KR20080107970A - Smart card with flash memory and memory reader of smart card and drm method using that reader - Google Patents
Smart card with flash memory and memory reader of smart card and drm method using that reader Download PDFInfo
- Publication number
- KR20080107970A KR20080107970A KR1020070116795A KR20070116795A KR20080107970A KR 20080107970 A KR20080107970 A KR 20080107970A KR 1020070116795 A KR1020070116795 A KR 1020070116795A KR 20070116795 A KR20070116795 A KR 20070116795A KR 20080107970 A KR20080107970 A KR 20080107970A
- Authority
- KR
- South Korea
- Prior art keywords
- flash memory
- bad
- reader
- smart card
- area
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0013—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
- G06K7/0021—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers for reading/sensing record carriers having surface contacts
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C7/00—Arrangements for writing information into, or reading information out from, a digital store
- G11C7/10—Input/output [I/O] data interface arrangements, e.g. I/O data control circuits, I/O data buffers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Human Computer Interaction (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
The present invention relates to a smart card having a flash memory and a digital content protection method using a reader and a reader of the smart card, and more particularly, digital information to a smart card having a flash memory and a flash memory embedded in the smart card. A method of protecting digital content information using a reader capable of recording or reading recorded information and an application program operating on a terminal that performs a function of recording or reading information by performing mutual information exchange with the reader according to a user's operation. DRM (Digital Right Management).
That is, the present invention provides a flash memory in a conventionally used smart card, so that the skatcard can perform not only a single credit card but also a digital storage medium. Of course, the present invention relates to a method of protecting digital information stored in a flash memory by using unique information of the smart card.
In general, a smart card is equipped with information on authentication, credit card information, payment account information, etc., so that it can be used for traffic cards, credit cards, and the like. In addition, smart card can be used for banking operations such as account inquiry, bank transfer, deposit withdrawal.
On the other hand, portable devices such as MP3 (MPEG Audio Layer-3), PMP (Portable Multimedia Player), digital cameras, etc. are increasingly diversified and expanded in function, and storage capacity is also gradually increased to allow a variety of contents to be stored. For example, when performing a video recording function using a digital camera requires a larger storage space than when shooting still images.
Embedding a large amount of storage space for all these additional features into any portable device not only increases the price of the device, but also requires users to purchase the device at an extra cost. There is a problem.
To solve this problem, manufacturers who manufacture portable devices such as MP3, PMP, digital cameras, etc., fix the memory built into the device to a certain size and install a separate memory card to expand the memory capacity according to the user's requirements. I am doing it forever.
However, as portable devices are diversified and various types of memory cards are applied to each device, users with various portable devices can also individually select various types of memory cards (eg, SD, SMC, MMC, memory stick, USB removable disk, etc.). There is inconvenience to be equipped with.
In addition, when such a memory card is lost or stolen, all the information contained in the memory card is exposed by the person who acquired the memory card, so that important personal information or information requiring confidentiality can be easily disclosed. Of course, there is a problem in that the acquired person can use the content without paying for the purchased content.
In addition, since no personal identification information is recorded in the memory card unless a separate recording is performed, there is a problem that the person who acquired the memory card cannot easily return it even if he / she wants to return it to the lost person.
The present invention was created in order to solve the above problems, and provides a storage space for digital information in addition to the smart card's original function by embedding a flash memory in an existing smart card, and provides unique authentication information of the smart card for information that requires protection. Smart card and smart card reader and reader equipped with flash memory that encrypt and store using (for example, a card serial number) and simultaneously implement the function of a smart card and a memory card for information protection with one card. The purpose of the present invention is to provide a method for protecting digital content.
Smart card with a flash memory of the present invention for achieving the above object, smart card COB having a plurality of input and output terminals; And a flash memory COB having a plurality of input / output terminals.
Here, each terminal provided in the smart card COB and the flash memory COB may be a terminal connected to a reader for writing or reading in the smart card COB or the flash memory COB.
The smart card COB and the flash memory COB may be electrically separated from each other, or may be electrically connected to each other.
In addition, the flash memory COB may be divided into a security area and a general area.
In this case, when the reader or the reader writes or reads the secure area of the flash memory COB of the smart card, the reader may perform recording or reading through digital rights protection (DRM) authentication by the ASIC of the reader.
The digital copyright protection authentication of the ASIC of the reader may be performed based on the physical characteristics of the flash memory constituting the flash memory COB of the smart card.
The physical property may be information about a bad pattern for each unit area of the flash memory.
The bad pattern information may be any one of bad block, bad page or bad bit information.
The digital copyright protection authentication of the ASIC of the reader may be performed based on the physical characteristics of the flash memory of the flash memory COB and the unique authentication information stored in the smart card COB.
On the other hand, the smart card reader having a flash memory of the present invention for achieving the above object, the exchange of information through the connection terminal which is wired or wirelessly connected to each terminal of the smart card COB and flash memory COB Can be written or read into the flash memory COB.
Here, the reader is connected to an external terminal by wire or wireless, and writes the digital content data stored in the terminal to the flash memory COB or reads the digital content data recorded in the flash memory COB and transmits the data to the terminal. Can perform a read operation.
When the reader receives the information protection request for the digital content data, the reader controls the recording and reading of the digital content data to be performed differently from the case where there is no information protection request. Can be operated in conjunction with
When the information protection request for the digital content data is requested, the terminal application program accesses an external smart card server to inquire whether the smart card has been received, and is not a smart card. If the protection requested digital content data is transmitted to the reader, wherein the reader is a bad card of the flash memory constituting the flash memory COB when it is determined that the smart card is not received by the application program on the terminal side. The encryption table may be generated using a pattern, and the digital content data may be encrypted using the encryption table and recorded in the flash memory COB to perform digital rights protection (DRM).
The reader may be wired to the smart card server through the terminal or wirelessly connected to the smart card server using a wireless port provided separately.
On the other hand, the application program on the terminal side, when the information protection request for the digital content data is requested, by connecting to the external smart card server, using the unique authentication information in the smart card COB read through the reader You can query the presence of the accident.
Here, when it is determined that the reader is a smart card that is not received by the application program on the terminal side, the reader receives a read permission command for the digital content data from the application program on the terminal side, and transmits the read permission command to the flash memory COB. After generating a decryption table for encrypted and stored digital content data, the decrypted digital content data may be decrypted using the decryption table to be transmitted to the terminal.
In addition, when it is determined that the reader is a smart card accidentally received by the application program on the terminal side, the reader receives a read disallow command regarding the digital content data from the application program on the terminal side, and transmits to the flash memory COB. It is preferable not to perform an operation of decrypting the encrypted and stored digital content data.
The reader further includes an additional connection terminal connected to another IC card, and when connected to the smart card COB or a corresponding server using unique authentication information on the other IC card, the smart card COB or the other IC card. The unique authentication information of the award may be transmitted to the corresponding server so that electronic commerce is performed on the corresponding server.
The reader may be wired to the corresponding server through the terminal or wirelessly connected to the corresponding server using a wireless port provided separately.
The reader may allow the electronic commerce to be performed in the corresponding server by using one or both selected from an authorized certificate stored in a flash memory COB of the smart card and unique authentication information on the other IC card.
The reader may allow the electronic commerce to be performed in the corresponding server by using one or both selected from an authorized certificate stored in a flash memory COB of the smart card and unique authentication information on the smart card COB.
The security area of the flash memory COB is divided into a banking area for banking purposes and a personal area for data storage, and the reader receives the banking area information from the terminal. If the access information on the bank is blocked, the input authentication information input from the terminal and the contents of the unique authentication information stored in the smart card COB coincide with each other.
Meanwhile, the banking area includes an OTP generation area capable of generating an One Time Password (OTP), and when the reader receives a request for the OTP generation from the terminal, the OTP generated from the OTP generation area. It may further include a display unit for displaying information.
The reader may be connected to the terminal and simultaneously transmit data stored in the personal area to a memory in the terminal.
In addition, when the reader is connected to an external smart card server, the reader receives the electronic bank account corresponding to the unique authentication information in the smart card COB from the smart card server and transmits the electronic bank statement to the banking area of the flash memory COB. The electronic bank account history may be stored in a banking area.
The reader may receive update information about the smart card from the smart card server and transmit the updated information to the banking area in the flash memory COB while updating the information of the banking area. Can be.
On the other hand, the digital copyright protection method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital copyright protection (DRM) method using the reader, smart connected to the reader Checking a bad pattern for each unit area of a flash memory constituting a flash memory COB of the card, and determining a bad pattern extraction area; Recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; And examining an area corresponding to the area code recorded in the table selection code field, and constructing a bad pattern DRM table based on the bad pattern table.
Here, the bad pattern table may be generated when a memory format of the flash memory is formatted, and an address value of a bad pattern for each unit area, which is a physical property of a memory device, may be recorded.
In addition, the bad pattern DRM table may be configured of only the bad pattern table.
The bad pattern DRM table may be configured by using a card serial number field of a card ID, and may be configured by padding values generated by sequentially ORing the values of the bad pattern table and the card serial number value sequentially. .
The bad pattern may be any one of a bad block, a bad page, and bad bit information.
The bad pattern extraction region may be an entire block of a memory, an area including a bad pattern having a predetermined threshold value or more, or an area including the largest number of bad patterns.
The unit area may be an area set in 2048 block multiples.
In addition, the predetermined threshold may be the number of 128 bad blocks.
In addition, the size of the bad pattern DRM table may be 256 bytes.
The flash memory may be a NAND flash memory.
Digital copyright protection method using a reader of a smart card having a flash memory of the present invention for achieving the above object, in the digital copyright protection (DRM) method using the reader, the smart card connected to the reader Extracting physical characteristics of the flash memory constituting the flash memory COB; And generating an encryption key using the extracted physical characteristics of the flash memory.
Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the recording method of digital content using the reader, the flash memory of the smart card connected to the reader Inspecting a bad pattern for each unit region of a flash memory device constituting a COB, and determining a bad pattern extraction region; Recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; Inspecting an area corresponding to an area code recorded in the table selection code field and constructing a bad pattern digital copyright protection (DRM) table based on the bad pattern table; And recording the digital content data in the flash memory using the bad pattern DRM table as an encryption key.
Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital content recording method using the reader, the flash memory COB of the smart card connected to the reader Extracting physical characteristics of a flash memory constituting the memory; Generating an encryption key using physical characteristics of the extracted flash memory; And recording the digital content data in the flash memory using the generated encryption key.
Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital content recording method using the reader, is connected to the reader, not the data storage space Setting and recording an area for recording addresses of bad areas of a used memory in a header data area, which is an area for recording characteristics of a flash memory constituting a flash memory COB of a smart card; And extracting an encryption characteristic value by combining addresses of the bad region, and then encrypting the original digital content data with the encryption characteristic value and recording the digital content data in the normal region except the bad region of the memory.
Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital content recording method using the reader, the flash memory COB of the smart card connected to the reader Marking a bad area of a memory used in a flash memory constituting a bad area at a defined position of a free area corresponding thereto, and extracting an encryption characteristic value by combining addresses of the bad area; And encrypting the original digital content data using the encryption characteristic value, and recording the digital content data in a normal area except the bad area of the memory.
Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital content recording method using the reader, the flash memory COB of the smart card connected to the reader Marking a bad area of a memory used in a flash memory constituting a bad area at a defined position of a free area corresponding thereto, and extracting an encryption characteristic value from specific values recorded in the memory; And encrypting the original digital content data using the encryption characteristic value, and recording the digital content data in a normal area except the bad area of the memory.
Here, the specific value may be a serial number.
The digital content storage medium of the present invention for achieving the above object, in the digital content storage medium using the reader, the bad pattern extraction area in the flash memory constituting the flash memory COB of the smart card connected to the reader The area code, which is a code value, is recorded in the table selection code field of the card ID, and the digital copyright protection (DRM) encryption table constructed based on the bad pattern table by checking the area corresponding to the area code recorded in the table selection code field. Is preferably used as an encryption key to record digital content data.
In order to achieve the above object, a method of reading digital content using a reader of a smart card having a flash memory of the present invention, in the method of reading digital content by the reader, includes a flash memory COB in a smart card in the reader. Checks the area corresponding to the area code recorded in the table selection code field of the card ID in the flash memory constituting the flash memory COB and forms a bad pattern digital copyright protection (DRM) table based on the bad pattern table. Doing; Checking whether patterns having actual bad pattern address values in the bad pattern DRM table are actual bad patterns; And reading digital content data by using the bad pattern DRM table as a decryption key according to the inspection result.
Here, the process of checking whether the patterns having the actual bad pattern address values in the bad pattern DRM table are the actual bad patterns may include disabling the write protect pin and removing the actual bad pattern. It is desirable to write 0xAA55 and 0x55AA on the page to check if it is a real bad pattern.
A method of reading digital content using a smart card reader having a flash memory of the present invention for achieving the above object, in the method of reading digital content by the reader, the flash memory of the smart card connected to the reader Extracting physical characteristics of a flash memory constituting the COB; Generating a decryption key using physical characteristics of the extracted flash memory; And reading digital content data using the generated decryption key.
In order to achieve the above object, a method of reading digital content using a reader of a smart card having a flash memory of the present invention, in the method of reading digital content by the reader, includes a flash memory COB in a smart card in the reader. Reads the addresses of the bad area from the header data area, which is an area for recording the characteristics of the flash memory constituting the flash memory COB, and calculates the encryption characteristic value used for digital content data encryption by combining the addresses of the bad area. step; And restoring the original digital content data to the encryption characteristic value while sequentially reading the digital content data of the memory except the bad region, wherein the encryption characteristic value is different from each other. Calculated with a combination of singular values such as, full replication may not be physically possible unless the memory areas used for replication and the bad regions of the original memory all match.
In order to achieve the above object, a method of reading digital content using a reader of a smart card having a flash memory of the present invention, in the method of reading digital content by the reader, includes a flash memory COB in a smart card in the reader. Checking the flash memory constituting the flash memory COB to read the addresses of the bad areas, and combining the addresses of the bad areas to calculate an encryption characteristic value used for digital content data encryption; And restoring the original digital content data to the encryption characteristic value while sequentially reading data of the memory except the bad region, wherein the encryption characteristic value is the same as an address of a different bad region for each memory used. Computed by a combination of singular values, a complete copy is not physically possible unless the memory used for copying and the bad regions of the original memory all match.
In order to achieve the above object, a method of reading digital content using a reader of a smart card having a flash memory of the present invention, in the method of reading digital content by the reader, includes a flash memory COB in a smart card in the reader. Checking a flash memory constituting the flash memory COB, reading a specific value recorded in the memory, and calculating an encryption characteristic value used as the specific value when the access is performed; And restoring original digital content data to the encryption characteristic value while sequentially reading data of the memory except the bad area, wherein the encryption characteristic value is calculated by a combination of specific values recorded in the memory used. In this case, a complete copy is physically impossible unless the bad memory areas of the original memory and the memory used for copying coincide.
Here, when the flash memory COB is connected to the reader, whether the bad area is physically created or simply marked for duplication may be checked by writing / reading data to the bad area.
A computer-readable recording medium having recorded thereon a program for achieving the above object includes a flash memory device constituting a flash memory COB of a smart card connected to the reader in a digital rights protection (DRM) device having a processor. Checking a bad pattern for each unit area of the device and determining a bad pattern extraction area; A function of recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; And configuring a bad pattern DRM table based on the bad pattern table by inspecting an area corresponding to the area code recorded in the table selection code field.
A computer-readable recording medium having recorded thereon a program for achieving the above object includes a flash memory constituting a flash memory COB of a smart card connected to the reader in a digital rights protection (DRM) device having a processor. The ability to extract physical properties; And a function of generating an encryption key using physical characteristics of the extracted flash memory.
A computer-readable recording medium having recorded thereon a program for achieving the above object includes a unit area of a flash memory device constituting a flash memory COB of a smart card connected to the reader in a digital content recording device having a processor. Checking a bad pattern of each star and determining a bad pattern extraction region; A function of recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; Inspecting an area corresponding to an area code recorded in the table selection code field and constructing a bad pattern digital copyright protection (DRM) table based on the bad pattern table; And writing to the flash memory using the bad pattern DRM table as an encryption key.
A computer-readable recording medium having recorded thereon a program for achieving the above object includes a physical property of a flash memory constituting a flash memory COB of a smart card connected to the reader in a digital content recording device having a processor. The ability to extract; A function of generating an encryption key using physical characteristics of the extracted flash memory; And recording digital content data in the flash memory using the generated encryption key.
A computer-readable recording medium having recorded thereon a program for achieving the above object is inserted into a digital content reading device having a processor when a flash memory constituting a flash memory COB of a smart card connected to the reader is inserted. Checking an area corresponding to the area code recorded in the table selection code field of the card ID and constructing a bad pattern digital copyright protection (DRM) table based on the bad pattern table; Checking whether patterns having an actual bad pattern address in the bad pattern DRM table are actual bad patterns; And reading digital content data using the bad pattern DRM table as a decryption key according to the inspection result.
A computer-readable recording medium having recorded thereon a program for achieving the above object includes a physical characteristic of a flash memory constituting a flash memory COB of a smart card connected to the reader in a digital content reading device having a processor. Extracting function; Generating a decryption key using physical characteristics of the extracted flash memory; And reading digital content data using the generated decryption key.
According to the smart card having a flash memory according to the present invention and a digital content protection method using a smart card reader and a reader, a flash memory is embedded in an existing smart card to provide a storage space for digital information in addition to the smart card's original functions. Of course, the information that needs to be protected is encrypted and then stored using the unique authentication information of the smart card, so that the smart card function and the memory card function for information protection can be simultaneously implemented with one card.
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. Prior to this, terms or words used in the specification and claims should not be construed as having a conventional or dictionary meaning, and the inventors should properly explain the concept of terms in order to best explain their own invention. It should be interpreted as meanings and concepts corresponding to the technical idea of the present invention based on the principle of definition.
Therefore, the embodiments described in the specification and the drawings shown in the drawings are only the most preferred embodiment of the present invention and do not represent all of the technical idea of the present invention, various modifications that can be replaced at the time of the present application It should be understood that there may be equivalents and variations.
1 is an exemplary view of a conventional smart card, and has a smart card COB (Chip On Board) 2 inside the
2 illustrates a form in which the
More specifically, the
The
The
The
The security area is the area where data requiring security is stored, and the general area is the area of the opposite concept, and is a space where data can be freely recorded or read.
Here, when the
The digital copyright protection authentication of the ASIC of the
The physical property may be information about a bad pattern for each unit area of the flash memory. The bad pattern information may be one of bad block, bad page, or bad bit information.
On the other hand, the digital copyright protection authentication of the ASIC of the
The
Here, the terminal 30 may be a PC, a notebook, a mobile phone, a personal digital assistant (PDA), or the like.
3, the
3, the
That is, the
The
That is, the
More specifically, the
Here, each
The
Here, according to the above-described application program, the digital content data recording and reading operation of the
That is, when the
The operation of recording and reading information by the
First, when receiving from the user that information protection for digital content data is not required from the user, the application program connects the
That is, in this case, the
Secondly, when receiving from the user that information protection is required for the digital content data, the application program causes the
That is, the
Hereinafter, the flow of the read operation of the
The application program of the terminal 30, when the information protection request for the digital content data is requested from the user, accesses an external
More specifically, the application program of the terminal 30 is connected to the external
That is, the application program reads unique authentication information (for example, credit card serial number, personal information of the credit card owner, etc.) of the
The unique authentication information for determining whether the accident, in addition to the credit card serial number can be replaced with any unique authentication information distinguished from other cards, of course.
The
First, when it is determined that the
At this time, the
Here, of course, in the case of a smart card that has not received an accident as described above, the
When it is determined that the
That is, when the
Second, when it is determined that the
Here, of course, in the case of the
On the other hand, when the accident report is received
On the other hand, depending on the type of accident report (for example, lost, stolen, discarded, etc.) it is possible to completely delete the information or the Internet access address (for example, IP address) to which the
According to the configuration of the present invention as described above, the
In general, credit cards or transportation cards should not be easily loaned to anyone anytime, anywhere, and should be taken with caution to prevent theft, like regular cash, by carrying with you. That is, the stored information of the
Therefore, according to the present invention by blocking in real time the important data or expensive digital information that is not required to be viewed by anyone other than the person using the unique authentication information of the reported smart card COB (11), In addition to the protection of the data, there is an effect that can greatly reduce the risk of additional losses, accidents, and the like.
In addition, the
Meanwhile, the
In this case, when the
Here, the unique authentication information may correspond to at least one or more combinations of a card unique number, personal information, and a separate certificate.
In addition, the corresponding server (not shown) may be a financial institution such as a bank or other shopping site where electronic commerce is made using unique information on the other IC card.
In addition, the
On the other hand, the
Of course, in the present invention, the
In this case, the
The security area of the
At this time, the
Meanwhile, when the user requests information stored in the personal area, the terminal 30 may provide the information stored in the personal area (for example, music, movie, picture, file, or other data folder) to the terminal 30. This is to allow the user to freely use and manage the information on the PC.
On the other hand, the banking area on the
That is, by inputting the OTP information displayed on the display unit (not shown) of the
Meanwhile, the
When the
In addition, the
In the following description, in the present invention, the
The flash memory is a memory in which data can be continuously stored in the memory even in the absence of power, and data can be freely stored / deleted. Such flash memory is divided into NOR type and NAND type according to the internal method. NOR type has a structure in which cells are connected in parallel, and NAND type has a structure in which cells are connected in series. Have
Therefore, NAND flash memory is mainly used in SD cards or Memory Sticks among memory cards, and NOR flash memory is mainly used in MMC cards or Compact Flash memory.
As such, the flash memory has a small power consumption, and the stored information does not disappear even when the power is turned off. The non-volatile memory, which is continuously supplied with power, not only keeps the stored information unchanged even when the power is cut off, but also frees the input and output of the digital TV, digital camcorder, mobile phone, digital camera, It is widely used in personal digital assistants (PDAs), game machines, and MP3 players.
However, in recent years, digital content data such as illegally copied data, sound recordings, videos, and educational contents have not been paid due to the high speed of the Internet infrastructure, the performance improvement of the terminal, and the storage capacity. It is a situation that is exposed to users, shared with each other and illegally used. As a result, digital content soon became more and more free and free among consumers, which led to a shrinking market for copyrighted files, record media, video media and education media.
With the expansion of illegal use, the issue of copyright protection of digital contents is seriously raised, but for those who already have free usage and know how to prevent the spread and use of illegally copied digital contents, pay and use the right copyright value. It is a situation near force majeure.
According to the present invention, a bad pattern (bad block, bad page, bad bit, etc.), which is a physical characteristic of a memory device such as a flash memory (for example, a NAND flash memory) of the
Here, the physical characteristics of the flash memory may be the bad block, bad page, or bad bit, and in the present invention, an encryption table may be generated using the location and number of the bad page or bad bit as unique factors in addition to the bad block. Of course.
According to an embodiment of the present invention, for convenience of description, the NAND flash memory may be stored in a read-only storage medium instead of an open file system such as FAT (File Allocation Table) 16 or FAT32. A suitable specialized file system will be described as an example. However, it should be noted that the present invention is not limited thereto.
The structure of the following file system is also characterized by being encrypted by a bad pattern DRM table (DRM encryption table) when recording digital content data. That is, in the structure of the file system, all areas except the minimum area for identifying the bad pattern DRM table (DRM encryption table) are encrypted with the corresponding DRM to block general access.
In general, the
Hereinafter, a block having bad bits (that is, a bad block) by bad bit information will be described as an example.
However, it should be noted that the present invention is equally applicable to a page having bad bits (that is, bad page) by bad bit information. Therefore, the bad block DRM table may be used as the DRM encryption table for the bad block, and the bad page DRM table may be used as the DRM encryption table for the bad page. Such a bad block DRM table and a bad page DRM encryption table are collectively referred to as a 'bad pattern DRM table (DRM encryption table)'.
Referring to FIG. 5, the configuration of the zero block of the flash memory constituting the
In the Master Boot Recorder (MBR) of
Bad block marking information is recorded in
In particular, in the DRM Table Select Code field (Offset 2) of FIG. 6 of the Card ID (
At this time, the bad pattern extraction region of the flash memory may be a block of the entire flash memory, but may be a specific region only. In addition, the size of the DRM encryption table (bad block DRM table) using the extracted bad pattern may also be configured in various ways such as 128 bytes, 256 bytes, 512 bytes.
For convenience of description, in the present embodiment, the size of the DRM encryption table is 256 bytes, and the bad pattern extraction area for configuring the DRM encryption table is based on a specific area instead of the entire flash memory area. Will be explained. However, it should be noted that the present invention is not limited thereto.
In the above description, the term “specific area” means, for example, that the entire block of the flash memory can be divided and processed in units of 2048 blocks. That is, as shown in FIG. 7, the bad pattern extraction areas for the DRM encryption table (bad block DRM table) configuration are set in units of multiples of 2048 blocks in the entire block of flash memory, and among them, the area is set to a specific criterion. A suitable area is determined as a bad pattern extraction area for constructing a DRM encryption table (bad block DRM table).
Here, the specific criterion is a criterion for determining whether the area is suitable for forming a 256-byte DRM encryption table (bad block DRM table). For example, if there is an area including a bad block having a threshold value (eg, 128) or more, the area is determined as the bad pattern extraction area. However, if there is no area including more than 128 bad blocks, the area containing the largest number of bad blocks among the plurality of areas (areas set in units of 2048 blocks) is the DRM encryption table ( It is a bad pattern extraction area for the bad block DRM table) configuration.
The bad pattern extraction region is determined based on a bad block table generated while formatting a memory card during the production of the flash memory constituting the
8 is a flowchart illustrating an example of a method for configuring a bad block DRM table for digital copyright protection according to an embodiment of the present invention, which is recorded in the DRM table select code field of a card ID. The procedure of configuring a bad block DRM table (DRM encryption table) by inspecting an area corresponding to an area code is shown.
As described above, referring to the configuration procedure of the bad block DRM table (DRM encryption table), an area is set in a block multiple unit (for example, 2048 block multiple unit) in the entire block of flash memory, and the bad block table among these areas is selected. Based on this, a bad pattern extraction area corresponding to a specific criterion (eg, an area having a bad block more than a threshold value (eg, 128) or a lot of bad blocks) is determined, and a code of the corresponding area is determined. ) Value is recorded in the DRM table selection code field of the Card ID.
Thereafter, the bad pattern extraction area (ie, area corresponding to an area code) determined as described above is examined (401), and the bad block DRM table (DRM encryption table) is configured as shown in FIG. 9 or 11. You can do it (402-406). 9 is a 256-byte bad block DRM table (DRM encryption table) generated based on the bad block table of area 1 (
Specifically, if the area to be inspected (the area corresponding to the area code) has more than 128 sufficient bad blocks so that a 256-byte bad block DRM table (DRM encryption table) can be formed (402), 128 A 256-byte bad block DRM table (DRM) consisting of 128 real bad block addresses based on the bad block table of an area having more than 256 (256 byte) bad blocks (e.g., block 0 to block 2047, area 1). Encryption table) (refer to FIG. 9) (403).
FIG. 9 shows a 256-byte bad block DRM table (DRM encryption table) based on the bad block table of area 1 (
On the other hand, if the corresponding region (the region to be inspected (the region corresponding to the region code)) does not contain enough bad blocks to constitute a 256-byte bad block DRM table (DRM encryption table) (402), Padding is performed in an appropriate manner (404, 405) to create a 256-byte bad block DRM table (DRM encryption table) (see Fig. 11) (406). In this case, the bad block DRM table (DRM encryption table) is composed of 18 (36 bytes) actual bad block addresses and 110 (220 bytes) padding data.
Here, there may be various methods of padding, but in this embodiment, a bad block DRM table (DRM) is utilized by using a card serial number filed (16 bytes) of a card ID. Encryption table). For example, using a padding value generated by sequentially ORing an existing real bad block table value and a card serial number value to each other, the size of 256 bytes as shown in FIG. Configure the bad block DRM table (DRM encryption table).
That is, in the 'bad block table of
FIG. 10 is a bad block table created based on 128 bad blocks (for example, 18 (36 bytes) actual bad blocks) in area 2 (
In order to create a 256-byte bad block DRM table (DRM encryption table) based on the bad block table including 18 (36 byte) actual bad block addresses of FIG. 10, padding should be performed. If the card serial number is "0x01020304050607080900010203040506", the padding value obtained through the XOR operation of the card serial number sequentially in the bad block table values is '0x09'. , '0x10', '0x0B', '0x17', ...
Therefore, padding data (i.e., a bad block table value and a card serial number value are sequentially generated by performing an XOR operation on a bad block table (see FIG. 10) including 18 (36 bytes) actual bad block addresses. Attached) to form a 256-byte bad block DRM table (DRM encryption table) as shown in FIG.
The bad block DRM table (DRM encryption table) formed by the above method is a probability uniquely unique factor that is determined according to the physical characteristics (bad pattern) that the storage medium (ie, the flash memory) may have.
12 is a flowchart illustrating an example of a method of recording digital content data in the flash memory according to an embodiment of the present invention.
First, the flash memory (e.g., NAND flash memory) is low-formatted (801), and the bad block (page with bad bits) is checked by bit by 0xAA55 writing, and the bad block (block to which the bad bit belongs) is checked. Pages or blocks with bad bits are marked as bad pages or bad blocks (802). That is, a block having bad bits is marked as a bad block by bad bit information found at initialization, and a page having bad bits is marked as a bad page by bad bit information found at initialization.
Thereafter, the bad block is recorded in the bad block table (803). In this case, the bad block table may include an entire block of flash memory for each area divided by 2048 block multiples.
Next, after determining the area that satisfies a specific condition (reference) by referring to the recorded bad block table after low-formatting the flash memory, the area code value of the corresponding area is determined by the card ID. The data is recorded in the DRM Table Select Code field of (
Here, the specific condition (reference) is a criterion for determining whether or not it is an area suitable for forming a 256-byte DRM encryption table (bad block DRM table). For example, an area including a bad block having a threshold value (for example, 128 or more) or an area including the largest number of bad blocks may be determined as the bad pattern extraction area. At this time, the determination of the bad pattern extraction area first checks whether there is an area including a bad block having a threshold value (for example, 128 or more), and if the area does not exist, a plurality of areas (areas set in units of 2048 block multiples). By determining the area including the largest number of bad blocks as the bad pattern extraction area, the area decision can be prioritized.
The area code value of the corresponding area determined as the bad pattern extraction area is recorded in the DRM Table Select Code field of the Card ID shown in FIG. 6 (804).
Thereafter, if the area to be inspected (the area corresponding to the area code) has more than 128 sufficient bad blocks (805), 128 (256) to form a 256-byte bad block DRM table (DRM encryption table). A bad block DRM table (DRM encryption table) (see FIG. 9) of 256 bytes composed of 128 real bad block addresses is created based on the bad block table of the area having the bad blocks of bytes) (806). For example, since there are 128 (256 bytes) or more real bad blocks in the area 1 (
On the other hand, if the region (the region to be inspected (the region corresponding to the region code)) does not contain enough bad blocks to constitute a 256-byte bad block DRM table (DRM encryption table), padding (805). 2) A 256-byte bad block DRM table (DRM encryption table) (see Fig. 11) is created (807). That is, a 256-byte bad block DRM as shown in FIG. 11 using a padding value generated by sequentially performing an XOR operation on a real bad block table value and a card serial number value. Configure a table (DRM encryption table).
For example, in the 'bad block table of
Thereafter, after deleting the bad block table that has been extracted and written to the zero block while row formating the flash memory (808), the digital content data is recorded in the flash memory using the created bad block DRM table (DRM encryption table) as an encryption key. (809).
Of course, the flash memory described above in the present invention may mean the
FIG. 13 is a flowchart illustrating an example of an authentication process for performing digital content reading according to an embodiment of the present invention, and showing a procedure of reading digital content.
In other words, according to the present invention, by reading the digital content data in the
First, when the
Accordingly, an area corresponding to the DRM table select code of the card ID is examined (903) to configure a bad block DRM table (DRM decryption table) (904).
For example, if the area corresponding to the area code recorded in the DRM table selection code has more than 128 sufficient bad blocks, 128 actual (based on the bad block table of the area having 128 (256 bytes) or more bad blocks are provided. Real) A 256-byte bad block DRM table (DRM decryption table) composed of a bad block address is configured.
However, if the area corresponding to the area code recorded in the DRM table selection code does not contain enough bad blocks to constitute a 256-byte bad block DRM table (DRM decryption table), then a padding operation is performed. A bad block DRM table (DRM decryption table) of bytes (see FIG. 11) is constructed. That is, a 256-byte bad block DRM as shown in FIG. 11 using a padding value generated by sequentially performing an exclusive OR operation on a real bad block table value and a card serial number value. A table (DRM decryption table) is constructed.
Thereafter, in the bad block DRM table (DRM decoding table) configured as described above, it is checked whether blocks corresponding to actual bad block table values, not padding values, are real bad blocks (905). For example, the actual bad block in the bad block DRM table (DRM decoding table) of FIG. 11 composed of a 36-byte real bad block address and 220 bytes of padding data (0x09, 0x10, 0x0B, 0x17, ...). Check that the blocks with block address values are real bad blocks.
Looking at the process of checking whether it is a real bad block, for example, randomly selecting about 10 bad blocks from a real bad block table and checking whether it is a real bad block (906). In this case, the write protect pin is disabled and the 0xAA55 and 0x55AA are written to the corresponding page of the real bad block to determine whether it is an actual bad block (907).
As a result of the
If all the real bad block checks performed in this manner also pass (that is, if the digital content data use authentication passes), the use of digital content data (Play or Read) is permitted (908).
Therefore, if the digital content data use authentication passes, the digital content data is transmitted to the user while decrypting the digital content data by using the generated bad block DRM table (DRM decryption table) (909).
However, if the digital content data use authentication fails, the user is notified of the authentication failure and a request for confirmation of the corresponding flash memory (910).
In the above, the number of real bad blocks to be inspected in the process of confirming whether they are real bad blocks or digital content encryption using a generated bad block DRM table (DRM encryption / decryption table) In decryption, there may be various conditions for applying encryption and decryption to the entire digital content or only applying specific encryption and decryption to a specific area. However, in the present embodiment, the end of the real bad block table is different. An example of application based on a value corresponding to the last lower 4 bits of the bad block address will be described.
For example, if the badblock table is the same as that of FIG. 10 (that is, the badblock table of FIG. 10 is a badblock table having 18 (36 bytes) of real badblock addresses), the last badblock address is '0xFE'. Since the lower 4 bits value is '0x0E (= decimal 14)', the conditions are determined based on 'decimal 14'.
That is, the real bad block check examines bad blocks corresponding to multiples of 14. If there are not more than five bad blocks to be examined, the first bad block is additionally included in the sequential inspection target to maintain at least five total bad blocks.
Similarly, when described based on the above conditions, encryption of digital content data is also performed on blocks whose block addresses correspond to multiples of fourteen. Decoding also proceeds with the same criteria and conditions.
The method using the
Referring to the application example, as described above, a bad pattern DRM table (DRM encryption table) is first generated using the bad pattern. After generating a seed key through a hash function that uses the bad baton DRM table (DRM encryption table) as a conversion factor, the public key (Public Key (RSA, ECC, etc.)) is generated. Key and Private Key can also be created and applied to PKI solutions that are used in many existing fields. This is because the bad pattern of each digital content storage medium (flash memory) is a causal factor for the generation of a private key, and the contents of the private key do not need to be recorded in any logical way. It can be said that the security of the asymmetric encryption system using an example is further enhanced.
That is, the server may download digital content data encrypted with the public key from the client, and decrypt the digital content data using the private key extracted from the digital content data.
As described above, if the physical characteristics (bad block, bad page, bad bit, etc.) of the flash memory in which the respective digital content data are recorded are used as an encryption key, each of the digital content data storage media (flash memory) is different from each other. It has a block DRM table (DRM encryption table). This can overcome the weakness that the existing DRM using a logical algorithm or encryption table loses its value as a DRM as a specific algorithm or encryption table is released.
For example, digitally copying the flash memory devices (eg, NAND flash memory) constituting the flash memory COB in any way for the purpose of illegal copying, or storing the same digital content as the original through a physical dump method such as memory dumping. Even if the medium is copied, the copied digital content storage medium is not valid. Because, even if the physical content of the same digital content storage medium is duplicated, the bad patterns (bad blocks, bad pages, bad bits, etc.), which are physical characteristics of the memory elements (for example, NAND flash memory) constituting the storage medium, are duplicated. Because it is not.
That is, even if a bad block or bad page marking is copied to a spare area of a flash memory block, it cannot be physically a bad block or bad page, and thus a duplicated digital content storage medium (up to a bad pattern). (Not duplicated) may be determined to be an invalid storage medium because the authentication failed in the process of checking the real bad block of the digital content data authentication process during use (read or play).
This is a double-sided medium where the existing media such as CDs and DVDs are endlessly exposed to illegal copying by general users, and a medium of profit for digital content owners, and at the same time, their digital content data is an unlimited copy through these media. On the contrary, the present invention can sufficiently protect the copyright holder's digital content for the above reasons.
Meanwhile, another example of a method of preventing illegal copying by copying a whole flash memory may be an encryption / decryption method using different bad areas (blocks, pages, subpages, locations) for each flash memory.
For example, an area for recording addresses of bad areas (blocks, pages, subpages, and locations) of a used memory may be set in a header data area, which is an area for recording characteristics of the flash memory, not a data storage space. And extracts the encryption characteristic value (for example, the encryption characteristic value based on the bad block DRM table (DRM encryption table)) by combining the addresses of the bad area, and encrypts the original digital content data with the encryption characteristic value to the bad area of the memory. Record digital content data in the normal region except for.
Thereafter, when the
As another example, the
Then, when the
As another example, the
Then, when the
In the above, in order to copy the memory card of which the intellectual property is guaranteed, the bad area of the memory is read, and the normal area of the memory card to be copied is identically marked as the bad area, thereby creating the same encryption characteristic value to prevent duplication. In order to check whether the
14 is a diagram illustrating an example of an apparatus for constructing a bad pattern DRM table for digital copyright protection according to an embodiment of the present invention, which may be included in the
The bad
The actual bad
The bad pattern
The bad pattern DRM
The bad pattern DRM
For example, if the area corresponding to the area code has enough bad blocks of 128 or more, 128 or more (256 bytes) bad blocks can be configured to form a 256-byte bad block DRM table (DRM encryption table). Based on the bad block table of the region (for example, block 0 to block 2047 region 1), a 256-byte bad block DRM table (DRM encryption table) composed of 128 real bad block addresses is shown. Write.
In addition, if the area corresponding to the area code does not include enough bad blocks to form a 256-byte bad block DRM table (DRM encryption table), a padding operation is performed to perform a 256-byte bad block DRM table. (DRM Encryption Table) [See FIG. 11] is created. For example, the bad block DRM table (DRM encryption table) of FIG. 11 is composed of 18 (36 bytes) actual bad block addresses and 110 (220 bytes) padding data. In this case, as an example of a padding method, a padding value generated by sequentially performing an exclusive OR operation on a real bad block table value and a card serial number value may be used. As shown in FIG. 11, a 256-byte bad block DRM table (DRM encryption table) may be configured.
15 is a block diagram showing an example of a digital content recording apparatus according to an embodiment of the present invention, which may be included in the
The bad pattern inspection and marking
The pad pattern
For example, the area is set by dividing the entire block of flash memory by 2048 block units, and the area suitable for a specific condition (reference) is composed of a bad block (/ bad page) DRM table (DRM encryption table). After determining as the bad pattern extraction area for, the area code value of the determined area is recorded in the DRM table selection code field of the card ID. In this case, the specific condition (reference) is a criterion for determining whether or not the area is suitable for forming a bad block (/ bad page) DRM table (DRM encryption table). For example, an area including a bad block (/ bad page) having a threshold value (e.g., 128 or more) or an area containing the largest number of bad blocks (/ bad page) may be a bad pattern. It can be determined as the extraction area. At this time, the determination of the bad pattern extraction area first checks whether there is an area including a bad block (/ bad page) having a threshold value (for example, 128 or more), and if the area does not exist, a plurality of areas (2048 blocks). An area including the largest number of bad blocks (/ bad page) among areas set in units of multiples is determined as a bad pattern extraction area. Thus, the area code value of the corresponding area determined as the bad pattern extraction area is recorded in the DRM Table Select Code field of the Card ID shown in FIG. 6.
The bad pattern DRM
The content
FIG. 16 is a diagram illustrating an example of a device for reading (viewing, playing, etc.) digital content according to an embodiment of the present invention, which may be included in the
When the
The bad pattern DRM
In the
Here, to check whether it is a real bad block (/ bad page), for example, randomly select about 10 bad blocks (/ bad page) from the real bad block (/ bad page) table. To check if it is a real bad block (/ bad page).
At this time, disable the WP (Write Protect) pin and write 0xAA55 and 0x55AA to the corresponding page of the real bad block (/ bad page) to write the actual bad block (/ bad page). Check if it is. At this time, if it is confirmed that the actual bad block (/ bad page), in the same way by additionally checking the appropriate number of real bad blocks (/ bad page), and additionally, Disable the WP (Write Protect) pin for the selected bad block (/ bad page) and write 0xAA55 and 0x55AA to the corresponding page of the real bad block (/ bad page). Check if it is an actual bad block (/ bad page).
The content decryption and
FIG. 17 is a diagram illustrating an example of a key generation device of an asymmetric encryption system to which the present invention is applied, which may be included in the
The bad
The bad pattern DRM
In the
Here, to check whether it is a real bad block (/ bad page), for example, randomly select about 10 bad blocks (/ bad page) from the real bad block (/ bad page) table. To check if it is a real bad block (/ bad page).
At this time, disable the WP (Write Protect) pin and write 0xAA55 and 0x55AA to the corresponding page of the real bad block (/ bad page) to write the actual bad block (/ bad page). Check if it is. At this time, if it is confirmed that the actual bad block (/ bad page), in the same way by additionally checking the appropriate number of real bad blocks (/ bad page), and additionally, Disable the WP (Write Protect) pin for the selected bad block (/ bad page) and write 0xAA55 and 0x55AA to the corresponding page of the real bad block (/ bad page). Check if it is an actual bad block (/ bad page).
The seed
The asymmetric encryption
The public key may be used to encrypt digital content data, and the private key may be used to decrypt digital content data.
14 to 17 as described above are included in the
As described above, the method of the present invention may be implemented as a program and stored in a recording medium (CD-ROM, RAM, ROM, floppy disk, hard disk, magneto-optical disk, etc.) in a computer-readable form. Since this process can be easily implemented by those skilled in the art will not be described in more detail.
As described above, although the present invention has been described by way of limited embodiments and drawings, the present invention is not limited thereto and is described by the person of ordinary skill in the art to which the present invention pertains. Various modifications and variations are possible without departing from the scope of the appended claims.
1 is an exemplary view showing a conventional smart card,
2 is an exemplary diagram of a smart card having a flash memory according to an embodiment of the present invention;
3 is a block diagram of a reader for the smart card of FIG. 2 having a flash memory;
4 is a configuration diagram of a communication network connection for inquiry of an accident related to the smart card of FIG. 2;
5 is an exemplary configuration diagram of a flash memory used in the present invention;
6 is an explanatory diagram showing an example of the card ID of FIG. 5;
FIG. 7 is an explanatory diagram showing an example of a bad pattern extraction area when all blocks of a flash memory are divided into 2048 blocks according to an embodiment of the present invention; FIG.
8 is a flowchart illustrating an example of a method for configuring a bad block DRM table for digital copyright protection according to an embodiment of the present invention;
9 is an explanatory diagram showing an example of a 256-byte bad block DRM table generated from a bad block table of
FIG. 10 is an explanatory diagram showing an example of a bad block table of
FIG. 11 is an explanatory diagram showing another example of a 256-byte bad block DRM table generated by attaching padding data to a bad block table of
12 is a flowchart illustrating an example of a digital content recording method according to an embodiment of the present invention;
13 is a flowchart illustrating an example of an authentication process for playing digital content according to an embodiment of the present invention;
14 is a block diagram illustrating an example of an apparatus for constructing a bad pattern DRM table for digital copyright protection according to an embodiment of the present invention;
15 is a block diagram showing an example of a digital content recording apparatus according to an embodiment of the present invention;
16 is a block diagram showing an example of a digital content reproduction apparatus according to an embodiment of the present invention;
17 is a block diagram showing an example of a key generation device of an asymmetric encryption system to which the present invention is applied.
<Explanation of symbols for the main parts of the drawings>
10: smart card 11: smart card COB
12: flash memory COB 20: reader
21: Smart card contact 21: Flash memory contact
23 ...
40.Smart Card Server
101: bad pattern detection unit 102: actual bad pattern inspection unit
103: bad pattern table creation unit 104: bad pattern DRM table operation unit
105: bad pattern DRM table generation unit 111: bad pattern inspection and marking unit
112: bad pattern area selection unit 113: media information recording unit
114: bad pattern DRM table generation unit 115: content encryption recording unit
121: Media information collecting unit 122: Bad pattern DRM table generation unit
123: media authentication unit 124: content decryption and playback unit
131: bad pattern detection unit 132: bad pattern DRM table generation unit
133: media authentication unit 134: seed key generation unit
135: asymmetric encryption key generation unit 136: public key sharing unit
137: private key utilization unit
Claims (66)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/KR2008/006722 WO2009064131A2 (en) | 2007-11-15 | 2008-11-14 | Smart card with flash memory and memory reader of smart card and drm method using the reader |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070056231 | 2007-06-08 | ||
KR20070056231 | 2007-06-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20080107970A true KR20080107970A (en) | 2008-12-11 |
Family
ID=40368097
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020070116795A KR20080107970A (en) | 2007-06-08 | 2007-11-15 | Smart card with flash memory and memory reader of smart card and drm method using that reader |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20080107970A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101227187B1 (en) * | 2010-08-16 | 2013-01-28 | 소프트캠프(주) | Output control system and method for the data in the secure zone |
KR101325963B1 (en) * | 2011-11-22 | 2013-11-15 | 유한회사 대구특수금속 | Method for manufacturing nameplate of vehicle having embossed figuration by resin molding |
-
2007
- 2007-11-15 KR KR1020070116795A patent/KR20080107970A/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101227187B1 (en) * | 2010-08-16 | 2013-01-28 | 소프트캠프(주) | Output control system and method for the data in the secure zone |
KR101325963B1 (en) * | 2011-11-22 | 2013-11-15 | 유한회사 대구특수금속 | Method for manufacturing nameplate of vehicle having embossed figuration by resin molding |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10769252B2 (en) | Method and apparatus for watermarking of digital content, method for extracting information | |
CN100419663C (en) | Data security | |
JP4690600B2 (en) | Data protection method | |
JP3748155B2 (en) | File management system with falsification prevention / detection function | |
US8761403B2 (en) | Method and system of secured data storage and recovery | |
TWI244584B (en) | Data processing system, data processing method, and program providing medium | |
CN101578608B (en) | Methods and apparatuses for accessing content based on a session ticket | |
US20090052672A1 (en) | System and method for protection of content stored in a storage device | |
KR101468258B1 (en) | Portable data storage device for protecting illegal replica | |
CN101595488A (en) | Be used for content is tied to the method and apparatus of independent storage arrangement | |
JP2001094554A (en) | Information transmission system, information transmission device, information reception device, and information transmitting method | |
KR20090072717A (en) | New data storage usb disc, computer interface usb device and method by flash memory's bad patten | |
JP2001067324A (en) | Information transmitting system, information transmitter and information receiver | |
JP2001083874A (en) | Information provision system, information regulator, information signal receiver and information provision method | |
KR20090058758A (en) | Smart card with flash memory and display, card reader of smart card, drm method using that | |
KR102154897B1 (en) | Method for supervising digital contents using block chain and fingerprinting, device and computer readable medium for performing the method | |
KR20080107970A (en) | Smart card with flash memory and memory reader of smart card and drm method using that reader | |
WO2009064131A2 (en) | Smart card with flash memory and memory reader of smart card and drm method using the reader | |
JP2000163882A (en) | Digital literary production recording medium, recording device accessing same recording medium, and reproducing device and deleting device | |
KR20100048705A (en) | Usb hub device for providing datasecurity and method for providing datasecurity using the same | |
WO2004081706A2 (en) | Method and apparatus for controlling the provision of digital content | |
CN103098064A (en) | Method and apparatus for authenticating a non-volatile memory device | |
CN101617318A (en) | Be used for method and apparatus that content and licence are linked | |
JP4765262B2 (en) | Electronic data storage device, program | |
KR20090037022A (en) | Smart card with flash memory and memory reader of smart card and drm method using that |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |