allow in STB under the user has paid the situation of expense and so on that output copies to numeral, need check controlled flag and token, the reasons are as follows.
If the controlled flag of utilizing watermark to embed is the copy control information (CCI) with two bits, whether just can allow to carry out image recording/playback in a digital recorder such such as DVD-RAM according to the testing result of the token (TOKEN) in the user data area that is included in MPEG-2 is controlled, situation be as follows:
Digital recorder (as DVD-RAM)
Combination by CCI and token copies control to read-write, and situation is as follows: for writing situation CCI/TOKEN copies control(1,1) inaccurate copy (0,0) allows copy (1,0)+TOKEN allows the inaccurate copy of copy (disappear in writing and ruin TOKEN) (1,0) () to allow copy to read situation for (from DVD-RAM) CCI/TOKEN copies control(1,1) inaccurate (0,0) permission playback (1,0)+TOKEN inaccurate reset (1,0) that resets allows playback () permission to reset
Therefore, if view CCI (1,0)+TOKEN, just can in STB, allow copy:
Top setting box (STB) digital recorder
(MPEG-2) digital broadcasting → TOKEN disappears and ruins control → DVD-VTR
A
|
Paying information
Make the transmit leg transmission have CCI (1 in advance, 0) and the MPEG-2 data stream of respective token, and the STB that makes the take over party according to paying information (from the outside, for example by digital broadcasting, the information of input) token is controlled under the situation of (disappear and ruin token or allow its former state pass through), record controls in the equipment that has the watermark detection chip such as digital recorder (as DVD-RAM) is as follows: (1,0)+TOKEN → disappear and ruin TOKEN → inaccurate copy
Former state is by TOKEN (keeping TOKEN) → the permission copy once
In addition, in advance an invalid token is embedded in that the token corresponding site replaces effective token and to calculate the method for correct token in STB as follows at transmit leg:
Below detailed description is disappeared and ruin the method for TOKEN and the method for additional TOKEN.
Ruin in the method for TOKEN disappearing,, find the header of TOKEN by supervision to mpeg data stream.If find the header of TOKEN, just implement to control according to paying information, determine whether to disappear and ruin TOKEN behind the TOKEN header.TOKEN header testing circuit and the AND circuit of ruining TOKEN that disappear is easy to realize.
In the method for additional TOKEN, need monitor mpeg data stream, go out TOKEN from data-flow computation, seek the TOKEN header.If find the TOKEN header, just the TOKEN that calculates is folded (containing pseudo-data) the TOKEN district that writes on behind the TOKEN header according to paying information.The TOKEN header testing circuit of additional TOKEN, TOKEN counting circuit and selection circuit all are easy to realize.
From above embodiment as seen, utilize watermark control that the additional information (TOKEN) of digital picture output copy is easy in STB according to smart card in the STB subscriber box of digital broadcasting and so on, user charges information and user's input information correct.Here importantly in STB, do not need to obtain copy control information (CCI).
Adopt method of the present invention, allow content to issue to copy only to need in once the application quantity be 1/20 logic gate of legacy system just can obtain and utilize the legacy system of eletric watermark technology same or better effect, this is because except detecting the function that only needs execution to make a token inefficacy of the necessary eletric watermark chip of CF.
In addition, just utilize under the situation that the eletric watermark technology embedded in token, it can only be embedded in the I frame, loses efficacy thereby embedding " copying " is marked at when breaking away from mpeg format.On the other hand,, there is any change still to remain valid, just can not copies because if token loses efficacy, thereby safer Data Control is provided no matter forbid copying the effect data layout though token can lose efficacy when breaking away from mpeg format equally.
And, utilize watermark control that the additional information (TOKEN) of digital picture output copy is easy in STB according to smart card in the STB subscriber box of digital broadcasting and so on, user charges information and user's input information correct, and in STB, do not need to obtain copy control information (CCI).

Claims (31)

1. data control system comprises:
The controlled flag that Data Control is carried out in an indication utilizes the eletric watermark technology to be embedded in flush mounting in the data of distribution;
Utilize data content to formulate a token making device with token of information how to control described data;
Described token is invested the attachment device of described data;
Issue is with the distributing device of the described data of described token;
From the data of issue, detect the pick-up unit of described controlled flag;
When detecting described controlled flag, read the readout device of the described token that invests described data; And
Control the control device of described data according to the control law of predetermined described token or described controlled flag.
2. one kind as the data control system that claim 1 proposed, and it is characterized in that described control device also comprises modification, bans and destroies or delete the device of described token.
3. one kind as the data control system that claim 2 proposed, and it is characterized in that described being controlled to be copy, the control of resetting or receiving.
4. data control equipment comprises:
Detecting one from data utilizes the eletric watermark technology to be embedded in pick-up unit in the described data, that indicate the controlled flag that described data are controlled;
When detecting described controlled flag, from described data, read the readout device of described token how to control described data; And
The control device of described data being controlled according to the control law of predetermined described token or described controlled flag.
5. data control equipment as claimed in claim 4 is characterized in that described control is copy control.
6. data control equipment as claimed in claim 4 is characterized in that described control is the control of resetting.
7. data control equipment as claimed in claim 4 is characterized in that described control is to receive control.
8. the formulation token that is used for the token of Data Control is formulated equipment, comprising:
Utilize the eletric watermark technology in data, to embed the flush mounting of the controlled flag that an indication controls described data;
Utilize the content of described data to formulate a making device with token of information how to control described data; And
Described token is invested the attachment device of described data.
9. data control system comprises:
Utilize the eletric watermark technology in the data that distribute, to embed the flush mounting of the controlled flag that an indication controls described data;
Utilize the content of described data to formulate a making device with token of information how to control described data;
Described token is invested the attachment device of described data;
Issue is with the distribution apparatus of the described data of described token;
From the data of issue, detect the pick-up unit of described controlled flag;
Read the readout device of the described token that invests described data;
Reenact the device of system again of a token from described data;
The comparison means that the token of reading and the token of system are again compared; And
The control device that the result who utilizes described comparison controls described data according to the predetermined described control law of reading token or described controlled flag.
10. one kind as the data control system that claim 9 proposed, and it is characterized in that described control device also comprises the deletion or the described device that invests the token of described data of banning and destroying.
11. one kind as the data control system that claim 10 proposed, and it is characterized in that described token making device and described token make device again and also comprise the device that utilizes one-way function to formulate a token from described data.
12. one kind as the data control system that claim 11 proposed, it is characterized in that wherein said control be one to copy, the control of resetting or receiving.
13. the data control equipment of a control data comprises:
From data, detect a pick-up unit that utilizes the eletric watermark technology to be embedded in the controlled flag that the indication in the described data controls described data;
When detecting described controlled flag, from described data, read and how to indicate the readout device of the described token of control data;
Formulate the making device of a token from described data;
The comparison means that the token of the token of reading and formulation is compared; And
The control device of when described comparison match, described data being controlled according to the control law of predetermined described token of reading or described controlled flag.
14. one kind as the data control equipment that claim 13 proposed, and it is characterized in that described control device also comprises the deletion or the described device that invests the token of described data of banning and destroying.
15. one kind as the data control equipment that claim 13 proposed, and it is characterized in that described token making device also comprises the device of formulating a token with an one-way function from described data.
16., it is characterized in that described control is copy control as each described data control equipment of claim 13 to 15.
17., it is characterized in that described control is the control of resetting as each described data control equipment of claim 13 to 15.
18., it is characterized in that described control is to receive control as each described data control equipment of claim 13 to 15.
19. a data control method comprises the following steps:
Utilize the controlled flag of the control that the eletric watermark technology controls an indication to data to be embedded in the data of distribution;
Utilize the content of described data to formulate one and how to have the token of the information of control data;
Described token is invested described data;
Issue is with the described data of described token;
From distributing data, detect described controlled flag;
When detecting described controlled flag, read the described token that invests described data; And
Control described data according to the predetermined described token or the control law of described controlled flag.
20. one kind as the data control method that claim 19 proposed, and it is characterized in that the step of the described data of described control also comprises a modification, bans and destroies or delete the step of described token.
21. one kind as the data control method that claim 19 proposed, and it is characterized in that described being controlled to be copy, the control of resetting or receiving.
22. a token that is used for digital content is copied is formulated equipment, comprising:
Utilize the eletric watermark technology in digital content, to embed the flush mounting that an indication allows the controlled flag of the described digital content of copy;
Utilize an one-way function to formulate one and how to have the making device of token that described digital content is copied the information of control from described digital content; And
Described token is invested the attachment device of described data.
23. a digital contents copy equipment comprises:
From a digital content, detect a pick-up unit that utilizes the eletric watermark technology to be embedded in the controlled flag of the described digital content of indication permission copy in the described digital content;
When detecting described controlled flag, read the readout device of the described token that invests described digital content;
Utilize an one-way function to formulate the making device of a token from described digital content;
The comparison means that the token of the token of reading and formulation is compared;
When described comparison match, copy the copy device of described digital content; And
Deletion is described from described digital content invests the token of described digital content or revises described digital content so that the unmatched device of revising of token relatively time the once more.
24. a data control equipment comprises:
Detect a pick-up unit that utilizes watermark to be embedded in the controlled flag in the described data from data, described controlled flag indication needs data are controlled;
When detecting described controlled flag, read the readout device of the token of a designation data control information from described data; And
Control the control device of described data according to the control law of predetermined described token or described controlled flag according to extraneous input information.
25. one kind as the data control equipment that claim 24 proposed, and it is characterized in that describedly being controlled to be reset control or one of a copy control, and receiving control.
26. one kind as the data control equipment that claim 24 proposed, and it is characterized in that the device that described control device comprises the device of deleting described token or described token was lost efficacy.
27. one kind as the data control equipment that claim 24 proposed, and it is characterized in that described extraneous input is paying information or user's input information.
28. a data control equipment comprises:
Reception utilizes watermark to be embedded in an interior controlled flag of described data and the receiving trap of a token, and described sign indication needs control data, and the control information of described token designation data; And
Control the control device of described data according to the control law of predetermined described token or described controlled flag according to extraneous input information.
29. one kind as the data control equipment that claim 28 proposed, and it is characterized in that describedly being controlled to be reset control or one of a copy control, and receiving control.
30. one kind as the data control equipment that claim 28 proposed, and it is characterized in that the device that described control device comprises the device of deleting described token or described token was lost efficacy.
31. one kind as the data control equipment that claim 28 proposed, and it is characterized in that described extraneous input is paying information or user's input information.
CN98119127A 1997-09-12 1998-09-09 Data control system Expired - Lifetime CN1099070C (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JP24827297 1997-09-12
JP248272/1997 1997-09-12
JP248272/97 1997-09-12
JP10143705A JP3103061B2 (en) 1997-09-12 1998-05-26 Token creation device and data control system using the token
JP143705/98 1998-05-26
JP143705/1998 1998-05-26

Publications (2)

Publication Number Publication Date
CN1218928A CN1218928A (en) 1999-06-09
CN1099070C true CN1099070C (en) 2003-01-15

Family

ID=26475372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN98119127A Expired - Lifetime CN1099070C (en) 1997-09-12 1998-09-09 Data control system

Country Status (3)

Country Link
JP (1) JP3103061B2 (en)
CN (1) CN1099070C (en)
GB (1) GB2330031B (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6530021B1 (en) * 1998-07-20 2003-03-04 Koninklijke Philips Electronics N.V. Method and system for preventing unauthorized playback of broadcasted digital data streams
GB2354347B (en) * 1999-08-04 2003-09-03 Internat Federation Of The Pho Reproduction control system
WO2001035388A1 (en) * 1999-11-05 2001-05-17 Sony Corporation Data decoding device and method, charging information processing device and method, data reproducing device and method, electronic money, electronic right of use, and terminal
JP2001258008A (en) * 2000-03-14 2001-09-21 Silicon Contents:Kk Contents supply system and recording medium
JP2002032685A (en) * 2000-05-11 2002-01-31 Nec Corp Contents rental system
JP2002112084A (en) * 2000-09-27 2002-04-12 Fuji Photo Film Co Ltd Method for generating, correcting and detecting image data and photographing device
JP2002112175A (en) * 2000-10-03 2002-04-12 Pioneer Electronic Corp Information recorder, information recording method and computer-readable recording medium with information recording program recorded thereon
JP2002117619A (en) * 2000-10-03 2002-04-19 Pioneer Electronic Corp Information recording device, information recording method and information recording medium recorded to be computer-readable with information recording program
US6895503B2 (en) 2001-05-31 2005-05-17 Contentguard Holdings, Inc. Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
GB0124723D0 (en) * 2001-10-15 2001-12-05 Macrovision Corp Improvements in or relating to the copy protection of optical discs
JP3485911B2 (en) * 2001-12-17 2004-01-13 シャープ株式会社 Data usage restriction setting method, data usage restriction setting device, data usage restriction setting program, and recording medium recording the program
JP4107851B2 (en) 2002-02-13 2008-06-25 三洋電機株式会社 Digital watermark embedding method and encoding device and decoding device capable of using the method
GB0212318D0 (en) * 2002-05-28 2002-07-10 Symbian Ltd Tamper evident removable media storing executable code
GB2392337B (en) 2002-07-19 2005-12-07 Matsushita Electric Ind Co Ltd Digital watermarking apparatus and application apparatus using the same
EP2290975A3 (en) * 2002-12-17 2012-05-23 Sony Pictures Entertainment Inc. Method and apparatus for access control in an overlapping multiserver network environment
CN1783139A (en) * 2003-01-08 2006-06-07 Kddi株式会社 Identification modes of content file producer and its method
JP4485785B2 (en) * 2003-12-15 2010-06-23 株式会社リコー Electronic data processing system and electronic data processing method
JP2005196926A (en) * 2004-01-09 2005-07-21 Toshiba Corp Recording medium, recording medium writing device, recording medium reading device, recording medium writing method and recording medium reading method
US7382905B2 (en) * 2004-02-11 2008-06-03 Microsoft Corporation Desynchronized fingerprinting method and system for digital multimedia data
JP5033382B2 (en) * 2006-09-19 2012-09-26 株式会社日立製作所 Program recording method
US8365279B2 (en) 2008-10-31 2013-01-29 Sandisk Technologies Inc. Storage device and method for dynamic content tracing
US8429365B2 (en) * 2009-06-26 2013-04-23 Sandisk Technologies Inc. Memory device and method for embedding host-identification information into content
JP5011404B2 (en) * 2010-02-08 2012-08-29 株式会社日立製作所 Video recording / playback device
EP3881202B1 (en) * 2020-02-06 2022-01-26 Google LLC Verifying display of third party content at a client device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997022206A1 (en) * 1995-12-11 1997-06-19 Philips Electronics N.V. Marking a video and/or audio signal
WO1997026733A1 (en) * 1996-01-17 1997-07-24 The Dice Company Method for an encrypted digital watermark
WO1997026732A1 (en) * 1996-01-17 1997-07-24 The Dice Company Method for stega-cipher protection of computer code
US5659613A (en) * 1994-06-29 1997-08-19 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69622837T2 (en) * 1995-10-04 2003-04-10 Koninkl Philips Electronics Nv MARKING A DIGITALLY ENCODED VIDEO AND / OR AUDIO SIGNAL
ATE327552T1 (en) * 1997-01-27 2006-06-15 Koninkl Philips Electronics Nv SYSTEM FOR COPY PROTECTION OF RECORDED SIGNALS
DE69807807T2 (en) * 1997-01-27 2003-05-28 Koninkl Philips Electronics Nv METHOD AND DEVICE FOR TRANSMITTING CONTENT INFORMATION AND RELATED ADDITIONAL INFORMATION

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5659613A (en) * 1994-06-29 1997-08-19 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print
WO1997022206A1 (en) * 1995-12-11 1997-06-19 Philips Electronics N.V. Marking a video and/or audio signal
WO1997026733A1 (en) * 1996-01-17 1997-07-24 The Dice Company Method for an encrypted digital watermark
WO1997026732A1 (en) * 1996-01-17 1997-07-24 The Dice Company Method for stega-cipher protection of computer code

Also Published As

Publication number Publication date
JP3103061B2 (en) 2000-10-23
GB9819727D0 (en) 1998-11-04
JPH11164132A (en) 1999-06-18
CN1218928A (en) 1999-06-09
GB2330031A (en) 1999-04-07
GB2330031B (en) 2002-04-24

Similar Documents

Publication Publication Date Title
CN1099070C (en) Data control system
US6230268B1 (en) Data control system
DE69830784T2 (en) SYSTEM FOR THE TRANSFER OF CONTENT INFORMATION AND ADDITIONAL INFORMATION RELATING TO IT
Bloom et al. Copy protection for DVD video
US7533224B2 (en) Apparatus, method and computer program for content utilization management
CN1149839C (en) Use of a watermark for the purpose of copy protection
TWI331324B (en)
EP2082199B1 (en) A data storage device and method
KR100886055B1 (en) Video signal recording apparatus, video reproduction apparatus, and recording medium
JP5039830B2 (en) How to configure a digital rights management license format
US7730313B2 (en) Tracing content usage
CN1581957A (en) Access control for digital video stream data
WO2007148662A1 (en) Information burying device and detecting devie
MXPA04007314A (en) Image file container.
CN1581774A (en) Access control for digital content
EP2036035A1 (en) System and method for object oreinted fingerprinting of digital videos
TW200850000A (en) Fuzzy protection of visual content
CN1767032A (en) Use the multithread equipment and the multithread method of temporary transient storage medium
CN102300093A (en) Encrypting method for distributing data file
US20020076048A1 (en) System and method for inserting disruptions into merged digital recordings
JP2000057058A (en) Data reproducing device, data recording device and program recording medium
US20130064288A1 (en) Secured content distribution
US8397303B2 (en) Memory controller, nonvolatile storage system, and data management method
CN1662980A (en) System for secure storage
US20130329939A1 (en) Decoding a quilted image representation into a digital asset along with content control data

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20030115