CN100514252C - Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data - Google Patents
Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data Download PDFInfo
- Publication number
- CN100514252C CN100514252C CNB03814753XA CN03814753A CN100514252C CN 100514252 C CN100514252 C CN 100514252C CN B03814753X A CNB03814753X A CN B03814753XA CN 03814753 A CN03814753 A CN 03814753A CN 100514252 C CN100514252 C CN 100514252C
- Authority
- CN
- China
- Prior art keywords
- information
- identification
- operator
- encrypted
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000012546 transfer Methods 0.000 claims description 14
- 238000013475 authorization Methods 0.000 claims description 4
- 238000010276 construction Methods 0.000 claims 26
- 238000007689 inspection Methods 0.000 claims 2
- 241001269238 Data Species 0.000 claims 1
- 238000011144 upstream manufacturing Methods 0.000 claims 1
- 230000006870 function Effects 0.000 description 14
- 230000008901 benefit Effects 0.000 description 8
- 238000007906 compression Methods 0.000 description 8
- 230000006835 compression Effects 0.000 description 8
- 230000004224 protection Effects 0.000 description 7
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 7
- 238000004590 computer program Methods 0.000 description 5
- 230000000638 stimulation Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000009826 distribution Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000004913 activation Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000006866 deterioration Effects 0.000 description 1
- 230000009365 direct transmission Effects 0.000 description 1
- 238000011031 large-scale manufacturing process Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/606—Traitor tracing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
Abstract
The invention relates to devices and methods for producing coded data, for reproducing coded data and for re-signing originally signed data based on the fact that the coded data in addition to the coded media information, comprises the necessary information for decoding the data in addition to a signature thereof which produces the coded data. The source of the coded data is thus traceable. Reproduction of coded data is allowed within defined limits by the producer of the coded data for friends or relatives for example, yet large-scale duplication of the coded data is seen as an act of piracy. The data pirate can be traced back by means of the signature, since the signature is optionally secured by means of an embedded water-mark signature. Since the issue at stake is a concept wherein only legal use should occur for coded data, unauthorised removal of the coding is a criminal act. The inventive concept enables the wrong doer to be determined and takes into account both the ownership status of the provider with regard to a defined reproduction of media information and also has the potentiality of being acceptable to the market.
Description
Technical field
The present invention is relevant to a kind of medium dispensings (media distribution), especially be particularly relevant to a kind of medium dispensing of carrying out the cost free transmission with appropriate scale, yet, its still can so that an extensive transmission be difficult at least and be all traceable in any case.
Background technology
The digital signal statement that is used for media content is to have made can be reached under the situation that a quality loss do not occur when duplicating media content at every turn, but, compared to several years ago, this has also caused unauthorized copying, that is the increase of the pirate " of ", therefore, also cause the copyright owner's of media content damage to property, so, with preponderate when simulating signal statement several years ago, and when this quality characteristic be, for example, compare when buying a disc and being not only the power that has a piracy, may developing of Digital Media statement is to have caused copyright holder's to continue to increase damage to property.
And react as one of this situation, be to produce different notions.One of them notion is known as, by the method that accesses to your password, and at keyword " SDMI " and be accompanied by, for example, under the situation of mutual trust (Intertrust), the person's that avoids the unauthorized operation access, yet, this is but representing, on the one hand, the increase of cost, and on the other hand, to operator's general Restriction of Ownership so far, the so common entitlement of these operators then always is distributed to friend or household for privately owned the duplicating with a small amount of.
The method of accessing to your password of known techniques has following shortcoming.At first, it must stand the complex logic dispensing of this access keys, in addition; the known techniques form needs one extraly by a method that substitutes, for example, and for example; by mail; phone etc.; and indivedual decoding keys from these media contents are provided dividually, but, if these indivedual decoding keys are no longer for can utilize the time; if; for example, system change is held; or one use contract at the expiration the time, then; for example; the music collection of this protected form will become useless, so so a form is for following and dangerous; and; will be eliminated soon, moreover, because the copyright of both having deposited is the equipment of being incorporated into; or people; therefore; for friend, for example, for example; transcribe an audiotape from a CD; or be transcribed into the sound cassette tape that to play it from a CD; piracy become impossible, also therefore, and can't use; or extend to miscellaneous equipment; or people.
In addition, so system provides a stimulation that cracks this guard method that accesses to your password especially, because any access except authorize access is all stoped.
In addition, the protection notion that so accesses to your password is the protection that relies upon password usually, so; in the method that is cracked, it is free fully that all contents promptly become, and can't cause the your attention in (legal) distribution chain; therefore, so one illegal and can't be proved.
For example; in the sound publication (audio work) of music industry; the system that tries to limit proprietary this damage to property of these media contents is called the " DRM " of system (DRM=digitalrights management between the expert; digital copyright protecting); wherein; so system duplicates for fear of undelegated; and in order to make preferably the detailed account via ecommerce (E-commerce) method become possibility; yet so system does not still establish as yet, and; acceptance aspect the operator still leaves a question open; because as having explained, these operators both deposit entitlement and will be restricted.
One common point of all those methods is, they can avoid the access of access by unauthorized persons to content, and the donor must pay usually, this pays and then can very accurately be adjusted to real behaviour in service by additional rule, and it is to I haven't seen you for ages far fewer than the paying of general device or data carrier.
Yet, for example, for example, allow to duplicate for seven times to original work, but do not allow the duplicating of this duplicate, rule like this be suitable complexity, and, because this complicacy can be under suspicion when the person of being operated receives usually.
And present system is, for example, and at " Secure Delivery of Compressed Audio byCompatible Bitstream Scrambling ", C.Neubauer and J.Herre, Preprint 5100,108th AES Convention, Paris, among the February 2000, disclose, in addition, all right Jack Lacy, Niels Rump, Talal Shamoon, Panos Kudumakis, " MPEG-4 Intellectual PropertyMManagenebt ﹠amp; Protect ion (IPMP) Overview ﹠amp; Applications ", 17th AESConference, Florence, September 1999 or Niels Rump, Philip R.Wiser, " AESSCSC-06-04 Activities on Digital Music Distribution ", 17th AES conference, Florencce, September 1999 as a reference.
As having explained, aforementioned all shortcomings of mentioning are to cause operator's low reception degree, also why known system's not received reason on market, and this is because up to now, they have only adapted to the interests of music industry, but to being legal, but when being subjected to invading, may automatically cause so failure of a system according to legal document, the " entitlement " inking of both depositing the operator few.
Summary of the invention
A purpose of the present invention is to provide a kind of copyright protection with received preferable chance on market.
This purpose is by the method for the device of the method for a kind of device of the generation encrypted data according to claim 1, a kind of generation encrypted data according to claim 16, a kind of decrypting encrypted data according to claim 17, a kind of decrypting encrypted data according to claim 24, a kind of generation according to claim 25 device, a kind of generation according to claim 40 method or a kind of computer program according to claim the 41 of stamped signature data again of stamped signature data again, and is reached.
The present invention is found to be as the basis; on market, only there is a copyright protection to be received; and it is the interests that not only can take into account music industry; also can take into account the entitlement of both having deposited or in the interests that finally will shoulder this operator of the responsibility of acceptance on the market; differently be that the notion that the present invention is used for media information is compromise between medium supplier's these interests and media consumer's.
As will successively being illustrated as reference with different viewpoints, the present invention is based on, in principle, in case the content of having bought can be thought anyone employed idea, yet, for first buyer, or an identification of transmitting the people of these media contents but is can be contained among these data of being transmitted, therefore, in the method, when, for example, when making unlimited a large amount of duplicating, because this lawbreaker is can be by duplicating of a large amount of dispensings and in addition identification, so in the example of abuse, this is to allow accusing the lawbreaker, or become possibility for illegal punishment.
In particular, the feature of encrypted data produced according to the present invention is to be, it is what encrypted, but it is to comprise decryption information, with and be the identification information that comprises the people who produces this encrypted data extraly, therefore, this encrypted data can comprise, except this encrypted media information, extra information, and it is design so that this products survivor's of this encrypted data a identification and this one the deciphering both and can be carried out under the help of this extraneous information of encrypted media information.
Different is, this is expression, and this publisher of media content must carry out digital signature to these contents earlier before publishing.
A key concept of the present invention is that it is to encrypt the fact as the basis, that is, these media contents or media information can be encrypted, and be known as in the U.S. under the relevant law of " Millennium bill (Milleniums Act) ", it also is an illegal behavior that this encryption is eliminated, so, in this context, it is to be noted, law according to the U.S., duplicate the unencryption file, for example, for example, mp3 file, be not to be illegal activities, still, it will be illegal activities that a unauthorized of encrypting is eliminated.
In a preferred embodiment of the present invention, on the one hand, this identification information, and on the other hand, this decryption information, it is all the part of this encrypted data, and rely on each other, and this has promptly guaranteed, remove this identification information from this encrypted data and can have the result that this encrypted data no longer can be decrypted, in a preferred embodiment of the present invention, at this, be to use an asymmet-ric encryption method, in particular, one operator can have a pair of its oneself the key that comprises a public-key cryptography and a private key that is relevant to, wherein, this private key is used by an operator, a symmetrical key that is used to decipher this media information with encryption, and then obtain an encrypted symmetric key, then, this operator promptly can with this encrypted symmetric key with and public-key cryptography increase to this on the encrypted media information, in this example, because this operator can be by the help of this public-key cryptography and in addition identification clearly, therefore, this public-key cryptography that is increased is this operator's identification, yet, one recipient of this encrypted data will be from this encrypted data acquisition the disclosure key, utilize this public-key cryptography and decipher the then deciphering then of this encrypted symmetric key that has increased, and utilize this to decipher symmetric key and play this decrypt media information at last, in addition, if this product survivor's of this encrypted data the disclosure key is under without the situation of permission when being removed, then one of this symmetric key deciphering, and finally this a deciphering of encrypted media information will can not be allowed to again, therefore, this operator's identification information (signature) is a whether operable reason of this encrypted data.
What propose is, this media information freely is distributed to a limited range, that is, friend, or between the people who knows well, or it is free being used for itself different players of this operator, therefore, this possibly can't be accepted such entitlement, and to want the bereft operator's of grade common entitlement be to be subjected to consideration, finally, this will be notion of the present invention can be on market received deciding factor, in other words, the copyright holder's of this media information interests be with they must provide limited cost free duplicate-similarly epoch of sound reproduction are arranged, still in simulation, they also possess tracking and punish abuse of poor quality, for example, for example, provide this media information with an a large amount of scale, for example, via world-wide web, possibility, and this tracking be by, this encrypted data that can be decrypted can comprise this identification of the people who has carried out extensive-unauthorized-dispensing, the fact and become possibility.
In a preferred embodiment of the present invention, its also preferably, a so-called secondary defense will also can make, except this unencrypted format operator identification, operator's identification becomes a possible watermark (watermark) and increases among this media information.If just in case this assailant successfully distorts, or remove this operator's identification, and when a complete data stream still is provided, then by the help of this watermark, its identification is still possible, in particular, successfully produce in the example of unencrypted format data an assailant from this encrypted data, though it is to become very difficult by technical prevention, one identification still can be found by this watermark, if be successfully under the situation of the watermark that does not have it to wait to increase to this media information, when producing the unencrypted format data, a watermark that then this encrypted data is offered this lawbreaker's people will be contained among this media information, therefore, can obtain this identification information at least, so, be to have at least to find out because it has removed a fact of encrypting, so acted illegally, therefore and committed this actual lawbreaker's of a crime chance, the same just as previously explained.
Therefore; notion of the present invention is characterised in that; it can comprise this media information of encrypted form; and be; this key that is used to decode and plays is to be contained among this encrypted data, wherein, in any case; it is not utilize the unencrypted format data to write the legal possibility of a file; in addition, this encrypted data comprises this operator's identification, with as a digital certificate; or be the user signature of protected mode; be preferably; this signature is authorized and is registered by a certificate authority, and in addition, it is preferably as defence line, one second road; this operator's identification is embedded among this media data, as a watermark.
Notion of the present invention is to be for these operators of media information or consumer's advantage, and it provides simple use and has allowed to be used for freely duplicating of private use the (for example, for example, friend), that is, a understandable system of a limited scope.Therefore, up to now, be under half legal state, and do not have simple operations person's meeting of unlawful interests-by a corresponding situation of law, or these medium supplier's regulation-and be promoted to a legal state, in addition, for data transfer rate compression, it is preferably before encrypting this media information, compress this media information earlier, when using MPEG-4 as a compression method, this operator will even can obtain a better sound quality, and, for example, than MP3, be a high compression, and, therefore this MP3 format that has comfortable each aspect all can freely duplicate is converted to by notion of the present invention and becomes the stimulation of the MPEG-4 of cipher mode, and for the normal running person who still wants freely to duplicate in a small amount, can't produce any shortcoming, still, pirate for illegal businessman's large-scale production, will produce disadvantage, at this, this piracy can't be encrypted notion and fully avoided by this, but, in any case this piracy is can be under the help of this operator's identification in this encrypted data, is found and pays for.
In addition, this operator can receive extra medium and follow the trail of, particularly, when MPEG-4 is not only a sound compression method, also be when can be used to image, literal etc., generally speaking, it is to think, illicit copy can be reduced by notion of the present invention, therefore, for example, the price of music and audio-visual publication will be lowered owing to this illegal use that has reduced.
Notion of the present invention is to be for the advantage that these copyright holders of media information also have, compared to the epoch of analog music dispensing, this is not a deterioration, and provide legal viewpoint, with in the extensive piracy of MP3 in the age to going into a halt, in addition, this is used for system that this medium produce the survivor provides and has entered no longer gratis of media content, but with the inlet in encrypted form age of providing and delivering.
In addition, notion of the present invention is because it obtains the relation of the fact of encryption, can have the effect that this operator can appreciate the value of this media information for the advantage of music industry.In addition, notion of the present invention will cause these operators to handle media content in a more responsible mode, because they must expect, when transmitting these medium, finally their identity will be comprised among the piracy of a large amount of dispensings, and this may cause embarrassing when duplicating, yet, not therefore this operator's acceptance should be and influenced, is promoted to a legal state because transmit the method state that will narrow certainly in a limited range.
Notion of the present invention solves the problem of several known DRM systems simultaneously by increasing this decoding password, therefore, promptly no longer need in computing, a quite expensive complex password manage, in addition, notion of the present invention is self-centered, its difference is, this encrypted data can in all comprise the information that need be used to play in free, how it produce encrypted data according to the present invention then wait until after, in addition, these employed encryption methods, for example, for example, RAS is as an example of an asymmet-ric encryption method, and Rijndal is also for disclosed as an example of a symmetrical encryption method.
Notion of the present invention as illustrational so far, is to allow at random to duplicate and play in this operator's a limitation of liability, that is, in individual's section, can also pass to friend, that is, be passed to a limited scope.
In addition, the motivation of the broken sign indicating number of the " that the unpromising normal running person of notion of the present invention provides " because, anyway this access is free, be with, this operator's responsibility will limit a large amount of dispensings, but is not a mode that accesses to your password.
In addition, as the so-called one alternative defence line that increases, can optionally be contained among the media data that is cracked with identification stamped signature person's a watermark.
In addition, notion of the present invention is to have nothing to do in employed source code form.Existing up to now each compression method; for example; for example; MP3 etc.; all can be integrated; even; it is preferably to utilize new MPEG-method as this source code method; to give these operators one extra stimulation; because; MPEG-4 can comprise the compression of higher data rate and preferable sound/image quality; and the speciality that further is improved; and this allows this operator agree the stimulation of notion of the present invention; can be further by no longer allowing the MPEG-encoder/decoder freely obtain; just can be free with this DRM system associated the time but only have; or with an acquisition at a low price; so that can not allow product produce crisis in market, this promptly represents, under the situation of the best; can not have demoder; and, in particular, play the latter of this unencrypted format; so; this result that can have is for a normal user, not have illegal download intention; and use new-encrypted and stamped signature-form, can be than carrying out for this cryptoguard; or the complexity of signature cracks easierly.
Description of drawings
Preferred embodiment of the present invention will successively be described in detail with accompanying drawing as a reference and in addition, wherein:
Fig. 1 shows that the present invention is used to produce a calcspar of the notion of enciphered data:
Fig. 2 shows that the present invention is used to decipher/play to have encrypted and a calcspar of the notion of stamped signature data;
Fig. 3 shows that the present invention is used for stamped signature encrypted data again, to allow that it is passed to a calcspar of other (credible) people's notion;
Fig. 4 shows to encrypt and the signal of the form of stamped signature media information is graphic;
Fig. 5 is that demonstration can be by the scheme (scenario) and the general view of different data format in this example of notion supply of the present invention;
Fig. 6 is used to display the play encrypted and a calcspar of a simple mechanism of stamped signature media information;
Fig. 7 shows that the present invention is used to produce the distinctive local file of an operator (local archive) to prepare a calcspar of the device of version (introductory version) " as a ";
Fig. 8 shows according to a preferred embodiment of the present invention, and one is used to play, produce and a calcspar of the device of stamped signature again;
Fig. 9 is an extension of this device of displayed map 8, with the media information that a medium supplier is provided utilize one encrypted and the form of stamped signature send; And
Figure 10 is an extension of displayed map 9 so that except need not to encrypt/selection of stamped signature, delivery of content a bit also can not be become possibility to point selection to other people.
Embodiment
Fig. 1 shows that the present invention is used to produce the device of the encrypted data of representing media information.This media information, can be unencrypted format, or can be basis, for example, one MPEG-4 method and the data transfer rate (data rate) that compresses, can be fed to an input end of this device of the present invention, then, this media information can enter the device 12 that is used to encrypt, wherein, this device 12 is to comprise by being used to provide, on the one hand, one operator's identification, and, on the other hand, the device 14 of the extraneous information of key information and be provided to a password, and can be specifically embodied as this device that is used to provide 14 of a storer, its can with, make on the one hand, one operator's identification, and on the other hand, becoming this possible extraneous information in a deciphering of this encrypted media information output of the output terminal of this device 12 provides to being used for this extraneous information increased to this device 16 on encrypted media information, so that this encrypted data that carries out stamped signature by an operator of this shown in Fig. 1 device to be provided at an output terminal 18, be to be encrypt file what this will mention in these data of this output, or continuous stream data (continuous streamdata).
This unencrypted format media information is passable, for example, is the operator CD in its belongings or the DVD PCM data that read out or cut out, in addition, this media information can be pressure source information (compres sedsource information), for example, for example, the PCM data of having encoded, wherein, one known coding calculation formula, for example, for example, MPEG-4, MP3 etc. are can be used as this coding calculation formula.
It it is to be noted equally, any media information all can utilize notion of the present invention and handle, for example, for example, acoustic intelligence, image information, Word message, figure, particular music information are arranged, for example, for example, wav file, MIDI file, music music file (music score files) etc.
Any encryption method, for example, for example, symmetric encryption method (for example, Rijndal), or asymmet-ric encryption method (for example, RSA), all can be used as this performed encryption method of this device that is used to encrypt 12, wherein, with regard to the judgement of computing time, be preferably a combination of these a little notions, and particularly advantageously be, it is to utilize an asymmetric encryption notion and encrypt a symmetrical key that is used for this media information of actual encrypted, and, be to use the public-key cryptography (publickey) of this asymmetric methods and utilize this symmetric key that this corresponding private key (private key) encrypted both, with as extraneous information, under this situation, the public-key cryptography of this increase also can provide this operator's identification, generally speaking, this extraneous information should be formed, so that this operator's a identification and by this extraneous information this encrypted media information one the deciphering can be carried out, in particular, it preferably, utilize owing to this extraneous information of at least a portion, for example, in above-mentioned example, the disclosure key, can explain this operator's identification simultaneously, so a utilization of this operator's identification is the mode in this useless enciphered data of this output terminal 18 places conversion of this device of Fig. 1, and selects this extraneous information, with regard to certain meaning, it can not relend by this information that is included in this encrypted data itself and be decrypted.
Fig. 2 shows that the present invention is used for the device of decrypting encrypted data.; for example; one input end, 20 places of this device that Fig. 2 is shown; this that provides in these output terminal 18 places of this device shown in Figure 1 encrypted and the stamped signature data can be provided and be fed to the device 22 that is used to capture a password; and to the device 24 that is used to decipher; wherein; this device that is used to capture 22 is formed; to be used for then will being fed to the decryption information of this device 24 from this encrypted data acquisition; this device 24 then can be used to from this decryption information of this device 22 and decrypted packet is contained in this encrypted information in this encrypted data; and with its be fed to be used for the statement; or the device of playing 26; according to this embodiment; this device that is used to play 26 is a loudspeaker (speaker) (acoustic intelligence is arranged); one display (image information); be used for the special device of sound or music output etc.; moreover; be preferably especially; in this shown device of Fig. 2; be included in the total system in this device shown in Figure 2; for example; for example; one operator's PC; can not allowing, decrypt media information is output as numerical data at the output of this device 24; or differently; produce a unencrypted format file; yet; though this is to use institute to be carried out by unauthorized; but can be that a unauthorized of encrypting removes because of this; and will invade U.S.'s law; even in this example; if; as what will explain afterwards; one watermark (watermark) is when preferably being included among these unencrypted format data; this assaulter's punishment; or to accuse all will be possible, because this watermark can be stolen " by " at this output terminal of this encryption device 24, with as defence line, second road.
Fig. 3 shows that the present invention is used for producing the device of stamped signature data again from the encrypted data of explaining media information.In particular, by its produce survivor and in addition this encrypted data of stamped signature can be provided in a input end 30 at this shown device of Fig. 3, and this output terminal 18 that this has encrypted and the stamped signature data have been this shown device with appearing at Fig. 1, or the identical data of this input end 20 that appears at this shown device of Fig. 2, wherein, this device that is used for again stamped signature comprises device 32, to be used to be provided at this identification of this operator of stamped signature device more shown in Figure 3, and install 34, with be used for stem from by encryption this unencryption media information this again stamped signature operator identification increase on the encrypted media information, and provide this stamped signature encrypted data again at an output terminal 38 places, moreover, these output terminal 38 places this again the stamped signature encrypted data can in any example, all be included in this operator's of this a device shown in Figure 3 identification, and, be preferably, the signature that also comprises last product survivor, that is, be provided at the signature of this data stream at these input end 30 places, this feature then is the tracking that allows for the whole path of this media information.
In described embodiment so far, at this device shown in Fig. 3 is only must increase by a new identification of stamped signature again, if and this will be to become possibility when being independent of outside this operator message at this key information that is contained in this encrypted data at this input end 30 places, yet, if at these operator's data and this decryption information, that is, when having a dependence between this extraneous information in this encrypted data, then this shown device will further be included in this key capture device 22 among Fig. 2 in Fig. 3, and the decryption device 36 that can sharp be embodied as this device 24 of Fig. 2 in the same way, and principle still can be specifically embodied as another encryption device 37 of this device 12 of Fig. 1, under this situation, this input end 30 carry out this data stream of stamped signature by one preceding product survivor can be primarily by this device 36, and utilize this enciphered message that this key capture device 35 provides and be decrypted, and, again utilize this device 32 by this again the stamped signature device to this new identification of stamped signature again that this identification provided of this operator and encrypt, and in this example, the dotted line in Fig. 3 connects 39 and will can not manifest.
Successively, will discuss and be used for encrypting and a preferred embodiment of a file layout of stamped signature data.If this has been encrypted and when the stamped signature data have been rendered as a file, this document will comprise the header (header) with form indication (40), then, this header is this operator's a voucher and then, or be relevant to this operator's a public-key cryptography (42), therefore, the inlet 42 that enters this document can be guaranteed this product survivor information, then, this zone 42 is a zone 44 and then, then be to comprise a symmetrical key of encrypting by the disclosure key in this zone 44, as for this symmetric key then is to be used to the encrypted media information of deciphering in a zone 46, so, these zones 42 and 44 are representatives for make this operator's a identification (by this zone 42) and this a deciphering of encrypted media information (by these zones 42 and 44) all can be performed and this extraneous information of being formed.
One overview that may develop of notion of the present invention will successively be illustrated as reference with Fig. 5, and wherein, this notion is to be referred to as 50 " of " DRM system, and, among a preferred versions, it is included in all devices shown in Fig. 1 to Fig. 3, also has feature.At input side, the unencryption media information, or compressed media information can be fed to this DRM system (51a), in addition, in a preferred embodiment of the present invention, this DRM system 50 can be formed to obtain this stamped signature and the encrypted data (51b) as an input signal, and it is to correspond to, for example, these data at these output terminal 18 places of Fig. 1, moreover, this DRM system 50 in a preferred embodiment of the present invention, can be formed to obtain local file (local archive) data (51c) as an input quantity, and, as will in after discuss, it can be in order to make these local file data can comprise that neither decryption information can not comprise operator signature yet, encrypts and utilize a mechanical associated cryptographic to carry out the hard " of ".
In addition, in a preferred embodiment of the present invention, have stamped signature and extraly firmly a data layout of stamped signature data can be provided in this DRM system 50 shown in Fig. 5, wherein, this data layout be also claimed for AtoB form (51d), and this " AtoB " form is characterised in that these contents are produced by A, so that its fact that can only be decrypted by B.
In another embodiment; DRM of the present invention system 50 is files that can also be provided to have protected media information by a medium supplier 52; typically; this media information can't be by being; for example; this media information; or possessory these medium supplier 52 of the copyright of a tool license publisher and carry out stamped signature; moreover; this media information that transfers to this DRM system 50 from these medium supplier 52 is the media information of cryptoguard; therefore; be to make the DRM system in a publication pattern (publish mode), to operate; to support; or carry out these medium supplier 52 medium dispensings (media distribution), and this is also to be referred to as a super dispensing (supcrdistribution).
At outgoing side, this DRM system 50 of the present invention can play the data layout that (54a) obtained via this input end 51a to 51d, with generation (54) stamped signature data layout, set a local file to produce (54c) local data's form, or to produce (54d) in the stamped signature of an output and the data of the hard " stamped signature of ", that is, to write an AtoB form, and this form indication can be contained among this header of Fig. 4, whether this form that no matter is fed this DRM system 50 is unencrypted format data or packed data (51a), no matter whether it be stamped signature and enciphered data (51b), no matter whether has local data (51c), no matter whether has an AtoB form (51d), or no matter whether has a publication pattern (51e), the present invention illustrational DRM of institute system 50 in Fig. 5 can carry out header check before each true action, with the action of determining to depend on that these data lattice are.
When if inconsistency has been found in this header 40 of Fig. 4, then handle and can not hold for one of this data layout, yet, can't to have be the unencrypted format data of a digital form in the preferable DRM of shown this system in Fig. 5, an or output of packed data, so, clearly, DRM notion of the present invention can cause the unencrypted format data can not produced, or be provided in any point, as what explained, except CDs, or comprise outside other sound-carrier of unencrypted format data (PCM data), as what explained, DRM of the present invention system also comprises a data compressing module, it can make the digital storage in a traditional approach become possibility owing to the data transfer rate compression of its height, so, a compression module if so also can't obtain in the encryption format form one, but when it only has form in embedding a DRM system for can obtain the time, then promptly can expect, one of the data of compressing in this compressed format are handled and will can not be held fully, and this stimulation for this operator may be, on the one hand, this compressed format can provide the high data compression factor, and on the other hand, good quality can be provided, and, extraly, for freely, or provide and deliver very at low cost, wherein, new data layout, for example, for example, MPEG-4, real cost can save by anti-blocking illegal piracy simply.
What will remind at this moment is, with regard to the file that is presented, the unencrypted format data can be encoded or coding not, and simultaneously, and encrypted data is by password calculation formula and produce from these unencrypted format data.
Then, see also Fig. 6, Fig. 7, Fig. 8, Fig. 9 and Figure 10, with five different embodiment of the preferable DRM of discussion system, wherein, in these accompanying drawings, identical reference number is identical assembly and a function of representative.
One-level DRM system shown in Fig. 6 comprises, as a major function, play this stamped signature form, and extraly, also comprise, add as this operator's, the input of one unencrypted format, or can locate selectively this input of stamped signature and the encrypted data encoded media information (51a) of encoding in this input end (51b), and selectively, coded data can be fed to a selectable demoder 60, to decode earlier before in its statement/broadcast (26), if and the unencrypted format data are to be fed when this input end (51a), then this selectable demoder 60 will be skipped over (62), successively, it is always can suppose, this media information is compressed media information, and, preferably for carrying out the compressor by MPEG-4, therefore, via a safe lane (SAC66; SAC=secureauthenticated channel, safety authentication channel) demoder 64 that is connected to this DRM system can be connected between this decryption device 24 and this statement device 26, wherein, this demoder 64 can for the part of this DRM system or can be changed extraly be an external connection module, in this example, this SAC66 is an external interface of this DRM system, to guarantee only can to supply special demoder 64, that is, guarantee not allow a unencrypted format to be outputted as the demoder of a digital document.
The PCM data or the MP-3 coded data be to can be used as unencrypted format or selectively, coded input data and presenting, wherein, in this example, this selectable demoder is a MP3 decoding device.
In Fig. 7, one secondary DRM system is shown, it is compared to this shown in Fig. 6 DRM system, be to allow extraly, on the one hand, produce a local file (54c), and on the other hand, present local file data (51c), therefore, this secondary DDRM system shown in Fig. 7 can guide this local format, produces the MPEG-4 data partly to allow an operator, and simultaneously, only can play it partly, for this reason, can encode by a MPEG-4 scrambler 70 in the unencrypted format data (51b) of this input end in the position, and this scrambler can be integrated via a SAC 72, or as interface.
Then, this coded data can be fed to encryption device 74, it can utilize local close (localkey) 76 and this coded data is encrypted, and, it is fed to a local file output terminal (54c), but, this the data of local refinement can't comprise decryption information, so, in order to decipher, these local file data are to be fed to decryption device 24, the key information and this decryption device can't try to capture, but when a local format is subjected to identification, switch to this partial secret key 76 (Fig. 4 40).
This secondary DRM system is in order to want seeing new system, and, particularly the operator of this new encoder/decoder (70/74) prepares, but not for do not have (as yet not) registration with produce (Fig. 1) or again stamped signature (Fig. 3) encrypted and the operator of stamped signature data, therefore, this operator of this secondary DRM system also still can't produce legally, or transmit and to have encrypted and stamped signature data, yet, it but can check the function of the coding/decoding notion that this is new, and, then can determine whether to want a full version, but, this user can play by friend, or the distributor obtained is the publication of stamped signature form, because this one-level DRM system of Fig. 6 is contained among this secondary DRM system of Fig. 7, moreover, this operator is a local file (54c) that can also produce its music data that has, that is, for example, the digital document of the CDs that it had, yet, it but only can utilize this partial secret key 76 and play on the equipment that it had, for example, for example, its PC, and as discussing as reference with Fig. 8, this secondary DRM system can become one three and the DR system, therefore after this operator of registration, encrypted and the stamped signature data promptly also can be produced, not to depend on whether these input data are the unencrypted format data, or encrypted, but the local data of stamped signature not, this partial secret key 76, for example, as will in after discuss, be to stem from the relevant identification of a machinery, for example, for example, sequence number of a PC etc.
Successively, these three grades of DRM systems will be narrated as reference with Fig. 3, and it is except these functions of these DRM systems of Fig. 6 and Fig. 7, that is, play stamped signature and the function of encrypted data and the function that produces a local file, outside, be also to have this stamped signature form of generation, for example, with unencrypted format information as the basis (device of Fig. 1) or with one the stamped signature data layout be transformed into again and again stamped signature data layout (device of Fig. 3), function.
For for this shown among Fig. 8 device, 14 pairs in the device that is used to produce a voucher key (certifiedkey) produces and encrypts (and therefore stamped signature) data on the one hand, or the data of stamped signature again of being signed the bill by one first operator are for necessity, be preferably, this voucher key is provided by this registed authorization (registration authority) 56 (Fig. 5) of statement one neutral authority, and, by this registed authorization, identity the operator of this shown device of Fig. 8 promptly can determine under the help of this voucher key, therefore, the disclosure key that enters in the block 42 of Fig. 4 is an identification information of representing this operator.
It is also to be illustrated among Fig. 8 that one watermark is embedded in this PCM level or the preferable function of this bit stream level, and therefore, the embedding of this watermark is by a PCM water mark embedding device 80 or a bit stream water mark embedding device 82 and carried out.
The PCM water mark embedding device is thin, for example, in German patent DE 19640814C1, have illustrated, and a PCM embeds device, a similarly similar bit stream water mark embedding device, one frequency expansion sequence (spread sequence) can be provided to a load (payload), in this example, be an operator ID, or user ID, with this spread spectrum load signal of weighting successively, thereby make when combination is provided to these sound data of a watermark, it is inaudible, that is, with regard to the energy of being considered, be to be lower than psychologic acoustics to cover threshold (psycho-acoustic masking threshold), in addition, this selectable watermark embeds passable, as what explained, at a time horizon time (block 80) or on a bit stream level (block 82), hold, wherein, only need the part of this coded data to untie, a but not decoding completely, moreover, if it is when carrying out on this time level that this watermark embeds, then this demoder 64 must this output signal will be fed to this PCM water mark embedding device 80 via a transmission line 84, yet, if when a bit stream watermark is performed, then arrive this input signal of this demoder 64, that is the position is at this decryption device 24, this of this output of 36 be coding source information, will be fed via other transmission line 86 and enter this bit stream water mark embedding device, under this situation, this bit stream water mark embedding device 82 can provide this media information to be encrypted, therefore, in the example of bit stream watermark, promptly no longer need this scrambler 70.
What need prompting is; this watermark will can not be assessed in normal a use; yet; when if this protection mechanism of notion of the present invention is illicitly walked around; if and raw data (raw data) is when further being subjected to handling; then this repressed noiseless watermark or in image data; this sightless watermark or in lteral data; the watermark of importing by stenography method; can be assessed for the purpose of court debate, to obtain to be relevant to illegal distributor's conclusion.
Therefore; it is preferably; embed this watermark itself; that is; correspond to this user ID; maybe when this user ID direct transmission long or this user's identification of non-desire for the reason of protecting the privacy scope; this load information be; for example; handle (hash processing) in a jumble by one; and utilize the password in Fig. 8, be referred to as " random code " and derived from this user ID; therefore, another-encrypted-the pseudorandom order will be used to spread spectrum, and the advantage that this had is; encrypt compared to this load of carrying out by encrypting this frequency expansion sequence, it is less that load is disturbed; or disturb generation at all.
The advantage that this had is; this watermark meeting is subjected to better protection; secondly; the advantage that this had is; continue and be transfused to when several watermarks of user can be orthogonal to each other in this frequency expansion sequence system derived from these random codes; and this notion is corresponding to this known CDMA method; in the method; several communication channels can be contained among the frequency channels; and each of this frequency channels can occupy identical frequency band; but still can be to be spaced under the help of the correlator (correlator) in the watermark acquisition device (extractor); moreover the anonymity that can increase this legal operator is modified in one of this watermark, but but makes anonymous illegal user's repayment; and suitable, its punishment is become possibility.
In particular, two kinds of methods that are used to produce these a little watermark keys are preferable.First kind of method that is used for producing these a little watermark keys, another random code with a variable-length is used, and it can be by technical progress further and adapts to this decoding number of times, this can guarantee to capture a watermark and test institute might key the time when the purpose for court debate, must finish a quantity of determining, and therefore, this watermark ID is in fact safe and anonymous, because know nobody under the situation of this key, it is only can just can be read by quite a large amount of costs, so, for this decoding of court debate purpose is can might key and held by attempting institute, but this is not a problem, because when decoding for court's purpose, because usually illegal distributor's quantity will be adjusted to other present computer technology of branch, therefore, it is to have time enough.
And the another kind of method that is used to produce watermark keys is, utilize one method and derived from the existence of one group of different key of this operator ID, and this a bit may watermark keys be used in the fact in this watermark encrypting.Therefore, only proving of identification can be by suitable cost and an operator of examine is carried out.
It is can be by finding out among Fig. 8, these three grades of DRM systems comprise all functions, that is, play stamped signature data, local data, and unencrypted format data, produce stamped signature data from the unencrypted format data, and the stamped signature data of controlling oneself produce stamped signature data again, as what in Fig. 8, inferred, more preferably be, when local data are to be fed to this input side by an operator, when playing, one become this encrypted and the transformation of stamped signature form be the function that can be carried out, and because it is to have this voucher key 14, so this meeting becomes possibility because this operator in this shown system of Fig. 8 register.
As with Fig. 7 as with reference to and in addition illustrational, this is used to produce an advantage of having encrypted this local data's form of local file and is, one preparation version be we can say and is provided to a new coding method 70 respectively, and coding/decoding method 64, but, for factor economically, be preferably in these shown three grades of DRM systems of Fig. 8 activation or decontrol 88 are provided, and it is to have allowed this operator, for example, this registed authorization 56 among comfortable Fig. 5, when obtaining this voucher key 14, output one is the stamped signature data layout, when if this operator does not obtain this voucher key as yet, then this activation or decontrol 88 are to be activated, to allow only to export local data, but be not stamped signature data, therefore, it might be when this operator have registered and obtain a voucher key, under the operation that does not need new software or new hardware, this function that will be presented among Fig. 8 by activating this activation or decontrol increases to this function that is presented among Fig. 7 simply, therefore, according to this embodiment, complete version can be provided and delivered, yet, therein, one decontrol 88 can guarantee that this all function only can be used by this operator when it is registered, that is, when it has obtained this voucher key 14.
Successively; one of DRM system to of the present invention so-called dispensing form extends and will be illustrated as reference with Fig. 9 (level Four DRM system); for this reason; one operator of one DRM system can be via an input end (51e) certainly these medium supplier 52 receive protected but stamped signature media information not; and it is shielded in order to decipher this; that is; encrypted media information but not comprise enciphered message; one another decryption device 90 is provided; and; one key 92 that is transferred to this DRM system usually via a safe lane must be provided to this device 90; but; at this; be preferably in conjunction with an asymmet-ric encryption method and a symmetrical encryption method, in addition, also can encrypt by a symmetrical key by this protected media information (51e) that this supplier 52 provided; and this symmetric key is not to be comprised in an embodiment of the present invention among this protected media information, and this key is that external ground is provided (92).
At this, an asymmet-ric encryption method can also have being used of advantage.The operator of this shown device can provide its public-key cryptography to these medium supplier 52 that then can encrypt this symmetric key in Fig. 9, decipher this media information to be used to utilize this open sign indicating number, and with this encrypted symmetric key increase on this media information, then, this operator of this shown device can utilize its private key (92) and deciphering is comprised in this encrypted symmetric key among this data stream in Fig. 9, with then by this device 90 and deciphering obtains this stamped signature information not from these medium supplier, then, decrypt media information can be when its coded data for this, be fed to this demoder 64, and then be output with represented form, but be not to be a file by this statement device 26.
For this supplier provided certainly this protected media information produces a stamped signature data layout; this output data of this decoding device is to handle on ground as usual; therefore; shown this level Four DRM system can allow a super dispensing or via not personalized medium in Fig. 9; for example; for example, CDs, dispensing.
Further, this shown in Fig. 9 DR system has, if when an one operator still has local data, automatically or non-automaticly is converted into the function of stamped signature data according to this embodiment.
Another embodiment of notion of the present invention, what it was claimed for the reason of simplifying is Pyatyi DRM system, and is successively to illustrate as reference with Figure 10.For allow with one stamped signature and encrypt file be passed to only single user, this shown system can utilize a personal key extraly and encrypt in Figure 10, and transmit it to a recipient, this point-to-point form be also claim for the AtoB form, if this system among Figure 10 of being presented at is when this recipient B, then this system on this input side will receive the disclosure key that utilizes the B of this system and an AtoB data stream (51d) of encrypting, moreover, one another decryption device 100 can be provided for deciphering, and, this private key (B) of B is to be fed to this device 100, to decipher this AtoB form, then proceed then to handle, as remaining accompanying drawing shown, in addition, if when this shown device produces the survivor for one of this AtoB form in Figure 10, then increase device 16 at this, after 34 is to provide another encryption device 102, with utilize to obtain from the public-key cryptography of this recipient B of a recipient to this stamped signature and encrypted data stream encrypt, and export a data stream of this AtoB form.
What this will point out be, with regard to regard to encryption and deciphering among these devices 102 and 100, be not need an asymmetric methods, yet, it but is preferable that economy is considered, moreover, this shown in Figure 10 device can be formed, with avoid with this hardware encryption AtoB form be transformed into one and freely encrypt and the form of stamped signature, this shown device is a statement that only can allow this media information in Figure 10, rather than becomes a stamped signature/change of encryption format.
With regard in this respect, this AtoB form is for inciting somebody to action the people's of the extremely non-a hundred per cent trust of stamped signature data transfer method, because these recipients also can't be with known limited these contents of DRM systems communicate, and can reset (playing back) to the exception of a file is, consider in order to provide and deliver and when carrying out stamped signature for B and being sent to B at it, moreover, as this stamped signature person and this recipient when being identical, this the stamped signature form be to be written as a file, and just as already discussed, on each player, all need a private key, to be used to play this AtoB form, in addition, this private key is to be fed to this encryption device 100, for fear of walking around this AtoB form, its this DRM system (104) that preferably will be shown in the dark color of Figure 10 is embodied as a hardware.
For this private key is transferred to a recipient; this key can be encrypted; and be transferred to this recipient's corresponding player; therefore; this AtoB form promptly can be transformed into a stamped signature form for broadcast, and then, it just can not have one to store under the situation of possibility and play; one shielded method (SAC=secure authenticated channel, safety authentication channel) be also this is transmitted as preferable.
In principle, should only there be a private key can appear on each equipment, because several private keys are to make to play the content that belongs to several private personals, in other words, this human operator is should be for tradable, and it is by downloading a new key and erasing old and obtained, in addition, may bear the change complexity that artificial time restriction caused that adds hour or a day when upgrading is considered to enough to avoid serious abuse, yet individualized this second equipment but is simple.
Relevant for a club member of shopping, it preferably installs one on this personal device, or several additionally have legitimacy but free restriction, for example, for example, 1 year, club's key, therefore, obtain promptly can play with the form of AtoB from this club content, moreover, because these keys then will be used for anyone, therefore, in this equipment, but not among this media portion itself, have the many keys as this usefulness of need, these many keys then are in order to allow the collection storehouse of an individualized file keep playing needed.
According to environment, the present invention is in Fig. 1 to Fig. 3, and particularly in Fig. 6 to Figure 10, the method that is illustrated is can be at hardware, or carry out in the software, and this execution is to be a digital storage medium, a unsteady disk that has the control signal that electrically to read especially, or CD, on, therefore, it is can be utilizing the method and a programmable computer system cooperation, thereby this corresponding method of making can be performed, generally speaking, the present invention also comprises a computer program, and it is can have one of to be stored on the mechanical-readable carrier program code, to be used for carrying out method of the present invention on a computing machine when this computer program operates, differently is, the present invention also is relevant to a kind of computer program with a program code, to be used for carrying out this method on a computing machine when this computer program operates.
Claims (34)
1. device that is used to produce the encrypted data of statement media information, it comprises:
The device that is used to provide (14), it provides operator's identification, and by this device (14), an operator of this device is by identification;
The device that is used for the phase embedding, it is embedded to a watermark in one media information mutually, this watermark be the response this operator's identification or certainly this operator's identification obtain;
The device that is used to encrypt (12), it utilizes an encryption key and this media information that embeds this watermark is encrypted to produce encrypted media information;
The device that is used to increase (16), its extraneous information can be increased to this among the encrypted media information to produce this encrypted data, and this extraneous information comprises identification information and decryption information, facilitates the use this identification information and carries out this operator of identification and utilize this decryption information execution to decipher this encrypted media information;
Wherein this identification information and this decryption information are to depend on mutually, make this encrypted data can't be decrypted again so that remove this identification information certainly in this encrypted data; And
One provides the output unit of this encrypted data, and this encrypted data comprises this encrypted media information and this extraneous information, and this encrypted data does not comprise the media information of a unencryption form.
2. device according to claim 1 is characterized in that also comprising:
One scrambler (70), it is used for coding source information, to obtain the media information for a data transfer rate compressed format of this source information.
3. device according to claim 1 is characterized in that, at least a portion of this operator's identification meeting and this encryption key (42) or identical from its survivor that spreads out; And
Wherein, this device that is used to encrypt (12) is by construction, using this operator's identification or to be used as this encryption key derived from the information of this operator's identification, and wherein this device that is used to increase (16) can be by construction so that only increase the decryption information that additionally allows this operator's a identification as extraneous information.
4. device according to claim 1 is characterized in that, this device that is used to encrypt (12) is by construction, to carry out a symmetrical encryption method by a symmetrical key;
Wherein, another device that is used to encrypt also can be provided, and with by a private key of an asymmet-ric encryption method and this symmetric key is encrypted, and then obtains an encrypted symmetric key (44); And
Wherein, this device that is used to increase (16) is by construction, so that this that is used as extraneous information encrypted symmetric key (44) and the public-key cryptography (42) that belongs to this private key.
5. device according to claim 1 is characterized in that:
This device that is used to increase (16) by construction with a voucher that increases this operator or a public-key cryptography that is assigned to this operator.
6. device according to claim 5 is characterized in that, this device (82) that is used for the phase embedding is by construction, so that this watermark is embedded this media information.
7. device according to claim 5 is characterized in that, this media information is a data transfer rate compressed format of source information, and wherein, this device (80) that is used for the phase embedding is by construction, earlier this watermark is embedded wherein before compressing in this source information.
8. device according to claim 5 is characterized in that, this media information is a data transfer rate compressed format of source information, and wherein, this device (82) that is used for the phase embedding is by construction, this watermark is embedded in the partial decoding of h version of this media information.
9. device according to claim 5 is characterized in that, this device (80,82) that is used for the phase embedding is embedded this watermark by construction to utilize a watermark keys.
10. device according to claim 9 is characterized in that, this device (80,82) that is used for the phase embedding is by construction, to select this watermark keys randomly or self-derivedly to select this watermark keys in one group of different key of this operator's identification.
11. device according to claim 1 is characterized in that, this media information is a data transfer rate compressed format of source information, and it is produced by a scrambler (70); And
Wherein, this device comprises extraly:
The interface arrangement (72) that is used for a scrambler (70) of interface connection, and this interface arrangement (70) is by construction, be relevant to one of a security feature with inspection and connected scrambler (70), and then when this scrambler meets this security feature, only carry out with this scrambler (70) between one communicate by letter, and this security feature is used to avoid the output of pressure source information for this scrambler.
12. device according to claim 1 is characterized in that, this device that is used to provide (14) is by construction, so that operator's identification (42) of this operator who is assigned to this device only to be provided by a registed authorization.
13. device according to claim 1 is characterized in that also comprising:
Decontrol (88), it is used for removing an output of this encrypted data when this device that is used to provide (14) has the operator message of a distributed outside; And
Local deposit device (74), it is used to utilize a partial secret key (76) that clearly is relevant to this device and media information is encrypted, and is used for the local data (54c) that output does not have this partial secret key (76), therefore, this local data (54c) only itself is decrypted by this device
Wherein, this part deposit device be independent of one of this decontrol (88) remove outside and operate.
14. device according to claim 13 is characterized in that, this part deposit device is derived this partial secret key with auto-correlation by construction in a mechanical identification, a network identification or the time sign of this device embedding system wherein.
15. device according to claim 1 is characterized in that, this media information (51e) is encrypted by a medium supplier (52), and does not comprise these medium supplier's (52) a signature, and this device also comprises:
The device that is used to decipher (90), it is used for utilizing and is not included in this key (92) of encrypted media information, and to this encrypted media information decode, wherein, this device that is used for deciphering (90) is connected the upstream of this device that is used to encrypt (12) at an information flow.
16. a method that is used to produce the encrypted data of explaining media information, it comprises the following steps:
(14) one operator's identifications are provided, and borrow it, one is used to produce an operator of the device of encrypted media information by identification;
One watermark is embedded in the media information mutually, this watermark be the response this operator's identification or certainly this operator's identification obtain; Utilize an encryption key and this media information (12) that embeds this watermark is encrypted, to produce encrypted media information;
With extraneous information increase (16) to this encrypted media information to produce this encrypted data, and this extraneous information comprises identification information and decryption information, to utilize this identification information to carry out the identification operator and to utilize this decryption information execution to decipher this encrypted media information;
Wherein identification information and decryption information are to depend on mutually, make this encrypted data can't be decrypted again so that remove this identification information certainly in this encrypted data; And
This encrypted data is provided, and this encrypted data comprises this encrypted media information and this extraneous information, and this encrypted data does not comprise the media information of a unencryption form.
17. device that is used to decipher the encrypted data of explaining media information, and this encrypted data comprises encrypted media information (46) and the extraneous information (40 that embeds a watermark, 42,44), this watermark responds operator's identification or this operator's identification obtains certainly, via this operator's identification, operator with device that produces this encrypted data is by identification, this extraneous information comprises identification information and decryption information, facilitating the use this identification information carries out this operator of identification and utilizes this decryption information execution to decipher this encrypted media information, wherein this identification information and this decryption information are to depend on mutually, so that remove this identification information so that this encrypted data can't be decrypted again in this encrypted data certainly, this device comprises:
The device that is used to capture (42), it utilizes this decryption information to capture a decruption key (22) from this encrypted data;
The device that is used to decipher (24), its utilize this decruption key and to this encrypted media information be decrypted, to obtain decrypt media information; And
The device that is used to play (26), it is used to play this media information;
Wherein this device of encrypted data that is used to decipher the statement media information is further by construction, with avoid this an output of decrypt media information become numerical data.
18. device according to claim 17, it is characterized in that, this encrypted media information utilize a symmetrical key and encrypt, wherein, utilize one to produce survivor's a private key and this symmetric key is encrypted, and a public-key cryptography that wherein belongs to this product survivor (42) of this private key is comprised in this extraneous information;
Wherein, this device that is used to capture (24) is by construction, to capture the disclosure key (42) and an encrypted symmetric key (44) in this extraneous information certainly; And
Wherein, this decryption device is decrypted this symmetric key to utilize the disclosure key (42) by construction, and to utilize this to decipher symmetric key to this encrypted media information be decrypted.
19. device according to claim 17 is characterized in that, this media information is a data transfer rate compressed format of source information;
Wherein, this device that is used to play system comprises a demoder (64), be used for to this decrypt media information decode, and then obtain this source information; And
Wherein, the construction in addition of this device that is used to play (26) is to avoid storing this source information with a digital form.
20. device according to claim 17 is characterized in that, this media information is a data transfer rate compressed format of source information, and this source information is decoded by a demoder (64), and this device also comprises:
The interface arrangement (66) that is used for a demoder (64) of interface connection, and this interface arrangement (66) is by construction, be relevant to one of a security feature with inspection and connected demoder (64), and then when this demoder meets this security feature, only carry out with this demoder (64) between one communicate by letter, and this security feature is used to avoid be in an output of the source information of decoding of digital form for this demoder.
21. device according to claim 17 is characterized in that also comprising:
Local statement device, it is used to utilize with the key (76) of this device local correlation with deciphering (24) one local datas (51c) with as extraneous information, this local data (51c) does not comprise this decryption information, and this has deciphered local data to be used for playing (26).
22. method that is used to decipher the encrypted data of explaining media information, and this encrypted data comprises encrypted media information (46) and the extraneous information (40 that embeds a watermark, 42,44), this watermark responds operator's identification or this operator's identification obtains certainly, via this operator's identification, operator with device that produces this encrypted data is by identification, this extraneous information comprises identification information and decryption information, facilitating the use this identification information carries out this operator of identification and utilizes this decryption information execution to decipher this encrypted media information, wherein this identification information and this decryption information are to depend on mutually, so that remove this identification information so that this encrypted data can't be decrypted again in this encrypted data certainly, and this encrypted data does not comprise the media information of a unencryption form, and this method comprises the following steps:
Utilize this decryption information to capture a decruption key (22) from this encrypted data;
Utilize this decruption key and to this encrypted media information be decrypted (24), to obtain decrypt media information; And
Play (26) this media information;
Wherein avoid this an output of decrypt media information become numerical data.
23. one kind is used for producing the device of stamped signature data again from the encrypted data of explaining media information, this encrypted data comprises encrypted media information (46) and the extraneous information (40 that embeds a watermark, 42,44), this watermark responds operator's identification or this operator's identification obtains certainly, via this operator's identification, operator with device that produces this encrypted data is by identification, this extraneous information comprises identification information and decryption information, facilitating the use this identification information carries out this operator of identification and utilizes this decryption information execution to decipher this encrypted media information, wherein this identification information and this decryption information are to depend on mutually, so that remove this identification information so that this encrypted data can't be decrypted again in this encrypted data certainly, and this encrypted data does not comprise the media information of a unencryption form, and this device comprises:
The device that is used to provide (32), its operator's identification of stamped signature again and again of an operator that this device is provided is so that produce this stamped signature data again;
The device that is used to capture (35), it captures this decryption information from this encrypted data;
The device that is used to decipher (36), it utilizes this decryption information and this encrypted data is decrypted, to obtain this encrypted data;
The device (80,82) that is used for the phase embedding, it is embedded to this in the data decryption mutually with a watermark, this watermark be this operator's identification of response or certainly this operator's identification obtain;
The device that is used to encrypt (37), it utilizes an enciphered message and this data decryption that embeds this watermark is encrypted, this enciphered message be the response this again stamped signature operator identification or certainly this again stamped signature operator identification obtain, to obtain this encrypted media information; And
The device that is used to increase (34), utilize this enciphered message with this again stamped signature operator identification increase to this encrypted media information that produces by encryption, this enciphered message be the response this again stamped signature operator identification (32) or certainly this again stamped signature operator identification obtain, advance to obtain this stamped signature data (54b) again.
24. device according to claim 23, it is characterized in that, this decryption information comprises this product survivor's a public-key cryptography (42) and utilizes this product survivor's a private key and the symmetrical key (44) encrypted, and this media information can be encrypted by using above-mentioned key;
Wherein, this device that is used to decipher (36) is deciphered this encrypted symmetric key (44) by construction to utilize the disclosure key earlier, and continue utilize this symmetric key and to this encrypted media information (46) be decrypted; And
Wherein, this device that is used to encrypt (37) is by construction, encrypt this media information to utilize a symmetrical key earlier, and continuing and utilizing the operator's be relevant to this device that is used to produce again the stamped signature data a private key and this symmetric key is encrypted, and wherein, this again stamped signature operator identification comprise this operator of this device that this is used to produce again the stamped signature data or from its public-key cryptography of deriving (42).
25. device according to claim 23 is characterized in that, this media information is a data transfer rate compressed format of source information, and wherein this device (80) that is used for the phase embedding is by construction, earlier this watermark is embedded wherein before compressing in this source information.
26. device according to claim 24 is characterized in that, this media information is a data transfer rate compressed format of source information, and this device (80) that is used for the phase embedding by construction this watermark is embedded a partial decoding of h version of this media information.
27. device according to claim 23 is characterized in that, this device (80,82) that is used for the phase embedding is by construction, so as will with this again stamped signature operator identification as this watermark on basis increase to one or a plurality of watermark that has embedded on.
28. device according to claim 27 is characterized in that, this device that is used for the phase embedding is by construction, so that when this media information is explained in each other watermark, obtain a quality badness.
29. device according to claim 23 is characterized in that, this device (80,82) that is used for the phase embedding is embedded this watermark by construction to utilize a watermark keys.
30. device according to claim 29 is characterized in that, this device that is used for the phase embedding is by construction, to select this watermark keys randomly or self-derivedly to select this watermark keys in one group of different key of stamped signature operator identification again from this.
31. device according to claim 23 is characterized in that also comprising:
Decontrol (88) is only to be used for removing an output of this encrypted data when this device that is used to provide (14) has the operator message of a distributed outside; And
Local deposit device (74), the encrypted media information to be used to utilize the partial secret key (76) that clearly is relevant to this device, and be used for the local data (54c) that output does not have this partial secret key (76), therefore, this local data (54c) is only to be decrypted by this device itself
Wherein, this part deposit device be independent of one of this decontrol (88) remove outside and operate.
32. device according to claim 23 is characterized in that, is provided with another device that is used to avoid, it is in order to store with digital form, and is used to avoid the output of pure words media information, pure words source information or data transfer rate pressure source information.
33. device according to claim 23 is characterized in that also comprising:
The device that is used to encrypt (102), its for a unique operator to this again the stamped signature data encrypt, thereby make only to have this unique operator can play this media information.
34. one kind is used for producing the method for stamped signature data again from the encrypted data of explaining media information, and this encrypted data comprises encrypted media information (46) and the extraneous information (40 that embeds a watermark, 42,44), this watermark responds operator's identification or this operator's identification obtains certainly, via this operator's identification, operator with device that produces this encrypted data is by identification, this extraneous information comprises identification information and decryption information, facilitating the use this identification information carries out this operator of identification and utilizes this decryption information execution to decipher this encrypted media information, wherein this identification information and this decryption information are to depend on mutually, so that remove this identification information so that this encrypted data can't be decrypted again in this encrypted data certainly, and this encrypted data does not comprise the media information of a unencryption form, and this method comprises the following steps:
Provide (32) to be used to produce this operator of stamped signature again and again identification of operator of the device of stamped signature data again;
Capture this decryption information from this encrypted data;
Utilize this decryption information and this encrypted data is decrypted, to obtain this encrypted data;
This watermark is embedded to this in the data decryption mutually, this watermark be this operator's identification of response or certainly this operator's identification obtain;
Utilize an enciphered message and this data decryption that embeds this watermark encrypted, this enciphered message be response this again stamped signature operator identification or certainly this again stamped signature operator identification obtain, to obtain this encrypted media information; And
Utilize this enciphered message with this again stamped signature operator identification increase (34) to the encrypted media information that produces by encryption, this enciphered message be the response this again stamped signature operator identification (32) or certainly this again stamped signature operator identification obtain, advance to obtain this stamped signature data (54b) again.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10220925.1 | 2002-05-10 | ||
DE10220925A DE10220925B4 (en) | 2002-05-10 | 2002-05-10 | Apparatus and method for generating encrypted data, decrypting encrypted data, and generating re-signed data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1774684A CN1774684A (en) | 2006-05-17 |
CN100514252C true CN100514252C (en) | 2009-07-15 |
Family
ID=29285275
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB03814753XA Expired - Lifetime CN100514252C (en) | 2002-05-10 | 2003-05-06 | Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1509828A2 (en) |
KR (1) | KR100848369B1 (en) |
CN (1) | CN100514252C (en) |
AU (1) | AU2003227723A1 (en) |
DE (1) | DE10220925B4 (en) |
WO (1) | WO2003096336A2 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080063206A1 (en) * | 2006-09-07 | 2008-03-13 | Karp James M | Method for altering the access characteristics of encrypted data |
WO2014064323A1 (en) * | 2012-10-23 | 2014-05-01 | Nokia Corporation | Method and apparatus for managing access rights |
KR102124575B1 (en) * | 2013-05-02 | 2020-06-18 | 삼성전자주식회사 | Electro device for protecting user privacy and method for controlling thereof |
CN111178010B (en) * | 2019-12-20 | 2024-02-09 | 国久大数据有限公司 | Method and system for displaying digital signature, data editing method and terminal |
TWI791963B (en) | 2020-03-19 | 2023-02-11 | 瑞昱半導體股份有限公司 | Data decryption system and data decryption method |
CN112401477A (en) * | 2020-09-01 | 2021-02-26 | 深圳中时利和科技有限公司 | Electronic information intelligent management device based on computer and use method |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5465299A (en) * | 1992-12-03 | 1995-11-07 | Hitachi, Ltd. | Electronic document processing system and method of forming digital signature |
US6611607B1 (en) * | 1993-11-18 | 2003-08-26 | Digimarc Corporation | Integrating digital watermarks in multimedia content |
US5799083A (en) * | 1996-08-26 | 1998-08-25 | Brothers; Harlan Jay | Event verification system |
AU4856701A (en) * | 2000-04-17 | 2001-10-30 | Robert Kaplan | Method and apparatus for transferring or receiving data via the internet securely |
WO2003030541A2 (en) * | 2001-10-03 | 2003-04-10 | The Trustees Of Columbia University In The City Of New York | Method and apparatus for watermarking and authenticating data |
US7617542B2 (en) * | 2001-12-21 | 2009-11-10 | Nokia Corporation | Location-based content protection |
-
2002
- 2002-05-10 DE DE10220925A patent/DE10220925B4/en not_active Expired - Lifetime
-
2003
- 2003-05-06 WO PCT/EP2003/004735 patent/WO2003096336A2/en not_active Application Discontinuation
- 2003-05-06 AU AU2003227723A patent/AU2003227723A1/en not_active Abandoned
- 2003-05-06 CN CNB03814753XA patent/CN100514252C/en not_active Expired - Lifetime
- 2003-05-06 EP EP03725156A patent/EP1509828A2/en not_active Ceased
- 2003-05-06 KR KR1020047018182A patent/KR100848369B1/en active IP Right Grant
Non-Patent Citations (3)
Title |
---|
Digital rights management and watermarking of multimediacontent for m-commerce applications. Frank Hartung,Friedhelm Ramme,Ericsson Research.Communications Magazine, IEEE,Vol.38 No.11. 2000 |
Digital rights management and watermarking of multimediacontent for m-commerce applications. Frank Hartung,Friedhelm Ramme,Ericsson Research.Communications Magazine, IEEE,Vol.38 No.11. 2000 * |
Secret and public key image watermarking schemes forimageauthentication and ownership verification. Ping Wah Wong, Senior Member, IEEE, and Nasir Memon,Member, IEEE.Image Processing,IEEE Transactions on,Vol.10 No.10. 2000 |
Also Published As
Publication number | Publication date |
---|---|
EP1509828A2 (en) | 2005-03-02 |
KR100848369B1 (en) | 2008-07-24 |
KR20050010795A (en) | 2005-01-28 |
AU2003227723A8 (en) | 2003-11-11 |
WO2003096336A2 (en) | 2003-11-20 |
DE10220925A1 (en) | 2003-11-27 |
WO2003096336A3 (en) | 2004-05-27 |
DE10220925B4 (en) | 2005-03-31 |
AU2003227723A1 (en) | 2003-11-11 |
CN1774684A (en) | 2006-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10461930B2 (en) | Utilizing data reduction in steganographic and cryptographic systems | |
US20050135613A1 (en) | Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data | |
US6550011B1 (en) | Media content protection utilizing public key cryptography | |
US6367019B1 (en) | Copy security for portable music players | |
US6941283B2 (en) | Information recording device and information reproducing device | |
CN1327358C (en) | System and method for protecting a title key for recordable media content | |
KR100459147B1 (en) | Proprietary watermark system for secure digital media and content distribution | |
US7123718B1 (en) | Utilizing data reduction in stegnographic and cryptographic systems | |
US6728379B1 (en) | Information processor and information processing method | |
US7117365B1 (en) | Method and device for generating a data stream and method and device for playing back a data stream | |
US6834346B1 (en) | Content processing system | |
EP3905076A1 (en) | Content protection | |
JP2002152490A (en) | Data operating method | |
EP1759478A2 (en) | Secure communication and real-time watermarking using mutating identifiers | |
WO2001018628A2 (en) | A secure personal content server | |
JP2007124717A (en) | System for preventing illegal copying of digital content | |
JP4987978B2 (en) | Digital content supply system using digital fingerprinting | |
CN100514252C (en) | Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data | |
JP2001274785A (en) | Contents information decoding method and contents information decoder | |
KR20000072848A (en) | System for protecting copy of digital contents | |
Moskowitz | Introduction—Digital Rights Management | |
JP2000341264A (en) | Information processing device and its method | |
WO2002080067A2 (en) | Information processor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CX01 | Expiry of patent term |
Granted publication date: 20090715 |
|
CX01 | Expiry of patent term |