CN100335984C - Method and device for portecting content from illicit reproduction - Google Patents

Method and device for portecting content from illicit reproduction Download PDF

Info

Publication number
CN100335984C
CN100335984C CN 01800765 CN01800765A CN100335984C CN 100335984 C CN100335984 C CN 100335984C CN 01800765 CN01800765 CN 01800765 CN 01800765 A CN01800765 A CN 01800765A CN 100335984 C CN100335984 C CN 100335984C
Authority
CN
Grant status
Grant
Patent type
Prior art keywords
method
device
portecting
content
illicit
Prior art date
Application number
CN 01800765
Other languages
Chinese (zh)
Other versions
CN1539142A (en )
Inventor
M·A·埃普斯坦
Original Assignee
皇家菲利浦电子有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Grant date

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy

Abstract

选择若干数据项供加入到数据集中从便阻碍在诸如因特网等有限带宽的通信路径上传输整个集。 Selecting a number of data items for transmission is added to the entire data set from the set on the communication path will be obstacles such as limited bandwidth of the Internet. 将数据集的各部分捆绑在该数据集整体上,从而能区分独立散布的数据集的部分。 The binding portions of the data set in the whole data set, so that it can spread discriminating section independent data set. 例如,在音频录音的情况中,该数据集包含整个唱片集,唱片集上的单首歌曲构成该数据集的部分。 For example, in the case of audio recordings, the data set contains the entire album, a single song on the album constituting portions of this data set. 通过将各歌曲捆绑在唱片集上,能将顺从的播放机配置成在没有完整的数据集时拒绝再生这些项。 By binding each song on the album, a compliant player can be configured to reject these items when no regeneration of the complete data set. 以这一方式,盗窃一首歌曲需要盗窃整个唱片集。 In this way, the theft of a song requires theft entire album. 整体唱片集的未压缩的数字记录消耗数百兆字节数据,预期下载数百兆字节数据的不可行与不现实性足以挫败盗窃未压缩的内容材料。 Uncompressed digital recording of the album as a whole consume hundreds of megabytes of data, the number of infeasible and unrealistic expectations of downloading hundreds of megabytes of data sufficient to thwart the theft of uncompressed content material. 在较佳实施例中,为数据集的各节建立包含与该数据集关联的“整体参数”的水印。 In the preferred embodiment, each of the sections comprising the data set to establish a set of data associated with the "global parameter" watermark. 该整体参数是基于存储在各节的水印中的随机数的散列值的。 This parameter is based on the overall random number stored in the hash of sections of the watermark value. 在提供再生时,读取该整体参数,并将数据集内的随机选择的节的水印与这一整体参数比较以便以统计学必然性确保存在该数据集的整体。 In providing reproduction, to read the global parameter, and the random selection of the data set in the section of the whole watermark and to compare the parameter to ensure that the overall statistical inevitability of the data set is present.

Description

一种解码来自源的内容材料的方法及设备 A method of decoding content material from a source apparatus and a method

本发明主要涉及消费者电子设备领域,而更具体地涉及防复制内容材料的保护。 The present invention relates to the field of consumer electronics devices, and more particularly relates to anti-copy protected content material.

有版权材料的非法散布剥夺了版权所有人对该材料的合法版税,并能向这一非法散布材料的供应者提供助长继续非法散布的收益。 Illegal distribution of copyrighted material deprivation Royalty legitimate copyright holders of the material and provide income to continue contributing to the spread of illegal suppliers of the illegal distribution of materials. 由于因特网所提供的信息传输便利,诸如艺术绘画或其它具有限制散布权的材料等旨在防复制的内容材料是易受大规模非法散布的。 Since the information transmitted by the Internet to provide convenient, such as painting or other artistic materials have the right to limit the spread of content material aimed at preventing illegal copying is susceptible to large-scale spread. 用于存储与传输压缩音频文件的MP3格式已使音频录音的大规模散布成为可行,因为可将一首歌的30或40兆字节的数字音频录音压缩成3或4兆字节的MP3文件。 For storing and transmitting compressed audio files has made the MP3 format audio recordings feasible large-scale spreading, as a song 30 or 40 megabyte digital audio recording may be compressed into a 3 or 4 megabyte MP3 file . 使用对因特网的典型的56kbps拨号连接,能在几分钟内将这一MP3文件下载到用户的计算机。 Using typical 56kbps dial-up connection to the Internet, this MP3 file can be downloaded to the user's computer in minutes. 从而,恶意方能够从原版与合法CD读取歌曲,将这些歌曲编码成MP3格式,并将MP3编码的歌曲放在因特网上供大规模非法散发。 Thus, the malicious party can be read from the original and legitimate CD of songs, these songs will be encoded into MP3 format and MP3-encoded songs on the Internet for reference by large-scale illicit distribution. 此外,恶意方能够提供用于下载MP3编码的歌曲的直接拨号服务。 In addition, the malicious party can provide direct dial service for downloading MP3 songs encoded. 随后能用软件或硬件设备复制MP3编码的歌曲的非法拷贝,或能将其解压缩并存储到可录音的CD上供在传统的CD机上播放。 Then copy the MP3 encoding illegal copies of software or hardware can be a song, or can unzip and stored in recordable CD altar playback on a conventional CD player.

已提出过若干限制复制防拷贝内容材料的方案。 Several restrictions have been proposed copy protection to copy the contents of the program material. 安全数字音乐原创作品(SDMI)及其它提倡利用“数字水印”来标识核准的内容材料。 Secure Digital Music original works (SDMI) and others advocate the use of content material "digital watermarks" to identify approved. 欧洲专利申请EP 0 981 901“在信号中嵌入辅助数据”的文章中公开了在电子材料上加水印的技术,并引用在此供参考。 European Patent Application EP 0 981 901 "auxiliary data embedded in the signal," the article discloses a watermarking technique in the electronic material, and incorporated herein by reference. 当在其纸上水印对应物中,嵌入内容材料中的数字水印是可检测但不引人注意的。 When in its paper watermark counterpart, a digital watermark embedded in the content material is detectable, but unobtrusive. 例如,包含水印的数字音乐录音的音频播放与没有水印的同一录音的播放实际上无法区别。 For example, no audio playback and recording of the same watermark playing digital music recording containing a watermark in fact indistinguishable. 然而,水印检测装置能根据水印的存在与否区别这两种录音。 However, whether or not watermark detection apparatus can distinguish between these two recordings based on the presence of the watermark. 由于某些内容材料可能不是防拷贝的因而可能不包含水印,不能利用水印的不存在来区分合法与非法材料。 Since some material may not be copy-protected and therefore may not contain a watermark to distinguish between legal and illegal material can not use the watermark does not exist. 反之,水印的不存在表示能合法地自由复制的内容材料。 On the contrary, there is no representation of the watermark content material can be legally copied freely.

也可利用其它复制方案。 Other replication schemes may be utilized. 例如,欧洲专利申请EP 0 906 700的“传输内容信息及与其相关的辅助信息的方法及系统”提出了通过使用控制复制受保护的材料的次数的水印“票据”来保护有版权的材料的技术,引用在此供参考。 For example, European Patent Application EP "Transmission Content method and system information and the associated assistance information" 0906700 proposes times by using the control copy protected material watermark "ticket" to protect the art copyrighted material , incorporated herein by reference.

加水印材料的精确复制将导致在加水印的材料中复制水印。 An exact copy of the watermarked material will cause the watermark copy material watermarked. 然而,加水印材料的有损失的拷贝中并不提供在该材料的丢失复制中的水印复制。 However, there is a copy of the watermarked material losses are not provided in the watermark copy is lost copy of the material in. 包含SDML的那些在内的若干保护方案已利用有损失的复制的这一特征根据适当的水印的存在与否来区分合法与不合法材料。 Several protection schemes, including those comprising the use of lossy SDML been copied or not this characteristic to distinguish legal and illegal material according to the presence of an appropriate watermark. 在SDMI标准中,定义了两种水印:“坚固的”水印及“脆弱的”水印。 In the SDMI standard, two watermarks are defined: "robust" watermarks, and "fragile" watermarks. 坚固的水印便是期望能在设计成保持原始内容材料的实质性部分的有损耗的复制(诸如音频录音的MP3编码)中继续存在的水印。 Robust watermark in the watermark is looking forward to the continued existence of a substantial part of the design to preserve the original content material lossy copy (such as MP3 encoded audio recordings). 这便是,如果复制保持足够的信息来允许原始录音的合理再生,也会保持坚固的水印。 That is, if you copy to maintain sufficient information to allow a reasonable regeneration of the original recording, will remain robust watermark. 反之,脆弱的水印便是被预期有损耗的复制或其它非法窜改破坏的水印。 On the contrary, the fragile watermark is expected to be lossy reproduction or other illicit tampering with the destruction of the watermark.

在SDMI方案中,坚固水印的存在表示该内容材料是防拷贝的,而当存在坚固的水印但不存在或破坏了对应的脆弱的水印则表示已以某种方式窜改了该防拷贝的材料。 In the SDMI scheme, the presence of robust watermark indicates that the content material is copy protected, and when the watermark is present but not in solid or destroy the fragile watermark corresponding to said material has been tampered with in some of the copy-protected manner. 将遵守SDMI的装置配置成拒绝再生带损坏水印的或者带检测到的坚固水印但不存在脆弱的水印的加水印的材料,除非水印的损坏或不存在是经“SDMI认证”过程证明是正当的,诸如供在便携式播放机上使用的防拷贝材料的SDMI压缩。 The compliance apparatus of SDMI is configured to reject the regeneration zone damaged watermark or robust watermark band detected but the material of fragile watermarking watermark does not exist, unless damaged watermark or absence is by "SDMI certify" process justified , SDMI copy-protected material, such as for use on a portable player compression. 为了便于参考与理解,这里使用名词“再生”来包括内容材料的任何处理或传送,诸如播放、录制、转换、验证、存储、加载、等。 For ease of reference and understanding, as used herein, the term "regeneration" to include any processing or transferring content material, such as playing, recording, converting, verification, storing, loading, and the like. 该方案用于限制通过MP3或其它压缩技术的内容材料的散布,但并不影响内容材料的伪造的未改动(未压缩)的复制品的散布。 The program for limiting the content via MP3 or other compression techniques spreading material, but does not affect forged unmodified (uncompressed) reproductions of content material spread. 这种有限的保护被认为是商业上可行的,因为下载一个极大的文件来获取一首歌曲的成本与不便会挫伤盗窃未压缩的内容材料的企图。 This limited protection is considered to be commercially viable, because downloading a huge file to acquisition costs and would not discourage the theft of uncompressed content material attempts a song.

本发明的目的是将防拷贝材料的保护延伸到包含保护未压缩的内容材料。 Object of the present invention is to extend the protection of copy protection to the material comprising the protective material uncompressed content. 这一与其它目的是这样实现的,即选择包含在一个数据集中的足够数目的数据项,从而挫败在诸如因特网等有限带宽通信路径上传输整个数据集的企图。 This and other objects are achieved, i.e., selecting data items contained in a sufficient number of data sets to thwart attempts to transmit the entire data set over a limited bandwidth communication paths such as the Internet. 将数据集的各部分捆绑在该整个数据集上以便能区分独立分发的数据集的部分。 The bundled portions of the data set in the entire data set in order to distinguish the distribution of the independent data set. 例如在音频录音的情况中,该数据集包含整个唱片集,唱片集上的单首歌曲构成这一数据集的部分。 For example, in the case of audio recordings, the data set contains the entire album, single song on the album constitute part of this data set. 通过将各歌曲捆绑在该唱片集上,能将顺从的播放机配置成在没有完整的数据集时拒绝再生项目。 By binding each song on the album, a compliant player can be configured to reject items when no regeneration of the complete data set. 以这一方式,盗窃一首歌曲需要盗窃整个唱片集。 In this way, the theft of a song requires theft entire album. 整个唱片集的未压缩的数字录音耗费数百兆字节数据,期望下载数百兆字节数据的不可行性或不现实性足以挫败未压缩内容材料的盗窃。 Uncompressed digital recording of the entire album consumes hundreds of megabytes of data, it is desirable infeasibility of downloading hundreds of megabytes of data or practical enough to defeat the theft of uncompressed content material. 在一个较佳实施例中,为数据集的各段建立包含与该数据集关联的“整体参数”的水印。 In a preferred embodiment, each segment comprises establishing a data set associated with the data set "global parameter" watermark. 该整体参数是基于存储在各段的水印中的随机数的散列值。 This parameter is a hash value based on the overall random number stored in the watermarks of each section. 当提供再生时,读取该整体参数,并将数据集内的段的随机选择的水印与这一整体参数比较以统计学必然性确保存在完整的数据集。 When provided reproduction, to read the global parameter, the randomly selected entirety parameter watermark segments within the data set and to compare statistical inevitability Ensure that a complete data set.

参照附图并用示例更详细地说明本发明,附图中:图1说明按照本发明的用于保护防拷贝内容材料的示例系统。 Referring to the drawings and explained in more detail with examples of the present invention, in the drawings: FIG 1 illustrates an example of copy-protected content material in the system according to the present invention.

图2说明按照本发明的方便确定存在整个数据集的示例数据结构。 2 illustrates the presence of the entire data set is determined in accordance with the present invention to facilitate an example data structure.

图3说明按照本发明的建立数据集与伴随的参数来方便确定存在整个数据集的编码器的示例流程图。 Figure 3 illustrates the establishment of a data set according to the present invention and the accompanying parameters to facilitate the presence of encoder determines the entire data set is a flowchart of an example.

图4说明按照本发明的依赖于整个数据集的存在的再生数据集的数据项的解码器的示例流程图。 FIG 4 illustrates an example of a decoder according to the data items dependent reproducing data set of the present invention in the presence of a flowchart of the entire data set.

所有附图中,相同的标号指示类似或对应的特征或功能。 Throughout the drawings, like reference numerals indicate like or corresponding features or functions of.

使盗窃比所盗窃的物品的价值更费时或费力能防止物品被盗。 Make theft more time consuming or laborious to prevent the items were stolen than the value of the stolen items. 例如,通常用螺栓紧固的保险箱来保护小的贵重物品,因为盗窃保险箱需要化费的力气通常超过盗窃保险箱能预期的所得。 For example, usually bolt-safes to protect small valuables, because theft safes are expended effort usually more than can be expected of theft safe income.

取决于网络负荷与其它因素,使用56kbs调制解调器从因特网下载一般歌曲的MP3编码所需的时间大约是15分钟。 Depending on the network load and other factors, using 56kbs modem takes to download MP3 encoded song from the Internet in general about 15 minutes. 虽然也许不可能对下载持续时间定义具体的“价值”,但相信许多人会愿意承担15分钟下载持续时间来接收一首感兴趣的歌曲。 Though perhaps not possible to define a specific "value" to download the duration, but I think many people would be willing to undertake 15 minutes to download duration to receive an interesting song. 另一方面,用56kbs调制解调器下载一首一般歌曲的非压缩的数字录音大约需要两个小时,相信很少有人会愿意承担两小时下载持续时间来接收一首感兴趣的歌曲。 On the other hand, with 56kbs modem download uncompressed digital recording of a song usually takes about two hours, I believe that very few people would be willing to assume the duration of two hours to download the song to receive an interest. 虽然有人可能偶而承担两小时下载时间来接收一首歌曲,预期两小时下载成为盗窃一首歌曲的普遍手段的可能性是极小的。 Although some people may occasionally bear two hours download time to receive a song, it expected two hours to download the possibility of becoming the universal means of theft of a song is very small. 为此,传统的保护方案曾经是基于利用上面讨论的坚固的与脆弱的水印的组合来标识受保护的材料的压缩的拷贝的要求的。 For this reason, the traditional protection scheme used to be based on the use of a combination of robust and fragile watermark to identify compressed copies of protected material requirements discussed above.

为了方便参考与理解,这里将“无损失”与“未压缩”两词作为同义词使用。 For ease of reference and understanding, here "lossless" and "uncompressed" two words are used as synonyms. 对于本技术中的普通技术人员显而易见,本发明与所传递的信息是否压缩无关,并且与压缩是否有损失无关。 For this ordinary skill in the art readily apparent, the present invention relates to transfer information regardless of whether the compression, and the compression regardless of whether there is a loss. 这里使用词语“压缩的”与“未压缩的”,因为存在着用于检测诸如MP3等有损失的编码的传统解决方案,并且就是MP3的有损失的编码所达到压缩程度已使得大规模散布受保护的材料变得方便。 As used herein the term "compressed" and "uncompressed" because there are traditional solutions such as for the detection of lossy MP3 encoding, etc., and is the MP3 lossy compression encoding extent that has resulted in large-scale spread of protected the material becomes easy. 如本技术中所知,存在着无损失的压缩。 As is known in the art, there is no loss of compression. 然而,无损失压缩方案达不到普通有损失压缩所达到的数据减少,并为了理解本发明的目的并不认为充分“压缩的”与“未压缩的”有所区别。 However, lossless compression schemes fail to achieve common lossy compression data reduction, and for purposes of understanding the present invention are not considered sufficient "compression" and "uncompressed" differ.

也是为了便于理解,这里是在可从因特网下载的数字录制的歌曲的上下文中提出本发明的。 Also for ease of understanding, here is presented in the context of the present invention can be downloaded from the Internet to record the number of songs. 对于本技术中的普通技术人员显而易见,本发明适用于预期经由有限带宽通信路径传输的任何记录的信息。 For this ordinary skill in the art readily apparent, the present invention is applicable to any expected information via a communication path recorded limited bandwidth transmission. 例如,单个的内容材料项可以是较大数据库中的数据记录,而不是唱片集中的歌曲。 For example, a single content material items may be data records in a larger database, rather than an album of songs.

某人非法下载歌曲的可能性能预期为与实现下载所需的时间成反比。 Someone might illegally download songs expected performance is inversely proportional to the time required and implementation. 本发明的前提在于假设存在着某一阈值下载持续时间,在该阈值以上认为由非法下载造成的预期收入损失是可接受的。 Premise of the present invention is assumed that there is a threshold download duration above the threshold value that the expected loss of revenue caused by illegal downloading is acceptable. 可执行实验与观察来确定足以挫败非法下载歌曲的下载持续时间,或者能估计这一挫败持续时间并可能在1/2至1小时的数量级上。 Perform experiments and observation to determine the duration sufficient to defeat download illegally download songs, or can estimate the duration and possible defeat on the number of 1/2 to 1 hour in class. 这便是,如果持续时间小于半小时,有可能出现流行歌曲的“许多”非法下载,而如果持续时间大于一小时,即使该歌曲非常流行也“很少”出现非法下载。 That is, if the duration is less than half an hour, there may be pop songs, "many" illegal downloading, and if the duration is greater than one hour, even if the song is very popular also "rarely" appears illegal downloads.

随着技术的进步及备择的通信方案的成为能够获得,预期能减少下载未压缩的文件所需的时间。 With progress and become a program of alternative communication technologies able to obtain, it is expected to reduce the time needed to download the file uncompressed. 例如,取决于网络负荷与其它因素,使用DSL或电缆连接到因特网上,将传递一首未压缩的数字歌曲所需的时间减少到少于5分钟。 For example, depending on the network load and other factors, a DSL or cable connection to the Internet, the time required to transmit a non-compressed digital songs reduced to less than 5 minutes. 如上面所指出的,大多数存在的保护方案不能区别数字数据的无损失拷贝与原始拷贝。 As noted above, the lossless copy of the original copy protection schemes exist most of the digital data can not be distinguished. 因此,在高速数据传输环境中,由非法下载未压缩的数字歌曲引起的收入损失的可能性预期会明显增加。 Therefore, high-speed data transmission environment, the likelihood of the expected loss of revenue from illegal downloading uncompressed digital song caused significantly increased.

按照本发明,将紧致盘(CD)或其它介质上的单首歌曲捆绑在CD的整个内容上,并将顺从的播放或录音装置配置成在不存在该CD的完整内容时拒绝再生单首歌曲。 Rejected according to the present invention, a single song on a compact disk (CD) or other binding medium over the entire contents of the CD, and a compliant playback or recording device is configured so that the full contents of the CD reproducing unit header does not exist song. 即使在DSL与电缆调制解调器速度上,以未压缩数字格式下载CD上的整个唱片集所需的时间,取决于网络负荷及其它因素,能预期为大于一小时。 Even in the DSL and cable modem speeds, uncompressed digital format to the time required to download an entire album on the CD, depending on the network load and other factors, can be expected to be greater than one hour. 从而,通过要求存在CD的整个内容,在一个小时以上的“下载”成本上,经由因特网上的大规模散布盗窃一首歌曲的可能性大为减小。 Thus, there is the entire contents of the CD by requiring, on the "download" cost more than an hour, through the possibility of large-scale theft of a song spread on the Internet greatly reduced.

图1说明按照本发明的保护系统100的示例框图。 1 illustrates a block diagram of an example according to the present invention, the protection system 100. 保护系统100包括将内容材料编码到介质130上的编码器110、及从介质130上再生内容材料的解码器120。 Protection system 100 includes a content material onto a medium 130 encoding the encoder 110, and the reproduction of the content material 130 from the media decoder 120. 编码器110包含从源选择内容材料的选择器112、及将这一材料记录到介质130上的记录器114。 The encoder 110 comprises a material selected from the contents of the source selector 112, and the recording material to the recording device 114 on the medium 130. 例如可将选择器112配置成选择对应于正在编辑到唱片集中的歌曲的内容信息。 For example, the selector 112 configured to select a corresponding content information editing song on the album. 记录器114利用本技术中公用的技术适当地格式化、编码及存储信息在介质130上。 Recorder 114 utilizes techniques common to the art appropriately formatted, encoded, and information stored in the medium 130.

按照本发明,编码器110包含将选择器112所选择的各项捆绑到记录器114记录在介质130上的信息的整体上的捆绑器116。 According to the present invention, the encoder 110 comprises bundles bundled into 114 recording information on the entire medium 130 on the 116 selected by selector 112. 一般地说,存储在介质130上的信息构成数据项,存储在介质130上的信息整体构成数据集,并且各数据项是捆绑在数据集上的。 In general, an information storage medium 130 on configuration data items, the overall configuration dataset information stored on the medium 130, and each data item is tied to the data set.

按照本发明的解码器120包括再生器122及受整体检验器126控制的门124。 The decoder according to the present invention comprises a regenerator 122 and 120 by the global test control gate 124 126. 将再生器122配置成从诸如CD阅读器132等介质阅读装置检索信息。 The regenerator 122 is configured to read information from a medium such as device 132 to retrieve such as a CD reader. 如本技术中常用的,再生器122通过指定位置索引来检索信息,作为应答,阅读器132提供位于介质130上该指定的位置索引上的数据。 As used in the art, the regenerator 122 to retrieve the location specified by the index information, as a response, the reader 132 provides the data located at the position index 130 on the designated medium. 通过指定位置索引与块大小来实现介质上连续位置上的成块数据的读取。 Reading the data into blocks on successive positions on the medium by specifying a location index and a block size.

图1的虚线说明示例歌曲抽取器142从介质130上抽取歌曲及将其传递给示例CD模拟器144,表示通过因特网的歌曲的可能非法下载。 The broken line in FIG. 1 illustrates an example song extractor 142 extracts a song from the medium 130 and passes it to the simulator exemplary CD 144, represented by the Internet to download the song may be illegal. 例如,CD模拟器144表示响应传统的CD读命令提供信息的软件程序。 For example, CD 144 represents the response simulator conventional CD read command software program for providing information. 作为替代,可将从歌曲抽取器接收的信息写到CD介质上,并提供给传统CD阅读器132。 Alternatively, the song extractor can be received from the information onto the CD medium, and provided to the conventional CD reader 132. 如上面指出的,有可能使用歌曲抽取器142,因为假设传输介质130的整体内容是受到介质130的有目的的大规模内容所阻碍的。 As noted above, it is possible to use a song extractor 142, since it is assumed the entire contents of the transmission medium 130 by the medium 130 is a large-scale object contents being hindered.

按照本发明,将整体检验器126配置成通常通过再生器122从介质130获取数据,来确定是否存在整个数据集。 According to the present invention, the entirety checker 126 is configured to acquire data from the medium 130 generally through the regenerator 122, to determine whether there is the entire data set. 可利用本技术中通用的任何数目的各式各样的技术来检验整个数据集的存在。 With the present technology can be any number of a variety of common techniques to verify the presence of the entire data set. 例如,通过在再生器112可获得的数据项上计算校验和并将这一校验和与对应于该数据集的原始整体的校验和进行比较,能利用对应于数据集中的数据项的校验和来检验所有数据项都存在。 For example, by calculating the checksum and check that the data item in the regenerator 112 and an available data set corresponding to the entire original checksum comparison, can use the data set corresponding to data items checksum to verify that all items are present. 可在这一校验和上数字签名,将其与数据集一起传递,及随后用密钥证明。 This may be the digital signature and the checksum, which is passed along with the data set, and followed by the key proof.

在诸如音频CD播放装置等消费者装置的范围内,基于校验和的方法可能是行不通的。 In the range of consumer devices such as an audio CD player, etc., based on the checksum and may not be feasible. 音频CD播放机包含纠错及其它允许每次阅读CD时有变化的解码方案。 Audio CD player includes error correction and allow each other when there is a change of reading CD decoding scheme. 例如,音频CD播放机没有必要精确地在同一点上开始播放一首歌曲。 For example, an audio CD player is not exactly necessary to start playing a song at the same point. 类似地,如果正在读取CD时检测到错误,通常用重复前一节来替代有错误的节。 Similarly, if the CD is being read error is detected, usually before a repeat section to replace the faulty. 歌曲开始时的少数字节变化或重复相当于毫秒的字节不会引起可觉察的听觉差别,但存在不存在这些字节在与该歌曲关联的校验和上具有重大的影响。 Few bytes song starts to change or repetition byte corresponds milliseconds without causing audible perceptible differences, but the presence of absence of these bytes have significant impact associated with the song and the checksum.

水印及对应的水印检测设备配置成在各种环境中提供精确的与可重复的水印读取。 Watermark and the corresponding watermark detector configured to provide an accurate and repeatable reading watermarks in various environments. 例如,通常在比记录音频信号的位速率实质上更低的位速率上记录水印,并采用冗余记录的水印来进一步增进读取精确值作为水印的似然性。 For example, the watermark is usually recorded on the recording bit rate substantially lower than the bit rate of the audio signal, and recording using the watermark to further enhance the redundancy likelihood value as a precise reading of the watermark. 如上面指出的,通常通过改变记录水印的位速率与冗余度能改变水印的坚固性。 As noted above, generally change the watermark by changing the recording bit rate and robustness of the watermark redundancy. 即使“脆弱的”水印也通常配置成能经受从传统的消费者CD播放装置读取信息时常见的次要变化与异常。 Even if the "fragile" watermarks are also generally configured to withstand common when reading information from the traditional consumer CD player minor variations and exceptions. 如这里所用的,水印一词包含一或多个水印编码:一个水印可包含例如一个脆弱分量及一个坚固分量。 As used herein, the term watermark includes a watermark encoder or more of: a fragile watermark may include, for example, a component and a solid component. 取决于水印生成方法,这些分量可独立地嵌在节中,或作为公共的实体。 Depending on the watermark generation method, these components may be embedded in the section independently, or as a common entity. 为了方便理解,名词水印、脆弱水印与坚固水印这里是与在水印生成过程中集中或分离单个分量的方法无关地使用的。 To facilitate understanding, the term watermark, fragile watermark is robust watermark in the watermark focus here is generated during separation of the individual components or the method used independently.

图2说明方便检验存在原始数据集的整体的用于在数据集中存储数据项的示例数据结构200。 2 illustrates an example data structure easily tested for the presence for the entire data set of data items stored in the raw data set 200. 示出了与传统CD及其它存储介质相符的道210与节220结构。 It shows a conventional CD and other storage media matching section 220 and channel 210 structures. 在一个较佳实施例中,该数据集是自我参考的:数据集包含能用来检验该数据集的其它成员的存在的一或多个参数。 In a preferred embodiment, the self-referential data set is: can be used to test data set comprising one or more parameters of the presence of other members of the data set. 在示例数据结构200中,赋予数据集的各节220随机值R(i)234。 Sections in the example data structure 200, data set 220 to impart a random value R (i) 234. 最好作为“带外”数据(OBD)240将各该随机值R(i)的散列H(R(i))存储在介质上。 Preferably a "band" data (OBD) 240 to each of the random value R (i) a hash H (R (i)) stored on the medium. 例如,可将这一数据240存储在典型的CD的内容表内,作为混合音频-数据CD中的“CD-ROM”数据,作为独立的与唯一的数据节,作为只包含数据的伪歌曲,等等。 For example, the data 240 may be stored in a table of contents of a typical CD, as mixed audio - "CD-ROM" data in the CD, as a separate and unique data section, as the song data contains only dummy, and many more. 利用散列H(H(R0),H(R1),…H(Rn))240的组合的散列作为识别数据集的整体性的检验值CHK。 The integrity check value using the hash H (H (R0), H (R1), ... H (Rn)) combined hash identification data 240 as set CHK. 检验值CHK232与随机值R(i)234构成与该数据集的各节220关联的水印230。 CHK232 verification value with a random value R (i) 234 composed of sections 220 associated with the watermark of the data set 230. 这便是,在一个较佳实施例中,图1的CD130是以具有包含CD上的数据集的完整性的标识符CHK232及节220的标识随机数234的水印230的各记录的节220形成的。 That is, the integrity of the watermark identifier in a preferred embodiment, FIG. 1 is a CD130 has a CD containing the dataset on CHK232 section 220 and the random number identifier 234 of each record 230 in section 220 is formed of. 采用散列值是因为散列计算通常是不可逆的。 Using the hash value as the hash calculation is generally irreversible. 不能确定用来产生散列值的值,也不能确定用来构成散列值的一或多个项的改变的后果。 We can not determine the value used to generate a hash value, can not be used to determine the consequences of changing the hash value composed of one or more items. (这里是在密码学的意义上使用“不能确定”一词:该值的确定预期要耗费比实际能进行的更多的时间与资源。)节水印可以是坚固的或脆弱的水印。 (Here is to use the "not sure" in the sense of the word cryptography: determine the expected value to spend more time than actually capable of and resources) can be printed on water-saving robust or fragile watermark. 在一个较佳实施例中,检验值CHK232是作为坚固的水印编码的,以确保该材料的标识作为受保护的材料,而随机数R(i)234是作为脆弱的水印编码的。 In a preferred embodiment, the test value is a sturdy CHK232 watermark encoder to ensure that the material is identified as protected material, and the random number R (i) 234 is encoded as a fragile watermark. 如上所述,坚固的水印是在较低的位速率上记录的或比较脆弱的水印有更多的冗余度。 As mentioned above, the watermark is robust record at a lower bit rate or fragile watermark has more redundancy. 换一种说法,脆弱的水印比坚固的水印耗费较少的资源。 Put another way, the fragile watermark than robust watermark consuming fewer resources. 也如上所述,脆弱的水印提供诸如受保护的数据的压缩等其它形式的窜改的指示。 As also mentioned above, the fragile watermark indication as to the compressed data by other forms of tamper protection or the like. 检验值CHK也可以是组合的散列的一部分,诸如较低的m位。 Check value CHK may be part of a combination of hash, such as the lower m bits. 虽然部分散列值的安全性小于完整散列值,但存储这一值的资源的节省使安全性的这一降低成为有理的。 Although the security part of the hash value is less than the complete hash value, but save resources stored the value of the security that reduces become justified.

图3说明按照本发明在介质上建立数据集的编码器110的示例流程图。 3 illustrates an example of the establishment of a data set on the medium according to the present invention, the encoder 110 of the flowchart. 在310上,选择数据项供加入到数据集中。 At 310, for selecting data items added to the dataset. 这一数据项可以是选择加入到唱片集中的一首歌曲,选择加入到数据库中的数据记录,等等。 This data item can be added to select a song on the album, opted to data records in the database, and so on. 该数据项包含一或多个数据节。 The data item comprises one or more data sections. 例如,歌曲可划分成多个等时段节,各数据记录可构成单个的节,等。 For example, a song may be divided into a plurality of sections and the like period, the data records may constitute a single section, and so on. 在320上,将随机数R(i)赋予该数据项的各节,并在330上将该数据项的大小加在整个数据集的累计大小上。 In 320, the random number R (i) assigned to each section of the data item, and on the size of the data item 330 is added to the accumulated size of the entire data set. 按照本发明,将数据项加到数据集上直到认为该数据集的大小大到足以阻碍以后通过有限带宽通信信道传输该数据集为止。 According to the present invention, the data item that was added until the maximum size of the data set to the communication channel after transmission over a limited bandwidth sufficient to impede by the data set up on the data set. 这一“阻碍大小”是一个主观的值,并取决于假设的可利用的通信带宽、传输引起的损失、等等。 The "hindered size" is a subjective value, and depending on the available communication bandwidth, transmission loss due to the assumption, and the like. 在335上如果阻碍大小尚未达到,则通过分支返回到框310,选择另一数据项供加入到该数据集中。 If the obstruction 335 in size has not been reached through branches back to block 310, for selecting another item is added to the data in the data set. 在图3的示例流程图中未示出,也可利用其它标准来确定是否增加附加数据项到数据集中。 Not shown in the example of the flowchart of FIG. 3, but also to determine whether to add additional data items to the data set using other criteria. 例如,如果数据项对应于已存在的唱片集收集的歌曲,无论该数据集的大小是否已超过确定的阻碍大小,通常将所有歌曲都加到该数据集中。 For example, if the data item corresponding to the album collection of songs that already exists, whether or not the size of the data set size has exceeded the determination of obstruction, usually all songs are added to the data set. 如果已选择了唱片集收集的所有歌曲而尚未达到阻碍大小标准,则选择其它数据项来累积所要求的阻碍大小。 If you have selected all the songs in the album collected and not yet reached the standard size hinder, select other data items to accumulate hinder the requested size. 例如,可将包括随机数据位的数据项加到该数据集上来增加其大小。 For example, the random data bits comprising a data item is added to the data set up to increase its size. 这些随机位通常是作为带外数据、CD-ROM数据等存储的,以防止传统的CD播放机将其作为可听见的声音再生。 These random bits are typically used as band data, data stored in the CD-ROM and the like, in order to prevent the conventional CD player which is reproduced as an audible sound. 作为替代,这些数据项可包括为促销其它唱片集而提供的其它样品歌曲,或与所记录的内容材料有关的图像与视频节。 Alternatively, the data items may comprise other sample songs for promotional offers and other album or video image recording section with content related material. 类似地,诸如因特网接入预订程序等促销材料也可包含在记录介质的记录的信息中。 Similarly, such as Internet access subscription procedures and other promotional materials may be included in the information recorded in the recording medium. 根据本发明,本技术中的普通技术人员对增加数据集的大小的这些与其它措施是容易理解的。 According to the present invention, the present one of ordinary skill in the art to increase the size of the data set with other measures which are easy to understand. 按照本发明,将各该选择的数据项捆绑在数据集上,使得消除或改变包含为了增加该数据集的大小而加入的任何随机节、促销材料等在内的任何数据项能用来排除以后从这一数据集再生数据项。 According to the present invention, each of the selected data item tied to the data set, such elimination or change any data item section includes any random order to increase the size of the data set and added, promotional materials, etc., it can be used after negative reproducing data items from the data set.

在选择数据项来提供足够大小的数据集之后,在340上根据赋予各数据项的节的随机数的组合计算检验值CHK。 After selecting data items to provide sufficient size of the data sets, in the verification value CHK 340 calculates imparting section The composition of each data item is a random number. 这一组合可包含诸如对应于这些随机数的校验和、对应于各随机数的诸如散列函数等函数的校验和等。 The compositions may contain information such as the random numbers corresponding to the check sum corresponding to each function such as a hash function of the random number, and the like check and the like. 如上所述,这一CHK值最好是随机值的组合的散列,或这一散列的一部分。 As described above, the CHK value is preferably a hash value of a random combination or a portion of the hash. 在350上为包含这一CHK值并且还包含赋予该节的随机数R(i)的数据集的各节建立水印。 Establishing watermark values ​​and further comprising the CHK imparting sections that section contains the random number R (i) of the data set 350. 如上面指出的,最好作为坚固的水印编码该CHK值而作为脆弱的水印编码该随机数。 As noted above, the best as robust watermark encoding the CHK value as a fragile watermark that encodes the random number. 在360上将各节记录到带有这一组合水印的介质上,并在370上将各节的随机数的散列存储在介质上,最好作为带外数据(OBD)。 In the sections 360 on the recording medium with the combination watermark, and the hash 370 of the random number stored on the sections on the medium, preferably as band data (OBD). 以这一方式通过CHK值将单个数据项捆绑到整个数据集上,并且能通过用来建立该CHK值的随机数的自我参考的散列值来检验这一完整值的有效性。 In this manner a single data item by CHK value tied to the entire data set, and used to create a hash value by a random number of self-reference the CHK value to test the validity of the full value. 鉴于本公开,将单个数据项捆绑到数据集上的其它编码方案对本技术中的普通技术人员是显而易见的。 In view of the present disclosure, will be tied to a single data item in the other encoding schemes of the data set of ordinary skill in the art will be apparent.

图4说明配置成依赖于与这一数据项关联的整个数据集的存在再生诸如选择的歌曲等选择的数据项的解码器120的示例流程图。 4 illustrates arranged dependent on the presence of the entire data set associated with the data items such as a selection of songs reproduced decoder selected data items exemplary flowchart 120. 这一流程图假设已用图3的编码方法建立了数据项与数据集的原始拷贝。 This flowchart assumes that the original copy of the data item established with the data set by the encoding method of FIG. 如果采用另一捆绑方案,本技术中的普通技术人员将能根据本示例性实施例适当地修改图4的示例流程图。 If further bundling embodiment, the present technology of ordinary skill in the art will be able to present exemplary embodiment in accordance with exemplary embodiment 4 is a flowchart of FIG appropriately modified. 假设图4的流程是在通过检测到诸如防拷贝水印或其它标识机制而判定所选择的数据项为防拷贝项时调用的。 FIG 4 is assumed that the flow is called when the item in the copy protection is determined by the selected copy protection detected such as a watermark or other identifying mechanisms data items. 在410上,从介质上读取数据集中的数据项的各节所关联的随机数的散列值,它可以是从记录的内容材料的真实拷贝(图1的130)的读取,或者来自非法的源(图1的144)。 In 410, the media hash values ​​read from the random number data set associated data item sections, it may be a true copy of the content read from the recording material (130 of FIG. 1), or from illegal source (of 1441). 在420上,用图3的340上所用的同一算法根据这些散列值的组合计算散列来产生包含在内容材料的真实拷贝的各节的水印中的CHK值。 In 420, using the same algorithm 340 of FIG. 3 used to generate CHK value contained in the watermark of each section copies the real content material in accordance with a combination of computing a hash of the hash values. 在430上选择该数据集的随机节,并在440上读取该水印的检验值作为CHK'。 Selecting a random data set in the section 430, and reads the verification value 440 as a watermark on the CHK '. 作为替代,选择用于验证的第一节可以是来自选择用于再生的数据项内的一节,以便立即验证所选择的数据项便是原始数据集的一部分。 Alternatively, selection may be used for authentication from a first selected for reproducing the data items, for immediate verification of the selected data item is part of the original data set. 在录音的歌曲的上下文中,数据节通常对应于歌曲的15秒节。 In the context of the songs recorded in the data section corresponding to the section is typically 15 seconds of the song. 在455上,如果计算的检验值CHK不等于读取的检验值CHK',指示对随机数的散列的集合的修改,在480上解码器配置成拒绝再生该内容材料。 In 455, if the calculated checksum value is not equal to the read CHK CHK test value ', the hash instructions to modify a set of random numbers, in the decoder 480 is configured to reject the content reproduction material.

为了验证该数据节并未实质性修改,在450上读取赋予随机选择的节Sx的随机数作为R'(x)。 In order to verify that the data section does not substantially modify, read section Sx given randomly selected on a random number 450 as R '(x). 如上所述,该随机数最好存储在脆弱的水印中,脆弱的水印的特征在于对包含该水印的数据的实质性修改会导致该脆弱的水印的损坏或破坏。 As described above, the random number is preferably stored in a fragile watermark, fragile watermark characterized in that the substantial modification of data including the watermark may result in the damage or destruction of the fragile watermark. 在450上还计算所读取的随机值的散列H(R'(x)),并将这一散列H(R'(x))与在框410上读取并随后用来建立验证检验值CHK的对应散列值H'(R(x))进行比较。 Also calculates the read random value 450 in the hash H (R '(x)), and the hash H (R' (x)) and read on a block 410 and then used to create an authentication CHK check value corresponding to the hash value H '(R (x)) are compared. 如果在455上这两个散列值不匹配,将解码器配置成在480上拒绝再生该内容材料。 If the two hash values ​​do not match at 455, the reproduction decoder configured to reject the content material 480. 如果这两个散列值匹配,则可通过循环465-430类似地测试其它的节,直到得出该内容材料并未曾从其真实拷贝实质性修改的充分可信度为止。 If the two hash values ​​match, you can similarly test cycle 465-430 by the other section until the content material and have not come true until the copy substantial revisions to its full credibility. 在一个较佳实施例中,只测试一或两节,以便减少由这一数据集完整性验证过程引入的延时。 In one preferred embodiment, only one or two tests, in order to reduce the delay introduced by this data set integrity verification process. 在465上得出存在整个数据集的充分可信度时,便在470上再生所选择的歌曲。 When the confidence obtained sufficiently in the presence of the entire data set 465, will be reproduced on the selected song 470. 对于本技术中的普通技术人员显而易见,随后可施行附加的验证检验。 For this technique apparent to those of ordinary skill, may then test additional verification purposes. 最好,在读取该歌曲的每一节时验证所选择的歌曲的每一节的水印,以便通过检验包含在各节中的各CHK'值对应于验证检验值CHK而验证该歌曲的各节为原始数据集的有效成员。 Preferably, each section of the watermark verification of the selected song is read at each section of the song to include in each section of each CHK apos verification test value corresponding to the value of the CHK verified by checking each of the songs Festival is a valid member of the original data set.

上文只说明了本发明的原理。 Above only illustrates the principles of the present invention. 从而应理解熟悉本技术的人员有能力设计各种配置,这里虽然没有明确地描述或展示它们,但仍然体现本发明的原理,从而在其精神与范围之内。 So as to be understood by a person skilled in the art has the ability to design a variety of configurations, here, although not explicitly described or shown them, but still reflect the principles of the invention, thus within its spirit and scope. 例如,上面提出的示例说明所记录的材料的各部分便是数据集的部分。 For example, the example set forth above described portions of the respective portions of the data set is recorded material. 在另一实施例中,为了效率的目的,可以用选择的数据项或数据项的选择部分来构成数据集。 In another embodiment, for efficiency purposes, you may be selected by selection section data item or data items to form the data set. 例如,歌曲的尾端可以不是这里所定义的“数据集”的部分,因为水印过程可基于各水印的固定的块大小或者水印的各冗余拷贝。 For example, the tail end of songs may not be defined herein "data set" part, because the watermark process may be based on a fixed block size for each watermark, or each redundant copy of the watermark. 例如,如果水印或其它参数的可靠嵌入需要10秒的记录,则可将((歌曲的长度)mod(10秒))的余数记录在介质上,但不包含在正在检验其完整性的“数据集”中。 For example, if the embedded watermark or other reliable parameter recording 10 seconds, ((the song's length) MOD (10 seconds)) of the remainder may be recorded on the media, but not in the integrity test is "data concentrated. 以类似的方式,一些促销材料可包含在记录介质上,但有意识地排除在数据集之外,以便随时随地能免费拷贝与再生它们。 In a similar manner, some promotional material may be included on the recording medium, but intentionally excluded from the data set, in order to be able to go free copy and reproduction thereof. 注意示例流程图也是为了方便理解而提出的,步骤的具体布置与序列是为说明而提出的。 Note that for ease of understanding is a flowchart of an example proposed, the specific arrangement and sequence of steps described is proposed. 例如,在判定框中为了确定一致性而示出简单的等式,然而取决于用于编码或解码这些参数的特定技术,所读取的项是否对应于确定的项的判定可包含各式各样的中间过程。 For example, in order to determine at decision box consistency simple equation shown, however, depending on the particular techniques used to encode or decode the parameters, the read item corresponds to a determined item may comprise determining various kinds like intermediate process. 这些过程中可包含诸如根据特定密钥解密项、模糊逻辑或统计学测试来判定两个值是否“足够接近”而蕴含一致性,及诸如此类。 These processes may be included, such as a decryption key according to a particular item, fuzzy logic or statistical testing to determine whether the two values ​​are "close enough" and contains the identity, and the like. 根据本发明,诸如此类的变形对于本技术中的普通技术人员是显而易见的,并且它们都包含在下面的权利要求的精神与范围之中。 According to the present invention, like the art for the modification of ordinary skill it will be apparent, and they are included within the spirit and scope of the following claims.

Claims (16)

  1. 1.一种解码来自源的内容材料的方法,该内容材料包含在自我参考数据集之中,该数据集包括多个数据项以及有助于确定所述多个数据项的整体是否存在的一个或多个参数,所述方法包括:确定(410-465)所述多个数据项的整体是否存在在该源上,该确定的进行是通过:读取(440)所述一个或多个参数,读取(410)所述多个数据项,从多个项参数(240)确定(420)对应于所述多个数据项的一个或多个参数,及比较所述读取的一个或多个参数与所述被确定的一个或多个参数,以及根据所述多个数据项的整体是否存在在该源上解码(470)该内容材料。 A method of decoding content material from the source, the content material comprises a self-reference data set in the data set includes a plurality of data items, and the plurality of data items help determine whether there is an overall or more parameters, the method comprising: determining (410-465) the entire plurality of data items exists on the source, the determination is performed by: reading (440) said one or more parameters the plurality of data items to read (410), determining (420) the parameters from a plurality of items (240) corresponding to one or more parameters of the plurality of data items, and comparing the read one or more parameters associated with the one or more parameters to be determined, and the decoded content material (470) on the entirety of the source according to the presence or absence of the plurality of data items.
  2. 2.如权利要求1的方法,其中所述一个或多个参数包含对应于所述多个数据项的散列值,及所述一个或多个参数的确定包含计算对应于该多个项参数(240)的散列值。 2. A method as claimed in claim 1, wherein said one or more parameters corresponding to the hash value comprising a plurality of data items, and determining the one or more parameters comprising a plurality of items corresponding to the calculated parameters (240) a hash value.
  3. 3.如权利要求1的方法,其中确定(410-465)所述多个数据项的整体是否存在还包含:从构成该内容材料的各个项选择中读取(450)标识参数(234),及将该项选择的各项的标识参数(234)与基于该多个项参数(240)的对应项参数的标识符进行比较(455)。 3. The method of claim 1, wherein determining (410-465) whether the presence of the entire plurality of data items further comprises: reading (450) the identification parameter (234) from each of the selected items constituting the content material, and each of the identification parameter (234) is compared with the selected item (455) based on an identifier of the plurality of item parameters (240) of the corresponding item parameter.
  4. 4.如权利要求3的方法,其中:该多个项参数(240)包含多个散列参数,该多个散列参数的各散列参数对应于构成该内容材料的各项的标识参数(234)的散列。 4. A method as claimed in claim 3, wherein: the plurality of item parameters (240) comprises a plurality of hash parameters, each hash parameter of the plurality of hash parameters corresponding to the material constituting the content of the identification parameter ( 234) hash.
  5. 5.如权利要求1的方法,其中将所述一个或多个参数(232)中的至少一个嵌入作为水印(230)。 5. The method of claim 1, wherein the one or more parameters of the at least one embedded (232) as a watermark (230).
  6. 6.如权利要求1的方法,其中确定该内容材料的整体是否存在在该源上包含:从该源读取(410)多个节散列参数(240),根据该多个节散列参数(240)计算(420)整体值,选择(430)该内容材料的至少一个选择节(220),从该源读取(440)该至少一个随机节的水印值(232),及将该整体值与该水印值(232)进行比较(445)。 6. The method of claim 1, wherein determining whether the entirety of the content material is present on the source comprising: reading (410) a plurality of section hash parameters (240) from the source, based on the plurality of section hash parameters (240) calculates (420) the overall value, selecting (430) the content material is at least one selection section (220), read (440) the at least one watermark value (232) a random section, from the source and the whole value is compared with the watermark value (232) (445).
  7. 7.如权利要求6的方法,其中确定该内容材料的整体是否存在于该源上还包含:从该源读取(450)该至少一个选择节(220)的第二水印值(234),散列(450)该第二水印值(234)以产生散列的水印值,及将该散列的水印值与对应于该至少一个随机节的该多个节散列参数(240)的一个节散列参数进行比较(455)。 7. A method as claimed in claim 6, wherein determining whether the entirety of the content material is present on the source further comprises: reading (450) from the source of the at least one select section (220) second watermark value (234), hashing (450) the second watermark value (234) to generate a hash value of the watermark, and a hash of the watermark value corresponding to the at least one section of the plurality of sections random hash parameters (240) section hash parameters were compared (455).
  8. 8.如权利要求1的方法,该方法被应用于解码包含在自我参考数据集之中的内容材料,其中:各数据项包含一或多个数据节(220),该一或多个数据节(220)的各数据节具有关联的节参数(234),及所述一个或多个参数包含一个与所述多个数据项对应的整体参数(232),该整体参数包含与各数据项的一或多个数据节(220)关联的节参数(234)的组合的散列。 8. The method of claim 1, the method is applied to the decoding content material contained in the self-referential data set among, wherein: each data item includes one or more data sections (220), the one or more data sections (220) the data section of the respective sections has an associated parameter (234), and said one or more parameters comprising a plurality of data items corresponding to the overall parameter (232), which contains the entire parameter of each data item hashed combination of one or more data sections (220) section parameter (234) is associated.
  9. 9.一种用于解码内容材料的解码器(120),该内容材料包含在自我参考数据集之中,该数据集包括多个数据项以及有助于确定所述多个数据项的整体是否存在的一个或多个参数,该解码器包括:再生器(122),配置成接收包含在自我参考数据集之中的数据项(210),及从中产生对应于至少一个数据项(210)的再生品,及整体检验器(126),可操作地耦合在再生器(122)上,配置成根据是否存在整体数据集排除该至少一个数据项(210)的再生,该整体检验器(126)配置成用以检验所述多个数据项的整体是否不存在,该检验的进行是通过:读取(440)所述一个或多个参数,读取(410)所述多个数据项,从多个项参数(240)确定(420)对应于所述多个数据项的一个或多个参数,及比较所述读取的一个或多个参数与所述被确定的一个或多个参数。 A decoder for decoding content material (120), the content material comprises a self-reference data set in the data set includes a plurality of data items, and the plurality of data items help determine whether the overall the presence of one or more parameters, the decoder comprising: a regenerator (122) configured data item (210) contained in the received reference data set from among the self, and generating therefrom corresponding to at least one data item (210) recycled products, and the whole test (126), operably coupled to the regenerator (122), arranged according to whether the entire data set to exclude at least one of the reproduced data item (210), which overall checker (126) integral configured to verify whether the plurality of data items is not present, the test is performed by: reading (440) the one or more parameters, reading (410) said plurality of data items, from a plurality of parameter items (240) determining (420) corresponding to the plurality of data items or a plurality of parameters, and comparing said read one or more parameters to one or more of the parameters determined.
  10. 10.如权利要求9的解码器(120),其中该整体检验器(126)进一步配置成:从构成该数据集的项的各选择项中读取标识参数(234),及将项选择项的各项的标识参数(234)与基于该多个项参数(240)的对应项参数的标识符进行比较。 The item identification read selection parameters (234) from each of the selected item constituting the data set in the items, and: 10. The decoder 9 (120) as claimed in claim, wherein the whole test (126) is further configured to various identification parameters (234) with the entry corresponding to the identifier of the plurality of item parameters based on parameters (240).
  11. 11.如权利要求10的解码器(120),其中该整体参数(232)包含对应于该数据集的散列参数,及该整体值包含对应于该多个项参数(240)的散列值。 11. The decoder (120) as claimed in claim 10, wherein the global parameter (232) corresponding to the data set contains a hash parameter, and the integer values ​​corresponding to the plurality of items comprises a parameter (240) a hash value .
  12. 12.如权利要求10的解码器(120),其中该多个项参数(240)包含多个散列参数,该多个散列参数的各散列参数对应于与该数据集的项的各项关联的值的散列。 12. Each decoder (120) as claimed in claim 10, wherein the plurality of item parameters (240) comprises a plurality of hash parameters, each hash parameter of the plurality of hash parameters corresponding to the item of the data set the hash value of items associated with it.
  13. 13.如权利要求10的解码器(120),其中将至少一个整体参数(232)与该多个项参数(240)编码成嵌入该数据集中的一或多个水印(230)。 13. A decoder as claimed in claim 10 (120), wherein at least one global parameter (232) to the plurality of item parameters (240) encoded into one or more embedded watermarks (230) in the data set.
  14. 14.如权利要求13的解码器(120),其中该一或多个水印(230)包含:坚固的水印,配置成使消除该坚固水印将导致该相关数据项的破坏,及脆弱的水印,配置成使修改该相关数据项将导致该脆弱的水印的破坏。 14. The decoder (120) as claimed in claim 13, wherein the one or more watermarks (230) comprising: a watermark robust, sturdy configured to eliminate the watermark will result in the destruction of the data item, and a fragile watermark configured to modify the relevant data items will lead to the destruction of the fragile watermark.
  15. 15.如权利要求9的解码器(120),其中该整体检验器(126)配置成:从数据项(210)的第一项读取第一数据集标识符(232),从数据项(210)的第二项读取第二数据集标识符(232),及根据该第一数据集标识符(232)与第二数据集标识符(232)之间的对应性排除至少该第二项的再生。 15. A decoder as claimed in claim 9 (120), wherein the whole test (126) is configured to: read a first data set identifier (232) from the first data item (210) from the data item ( 210) of the second reading second data set identifier (232), and based on the first data set identifier (232) and a correspondence between the second data set identifier (232) excluding at least the second renewable term.
  16. 16.如权利要求9的解码器(120),该解码器适用于解码包含在自我参考数据集之中的内容材料,其中:各数据项包含一或多个数据节(220),该一或多个数据节(220)的各数据节具有关联的节参数(234),及所述一个或多个参数包含一个与所述多个数据项对应的整体参数(232),该整体参数包含与各数据项的一或多个数据节(220)关联的节参数(234)的组合的散列。 16. A decoder as claimed in claim 9 (120), the decoder is adapted to decode the self-contained in a reference data set from among the content material, wherein: each data item includes one or more data sections (220), the one or a plurality of data sections (220) of each data section, section parameters (234) associated with, and said one or more parameters comprise an integral parameter corresponding to the plurality of data items (232), the parameter contains the entire or a hashed combination of the plurality of data sections of each data item (220) section parameter (234) is associated.
CN 01800765 2000-02-01 2001-01-30 Method and device for portecting content from illicit reproduction CN100335984C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US17895500 true 2000-02-01 2000-02-01
US53781500 true 2000-03-28 2000-03-28

Publications (2)

Publication Number Publication Date
CN1539142A true CN1539142A (en) 2004-10-20
CN100335984C true CN100335984C (en) 2007-09-05

Family

ID=26874847

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 01800765 CN100335984C (en) 2000-02-01 2001-01-30 Method and device for portecting content from illicit reproduction

Country Status (5)

Country Link
EP (1) EP1314156A2 (en)
JP (1) JP2003529790A (en)
CN (1) CN100335984C (en)
CA (1) CA2369082A1 (en)
WO (1) WO2001057869A3 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7228425B1 (en) 2000-02-07 2007-06-05 Koninklijke Philips Electronics N. V. Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
GB0110132D0 (en) * 2001-04-25 2001-06-20 Central Research Lab Ltd System to detect compression of audio signals
US7194617B2 (en) * 2001-11-05 2007-03-20 Koninklijke Philips Electronics N.V. Method and apparatus to prevent the unauthorized copying of digital information
WO2003075272A3 (en) * 2002-03-06 2003-12-04 Koninkl Philips Electronics Nv Double watermarks
US8024808B1 (en) * 2002-08-07 2011-09-20 Cisco Technology, Inc. Arrangement for controlling content distribution by dynamically controlling bandwidth for transfer of the content based on content authorization
CN100474921C (en) 2003-02-10 2009-04-01 皇家飞利浦电子股份有限公司 Import control method and device for content
KR20050118230A (en) * 2003-04-08 2005-12-15 코닌클리케 필립스 일렉트로닉스 엔.브이. Fragile audio watermark related to a buried data channel

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6449377B1 (en) * 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
WO1999053428A1 (en) * 1998-04-16 1999-10-21 Digimarc Corporation Digital watermarking and banknotes
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
WO1999045704A3 (en) * 1998-03-04 1999-11-18 Koninkl Philips Electronics Nv Watermark detection
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6389403B1 (en) * 1998-08-13 2002-05-14 International Business Machines Corporation Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system
GB2364513B (en) * 1998-12-23 2003-04-09 Kent Ridge Digital Labs Method and apparatus for protecting the legitimacy of an article
JP2001067792A (en) * 1999-08-30 2001-03-16 Sony Corp Device and metod for recording and recording medium
JP2001274788A (en) * 2000-01-20 2001-10-05 Internatl Business Mach Corp <Ibm> Distribution of digital contents using web broadcast communication service
US6986048B1 (en) * 2000-01-24 2006-01-10 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction by proof of existence of a complete data set using security identifiers
US7228425B1 (en) * 2000-02-07 2007-06-05 Koninklijke Philips Electronics N. V. Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
EP1218884A2 (en) * 2000-02-07 2002-07-03 Philips Electronics N.V. Protecting content from illicit reproduction

Also Published As

Publication number Publication date Type
WO2001057869A3 (en) 2003-03-13 application
CN1539142A (en) 2004-10-20 application
JP2003529790A (en) 2003-10-07 application
EP1314156A2 (en) 2003-05-28 application
CA2369082A1 (en) 2001-08-09 application
WO2001057869A2 (en) 2001-08-09 application

Similar Documents

Publication Publication Date Title
US7660700B2 (en) Method and device for monitoring and analyzing signals
US6836844B1 (en) Information signal copy managing method, information signal recording method, information signal output apparatus, and recording medium
US7020285B1 (en) Stealthy audio watermarking
US7647502B2 (en) Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US7107451B2 (en) Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US6882728B1 (en) Reproduction apparatus and decoding apparatus
US6564253B1 (en) Content authorization system over networks including searching and reporting for unauthorized content locations
US20090037740A1 (en) Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US5940505A (en) Information recording method and apparatus, function recording method and apparatus, and information reproducing method and apparatus
US20100077219A1 (en) Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US20060075243A1 (en) Systems and methods of providing content protection for digital video products
US6314518B1 (en) System for transferring content information and supplemental information relating thereto
US5822432A (en) Method for human-assisted random key generation and application for digital watermark system
US20080002854A1 (en) Signal continuity assessment using embedded watermarks
US20060062426A1 (en) Rights management systems and methods using digital watermarking
US6104679A (en) Method for determining an unauthorized copy of an optical disc
Petitcolas et al. Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark
US20020073317A1 (en) System and method for protecting digital media
US20020068987A1 (en) System and method for protecting digital media
US20040030656A1 (en) Information recording device and information reproducing device
US6209092B1 (en) Method and system for transferring content information and supplemental information relating thereto
Kalker System issues in digital image and video watermarking for copy protection
WO2001023981A1 (en) Authentification of digital data works using signatures and watermarks
Cano et al. Audio fingerprinting: concepts and applications
US20040059933A1 (en) Digital watermarking and fingerprinting applications for copy protection

Legal Events

Date Code Title Description
C06 Publication
C10 Request of examination as to substance
C14 Granted
C17 Cessation of patent right