CN1327586A - Recovery of a master key from recorded published material - Google Patents
Recovery of a master key from recorded published material Download PDFInfo
- Publication number
- CN1327586A CN1327586A CN00801828A CN00801828A CN1327586A CN 1327586 A CN1327586 A CN 1327586A CN 00801828 A CN00801828 A CN 00801828A CN 00801828 A CN00801828 A CN 00801828A CN 1327586 A CN1327586 A CN 1327586A
- Authority
- CN
- China
- Prior art keywords
- key
- encrypted
- master key
- public
- record
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 239000000463 material Substances 0.000 title claims abstract description 38
- 238000011084 recovery Methods 0.000 title description 2
- 238000000034 method Methods 0.000 claims description 24
- 108010022579 ATP dependent 26S protease Proteins 0.000 description 2
- 230000000638 stimulation Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
- Television Signal Processing For Recording (AREA)
Abstract
An encryption of a master key is included with each recording of encrypted published material that requires the master key for decryption and subsequent processing. The master key is encrypted using a public key associated with a trusted authority, typically encoded on a smartcard that is associated with each authorized user. Should the smartcard be lost, or the decryption device become inoperative, one of the recordings containing the encrypted master key is sent to the trusted authority for a retrieval of the master key. The trusted authority uses the private key corresponding to the public key that was used to encrypt the master key to determine the master key. In a preferred embodiment, the trusted authority is the vendor of the smartcard or other encryption/decryption device, and provides a replacement smartcard or device containing the retrieved master key, typically for a fee, for subsequent use by the user to decrypt other recorded material in the user's collection.
Description
The present invention relates to a kind of consumer appliances, specifically, the present invention relates to recovery with the open source information of encrypted form record.
Digital recording has unique characteristic, and promptly the duplicate of information material and source book have equal in quality.To the demand of protecting duplicate effectively for being vital by the protection of the information material of digital recording.Worked out or proposed multiple protection scheme with encrypted form recorded information data.Other protection scheme also is studied out or proposes, and promptly record is used for the encrypted key that reads or reproduce of control information data.In these protection schemes, " smart card " is used to encrypted information is decrypted.Smart card comprises master key, and described master key is used to information material is encrypted or deciphered, or is used for the key of the reproduction of another control information data is encrypted or deciphered.Another kind of scheme is that master key is comprised in record or the fetch equipment, or is comprised in the Information Access module that is used for the information material deciphering.Usually select smart card or Information Access module for use, so that allow to use substituting or fetch equipment of another kind of scheme or record.
After a period of time, the user will gather the collection of record, comprise the smart card of master key by use, can visit the information material that described collection comprises.Under this encrypted environment, in case lose smart card or the inefficacy of Information Access module, the record that the user is collected is in fact useless.The information that other is encrypted, computer file system for example is in case lose smart card or master key, also sensitive for damages.A kind of general method that alleviates influence relevant with losing smart card and trouble is the registration of preserving smart card and associated master key.Yet this system requirements user has the means of differentiating specific smart card after losing smart card, or requires above-mentioned registration to comprise the identifier of each smart card of each user.This system is difficult to management, occurs easily unfortunately, promptly because the wrong registration or the identifier of user error cause completely losing user's collection.
Aspect law enforcement or national security, " digital phase-locking case " skill is suggested, and the Public key by using the clientage comprises the password of the master key of each encrypted file to the encryption of master key, and the urgent approach of the encrypted file of visit is provided.U.S. Pat 5,557,346 and 5,557,765 and International Patent Application WO 99/04530 and WO98/47260 introduced these skills, and in the present invention combined.Disclosed skill has hindered different safety practices in these patent documentations, and described measure stops the encrypted information of unauthorized access and protects the individual's of establishment information secret.
An object of the present invention is to provide a kind of method and apparatus that is used to write down encrypted open source information, be convenient to recover master key, described master key is used to disclosed data is decrypted.Another object of the present invention provides a kind of method, and this method provides a kind of decryption device that substitutes that comprises master key, and described master key is applicable to encrypted information is decrypted.
Achieve this end together and other purpose by the password of master key and each record are included in, described record comprises that the requirement master key is decrypted and with the encrypted open source information of aftertreatment.Use the Public key relevant that master key is encrypted with the clientage.In case smart card is lost or decryption device can not be operated, comprise that any one record is fed to the clientage in the record of encrypted master key, be used to retrieve master key.The clientage uses the private cipher key corresponding with Public key to determine master key, and described Public key is used to master key is encrypted.In a preferred exemplary, the clientage is the dealer of smart card or other encryption/decryption device.After the charge, provide a replacement smart card or an equipment that comprises the master key that is retrieved, the user is used continuously, be decrypted with other data that is recorded in the user is collected.
Hereinafter in conjunction with the drawings, utilize example that the present invention is carried out detailed introduction.
Fig. 1 schematically illustrates the system that is used to write down encrypted open source information according to the invention;
Fig. 2 schematically illustrates the flow process that is used to write down the system of encrypted open source information according to the invention;
Fig. 3 has shown the flow process that is used to retrieve master key according to the invention.
In institute's drawings attached, the identical similar or identical feature or function of Reference numeral representative.
Fig. 1 schematically illustrates for example system 100 of audio-frequency information, audio-visual information, virtual reality information, multimedia messages and similar information of encrypted open source information that is used to write down according to the invention.For this purpose, term " open source information " means by a side and writes down and be assigned to the normally public's information material of the opposing party.The encryption of information that Here it is can not keep the secret of its information material, but keeps the right of duplicating and checking to open source information.
A kind of encryption device 110 data 101 of receiving information, and encrypted information material offered recording unit 130, be used to be recorded in medium 140.As everyone knows, information material 101 often comes from an information source with encrypted form, and for example the broadcasting of charge is in due order deciphered by this locality then.For the ease of understanding, decryption step does not show in Fig. 1, needn't further introduce in this article yet.
According to encryption device 110 employed certain criteria or agreements, decryption device 110 uses master key M121 that information material is encrypted, and produces a password E
M(CM) 112, or use a session key K that information material is encrypted, produce a password E
K(CM) 114.Master key M121 is constant to all encryptions of particular system 100, and master key M121 is provided by the smart card as access device 120 for example shown in Figure 1 usually.Another kind of situation is, access device 120 can be embedded within the independent access module, for example a set top box or other equipment.As everyone knows, for the classification of concrete information material or every kind of information material, session key K can change, and can comprise for example a ticket or other project, is used to differentiate to the demonstration of information material or duplicates right.With reference to denomination of invention is " by the copy protection of ticket password "; application number is 09/333; 628; the applying date is on June 15th, 1999, and acting on behalf of the people is Michael, and proxy number is PHA23; 457 (attorney docket PHA 23; 457) United States Patent (USP), it has introduced the skill that is used to duplicate and show the protection of copyrighted data, and above-mentioned skill is in the present invention combined.Session key K is produced by this locality usually, for example uses the key change between an encryption device 110 and the corresponding decryption device 160.With reference to denomination of invention is " by the key change of a portable remote control equipment ", application number is _, the applying date is _, acting on behalf of the people is Michael, proxy number is the United States Patent (USP) of PHA_ (disclosing 700621), it has proposed to be used for the method and system at the exchanged between equipment password key that is authorized to, and is also in the present invention combined.
According to the present invention, provide the main close access device 120 of M121 of wanting that a Public key P122 also is provided, described Public key P122 and a clientage for example dealer of access device 120 are relevant.Public key is the right part of public and private key, and the right private cipher key of public and private key is stored in the clientage there as secret.Use the project of the right public-key encryption of public and private key only can be deciphered by the right private cipher key of public and private key.Encryption device 110 uses Public key P122 that master key M121 is encrypted, and with encrypted master key E
P(M) 111 be notified to recording unit 130, be used for and encrypted information material E
M(CM) 112 or E
K(CM) 112 be recorded in together on the medium 140.If use session key K that encrypted information is encoded, encryption device 110 also uses master key M that the speech channel key K is encrypted, and provides a session key E who encrypts to recording unit 130
M(K) 113, be used to be recorded in medium 140.In many cases, be difficult to session key K is stored on the smart card, simultaneously provide a kind of smart card that comprises master key M121 by use to retrieve the measure of session key K based on the record of the password of the session key of master key M121.It is pointed out that by enciphered message data CM101 or key K, use the information E of master key M121 decrypt encrypted
K(CM) 114, and these passwords 111,112 or 111,113,114 are stored on the medium 100.By decoding or decoding series based on master key M121, information material CM101 can be resumed.
In order to reproduce the encrypted information material that is stored on the medium 140, a fetch equipment 150 is notified to decryption device 160 from medium 140 with encrypted data 111,112 or 111,113,114.Medium 140 can be the recording medium of any kind, comprises tape, disk, laser disk, CD, DVD etc.Readout equipment 150 is one to be used to read the relevant device of the data on the medium.If medium 140 is hard disk drives, for example readout equipment 150 can be to read the computer system that is stored in the file on the hard disk drive.If requirement, decryption device 160 can be accepted master key from access device 120.If use session key K that information material CM101 is encrypted, produce E
K(CM) 114, decryption device 160 uses session key K, does not need the duplicate 101 ' of master key M121 decryption information data CM101.On the other hand, if decryption device 160 does not directly use session key K, or use master key M121 that information material CM101 is encrypted, and producing EM (CM) 112, decryption device 160 receives the duplicate 101 ' that master key M121 also provides information material CM101 subsequently from access device 120.The duplicate 101 ' of information material CM101 is provided for a common readout equipment 170, shows the user with suitable form.For example, if information material CM101 is an audio recording, readout equipment 170 provides the audio representation of information material CM101.Equally, if information material CM101 is the multiple stimulation relevant with reality environment, readout equipment 170 provides and the corresponding suitable expression of the stimulation of every kind of record.
Fig. 2 schematically illustrates the flow process that is used to write down encrypted information material according to the invention, and this process can be undertaken by encryption device shown in Figure 1 110.For the ease of understanding, session key K use and by using master key M that the encryption of speech channel key K is not shown in Fig. 2; According to introduction, adding this option is clearly for a person skilled in the art.Flow process begins from receiving information material CM 210.Thereby encryption device 100 is accepted master key M and Public key P from access device shown in Figure 1 120 usually exactly 220, and 230, encryption device 110 uses Public key P encryption main key M, 240, writes down encrypted master key E
P(M).250, use master key M that information material is encrypted, 260, encrypted information material E
M(CM) by same record.According to the present invention, encrypted master key E
P(M) and encrypted information material E
M(CM) preferably be stored in the identical medium 140.
According to as can be known above-mentioned, the knowledge of master key M makes all data that are recorded according to the invention decrypted.
Fig. 3 has shown the flow process that is used to retrieve master key M according to the invention, and example shown in Figure 3 occurs between supplier area and the user area.310, the supplier provides a master key M and a Public key P to the user, and master key M and Public key P are provided with the smart card form usually, is convenient to encrypt by 350 pairs of protected backup datas of a compliance with system.Another kind of scheme is that master key can be created on the smart card randomly, and the supplier does not also know.As mentioned above, some standards are suggested, and appealing to use to each user is that unique master key M encrypts protected backup data, to stop the protected backup data CM of uncontrolled reproduction.According to these standards, a compliance with system 350 realizes and carries out the encryption and the protection of duplicate.By the compliance with system 350 that comprises encryption, deciphering, record, reading capability, the user can create the collection 360 of the encrypted information material CM that meets proper standard, by the master key M that is provided is provided, can decipher and read encrypted information material CM.
If the user has lost master key M or smart card makes mistake, the supplier provides a master key M who substitutes by step shown in Figure 3 to the user.The user selects an independent encrypted record 361 and gives the supplier it from collecting 360.Substitute and send original encrypted record 361, the duplicate of record 361 can be transferred, and supposes that duplicate comprises the master key E that has encrypted
P(M) the duplicate that is not modified.The supplier uses the master key E of corresponding private cipher key p to encrypting 320
P(M) be decrypted,,, give the smart card that user one substitutes usually as the answer of collecting service fee at 330 duplicate that master key M and Public key K be provided.Use this mode, by paying relevant service fee, the user can visit and read the user continuously and collect each record in 360.
Fig. 4 has shown the chart that is used to provide an alternative access device 120 ' according to the invention.Fetch equipment 410 provides encrypted master key E from the user's shown in Figure 3 encrypted record 361 of collection 360 visits to decryption device 420
P(M).Decryption device 420 uses private cipher key p to encrypted master key E
P(M) be decrypted, so that master key M to be provided.One programming device is with decrypted master key M, put into the access device 120 ' that duplicates with the corresponding Public key P of private cipher key p401, and the described access device that duplicates 120 ' is returned to the user with encrypted record 361 usually.
The above-mentioned main principle of the present invention that illustrated; should be noted that; though this paper does not describe clearly or shows that those skilled in the art can carry out different improvement to this, example of the present invention and principle are in claims of the present invention scope required for protection.For example can add control in process shown in Figure 3, be limited with the quantity of the master key M that guarantees to be replicated.For example the simple record of the number of times that is provided of master key M can be held, and master key M more duplicates and can be excluded.Another kind of scheme is, supposes that the duplicate of each master key can have an expenses standard that increases or use some other programs, and making being transmitted in a large number that master key M is not authorized to is impossible or very invalid economically.
In present specification, the concrete 26S Proteasome Structure and Function of numeral is shown and is used for illustration purpose.Other 26S Proteasome Structure and Function equipment is feasible.For example access device 120 can be a kind of programming device, in case be activated, can download master key M.Therefore, based on encrypted master key E to the download TRANSFER OF AUTHORIZATION
P(M), the operation of above-mentioned replacement access device 120 can comprise the duplicate of downloading master key M.By reading present specification, for a person skilled in the art, these and other system architecture are very clearly with excellent feature, all in the protection domain of claims of the present invention.
Claims (20)
1. a method that is used to write down open source information (101) comprises: open source information (101) is encrypted (210), produce encrypted information (112,114), rely on the information (112 after master key (121) promotes to encrypt, 114) deciphering, master key (121) is encrypted (230), produce an encrypted master key (111), rely on private cipher key (p) to promote the deciphering of master key (121), go up encrypted master key (111) of record (240) and encrypted information (112,114) at recording medium (140).
2. method according to claim 1 is characterized in that the encryption (210) of open source information (101) being comprised:
Use one first key (K) that open source information (101) is encrypted, produce encrypted information (114),
(K) encrypts to first key, produces encrypted first key (113), relies on master key (121), promotes the deciphering of first key (K), and described method comprises: encrypted first key (113) is recorded on the recording medium (140).
3. method according to claim 1 is characterized in that: the encryption (230) of master key (121) is based on a Public key (P), and this Public key (P) is corresponding to a private cipher key (p), and is right as a public and private key.
4. method according to claim 1 is characterized in that: described open source information comprises: audio data, video data, audiovisuals and virtual reality data.
5. method according to claim 1 is characterized in that: described recording medium is a kind of among tape, disk, laser disk, CD, the DVD at least.
6. one kind provides an access device (120 ') that substitutes to promote encrypted information (112, the method of deciphering 114) comprises: accept a record (361) from the user, it comprises the password based on the master key of a Public key (P) (121), use a private cipher key (p), password (111) to master key (121) is decrypted, produce the duplicate of master key (121), this private cipher key (p) is corresponding with Public key (P), right as a public and private key, upward the duplicate of master key (121) is encoded at the access device (120 ') that substitutes, provide (330) to give the user access device (120 ') that substitutes.
7. method according to claim 6 is characterized in that: also comprise: the original access device (120) that will comprise master key (121) offers the user.
8. method according to claim 6 is characterized in that: also comprise: keep the record of each duplicate of master key (121), according to record, provide (330) to give the user access device (120 ') that substitutes.
9. method according to claim 6 is characterized in that: also comprise: the expense of the access device of estimating to provide alternative (120 ').
10. method according to claim 9 is characterized in that: also comprise: keep the record of each duplicate of master key (121), and according to record, the expense of the access device (120 ') that decision is used to provide alternative.
11. method according to claim 10 is characterized in that determining that expense comprises: determine the frequency of each duplicate of master key (121), determine the mutual relationship of expense and frequency.
12. method according to claim 6 is characterized in that: described record is included on a kind of among tape, disk, laser disk, CD, the DVD at least.
13. a system comprises:
One encryption device (110) is configured to: open source information (101) is encrypted, information (112,114) after the encryption that generation dependence master key (121) is decrypted is encrypted master key (121), produce the encrypted master key (111) that relies on private cipher key (p) to be decrypted
Be configured to a recording unit (130): go up encrypted master key (111) of record and encrypted information material (112,114) at recording medium (140).
14. system according to claim 13 is characterized in that: described recording medium is a kind of among tape, disk, laser disk, CD, the DVD at least.
15. system according to claim 13 is characterized in that: encryption device (110) is configured to based on a Public key (P) master key (121) be encrypted, and this Public key (P) is corresponding to a private cipher key (p), and is right as a public and private key.
16. system according to claim 13, it is characterized in that: encryption device (110) is configured to open source information is encrypted, therefore, by first key (K) open source information (101) is encrypted, produce encrypted information material (114), by master key (121) first key (K) is encrypted, produced encrypted first key (113), recording unit (130) is configured to write down encrypted first key (113).
17. a system that is used to provide an access device (120 ') that substitutes comprises:
One fetch equipment (410), it provides encrypted master key (111) from record (361), described record (361) comprises based on the encrypted master key (111) of the right Public key (P) of public and private key and encrypted information material (112,114), according to the encrypted corresponding master key of master key (111) (121), described encrypted information material (112,114) can be decrypted, one decryption device (420), it is from encrypted master key (111) the deciphering master key (121) based on private cipher key (p), described private cipher key (p) is corresponding to the right Public key of public and private key (P), one programming device (430), it goes up record master key (121) at alternative access device (120 ').
18. system according to claim 17 is characterized in that: described programming device (430) also is recorded in Public key (P) on the alternative access device (120 ').
19. one is included in the record (361) on the medium, comprise: based on the password (111) of the master key (121) of the right Public key of public and private key (P), its deciphering depends on the right private cipher key of public and private key (p), the password of open source information (101), and its deciphering depends on master key (121).
20. a record according to claim 17 is characterized in that: described medium comprises a kind of among tape, disk, laser disk, CD, the DVD at least.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US38982599A | 1999-09-03 | 1999-09-03 | |
US09/389,825 | 1999-09-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1327586A true CN1327586A (en) | 2001-12-19 |
Family
ID=23539874
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN00801828A Pending CN1327586A (en) | 1999-09-03 | 2000-08-16 | Recovery of a master key from recorded published material |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1145242A3 (en) |
JP (1) | JP2003509881A (en) |
KR (1) | KR100748867B1 (en) |
CN (1) | CN1327586A (en) |
WO (1) | WO2001018807A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101944992B (en) * | 2003-05-23 | 2012-03-21 | 纳格拉影像股份有限公司 | Device and method for encrypting and decrypting a block of data |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20020049483A (en) * | 2000-12-19 | 2002-06-26 | 조충환 | Carcass member of bias tire |
JP2002245427A (en) * | 2001-02-20 | 2002-08-30 | Toshiba Corp | Ic card, ic card terminal device and method for duplicating ic card |
FI114362B (en) * | 2001-12-12 | 2004-09-30 | Setec Oy | A method for enabling a device secret key on another device |
JP3978046B2 (en) * | 2002-02-25 | 2007-09-19 | 日本電信電話株式会社 | File access control method, program, and storage medium |
US7861082B2 (en) | 2002-05-24 | 2010-12-28 | Pinder Howard G | Validating client-receivers |
CN1898623A (en) * | 2003-12-22 | 2007-01-17 | 皇家飞利浦电子股份有限公司 | Software execution protection using an active entity |
CN1906558A (en) * | 2003-12-30 | 2007-01-31 | 威步系统股份公司 | Authorization code recovering method |
GB0400663D0 (en) * | 2004-01-13 | 2004-02-11 | Koninkl Philips Electronics Nv | Secure data handling system, method and related apparatus |
JP2005327235A (en) | 2004-04-13 | 2005-11-24 | Hitachi Ltd | Method for encryption backup and method for decryption restoration |
CN101023433A (en) * | 2004-07-02 | 2007-08-22 | 皇家飞利浦电子股份有限公司 | Security unit and method for protecting data |
KR101119933B1 (en) * | 2004-08-12 | 2012-03-15 | 씨엠엘에이 엘엘씨 | Permutation Data Transformation to Enhance Security |
US9277295B2 (en) | 2006-06-16 | 2016-03-01 | Cisco Technology, Inc. | Securing media content using interchangeable encryption key |
US9137480B2 (en) | 2006-06-30 | 2015-09-15 | Cisco Technology, Inc. | Secure escrow and recovery of media device content keys |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5237610A (en) * | 1990-02-01 | 1993-08-17 | Scientific-Atlanta, Inc. | Independent external security module for a digitally upgradeable television signal decoder |
DE69634850T2 (en) * | 1995-10-09 | 2006-05-18 | Matsushita Electric Industrial Co., Ltd., Kadoma | INFORMATION RECEIVING CARRIER, INFORMATION REPRODUCER AND INFORMATION REPRODUCTION PROCESS |
US5857021A (en) * | 1995-11-07 | 1999-01-05 | Fujitsu Ltd. | Security system for protecting information stored in portable storage media |
WO1999004530A1 (en) * | 1997-07-15 | 1999-01-28 | V-One Corporation | File encryption with key recovery |
EP0936812A1 (en) * | 1998-02-13 | 1999-08-18 | CANAL+ Société Anonyme | Method and apparatus for recording of encrypted digital data |
US7162452B1 (en) * | 1999-03-25 | 2007-01-09 | Epstein Michael A | Key distribution via a memory device |
-
2000
- 2000-08-16 EP EP00965881A patent/EP1145242A3/en not_active Withdrawn
- 2000-08-16 KR KR1020017005512A patent/KR100748867B1/en not_active IP Right Cessation
- 2000-08-16 WO PCT/EP2000/008054 patent/WO2001018807A2/en not_active Application Discontinuation
- 2000-08-16 CN CN00801828A patent/CN1327586A/en active Pending
- 2000-08-16 JP JP2001522536A patent/JP2003509881A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101944992B (en) * | 2003-05-23 | 2012-03-21 | 纳格拉影像股份有限公司 | Device and method for encrypting and decrypting a block of data |
Also Published As
Publication number | Publication date |
---|---|
EP1145242A2 (en) | 2001-10-17 |
KR100748867B1 (en) | 2007-08-13 |
WO2001018807A3 (en) | 2001-10-04 |
WO2001018807A2 (en) | 2001-03-15 |
KR20010083940A (en) | 2001-09-03 |
EP1145242A3 (en) | 2001-12-05 |
JP2003509881A (en) | 2003-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1061515B1 (en) | Memory card, memory card utilizing device, and corresponding method and program for converting management information which contains restrictive information using a different key in each management information send and receive session | |
CN1327358C (en) | System and method for protecting a title key for recordable media content | |
US6367019B1 (en) | Copy security for portable music players | |
KR100434634B1 (en) | Production protection system dealing with contents that are digital production | |
CN100367247C (en) | Method for managing copy protection information of recordingmedium | |
CN103635911B (en) | For the protection of the memory device of content and main process equipment and method thereof | |
JP4857123B2 (en) | Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method | |
JP3722584B2 (en) | Reproduction permission method and recording medium | |
US20090210724A1 (en) | Content management method and content management apparatus | |
JP2002215465A5 (en) | ||
KR970002629A (en) | Data recording apparatus and method, data reproducing apparatus and method, and recording medium | |
JP4753473B2 (en) | Key distribution by memory device | |
CN1327586A (en) | Recovery of a master key from recorded published material | |
JP4314713B2 (en) | Data recording method and apparatus, data reproducing method and apparatus, and data recording and reproducing system | |
KR20090076606A (en) | Method for recording content on a disc, method for providing a title key, apparatus for recording content on the disc, and content providing server | |
JP3682840B2 (en) | Content information recording method and content information recording apparatus | |
CN100364002C (en) | Apparatus and method for reading or writing user data | |
JP3556891B2 (en) | Digital data unauthorized use prevention system and playback device | |
JP3788572B2 (en) | Rental content distribution system and method | |
KR100695665B1 (en) | Apparatus and method for accessing material using an entity locked secure registry | |
JP4168358B2 (en) | Content information restoration method and content information restoration device | |
US20040098601A1 (en) | Secure local copy protection | |
CN1777946B (en) | Information processing device and method | |
JP2000341265A (en) | Method for data recording and readout, recording device, readout device, and writing device | |
CN101057246B (en) | Data reproducing method and data processing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned | ||
C20 | Patent right or utility model deemed to be abandoned or is abandoned |