CN1802703B - System and method for audio/video data copy protection - Google Patents
System and method for audio/video data copy protection Download PDFInfo
- Publication number
- CN1802703B CN1802703B CN2004800157106A CN200480015710A CN1802703B CN 1802703 B CN1802703 B CN 1802703B CN 2004800157106 A CN2004800157106 A CN 2004800157106A CN 200480015710 A CN200480015710 A CN 200480015710A CN 1802703 B CN1802703 B CN 1802703B
- Authority
- CN
- China
- Prior art keywords
- control information
- copy control
- content
- information
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00282—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in the content area, e.g. program area, data area or user area
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
- G11B20/00768—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Television Signal Processing For Recording (AREA)
Abstract
A system for preventing copying of audio/video (AV) data, including a copy control information inspection unit receiving first copy control information from AV data including an AV content information section having the first copy control information and an AV content section having second copy control information, and transmitting the first copy control information and a control command corresponding to the first copy control information, a key generation unit generating a decryption key using the first copy control information and predetermined information for the decryption key generation, according to the control command, and a decryption unit decrypting the AV data with the use of the decryption key.
Description
Technical field
The present invention relates generally to data copy protection; more particularly; relate to a kind of by use be included in audio/video (below; be called " AV ") flow data (below; be called " AV data ") in copy control information (below, be called " CCI ") protect the AV content to avoid by the system and method for bootlegging.
Background technology
Along with the development of Digital Signal Processing, various digital recording equipments and medium are extensively popularized.Yet the numerical data that is included in these equipment and the medium can be play repeatedly and be duplicated.With regard to this point, be distributed on market if comprise the recording medium of the data of bootlegging, the copyright owner of the music of so various contents, film etc. or authorized sellers' etc. interests are vulnerable to infringement.Recently, the various methods that prevent the bootlegging of these numerical datas have been proposed.Using the method for copy control information is exactly one of them.
Usually, the AV data comprise the copy control information that duplicates state of a control of the content in the indication AV stream.This copy control information indication AV data handling system, for example whether the register of being realized by hardware or software has the mandate that the content that is included in from the AV data that transmission medium receives is duplicated, and this register is determined the deciphering of described content according to the value of copy control information.
Copy control information can be indicated by position predetermined in the AV data, usually by two code indications.Can set up as 4 kinds of listed in the table 1 patterns.As shown in table 1, the pattern that can form copy control information is as follows.
[table 1]
Operational mode according to the AV equipment of CCI information
Fig. 1 illustrates the schematic structure of AV data.AV data 100 comprise the content field and the information field that comprises about the information of described content of content.
Information field has and is used for and will be used to control the section 110 of copy control information of the replicate run of AV equipment, and comprises about being included in the information of the various contents in the AV stream.Content field is divided into n sub-unit section, promptly " Content_unit_1 ", " Content_unit_2 " ... " Content_unit_n ".
Being included in the section that is used for copy control information 110 in the information field (below, be called " first copy control information ") is divided into and the as many section of the quantity of above-mentioned subelement.In the section of each division, comprise the value of the copy control information relevant with subelement, as " 11 " and " 10 " etc., and the positional information of the position of indication subelement.Described positional information can comprise the physical address relevant with subelement or logical address or the temporal information when the content in the subelement is played.Fig. 1 positional information is called " unint_1_ptr ", " unit_2_ptr " ... " unit_n_ptr ".
Subelement can be divided into one or more sections.For example, the subelement that is included in the content field can be divided into three away minor segment " Sub_2_1 ", " Sub_2_2 " and " Sub_2_3 ", and each of these away minor segment can comprise the copy control information 130 that is fit to it.
Be included in copy control information in each subelement of content field (below, be called " second copy control information ") be mainly used in to produce and be used for decryption key that content is decrypted, therefore, if this second copy control information is illegally modified, then content can not be decrypted.Yet first copy control information 110 is used to control the operation of content being duplicated about whether, therefore, owing to allow the third party to change first copy control information 110, and so the bootlegging of content becomes possibility.
Fig. 2 illustrate be used for AV flow data copy protection with the protection content avoid by traditional system of bootlegging.
Be used for the AV flow data copy-protection system 200 that the AV data of encrypting are decrypted is comprised AV Data Receiving unit 210, control module 220, decryption key generation unit 230 and content interpret unit 240.AV Data Receiving unit 210 receives the AV data.Control module 220 receives the operation of the control signal of outside input with the equipment of control and treatment AV data, and described control signal can comprise the command signal that is used to play the AV content, the command signal that is used for copying av contents etc.At this moment, described control signal can comprise content play order, content replication order etc.That control module 220 receives is 210 that send from AV Data Receiving unit, as first copy control information 110 described in Fig. 1, and will send to decryption key generation unit 230 and content interpret unit 240 with the value control signal corresponding of described first copy control information.
If decryption key generation unit 230 receives the order that produces decryption key from control module 220, then decryption key generation unit 230 uses second copy control information of 210 inputs from AV Data Receiving unit and other information that are used for the key generation to produce decryption key, and this decryption key is sent to content interpret unit 240.Content interpret unit 240 uses the decryption key that receives from decryption key generation unit 230 to come the content field the AV data that partly received by the AV data sink is decrypted, and the content of deciphering is sent to output unit 250.
Below, will the operation of traditional AV data handling system that the AV data are decrypted be described.
AV Data Receiving unit 210 receives the AV data, and first copy control information 110 that will be included in the AV data as described in Figure 1 sends to control module 220.
Control module 220 receives the operation of the control signal of outside input with control AV equipment.Be that control module 220 uses first copy control information 110 to check the encrypted state of the AV content in the AV data that received by AV Data Receiving unit 210 under the situation of command signal that content is duplicated in control signal.
Value at first copy control information 110 is under the situation of " freely duplicating ", do not need to produce decryption key, former state when therefore, control module 220 allows content interpret unit 240 that the AV data are partly received by the AV data sink by these AV data sends to output unit 250.
If the value of first copy control information 110 is in " no longer duplicate or never duplicate ", " freely duplicate, but encrypt " and " duplicating once " any, then need data decryption.For this reason, decryption key generation unit 230 receives first copy control information 110 that sends from control module 220, second copy control information of use 210 inputs from AV Data Receiving unit and other required information of generation decryption key produce decryption key, and this decryption key is sent to content interpret unit 240.Content interpret unit 240 uses the decryption key that sends to come the content field in the AV data that received by AV Data Receiving unit 210 is decrypted, and the AV content of deciphering is sent to output unit 250, as storage medium or display device.
Traditional AV data copy protection system 200 uses first copy control information to check whether AV equipment has the mandate that content is duplicated.Yet, existing problems, this is that first copy control information can easily be revised because for the bootlegging data." no longer duplicating or never duplicate (11) " if as shown in table 1 or " duplicating once (10) " be modified to " freely duplicate; but encrypt (01) " or " no longer duplicating or never duplicate (11) " is modified to " duplicating once (10) " and the AV data are received by AV Data Receiving unit 210, think control module 220 possible errors that then duplicating of these AV data is allowed to, thereby the bootlegging of related content can realize in an easy manner.
Disclosure of the Invention
The present invention is intended to address the above problem.One object of the present invention is to provide a kind of key that is used for data encryption or deciphering by utilization to prevent effectively because the illegal modifications of copy control information and the deciphering of the content that bootlegging causes from first copy control information of its generation.
In order to realize above-mentioned and/or other purposes of the present invention, a kind of system of duplicating that is used to prevent the AV data is provided, this system comprises: the copy control information inspection unit, from AV Data Receiving first copy control information and send first copy control information and with the first copy control information control commands corresponding, described AV data comprise AV content information section with first copy control information and have the AV contents section of second copy control information; The key generation unit uses first copy control information and the predetermined information that is used for the decryption key generation to produce decryption key according to described control command; And decryption unit, use described decryption key that the AV data are decrypted.
According to a further aspect in the invention, a kind of system of duplicating that is used to prevent the AV data is provided, comprise: the copy control information inspection unit, from AV Data Receiving first copy control information and send first copy control information and with the first copy control information control commands corresponding, described AV data comprise AV content information section with first copy control information and have the AV contents section of second copy control information; The key generation unit uses first copy control information and the predetermined information that is used for the encrypting key generation to produce encrypting key according to described control command; And ciphering unit, use described encrypting key that the AV data are encrypted.
According to a further aspect in the invention, a kind of method of duplicating that is used to prevent the AV data is provided, comprise: from described AV Data Receiving first copy control information, described AV data comprise the AV content information section with first copy control information and have the AV contents section of second copy control information; Determine the state of a control of first copy control information, and send first copy control information and with determine duplicate the state of a control control commands corresponding; According to described control command, use first copy control information and the predetermined information that is used for the decryption key generation to produce decryption key; With the described decryption key of use the AV data are decrypted.
According to a further aspect in the invention, a kind of method that the AV data are duplicated of being used to prevent is provided, comprise: from described AV Data Receiving first copy control information, described AV data comprise the AV content information section with first copy control information and have the AV contents section of second copy control information; Determine the state of a control of first copy control information and send first copy control information and with duplicate the state of a control control commands corresponding; According to described control command, use first copy control information and the predetermined information that is used for the encrypting key generation to produce encrypting key; With the described encrypting key of use the AV data are encrypted.
Preferably, described copy control information can be indicated a plurality of patterns of duplicating state of a control based on predetermined bit information, and described a plurality of patterns comprise: first pattern does not allow to duplicate; Second pattern, content is encrypted and allow it is once duplicated (described second pattern is modified to first pattern after once duplicating); Three-mode, content is encrypted, but allows it is carried out unlimited duplicating; With four-mode, content does not have encrypted, allows it is carried out unlimited duplicating.Preferably, the described information that is used for the encrypting key generation can comprise second copy control information.
Description of drawings
From below in conjunction with the description of accompanying drawing to exemplary embodiment, above-mentioned and/or other purposes of the present invention and characteristics will become clearer, in the accompanying drawing:
Fig. 1 is the schematic representation that the configuration of AV stream is shown;
Fig. 2 is the diagrammatic sketch of configuration that traditional AV data handling system of the bootlegging that is used to prevent content is shown;
Fig. 3 illustrates the block scheme that is used for AV data protection system that content is encrypted according to an exemplary embodiment of the present invention;
Fig. 4 illustrates the diagrammatic sketch that is used for AV data protection system that content is decrypted according to an exemplary embodiment of the present invention;
Fig. 5 to Fig. 7 is the diagrammatic sketch that the medium that is used to provide the AV data according to an exemplary embodiment of the present invention is shown; With
Fig. 8 is the process flow diagram of description according to the process of the bootlegging that prevents the AV data of the embodiment of the invention.
Realize optimal mode of the present invention
Below, describe the system and method that is used for AV flow data copy protection according to an exemplary embodiment of the present invention with reference to the accompanying drawings in detail.
Can extract content to play these contents from the AV data storage medium according to the content protective system of the embodiment of the invention, perhaps the content of encrypting is decrypted they are stored in the storage medium such as the another kind of type of hard disk etc.In addition, this content protective system can be encrypted so that they are stored in the AV data storage medium content.Correspondingly, will this content protective system be described in view of following two kinds of situations: encrypt and recorded content; And the content of deciphering and duplicating deciphering.
Fig. 3 is the block scheme that is used for AV data protection system that content is encrypted that illustrates according to the embodiment of the invention.As shown in the figure, this content protective system comprises: copy control information inspection unit 310 is used to check the state of first copy control information and responds check result produce control signal; With contents processing unit 320, be used for producing encrypting key and content being encrypted according to described control signal.Content protective system 300 moves with the CPU storer 330 that receives the AV data and to the CPU 340 that the AV data that are stored in this CPU storer are handled with being linked.
Below, with describing content is encrypted and they are recorded in process on the AV data storage medium.
If the AV data are loaded on the CPU storer 330, then CPU 340 extracts first copy control information 110 that comprises as shown in fig. 1 and the key of second copy control information 130 produces information and content, and they are sent to content protective system 300.
Copy control information inspection unit 310 receives the control signal relevant with the operational mode of content protective system 300 from user 360.At this moment, described operational mode comprises: pattern (" first pattern ") on the AV data storage medium 350 is encrypted and be recorded in to the AV data that receive; With the pattern (" second pattern ") that the AV data that receive are decrypted.Embodiment shown in Fig. 3 operates under first pattern.
Copy control information inspection unit 310 receives first copy control information and checks the state of control that duplicates from CPU storer 330.In table 1 (above shown), the described state of a control of duplicating has been shown.
The state of a control of duplicating at first copy control information is under the situation of " 11 ", does not allow content is duplicated.In this case, the key generation unit 322 of copy control information inspection unit 310 control content processing units 320 does not move it, thereby the AV content of reception is not recorded on the AV data storage medium 350.
First copy control information duplicate state of a control under the situation of " 00 ", content does not have encrypted and can this content freely be duplicated, and does not therefore need to produce to be used for key that the AV data are encrypted.Therefore, copy control information inspection unit 310 allow contents processing unit 320 under the situation of content that receives not being encrypted with the content record that receives on AV data storage medium 350.At this moment, first copy control information and key produce information quilt record together.
First copy control information duplicate state of a control under the situation of " 01 " or " 10 ", produce and be used for key that the content that receives is encrypted.Key generation unit 322 uses the key that receives from CPU storer 330 to produce information and produces from first copy control information that copy control information inspection unit 310 receives and is used for key that content is encrypted.At this moment, this key generation information comprises second copy control information.Except second copy control information, key generation information comprises information about the device that comprises content protective system 300, be present in the value of PKI in the described device or key, produce the seed that produces at random with AV data storage medium 350 corresponding public key or key and for key.
Be used for key that content is encrypted if produced by key generation unit 322, then encryption/decryption element 324 uses these keys to come the content that receives from CPU storer 330 is encrypted.Then, the content of encryption is recorded on the AV data storage medium 350.
Fig. 4 is the diagrammatic sketch that is used for AV data protection system that content is decrypted that illustrates according to the embodiment of the invention.
With reference to this figure, content protective system 400 comprises: copy control information inspection unit 410, and check the state of first copy control information and produce control signal according to check result; With contents processing unit 420, be decrypted according to this control signal generation decryption key and to content.Content protective system 400 with receive the CPU storer 430 of AV data from the AV data storage medium and the CPU 440 that the AV data that are stored in the CPU storer 430 are handled moved with being linked.
Below, will process that use described content protective system that content is decrypted be described.
If from the AV data storage medium 450 with the AV data load on CPU storer 430; then CPU produces information from first copy control information 110 shown in this AV data extract Fig. 1 with the key that comprises second copy control information 130, and they are sent to content protective system 400.
Copy control information inspection unit 410 receives the control signal relevant with the operational mode of content protective system 400 from user 460.Fig. 4 illustrates content protective system 400 and operates in (as mentioned above) under second pattern.
Copy control information inspection unit 410 receives first copy control information and checks the state of control that duplicates from CPU storer 430.The described state of a control of duplicating has been shown in the table 1.
The state of a control of duplicating at first copy control information is under the situation of " 11 ", does not allow content is duplicated.Because copy control information inspection unit 410 does not move the key generation unit 422 of contents processing unit 420, therefore the AV data that receive are not decrypted.
First copy control information duplicate state of a control under the situation of " 00 ", content does not have decrypted and can this content freely be duplicated, and does not therefore need to produce to be used for key that the AV data are decrypted.Therefore, 410 outputs of copy control information inspection unit are by the AV content of contents processing unit 420 receptions.
First copy control information duplicate state of a control under the situation of " 01 " or " 10 ", produce and be used for key that the content that receives is decrypted.Key generation unit 422 uses the key that receives from CPU storer 430 to produce information and produces from first copy control information that copy control information inspection unit 410 receives and is used for key that content is decrypted.At this moment, this key generation information comprises second copy control information.Except second copy control information, key generation information comprises information about the device that comprises content protective system 400, be present in the value of PKI in the described device or key, produce the seed that produces at random with AV data storage medium 450 corresponding public key or key and for key.
Be used for key that content is decrypted if produced by key generation unit 422, then encryption/decryption element 424 uses these keys to come the content that receives from CPU storer 430 is decrypted and with its output.
During above-mentioned operational process, if be loaded into CPU storer 330 or when the CPU storer sends to copy control information inspection unit 310 with first copy control information in the AV data, first copy control information is illegally modified and is incorporated in the copy control information, then can produce and the different key of key that is used for the data that are stored in AV data storage medium 450 are encrypted.Therefore, the AV data of reception are not decrypted.
Fig. 5 to Fig. 7 is the diagrammatic sketch of medium that is used to provide the AV data that illustrates according to the embodiment of the invention, and wherein CPU storer 430 can be by receiving the AV data with data transmission media 520,530 and 540 corresponding interface unit 510.
Fig. 5 represents to be used for the wireless medium of WLAN (WLAN), bluetooth, wireless asynchronous transfer mode (ATM), the communication of digital land or digital communication by satellite based on 802.11a or 802.11b.
Fig. 6 represents to be used for Ethernet, optical fiber and digital data-interface (FDDI) or such as the wire medium of the high-speed serial communication of IEEE1394.
Fig. 7 represents the storage medium such as optical storage medium, magnetic storage medium or mobile memory medium.
Fig. 8 is the process flow diagram of description according to the process of the bootlegging that prevents the AV data of the embodiment of the invention.
If receive the AV data, then at S810, from the state of this AV data extract first copy control information with the inspection copy control information at S805.
If the state of first copy control information is " 11 " shown in the table 1, then duplicating of content is under an embargo, and therefore at S840, replicate run is terminated.
If the state of first copy control information is " 00 " shown in the table 1, then do not need content is decrypted, therefore at S815, under the situation that is not decrypted processing, the former state of AV data when receiving is output.
State at first copy control information is under the situation of " 01 " shown in the table 1 or " 10 ", will carry out at least once and duplicate.Therefore at S825, use first copy control information, produce decryption key by the order that is used to play.At this moment, described decryption key also comprises second copy control information except comprising first copy control information.This decryption key also can comprise the PKI that is present in the described device or key value, with store the AV data therein or provide the medium corresponding public key of AV data or key or produce the seed that produces at random for key.
After producing decryption key, use this decryption key with the AV data decryption that receives at S830, export described AV data at S835 then.
Utilizability on the industry
As mentioned above; the invention provides a kind of prevent that the modification owing to copy control information from causing to the method for the bootlegging of AV content and in the simple application aspect family expenses purpose or other purpose digital electronic devices; described digital electronic device all for the storage or copy the AV data that comprise copy control information, thereby the present invention helps content protecting.
It should be appreciated by those skilled in the art, in the situation that does not break away from technical spirit of the present invention and scope, can the above-mentioned embodiment of the invention be changed and revise, therefore, the invention is not restricted to the embodiment shown in the accompanying drawing.
Claims (12)
1. system of duplicating that is used to prevent audio/video (AV) data comprises:
The copy control information inspection unit, from AV Data Receiving first copy control information and send first copy control information and with the first copy control information control commands corresponding, described AV data comprise the AV content information section with first copy control information and have the AV contents section of second copy control information that described first copy control information indication is based on a plurality of patterns of duplicating state of a control of predetermined bit information;
The key generation unit uses first copy control information and the predetermined information that is used for the decryption key generation to produce decryption key according to described control command; With
Decryption unit uses described decryption key that the AV data are decrypted.
2. the system as claimed in claim 1, wherein, described a plurality of patterns comprise: first pattern does not allow duplicating of AV content; Second pattern, described AV content is encrypted and allow it is once duplicated, and after once duplicating, described second pattern is modified to first pattern; Three-mode, described AV content is encrypted, but allows it is carried out unlimited duplicating; With four-mode, described AV content does not have encrypted, allows it is carried out unlimited duplicating.
3. the system as claimed in claim 1 wherein, describedly is used for the predetermined information that decryption key produces and comprises second copy control information.
4. system of duplicating that is used to prevent audio/video (AV) data comprises:
The copy control information inspection unit, from AV Data Receiving first copy control information and send first copy control information and with the first copy control information control commands corresponding, described AV data comprise the AV content information section with first copy control information and have the AV contents section of second copy control information that described first copy control information indication is based on a plurality of patterns of duplicating state of a control of predetermined bit information;
The key generation unit uses first copy control information and the predetermined information that is used for the encrypting key generation to produce encrypting key according to described control command; With
Ciphering unit uses described encrypting key that the AV data are encrypted.
5. system as claimed in claim 4, wherein, described a plurality of patterns comprise: first pattern does not allow duplicating of AV content; Second pattern, described AV content is encrypted and allow it is once duplicated, and described second pattern is modified to first pattern after once duplicating; Three-mode, described AV content is encrypted, but allows it is carried out unlimited duplicating; With four-mode, described content does not have encrypted, allows it is carried out unlimited duplicating.
6. system as claimed in claim 4, wherein, the described predetermined information that is used for the encrypting key generation comprises second copy control information.
7. method of duplicating that is used to prevent audio/video (AV) data comprises:
From described AV Data Receiving first copy control information, described AV data comprise the AV content information section with first copy control information and comprise the AV contents section of second copy control information that described first copy control information indication is based on a plurality of patterns of duplicating state of a control of predetermined bit information;
Determine the state of a control of first copy control information, and send first copy control information and with determine duplicate the state of a control control commands corresponding;
According to described control command, use first copy control information and the predetermined information that is used for the decryption key generation to produce decryption key; With
Use described decryption key that the AV data are decrypted.
8. method as claimed in claim 7, wherein, described a plurality of patterns comprise: first pattern does not allow duplicating of AV content; Second pattern, described AV content is encrypted and allow it is once duplicated, and described second pattern is modified to first pattern after once duplicating; Three-mode, described AV content is encrypted, but allows it is carried out unlimited duplicating; With four-mode, described AV content does not have encrypted, allows it is carried out unlimited duplicating.
9. method as claimed in claim 7, wherein, the described predetermined information that is used for the decryption key generation comprises second copy control information.
10. one kind is used to the method that prevents from audio/video (AV) data are duplicated, comprising:
From described AV Data Receiving first copy control information, described AV data comprise the AV content information section with first copy control information and have the AV contents section of second copy control information that described first copy control information duplicates a plurality of patterns of state of a control by the predetermined bit information indication;
Determine the state of a control of first copy control information and send first copy control information and with determine duplicate the state of a control control commands corresponding,
According to described control command, use first copy control information and the predetermined information that is used for the encrypting key generation to produce encrypting key; With
Use described encrypting key that the AV data are encrypted.
11. method as claimed in claim 10, wherein, described a plurality of patterns comprise: first pattern does not allow duplicating of AV content; Second pattern, described AV content is encrypted and allow it is once duplicated, and described second pattern is modified to first pattern after once duplicating; Three-mode, described AV content is encrypted, but allows it is carried out unlimited duplicating; With four-mode, described AV content does not have encrypted, allows it is carried out unlimited duplicating.
12. method as claimed in claim 10, wherein, the described predetermined information that is used for the encrypting key generation comprises second copy control information.
Applications Claiming Priority (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US47703603P | 2003-06-10 | 2003-06-10 | |
US60/477,036 | 2003-06-10 | ||
KR1020030040404 | 2003-06-20 | ||
KR20030040404 | 2003-06-20 | ||
KR10-2003-0040404 | 2003-06-20 | ||
KR1020030061845 | 2003-09-04 | ||
KR10-2003-0061845 | 2003-09-04 | ||
KR10-2003-0061845A KR100513280B1 (en) | 2003-06-10 | 2003-09-04 | System and Method for AV-data copy protection |
PCT/KR2004/001045 WO2004109688A1 (en) | 2003-06-10 | 2004-05-06 | System and method for audio/video data copy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1802703A CN1802703A (en) | 2006-07-12 |
CN1802703B true CN1802703B (en) | 2010-12-29 |
Family
ID=46123499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2004800157106A Expired - Fee Related CN1802703B (en) | 2003-06-10 | 2004-05-06 | System and method for audio/video data copy protection |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR100513280B1 (en) |
CN (1) | CN1802703B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1241776A (en) * | 1998-07-03 | 2000-01-19 | 日本先锋公司 | Recording and reproducing system, recording apparatus and reproducing apparatus having copy protection function |
CN1313599A (en) * | 2000-03-14 | 2001-09-19 | 松下电器产业株式会社 | Encrypted information signal, information recording medium, information signal regenerating and recording device |
CN1396773A (en) * | 2001-07-06 | 2003-02-12 | 株式会社日立制作所 | Digital information recording device and output decice |
-
2003
- 2003-09-04 KR KR10-2003-0061845A patent/KR100513280B1/en not_active IP Right Cessation
-
2004
- 2004-05-06 CN CN2004800157106A patent/CN1802703B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1241776A (en) * | 1998-07-03 | 2000-01-19 | 日本先锋公司 | Recording and reproducing system, recording apparatus and reproducing apparatus having copy protection function |
CN1313599A (en) * | 2000-03-14 | 2001-09-19 | 松下电器产业株式会社 | Encrypted information signal, information recording medium, information signal regenerating and recording device |
CN1396773A (en) * | 2001-07-06 | 2003-02-12 | 株式会社日立制作所 | Digital information recording device and output decice |
Also Published As
Publication number | Publication date |
---|---|
CN1802703A (en) | 2006-07-12 |
KR100513280B1 (en) | 2005-09-09 |
KR20040110059A (en) | 2004-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100446106C (en) | Recording medium and method | |
US6832319B1 (en) | Content guard system for copy protection of recordable media | |
TW563319B (en) | Method and device for controlling distribution and use of digital works | |
US6343281B1 (en) | Device and method for preventing fraudulent copies of data containing encrypted copy-management information and recording medium | |
US8296582B2 (en) | Method and system for providing copy-protection on a storage medium and storage medium for use in such a system | |
JP4660899B2 (en) | Data processing apparatus, data processing method, and program providing medium | |
CN100492962C (en) | Apparatus and method for recording and reproducing information | |
US7380137B2 (en) | Content guard system for copy protection of recordable media | |
CN100376091C (en) | Information processing system and method | |
CN1319002C (en) | Data transmission system, device and method and data record device and medium | |
JP2003529874A (en) | Digital data reading / recording / reproducing device in digital data copy / protection system | |
CN1263305A (en) | Digital data file scrambler and its method | |
UA65637C2 (en) | Method and device for protecting data against duplication | |
JP2003502781A (en) | Copy security for portable music players | |
CN100364002C (en) | Apparatus and method for reading or writing user data | |
US7506377B2 (en) | Method and apparatus for playing content | |
CN100433030C (en) | Digital data file scrambler and its method | |
CN1802703B (en) | System and method for audio/video data copy protection | |
KR100608573B1 (en) | Apparatus and System for Data Copy Protection and Method therefor | |
CN100385521C (en) | Method for managing copy protection information of recording medium | |
US20040252973A1 (en) | System and method for audio/video data copy protection | |
JP2002538566A (en) | Protected optical disk and method for protecting optical disk | |
JP2003323351A (en) | Copyright management system, copyright management method, host device, program and recording medium | |
JP2000341265A (en) | Method for data recording and readout, recording device, readout device, and writing device | |
WO2004109688A1 (en) | System and method for audio/video data copy protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20101229 Termination date: 20190506 |
|
CF01 | Termination of patent right due to non-payment of annual fee |