KR20080107970A - Smart card with flash memory and memory reader of smart card and drm method using that reader - Google Patents

Smart card with flash memory and memory reader of smart card and drm method using that reader Download PDF

Info

Publication number
KR20080107970A
KR20080107970A KR1020070116795A KR20070116795A KR20080107970A KR 20080107970 A KR20080107970 A KR 20080107970A KR 1020070116795 A KR1020070116795 A KR 1020070116795A KR 20070116795 A KR20070116795 A KR 20070116795A KR 20080107970 A KR20080107970 A KR 20080107970A
Authority
KR
South Korea
Prior art keywords
flash memory
bad
reader
smart card
area
Prior art date
Application number
KR1020070116795A
Other languages
Korean (ko)
Inventor
서원형
장준원
조영선
Original Assignee
슬림디스크 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 슬림디스크 주식회사 filed Critical 슬림디스크 주식회사
Priority to PCT/KR2008/006722 priority Critical patent/WO2009064131A2/en
Publication of KR20080107970A publication Critical patent/KR20080107970A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0679Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0013Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
    • G06K7/0021Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers for reading/sensing record carriers having surface contacts
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C7/00Arrangements for writing information into, or reading information out from, a digital store
    • G11C7/10Input/output [I/O] data interface arrangements, e.g. I/O data control circuits, I/O data buffers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A smart card with a flash memory, a reader of the smart card, and a method for protecting digital contents by using the reader are provided to perform a credit card function as well as a multimedia function which can store digital information at the same time. A method for DRM(Digital Right Management) by using a reader of a smart card which includes a flash memory comprises the steps of: examining a bad pattern by unit region of flash memory which configures a flash memory COB of a smart card connected to a reader and determining a bad pattern extraction region; recording a region code, which is a code value of the determined bad pattern extraction region, to a table selection code field of a card ID; and configuring a bad pattern DRM table based on a bad pattern table by examining a region corresponding to the region code recorded at a table selection code field.

Description

Smart card with flash memory and memory reader of smart card and DRM method using that reader}

 The present invention relates to a smart card having a flash memory and a digital content protection method using a reader and a reader of the smart card, and more particularly, digital information to a smart card having a flash memory and a flash memory embedded in the smart card. A method of protecting digital content information using a reader capable of recording or reading recorded information and an application program operating on a terminal that performs a function of recording or reading information by performing mutual information exchange with the reader according to a user's operation. DRM (Digital Right Management).

That is, the present invention provides a flash memory in a conventionally used smart card, so that the skatcard can perform not only a single credit card but also a digital storage medium. Of course, the present invention relates to a method of protecting digital information stored in a flash memory by using unique information of the smart card.

In general, a smart card is equipped with information on authentication, credit card information, payment account information, etc., so that it can be used for traffic cards, credit cards, and the like. In addition, smart card can be used for banking operations such as account inquiry, bank transfer, deposit withdrawal.

On the other hand, portable devices such as MP3 (MPEG Audio Layer-3), PMP (Portable Multimedia Player), digital cameras, etc. are increasingly diversified and expanded in function, and storage capacity is also gradually increased to allow a variety of contents to be stored. For example, when performing a video recording function using a digital camera requires a larger storage space than when shooting still images.

Embedding a large amount of storage space for all these additional features into any portable device not only increases the price of the device, but also requires users to purchase the device at an extra cost. There is a problem.

To solve this problem, manufacturers who manufacture portable devices such as MP3, PMP, digital cameras, etc., fix the memory built into the device to a certain size and install a separate memory card to expand the memory capacity according to the user's requirements. I am doing it forever.

However, as portable devices are diversified and various types of memory cards are applied to each device, users with various portable devices can also individually select various types of memory cards (eg, SD, SMC, MMC, memory stick, USB removable disk, etc.). There is inconvenience to be equipped with.

In addition, when such a memory card is lost or stolen, all the information contained in the memory card is exposed by the person who acquired the memory card, so that important personal information or information requiring confidentiality can be easily disclosed. Of course, there is a problem in that the acquired person can use the content without paying for the purchased content.

In addition, since no personal identification information is recorded in the memory card unless a separate recording is performed, there is a problem that the person who acquired the memory card cannot easily return it even if he / she wants to return it to the lost person.

The present invention was created in order to solve the above problems, and provides a storage space for digital information in addition to the smart card's original function by embedding a flash memory in an existing smart card, and provides unique authentication information of the smart card for information that requires protection. Smart card and smart card reader and reader equipped with flash memory that encrypt and store using (for example, a card serial number) and simultaneously implement the function of a smart card and a memory card for information protection with one card. The purpose of the present invention is to provide a method for protecting digital content.

Smart card with a flash memory of the present invention for achieving the above object, smart card COB having a plurality of input and output terminals; And a flash memory COB having a plurality of input / output terminals.

Here, each terminal provided in the smart card COB and the flash memory COB may be a terminal connected to a reader for writing or reading in the smart card COB or the flash memory COB.

The smart card COB and the flash memory COB may be electrically separated from each other, or may be electrically connected to each other.

In addition, the flash memory COB may be divided into a security area and a general area.

In this case, when the reader or the reader writes or reads the secure area of the flash memory COB of the smart card, the reader may perform recording or reading through digital rights protection (DRM) authentication by the ASIC of the reader.

The digital copyright protection authentication of the ASIC of the reader may be performed based on the physical characteristics of the flash memory constituting the flash memory COB of the smart card.

The physical property may be information about a bad pattern for each unit area of the flash memory.

The bad pattern information may be any one of bad block, bad page or bad bit information.

The digital copyright protection authentication of the ASIC of the reader may be performed based on the physical characteristics of the flash memory of the flash memory COB and the unique authentication information stored in the smart card COB.

On the other hand, the smart card reader having a flash memory of the present invention for achieving the above object, the exchange of information through the connection terminal which is wired or wirelessly connected to each terminal of the smart card COB and flash memory COB Can be written or read into the flash memory COB.

Here, the reader is connected to an external terminal by wire or wireless, and writes the digital content data stored in the terminal to the flash memory COB or reads the digital content data recorded in the flash memory COB and transmits the data to the terminal. Can perform a read operation.

When the reader receives the information protection request for the digital content data, the reader controls the recording and reading of the digital content data to be performed differently from the case where there is no information protection request. Can be operated in conjunction with

When the information protection request for the digital content data is requested, the terminal application program accesses an external smart card server to inquire whether the smart card has been received, and is not a smart card. If the protection requested digital content data is transmitted to the reader, wherein the reader is a bad card of the flash memory constituting the flash memory COB when it is determined that the smart card is not received by the application program on the terminal side. The encryption table may be generated using a pattern, and the digital content data may be encrypted using the encryption table and recorded in the flash memory COB to perform digital rights protection (DRM).

The reader may be wired to the smart card server through the terminal or wirelessly connected to the smart card server using a wireless port provided separately.

On the other hand, the application program on the terminal side, when the information protection request for the digital content data is requested, by connecting to the external smart card server, using the unique authentication information in the smart card COB read through the reader You can query the presence of the accident.

Here, when it is determined that the reader is a smart card that is not received by the application program on the terminal side, the reader receives a read permission command for the digital content data from the application program on the terminal side, and transmits the read permission command to the flash memory COB. After generating a decryption table for encrypted and stored digital content data, the decrypted digital content data may be decrypted using the decryption table to be transmitted to the terminal.

In addition, when it is determined that the reader is a smart card accidentally received by the application program on the terminal side, the reader receives a read disallow command regarding the digital content data from the application program on the terminal side, and transmits to the flash memory COB. It is preferable not to perform an operation of decrypting the encrypted and stored digital content data.

The reader further includes an additional connection terminal connected to another IC card, and when connected to the smart card COB or a corresponding server using unique authentication information on the other IC card, the smart card COB or the other IC card. The unique authentication information of the award may be transmitted to the corresponding server so that electronic commerce is performed on the corresponding server.

The reader may be wired to the corresponding server through the terminal or wirelessly connected to the corresponding server using a wireless port provided separately.

The reader may allow the electronic commerce to be performed in the corresponding server by using one or both selected from an authorized certificate stored in a flash memory COB of the smart card and unique authentication information on the other IC card.

The reader may allow the electronic commerce to be performed in the corresponding server by using one or both selected from an authorized certificate stored in a flash memory COB of the smart card and unique authentication information on the smart card COB.

The security area of the flash memory COB is divided into a banking area for banking purposes and a personal area for data storage, and the reader receives the banking area information from the terminal. If the access information on the bank is blocked, the input authentication information input from the terminal and the contents of the unique authentication information stored in the smart card COB coincide with each other.

Meanwhile, the banking area includes an OTP generation area capable of generating an One Time Password (OTP), and when the reader receives a request for the OTP generation from the terminal, the OTP generated from the OTP generation area. It may further include a display unit for displaying information.

The reader may be connected to the terminal and simultaneously transmit data stored in the personal area to a memory in the terminal.

In addition, when the reader is connected to an external smart card server, the reader receives the electronic bank account corresponding to the unique authentication information in the smart card COB from the smart card server and transmits the electronic bank statement to the banking area of the flash memory COB. The electronic bank account history may be stored in a banking area.

The reader may receive update information about the smart card from the smart card server and transmit the updated information to the banking area in the flash memory COB while updating the information of the banking area. Can be.

On the other hand, the digital copyright protection method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital copyright protection (DRM) method using the reader, smart connected to the reader Checking a bad pattern for each unit area of a flash memory constituting a flash memory COB of the card, and determining a bad pattern extraction area; Recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; And examining an area corresponding to the area code recorded in the table selection code field, and constructing a bad pattern DRM table based on the bad pattern table.

Here, the bad pattern table may be generated when a memory format of the flash memory is formatted, and an address value of a bad pattern for each unit area, which is a physical property of a memory device, may be recorded.

In addition, the bad pattern DRM table may be configured of only the bad pattern table.

The bad pattern DRM table may be configured by using a card serial number field of a card ID, and may be configured by padding values generated by sequentially ORing the values of the bad pattern table and the card serial number value sequentially. .

The bad pattern may be any one of a bad block, a bad page, and bad bit information.

The bad pattern extraction region may be an entire block of a memory, an area including a bad pattern having a predetermined threshold value or more, or an area including the largest number of bad patterns.

The unit area may be an area set in 2048 block multiples.

In addition, the predetermined threshold may be the number of 128 bad blocks.

In addition, the size of the bad pattern DRM table may be 256 bytes.

The flash memory may be a NAND flash memory.

Digital copyright protection method using a reader of a smart card having a flash memory of the present invention for achieving the above object, in the digital copyright protection (DRM) method using the reader, the smart card connected to the reader Extracting physical characteristics of the flash memory constituting the flash memory COB; And generating an encryption key using the extracted physical characteristics of the flash memory.

Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the recording method of digital content using the reader, the flash memory of the smart card connected to the reader Inspecting a bad pattern for each unit region of a flash memory device constituting a COB, and determining a bad pattern extraction region; Recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; Inspecting an area corresponding to an area code recorded in the table selection code field and constructing a bad pattern digital copyright protection (DRM) table based on the bad pattern table; And recording the digital content data in the flash memory using the bad pattern DRM table as an encryption key.

Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital content recording method using the reader, the flash memory COB of the smart card connected to the reader Extracting physical characteristics of a flash memory constituting the memory; Generating an encryption key using physical characteristics of the extracted flash memory; And recording the digital content data in the flash memory using the generated encryption key.

Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital content recording method using the reader, is connected to the reader, not the data storage space Setting and recording an area for recording addresses of bad areas of a used memory in a header data area, which is an area for recording characteristics of a flash memory constituting a flash memory COB of a smart card; And extracting an encryption characteristic value by combining addresses of the bad region, and then encrypting the original digital content data with the encryption characteristic value and recording the digital content data in the normal region except the bad region of the memory.

Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital content recording method using the reader, the flash memory COB of the smart card connected to the reader Marking a bad area of a memory used in a flash memory constituting a bad area at a defined position of a free area corresponding thereto, and extracting an encryption characteristic value by combining addresses of the bad area; And encrypting the original digital content data using the encryption characteristic value, and recording the digital content data in a normal area except the bad area of the memory.

Digital content recording method using a smart card reader having a flash memory of the present invention for achieving the above object, in the digital content recording method using the reader, the flash memory COB of the smart card connected to the reader Marking a bad area of a memory used in a flash memory constituting a bad area at a defined position of a free area corresponding thereto, and extracting an encryption characteristic value from specific values recorded in the memory; And encrypting the original digital content data using the encryption characteristic value, and recording the digital content data in a normal area except the bad area of the memory.

Here, the specific value may be a serial number.

The digital content storage medium of the present invention for achieving the above object, in the digital content storage medium using the reader, the bad pattern extraction area in the flash memory constituting the flash memory COB of the smart card connected to the reader The area code, which is a code value, is recorded in the table selection code field of the card ID, and the digital copyright protection (DRM) encryption table constructed based on the bad pattern table by checking the area corresponding to the area code recorded in the table selection code field. Is preferably used as an encryption key to record digital content data.

In order to achieve the above object, a method of reading digital content using a reader of a smart card having a flash memory of the present invention, in the method of reading digital content by the reader, includes a flash memory COB in a smart card in the reader. Checks the area corresponding to the area code recorded in the table selection code field of the card ID in the flash memory constituting the flash memory COB and forms a bad pattern digital copyright protection (DRM) table based on the bad pattern table. Doing; Checking whether patterns having actual bad pattern address values in the bad pattern DRM table are actual bad patterns; And reading digital content data by using the bad pattern DRM table as a decryption key according to the inspection result.

Here, the process of checking whether the patterns having the actual bad pattern address values in the bad pattern DRM table are the actual bad patterns may include disabling the write protect pin and removing the actual bad pattern. It is desirable to write 0xAA55 and 0x55AA on the page to check if it is a real bad pattern.

A method of reading digital content using a smart card reader having a flash memory of the present invention for achieving the above object, in the method of reading digital content by the reader, the flash memory of the smart card connected to the reader Extracting physical characteristics of a flash memory constituting the COB; Generating a decryption key using physical characteristics of the extracted flash memory; And reading digital content data using the generated decryption key.

In order to achieve the above object, a method of reading digital content using a reader of a smart card having a flash memory of the present invention, in the method of reading digital content by the reader, includes a flash memory COB in a smart card in the reader. Reads the addresses of the bad area from the header data area, which is an area for recording the characteristics of the flash memory constituting the flash memory COB, and calculates the encryption characteristic value used for digital content data encryption by combining the addresses of the bad area. step; And restoring the original digital content data to the encryption characteristic value while sequentially reading the digital content data of the memory except the bad region, wherein the encryption characteristic value is different from each other. Calculated with a combination of singular values such as, full replication may not be physically possible unless the memory areas used for replication and the bad regions of the original memory all match.

In order to achieve the above object, a method of reading digital content using a reader of a smart card having a flash memory of the present invention, in the method of reading digital content by the reader, includes a flash memory COB in a smart card in the reader. Checking the flash memory constituting the flash memory COB to read the addresses of the bad areas, and combining the addresses of the bad areas to calculate an encryption characteristic value used for digital content data encryption; And restoring the original digital content data to the encryption characteristic value while sequentially reading data of the memory except the bad region, wherein the encryption characteristic value is the same as an address of a different bad region for each memory used. Computed by a combination of singular values, a complete copy is not physically possible unless the memory used for copying and the bad regions of the original memory all match.

In order to achieve the above object, a method of reading digital content using a reader of a smart card having a flash memory of the present invention, in the method of reading digital content by the reader, includes a flash memory COB in a smart card in the reader. Checking a flash memory constituting the flash memory COB, reading a specific value recorded in the memory, and calculating an encryption characteristic value used as the specific value when the access is performed; And restoring original digital content data to the encryption characteristic value while sequentially reading data of the memory except the bad area, wherein the encryption characteristic value is calculated by a combination of specific values recorded in the memory used. In this case, a complete copy is physically impossible unless the bad memory areas of the original memory and the memory used for copying coincide.

Here, when the flash memory COB is connected to the reader, whether the bad area is physically created or simply marked for duplication may be checked by writing / reading data to the bad area.

A computer-readable recording medium having recorded thereon a program for achieving the above object includes a flash memory device constituting a flash memory COB of a smart card connected to the reader in a digital rights protection (DRM) device having a processor. Checking a bad pattern for each unit area of the device and determining a bad pattern extraction area; A function of recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; And configuring a bad pattern DRM table based on the bad pattern table by inspecting an area corresponding to the area code recorded in the table selection code field.

A computer-readable recording medium having recorded thereon a program for achieving the above object includes a flash memory constituting a flash memory COB of a smart card connected to the reader in a digital rights protection (DRM) device having a processor. The ability to extract physical properties; And a function of generating an encryption key using physical characteristics of the extracted flash memory.

A computer-readable recording medium having recorded thereon a program for achieving the above object includes a unit area of a flash memory device constituting a flash memory COB of a smart card connected to the reader in a digital content recording device having a processor. Checking a bad pattern of each star and determining a bad pattern extraction region; A function of recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; Inspecting an area corresponding to an area code recorded in the table selection code field and constructing a bad pattern digital copyright protection (DRM) table based on the bad pattern table; And writing to the flash memory using the bad pattern DRM table as an encryption key.

A computer-readable recording medium having recorded thereon a program for achieving the above object includes a physical property of a flash memory constituting a flash memory COB of a smart card connected to the reader in a digital content recording device having a processor. The ability to extract; A function of generating an encryption key using physical characteristics of the extracted flash memory; And recording digital content data in the flash memory using the generated encryption key.

A computer-readable recording medium having recorded thereon a program for achieving the above object is inserted into a digital content reading device having a processor when a flash memory constituting a flash memory COB of a smart card connected to the reader is inserted. Checking an area corresponding to the area code recorded in the table selection code field of the card ID and constructing a bad pattern digital copyright protection (DRM) table based on the bad pattern table; Checking whether patterns having an actual bad pattern address in the bad pattern DRM table are actual bad patterns; And reading digital content data using the bad pattern DRM table as a decryption key according to the inspection result.

A computer-readable recording medium having recorded thereon a program for achieving the above object includes a physical characteristic of a flash memory constituting a flash memory COB of a smart card connected to the reader in a digital content reading device having a processor. Extracting function; Generating a decryption key using physical characteristics of the extracted flash memory; And reading digital content data using the generated decryption key.

According to the smart card having a flash memory according to the present invention and a digital content protection method using a smart card reader and a reader, a flash memory is embedded in an existing smart card to provide a storage space for digital information in addition to the smart card's original functions. Of course, the information that needs to be protected is encrypted and then stored using the unique authentication information of the smart card, so that the smart card function and the memory card function for information protection can be simultaneously implemented with one card.

Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. Prior to this, terms or words used in the specification and claims should not be construed as having a conventional or dictionary meaning, and the inventors should properly explain the concept of terms in order to best explain their own invention. It should be interpreted as meanings and concepts corresponding to the technical idea of the present invention based on the principle of definition.

Therefore, the embodiments described in the specification and the drawings shown in the drawings are only the most preferred embodiment of the present invention and do not represent all of the technical idea of the present invention, various modifications that can be replaced at the time of the present application It should be understood that there may be equivalents and variations.

1 is an exemplary view of a conventional smart card, and has a smart card COB (Chip On Board) 2 inside the smart card 1 as shown.

2 illustrates a form in which the flash memory COB 20 is further mounted in a space other than the mounting area of the smart card COB 2 in the conventional smart card 1 as shown in FIG. 1.

More specifically, the smart card 10 having the flash memory of FIG. 2 as in the present invention includes a smart card COB (or IC card COB) 11 and digital content data which perform functions as a credit card or a transportation card. And all flash memory COBs 12 for data storage.

The flash memory COB 12 may be provided separately from the smart card COB 11 or may be electrically connected to the flash memory COB 12.

The smart card COB 11 and the flash memory COB 12 each have a plurality of input / output terminals, each of which has a dedicated reader 20 of FIG. 3 for writing or reading in the digital content data. Means the terminal connected with.

The flash memory COB 12 may be divided into a security area and a general area.

The security area is the area where data requiring security is stored, and the general area is the area of the opposite concept, and is a space where data can be freely recorded or read.

Here, when the reader 20 writes or reads the secure area of the flash memory COB 12 of the smart card 10, digital rights protection (DRM) by the ASIC of the reader 20 is performed. It is preferable that recording or reading is performed through authentication.

The digital copyright protection authentication of the ASIC of the reader 20 may be performed based on the physical characteristics of the flash memory constituting the flash memory COB 12 of the smart card 10.

The physical property may be information about a bad pattern for each unit area of the flash memory. The bad pattern information may be one of bad block, bad page, or bad bit information.

On the other hand, the digital copyright protection authentication of the ASIC of the reader 20, the physical characteristics of the flash memory of the flash memory COB 12 and the unique authentication information stored in the smart card COB 11 (for example, credit card) Serial number, personal information of the credit card holder, etc.), in which case there is an advantage that the security authentication can be performed more strictly and reliably than the case based on the physical characteristics.

The smart card 10 having a flash memory according to the present invention as described above can be used in the same way as a conventional smart card when used for a credit card or a transportation card. In the case of recording information (digital content data or the like) or reading recorded information (digital content data or the like), it is possible to connect or insert the reader 20 to the dedicated reader 20 to be connected to the terminal 30.

Here, the terminal 30 may be a PC, a notebook, a mobile phone, a personal digital assistant (PDA), or the like.

3, the dedicated reader 20 exchanges information through connection terminals 21 and 22 connected to each terminal of the smart card COB 11 and the flash memory COB 12 by wire or wirelessly. The reader 20 is a portion for performing a write or read in the flash memory COB as described above.

3, the connection terminals 21 and 22 are connected to the smart card COB 11 and the smart card contact 21 and the flash memory COB 12 and the flash memory contact 22 connected to the wired and wireless. Of course, it can be divided into).

That is, the reader 20 has a socket including a plurality of connection terminals 21 and 22 that can be connected to the smart card COB 11 and the flash memory COB 12 simultaneously, thereby providing the smart card COB 11 and the flash. The COB information of each of the memory COBs 12 can be manufactured in a form that can be exchanged.

The reader 20 may be connected or connected to the terminal 30 as shown in FIG. 3 while the smart card 10 is connected or inserted.

That is, the reader 20 may be connected to the external terminal 30 by wire or wireless. At this time, a recording operation or the flash memory for recording the digital content data stored in the terminal 30 to the flash memory COB 12. The read operation of reading digital content data recorded in the COB 12 and transmitting the same to the terminal 30 may be performed.

More specifically, the reader 20 is a recording operation for encrypting and storing the digital content data stored in the terminal 30 to the flash memory COB 12 side, or digitally encrypted and stored in the flash memory COB 12. Both read operations that decode content data and provide the terminal 30 to the terminal 30 can be performed.

Here, each connection terminal 21, 22, 23 of the reader 20 as a connection means for connecting to the terminal 30 is composed of one means selected from SC, MMC, USB, Micro SD, S-flash Of course it can be.

The reader 20 is connected to the application program on the terminal 30 side through the connection end means as described above can be operated.

Here, according to the above-described application program, the digital content data recording and reading operation of the flash memory COB 12 using the reader 20 is performed differently depending on whether the information protection request of the digital content data requested by the user is performed. The reader 20 can be controlled to be.

That is, when the reader 20 receives an information protection request for the digital content data from the terminal 30, the reader 20 performs the recording and reading operation of the digital content data differently from the case where there is no information protection request. It is operated in connection with the application program of the terminal 30 to control to.

The operation of recording and reading information by the reader 20 may be divided into two flows according to whether the corresponding digital content data is information that needs protection.

First, when receiving from the user that information protection for digital content data is not required from the user, the application program connects the reader 20 and the flash memory COB 12 with the terminal 30 to the flash memory COB 12. It can be used like a general mass storage device.

That is, in this case, the reader 20 freely writes the contents of the corresponding digital content data to the flash memory COB 12 through an application program or a general-purpose search program (ex: Windows Explorer) included in the present invention or flash memory COB. We can read from (12) freely.

Secondly, when receiving from the user that information protection is required for the digital content data, the application program causes the reader 20 to be recorded in the following manner under the control of the application program.

That is, the reader 20 generates an encryption table having unique positions and numbers of bad patterns (bad blocks, bad pages, bad bits, etc.), which are physical characteristics of the flash memory constituting the flash memory COB 12. In the case of information that needs to be protected, the encryption table can be used to encrypt and decrypt the encrypted information.

Hereinafter, the flow of the read operation of the reader 20 according to the second case will be described in more detail with reference to FIGS. 3 to 4.

The application program of the terminal 30, when the information protection request for the digital content data is requested from the user, accesses an external smart card server 40 and then determines whether or not the smart card 10 receives an accident. Inquire.

More specifically, the application program of the terminal 30 is connected to the external smart card server 40, by using the unique authentication information in the smart card COB (11) read through the reader 20 By querying whether the accident is received or not, the reading of the digital content data of the flash memory COB 12 may be performed differently according to whether or not the accident is received.

That is, the application program reads unique authentication information (for example, credit card serial number, personal information of the credit card owner, etc.) of the smart card 10 from the smart card COB 11 through the reader 20. In addition, wired and wireless connection is made to the smart card server 40 (for example, a credit card company server) that can determine whether an accident of the smart card 10 using the read unique authentication information.

The unique authentication information for determining whether the accident, in addition to the credit card serial number can be replaced with any unique authentication information distinguished from other cards, of course.

The reader 20 may be wired to the smart card server 40 by being connected to the Internet through the terminal 30, but using the wireless port 24 provided in the reader 20 separately. It is also possible to wirelessly connect to the smart card server 40 without passing through the terminal 30.

First, when it is determined that the smart card 10 has not received the accident as a result of comparing the unique authentication information, the digital content data so that the protection-requested digital content data can be stored to the flash memory COB 12 side. To the reader 20.

At this time, the reader 20 generates an encryption table using bad patterns (bad blocks, bad pages, bad bits, etc.) of the flash memory constituting the flash memory COB 12, and uses the encryption table. The digital content data requested for protection is encrypted and recorded in the flash memory COB 12 to perform digital copyright protection (DRM) on the digital content data.

Here, of course, in the case of a smart card that has not received an accident as described above, the reader 20 may perform the following read operation in addition to the write operation.

When it is determined that the smart card 10 has not been received, the reader 20 receives a read permission command for the digital content data from an application program on the terminal 30 side, and the flash memory COB 12. After generating a decryption table for the digital content data encrypted and stored in the data store, the decrypted digital content data may be decrypted using the decryption table to be transmitted to the terminal 30 and provided.

That is, when the reader 20 reads the protected (encrypted) digital content data on the flash memory COB 12, the wired / wireless connection to the smart card server 40 is performed in the same principle as when recording the information to be protected. Check whether the accident was received through the unique authentication information of the smart card COB (11), in the case of the smart card (10) that has not received the accident received a read permission command for the corresponding digital content data to generate a decryption table The encrypted information is decrypted and transmitted to the terminal 30.

Second, when it is determined that the smart card 10 is accidentally received by the application program as a result of the comparison of the unique authentication information, the reader 20 reads the digital content data from the application program on the terminal 30 side. Receives a read disallow command and does not perform any decryption (reading operation) of digital content data encrypted and stored in the flash memory COB 12, thereby restricting the digital content data from being used by the terminal 30. do.

Here, of course, in the case of the smart card 10 accidentally received as a result of the comparison of the unique authentication information as described above, the operation of recording (storing) the desired digital content data in the flash memory COB 12 in the accidentally received smart card 10 It can also be disabled.

On the other hand, when the accident report is received smart card 10, the encrypted and stored information can not be read, the configuration of the present invention is the accident situation is terminated due to the situation such as learning after the loss of the smart card 10 If the accident is returned to the smart card 10 is not received, the information is of course implemented to be re-read.

On the other hand, depending on the type of accident report (for example, lost, stolen, discarded, etc.) it is possible to completely delete the information or the Internet access address (for example, IP address) to which the flash memory COB 12 is connected. The smart card server 40 may be configured to immediately report automatically.

According to the configuration of the present invention as described above, the smart card 10 can be added to the general storage disk function by having a dedicated reader 20 as well as the use of the credit card or transportation card, only the person It may also be expected to serve as a secure disk capable of recording or viewing the information.

In general, credit cards or transportation cards should not be easily loaned to anyone anytime, anywhere, and should be taken with caution to prevent theft, like regular cash, by carrying with you. That is, the stored information of the flash memory COB 12 included in the smart card 10 (credit card, transportation card, etc.) is of course maintained by the user's primary security, if lost or stolen occurs It is common to immediately report to the smart card server 40 (card company) to prevent damage.

Therefore, according to the present invention by blocking in real time the important data or expensive digital information that is not required to be viewed by anyone other than the person using the unique authentication information of the reported smart card COB (11), In addition to the protection of the data, there is an effect that can greatly reduce the risk of additional losses, accidents, and the like.

In addition, the flash memory COB 12 and the smart card COB 11 included in the smart card 10 may be configured such that no electronic or magnetic connection is made to each other unless a dedicated reader 20 is used. It is advantageous in that it does not affect any situation such as inquiry / payment transaction using an existing IC card reader, and thus is free from compatibility problems with a credit card or a transportation card service terminal which may exist in the commercialization stage of the present invention. It can be said good.

Meanwhile, the reader 20 is wired or wirelessly connected to another IC card (not shown) in addition to the connection terminals 21 and 22 that are wired or wirelessly connected to the smart card COB 11 and the flash memory COB 12. Additional connection terminal 23 may be further provided.

In this case, when the reader 20 to which the other IC card is connected in a wired or wireless manner is connected to a corresponding server (not shown) using unique authentication information on the other IC card through a connection with the terminal 30, the other IC By transmitting the unique authentication information on the card to the corresponding server (not shown), the electronic commerce such as Internet banking, electronic payment, account transfer, account inquiry, deposit withdrawal can be made in the server (not shown). .

Here, the unique authentication information may correspond to at least one or more combinations of a card unique number, personal information, and a separate certificate.

In addition, the corresponding server (not shown) may be a financial institution such as a bank or other shopping site where electronic commerce is made using unique information on the other IC card.

In addition, the reader 20 may be configured to wirelessly connect to the corresponding server (not shown) through the terminal 30 through a wired connection to the corresponding server (not shown) or to use a separate wireless port 24. Can be.

On the other hand, the reader 20, the electronic device in the corresponding server (not shown) by using one or both selected from the public certificate stored in the flash memory COB 12 and the unique authentication information on the other IC card. Commerce can be made, if all are used as described above can reduce the error or risk of electronic commerce can improve the reliability of the use.

Of course, in the present invention, the reader 20 is connected to the terminal 30 in a state connected with the smart card 10, the server for performing an e-commerce using the unique authentication information on the smart card COB (11) Even when connected to the above, the above-mentioned electronic commerce can be made by transmitting the unique authentication information on the smart card COB 11 to the corresponding server.

In this case, the reader 20 uses the selected one or both of the public certificate stored in the flash memory COB 12 and the unique authentication information of the smart card COB 11 to the corresponding server (not shown). In the above E-commerce can be made.

The security area of the flash memory COB 12 may be divided into a banking area for banking purposes and a personal area for data storage.

At this time, the reader 20, the user of the terminal 30, when the information stored in the banking area (information required for bank management, such as certificates, OTP generation information, electronic bank account, etc.) is blocked, the user's access is blocked Can be protected by blocking the provision of information in the banking area. Here, when checking the user's access to separate confirmation (input authentication information input from the terminal 30 and the contents of the unique authentication information stored in the smart card COB 11, the same as the user authentication, etc.) In this case, when the authentication is completed, the information may be configured to release the blocking of information access of the banking area so that the information may be provided.

Meanwhile, when the user requests information stored in the personal area, the terminal 30 may provide the information stored in the personal area (for example, music, movie, picture, file, or other data folder) to the terminal 30. This is to allow the user to freely use and manage the information on the PC.

On the other hand, the banking area on the flash memory COB 12 may include an OTP generation area capable of receiving one time password (OTP) from a satellite, wherein the reader 20 has a terminal 30 side. When receiving a request for generating the OTP from the, may further include a display unit (not shown) for receiving and displaying the OTP information generated in the OTP generation area.

That is, by inputting the OTP information displayed on the display unit (not shown) of the reader 20 to the terminal 30 side, it is possible to safely enable electronic commerce such as Internet banking, account inquiry, electronic payment, deposit withdrawal, and the like. have.

Meanwhile, the reader 20 may be configured to be connected to the terminal 30 and transmit information of the personal area to a memory in the terminal 30, even when the smart card 10 is lost later. The information previously transmitted and stored in the computer 30 can be used, which is very useful. Of course, such a configuration may include, for example, a configuration in which a pop-up window is automatically displayed and notified so that information of the personal area is transmitted to a memory in the terminal 30 simultaneously with the connection of the reader 20.

When the reader 20 is connected to the terminal 30 and connected to the smart card server 40, the reader 20 may correspond to the unique authentication information in the smart card COB 11 from the smart card server 40. Receiving a bank account history and automatically sent to the banking area of the flash memory COB 12, so that the electronic bank account history is stored in the banking area, it is possible to replace the function of a general paper bank account.

In addition, the reader 20 receives the update information on the smart card from the smart card server 40 while being connected to the terminal 30 and communicating with the external smart card server 40, thereby providing the flash memory COB 12. By transmitting to the banking area in the) it is possible to automatically update the information of the banking area. Here, the update information may be update information regarding a certificate, personal information, an electronic bankbook, and the like.

In the following description, in the present invention, the reader 20 has a unique factor for determining the physical characteristics of the flash memory constituting the flash memory COB 12, specifically, the number and location of bad blocks corresponding to the physical characteristics. An embodiment of generating an encryption table hereinafter will be described with reference to FIGS. 5 to 17.

The flash memory is a memory in which data can be continuously stored in the memory even in the absence of power, and data can be freely stored / deleted. Such flash memory is divided into NOR type and NAND type according to the internal method. NOR type has a structure in which cells are connected in parallel, and NAND type has a structure in which cells are connected in series. Have

Therefore, NAND flash memory is mainly used in SD cards or Memory Sticks among memory cards, and NOR flash memory is mainly used in MMC cards or Compact Flash memory.

As such, the flash memory has a small power consumption, and the stored information does not disappear even when the power is turned off. The non-volatile memory, which is continuously supplied with power, not only keeps the stored information unchanged even when the power is cut off, but also frees the input and output of the digital TV, digital camcorder, mobile phone, digital camera, It is widely used in personal digital assistants (PDAs), game machines, and MP3 players.

However, in recent years, digital content data such as illegally copied data, sound recordings, videos, and educational contents have not been paid due to the high speed of the Internet infrastructure, the performance improvement of the terminal, and the storage capacity. It is a situation that is exposed to users, shared with each other and illegally used. As a result, digital content soon became more and more free and free among consumers, which led to a shrinking market for copyrighted files, record media, video media and education media.

With the expansion of illegal use, the issue of copyright protection of digital contents is seriously raised, but for those who already have free usage and know how to prevent the spread and use of illegally copied digital contents, pay and use the right copyright value. It is a situation near force majeure.

According to the present invention, a bad pattern (bad block, bad page, bad bit, etc.), which is a physical characteristic of a memory device such as a flash memory (for example, a NAND flash memory) of the flash memory COB 12 included in the smart card, is used. As the encryption key is used, the above-described copyright issue can be solved by allowing the copyright of the digital content stored in the flash memory to be protected.

Here, the physical characteristics of the flash memory may be the bad block, bad page, or bad bit, and in the present invention, an encryption table may be generated using the location and number of the bad page or bad bit as unique factors in addition to the bad block. Of course.

According to an embodiment of the present invention, for convenience of description, the NAND flash memory may be stored in a read-only storage medium instead of an open file system such as FAT (File Allocation Table) 16 or FAT32. A suitable specialized file system will be described as an example. However, it should be noted that the present invention is not limited thereto.

The structure of the following file system is also characterized by being encrypted by a bad pattern DRM table (DRM encryption table) when recording digital content data. That is, in the structure of the file system, all areas except the minimum area for identifying the bad pattern DRM table (DRM encryption table) are encrypted with the corresponding DRM to block general access.

In general, the physical block 0 of the flash memory (hereinafter referred to as 'zero block') guarantees that the manufacturer is not a bad block. Therefore, in the zero block, format related information of a flash memory, a media ID (card ID), and the like are stored.

Hereinafter, a block having bad bits (that is, a bad block) by bad bit information will be described as an example.

However, it should be noted that the present invention is equally applicable to a page having bad bits (that is, bad page) by bad bit information. Therefore, the bad block DRM table may be used as the DRM encryption table for the bad block, and the bad page DRM table may be used as the DRM encryption table for the bad page. Such a bad block DRM table and a bad page DRM encryption table are collectively referred to as a 'bad pattern DRM table (DRM encryption table)'.

Referring to FIG. 5, the configuration of the zero block of the flash memory constituting the flash memory COB 12 is as follows.

In the Master Boot Recorder (MBR) of page number 0 of the zero block, information related to the configuration of the flash memory and the file system is recorded.

Bad block marking information is recorded in page numbers 1 to 5 of the zero block, and a card ID corresponding to a media ID is stored in page number 9 of the zero block. As shown in Fig. 6, the Card ID is used to specify specific information of the flash memory (for example, a card version, a DRM table selection code, a region code, a manufacturer code, a copyright holder ID (Writer ID), And card serial number information).

In particular, in the DRM Table Select Code field (Offset 2) of FIG. 6 of the Card ID (page number 9 of the zero block), a bad pattern (bad block, bad page), which is a physical characteristic of the flash memory, is included. In implementing DRM (Digital Right Management) utilizing bad bits, etc., an area in which bad patterns (bad blocks, bad pages, bad bits, etc.) to be used as a DRM encryption table (bad block DRM table) exist ( Area Code information of an area having a bad block above a threshold value or an area including the largest number of bad blocks is recorded.

At this time, the bad pattern extraction region of the flash memory may be a block of the entire flash memory, but may be a specific region only. In addition, the size of the DRM encryption table (bad block DRM table) using the extracted bad pattern may also be configured in various ways such as 128 bytes, 256 bytes, 512 bytes.

For convenience of description, in the present embodiment, the size of the DRM encryption table is 256 bytes, and the bad pattern extraction area for configuring the DRM encryption table is based on a specific area instead of the entire flash memory area. Will be explained. However, it should be noted that the present invention is not limited thereto.

In the above description, the term “specific area” means, for example, that the entire block of the flash memory can be divided and processed in units of 2048 blocks. That is, as shown in FIG. 7, the bad pattern extraction areas for the DRM encryption table (bad block DRM table) configuration are set in units of multiples of 2048 blocks in the entire block of flash memory, and among them, the area is set to a specific criterion. A suitable area is determined as a bad pattern extraction area for constructing a DRM encryption table (bad block DRM table).

Here, the specific criterion is a criterion for determining whether the area is suitable for forming a 256-byte DRM encryption table (bad block DRM table). For example, if there is an area including a bad block having a threshold value (eg, 128) or more, the area is determined as the bad pattern extraction area. However, if there is no area including more than 128 bad blocks, the area containing the largest number of bad blocks among the plurality of areas (areas set in units of 2048 blocks) is the DRM encryption table ( It is a bad pattern extraction area for the bad block DRM table) configuration.

The bad pattern extraction region is determined based on a bad block table generated while formatting a memory card during the production of the flash memory constituting the flash memory COB 12. The area code value of the area is recorded in the DRM Table Select Code field of the Card ID shown in FIG.

8 is a flowchart illustrating an example of a method for configuring a bad block DRM table for digital copyright protection according to an embodiment of the present invention, which is recorded in the DRM table select code field of a card ID. The procedure of configuring a bad block DRM table (DRM encryption table) by inspecting an area corresponding to an area code is shown.

As described above, referring to the configuration procedure of the bad block DRM table (DRM encryption table), an area is set in a block multiple unit (for example, 2048 block multiple unit) in the entire block of flash memory, and the bad block table among these areas is selected. Based on this, a bad pattern extraction area corresponding to a specific criterion (eg, an area having a bad block more than a threshold value (eg, 128) or a lot of bad blocks) is determined, and a code of the corresponding area is determined. ) Value is recorded in the DRM table selection code field of the Card ID.

Thereafter, the bad pattern extraction area (ie, area corresponding to an area code) determined as described above is examined (401), and the bad block DRM table (DRM encryption table) is configured as shown in FIG. 9 or 11. You can do it (402-406). 9 is a 256-byte bad block DRM table (DRM encryption table) generated based on the bad block table of area 1 (blocks 0 to 2047) having more than 128 bad blocks, and FIG. It is a 256-byte bad block DRM table (DRM encryption table) generated by attaching padding data to the bad block table (see Fig. 10) of the area 2 (blocks 2048 to 4095) having the following bad blocks.

Specifically, if the area to be inspected (the area corresponding to the area code) has more than 128 sufficient bad blocks so that a 256-byte bad block DRM table (DRM encryption table) can be formed (402), 128 A 256-byte bad block DRM table (DRM) consisting of 128 real bad block addresses based on the bad block table of an area having more than 256 (256 byte) bad blocks (e.g., block 0 to block 2047, area 1). Encryption table) (refer to FIG. 9) (403).

FIG. 9 shows a 256-byte bad block DRM table (DRM encryption table) based on the bad block table of area 1 (blocks 0 to 2047) having more than 128 bad blocks. In other words, there are 128 (256 bytes) or more real bad blocks in the area 1, and a 656-byte bad block DRM table (DRM encryption table) is formed using only the bad block address. In this case, padding as shown in FIG. 11 is not required.

On the other hand, if the corresponding region (the region to be inspected (the region corresponding to the region code)) does not contain enough bad blocks to constitute a 256-byte bad block DRM table (DRM encryption table) (402), Padding is performed in an appropriate manner (404, 405) to create a 256-byte bad block DRM table (DRM encryption table) (see Fig. 11) (406). In this case, the bad block DRM table (DRM encryption table) is composed of 18 (36 bytes) actual bad block addresses and 110 (220 bytes) padding data.

Here, there may be various methods of padding, but in this embodiment, a bad block DRM table (DRM) is utilized by using a card serial number filed (16 bytes) of a card ID. Encryption table). For example, using a padding value generated by sequentially ORing an existing real bad block table value and a card serial number value to each other, the size of 256 bytes as shown in FIG. Configure the bad block DRM table (DRM encryption table).

That is, in the 'bad block table of area 2 having 128 or less bad blocks' in FIG. 10, an exclusive OR operation is performed on the real bad block table value and the card serial number value sequentially to have 128 or less bad blocks. Padding data (i.e., bad block table values and card serials) in the bad block table (i.e. in FIG. 10 is a bad block table with 18 (36 bytes) actual bad block addresses) in area 2 (blocks 2048 to 4095). A 256-byte bad block DRM table (DRM encryption table) (see FIG. 11) is generated with the number value sequentially generated by exclusive OR. In this case, the bad block DRM table (DRM encryption table) consists of an actual bad block address of 36 bytes and padding data (0x09, 0x10, 0x0B, 0x17, ...) of 220 bytes.

FIG. 10 is a bad block table created based on 128 bad blocks (for example, 18 (36 bytes) actual bad blocks) in area 2 (blocks 2048 to 4095). That is, when only 18 (36 bytes) bad blocks exist in the area 2 from 0x0812 to 0x0CFE, the bad block table is illustrated.

In order to create a 256-byte bad block DRM table (DRM encryption table) based on the bad block table including 18 (36 byte) actual bad block addresses of FIG. 10, padding should be performed. If the card serial number is "0x01020304050607080900010203040506", the padding value obtained through the XOR operation of the card serial number sequentially in the bad block table values is '0x09'. , '0x10', '0x0B', '0x17', ...

Therefore, padding data (i.e., a bad block table value and a card serial number value are sequentially generated by performing an XOR operation on a bad block table (see FIG. 10) including 18 (36 bytes) actual bad block addresses. Attached) to form a 256-byte bad block DRM table (DRM encryption table) as shown in FIG.

The bad block DRM table (DRM encryption table) formed by the above method is a probability uniquely unique factor that is determined according to the physical characteristics (bad pattern) that the storage medium (ie, the flash memory) may have.

12 is a flowchart illustrating an example of a method of recording digital content data in the flash memory according to an embodiment of the present invention.

First, the flash memory (e.g., NAND flash memory) is low-formatted (801), and the bad block (page with bad bits) is checked by bit by 0xAA55 writing, and the bad block (block to which the bad bit belongs) is checked. Pages or blocks with bad bits are marked as bad pages or bad blocks (802). That is, a block having bad bits is marked as a bad block by bad bit information found at initialization, and a page having bad bits is marked as a bad page by bad bit information found at initialization.

Thereafter, the bad block is recorded in the bad block table (803). In this case, the bad block table may include an entire block of flash memory for each area divided by 2048 block multiples.

Next, after determining the area that satisfies a specific condition (reference) by referring to the recorded bad block table after low-formatting the flash memory, the area code value of the corresponding area is determined by the card ID. The data is recorded in the DRM Table Select Code field of (Page Number 9 of Zero Block) (804). For example, an area is set by dividing an entire block of flash memory into 2048 block units, and a bad pattern extraction for configuring a DRM encryption table (bad block DRM table) is performed. After determining the area, the area code value of the determined area is recorded in the DRM table selection code field of the card ID.

Here, the specific condition (reference) is a criterion for determining whether or not it is an area suitable for forming a 256-byte DRM encryption table (bad block DRM table). For example, an area including a bad block having a threshold value (for example, 128 or more) or an area including the largest number of bad blocks may be determined as the bad pattern extraction area. At this time, the determination of the bad pattern extraction area first checks whether there is an area including a bad block having a threshold value (for example, 128 or more), and if the area does not exist, a plurality of areas (areas set in units of 2048 block multiples). By determining the area including the largest number of bad blocks as the bad pattern extraction area, the area decision can be prioritized.

The area code value of the corresponding area determined as the bad pattern extraction area is recorded in the DRM Table Select Code field of the Card ID shown in FIG. 6 (804).

Thereafter, if the area to be inspected (the area corresponding to the area code) has more than 128 sufficient bad blocks (805), 128 (256) to form a 256-byte bad block DRM table (DRM encryption table). A bad block DRM table (DRM encryption table) (see FIG. 9) of 256 bytes composed of 128 real bad block addresses is created based on the bad block table of the area having the bad blocks of bytes) (806). For example, since there are 128 (256 bytes) or more real bad blocks in the area 1 (blocks 0 to 2047), the 656-byte bad block DRM table (DRM) can be used only by the address of the real bad block. Encryption table).

On the other hand, if the region (the region to be inspected (the region corresponding to the region code)) does not contain enough bad blocks to constitute a 256-byte bad block DRM table (DRM encryption table), padding (805). 2) A 256-byte bad block DRM table (DRM encryption table) (see Fig. 11) is created (807). That is, a 256-byte bad block DRM as shown in FIG. 11 using a padding value generated by sequentially performing an XOR operation on a real bad block table value and a card serial number value. Configure a table (DRM encryption table).

For example, in the 'bad block table of area 2 having 128 or less bad blocks' in FIG. 10, an exclusive logical OR operation of the real bad block table value and the card serial number value are sequentially performed to calculate the area 2 (block 2048 to block). Padding data (i.e., a bad block table value and a card serial number value (e.g., a bad block table having 18 (36 bytes) of real bad block addresses in FIG. 10). By creating a 256-byte bad block DRM table (DRM encryption table) (see FIG. 11) appended with '0x01020304050607080900010203040506'). ) Configures a bad block DRM table (DRM encryption table) consisting of a bad block address and 220 bytes of padding data (0x09, 0x10, 0x0B, 0x17, ...).

Thereafter, after deleting the bad block table that has been extracted and written to the zero block while row formating the flash memory (808), the digital content data is recorded in the flash memory using the created bad block DRM table (DRM encryption table) as an encryption key. (809).

Of course, the flash memory described above in the present invention may mean the flash memory COB 12 itself shown in FIG.

FIG. 13 is a flowchart illustrating an example of an authentication process for performing digital content reading according to an embodiment of the present invention, and showing a procedure of reading digital content.

In other words, according to the present invention, by reading the digital content data in the flash memory COB 12 with the reader 20, it is possible to use (view, reproduce, etc.) the data.

First, when the flash memory COB 12 of the smart card 10 is inserted or connected to the reader 20 (901), the reader 20 reads the card ID (page number 9 of the zero block) information. The authentication process begins (902). At this time, in the DRM table select code field of the card ID, an area in which bad patterns (bad blocks, bad pages, bad bits, etc.) to be used as a DRM decoding table (bad block DRM table) exist. Area Code information is recorded (area having a bad block or above the threshold value or the area containing the largest number of bad blocks) so that the card ID information can be determined when reading digital content data. do.

Accordingly, an area corresponding to the DRM table select code of the card ID is examined (903) to configure a bad block DRM table (DRM decryption table) (904).

For example, if the area corresponding to the area code recorded in the DRM table selection code has more than 128 sufficient bad blocks, 128 actual (based on the bad block table of the area having 128 (256 bytes) or more bad blocks are provided. Real) A 256-byte bad block DRM table (DRM decryption table) composed of a bad block address is configured.

However, if the area corresponding to the area code recorded in the DRM table selection code does not contain enough bad blocks to constitute a 256-byte bad block DRM table (DRM decryption table), then a padding operation is performed. A bad block DRM table (DRM decryption table) of bytes (see FIG. 11) is constructed. That is, a 256-byte bad block DRM as shown in FIG. 11 using a padding value generated by sequentially performing an exclusive OR operation on a real bad block table value and a card serial number value. A table (DRM decryption table) is constructed.

Thereafter, in the bad block DRM table (DRM decoding table) configured as described above, it is checked whether blocks corresponding to actual bad block table values, not padding values, are real bad blocks (905). For example, the actual bad block in the bad block DRM table (DRM decoding table) of FIG. 11 composed of a 36-byte real bad block address and 220 bytes of padding data (0x09, 0x10, 0x0B, 0x17, ...). Check that the blocks with block address values are real bad blocks.

Looking at the process of checking whether it is a real bad block, for example, randomly selecting about 10 bad blocks from a real bad block table and checking whether it is a real bad block (906). In this case, the write protect pin is disabled and the 0xAA55 and 0x55AA are written to the corresponding page of the real bad block to determine whether it is an actual bad block (907).

As a result of the check 907, if it is confirmed that the actual bad block, an additional number of real bad blocks are additionally checked (for example, about 10) in the same manner (906). Similarly, for the additionally selected badblock, disable the write protect pin and write 0xAA55 and 0x55AA to the corresponding page of the real badblock to determine if it is a real badblock. Confirmation process (907).

If all the real bad block checks performed in this manner also pass (that is, if the digital content data use authentication passes), the use of digital content data (Play or Read) is permitted (908).

Therefore, if the digital content data use authentication passes, the digital content data is transmitted to the user while decrypting the digital content data by using the generated bad block DRM table (DRM decryption table) (909).

However, if the digital content data use authentication fails, the user is notified of the authentication failure and a request for confirmation of the corresponding flash memory (910).

In the above, the number of real bad blocks to be inspected in the process of confirming whether they are real bad blocks or digital content encryption using a generated bad block DRM table (DRM encryption / decryption table) In decryption, there may be various conditions for applying encryption and decryption to the entire digital content or only applying specific encryption and decryption to a specific area. However, in the present embodiment, the end of the real bad block table is different. An example of application based on a value corresponding to the last lower 4 bits of the bad block address will be described.

For example, if the badblock table is the same as that of FIG. 10 (that is, the badblock table of FIG. 10 is a badblock table having 18 (36 bytes) of real badblock addresses), the last badblock address is '0xFE'. Since the lower 4 bits value is '0x0E (= decimal 14)', the conditions are determined based on 'decimal 14'.

That is, the real bad block check examines bad blocks corresponding to multiples of 14. If there are not more than five bad blocks to be examined, the first bad block is additionally included in the sequential inspection target to maintain at least five total bad blocks.

Similarly, when described based on the above conditions, encryption of digital content data is also performed on blocks whose block addresses correspond to multiples of fourteen. Decoding also proceeds with the same criteria and conditions.

The method using the reader 20 of the present invention as described above can be applied to various fields in consideration of the overall performance and other conditions of the system to which the DRM is applied. For example, it may be applied to an asymmetric encryption system.

Referring to the application example, as described above, a bad pattern DRM table (DRM encryption table) is first generated using the bad pattern. After generating a seed key through a hash function that uses the bad baton DRM table (DRM encryption table) as a conversion factor, the public key (Public Key (RSA, ECC, etc.)) is generated. Key and Private Key can also be created and applied to PKI solutions that are used in many existing fields. This is because the bad pattern of each digital content storage medium (flash memory) is a causal factor for the generation of a private key, and the contents of the private key do not need to be recorded in any logical way. It can be said that the security of the asymmetric encryption system using an example is further enhanced.

That is, the server may download digital content data encrypted with the public key from the client, and decrypt the digital content data using the private key extracted from the digital content data.

As described above, if the physical characteristics (bad block, bad page, bad bit, etc.) of the flash memory in which the respective digital content data are recorded are used as an encryption key, each of the digital content data storage media (flash memory) is different from each other. It has a block DRM table (DRM encryption table). This can overcome the weakness that the existing DRM using a logical algorithm or encryption table loses its value as a DRM as a specific algorithm or encryption table is released.

For example, digitally copying the flash memory devices (eg, NAND flash memory) constituting the flash memory COB in any way for the purpose of illegal copying, or storing the same digital content as the original through a physical dump method such as memory dumping. Even if the medium is copied, the copied digital content storage medium is not valid. Because, even if the physical content of the same digital content storage medium is duplicated, the bad patterns (bad blocks, bad pages, bad bits, etc.), which are physical characteristics of the memory elements (for example, NAND flash memory) constituting the storage medium, are duplicated. Because it is not.

That is, even if a bad block or bad page marking is copied to a spare area of a flash memory block, it cannot be physically a bad block or bad page, and thus a duplicated digital content storage medium (up to a bad pattern). (Not duplicated) may be determined to be an invalid storage medium because the authentication failed in the process of checking the real bad block of the digital content data authentication process during use (read or play).

This is a double-sided medium where the existing media such as CDs and DVDs are endlessly exposed to illegal copying by general users, and a medium of profit for digital content owners, and at the same time, their digital content data is an unlimited copy through these media. On the contrary, the present invention can sufficiently protect the copyright holder's digital content for the above reasons.

Meanwhile, another example of a method of preventing illegal copying by copying a whole flash memory may be an encryption / decryption method using different bad areas (blocks, pages, subpages, locations) for each flash memory.

For example, an area for recording addresses of bad areas (blocks, pages, subpages, and locations) of a used memory may be set in a header data area, which is an area for recording characteristics of the flash memory, not a data storage space. And extracts the encryption characteristic value (for example, the encryption characteristic value based on the bad block DRM table (DRM encryption table)) by combining the addresses of the bad area, and encrypts the original digital content data with the encryption characteristic value to the bad area of the memory. Record digital content data in the normal region except for.

Thereafter, when the flash memory COB 12 of the smart card 10 is connected to the reader 20, the reader 20 reads addresses of the bad area from the header data area and combines the addresses of the bad area to combine content data. Calculate the encryption characteristic values (e.g., encryption characteristic values based on the bad block DRM table (DRM encryption table)) and read the data in memory sequentially, except in the bad area. Restores the content data. At this time, by calculating the encryption characteristic value with a combination of singular values, such as the address of a different bad area for each memory used, a complete copy is not physically possible unless the bad memory areas of the main memory and the memory used for copying coincide.

As another example, the reader 20 marks a bad area (block, page, subpage, location) of the used memory as a bad area at a defined location of a free area corresponding thereto, and encrypts the bad area by combining addresses of the bad area. After extracting the characteristic value (e.g., the encryption characteristic value based on the bad block DRM table (DRM encryption table)), the original digital content data is encrypted using the encryption characteristic value, and the digital content data is recorded in the normal area except the bad area of the memory. do.

Then, when the flash memory COB 12 of the smart card 10 is connected to the reader 20, the flash memory is inspected to read the addresses of the bad areas, and the addresses used to encrypt the content data by combining the bad areas. Calculate the characteristic value (e.g., the encryption characteristic value based on the bad block DRM table (DRM encryption table)), and sequentially read the data in the memory except the bad area, and then use the original digital content data with this encryption characteristic value. Restore At this time, by calculating the encryption characteristic value with a combination of singular values, such as the address of a different bad area for each memory used, a complete copy is not physically possible unless the bad memory areas of the main memory and the memory used for copying coincide.

As another example, the reader 20 marks a bad area (block, page, subpage, location) of a used flash memory as a bad area at a defined location of a corresponding free area, and marks the bad area recorded in the memory. After extracting the encryption characteristic values (e.g., the encryption characteristic values based on the bad block DRM table (DRM encryption table)) from the values (e.g., serial number, etc.), the original digital content data is encrypted by using the encryption characteristic values. Digital content data is recorded in the normal area except the bad area.

Then, when the flash memory COB 12 of the smart card 10 is connected to the reader 20, the memory is inspected and the specific value recorded in the memory is read, and the encryption characteristic value (for example, bad block) used as the specific value is read. An encryption characteristic value based on the DRM table (DRM encryption table) is calculated, and the data of the memory is sequentially read out of the bad area, and the original digital content data is restored to the encryption characteristic value. At this time, by calculating the encryption characteristic value using a combination of specific values recorded in the memory used, a complete copy is not physically possible unless the bad areas of the memory used for copying and the original memory all match.

In the above, in order to copy the memory card of which the intellectual property is guaranteed, the bad area of the memory is read, and the normal area of the memory card to be copied is identically marked as the bad area, thereby creating the same encryption characteristic value to prevent duplication. In order to check whether the reader 20 is connected to the flash memory COB 12 through a process of writing / reading data to / from the bad area, whether the bad area of the flash memory is physically created or simply marked for duplication. If it is judged as simple marking, the digital content data recorded as classified as "piracy memory card" is not reproduced. In this way, the authenticity of the bad area can be discriminated to distinguish illegal copy memory cards.

14 is a diagram illustrating an example of an apparatus for constructing a bad pattern DRM table for digital copyright protection according to an embodiment of the present invention, which may be included in the reader 20. For convenience of description, an apparatus for generating a bad block DRM table (DRM encryption table), that is, the operation of the reader 20 will be described.

The bad pattern detection unit 101 sets an area in a block (/ bad page) multiple unit (for example, 2048 block multiple unit) from an entire block of flash memory (/ bad page), and in each area, a bad block (/ bad page). Is detected.

The actual bad pattern inspection unit 102 determines a bad pattern extraction region corresponding to a specific criterion (eg, an area having a bad block (/ bad page) above a threshold or an area having many bad blocks (/ bad page)). Then, the area code value of the corresponding area is recorded in the DRM table selection code field of the card ID. At this time, the area code value recorded in the DRM table selection code field of the card ID is, for example, an area code value of the bad pattern extraction area that satisfies a specific condition, among the areas set by dividing the entire block of flash memory in 2048 block units. to be. In this case, the specific condition is, for example, a criterion for determining whether or not a bad block (/ bad page) DRM table (DRM encryption table) is a suitable area (Area). An area including the / bad page or an area including the largest number of bad blocks (/ bad page) may be determined as the bad pattern extraction area.

The bad pattern table creating unit 103 records the address of the bad block (/ bad page) of the area corresponding to the area code recorded in the DRM table selection code field of the card ID in the bad block (/ bad page) table.

The bad pattern DRM table calculating unit 104 checks the area corresponding to the area code recorded in the DRM table selection code field of the card ID. That is, it is checked whether the area corresponding to the area code has enough bad blocks (/ bad pages) to form a bad block (/ bad page) DRM table (DRM encryption table).

The bad pattern DRM table generating unit 105 determines a bad block (/ bad page) based on the bad pattern table (bad block table / bad page table) of the area corresponding to the area code recorded in the DRM table selection code field of the card ID. Configure a DRM table (DRM encryption table).

For example, if the area corresponding to the area code has enough bad blocks of 128 or more, 128 or more (256 bytes) bad blocks can be configured to form a 256-byte bad block DRM table (DRM encryption table). Based on the bad block table of the region (for example, block 0 to block 2047 region 1), a 256-byte bad block DRM table (DRM encryption table) composed of 128 real bad block addresses is shown. Write.

In addition, if the area corresponding to the area code does not include enough bad blocks to form a 256-byte bad block DRM table (DRM encryption table), a padding operation is performed to perform a 256-byte bad block DRM table. (DRM Encryption Table) [See FIG. 11] is created. For example, the bad block DRM table (DRM encryption table) of FIG. 11 is composed of 18 (36 bytes) actual bad block addresses and 110 (220 bytes) padding data. In this case, as an example of a padding method, a padding value generated by sequentially performing an exclusive OR operation on a real bad block table value and a card serial number value may be used. As shown in FIG. 11, a 256-byte bad block DRM table (DRM encryption table) may be configured.

15 is a block diagram showing an example of a digital content recording apparatus according to an embodiment of the present invention, which may be included in the reader 20.

The bad pattern inspection and marking unit 111 formats a flash memory (eg, NAND flash memory) of the flash memory COB 12 as a storage medium (memory card composed of memory elements), and writes a bit to 0xAA55 writing. Examine the unit bad pages (pages with bad bits), or bad blocks (blocks to which the bad bits belong), and mark pages or blocks with bad bits as bad pages or bad blocks.

The pad pattern area selection unit 112 determines the area that satisfies a specific condition (reference) by referring to the bad block (/ bad page) table recorded after the row format of the flash memory, and the media information recording unit 113. ) Records the Area Code value of the corresponding area in the DRM Table Select Code field of the Card ID (page number 9 of the zero block).

For example, the area is set by dividing the entire block of flash memory by 2048 block units, and the area suitable for a specific condition (reference) is composed of a bad block (/ bad page) DRM table (DRM encryption table). After determining as the bad pattern extraction area for, the area code value of the determined area is recorded in the DRM table selection code field of the card ID. In this case, the specific condition (reference) is a criterion for determining whether or not the area is suitable for forming a bad block (/ bad page) DRM table (DRM encryption table). For example, an area including a bad block (/ bad page) having a threshold value (e.g., 128 or more) or an area containing the largest number of bad blocks (/ bad page) may be a bad pattern. It can be determined as the extraction area. At this time, the determination of the bad pattern extraction area first checks whether there is an area including a bad block (/ bad page) having a threshold value (for example, 128 or more), and if the area does not exist, a plurality of areas (2048 blocks). An area including the largest number of bad blocks (/ bad page) among areas set in units of multiples is determined as a bad pattern extraction area. Thus, the area code value of the corresponding area determined as the bad pattern extraction area is recorded in the DRM Table Select Code field of the Card ID shown in FIG. 6.

The bad pattern DRM table generating unit 114 generates a bad block (/ bad page) based on the bad pattern table (bad block table / bad page table) of the area corresponding to the area code recorded in the DRM table selection code field of the card ID. Configure a DRM table (DRM encryption table). For example, if the area corresponding to the area code has more than 128 sufficient bad blocks, the bad block table of the area having more than 128 (256 bytes) bad blocks (for example, block 0 to block 2047 area 1) is used. Based on this, create a 256-byte bad block DRM table (DRM encryption table) [see Fig. 9] consisting of 128 real bad block addresses, and the area corresponding to the area code is a 256-byte bad block DRM table (DRM). If there are not enough bad blocks to constitute an encryption table, padding is performed to create a 256-byte bad block DRM table (DRM encryption table) (see FIG. 11).

The content encryption recording unit 115 uses the bad pattern DRM table (DRM encryption table) generated by the bad pattern DRM table generator 114 as an encryption key to record digital content data in a memory device (eg, NAND flash memory). .

FIG. 16 is a diagram illustrating an example of a device for reading (viewing, playing, etc.) digital content according to an embodiment of the present invention, which may be included in the reader 20.

When the flash memory COB 12 in the smart card 10 is connected to the reader 20, the media information collecting unit 121 reads card ID (page number 9 of zero block) information in the flash memory. At this time, in the DRM table selection code field of the card ID, an area where a bad pattern (bad block, bad page, bad bit, etc.) to be used as a bad pattern DRM table (DRM decoding table) is present (bad block (/ bad of threshold value or more) Area Code information of the area having the page) or the area containing the largest number of bad blocks (/ bad page) is recorded, so the information of the card ID when reading (reading) the digital content data Will be collected.

The bad pattern DRM table generating unit 122 uses a bad block based on a bad pattern table (bad block table / bad page table) in an area corresponding to a DRM table selection code of a card ID. (/ Bad page) Configures a DRM table (DRM decryption table). For example, if the area corresponding to the area code recorded in the DRM table selection code has more than 128 sufficient bad blocks, 128 actual blocks are based on the bad block table of the area having more than 128 (256 bytes) bad blocks. (Real) A 256-byte bad block DRM table consisting of a bad block address constitutes a bad block DRM table (DRM decoding table) [see FIG. 9], and the area corresponding to the area code recorded in the DRM table selection code is 256-byte bad block DRM table. If there are not enough bad blocks to constitute (DRM decryption table), padding is performed to construct a 256-byte bad block DRM table (DRM decryption table) (see FIG. 11). That is, a 256-byte bad block DRM as shown in FIG. 11 using a padding value generated by sequentially performing an exclusive OR operation on a real bad block table value and a card serial number value. A table (DRM decryption table) is constructed.

In the media authenticator 123, the actual bad block (/ bad page) table is not a padding value in the bad block (/ bad page) DRM table (DRM decryption table) generated by the bad pattern DRM table generator 122. Check if the blocks (/ pages) corresponding to the (Table) value are real bad blocks (/ bad pages). For example, the actual bad block in the bad block DRM table (DRM decoding table) of FIG. 11 composed of a 36-byte real bad block address and 220 bytes of padding data (0x09, 0x10, 0x0B, 0x17, ...). Check that the blocks with block address values are real bad blocks.

Here, to check whether it is a real bad block (/ bad page), for example, randomly select about 10 bad blocks (/ bad page) from the real bad block (/ bad page) table. To check if it is a real bad block (/ bad page).

At this time, disable the WP (Write Protect) pin and write 0xAA55 and 0x55AA to the corresponding page of the real bad block (/ bad page) to write the actual bad block (/ bad page). Check if it is. At this time, if it is confirmed that the actual bad block (/ bad page), in the same way by additionally checking the appropriate number of real bad blocks (/ bad page), and additionally, Disable the WP (Write Protect) pin for the selected bad block (/ bad page) and write 0xAA55 and 0x55AA to the corresponding page of the real bad block (/ bad page). Check if it is an actual bad block (/ bad page).

The content decryption and playback unit 124 allows the use of digital content data (Play or Read) based on the authentication result of the media authentication unit 123. In other words, if the data use authentication passes, the generated bad block (/ bad page) DRM table (DRM decryption table) is utilized to decrypt the digital content data to the user and deliver it to the user, or if the data use authentication fails, the authentication fails. Notify the user of the request for confirmation of the corresponding digital content storage medium.

FIG. 17 is a diagram illustrating an example of a key generation device of an asymmetric encryption system to which the present invention is applied, which may be included in the reader 20.

The bad pattern detection unit 131 sets an area in a block (/ bad page) multiple unit (for example, 2048 block multiple unit) from an entire block of flash memory (/ bad page), and in each area, a bad block (/ bad page) Is detected.

The bad pattern DRM table generating unit 132 determines a bad block based on a bad pattern table (bad block table / bad page table) in an area corresponding to a DRM table select code of a card ID. (/ Bad page) Configures a DRM table (DRM encryption table). For example, if the area corresponding to the area code recorded in the DRM table selection code has more than 128 sufficient bad blocks, 128 actual blocks are based on the bad block table of the area having more than 128 (256 bytes) bad blocks. (Real) constitutes a 256-byte bad block DRM table (DRM encryption table) [see FIG. 9] composed of a bad block address, and the area corresponding to the area code recorded in the DRM table selection code is a 256-byte bad block DRM table. If there are not enough bad blocks to constitute (DRM encryption table), padding is performed to construct a 256-byte bad block DRM table (DRM encryption table) (see FIG. 11). That is, a 256-byte bad block DRM as shown in FIG. 11 using a padding value generated by sequentially performing an exclusive OR operation on a real bad block table value and a card serial number value. Configure a table (DRM encryption table).

In the media authentication unit 133, the actual bad block (/ bad page) table is not padding value in the bad block (/ bad page) DRM table (DRM encryption table) generated by the bad pattern DRM table generation unit 132. Check if the blocks (/ pages) corresponding to the (Table) value are real bad blocks (/ bad pages). For example, the actual bad block in the bad block DRM table (DRM encryption table) of FIG. 11 composed of 36 bytes of real bad block addresses and 220 bytes of padding data (0x09, 0x10, 0x0B, 0x17, ...). Check that the blocks with block address values are real bad blocks.

Here, to check whether it is a real bad block (/ bad page), for example, randomly select about 10 bad blocks (/ bad page) from the real bad block (/ bad page) table. To check if it is a real bad block (/ bad page).

At this time, disable the WP (Write Protect) pin and write 0xAA55 and 0x55AA to the corresponding page of the real bad block (/ bad page) to write the actual bad block (/ bad page). Check if it is. At this time, if it is confirmed that the actual bad block (/ bad page), in the same way by additionally checking the appropriate number of real bad blocks (/ bad page), and additionally, Disable the WP (Write Protect) pin for the selected bad block (/ bad page) and write 0xAA55 and 0x55AA to the corresponding page of the real bad block (/ bad page). Check if it is an actual bad block (/ bad page).

The seed key generation unit 134 generates a seed key through a hash function using a bad baton DRM table (DRM encryption table) as a conversion factor.

The asymmetric encryption key generator 135 generates the seed key generated by the seed key generator 134 as a public key and a private key through a PKI algorithm (RSA, ECC, etc.).

The public key may be used to encrypt digital content data, and the private key may be used to decrypt digital content data.

14 to 17 as described above are included in the reader 20 to perform encryption and decryption of digital content data.

As described above, the method of the present invention may be implemented as a program and stored in a recording medium (CD-ROM, RAM, ROM, floppy disk, hard disk, magneto-optical disk, etc.) in a computer-readable form. Since this process can be easily implemented by those skilled in the art will not be described in more detail.

As described above, although the present invention has been described by way of limited embodiments and drawings, the present invention is not limited thereto and is described by the person of ordinary skill in the art to which the present invention pertains. Various modifications and variations are possible without departing from the scope of the appended claims.

1 is an exemplary view showing a conventional smart card,

2 is an exemplary diagram of a smart card having a flash memory according to an embodiment of the present invention;

3 is a block diagram of a reader for the smart card of FIG. 2 having a flash memory;

4 is a configuration diagram of a communication network connection for inquiry of an accident related to the smart card of FIG. 2;

5 is an exemplary configuration diagram of a flash memory used in the present invention;

6 is an explanatory diagram showing an example of the card ID of FIG. 5;

FIG. 7 is an explanatory diagram showing an example of a bad pattern extraction area when all blocks of a flash memory are divided into 2048 blocks according to an embodiment of the present invention; FIG.

8 is a flowchart illustrating an example of a method for configuring a bad block DRM table for digital copyright protection according to an embodiment of the present invention;

9 is an explanatory diagram showing an example of a 256-byte bad block DRM table generated from a bad block table of area 1 having more than 128 bad blocks according to an embodiment of the present invention;

FIG. 10 is an explanatory diagram showing an example of a bad block table of area 2 having up to 128 bad blocks used in the present invention; FIG.

FIG. 11 is an explanatory diagram showing another example of a 256-byte bad block DRM table generated by attaching padding data to a bad block table of region 2 having 128 or less bad blocks according to an embodiment of the present invention; FIG. ,

12 is a flowchart illustrating an example of a digital content recording method according to an embodiment of the present invention;

13 is a flowchart illustrating an example of an authentication process for playing digital content according to an embodiment of the present invention;

14 is a block diagram illustrating an example of an apparatus for constructing a bad pattern DRM table for digital copyright protection according to an embodiment of the present invention;

15 is a block diagram showing an example of a digital content recording apparatus according to an embodiment of the present invention;

16 is a block diagram showing an example of a digital content reproduction apparatus according to an embodiment of the present invention;

17 is a block diagram showing an example of a key generation device of an asymmetric encryption system to which the present invention is applied.

<Explanation of symbols for the main parts of the drawings>

10: smart card 11: smart card COB

12: flash memory COB 20: reader

21: Smart card contact 21: Flash memory contact

23 ... IC card contact 30 ... terminal

40.Smart Card Server

101: bad pattern detection unit 102: actual bad pattern inspection unit

103: bad pattern table creation unit 104: bad pattern DRM table operation unit

105: bad pattern DRM table generation unit 111: bad pattern inspection and marking unit

112: bad pattern area selection unit 113: media information recording unit

114: bad pattern DRM table generation unit 115: content encryption recording unit

121: Media information collecting unit 122: Bad pattern DRM table generation unit

123: media authentication unit 124: content decryption and playback unit

131: bad pattern detection unit 132: bad pattern DRM table generation unit

133: media authentication unit 134: seed key generation unit

135: asymmetric encryption key generation unit 136: public key sharing unit

137: private key utilization unit

Claims (66)

Smart card COB having a plurality of input and output terminals; And A smart card having a flash memory including a flash memory COB having a plurality of input / output terminals. The terminal of claim 1, wherein each terminal of the smart card COB and the flash memory COB is provided. The smart card having a flash memory, characterized in that the terminal connected to the reader for performing the recording or reading in the smart card COB or flash memory COB. The method of claim 2, The smart card COB and the flash memory COB are provided separately from each other, or a smart card having a flash memory, characterized in that the provided is electrically connected. The method of claim 3, wherein The flash memory COB is a smart card having a flash memory, characterized in that divided into a security area and a general area. The method of claim 4, wherein Flash memory, characterized in that the recording or reading through the digital copyright protection (DRM) authentication by the ASIC of the reader, when the reader or write to the security area of the flash memory COB of the smart card by the reader Smart card with. The digital copyright protection certification of the ASIC of the reader according to claim 5, A smart card having a flash memory, characterized in that based on the physical characteristics of the flash memory constituting the flash memory COB of the smart card. The method of claim 6, wherein the physical property, Smart card having a flash memory, characterized in that the information on the bad pattern for each unit area of the flash memory. The method of claim 7, wherein The information on the bad pattern is a smart card having a flash memory, characterized in that any one of the bad block, bad page or bad bit information. The digital copyright protection certification of the ASIC of the reader according to claim 8, Smart card having a flash memory, characterized in that based on the physical characteristics of the flash memory of the flash memory COB and the unique authentication information stored in the smart card COB. The smart card COB and the flash memory COB of the smart card COB and flash memory COB through a connection terminal connected to the wire or wireless information is exchanged, the flash memory COB of the smart card having a flash memory for performing reading or reading Reader. The method of claim 10, wherein the reader, A wired / wireless connection to an external terminal and performing a recording operation of recording digital content data stored in the terminal to the flash memory COB or a reading operation of reading digital content data recorded in the flash memory COB and transmitting the digital content data to the terminal. Smart card reader having a flash memory, characterized in that. The method of claim 11, wherein the reader, When the information protection request for the digital content data is received, the recording and reading operation of the digital content data is controlled to be performed differently from the case where there is no information protection request. Smart card reader with a flash memory characterized in that. The method of claim 12, wherein the application program on the terminal side, When a request for information protection of the digital content data is requested, an external smart card server is connected to inquire whether the smart card has been received. If the smart card has not been received, the digital content data requested for protection is recalled. To the reader, The reader, When it is determined that the smart card has not been received by the application program on the terminal side, a password table is generated using a bad pattern of the flash memory constituting the flash memory COB, and the protection request is performed using the encryption table. And a digital copyright protection (DRM) by encrypting digital content data and writing it to the flash memory COB. The method of claim 13, wherein the reader, The smart card reader with a flash memory, characterized in that the wired connection to the smart card server through the terminal, or wirelessly connected to the smart card server using a wireless port provided separately. The method of claim 13, wherein the application program on the terminal side, When the information protection request for the digital content data is requested, access to the external smart card server, it is characterized by using the unique authentication information in the smart card COB read through the reader to check the presence of the incident received Smart card reader with flash memory. The method of claim 13, wherein the reader, If it is determined that the smart card has not been received by the application program on the terminal side, the digital content data encrypted and stored in the flash memory COB is received from the application program on the terminal side. And generating a decryption table, and transmitting the encrypted digital content data to the terminal by decrypting the encrypted digital content data using the decryption table. The method of claim 13, wherein the reader, If it is determined that the smart card has been accidentally received by the application program on the terminal side, the digital content data encrypted by the flash memory COB is received from the application program on the terminal side. Smart card reader with a flash memory, characterized in that does not perform the operation of decoding. The method of claim 3, wherein the reader, The terminal further includes an additional connection terminal connected to another IC card, and when connected to the corresponding server using the unique authentication information on the smart card COB or the other IC card, the unique authentication information on the smart card COB or the other IC card is read. The smart card reader with a flash memory, characterized in that for transmitting to the server to perform electronic commerce in the server. The method of claim 18, wherein the reader, The smart card reader having a flash memory, characterized in that the wired connection to the server via the terminal, or wirelessly connected to the server using a wireless port provided separately. The method of claim 19, wherein the reader, Smart with a flash memory, characterized in that the electronic commerce in the server using the selected one or both of the public certificate stored in the flash memory COB of the smart card and the unique authentication information on the other IC card Reader of the card. The method of claim 19, wherein the reader, Smart with a flash memory characterized in that the electronic commerce in the corresponding server is made by using one or both of a public certificate stored in the flash memory COB of the smart card and the unique authentication information on the smart card COB. Reader of the card. The method of claim 10, wherein the security area of the memory area of the flash memory COB, It is divided into banking area for banking and personal area for data storage. The reader, When the information of the banking area is requested from the terminal, access to the information on the banking area is blocked, but when the input authentication information input from the terminal and the contents of the unique authentication information stored in the smart card COB coincide with each other. Smart card reader with a flash memory, characterized in that to unblock the information access. The method of claim 22, wherein the banking area, OTP generation area capable of OTP (One Time Password) generation, The reader, When receiving the request for the OTP generation from the terminal side, the display unit for displaying the OTP information generated from the OTP generating area further comprises a smart card reader having a flash memory. The method of claim 22, wherein the reader, And a smart card reader having a flash memory, wherein the data stored in the personal area is simultaneously transferred to the terminal. The method of claim 22, wherein the reader, When connected to an external smart card server, the electronic bank account information corresponding to the unique authentication information in the smart card COB is received from the smart card server and transmitted to the banking area of the flash memory COB, and the electronic bank account in the banking area. Smart card reader having a flash memory, characterized in that the history is stored. The method of claim 22, wherein the reader, While connected to an external smart card server, receiving the update information about the smart card from the smart card server and transmits to the banking area in the flash memory COB, flash memory, characterized in that for updating the information of the banking area Smart card reader equipped with. In the digital rights protection (DRM) method using the reader of claim 10, Checking a bad pattern for each unit area of a flash memory constituting a flash memory COB of a smart card connected to the reader, and determining a bad pattern extraction area; Recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; And Inspecting an area corresponding to the area code recorded in the table selection code field and constructing a bad pattern DRM table based on the bad pattern table; and a digital copyright protection method using a smart card reader having a flash memory. . The method of claim 27, wherein the bad pattern table, Digital address using a smart card reader having a flash memory, characterized in that the address value of the bad pattern for each unit area, which is generated when the flash memory is formatted, is recorded. Copyright protection method. The method of claim 28, wherein the bad pattern DRM table, Digital copyright protection method using a reader of a smart card having a flash memory, characterized in that consisting of only the bad pattern table. The method of claim 28, wherein the bad pattern DRM table, Smart card with a flash memory, characterized in that by using the card serial number field of the card ID, and padding the values generated by sequentially ORing the value of the bad pattern table and the card serial number value sequentially. Copyright protection method using a reader. The method according to any one of claims 27 to 30, wherein the bad pattern, A digital copyright protection method using a reader of a smart card having a flash memory, characterized in that the bad block, bad page, or bad bit information. The method of claim 31, wherein the bad pattern extraction region, A digital card reader using a smart card reader having a flash memory, characterized in that it is an entire block of memory, an area containing a bad pattern of a predetermined threshold value or more, or an area containing a maximum number of bad patterns. Copyright protection method. The method of claim 32, wherein the unit area, A digital copyright protection method using a reader of a smart card having a flash memory, characterized in that the area is set in units of 2048 blocks. The method of claim 33, wherein the predetermined threshold, Digital copyright protection method using a smart card reader having a flash memory, characterized in that the number of 128 bad blocks. 35. The method of claim 34, wherein the size of the bad pattern DRM table, Digital copyright protection method using a reader of a smart card with a flash memory, characterized in that 256 bytes. The method of claim 27 or 28, wherein the flash memory, A digital copyright protection method using a reader of a smart card having a flash memory, characterized in that the NAND flash memory. In the digital rights protection (DRM) method using the reader of claim 10, Extracting physical characteristics of a flash memory constituting a flash memory COB of a smart card connected to the reader; And Digital copyright protection method using a reader of a smart card having a flash memory comprising the step of generating an encryption key using the extracted physical characteristics of the flash memory. In the method of recording digital content using the reader of claim 10, Checking a bad pattern for each unit region of a flash memory device constituting a flash memory COB of a smart card connected to the reader, and determining a bad pattern extraction region; Recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; Inspecting an area corresponding to an area code recorded in the table selection code field and constructing a bad pattern digital copyright protection (DRM) table based on the bad pattern table; And And recording the digital content data in the flash memory by using the bad pattern DRM table as an encryption key. The method of claim 38, wherein the bad pattern table, Digital address using a smart card reader having a flash memory, characterized in that the address value of the bad pattern for each unit area, which is generated when the flash memory is formatted, is recorded. How to record content. The method of claim 39, wherein the bad pattern DRM table, Digital content recording method using a reader of a smart card having a flash memory, characterized in that consisting only of the bad pattern table. The method of claim 39, wherein the bad pattern DRM table, Smart card with a flash memory, characterized in that by using the card serial number field of the card ID, and padding the values generated by sequentially ORing the value of the bad pattern table and the card serial number value sequentially. Digital content recording method using a reader. 42. The method of claim 38 to 41, wherein the bad pattern, A digital content recording method using a reader of a smart card having a flash memory, characterized in that it is one of bad block, bad page, or bad bit information. The method of claim 42, wherein the bad pattern extraction region, A digital card reader using a smart card reader having a flash memory, characterized in that it is an entire block of memory, an area containing a bad pattern of a predetermined threshold value or more, or an area containing a maximum number of bad patterns. How to record content. In the digital content recording method using the reader of claim 10, Extracting physical characteristics of a flash memory constituting a flash memory COB of a smart card connected to the reader; Generating an encryption key using physical characteristics of the extracted flash memory; And And recording the digital content data in the flash memory using the generated encryption key. In the digital content recording method using the reader of claim 10, In the header data area, which is an area for recording the characteristics of the flash memory constituting the flash memory COB of the smart card connected to the reader, and not the data storage space, an area for recording addresses of the bad areas of the used memory is recorded. Doing; And Extracting an encryption characteristic value by combining addresses of the bad region, and then encrypting the original digital content data with the encryption characteristic value and recording the digital content data in the normal region except the bad region of the memory. Digital content recording method using a reader. In the digital content recording method using the reader of claim 10, The bad area of the memory used in the flash memory constituting the flash memory COB of the smart card connected to the reader is marked as a bad area at a defined position of the free area corresponding thereto, and a combination of addresses of the bad areas is used to determine the encryption characteristic value. Extracting; And And encrypting the original digital content data using the encryption characteristic value, and recording the digital content data in a normal area excluding a bad area of the memory. In the digital content recording method using the reader of claim 10, Marks that the bad area of the memory used in the flash memory constituting the flash memory COB of the smart card connected to the reader is the bad area at a defined position of the free area corresponding thereto, and encrypts the characteristic value with specific values recorded in the memory. Extracting; And And encrypting the original digital content data using the encryption characteristic value and recording the digital content data in a normal area excluding the bad area of the memory. 48. The method of claim 47, wherein the specific value is Digital content recording method using a smart card reader having a flash memory, characterized in that the serial number. In the digital content storage medium using the reader of claim 10, An area code which is a code value of the bad pattern extraction area in the flash memory constituting the flash memory COB of the smart card connected to the reader is recorded in the table selection code field of the card ID, and the area code recorded in the table selection code field. A digital content storage medium, wherein digital content data is recorded by using a digital copyright protection (DRM) encryption table configured based on a bad pattern table as an encryption key by inspecting a corresponding area. In the method of reading digital content by the reader of claim 10, When the flash memory COB in the smart card is connected to the reader, an area corresponding to the area code recorded in the table selection code field of the card ID in the flash memory constituting the flash memory COB is examined, and a bad pattern table is used. Constructing a pattern digital copyright protection (DRM) table; Checking whether patterns having actual bad pattern address values in the bad pattern DRM table are actual bad patterns; And And reading the digital content data using the bad pattern DRM table as a decryption key according to the inspection result. The method of claim 50, wherein the bad pattern table, Digital address using a smart card reader having a flash memory, characterized in that the address value of the bad pattern for each unit area, which is generated when the flash memory is formatted, is recorded. How to read the content. The method of claim 51, wherein the bad pattern DRM table, Digital content reading method using a smart card reader having a flash memory, characterized in that consisting of only the bad pattern table. The method of claim 51, wherein the bad pattern DRM table, Smart card with a flash memory, characterized in that by using the card serial number field of the card ID, and padding the values generated by sequentially ORing the value of the bad pattern table and the card serial number value sequentially. To read digital content using the reader. The method of claim 50, wherein the bad pattern, A method of reading digital content using a reader of a smart card having a flash memory, characterized in that it is one of a bad block, a bad page, or bad bit information. The method of claim 54, The process of checking whether the patterns having actual bad pattern address values in the bad pattern DRM table are actual bad patterns, Flash memory characterized by disabling WP (Write Protect) pin and writing 0xAA55 and 0x55AA on the corresponding page of the real bad pattern to check whether it is a real bad pattern. How to read digital content using a smart card reader. In the method of reading digital content by the reader of claim 10, Extracting physical characteristics of a flash memory constituting a flash memory COB of a smart card connected to the reader; Generating a decryption key using physical characteristics of the extracted flash memory; And A method of reading digital content using a reader of a smart card having a flash memory, the method comprising: reading digital content data using the generated decryption key. In the method of reading digital content by the reader of claim 10, When the flash memory COB in the smart card is connected to the reader, the addresses of the bad areas are read from the header data area, which is an area for recording the characteristics of the flash memory constituting the flash memory COB, and the addresses of the bad areas are combined to combine digital contents. Calculating an encryption characteristic value used for data encryption; And Restoring the original digital content data to the encryption characteristic value while sequentially reading the digital content data of the memory except the bad region, The encryption characteristic value is calculated by a combination of singular values, such as addresses of different bad areas, for each memory used, so that complete duplication is not physically possible unless the bad areas of the original memory and the memory used for copying are all identical. Method of reading digital content using a smart card reader having a flash memory. In the method of reading digital content by the reader of claim 10, When the flash memory COB in the smart card is connected to the reader, the flash memory constituting the flash memory COB is inspected to read the addresses of the bad areas, and the addresses of the bad areas are combined to encrypt the digital content data. Calculating; And Restoring original digital content data to the encryption characteristic value while sequentially reading data of a memory except a bad area, The encryption characteristic value is calculated by a combination of singular values, such as addresses of different bad areas, for each memory used, so that complete duplication is not physically possible unless the bad areas of the original memory and the memory used for copying are all identical. Method of reading digital content using a smart card reader having a flash memory. In the method of reading digital content by the reader of claim 10, When the flash memory COB in the smart card is connected to the reader, inspecting a flash memory constituting the flash memory COB, reading a specific value recorded in the memory, and calculating an encryption characteristic value used as the specific value; And Restoring original digital content data to the encryption characteristic value while sequentially reading data of a memory except a bad area, The encryption characteristic value is calculated by a combination of specific values recorded in the memory to be used, so that a complete copy is not physically possible unless the memory areas used for copying and the bad areas of the original memory all match. How to read digital content using a smart card reader. 60. The method of claim 59, wherein when the flash memory COB is connected to the reader, Reading the digital content using a reader of a smart card with a flash memory, characterized in that whether the bad area is physically made or simply marked for duplication by writing / reading data in the bad area. Way. In a digital rights protection (DRM) device with a processor, Checking a bad pattern for each unit area of a flash memory device constituting a flash memory COB of a smart card connected to the reader of claim 10, and determining a bad pattern extraction area; A function of recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; And A computer-readable recording medium having recorded thereon a program for realizing a function of configuring a bad pattern DRM table based on a bad pattern table by examining an area corresponding to an area code recorded in the table selection code field. In a digital rights protection (DRM) device with a processor, Extracting physical characteristics of a flash memory constituting a flash memory COB of a smart card connected to the reader of claim 10; And And a computer-readable recording medium having recorded thereon a program for realizing a function of generating an encryption key by using the extracted physical characteristics of the flash memory. In a digital content recording device having a processor, Checking a bad pattern for each unit area of a flash memory device constituting a flash memory COB of a smart card connected to the reader of claim 10, and determining a bad pattern extraction area; A function of recording an area code which is a code value of the determined bad pattern extraction area into a table selection code field of a card ID; Inspecting an area corresponding to an area code recorded in the table selection code field and constructing a bad pattern digital copyright protection (DRM) table based on a bad pattern table; And A computer-readable recording medium having recorded thereon a program for realizing a function of recording the flash pattern using the bad pattern DRM table as an encryption key. In a digital content recording device having a processor, Extracting physical characteristics of a flash memory constituting a flash memory COB of a smart card connected to the reader of claim 10; A function of generating an encryption key using physical characteristics of the extracted flash memory; And And a computer-readable recording medium storing a program for realizing a function of recording digital content data in the flash memory using the generated encryption key. In a digital content reading device having a processor, When the flash memory constituting the flash memory COB of the smart card connected to the reader of claim 10 is inserted, the area corresponding to the area code recorded in the table selection code field of the card ID is examined and the bad pattern table is used. Configuring a pattern digital copyright protection (DRM) table; Checking whether patterns having an actual bad pattern address in the bad pattern DRM table are actual bad patterns; And And a computer-readable recording medium storing a program for realizing a function of reading digital content data by using the bad pattern DRM table as a decryption key according to the inspection result. In a digital content reading device having a processor, Extracting physical characteristics of a flash memory constituting a flash memory COB of a smart card connected to the reader of claim 10; Generating a decryption key using physical characteristics of the extracted flash memory; And A computer-readable recording medium having recorded thereon a program for realizing a function of reading digital content data using the generated decryption key.
KR1020070116795A 2007-06-08 2007-11-15 Smart card with flash memory and memory reader of smart card and drm method using that reader KR20080107970A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/KR2008/006722 WO2009064131A2 (en) 2007-11-15 2008-11-14 Smart card with flash memory and memory reader of smart card and drm method using the reader

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020070056231 2007-06-08
KR20070056231 2007-06-08

Publications (1)

Publication Number Publication Date
KR20080107970A true KR20080107970A (en) 2008-12-11

Family

ID=40368097

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020070116795A KR20080107970A (en) 2007-06-08 2007-11-15 Smart card with flash memory and memory reader of smart card and drm method using that reader

Country Status (1)

Country Link
KR (1) KR20080107970A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101227187B1 (en) * 2010-08-16 2013-01-28 소프트캠프(주) Output control system and method for the data in the secure zone
KR101325963B1 (en) * 2011-11-22 2013-11-15 유한회사 대구특수금속 Method for manufacturing nameplate of vehicle having embossed figuration by resin molding

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101227187B1 (en) * 2010-08-16 2013-01-28 소프트캠프(주) Output control system and method for the data in the secure zone
KR101325963B1 (en) * 2011-11-22 2013-11-15 유한회사 대구특수금속 Method for manufacturing nameplate of vehicle having embossed figuration by resin molding

Similar Documents

Publication Publication Date Title
US10769252B2 (en) Method and apparatus for watermarking of digital content, method for extracting information
CN100419663C (en) Data security
JP4690600B2 (en) Data protection method
JP3748155B2 (en) File management system with falsification prevention / detection function
US8761403B2 (en) Method and system of secured data storage and recovery
TWI244584B (en) Data processing system, data processing method, and program providing medium
CN101578608B (en) Methods and apparatuses for accessing content based on a session ticket
US20090052672A1 (en) System and method for protection of content stored in a storage device
KR101468258B1 (en) Portable data storage device for protecting illegal replica
CN101595488A (en) Be used for content is tied to the method and apparatus of independent storage arrangement
JP2001094554A (en) Information transmission system, information transmission device, information reception device, and information transmitting method
KR20090072717A (en) New data storage usb disc, computer interface usb device and method by flash memory&#39;s bad patten
JP2001067324A (en) Information transmitting system, information transmitter and information receiver
JP2001083874A (en) Information provision system, information regulator, information signal receiver and information provision method
KR20090058758A (en) Smart card with flash memory and display, card reader of smart card, drm method using that
KR102154897B1 (en) Method for supervising digital contents using block chain and fingerprinting, device and computer readable medium for performing the method
KR20080107970A (en) Smart card with flash memory and memory reader of smart card and drm method using that reader
WO2009064131A2 (en) Smart card with flash memory and memory reader of smart card and drm method using the reader
JP2000163882A (en) Digital literary production recording medium, recording device accessing same recording medium, and reproducing device and deleting device
KR20100048705A (en) Usb hub device for providing datasecurity and method for providing datasecurity using the same
WO2004081706A2 (en) Method and apparatus for controlling the provision of digital content
CN103098064A (en) Method and apparatus for authenticating a non-volatile memory device
CN101617318A (en) Be used for method and apparatus that content and licence are linked
JP4765262B2 (en) Electronic data storage device, program
KR20090037022A (en) Smart card with flash memory and memory reader of smart card and drm method using that

Legal Events

Date Code Title Description
WITN Withdrawal due to no request for examination