TW200417217A - Digital content distribution system - Google Patents
Digital content distribution system Download PDFInfo
- Publication number
- TW200417217A TW200417217A TW92103180A TW92103180A TW200417217A TW 200417217 A TW200417217 A TW 200417217A TW 92103180 A TW92103180 A TW 92103180A TW 92103180 A TW92103180 A TW 92103180A TW 200417217 A TW200417217 A TW 200417217A
- Authority
- TW
- Taiwan
- Prior art keywords
- information
- data
- section
- application
- packet
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
Description
五、發明說明(1) 【發明所屬之技術領域】 本發明係有關於密竭 效的資料内容分級加密’ ^广使用在,例如,執行有 (MPEG-4)位元流上)。 C言σ,在動態影像壓縮標準 【先前技術】 特別是,本發明往亡 料之方法;將資料内容^並以口密石馬產生受保護數位資 由具備服務介面之客戶故:,成為資訊,各筆資訊可 以將各筆資訊由龟人&二端機上的解碼器應用程式解碼, 貝。tL田組合語言程式翻 气語言程式,&方法包括:2一::解碼器應用程式之機 訊;對該筆資訊至少一,=可讀取之媒體檢索資 為某種格式之輸出資料,二‘=;並提供該加密資訊 以將資訊排列成為一個至;::: f -伺服器服務介面 包,各表身包含至少該資一 π題與一表身之資料封 情報資料係啟動客戶機上…;::,而至少-標題包含 將各筆資訊由組合語言程式翻譯 ,由資料封包之表身 浯言程式。 、、解石馬器應用程式之機器 本發明另係有關於一伺服器, =解密,肖資料係、藉由此方^將内為容1加密保護之資料予 4 。 、、扁,並排列成為資訊 本^明還涉及一以加密碼產生 =其將内容編碼並排列成為資訊,^數位資料之系 面之客戶終端機上的解碼器庫用^葦資訊可由具備服 貝訊由組合語言程式翻譯為解碼器廡=式解碼,以將各筆 °〜用程式之機器語言程 1^·V. Description of the invention (1) [Technical field to which the invention belongs] The present invention relates to hierarchical encryption of inefficient data content, which is widely used, for example, on (MPEG-4) bitstreams). C. σ, in the video compression standard [prior art], in particular, the method of the present invention; the content of the data ^ and secretly generated protected digital assets by customers with a service interface: become information , Each piece of information can be decoded by the decoder application on the Turtle & tLtian combined language program to turn up the language program, & methods include: 2 a :: the opportunity of the decoder application; at least one of the information, = readable media retrieval data is output data in a certain format, Two '=; and provide the encrypted information to arrange the information into one; :::: f-server service introduction bread, each table body contains at least the data title and the data body of a table. On board ...; ::, and at least-the title contains a program that translates each piece of information by a combined language program and a verbal program by the body of the data packet. The calcite horse application application machine The present invention is also related to a server, = decryption, Xiao data is, by this means ^ the content of the contents of 1 encrypted protection. , And flattened into an information book ^ The description also refers to the generation of a password = which encodes and arranges the content into information. ^ Digital information is used on the decoder library on the client terminal. ^ Information can be provided by the server. Beixun is translated into a decoder by a combined language program. 庑 = -type decoding, in order to translate each stroke to the machine language program 1 ^ ·
第5頁Page 5
200417217 五、發明說明(2) ί i該ί、统係配置成為·· 機為可讀取之媒體檢索資訊; 予以加密· * & j 聿貝矾至少一部份 、 ’並^^供該加密資訊為某種格-V +认 一 J式係啟動-伺服器服務介面以將資訊:】:資料’該 含-標題與-表身之資料封包,:m -至少包 一部份,而^身至夕包含該資訊之 八® i至^ 一標題包含情報資料係使客戶機上之服務 =由資料封包之表身將各筆資訊 2 = 為解碼、器應用程式之機器語言程式。 一“-式翻澤 成資訊之資料經由網路由-祠服器分配至-或多 :Lr端機,各筆資訊可由客戶終端機之解碼器應用程 式解碼,此所謂之方法包括:將多數資料封包由該飼服器 經由網路傳送至該伺服器之網路介面,各資料封包至少包 含一標題與一表身,各表身至少包含資訊的一部份;爿H 筆資訊提供給安裝於該伺服器上一通信協定堆疊内二階声 之間一連串服務介面(至少一個)的第一個;各服務介^二 態配置為將至少一個封包標題加入該資料封包編碼情報資 料内,以使客戶機得以處理該封包的其餘部份;該方法另 包含傳送資料封包’封包至少包括一標題,標題包含之情 支資料係有關啟動用戶機上服務介面,由資料封包之表身 將各筆資訊由組合語言程式翻譯為解碼器應用程式之機器 語言程式。 本發明還涉及一分配數位資料之伺服器,將内容編碼 並排列成資訊之資料經由網路分配至一或多個客戶終端200417217 V. Description of the invention (2) ί i The system is configured so that the machine can read the information retrieved by the media; it is encrypted. * &Amp; j At least a part of the alum, 'and ^^ for the The encrypted information is in a certain form -V + Recognize a J-type system startup-server service interface to send information:]: data 'the data packet containing-title and-table body,: m-at least part of the package, and ^ The body contains the information of the eighth ® i to ^ A header contains information and data to enable the service on the client = each piece of information from the body of the data packet 2 = machine language program for decoding and application. A "-" style information is distributed to-or more via the network routing-server server, each piece of information can be decoded by the decoder application program on the client terminal. This so-called method includes: The packet is transmitted from the feeder to the server's network interface through the network. Each data packet contains at least a title and a body, and each body contains at least a part of the information; 爿 H pieces of information are provided to the installation The first of a series of service interfaces (at least one) between second-order sounds in a communication protocol stack on the server; each service interface is configured to add at least one packet header to the data packet encoding intelligence data so that the client The machine can process the rest of the packet; the method further includes transmitting a data packet. The packet includes at least a header, and the information contained in the header is related to starting the service interface on the user's machine. The combined language program is translated into a machine language program for a decoder application program. The invention also relates to a server for allocating digital data, encoding and arranging content The data feed distribution to one or more client terminals via the Internet
6頁 200417217 五、發明說明(3) 機’各筆資訊可由客戶終端機上之解碼器應用程式解碼, 此所謂之伺服器包括:為將多數資料封包由該伺服器經由 網路傳送之網路介面,各封包至少包含一標題與一表身, 各表身至少包含資訊之一部份,該伺服器另又包括一通信 協定堆疊内二階層之間之一連串服務介面(至少一個),各 服務介面組態配置為將至少一封包標題加入該資料封包編 碼情報資料内,以使客戶機得以處理該封包之剩餘部份; 邊词服器之組態配置為得以傳送至少包括一標題之資料封 包’標題所包含之情報資料係有關啟動客戶機上服務介 2 ’由資料封包之表身將各筆資訊由組合語言程式翻譯為 解馬器應用程式之機器語言程式。 將本發明亦涉及為接收並處理數位資料之客戶終端機, 式2谷編碼並排列成為資訊,各筆資訊可由解碼器應用程 至7碼,其包括··一為接收多數資料封包之介面,各封包 ^包含一標題與一表身;該終端機另又包含一通信協定 面:内:階層間之一連串服務介面(至少一個),各服務介 玆=組態配置為由該封包移去至少一封包標題,並利用在 ς移二之封包=上編瑪之情報資料處理該封包之剩餘部 2括-服務广其組態配置為由至少一封包之 語言程式,利用包含在該封:df應,式,機器 本發明還涉及在客戶終端上碭内之情報貝枓。 之方法,將内容編碼並排列赤幾瓦上^為接收並處理數位資料 器應用程式解碼包括利:哕::,各筆資訊可由解碼 用該客戶終端機之介面接收多6 pages 200417217 V. Description of the invention (3) Each piece of information can be decoded by the decoder application program on the client terminal. This so-called server includes: a network for transmitting most data packets from the server through the network Interface, each packet contains at least a header and a body, each body contains at least a part of the information, the server also includes a series of service interfaces (at least one) between the two layers in a communication protocol stack, each service The interface configuration is configured to add at least one packet header to the data packet encoding intelligence data so that the client can process the remainder of the packet; the configuration of the edge server is configured to transmit a data packet including at least one header 'The information contained in the title is related to the activation of the service on the client 2' Each piece of information is translated from the combined language program to the machine language program of the de-horse application by the body of the data packet. The present invention also relates to a client terminal for receiving and processing digital data. The 2 valley code is arranged and arranged into information, and each piece of information can be applied by a decoder to 7 yards, which includes ... an interface for receiving most data packets, Each packet ^ includes a header and a body; the terminal also includes a communication protocol plane: inside: a series of service interfaces (at least one) between layers, each service interface is configured to be removed by the packet at least The title of a packet, and use the intelligence data on the second packet = to process the remaining part of the packet. The service is configured to be configured by at least one packet language program, using the included in the packet: df The invention also relates to an information shell on a client terminal. The method is to encode and arrange the content on the Equatorial Watts ^ to receive and process digital data. Application decoding includes: 利:, each piece of information can be decoded and received using the interface of the client terminal.
第7頁 200417217Page 7 200417217
五、發明說明(4) 數資料封包,各封包至少包括一標題及一表身;各封包日 供給一通信協定堆疊内二階層之間一連串服務介面(至 一個)的第一個’各服務介面組態配置為由該封包移去至 少一封包標題,並利用在該移去之封包標題上編碼之情報 資料處理該封包之剩餘部份;包括一服務介面,其組態配 置為由至少一封包之表身將該筆資訊由組合語言程式翻譯 為解碼器應用程式之機器語言程式,利用包含在該封包之 至少一標題内之資料情報。 本發明亦涉及一可載入電腦内之電腦程式,並具備潛 勺,於電腦内執行時,提供該電腦具有如此系統、伺服器 或客戶終端機之功能。 本發明最後係有關於一可載入電腦内之電腦程式,並 具備潛力,於電腦内執行時,使該電腦能執行一種以上所 提及型式之方法。 如此糸統及方法的例子是已知的,譬如由國際標準 IS0/IEC 1 4496-1,知名的MPEG(動態影像壓縮標準。 MPEG與MPEG-4為已被推薦之標準,以MPEG之實例,被 廣泛用在影像資料以及,至一次要等級,其他資料内容禮 式之分配上。此外,諸如於網際網路上分配數位化内谷之 "患用私式及其他等等,已產生將内容加密處理之需要性 無論是以MPEG,MPEG-4或任何其他格式。 、該MPEG-4標準係指明藉由圖形描述與傳遞流通資料基^ 本運流所構成之該基本建構資料段之體系結構。為了勿々 垓*通貝料,其係以SL~封包格式化運流(SPS)傳遞。封V. Description of the invention (4) Number of data packets, each packet including at least a header and a body; each packet provides a first service interface (to one) of a series of service interfaces (to one) between two layers in a communication protocol stack The configuration is configured to remove at least one packet header from the packet, and use the intelligence data encoded on the removed packet header to process the remainder of the packet; including a service interface whose configuration is configured to include at least one packet The watch body translates this information from the combined language program to the machine language program of the decoder application, using the data information contained in at least one header of the packet. The present invention also relates to a computer program that can be loaded into a computer and has a latent spoon. When executed in the computer, the computer is provided with the functions of such a system, a server, or a client terminal. The present invention finally relates to a computer program that can be loaded into a computer and has the potential to enable the computer to execute one or more of the above-mentioned methods when executed in the computer. Examples of such systems and methods are known, such as the international standard ISO / IEC 1 4496-1, the well-known MPEG (Motion Picture Compression Standard. MPEG and MPEG-4 are the recommended standards, with MPEG as an example, It is widely used in the distribution of image data and, to a secondary level, the etiquette of other data content. In addition, such as the distribution of digitalized inner valleys on the Internet " individuals for private use and others, etc. The need for encryption processing is no matter in MPEG, MPEG-4 or any other format. The MPEG-4 standard indicates the architecture of the basic construction data segment formed by graphic description and transmission of the circulation data base. .In order not to lose the tongbei material, it is delivered in SL ~ packet formatted transport (SPS).
200417217 五、發明說明(5) 内容包含以存版霞;八 情報資料’例如’為:時j i j j j::二,磁區側相關 運流所運送之聲音將由一或多個基本 M ^心卓日視像貧料同步化。有關斗砵哭只* 關參考基準之概念係用來將有關计日寸杰及其相 機。時間標記俜用來户-拉 σ〜傳1^給一接收終端 C係用I才日不接收終端機 耗該存取單元時的精確時間點。目衝益時消 一給定之資料運产定B ‘ j j目心日才間基準(0ΤΒ)係為 (0ΤΒ)之可Λ 時間記號。此目標時間基準 辨度可以被依應用程式之需求,戋依特性次41 文件所定義者遝摆夕 ^ ^ ^ ^ Α依特性貝料 流之時間標記;Π間Π終:機插入編碼資料運 之J 機處 運流之SL封包標題内 ΐΐίΠ (0CR)之時間標記辨認之,或是以200417217 V. Description of the invention (5) The content includes the version of Xia Xun; the eight information materials 'for example' are: Shi jijjj :: Two, the sound carried by the relevant transport on the magnetic field side will be carried by one or more basic M Video lean synchronization. The concept of Douban Crying * is a reference concept that is used to integrate the daily planner and its camera. The time stamp 俜 is used for user-pull σ ~ to pass 1 ^ to a receiving terminal. The C system uses I to receive the terminal at the exact time when the access unit is consumed. When a message is cleared, a given piece of data will be produced. B ′ j j Muxin Daily Talent Reference (0TB) is a Λ time mark of (0ΤΒ). The target time base resolution can be determined by the application, according to the characteristics defined in the document 41. ^ ^ ^ ^ Α is based on the time stamp of the characteristic stream; between Π and Π: the machine inserts coded data to run It is identified by the time stamp in the header of the SL packet of the J machine at ΐΐΠ (0CR), or
^基本運▲之顯示讀數辨認之;而此目標描述符之運漭 由此基本運流承襲該時間基準。 ;IL 該目標描述架構包含一組容許識別之描述符,對基 運流以及用於圖像描述之聲音—視像實體目標予以描^並 與其互相適當聯結。實體目標描述符係描述一或多個與該 圖像中某單一節點相聯結之基本運流之描述符之集合。一 肩體目標描述符内之基本運流描述符即辨識某單一基本運 流。各個基本運流描述符包含了為啟始與配置該基本運流 解碼程序必需的資料,以及智慧財產標識。智慧財產管理 與保護(ΙΡΜΡ)之資料情報係經由ιρμρ描述符傳送作為該實 體目標描述符運流之一部份,也同時經由丨ΡΜΡ運流傳送;^ The display reading of the basic operation ▲ is identified; and the operation of the target descriptor is based on this time base. ; IL The target description architecture includes a set of identifiers that allow identification, describing the base stream and the audio-visual entity targets used for image description and appropriately linking them to each other. A physical object descriptor is a collection of descriptors describing one or more basic streams associated with a single node in the image. A basic flow descriptor in a shoulder object descriptor identifies a single basic flow. Each elementary stream descriptor contains the information necessary to start and configure the elementary stream decoding program, as well as the intellectual property identification. Intellectual property management and protection (IPMP) information is transmitted via the ιρμρ descriptor as part of the entity's target descriptor stream, and also via the PPMP stream;
200417217 五、發明說明(6) 該I PMP運流係為攜帶I PMP時變情報資料之基本運流,該情 報資料特別是資料内容加密之密鑰。密鑰係經由適當之 I PMP運流描述符與該資料内容或其他運流相結合。這些密 鑰必須與該資料内容運流同步化。現有之MPEG-4模型係用 來作延遲及同步化之管理。因此,該位於接收終端機處之 解密應用程式必須適當地管理時間之戳記動作。 以Μ P E G - 4位元流語法現有格式,在部份已加密内容位 元流在傳送中遺失的情況下,並未對解密處理過程之再同 步化給予明確支援。由於傳送層未被Μ P E G ~ 4具體指定,即 不可能利用到同步化之根本傳送協定之特質。MPEG-4媒體 也可能局部重放,在此情況下並無傳送動作參與。在一易 於出錯的環境裡,某單一位元資料丟失將可有效摧毀該架 構組之剩餘部份。有許多加密程式及其相關模態無法執行 自我同步化,但是它們在寬廣範圍之評價準則下卻是引人 注目的。現在,這些必須都排除掉,就是因為在有資料丟 失的情況下,它們無法在解密處理過程之同步化方面有所 支援。 現在本發明提供一個方法舆系統,為以加密碼產生 將資料内容編碼之受保護數位資料,及為分配該數位資 Ί ^及一客戶、终端機與方法,為接收並處理式 數位資料;其係執行一資料分 '之 遵防止未授權之存取,並顯示 ^ 善。 不出其改錯回正能力已經改200417217 V. Description of the invention (6) The IPMP transport stream is the basic transport stream that carries IPMP time-varying intelligence data. The intelligence data, especially the key for data content encryption. The key is combined with the content or other streams via the appropriate IPMP transport descriptor. These keys must be synchronized with the material content stream. The existing MPEG-4 model is used for delay and synchronization management. Therefore, the decryption application located at the receiving terminal must appropriately manage the time stamping action. Based on the existing format of MPEG-4 bit stream syntax, there is no explicit support for resynchronization of the decryption process in the case where part of the encrypted content bit stream is lost during transmission. Since the transport layer is not specifically specified by MPEG ~ 4, it is impossible to take advantage of the characteristics of the synchronized fundamental transport protocol. MPEG-4 media may also be partially replayed, in which case no transmission action is involved. In an error-prone environment, the loss of a single bit of data can effectively destroy the rest of the architecture group. There are many cryptographic programs and their associated modalities that cannot perform self-synchronization, but they are compelling under a wide range of evaluation criteria. These must now be ruled out because they cannot support the synchronization of the decryption process in the event of data loss. The present invention now provides a method and system for generating protected digital data that encodes data content with encryption, and for allocating the digital data and a client, terminal, and method for receiving and processing digital data; It implements a data point compliance to prevent unauthorized access and displays ^ good. Unsurprisingly, the ability to correct errors has changed
本發明藉由提供一 方法達到此項目標 該方法以加密The present invention achieves this by providing a method that uses encryption
200417217 五、發明說明(7) 碼方式產生為編碼資料内容 列成為資訊,各筆資訊可由 解碼器應用程式解碼,以將 為解碼器應用程式之機器語 器可讀取之媒體檢索資訊; 密;並提供該加密資訊成為 係啟動一伺服器服務介面以 一標題與一表身之資料封包 部份,而至少一標題係包含 ’資料,由資料封包之表身 譯為解碼器應用程式之機器 各筆資訊分隔為第一與至少 ^節至少有一節被加密屬, 節獨立進行解密;而且其中 步化標誌,被與相鄰資訊節 報貢料,如此組合到至少較 一筆資訊為資料之單位 編碼程式傳送至客戶機上的 =處理各別資訊,以便訝該 容可處為,例如,為影像、 為執行一通訊協定堆疊内某 供應用在該通訊協定堆叠某 ,務;並同時利用通信協定 疋之功此。有利的是,這是 之欠保護數位資料,並將其排 具備=務介面之客戶終端機之 各筆資訊由組合語言程式翻譯 言程式;此方法包括:由一機 對該筆資訊至少一部份予以加 某種格式之輪出資料,該格式 將資訊排列成為一個至少包含 ’各表身至少包含該資訊的一 啟動客戶機上之服務介面的情 將各筆資訊由組合語言程式翻 語言程式。其中本方法包括將 再另一個資訊節;其中那些資 加密方式係使其能與其他資訊 該已加密資訊被加入一個再同 隔開,並包含明顯之同步化情 遠的資料節。 ,資料係由·對資料内容編碼之 解碼器應用程式,而經過排列 資料内容進行解碼。該資料内 聲音、或文字。一服務介面係 一部份通信協定之介面,並提 一階層能用來交換資訊之通訊 堆疊内位於不同階層之通訊協 一項網路通訊協定堆疊,例如200417217 V. Description of the invention (7) The code method is generated as the encoded data content into information, and each piece of information can be decoded by the decoder application to retrieve information from the media that can be read by the decoder of the decoder application; And provide the encrypted information as part of the data package that starts a server service interface with a header and a body, and at least one header contains' data, which is translated from the body of the data package into a decoder application. The information is divided into the first and at least ^ sections. At least one section is encrypted, and the sections are decrypted independently. Moreover, the step sign is reported to the adjacent information section, so as to combine at least one piece of information into the data unit code. The program sends to the client = to process the individual information, so that the content can be used, for example, to image, to implement a certain protocol stack in a protocol stack, to use a certain protocol stack service, and to use the communication protocol at the same time. I do this. Advantageously, this is the lack of protection of digital data and sorting each piece of information of the client terminal with a service interface. The combined language program translates the language program; this method includes: a machine at least one piece of the piece of information A round-up of data is added in a format that arranges the information into a service interface on a client that includes at least 'each table contains at least the information. The information is translated by a combined language program. . Among them, the method includes adding another information section; among them, the encryption method is to enable it to be separated from other information. The encrypted information is added into a separate data section and contains obvious synchronization scenarios. The data is decoded by arranging the data content by a decoder application that encodes the data content. Sound or text in the material. A service interface is an interface of a part of communication protocols, and mentions a layer of communication that can be used to exchange information. A communication protocol at a different level in a stack. A network protocol stack, such as
$ 11頁 200417217 五、發明說明(8) 符合0 S I開放系統互遠彳 政加箠 可能提供應用程式,該服務介面亦 至a γ π i式與糸統刼作糸統間之介面,將該資訊 轉。睪至為3玄刼作系統之檔案系統所定 , :規::L:的密碼文件文字或明文文字即可被解密碼。 例之上下文脈絡裡,標題係位在一資料封包之 2 rΐ在其後之一件資料,也是描述該資料封包或 件之編碼情報資料。資料封包係-自給自足 畋蠄菸、貝〗固體’攜帶著足夠的情報資料,由某一源頭經 .…:二目的地,而無須仰賴該源頭與目的地間較早的 父 貧訊以及其間之介面。 由於各個一資㉟節可被獨立解密,χ因為言亥再同步化標 誌=相郴加密貧訊節之界限提供了明顯指#,使某一節内 的貧料^生錯誤或遺失並不影響客戶機對其他資訊節進行 解馬之=力換句話说’任何在前的資料段之全部或部分 人缺,並不衫響在客戶機對現行資料段進行解密之能力。 藉由調整資訊節之大小’也就是再同步化標諸的數目,多 少可=提,一些改錯回正能力。再者,這樣也可能只對一 小些貧訊節加密,而降低該客戶機解密處理的數量及所需 4費的動力。 要注意的是’該MPEG-4位元流之語法定義了再同步化 標誌(Resync Markers)。當殘餘誤差被偵測到之後,再同 步標誌藉由在解碼器與位元流之間增加再同步化機會,而 提供了改錯回正能力。典型例者為,在該誤差前的同步點$ 11 页 200417217 V. Description of the invention (8) Compatible with 0 SI open system. Mutual administration may provide application programs. The service interface is also a γ π i-type interface and system interface. Information transfer.睪 Zhi is determined by the file system of the 3 Xuan Zong Zuo system. The rules:: L: The password file text or plain text can be unlocked. In the context of the example, the title is the second piece of data in a data packet followed by the next piece of data, and it is also the encoded information describing the data packet or piece. Data packet system-self-sufficient cigarette smoke, shellfish solid 'carrying sufficient information and materials to pass through a certain source ....: two destinations, without having to rely on the earlier information about the father and the poor between the source and the destination, and in the meantime Interface. Since each resource section can be decrypted independently, χ because the re-synchronization mark = the boundary of the encrypted poor information section provides a clear indication of #, so that the poor materials in a section can produce errors or losses without affecting customers. The ability of the machine to solve other information sections = force In other words, 'All or part of any previous data segment is missing, and it does not affect the ability of the client to decrypt the current data segment. By adjusting the size of the information section, that is, the number of resynchronization targets, it is possible to mention that some errors can be corrected. In addition, this may also encrypt only a small number of lean nodes, and reduce the amount of decryption processing required by the client and the power required for 4 fees. It should be noted that 'The syntax of the MPEG-4 bit stream defines Resync Markers. When residual errors are detected, the resynchronization flag provides the ability to correct errors by increasing the chance of resynchronization between the decoder and the bitstream. A typical example is the synchronization point before the error
第12頁 200417217 發明說明(9) 以及再同步點建立點之間的資料即被抛棄。、士 對於有效、未經加密之MPEG-4内容為獨一無^些標諸保證 概念作用於乾淨的原始内容可以行得通,曰的。雖然此 加密過之内容卻不能適用得好。不管是使 ^對於編碼後 一是所有訊息通通強行加密,此一現象似乎5擇性的加密 此事實如此,因為當合法有效的乾淨原始内#有效適用。 再同步化標誌時,此概念不再對加密過的可能模擬 更重要的是儒-4並未公開可對該等資訊;之 一予以加密,使解密動作可獨立於其他 主乂其中之 來,如果發生資料丟失,就需I …换 即進行’·如此 τ π穴就而要有稷雜但卻當3 τ队a 的錯誤回復技術以重建整個資訊,狹卩㊉疋不恰吾 密。 ’,、、後才可能由客戶機解 在本發明一較優實施例中,該々 少一個具有週期性特定值的密鑰。、11即被加密係利用至 如此一來,對照於分散内容 改善後較佳的安全性。 、枓之在碼为析,即得到 較好的是,各個再同步桿古士 號。序號之使用提出了環繞該:一個/ 一的序 機存取進入該加密的媒體運:::a :戶有問題’以容許隨 ^體相關聯之週期性通話密:能;J:τ密碼架構,使與 賴性強加於資料内容分配:σ v化,而不會將狀態依 在使用者進入已加密;】:統:發送端或是接收端。 該MPEG-4位元流語法在其^ =執仃隨機搜尋之情況下, 步化並不提供明顯的支接 型式下,對解密過程之再同 在該内容階層,MPEG-4並不指 200417217 發明說明(ίο) 疋1何可罪的連貝性或排序的,可能於解密時需仰賴的情 報為料同步刀層情報資料之使用是疑難的,因為傳統上 所有SL情報資料在解密之前即被拋棄。讥情報資料的保存 ^傳送至一 I PMP工具,將對終端機執行過程表現出顯著的 障礙。時序之情報資料無法用於同步化,係因DTS/C丁s可 能隨著資料内容被保存的時點至該内容被消耗的時點而改 變0 傳統上,媒體格式已使用顯式排序情報資料及/或一致 的資料封包尺寸,以便有助於加密/解密處理過程。 m=eg-4媒體也可能局部重放m兄下並無傳送動作參 料。= = 基準的轉換至傳送層之排序情報資 存時並不能辨認。 卩為此-情報資料在該媒體被留 一個唯一的序號之可釗 有效管理。一個序號二利,密鑰週期性轉換之 器運送出去,其間係= 裝並由-媒細 (諸如攜帶於MPEG-2或存放式仉器獨立運送密銘 τη/ Λ ^存放於dvd/cd-r〇m之媒护以只产 IP(網際網路通信協定)網路上媒體以及在 情報資料之出現亦容許在 同可 )°唯一的序列 i運流。 达壬何媒體之前能送出整個轻 雖然該MPEG-4 IPMP二欠 話密鑰之能力,㉟是該MPH運流具備運送頻帶内週期通 徑,讓運送新密鑰之時庠a 標準部不能提供一可靠途 聯。 了序侍以和特定媒體存取單位相關 200417217 五、發明說明〜 ---— *媒體時間(DTS/CTS)無法用於此途,係因如此做可能從 二厂内容受保護的時點改變成為該資料内容被消耗的時 Μα 0 ,者’攜帶解密密餘之媒體運流與1 ΡΜΡ資訊運流可能 =各種情況,包括運送時的抖動不穩1包遺失或網路 機“而ΐΓ:ίΡΜΡ資訊運流係由不同的飼服器送給客戶 不可:的記達成緊湊嚴格的同步化幾乎將是 的喪失,即使是一密输時二;的/餘。同步化 受。 之早或框,也完全不能接 —較好的實施例根據本發 —包裝封套,將夂加丄个^月所迤万去,又包括了增加 的序號。 、 〇狁育訊裝入其内,並給予一個唯一 供其相關情^報套/ 料‘放 廿置於該資訊之前或四周的資料,提 藉由使用帶』唯=於其後的尾部,或是二者兼具。 』歸屬於資訊中、之包$封套’’關排序之情報資料 同步化情報資料之i —資訊節;其不必需要攜帶附有顯性 最好是,各個步化標ΐ: 如此,考;t到為7 7序號係以自我表述之格式提供之。 長度的 為了減少資料之附加,這些序號可以是可變Page 12 200417217 Invention description (9) and the data between the resynchronization point establishment points are discarded. This is the only guarantee for valid, unencrypted MPEG-4 content. Some guarantees apply. The concept works on clean, original content. Although this encrypted content does not work well. Regardless of whether or not ^ is used for encoding, all messages are forcibly encrypted, this phenomenon seems to be selective encryption, and this fact is true, because when the legal and effective clean original # is validly applied. When re-synchronizing the logo, this concept no longer simulates the possibility of being encrypted. What's more important is that RU-4 has not publicly disclosed such information; one of them is encrypted so that the decryption action can be independent of other masters. If data loss occurs, I will need to… instead, so that τ π points need to be mixed but used as the error recovery technique of 3 τ team a to reconstruct the entire information. ',,, and later can only be resolved by the client. In a preferred embodiment of the present invention, this key has at least one key with a periodic specific value. , 11 is used by the encryption system in this way, compared with the improved security of distributed content. According to the analysis of the code, it is better to get each re-synchronous rod Gu Shi. The use of the serial number proposes to surround the: one / one sequencer access to the encrypted media: ::: a: the user has a problem 'to allow periodic passwords associated with the body: Yes; J: τ password The structure imposes resilience on the distribution of data content: σv, without depending on the user's entry into the encrypted;]: System: sender or receiver. In the case of MPEG-4 bit stream syntax, where ^ = performs random search, stepping does not provide an obvious type of connection. The decryption process is again in the content hierarchy. MPEG-4 does not refer to 200417217. DESCRIPTION OF THE INVENTION (ίο) 疋 1 What is the sinister nature or the ordering, which may depend on the decryption of the information in the decryption? It is difficult to synchronize the use of knife-level intelligence data, because traditionally all SL intelligence data is decrypted before decryption. being abandoned.讥 Preservation of intelligence data ^ Transfer to an IPMP tool will show significant obstacles to the execution of the terminal. Time series intelligence data cannot be used for synchronization because DTS / Cs may change from the time when the data content is saved to the time the content is consumed. Traditionally, media formats have used explicit ordering of intelligence data and / Or consistent data packet sizes to help with the encryption / decryption process. The m = eg-4 media may also partially replay m without transmitting action parameters. = = The transfer of the benchmark to the sorted intelligence of the transport layer is not identifiable.卩 For this reason-intelligence materials are left in the media with a unique serial number for effective management. A serial number of two benefits, the key is periodically converted by the device, during which = installed and by-the media details (such as carried in MPEG-2 or storage type device independently transported secret τη / Λ ^ stored in dvd / cd- The media protection of 〇m is based on the production of IP (Internet Protocol) network media and the emergence of intelligence data. The only sequence i is allowed. Darren Ho Media was able to send out the entire light although the ability of the MPEG-4 IPMP second default key, that is, the MPH stream has a periodic path in the transport band, so when the new key is transported, a standard department cannot provide A reliable way. It is related to specific media access units. 200417217 V. Description of the invention ~ --- * * Media time (DTS / CTS) cannot be used in this way, because it may change from the time when the content of the second factory is protected to this When the content of the data is consumed, Mα 0, the person's media stream with decryption and 1 PPM information stream may be = various conditions, including jitter instability during delivery, 1 packet missing or network machine "and ΐΓ: ίΡΜΡ Information flow is sent to customers by different feeders. It is almost impossible to achieve compact and strict synchronization, even if it is lost in a tight way; if it is lost, the synchronization will be accepted. Early or box, It ca n’t be connected at all—a better embodiment. According to the present invention—the packaging envelope will add 10,000 months to it and include the added serial number. 〇 狁 讯 讯 into it and give a unique For its relevant information ^ report sets / materials' put the data placed before or around the information, by using the band "only = at the end after it, or both." Belong to the information, the Synchronization of the information of the package `` envelope '' I-information section of the report materials; it does not need to be carried with explicit information. It is best to indicate the steps: so, test; t to 7 7 serial numbers are provided in a self-explanatory format. The length is to reduce the information. In addition, these serial numbers can be variable
200417217 五、發明說明G2) 依照本發明所述方法中較好的實施例更包含產生至少 一項的密鑰資訊;各個密鑰資訊攜帶資料鏈結至一密餘數 值,至少一個唯一的序號被加進資訊内,以對至少該資訊 之一部份啟動解密程序。 此一情報資料可以用來將密鑰資料與存取單位資料相 聯結至任意粒度(即間隔尺寸),而不管接收終端機計時器 之解析度。 ,,口口 依照本發明所述方法中一有利的實施例,更包括用到 使用迴授之密碼模態的加密程式對資訊節加密;其中該加 $私式係於各個資訊節之起頭處重新起始。 迴授之使用(又以鏈接而聞名),可多提供 ==明= 加密)資料段不會被加密成=一= 個被加密之資1 叮、士 即可保祖各 穷π目二即可被獨立進行解密。超過一 4 植而具有相同產物或通話密益=筆貝成之加 — 用顯式或隱式初始化引寡去r 了 ν1丄 灯了避免全面深入使用加密程式。引導者⑼可被採 靶奈爾先生(Schneie;r> β , -些密碼系統,其提出隨機存耆應用密碼學”中描述 題。加密程式及以非鏈結力程j呈多樣化之議 餘=作或是缺損環境下亦不合執拉恶能符合不增加冗 ::模態(ECB)對於 ;執仃不佳之標準。電子式 因其賢料型樣未予隱藏(:=;】以不,處,係 _____ 貝料&即意謂同一的 第】6頁 200417217 五、發明說明(13) 明文資料段) 在前次所提實施例之較佳柄决古々山 號在區隔一資訊節與另一資气節之異^中,一個唯一的序 用來作為初始動作之引導: = 步犧裡’係被 密。 以對該另一資訊節進行加 如此,在資料丟失或是進入據辨 該解密處理過程可以被同步化。’、-思、搜尋之情況下, 該等技術諸如ECB + 0FB (電+绝復答 以及帶有隱式iv ±成之CBC ( 出迴授模態) 坪何-個都會增加在缺損環』下;;=段賴,其 作。由該資訊某些特性生成障土生的几餘工 有未加密明文被曲解或廢棄。 二貝二丟失就會導致所 態無法執行自a同步化,但在廣;二二及其相關模 己的,小錯誤造成的傷害。 (用為限制該序號自 可/橫V全^之變化很大1前該辦法 高的簡易演d:;;作提供支援。$可能需要效率 ’…去,並且k供可以接受的安全水 : 200417217 五、發明說明(14) 運流加密程式是理想的解決辦法,但是需要呈 式排序情報資料,而本發明此一實施例所提供 依照本發明另一種外貌,係提供一伺服器,使 護之資料,其將資料内容編碼並排列成為資訊 明所述方式而產生者,能予解密之;其中該词 來轉換至少一密鑰資訊,各密鑰資訊攜帶資料 加在資汛上的唯一序號連結至一密绩數值,而 使该資訊之一部份能予解密,以回應客戶終端 連接至伺服器而發出之需求。 如此,該密鑰資訊係由各別的伺服器分發: 分發加密内容之功能與能啟動内容解密之宓X餘 配動作有所分隔。這樣也容許—不同實體二處 制该資料内容之解密動作。 依照本發明另—種外貌’係提供一系統,以加 保護數位資料;將内容編碼並排列成為資訊, 之客戶終端機之解碼器應用程 將士筆貝讯由組合語言程式翻譯為解碼器應 語έ程式,該系統係配置為: 由之媒體檢索資訊;對該筆資訊 ^^ ,供該加岔資訊為某種格式之輪 含:標題與-表成包 路ί伤,而至少一標題包含情報資料,有關i 務…由資料封包之表身將各筆資訊由:: 現隱式或顯 即為後者。 得、經加密保 ,藉由本發 服器係安排 將至少一個 該數值至少 機經由網路 而容許對 資訊流之分 理掌管與控 密碼產生受 各筆資訊可 式解碼,以 程式之機器 至少一部份 出資料,該 為一至少包 含該資訊之 動用戶端服 語言程式翻200417217 V. Description of the invention G2) According to the preferred embodiment of the method according to the present invention, it also includes generating at least one key information; each key information carries a data link to a secret value, and at least one unique serial number is Added to the information to initiate a decryption process on at least a portion of the information. This intelligence data can be used to link key data with access unit data to any granularity (ie, interval size), regardless of the resolution of the receiving terminal timer. According to an advantageous embodiment of the method according to the present invention, the method further includes encrypting the information section by using an encryption program using the password mode of the feedback; wherein the plus private type is at the beginning of each information section. Restart. The use of feedback (also known as a link), can provide more == Ming = encrypted) The data segment will not be encrypted into = one = encrypted assets 1 Ding, Shi can protect each ancestor. Can be decrypted independently. More than one and four plants with the same product or call secret = pen shell plus plus — use explicit or implicit initialization to remove the ν1 丄 lamp to avoid the full use of encryption programs. The guide ⑼ can be targeted by Mr. Neer (Schneie; r > β, some cryptosystems, which proposes random storage and applied cryptography "described in the problem. Encryption programs and non-linking force j are diversified I = not working or not in a defective environment. It is not compatible with the pull. The bad energy meets the requirements without adding redundancy :: Modal (ECB). The standard of poor execution. The electronic type has not been hidden because of its type of material (: =;). No, here is the _____ shell material & meaning the same page] 6 pages 200417217 V. Description of the invention (13) Plain text section) The best example of the embodiment mentioned in the previous time is the Gushan Mountain. In the difference between one information section and another resource section, a unique sequence is used as a guide for the initial action: = step sacrifice 'is secret. In order to add to this other information section, the data is lost Or it is determined that the decryption process can be synchronized. In the case of ', -thinking, searching, these technologies such as ECB + 0FB (electric + absolute answer and CBC with implicit iv ± Cheng (Modal grant mode) Ping He will increase under the defect ring ;; = Duan Lai, its work. Some characteristics of this information The unencrypted plaintexts generated by the obstacles were misinterpreted or discarded. The loss of Erbei Er will result in the inability to perform self-synchronization, but it is widely used; Er Er and its related molds, minor errors caused damage. (To limit the change in the serial number from ok / horizontal V to ^ 1, this method is a high-performance simple d: ;; to provide support. $ May need efficiency '... go, and k for acceptable safe water : 200417217 V. Description of the invention (14) The stream encryption program is an ideal solution, but it needs to sort information information formally. According to another aspect of the present invention provided by this embodiment of the present invention, a server is provided so that Protected data, which encodes and arranges the content of the data into a method described in the information statement, which can be decrypted; where the word is used to convert at least one key information, and each key information carries the unique information added to the asset. The serial number is linked to a secret value, so that part of the information can be decrypted in response to a request sent by the client terminal to connect to the server. In this way, the key information is distributed by each server: The function of distributing encrypted content is separated from the 余 X spare action that can initiate content decryption. This also allows—different entities to process the decryption action of the data content in accordance with another aspect of the invention. A system is provided to Protect digital data; encode and arrange the content into information, the decoder application program of the client terminal translates the Speicher Beixun from a combined language program into a decoder response program. The system is configured to: retrieve information from the media ; For this piece of information ^^, for the round of information in a certain format, including: title and-table into a package, and at least one title contains intelligence information, related i ... Each piece of information is: The latter is implicit or explicit. The server is encrypted and guaranteed. With this server, at least one of the values is arranged through the network to allow at least one of the information flow to be managed and controlled. The password is generated and can be decoded by each piece of information. Part of the output data should be a mobile client server language program containing at least the information
第18頁 200417217 - ———II —— 五、發明說明(13) 明文資料段)。 在前次所提實施例之較佳衍生方式中,一一的 資:節與另一資訊節之再同步化標钱裡,係被 :來作為初始動作之引導者,以對該另—資訊節進“皮 兮:Λ’在資料丟失或是進入媒體隨機搜尋之情況下, 该解岔處理過程可以被同步化。 (電子編碼薄模態+輸出迴授模態) 仵付成之CBC (加密程式資料段鏈結),复 :何:二會在缺損環境下執行不佳產生的冗餘工、 n =貝汛/、二特性生成隱式1 V (初始化引導者)係乎右 問请,因為該IV資料的一個小夢m J m十有 有未加密明文被曲解或廢辛。^貝i失就"¥致所 態無法執行自我同+於+有許夕加役程式及其相關模 有吸弓丨力。現在,ί有、1:廣泛的評估標準下卻顯得很 料丟失戋是、隹 达二必須被排除,只不過因為在資 2=:::部份在此未彳 防止未加密明文完=S 2二,而未能單獨提供任何保護以 j施。與再同步二:自己提供給錯誤改正 己的二小錯誤造成即可-起用為限制該序號自 可對橫跨全部在,複雜度與數值上之變化很大。目前該辦法 高的簡易演算』,::二:作提供支援。這可能需要效率 纟且^供可以接受的安全水準。附加: 第17頁 200417217 五、發明說明(14) 運流加後、程式是理想的解決辦法,但是兩Page 18 200417217-——— II —— V. Description of the invention (13) Text in plain text). In the preferred derivation of the previously mentioned embodiment, the resynchronization of the funds: section and another information section is marked as: the guide of the initial action to the other information "Ji Xi: Λ 'In the case of data loss or random search of the media, the solution of this bifurcation process can be synchronized. (Electronically encoded thin mode + output feedback mode) 仵 付 成 之 CBC ( Encryption program data segment link), complex: Ho: Erhui will perform redundant work due to poor execution in a defective environment, n = Bei Xun /, the second characteristic generates an implicit 1 V (initialization guide). Because a little dream m J m of the IV data has unencrypted plaintexts that have been misinterpreted or abolished. ^ Bei missed " ¥ Cause state can not perform self-identification + Yu + You Xu Xi addition program and its The relevant mold has a suction force. Now, ίYes, 1: It seems to be lost under a wide range of evaluation standards. Yes, 隹 Da Er must be excluded, only because the capital 2 = :::: part is not here.彳 Prevent unencrypted plaintext completion = S 2 2 and fail to provide any protection separately to apply. And re-synchronization 2: Provide yourself You can correct the two minor errors caused by mistakes-it can be used to limit the sequence number. The complexity and value of the sequence can vary greatly. At present, the method is simple and simple. Support. This may require efficiency and an acceptable level of safety. Additional: Page 17 200417217 V. Description of the invention (14) After the flow is added, the program is the ideal solution, but two
〜鬲要S 式排序情報資料,而本發明此一實施例叱1 J q提供 依照本發明另一種外貌,係提供一伺服 ’、 裔,你 護之資料,其將資料内容編碼並排列成為次^ 明所述方式而產生者,能予解密之;其;,°κ 至少一密鑰資訊、,各密鑰資訊攜帶;: 加在負说上的唯一序號連結至一密餘數值 使該資訊之一部份能予解密,以回應客而 連接至伺服器而發出之需求。 、、、而 如此,該密鑰資訊係由各別的伺服器八义 分發加密内容之功能與能啟動内容解密刀6發 配動作有所分隔。這樣也容許一不同密鑰 制=資料内容之解密動[ 只體得處 依照本發明另一種外貌,係提供一系 =數位資料;將内容編碼並排列成為資:加 將客戶終端機之解碼器應用程 3二程式,該系統係配置為: ’益應用 ,:,器可讀取之媒體檢索資訊; 格=:密·,並提供該加密資訊為 3育訊 -部份…ί 各表身至少包 接八 至夕一標題包含情報資料,女 務介面,由咨社土α Α 士 A 十有關啟 由貝枓封包之表身將各筆資 又 貝讯由組合 現隱式或顯 即為後者。 得、經加密保 ,藉由本發 服器係安排 將至少一個 該數值至少 機經由網路 ,而容許對 資訊流之分 理掌管與控 密碼產生受 各筆資訊可 式解碼,以 程式之機器 至少一部份 出資料,該 為一至少包 含該資訊之 動用戶端服 語言程式翻~ 鬲 S-type sorting information, and this embodiment of the present invention 1 J q provides another appearance according to the present invention, which provides a servo, data, and protection information, which encodes and arranges the content of the data into secondary ^ Produced by the method described, can be decrypted; its ;, ° κ at least one key information, each key information is carried ;: the unique serial number added to the negative is linked to a redundant value to make the information Part of it can be decrypted in response to the client's request to connect to the server. The key information is separated from the function of distributing the encrypted content by the separate server Yaya and the action of enabling the content decryption knife 6 to be distributed. This also allows a different key system = decryption of the data content [only in accordance with another appearance of the present invention is to provide a series of = digital data; encode and arrange the content into data: plus the decoder of the client terminal The application program is the second program. The system is configured as: '益 应用,:, and media retrieval information that can be read by the device; Grid =: Secret, and provides the encrypted information as 3 Yuxun-part ... ί Each body At least the title of the eighth to the first day contains information and information on women's affairs. It is covered by the body of the consultation agency α Α 士 A A. The body of the package enclosed by the envelope is hidden or explicit. the latter. The encryption server guarantees that the server will arrange at least one of the values to pass through the network at least, and allows the management and control of the information flow to be generated. The password can be decoded by each piece of information. Part of the output data should be a mobile client server language program containing at least the information
第18頁 200417217 五'發明說明(15) 譯為解碼器應用程式之機器語言程式。其中該系統配置成 為將各筆資訊分隔為第一與至少再另〆個資訊節,對該至 少一資訊節予以加密,加密方式係使其得與其=資訊節獨 立進行解密;並且組合該加密過的資訊,其^合方式包括 加入一再同步化標誌,將一資訊節與其相鄰^訊^分開, 以及將一顯式同步化序列納入至少另外其他貝訊郎之内。 此系統在實質上安排成為實行以上所述本發明施行方 法之各個不同實施例,並且提供相關有利之成效。 依照本發明另一種外貌,係提供一分配數位資料之方 、去’將内容編碼並排列成資訊之資料經由網路由一伺服器 分配至一或多個客戶終端機,各筆資訊玎由客戶終端機之 解碼器應用程式解碼,此所謂之方法包括: 將多數資料封包由該伺服器經由網路傳送至該伺服器之網 路介面,各封包至少包含一標題與一表身,各表身至少包 含貢訊之一部份;將各個資訊提供給安裝於該伺服器上一 ,信協定堆疊内二階層之間一連串服務介面(至少一個)之 f二者,各服務介面組態配置為將至少一封包標題加於該 =料封包編螞情報資料中,以使客戶機得以處理該封包之 =部:’本方法另包含傳送資料封包,封包至少包括一 面由相關情報資料,有關啟動用戶端服務介 解满=2 之表身將各筆資訊由組合語言程式翻譯為 ♦身用程式之機器語言程式。其中之封包係帶著封包 :外各r ΐ丄表身包括一個第一與至少再另一個資訊節, 即L 3 —再同步化標誌,將—資訊節與其相鄰資訊 m 第19頁 200417217 五、發明說明(16) 節分開,又包括一顯性之同步化序 破加密,加密方式係使其得與其他資j其中至少一資訊節 如此便提供一分配資料内容之方貝汛節獨立進行解密。 實施例產生資料内容,係以加密媽法’使得利用其法之 且依照本發明將内容編碼。這樣特生又保護數位資料’ 力,以對抗網路引發的錯誤與跳動%有利於提供恢復能 依照本發明另一種外貌,係提不穩的問題。 服器,將内容編碼並排列成資訊之、次~分配數位資料之伺 器分配至一或多㈤客戶終㈣,各^經由網路由一伺服 之解碼器應用程式解碼,此所葦貧訊可由客戶終端機 J將多數資料封包由該飼 包括: 各封包至少包含一舞命一主ώ由網路傳送之網路介面, —部Τ 4 /、 表身’各表身至少包含資部之 4伤,该伺服器另又包括 表身至夕° 3貝汛之 之—連串服務介面(至通=協定堆疊内二階層之間 戶機得以;該資料封包編碼情報資料I以使客 得以傳送至w、^虹G之剩餘部份;該伺服器之組態配置為 資料,有關 ^ ^題之資料封包,標題包含相關情報 筆資訊由組上Ϊ!:端服務介面,由資料封包之表身將各 •立式。直中钤=σ 式翻譯為解碼器應用程式之機器語言 身之資料封Γΐ器之組態配置為得以分配具有一封包表 節,各個另外的^ f包括一個第—與至少再另一個資訊 相鄰資訊節八M即匕含一再同步化標誌,將一資訊節與其 少其中一節二丄又包括一顯性之同步化序列,該資訊至 σ在’加密方式係使其得與其他資訊節獨立Page 18 200417217 Five 'invention description (15) Translated into the machine language program of the decoder application program. The system is configured to separate each piece of information into the first and at least one other information section, and encrypt the at least one information section. The encryption method is such that it can be decrypted independently from the information section; and the encrypted information is combined. The method of combining information includes adding a re-synchronization flag, separating an information section from its adjacent information, and including an explicit synchronization sequence in at least one other Besslang. This system is essentially arranged to implement various embodiments of the method of implementation of the present invention described above, and provides related advantageous results. According to another aspect of the present invention, a method for allocating digital data is provided, and the data that encodes and arranges the content into information is distributed to one or more client terminals via a network server, and each piece of information is provided by the client terminal. The decoder's decoder application program decodes the data. This so-called method includes: transmitting most data packets from the server through the network to the server's network interface. Each packet contains at least a header and a body, and each body at least Contains a part of GongXun; provide each information to both of a series of service interfaces (at least one) between the two layers in the protocol stack, each service interface configuration is configured to configure at least A packet header is added to the information package to make the client process the packet: 'This method also includes transmitting a data packet, and the packet includes at least one side of relevant information from the relevant information about starting the client service. The body of Jiejie Man = 2 translates each piece of information from the combined language program to the machine language program of the personal program. The packet is with a packet: the outer r ΐ 丄 body includes a first and at least one other information section, that is L 3 —resynchronization flag, will—the information section and its adjacent information m page 19 200417217 5 The invention description (16) is divided, and it also includes an explicit synchronization sequence to break the encryption. The encryption method is to make it independent of at least one of the other information sections so that it can provide a distribution of data content. Decrypt. The embodiment generates the data content by encrypting the content, so that the content is used and the content is encoded according to the present invention. This feature also protects the digital data ’force against network-induced errors and beatings. It is conducive to providing recovery energy. According to another aspect of the present invention, the problem of instability is raised. The server encodes the content and arranges it into information. The server that distributes digital data is distributed to one or more clients. Each server decodes the information through a decoder application program that is routed through the network. The client terminal J includes most of the data packets from the feed. Each packet contains at least one network interface that is transmitted from the Internet to the host, and the main body includes at least 4 of the data. Injury, the server also includes the watch body to the evening ° 3 Bei Xun Zhi-a series of service interfaces (to pass = client computers between the two levels in the agreement stack; this data packet encodes intelligence data I to enable customers to transmit Go to the rest of w, ^ Rainbow G; the server is configured as data, the data packet about the ^ ^ title, the title contains the relevant information pen information from the group 由!: End service interface, from the data packet table The body will be vertical. The straight 钤 = σ type is translated into the machine language of the decoder application. The configuration of the data envelope is configured to be allocated with a packet table section. Each additional ^ f includes a first- Neighboring information with at least one other piece of information The message section 8M means that it has a re-synchronization flag, and it includes an information section with one less section and two explicit synchronization sequences. The information to σ in ’encryption method makes it independent of other information sections.
第20頁 200417217 五、發明說明(17) 進行解密。 此一伺服器係有用於 配方法。 員订该付合本發明之資料内容分 依照本發明另一種外 〃 料之客戶終端機,將内六* ’係提供為接收並處理數位資 可由解碼器應用程式解媽 j並排列成為資訊,各筆資訊 -為接收多數資料封包之介二包:· 一表身;該終端機另又包人二、’ f封包至少包含一標題與 一連串服務介面(至少一% 3通化協定堆疊内二階層間之 該封包移去至少一封包,各服務介面之組態配置為由 標題之情報資料處理 並利用編螞於該移去之封包 面,其組態配置為由至餘部份;包括-服務介 語言程式翻譯為解碼器應用程將該•資訊由組合 含ί該封包之至少-標題内之情報語言程式,利用包 組態配置為接收資料封包 、厂。其中該終端機之 少再另一個資訊節, L表身包括一個第一與至 古士、,將一資邡r *甘個另外的貢訊節包含一 Α π半於拆 :丄, 其相鄰資訊節分離,二 步化序列,错著定置兮 又包括一顯性之同 料,對各加密資訊取各資訊節資 ."、之各貪訊節插入其被摘取出之:丁 :密,並將經 假設該資訊在傳送時 ^ 、即位置。 能將該加密資訊恢復其大部曰:被資引訊%’則胃客戶終端機 得:::有資訊節被解密成原始的明::了錯誤將使 客戶機糸統能夠對每-個別資訊節定位:::’此係因該 並獨立於其他資Page 20 200417217 V. Description of Invention (17) Decryption. This server is used to configure the method. The data content of the present invention is divided into a client terminal according to another external data of the present invention, and the inner six * 'is provided to receive and process digital data. The decoder application can decode and arrange it into information. Each piece of information-the second package for receiving most data packets: · A watch body; the terminal also packs two people, the 'f packet contains at least a header and a series of service interfaces (at least one% of the two layers in the communication protocol stack At least one packet is removed from time to time. The configuration of each service interface is configured to be processed by the header's intelligence data. The configuration of the removed packet surface is configured to the remainder; including-service The language program is translated into a decoder application program. The information is composed of an information language program that contains at least the header of the packet. The packet configuration is used to receive the data packet and the factory. One of the terminals is another The information section, the L table body includes a first and the last ancient priest, and a resource 邡 r * Gan additional tribute section contains an Α π half and a half: 丄, its adjacent information section is separated, two-step sequence , The set-up includes an explicit material, and each encrypted information is extracted from each information savings. &Quot;, each corruption section is inserted into the extracted: D: secret, and it is assumed that the information is being transmitted Time ^, that is, the location. The encrypted information can be restored to most of the following: "Information is %%", then the client terminal of the stomach will get ::: An information section will be decrypted into the original Ming :: An error will make the client 糸The system can position each-individual information section :: 'This is because it should be independent of other resources
第21頁 200417217 五、發明說明(18) 一 一 Λ節對其進行解岔,也就是毋需其他資訊節密碼文或明文 之相關知識。 在一較佳實施例裡,該終端機組態配置為對立所接收 $密後之資料封包至少一部份進行重組;此係藉將各封包 軚題其中至少一個加入帶有被插入解密資訊節之表身,而 且疋在傳遞到該服務介面之前。 如八此,再同步化標言志之出現即容許資料封包之表身在 二;I面以貫打客戶機系統上通信協定堆疊之處理之 ,該協定堆疊可能為一網路通信協定堆 提增效率’並且允許所用的特別通信協料疊具有 最好是,該客戶終端機更包括—網路介面Μ 經網路由一伺服器接收資料封包,复 叹 乂便 含有網路位址之標胃,可辨識該客戶、义=含-定收件者。 尸、、、知機為該封包之預 在此變化例中,解密係完全在"堆疊之 — 即提供一普遍可用之條件式存取系統,只订。…如此 的終端機與網路通信協定。 、 …、關乎特定種類 依照本發明又另一種外貌,係 4收並處理數位資料之方法,將内容、種在客戶終端機 L各筆資訊可由解碼器應用程式解:馬1 列成為資 =客二終端機之一介面接收多數資m包括: 匕括一私題及一表身;各封包提供认—3匕,各封包至少 階層之間-連串服務介面(至少一’個;:j信:定堆疊内二Page 21 200417217 V. Description of the invention (18)-Section Λ solves the problem, that is, it does not require the knowledge of ciphertext or plaintext in other information sections. In a preferred embodiment, the terminal configuration is configured to reorganize at least a portion of the received data packet after receiving the secret; this is achieved by adding at least one of the packet questions with a decrypted information section inserted The body itself, and before it is passed to the service interface. If this is the case, the appearance of the resynchronization banner will allow the data packet to be in the second place; the I side will be handled by the protocol stack on the client system, which may be a network communication protocol stack. "Enhancing efficiency" and allowing the use of special communication protocol stacks. Preferably, the client terminal further includes-a network interface M to receive data packets via a network router to a server. , Can identify the customer, meaning = including-intended recipients. The body, the machine, and the machine are the predictions of the packet. In this variation, the decryption is completely stacked in the "quote"-that is, to provide a universally available conditional access system, only to order. … Such a terminal and network communication protocol. …, Related to a specific category According to yet another aspect of the present invention, it is a method of collecting and processing digital data. The content and types of information on the client terminal L can be interpreted by the decoder application: horse 1 column becomes capital = customer One of the interfaces of the two terminals receives the majority of information including: a private question and a body; each packet provides identification-3 packets, each packet is at least between layers-a series of service interfaces (at least one; : Two in a fixed stack
第22頁 弟一者,各服務介 200417217 五 、發明說明(19) '"" "一' ------—.— 面組態配置為由該封包移去至少一 移去之封包標題之情報資料處理該:丛利用編碼於 括一服務介面,其組態配置為由^少=封:之二2 ,又包 資訊由=言程式翻譯為解碼器應用程ί之機筆 式,利用包含在該封包之至少一標題内之吾:程 中,資料封包表身被接收,表身一 ' '、 一個 >、汛即,各另外的資訊節包含一 再另 資訊Πίί!資^離,又包括-“的ΐί化Γ :中:力贫:貝料藉由定置該再同步化標誌而被摘取;且 -、中各加l貝矾節係獨立於其他資訊 個經解密之資訊節被插入其被摘取出的資訊節:置而且各 一所此方产法姐係根據本發明而由客戶終端機實行之方法,而 貫貝上在錯誤後回復方面具備相同優點者。 依照本發明另一種外貌,係提供一可載入電腦内之電 ,程式,並具備潛力,於電腦内執行時,提供該電腦具有 符a本毛月之系統、符合本發明之伺服器或符合本發明之 客戶終端機之功能。 、依照本發明最後一種外貌,係提供一可載入電腦内之 電腦程式’並具備潛力,於電腦内執行時,使該電腦能執 ,Γ 一符合本發明之方法。 【發明内容】 則已述說為一内容級之加密通信協定而設之方法與系統。 接下來的敘述裡,為了解釋說明,許多特性詳細說明將被 提出’以便對目前本發明提供徹底的認識理解。然而,對One on page 22, each service introduction 200417217 V. Description of invention (19) '" " " 一' ------——.— The surface configuration is configured to be removed by the packet at least one removed The information of the packet header is processed by the following: the bundle is encoded in a service interface, and its configuration is configured by ^ 少 = 封: 二 2, and the information is translated by the program into a decoder application. In the process, at least one header included in the packet is used: in the process, the data packet table body is received, the table body '', one >, Xun namely, each additional information section contains repeated information. ^ Li, which also includes-": 化 中 :: Medium: Power poverty: Shell material is extracted by setting the resynchronization flag; and-, China and Canada are separated independently from other information. The information section is inserted into the extracted information section: the method is implemented by the client terminal according to the present invention, and Guan Bei has the same advantages in replying after an error. According to another aspect of the present invention, a computer, an electric program, and a program can be provided. The potential, when executed in a computer, to provide the computer with the functions of a system, a server consistent with the present invention, or a client terminal consistent with the present invention. According to the last aspect of the present invention, it provides a loadable A computer program 'into a computer' has the potential to enable the computer to execute when executed in the computer, a method consistent with the present invention. [Summary of the Invention] The method for a content-level encrypted communication protocol has been described. And system. In the following description, for the sake of explanation, many detailed descriptions of features will be presented 'in order to provide a thorough understanding of the present invention. However, the
第23頁 200417217 五、發明說明(20) 於在本領域技能熟練者,目前本發明將很顯然不需這些詳 細說明即可被實行。 在圖1裡,資料内容加穷备紅! Μ ^ / 益糸、、充1係用來以加密碼產生將 内容編碼之受保護數位資料。兮咨 貝丁十 3貝料可以是已經在同一系 統1上產生者,或是已經從一 1诎七 & 、乂攸其他來源接收者。不論是那 一種情形,該資料被排列成為資七 ^ ^ ^ / 4取兩貝讯。各筆資訊可由客戶機 系統2之解碼器應用程式解碼今次 、鮮竭。遠貪訊一詞係與編碼器庫 用程式及解碼器應用程式於資枓六她 /的應 ^ ^ 八%貝枓父換所用資料之單位有關 連。在一個將在本說明整個讲 踽#嗜夕邙自—I 用到的例子中,各筆加密 馬保口蔓之crfl心包含'一加密之Μ p F ρ /1 士 同4 士山之MPEG —4存取單元(AU) 3 (參看 圖4,5A及5B)。一存取置;於决 ^ 早儿係為一基本運流内資料之八 別逐個存取的部份。一美太、番a 个遇机円貝才十之了刀 , 土本運/;IL係指單音-媒體資料$ ;查 貝的動流,在壓缩声t户 αα _ 卡 貝tt之遷 實俨·兮二2 早一發源實體流至-單-目標 貝體,該堡縮層係於基本運 干日加 之間擔任轉釋,# ^ s ;,L 、馬表示法與解碼表示法 j %丨工符序,並將解 明亦可與其他型能資% 。然而要注意,本發 料封包。&心貝況—起使用,例如MPEG-2基本運流資 在某一實施例裡,由該資 / 碼加密資訊被傳遞iσ铪糸統1所產生之編 4那裏,並以網路介面連接至網路5。(圖1 ),而儲存 伺服器4下載而在跑兮 、’ 客戶機系統可夢由 元3被下載當該加密之 包)’而由可規劃 二。:料封包内(SL一封 邝構成。該SL-封Page 23 200417217 V. Description of the invention (20) For those skilled in the art, it is obvious that the present invention can be carried out without these detailed descriptions. In Figure 1, the content of the data is more red! Μ ^ / 益 糸, 充 1 are used to generate protected digital data that encodes the content with a password. Xi Ding Bei Ding Shi 3 The raw materials can be those who have already been generated on the same system 1, or have been received from other sources. In either case, the information is arranged as information ^ ^ ^ ^ / 4 for two bets. Each piece of information can be decoded by the decoder application of the client system 2 this time. The term Yuanxuanxuan is related to the use of encoder libraries and decoder applications in the application of data resources. In an example that will be used throughout the description of this ## 夕夕 邙 自 —I, the crfl of each encrypted Ma Baokouman contains' one encrypted MPEG p F ρ / 1 and the MPEG of 4 Shishan —4 access unit (AU) 3 (see Figs. 4, 5A and 5B). One access; decision ^ The early child is the eighth part of a basic stream of data. Do not access one by one. Yimeitai and Fana met the opportunity, and Shibei had no choice but to do so.; IL refers to the mono-media material $; Chabe's current flow, in the compressed sound t household αα _ Kabe tt's relocation Actually, the second and second generation entities flowed to the -single-target shell body earlier, and the contraction layer was used as a transposition between the basic transportation and the day of Canada, # ^ s ;, L, horse notation and decoding notation j % 丨 Work symbol sequence, and will explain that it can also be used with other types of energy%. Note, however, that this packet is packed. & Heart-shell condition—for example, MPEG-2 basic transport data. In an embodiment, the information encrypted by the data / code is transmitted to the σ4 generated by the iσ 铪 糸 system 1 and used the network interface. Connect to network 5. (Figure 1), while the storage server 4 is downloading and running, 'the client system can be downloaded from the element 3 as the encrypted package)' and can be planned 2. : In the material package (SL one letter SL. The SL-seal
能由一完整存取覃+ +之钛碭與一表身所構成。該表身可 仔取早凡或—部份存取單元 。亥表身叮 吨㈣. 200417217 五 -、發明說明(21) - 包隨後映圖對應到用於網路5内的封包袼 ΜΓ—2 運流封包、或UDP(使用者資料封包協議)。杏 :二-種该-貝料内容加密系⑹與第—個分配飼 : 之範疇之内。 也疋可能在本發明 在另一實施例裡,由資料内容加密系 加密資訊則儲存於一内涵運載媒體6,諸:的已編碼 DVD:_或其他適當的媒體。磁碟機7係用來 加费資訊由内涵運載媒體6裝載進客 、'^已、,扁碼 =中,情報資料係隨帶該存取單元料此實施 組合之(例如進入SL_封包)。此等情c取皁元並 機糸統2傳遞該存取單元至適 ^:谷許該客戶 那裡到正確的解碼器應用程式'的解碼公衝裝置’再從 來後。 P在匕們被由檔案讀出 在二者實施例中,該加密之 案内。MP4-檔案典型均崔* 早70係儲存於MP4-檔 格式係設計為,包含/P4之稽名延伸。該肝4棺案 具有彈性、可延伸之格\PEG_4媒體情報資料之呈現表示為 -里、編輯與呈現表示。:二二使得該等媒體容易交換、管 包括該表現之系統,或現表不可以是"局部侷限"於 交付機制。該播案格ίΐΐ,疋經由網路或其他運流傳送 協定互不相干,為_ L、= °又什為獨立於任何特殊運送通信 根據頻果電腦公司的,"^運±达卻使能作有效支援。此設計係 r、日τ (QuickTime)格式。 200417217 五、發明說明(22) 取好是,該資料内容加密系統丨對存取單 密一具有週期性㈣數值之 二,用一連串時變通話密鑰,也就是:該進:加 輪▲加岔。相同的加密模式可以用於影像、:鑰 體及貝料提供其内容階層之加密。這種存取單^加密方、 的例Ϊ將Ϊ Ϊί下提供。在此處所描述較佳實施例裡了將; 用對%式演算法,也就是解密密鑰與加密密鑰是一樣的 業内部網路-架構及網際網路〜架構都能滿 足選擇性加岔需求。(選擇性加密能令人滿意的例子可能 有低複雜度設施與只能保證加密〗—架構之低價值内涵,%然 而其他應用例可能只要求對組織結構或是移動向量之郝' 資料加密。) 月 據本發明所言,唯一的序號被加至資訊節中。所利用 之加岔係使該客戶機系統2於解密各資訊節時能獨立於其 他資訊節進行,也就是,不需用到包含於其他資訊節内之 資料。該資料内容加密系統1最少產生一密鑰資訊,各密 鑰資訊攜帶資料將至少有一唯一序號加到資訊鏈接至密鍮 J:值,使得該資訊至少部份能解密。 該密鑰資訊最好也格式化融入一MPEG-4基本運流,也 就是進入存取單元,而以另外別的基本運流識別字 (E S — I D)識別之。在Μ P E G - 4標準的術語裡,這些資訊被稱 為ΙΡΜΡ(智慧財產管理與保護)資訊。It can be composed of a titanium case with a complete access to Tan + + and a watch body. The watch body can be taken early or-part of the access unit. The body of the watch is torn. 200417217 V. Description of the invention (21)-The subsequent map of the packet corresponds to the packet used in the network 5 ΜΓ-2 transport packet, or UDP (user data packet protocol). Apricot: within the scope of the two-species-encryption system and the first distribution feed :. It is also possible in the present invention that in another embodiment, the data encrypted by the data content encryption system is stored in a content carrier medium 6, such as an encoded DVD: or other appropriate medium. The disk drive 7 is used to increase the fee information and is loaded into the guest by the content carrier media 6, '^ already ,, flat code = medium, and the intelligence data is accompanied by the implementation of the storage unit (for example, enter SL_packet). In these cases, take the soap unit and system 2 to transfer the access unit to the appropriate client: Go to the customer and go to the correct decoder application 'decoding public device'. P is read from the archives in both cases, in the encrypted case. MP4-files are typically Cui * stored in MP4-files as early as 70. The format is designed to include the extension of / P4. The liver 4 coffin case is flexible and extensible. \ PEG_4 The presentation of media information is represented by-li, editing and presentation. : 22 makes it easy for these media to exchange and manage the system that includes the performance, or the current manifestation cannot be " partial limitation " in the delivery mechanism. The broadcast case is ΐΐ 疋, 疋 、 L, = ° and is independent of any special transport communication via the Internet or other transport protocols. According to the frequency of the computer company, " 达 运 ± 达 却使Effective support. This design is in r, Japanese τ (QuickTime) format. 200417217 V. Description of the invention (22) The good thing is that the data content encryption system 丨 has a periodic value of two for the access ticket secret—using a series of time-varying call keys, that is: the entry: plus round ▲ plus fork. The same encryption mode can be used for image, key body, and shell material to provide encryption of its content hierarchy. Examples of such access slips ^ encryption side, will be provided below. In the preferred embodiment described here, the use of a pair-type algorithm, that is, the decryption key and the encryption key are the same. The intranet-architecture and the Internet ~ the architecture can meet the selective fork. demand. (An example where selective encryption can be satisfactory may have low complexity facilities and only guaranteed encryption—the low-value connotation of the architecture,%. However, other application cases may only require the organization's structure or motion vectors to be encrypted. ) According to the invention, a unique serial number is added to the information section. The used fork system enables the client system 2 to perform decryption of each information section independently of other information sections, that is, no data contained in other information sections is required. The data content encryption system 1 generates at least one key information, each key information carrying data adds at least a unique serial number to the information link to the key J: value, so that the information can be decrypted at least in part. The key information is also preferably formatted and integrated into an MPEG-4 elementary stream, that is, entering the access unit, and identified by another elementary stream identifier (ES-ID). In MPG-4 standard terminology, this information is called IPMP (intelligent property management and protection) information.
第26頁 200417217 五、發明說明(23) 在一實施例裡,該I PMP資訊係由第一分配伺服器4流 出。在另一實施例裡,該I PMP資訊運流係由客戶機系統2 由第二分配伺服器5下載之。另外也可能是,該IPMP資訊 可以包含於另一在密鑰運流上的檔案裡,密鑰攜帶媒體 9,各別分配之,例如CD-ROM、DVD-ROM、快閃記憶裝置、 電腦卡等等。 在某一實施例裡,該密錄數值係分別另外提供。在那 種情況下,該密鑰資訊包含鏈接至序號的指標,使該密鑰 可以由客戶機系統2檢索之。舉例而言,該密錄可以儲存 在攜帶媒體9之密鑰運流上,然而該I pmp資訊運流卻由第 二分配伺服器8提供。 在另一實施例裡,該密鑰資訊也是包括該密鑰數值。 I PMP資訊内誨澀難懂的資料可能以下方式之媒介與密鑰聯 結: <禮、餘:1 ES=1 seqNum.begin=l seqNum.end=54> 〈洽、錄2 ES:1 seqNum.begin=54 seqNum.end=169> 〈岔餘2 ES=1 seqNum.begin=169 seqNum.end=289> 攜帶一週期性通話密鑰之存取單元之DTS(傳送時間標 記:該存取單元名義上解密時間的指示點)可能超前而^ 乂相關被加密媒體AU(S)3(攜帶加密資料内容的資料)之 抵達。建議該IPMP資訊運流之DTS可領先一個密鑰循琿週 期。如此將可足夠容許網路跳動不穩造成的延誤,並容 在该客戶系統2之處作任何預先處理。 σ 以上給予的情報資料於是可用來將密鑰資料與内容存Page 26 200417217 V. Description of the invention (23) In one embodiment, the IPP information is streamed from the first distribution server 4. In another embodiment, the IPMP information stream is downloaded by the client system 2 by the second distribution server 5. It is also possible that the IPMP information can be contained in another file on the key stream, and the key carries the media 9, which are individually assigned, such as CD-ROM, DVD-ROM, flash memory device, computer card and many more. In one embodiment, the secret value is provided separately. In that case, the key information contains an index linked to the serial number so that the key can be retrieved by the client system 2. For example, the secret record can be stored on the key stream carrying the media 9. However, the IP stream is provided by the second distribution server 8. In another embodiment, the key information also includes the key value. The incomprehensible data in the I PMP information may be linked to the media and keys in the following ways: < Li, Yu: 1 ES = 1 seqNum.begin = l seqNum.end = 54 > 〈洽 、 录 2 ES: 1 seqNum .begin = 54 seqNum.end = 169 > 〈Chauge 2 ES = 1 seqNum.begin = 169 seqNum.end = 289 > DTS (Transmission Time Stamp: The Access Unit) of an Access Unit with a Periodic Call Key The indication of the nominal decryption time) may be ahead of schedule and the arrival of the relevant encrypted media AU (S) 3 (the data carrying the encrypted data content). It is suggested that the DTS of the IPMP information flow can lead a key cycle period. This will be sufficient to tolerate the delays caused by the jerky network and allow any pre-processing in the client system2. The information given above σ can then be used to store key data and content
200417217200417217
而不必去管接收端計 取單元資料相聯結至任何間隔尺寸 時器的解析度。 ^尤如前所提到的,該惟一序號的出現也容許該整體密 = 在任何媒體傳送之前即能送出。如此—纟,該媒體 二p T兀3之DTS就不再關係重大,而同步化即純粹在該 IPMP序號的數值上執行完成。 本發明可以在所有多媒體傳送系統裏發現應用例,而 破要求於其系統内利用週期性的密鑰對其資料(例如, MfEG 4 >料)執行有效的内容階層加密。此等包括異構性 璆境諸如涵覆ip網路之運流,以及mpeg — 4之傳送涵覆 MPEG-2運送,或是任何其他可能用來傳送MpEG_4内容之易 錯或免錯之運送機制。 誠如以上所示,本發明之一實施例係建基於一為保護 MPEG-4内容之架構上,其利用二個不同構想: -MPEG-4存取單元之保護封套;以及 -密碼再同步化標諸。 此一構想概念將在以下詳細討論。 特別參照圖4,資料内容加密系統1由一機器可讀之媒 體讀取一原始存取單元丨〇。在此例子裏,該原始存取單元 ▲ Ο分為三節’各自獨立加密,而形成已加密之存取單元 3 ;包括第一加密AU資訊節π、第二加密AU資訊節12以及 第三加密AU資訊節1 3。第一個再同步化標誌1 4被加到第一 加密AU資訊節1 2,以與第一加密AU資訊節1 1分開。第二^ 再同步化標誌1 5被加到第三加密AU資訊節1 3,以與第二加It is not necessary to control the resolution of the timer when the unit data of the receiving end is connected to any interval size. ^ As mentioned earlier, the appearance of the unique serial number also allows the whole secret = to be sent out before any media transmission. So — alas, the DTS of the media TP3 is no longer relevant, and the synchronization is performed purely on the value of the IPMP sequence number. The present invention can find application examples in all multimedia delivery systems, and breaks the requirement to perform effective content-level encryption of its data (for example, MfEG 4 > material) within its system using periodic keys. These include heterogeneous environments such as traffic over IP networks, and MPEG-4 delivery over MPEG-2 delivery, or any other error-prone or error-free delivery mechanism that may be used to deliver MpEG_4 content . As shown above, one embodiment of the present invention is based on an architecture for protecting MPEG-4 content, which utilizes two different concepts:-a protection envelope for the MPEG-4 access unit; and-password resynchronization Mark all. This conception is discussed in detail below. With particular reference to Figure 4, the data content encryption system 1 reads an original access unit from a machine-readable medium. In this example, the original access unit ▲ Ο is divided into three sections, each encrypted independently to form an encrypted access unit 3; including a first encrypted AU information section π, a second encrypted AU information section 12 and a third encryption AU Information Section 1 3. The first resynchronization flag 14 is added to the first encrypted AU information section 12 to be separated from the first encrypted AU information section 11. The second ^ resynchronization flag 15 is added to the third encrypted AU information section 13 to match the second addition
第28頁 200417217 五、發明說明(25) 禮、A U育郎1 2分開 處。 1 ·安全封套 喊16係置於加密之存取單元3起頭 在-本發明之示範實施例中 想成是一密碼的内裝封套, 本1明之安全封套可以 元(影像架構、聲音樣本、資”料^何包,好的MPEG-4存取單 /伺服器/所有人將個別存取單—I 提供保護。該發行人 資料内容。該等内容於是只能=呈裹入這些封套内而保護 接用戶才得拆封。封套具有^ 具有洽當密鑰/權限的直 且以許多密碼通信協定方不同樣式是很平常的,並 -.J封套運作。 。因此’本發明得以一般 本發明之示範實施例中 在一 於MPEG-4環境。此外,本發明可^、套^以特定定義用 號碼等等),藉由搓供、爾如〜 j用該封套之特性(序列 y- ^ ^ 八週’月雄、鑰的能力,並同時埶杆卩左德 存取,以實施"雙倍職務"。如 丨】守執仃Ik機 些廣泛使用的通信協定而運作,复’,,可以藉著_ 再同步化標諸14, 15),將構想(諸如 辦法,並以某種方式使用它;。起放入木構中而產生解块 以下所示標題16(概要圖示 、AU 3起頭之處: α 4)係置於各加岔存取單 200417217 五、發明說明(26) 0 版次= 00 E A 5 6 CRM 7 此攔保留 _序號(可變長度) 權限認證碼(n長度,可選翌、Page 28 200417217 V. Description of the Invention (25) Li and A U Yulang 12 separate. 1. The security envelope shout 16 is placed in the encrypted access unit 3. In the exemplary embodiment of the present invention, it is thought to be a built-in envelope of a password. The security envelope of the present invention can be used (image architecture, sound samples, information "Material package, a good MPEG-4 ticket / server / owner will provide protection for individual ticket-I. The content of the publisher's data. Such content can then only be wrapped in these envelopes and The protection must be unpacked by the user. It is common for the envelope to have a ^ with a proper key / authority and to use a variety of different cryptographic communication protocols, and the -J envelope works. Therefore, the present invention can be generalized to the present invention The exemplary embodiment is in an MPEG-4 environment. In addition, the present invention can be used for specific definitions, such as numbers, etc.), and the characteristics of the envelope (sequence y- ^ ^ Eight weeks' The ability of Yuexiong and Key, and simultaneous access to Zuo De, to implement the "double post". For example, 丨] Compliance with the widely used communication protocols and operation , Can be re-synchronized by Zhuo 14, 15), will conceive (Zhu Method, and use it in a certain way; .. put into the wood structure to generate a block. The title 16 shown below (summary illustration, AU 3 beginning: α 4) is placed in each add-and-receive order 200417217 V. Description of the invention (26) 0 edition = 00 EA 5 6 CRM 7 This block reserves _ serial number (variable length) authorization code (n length, optional 翌,
標題1 6包含以下欄位: 版次-二位元版次欄位17。第一版設定為〇。 —位元旗標18,表示該表身是否已加密(1)或是清零 (0)。請注意,只有表身部份加密。 位兀旗標19,表示該認證碼存在(1)與否(0)。如 在,該認證碼係與整個結構—#套16與存取單元au3 CRM -位元旗標20,表干ATiQ π,15存在⑴與否⑻。表不AU3内之密瑪再同步化標諸 攔位:i位數保留位元攔位21 -設為零。 各數元組中較低的七 各數元組之南次位元表示 ”虎之產生方法被認為超出J碼,攜配於序號欄位22。該 項地增加,此係因漢明件範圍。該數值可能是單 階加密標準(AES)造成顯著威$襲不致對计數器模態之南 設,係因其使用自我-表述:::、此欄位22的長度不予預 個值元係用於攜配該序列號石馬式Heading 16 contains the following fields: Version-Binary version field 17. The first version is set to zero. —Bit flag 18, indicating whether the watch body is encrypted (1) or cleared (0). Please note that only the body of the watch is encrypted. Bit flag 19 indicates that the authentication code exists (1) or not (0). For example, the authentication code is related to the entire structure— # 套 16 and the access unit au3 CRM-bit flag 20, indicating that ATiQ π, 15 exists or not. Representing the re-synchronization of Mimar in AU3 Blocks: i-bit reserved bits Block 21-Set to zero. The lower seven digits of each digit of each digit indicates that the method of generating tigers is considered to be beyond the J code, and is carried in the serial number field 22. This place is increased due to the scope of the Hamming The value may be caused by the single-level encryption standard (AES), which significantly prevents the counter mode from being set, due to its use of self-expression: ::. The length of this field 22 is not a predetermined value Yuan is used to carry the serial number Shima
第30頁 200417217 五、發明說明(27) 另一數元組的存在,而最後的數元組其最高有效位元 (MSB)設定為零。 •例如,數值3 5將表示如下: 11010111 00000010 權限認證碼-此為可選擇之非必需欄位(圖4中未顯 示)攜配一自我-表述之認證碼。該架構對所用之認證碼系 統體制係為不可知論的,但其係假定具有密鑰之亂碼 (HMAC)最為恰當。數位簽證最能迎合需求,但是假設現 況為,這些體制目前仍舊太昂貴而不會在此AU層級執行。 睛注意整個結構-標題丨6 + AU3係已認證。 —表身—原始的存取單元AU 10或加密的AU 3。在用到加 岔再同步化標誌14, 15之情況下,該加密Au 3將大於原始 的 A Ιί 1 〇 〇 2 ·密碼再同步化標言志 一為了啟動密碼的再同步化,標誌14,15各自攜帶某些 只J /化馆報貝枓23,2 4,以便於資料丟失4 /兄下谷許加密程式被,,重置,,。 斗以下係一於加密定義域内運作良好之密碼爯闾半仆才 遠。該標誌、係、以數元組排列,而上:之/馬再门^化本 罇長产、ό ^ ]而由1 6個零之後跟著一組 0^00 〇〇〇〇 〇〇〇〇 〇〇〇〇 χχχχ χχχχ 二際應用時,多個密碼再、 一存取單元Αϋ 3。位於存取:化禚“14, 15可被插入 於定位,也因此保證是唯—早70 AU 3内之標誌1 4,1 5〗 的。資料仍然發生衝突碰撞 200417217Page 30 200417217 V. Description of the invention (27) The existence of another byte, and the most significant bit (MSB) of the last byte is set to zero. • For example, the value 3 5 would be represented as follows: 11010111 00000010 Authorization Authentication Code-This is an optional non-required field (not shown in Figure 4) with a self-expression authentication code. This architecture is agnostic to the authentication code system used, but it is assumed that hash code (HMAC) with keys is the most appropriate. Digital visas best meet demand, but assuming that these systems are still too expensive to implement at this AU level. Pay close attention to the entire structure-the title 丨 6 + AU3 is certified. —Body—Original access unit AU 10 or encrypted AU 3. In the case where the re-synchronization flags 14, 15 are used, the encrypted Au 3 will be larger than the original A Ι 1 〇 02 · Password re-synchronization banner Zhiyi In order to start the re-synchronization of the password, the flag 14, 15 each carry certain J / Chemistry Reports 枓 23, 2 4 in order to facilitate data loss 4 / Brother Xiagu Xu encryption program was ,, reset ,,. The following is a password that works well within the crypto domain, and is only half a mile away. The signs, lines, are arranged in tuples, and the top: Zhi / Ma Zaimen ^ Huaben 罇 long production, ό ^] and 16 zeros followed by a set of 0 ^ 00 00 00 00 00 00 〇〇〇〇χχχχ χχχχ In the second application, multiple passwords, and an access unit Aϋ3. Located at access: "14, 15" can be inserted into the positioning, so it is guaranteed to be only as early as 70 AU 3 marks 1 4, 1 5. The data still conflicts and conflicts 200417217
事在統計上存有小 合可能產生如0 0 0 0 發生此等情況的可 利用逸出碼而完全 步化標誌、的出現係 内逸出碼的方式。 小可能性,此因所 0000 0000 〇〇〇〇 能性非常低,但標 排除。在如此一實 藉由逸出π而被宣 給之明文/密鑰之組 型式之密碼文。雖然 誌、模仿之可能性可以 施例裡,模仿之再同 告’以類似於C語言 二就於易差錯之環境之典型用法而言,一些再同步化桿 4, 15可被放置於一給定之存取單元Αυ 3之内。各 =化標誌14, 15之主體分別包含各自唯一的計數器25, 26, /、具備相同格式,並被用為安全封套内之序號。建議該 义=2 5, 26之計數由標題1 6所攜行之起始序號開始作單向 包含於該標題1 6内序號之毀損或丟失並不致造成加滋 存取單元AU3整個丟失。再同步化標誌内之序號最好為& 對值,而不要是指定於標題丨6内序列計數器被指定之差1巨 值。另外也很重要的是,確認後續標題之序號數值要 用在現有AU 3内最後一個序列號碼之值,以避免全面深二 使用加密程式。 一例具有數值3 5 1的再同步化標誌為: 0000 0000 0000 0000 1000 0010 〇1〇1 nll 在發生資料丟失的情況下,應定位出下個再同步標註, 並利用该標遠主體内之序列數值作為輸入進入I v (初始化 引導者)’重新啟動加密程式,可達到同步化目的。 【實施方式】Statistically, there are ways in which the emergence of internal escape codes can be completely stepped by using escape codes, which can produce such situations as 0 0 0 0. The possibility is small, so the performance is very low, but the standard excludes it. In such a case, a plaintext / key type ciphertext is declared by escape π. Although the possibility of imitation and imitation can be explained in the example, in the same way as the C language II in the typical usage of error-prone environments, some resynchronization bars 4, 15 can be placed in a given Within the access unit Αυ 3. Each of the = 14, 15 main bodies contains their own unique counters 25, 26, /, which have the same format and are used as serial numbers in the security envelope. It is suggested that the count = 2 5, 26 be counted from the starting serial number carried in the heading 16 as one-way. The destruction or loss of the serial number contained in the heading 16 does not cause the entire access unit AU3 to be lost. The serial number in the resynchronization flag is preferably the & pair value, and not the huge value specified by the sequence counter specified in the header. It is also very important to confirm that the serial number value of the subsequent title should be used in the value of the last serial number in the existing AU 3 to avoid the use of encryption programs. An example of a resynchronization flag with a value of 3 5 1 is: 0000 0000 0000 0000 1000 0010 〇1〇1 nll In the case of data loss, the next resynchronization label should be located, and the sequence in the body of the beacon is used The value is entered as I v (Initial Leader) 'to restart the encryption program for synchronization purposes. [Embodiment]
第32頁 200417217 五、發明說明(29) 1 ·加密 =2係根據本發明—較佳實施例所述加密處理過程之 器27係由一調和密鑰28、-序列號碼29及--=:索引30所構成。加密的計數器”係利用: 數值之密錄32所產生。加密之計數器以一清零之存取單元 = U。)資料段33加以斥或閘,而產生_加密之M資料段 ^階=密標準(AES) / Rljndael演算法已被選定作為媒 一 ί也。該加始、程式以計數器模態運轉,並利用該媒體内 附π之顯式計數器(序列號碼舆加密再同步化標誌)。 /Rijndael演算法被選定作為資料加密之新聯邦處理標 準(F I P S ),並被考慮取代過時的國家標準局資料加密標準 C^ES)及三重資料加密標準(TripU DES)標準。 门=加在;^準(A E S )演异法在受選過程中已經過為數玎觀 之禮、碼分析(破譯)。投注在AES之分析成果的水準與當時 在DES上的可堪比較。現可被廣泛接受的是,最有名的著 手方法為對密鑰空間進行詳盡徹底的搜尋。 AES某些重要精采部份為: -不需付專利稅且不保密。 輸出全世界都可得到。 ^谷許可變的128,192 & 2 5 6之密鑰與資料段大小。密鑰/ 貧料段長度之所有九種組合都可以。 在硬體與軟體程式執行速度上大幅改善超過DES : 8· 416 KB/s 於一 20MHz 80 5 1 200417217 五 、發明說明(30) 8.8 MB/s ^ _200 MHz Pentium ,些圖形係為事件控制段模態(ECB㈣以)所引用。計 數器模態只需再多一個斥或(X0R)運算,因此所增之額外 工作可以忽略。 +计數器模態過去由異步傳輸模式(ATM)網路高速加密之 Γ要2 f的,邊網路係要求加密演算之平行化處理。 十1 = L之加在、操作,係藉由將加密功能應用於 加之計數器2 7,以吝斗 口口士丄古為 lL 干^曰 被以斤^產生一早時填墊。此墊接著與明文一起 5 R)處理。解密操作是相同的。 叶數器模熊要卡名义、、, 、2之外,^ΐ t迗接收器除了共用通常的暗藏密鑰 暗藏保密的7 計數器。注意該計數器27並不需要是 為加密: c 1 — P1斥或E (計數器) 為解密:Page 32 200417217 V. Description of the invention (29) 1 · Encryption = 2 is the encryption processing device 27 according to the present invention-the preferred embodiment is composed of a reconciliation key 28,-serial number 29 and-=: Index 30. The "encrypted counter" is generated by: a secret record of 32. The encrypted counter is repelled or gated by a cleared access unit = U.) Data section 33 is generated or encrypted, and _encrypted M data section ^ level = secret The standard (AES) / Rljndael algorithm has been selected as the media. The addition, the program runs in the counter mode, and uses an explicit counter (serial number encryption and resynchronization flag) inside the media. / Rijndael algorithm was selected as the new Federal Processing Standard (FIPS) for data encryption, and was considered to replace the outdated National Bureau of Standards Data Encryption Standard C ^ ES) and Triple Data Encryption Standard (TripU DES) standards. ^ The standard (AES) variant method has passed the courtesy and code analysis (decoding) in the selection process. The level of analysis results bet on AES is comparable to that on DES at the time. It is now widely accepted The most famous method is to conduct a thorough and thorough search of the key space. Some important highlights of AES are:-No patent tax and no confidentiality. The output is available all over the world. 128, 192 & 2 5 6 key and data segment size. All nine combinations of key / lean segment length are possible. Significant improvement in execution speed of hardware and software programs exceeds DES: 8.416 KB / s in 20MHz 80 5 1 200417217 V. Description of the invention (30) 8.8 MB / s ^ _ 200 MHz Pentium, some graphics are referenced by the event control segment mode (ECB). The counter mode only needs one more OR or (X0R ) Operation, so the additional work can be ignored. + Counter mode used to be 2 f for high-speed encryption of asynchronous transfer mode (ATM) networks, and the edge network required parallel processing of encryption algorithms. 1 = The addition and operation of L is performed by applying the encryption function to the counter 2 7 and taking the bucket mouth mouth prince as ancient as lL. It is said to be filled with a catty ^. This pad is followed by the plain text. 5 R) processing. The decryption operation is the same. The leaf counter module bears the card name, ,,, and 2, except that the receiver has a secret 7 counter hidden by sharing the usual hidden key. Note that the counter 27 does not need to be for encryption: c 1 — P1 or E (counter For decryption:
Ci斥或E (計數器) 谷付號說明如下: 係—段加密程式之加密功能。 n .〃係岔碼文之第i資料段。 ,明碼文之第i資料段。 隹 '吊重要的一點是,相同的計數器不會重 (上x〇R)係广起奏器可接著對此二加密程式資料Μ ^ =)處理’而得到該明碼文二相關資料段之斥以結Ci rep or E (counter) Gu Fu number is explained as follows: It is the encryption function of the segment encryption program. n. The i-th data segment of the code system. , The i-paragraph of the plaintext.隹 'The important point is that the same counter will not be repeated (on x〇R). The wide starter can then process the two encrypted program data M ^ =) and get the refusal of the relevant data segment of the plaintext. To end
200417217 五、發明說明(31) 計數器模態之優點為: 1 · 軟體效率。由於該密鑰運流之產生與該資訊係獨立不 相干,所以先期處理可用於某些環境下。該時墊可於備餘 週期裡計算,即使在該媒體備便之前。而當媒體備便時, 僅只就與該填墊被斥或(X〇R )處理。如此在同代處理器上 將產出十倍於G b i t s / s之總輸貫量。 2.硬體效率。計數器模態可以完全平行化處理。各資料 段Cl,C2,…Cn可以同時被解密。 3 _隨機存取。沒有鏈結,因此不會為了解密C i而需仰賴 第Ci_l節。 一錯誤延伸僅限同一位元。密碼文之錯誤僅只限於明碼 文内該相關位元。這對應用在易損失環境之影像運流是個 非常令人滿意的性質。 5. 低複雜性。加密與解密處理均仰賴加密功能E()。當一 加密f式D() = E()-l之反逆方向與其"向前,,方向非常不 一樣時,這是一個重要的判定標準。這是對^忉乜“及 許多其他資料段加密程式的情況。如此使得硬體與軟體解 法覆蓋所佔空間非常小。 6. 安全性。與基本的資料段加密程式一樣安全。 ’密碼文#大小不致增力σ。暫且忽略顯式再同步標諸之 使用,该密碼文沒有擴展。 該加密,式已經對照-組恰當的工作著 作業:效力有所認知,也已經歷過由全世界密碼 之分析,而且被廣泛採用。該加密程式本身幾乎是普遍通200417217 V. Description of the invention (31) The advantages of the counter mode are: 1 · Software efficiency. Because the generation of the key flow is independent of the information, pre-processing can be used in some environments. The time pad can be calculated during the reserve period, even before the media is ready. And when the media is ready, only the padding is rejected or (XOR) processed. In this way, the total output of G b i t s / s on the same processor will be ten times. 2. Hardware efficiency. Counter modalities can be fully parallelized. Each data segment Cl, C2, ... Cn can be decrypted at the same time. 3 _Random Access. There is no link, so it does not depend on Ci_l to decrypt Ci. An error extension is limited to the same bit. The error of the cipher text is only limited to the relevant bit in the plain text. This is a very satisfactory property for image transport applications in vulnerable environments. 5. Low complexity. Both encryption and decryption processing rely on the encryption function E (). This is an important criterion when the inverse direction of an encrypted f-form D () = E ()-l is very different from its " forward, " direction. This is the case for ^ 忉 乜 "and many other data segment encryption programs. This makes the hardware and software solution coverage very small. 6. Security. As secure as the basic data segment encryption program. 'Crypt 文 # The size does not increase σ. For the time being, the use of explicit resynchronization tags is ignored, and the ciphertext has not been expanded. The encryption has been compared to the group of appropriate working books: the effectiveness is known, and it has also experienced passwords from all over the world. Analysis, and is widely used. The encryption program itself is almost universal
鼸III麵鼸 III surface
200417217 五、發明說明(32) 用的,也已經 該加密程式支 重要,因為理 異很大的各種 事達影碟。長 顯得過分誇張 採用單一參數 導體業供應商 將眾所週知知 岔碼糸統為自 y ,而且具有 同的局面,在 的資料節若有 解密的能力。 資料須假設確 性 早一位元 碼文内該相相 肓料段、多資 於此。該加密 ,供良好的性 理性全都很重 政策方針,而 降低複雜性。 密碼文大小與 由國豕標準與技術協會(N I S T)所接受認<。 援密餘長度至少為1 2 8位元者。可、變動丨生很 想上相同加密程式須能被參數化,以保護差 資料内容一從三分鐘的短片到好萊撝電影百 度大於128位元之密鑰對某些應用程式可能 ;為較長的密鑰支援係被認為是一項優點。 化的演算法也將經濟尺標之利益答應給了半 。本發明未使用晦澀難懂的加密程^ f或是 名的加密程式以模糊難解的模態來使用^本 我-同步化、不但提供隨機存取或搜尋能 =貧料丟失狀況恢復的能力。雖然這些是不 貫用上它們依賴相同的判斷標準:任 部份或全部缺少,並不會 义一 = ; 密資料之可靠的連續情報 碼文内一位元之錯誤僅會造成: 對應位兀錯誤)是非常重攻月 料段或無限多奂誤掩+ liL的對具有相同 程式為跨越廣泛計“'質二模式並不應用 能。密輸設定與軟體 要。演算法之選擇反映了"伴:舌至卜气與平行處 其可接受之安全認可特許择保田瘦至早—點"之 該密碼系统接征欠 ° ’、用以增加效率並 示統扣供之資料 卞I 該名碼文之大小相同咬接 _。所形成的 飞接近,而且任何多出200417217 V. Description of Invention (32), the encryption program is also very important, because it has a lot of reasons for all kinds of DVDs. It seems too exaggerated to use a single parameter. The supplier of the conductor industry will use the well-known code to self-y, and it has the same situation. If the data section has the ability to decrypt. The data must be assumed to be accurate. One phase earlier in the code text. The encryption, good sexuality and rationality all emphasize policy guidelines while reducing complexity. The size of the ciphertext is accepted by the National Institute of Standards and Technology (NI S T). The length of the security secret is at least 1 2 8 bits. It ’s possible that the same encryption program must be able to be parameterized to protect the poor data content. From a three-minute video to a Hollywood movie, Baidu ’s key larger than 128 bits is possible for some applications. A long key support system is considered an advantage. The algorithm also promised half of the benefits of the economic scale. The present invention does not use an obfuscated encryption program ^ f or a named encryption program to use the cryptic mode to synchronize, not only provides random access or search capabilities = the ability to recover from the loss of lean materials. Although these are inconsistent, they rely on the same judgment criteria: any part or all of it is missing, and it does not mean one =; a single-bit error in the reliable continuous information code of the confidential data will only cause: Error) is a heavy attack on the moon segment or an infinite number of false concealment + liL pairs have the same program to span a wide range of calculations. “Quality two mode does not apply. The settings for close input and software are required. The choice of algorithm reflects the" quotation " Companion: Tongzhi Buqi and its parallels are acceptable for safety approval. Baotian Shouzhimao-point " the password system access owed ° ', used to increase efficiency and show the information withheld 卞 I the name The size of the code text is the same bite _. The resulting fly is close, and any extra
200417217 五、發明說明(33) ^產安物全二題:都保持在最小。加密超過-筆資訊而只有同 性產物或疋通信密鍮是可能的,而且一定不會連累到安全 2.解密200417217 V. Description of the Invention (33) ^ The second question of production safety: all kept to a minimum. It is possible to encrypt more than one piece of information and only the same-sex product or communication secret is possible, and it will not be compromised. 2. Decryption
圖3係根據本發明—^ A 密/解密處理、ft链軏佳貫施例所述解密處理過程(並非加 於處對稱安排)之概要圖示。 1 x明一不範實施例中,解密處理進行如下: 存取單元⑼3的封套内之加密旗標18。假 r、尚未攻置,也沒有鑑定認證被使用,則該封套 =j 1、疋被移除,而該原始AU 3則可通過到達解碼器。 長若A A U 3已經加密,則該封套内的序號即被抽出, 周來產生計數器27。 该计數器資料段與所選高階加密標準(AES)之資料段大小 1同。此一需求係由於該計數器2 7被輸入至該資料段加密 程式此一方法門徑是可以擴展的,因為在須指定較大 AES貝料段大小的情況下,可以相對容易地將計數器2 7填 塞而拉長到較大的尺寸。 、 為了此文之用途,一高階加密標準(AES)資料段大小 設為128位元: 版 序列號碼 第37頁 200417217Fig. 3 is a schematic illustration of the decryption process (not a symmetrical arrangement) described in the ^ A encryption / decryption process and the ft chain according to the embodiment of the present invention. In the unclear embodiment, the decryption process proceeds as follows: The encryption flag 18 in the envelope of the access unit ⑼3. False r, has not been attacked, and no authentication certification has been used, then the envelope = j 1, 疋 is removed, and the original AU 3 can pass through to the decoder. If A A U 3 has been encrypted, the serial number in the envelope will be extracted, and the counter 27 will be generated. The counter data segment is the same size as the data segment of the selected Advanced Encryption Standard (AES). This requirement is because the counter 2 7 is entered into the data segment encryption program. This method can be expanded, because it is relatively easy to fill the counter 2 7 under the condition that a larger AES shell segment size must be specified. And stretched to a larger size. For the purpose of this article, the size of a high-level encryption standard (AES) data segment is set to 128 bits: Edition Serial Number Page 37 200417217
該調和密錄2 8係可ip雜 , . . 」、擇,但是必須注意的是,在多位 兀運流以相同密鑰32加密的情況下,Μ少調和密鑰28將導 致安全性整個完全崩潰。(譬如,假若聲音及影像資料以 2同的產物密鑰及通話密鑰進行加密,則—個或更多調和 密鑰28將用來避免徹底深入使用該加密程<。)冑和密餘 28之數值不必需要暗藏保密。 省32位元之、料段索引3〇為單一存取單元3内之資 料段汁數。、一AU的第一個128 —位元的資料段其索引號為 0 ,次一個為1,依此類推。該資料段索引號在每個再同步 j遠、1 4,1 5之後係重新設為零。注意該資料段索引3 〇之數 值不會被傳送,但是會由加密及解密處理程序計算之。 在進1存取單元AU 3處理過程中,該資料段索引3〇絕對不 可循裱使用。假設為1 28位元之AES資料段大小以及最大長 度之影像AU 3之最壞情況,一32—位元資料段大小所提供 即超過足夠之淨空高度。 該計數器資料段2 7於是在填塞加長之計算中被用作為 該AES資料段加密程式之輸入。一存取單元AU的第i個資料 段之處理過程為: 、 i - Pi互斥或E(計數器)為加密處理過程The reconciliation secret records 2 and 8 series can be IP miscellaneous,... ", But it must be noted that in the case where multiple bitstreams are encrypted with the same key 32, the M less than the reconciliation key 28 will lead to the entire security Totally crashed. (For example, if the audio and video data is encrypted with two identical product keys and call keys, one or more reconciliation keys 28 will be used to avoid thorough and intensive use of the encryption process <.) The value of 28 need not be hidden. The 32-bit province and the segment index 30 are the number of segments in the single access unit 3. The index of the first 128-bit data segment of an AU is 0, the next one is 1, and so on. The data segment index number is reset to zero after each resynchronization j far, 1, 4, and 15. Note that the value of the data segment index 3 0 will not be transmitted, but will be calculated by the encryption and decryption processing program. During the processing of the first access unit AU 3, the data segment index 30 must not be used cyclically. Assuming the worst case of the size of the AES data segment of 1 28 bits and the maximum length of the image AU 3, a 32-bit data segment size provides more than sufficient headroom. The counter data segment 27 is then used as an input to the AES data segment encryption program in the calculation of stuffing and lengthening. The processing of the i-th data segment of an access unit AU is:, i-Pi mutually exclusive or E (counter) is the encryption processing
Pi = Trunc (n,Ci互斥或E(計數器))未解密處理過 程 符合以下符號: E ()為該高階加密標準(A E S)之加密功能Pi = Trunc (n, Ci mutually exclusive or E (counter)) undecrypted processing process meets the following symbols: E () is the encryption function of the high-level encryption standard (A E S)
200417217200417217
五、發明說明(35)V. Invention Description (35)
Ci為該加密MPEG〜4存取單元(AU)第i個資料段。 Pi /為該原始AU資料第1個資料段中^個第一數元組 值係介於1與資料段大小之間。 η的數 該假設條件為’各存取單元AU 3的長度係提供給 具,而與该AU的資料合併。 该Trunc(x,y)函數功能係截斷該丫值的X個第一數元組。 右為岔碼再同步標誌丨4,丨5被使用的情況下,以 須採行: 勒作必 該CRM(密碼再同步標誌)旗標2〇予以檢查核對。假 現在該AU 3,那麼解密動作繼續如上進行,一直到碰上出 -RM為止。 位兀運流亦被檢查,以確認這不是一個已經逸出的模擬 CRM。假如這是一個模擬的標誌,那麼該標誌應該要被”非 逸出+二處理,而解密應該如常繼續進行。 假若該標誌1 4, 1 5是有效的,那麼該標誌之主體應 來產生一個新計數器27 : 0 31 32 95 96 127 調和密餘 (可選擇) 密碼再同步標誌 資料段索引 該貢料段索引3 0被重設為零,並利用此一新計數器數值作 417217 五、發明說明(36) ' ' 一""一 ^ - 為加雀程式之輸入,使解密動作繼續進行。 3 ·配置密碼系統組態 於本發明一示範實施例中,—些參數玎能需要被設 定,以便能有效率地使用該密 這些可能包含,例如 一即將使用的授權認證模式(如果有)。 -调^和密鑰28。因為這些不必須是暗藏保密的,它們可與 組態配置資訊一起被攜行。 解岔程式及其模態。假如沒有任一個被指定,那麼就假 5又為以计數裔模態之高階加密標準(A E s )。 假如使用的疋企業内部網—架構選擇性加密,應有精確的 什麼資料被加密之描述說明。 此等情報資料係置於IOD (最初實體描述符號)内被攜帶 著。該即將使用的資料結構之確切格式係被考慮為超出本 文件的範圍。 圖以圖表方式表述以電腦系統35之示範格式表示之機 姦,該系統中一組為促使機器實資行以上討論任何一種方 法之指令可以被執行。在另一實施例裡,機器可能包括視 訊轉換器(STB) '網路路由器、網路切換開關、網路架 個人數位助理(PDA)、行動電話、網路使用裝置,或 是任何機器有能力執行一系列指定由該機器應採行動之 令者。 该電腦系統3 5包含一處理器3 6、一主記憶體3 7以及一 靜態記憶體3 8,而經由匯流排3 9互相通訊。該電腦系統3 5Ci is the i-th data segment of the encrypted MPEG ~ 4 access unit (AU). Pi / is the first tuple in the first data segment of the original AU data. The value is between 1 and the data segment size. The number of η This assumption is that 'the length of each access unit AU 3 is provided to the tool and is combined with the data of the AU. The Trunc (x, y) function is used to truncate the X first tuples of the y value. The right is the fork code resynchronization flags 丨 4, 丨 5 are used, the following must be adopted: Make it mandatory The CRM (password resynchronization flag) flag 20 is checked and checked. If it is now AU 3, the decryption operation continues as above, until -RM is encountered. The luck flow was also checked to confirm that this was not a simulated CRM that had escaped. If this is a simulated flag, then the flag should be processed by "non-escaping + two", and decryption should continue as usual. If the flag 1 4, 1 5 is valid, then the body of the flag should generate a New counter 27: 0 31 32 95 96 127 Reconciliation (optional) Password resynchronization flag Data segment index The tributary segment index 3 0 is reset to zero, and this new counter value is used as 417217 V. Description of the invention (36) '' 一 " " 一 ^-It is the input of the adding program to make the decryption continue. 3 · Configure the password system configuration In an exemplary embodiment of the present invention, some parameters can not be set In order to be able to use the key efficiently, these keys may contain, for example, a forthcoming authorization authentication mode (if any).-Reconciliation key 28. Since these do not have to be hidden and confidential, they can be configured with configuration information. They are carried together. The solution program and its modal. If no one is specified, then 5 is the high-level encryption standard (AE s) in the modal mode. If the enterprise intranet is used— The architecture is selectively encrypted, and there should be a precise description of what data is encrypted. This information is carried in the IOD (the original entity description symbol). The exact format of the data structure to be used is considered to be beyond The scope of this document. The diagram graphically represents a gangster represented in the exemplary format of a computer system 35 in which a set of instructions for causing a machine funder to discuss any of the methods discussed above can be executed. In another embodiment , The machine may include a video converter (STB) 'network router, network switch, network rack personal digital assistant (PDA), mobile phone, network device, or any machine capable of performing a series of specified The machine should take action. The computer system 35 includes a processor 36, a main memory 37, and a static memory 38, and communicates with each other via a bus 39. The computer system 3 5
ΜΜ
I11SI11S
第40頁 200417217Page 40 200417217
可能更包含一影像顯示單元40(例如,液晶顯示器(lcd)或 是陰極射線管顯示器(CRT))。該電腦系統35也包含一文數 字輸入裝置41 (例如’鍵盤)、一游標控制裝置42(例如, 滑鼠)、一磁碟驅動單元43、一訊號產生設施44(例如,擴 音機)以及一網路介面裝置4 5。 、 磁碟驅動單元43包含一機器可讀取之媒體46,其中儲 存一組指令(也就是軟體)47,收錄著於此描述之任一個或 所有的方法或功能。該軟體47也顯示為駐留於,全部或至 少一部份,主記憶體U之内且/或處理器38之内。該軟體 47可能更被經由網路介面裝置45傳送或接收。為達到本說 J之目的,π機器可讀取之媒體”一詞將被視作包含任何能 =儲,、編碼或攜帶一連串指令之謀體,而指令係由該機 抑執行並促使5亥機器貫行任何一個本發明的方法。"機器 可項取之媒體’’ 一詞將因此被視作包含,但不限於,固態 電子C憶體、光碟與磁碟、以及載波訊號。 圖5 Α與5 Β —起構成一概要圖示,描述密碼再同步化標誌 1 4, 1 5之&使用於資料丟失情況下執行再同步化,依據本發 明之一實施例。圖5A代表以前的技藝,並沒有再同步標誌 出現:加密之存取單元AU 3只有標題16現於其前。假設客 :機系統2將接收帶有資料丟失的資料段4 9之加密存取單 兀3 °利用以計數器模態之資料段加密程式,而只有標題 1 6之Ϊ號可用為初始化之引導者時’則該客戶系統對加密 存取單元3解密將只能夠正確解到丟失資料49為止。在那 之後匕將繼續對加密存取單元3解密,但卻將用到錯誤It may further include an image display unit 40 (for example, a liquid crystal display (lcd) or a cathode ray tube display (CRT)). The computer system 35 also includes a digital input device 41 (such as a 'keyboard'), a cursor control device 42 (such as a mouse), a disk drive unit 43, a signal generating facility 44 (such as a microphone), and a network. Interface device 4 5. The disk drive unit 43 includes a machine-readable medium 46, which stores a set of instructions (i.e., software) 47, which contains any or all of the methods or functions described herein. The software 47 is also shown as resident, all or at least a part, within the main memory U and / or within the processor 38. The software 47 may be transmitted or received via the network interface device 45. For the purposes of this article J, the term "pi machine-readable media" will be considered to include any conspiracy that can store, encode, or carry a series of instructions that are executed by the machine and cause the Machines implement any of the methods of the invention. The term "machine-selectable media" will therefore be considered to include, but not limited to, solid-state electronic memory, optical and magnetic disks, and carrier signals. Figure 5 Α and 5 Β together constitute a schematic diagram describing the password resynchronization flags 1, 4, 15 & used to perform resynchronization in the case of data loss, according to an embodiment of the present invention. Figure 5A represents the previous Technology, no resynchronization mark appears: only the heading 16 of the encrypted access unit AU 3 appears before it. Assume that the guest system 2 will receive the encrypted access unit 3 with data loss 4 9 ° using Encryption program in the data mode of the counter mode, and only when the title number 16 is used as the initializer's guide, then the client system's decryption of the encryption access unit 3 will only be able to correctly resolve the missing data 49. Dagger will continue to Decrypting encrypted access unit 3, but will use error
we今 第41頁 200417217 五、發明說明(38) 的計數器數值而連接到錯誤的資料資料段,因而產生被曲 解的明文碼。結果該解密處理過程將產生一恢復資料之資 料段50,以及一(相對較大)丟失AU資料之資料段51。 相反的」密碼再同步化標諸14,15之使用,如圖^及圖4所 不 思研σ玄解岔過程產生恢復之A U資料之第一部份5 2、一 C小很多)丢失之AU資料之資料段53,以及恢復之Μ資料第 二部份54。此係因為一事實,即該客戶系統2能夠認出分 另J位於再同步化標誌、1 4與1 5内之同步化情報資料2 3與2 $。 匕將弟 、弟一及第三個A U資料段各個抽出,對其獨立進 行解密。 現在輪到圖7,該處所示係一網路通訊協定(I p)資料封 包5 5之概要圖示,用來將加密之A U 3越過網路5而配送給 ^戶系統2。該IP資料封包55包括一 IP標題56,也包括一 網路位址’該客戶系統由此可以辨別它是不是該I P資料封 包5 5之預定收件人。該丨p位址可以是唯一位址,群播位 址’或廣播位址,如現有技術裡所知者。 在遠不範實施例中,使用者資料封包協議(UDP )被用為傳 运之通訊協定。因此,該IP資料封包55包含一UDP標題 5 7 °此外’該加密存取單元3已被一應用程式執行該同步 分層而封嵌起來;該應用程式係定義於MPEG-4標準,而在 第一個分配伺服器上執行。因此,該I P資料封包包含一 SL 標題58。就正在該SL標題58之後跟著是一個組成安全封套 的標題59。它和上述的標題16 —樣,只差在它又包含一明 顯的同步化序列6 〇 ;而和密碼再同步化標誌1 4,1 5的顯式We now p. 41 200417217 V. The counter value of the invention description (38) is connected to the wrong data segment, thus generating a plaintext code that is distorted. As a result, the decryption process will generate a data segment 50 for recovering data and a (relatively larger) data segment 51 for missing AU data. The "reverse" password re-synchronization mark is used for 14,15, as shown in Figure ^ and Figure 4. The first part of the recovered AU data generated during the σ-xuan solution process shown in Figure ^ and Figure 4 is lost. Data segment 53 of the AU data, and second part 54 of the recovered M data. This is due to the fact that the client system 2 can recognize the points and the synchronization information data 2 3 and 2 $ located in the resynchronization mark, 14 and 15. Dagger extracted each of the younger brother, the younger brother, and the third A U data segment, and decrypted them independently. It is now turn to FIG. 7, which is a schematic diagram of an Internet Protocol (IP) data packet 55, which is used to distribute the encrypted A U 3 to the home system 2 across the network 5. The IP data packet 55 includes an IP header 56 as well as a network address. The client system can thereby discern whether it is the intended recipient of the IP data packet 55. The p address can be a unique address, a multicast address' or a broadcast address, as known in the art. In a far-flung embodiment, the User Data Packet Protocol (UDP) is used as the communication protocol for transport. Therefore, the IP data packet 55 contains a UDP header 57. In addition, 'the encrypted access unit 3 has been encapsulated by an application executing the synchronization layer; the application is defined in the MPEG-4 standard, and Run on the first allocation server. Therefore, the IP data packet contains an SL header 58. Immediately following the SL title 58 is a title 59 that forms a security envelope. It is the same as the above title 16 except that it also contains an explicit synchronization sequence 6 0; and the password resynchronization flags 1 4 and 15 are explicit
第42頁 200417217 五、發明說明(39) 同步化情報資料23, 24相同。標題59更包括指示存取單元3 加密之位元旗標1 8、指示鑑定認證之位元旗標1 9、(CRM) 旗標2 0、保留攔位2 1以及序號攔位2 2。第一個加密A U資料 段1 1跟在標題59之後。第二個加密AU資料段12則被第一個 密碼再同步化標誌14將其與第一個加密AU資料段1 1隔開, 而該標誌包含同步化情報資料2 3與計數器2 5。第三個加密 AU資料段1 3則被第二個密碼再同步化標誌1 5將其與第二個 加岔A U資料段1 2隔開,而該標誌包含同步化情報資料2 4與 計數器26。 ~ 該等同步化情報資料23, 24, 6 0藉由本發明而被開拓利 用其優越性,以執行於堆疊下解密而知名的一種解密類 型。此類解密在與同期間本案同一申請者之國際專利申請 案PCT/US01/41361有更完整述說。 巧 客戶系統2包含一實施該IP通訊協定之介面。那就是說, 該介面利用該IP標題5 6内的情報資料處理該〗p資料封包 55,以決定對該IP資料封包55剩餘部份要做些什麼。= 通常是’該剩餘部份被交給-正在執行較高階通訊協'^的 介面,也就是在此一實例中的UDP通訊協定,並從 更往上,也就是給在此例中執行MPEG_4同步分層的 j本發明目前的實施例裡,該IP資料封包55係‘一個被解 禮、者。 / ϋ。丨尔田止在客戶系絲?卜每# 該I Ρ通訊協定之介面處接收整個丨Ρ資 ^ Α 貝^ 關於該IP資料封包55之剩餘部份係為不Page 42 200417217 V. Description of Invention (39) Synchronized intelligence data 23, 24 are the same. The title 59 further includes a bit flag 1 indicating the encryption of the access unit 3, a bit flag 19 indicating the authentication and authentication, a (CRM) flag 2 0, a reserved bit 2 1 and a serial number block 2 2. The first encrypted A U data segment 1 1 follows heading 59. The second encrypted AU data segment 12 is separated from the first encrypted AU data segment 11 by the first cryptographic resynchronization flag 14, and the flag contains the synchronized intelligence data 23 and the counter 25. The third encrypted AU data segment 13 is separated from the second encrypted AU data segment 12 by a second password resynchronization flag 15, and the flag contains synchronization information 24 and counter 26 . ~ These synchronized information materials 23, 24, 60 are exploited by the present invention to exploit their superiority, a type of decryption known to perform decryption under stacks. This type of decryption is described more fully in the international patent application PCT / US01 / 41361 of the same applicant in the same period. The client system 2 includes an interface for implementing the IP communication protocol. That is, the interface uses the intelligence data in the IP header 56 to process the data packet 55 to determine what to do with the remainder of the IP data packet 55. = It is usually 'The remaining part is handed over to-the higher-level communication protocol is being executed' ^ interface, which is the UDP protocol in this example, and from the top, that is, to perform MPEG_4 in this example Synchronous layering. In the current embodiment of the present invention, the IP data packet 55 is a user who has been dismissed. / Alas.丨 Ertian stops at the customer? Bu ## The entire IP data received at the interface of the IP communication protocol ^ Α ^ ^ The remaining part of the IP data packet 55 is not
200417217 五、發明說明(40) 在該IP資料封包55之表身 情報資料23, 24, 6 0。铁:内的資料中尋种兮 勹π 4丄山 心 谈它將p a 寸找该明顯的同步化 二抽出,利用以上所述方法】:密的資料段從IP資料封 料封包55被重新組合,並交回:其解密。接下來,該”資 通訊協定的介面,在那裡由各^ f在客戶系統2實施該j p UDP, SL,的介面處理之。 ’焉施其他通訊協定,亦即 至此,一個為資料内容加密 經述說完成。雖麸本發明#以捫认成協定之方法與系統已 _ ^月係以關於特定範例之實施例描述 說明,但很顯然的,這些實施例可能作各樣修飾與改變, 而不致偏離本發明之本意與範圍。因此,其說明與圖形係 该看作是例證式說明,而不是一種限制性的意義。200417217 V. Description of the invention (40) In the body of the IP data packet 55, intelligence data 23, 24, 60. Iron: find the seed in the data. 勹 π 4 丄 山 心 说 It will find the obvious synchronization in the second inch. Use the method described above: The dense data segment is reassembled from the IP data packet 55. And return it: its decrypted. Next, the interface of the "data communication protocol" is handled by each ^ f in the client system 2 implementation of the jp UDP, SL, interface. 'Implement other communication protocols, that is, here, a data encryption protocol The description is complete. Although the method and system of the present invention #I have agreed on the agreement has been described with reference to specific examples of embodiments, it is obvious that these embodiments may be modified and changed in various ways without Departs from the original intention and scope of the present invention. Therefore, the descriptions and figures should be regarded as illustrative and not restrictive.
第44頁Page 44
200417217 圖式簡單說明 現將就本發明有關於隨附之圖說作更詳細解說,其中: 圖1係根據本發明某一實施例所載資料分配系統之概 要圖示; 圖2係根據本發明某一實施例所載加密處理過程之概 要圖不, 圖3係根據本發明某一實施例所載解密處理過程之概 要圖示; 圖4係一 Μ P E G - 4 A U經過加密並加入外包封套與再同步 化標誌後之格式之概要圖示,根據本發明某一實施例所 載; 圖5 A與5 B係以概要圖示描述再同步化標誌之使用,以 於資料丟失情況下執行再同步化,根據本發明某一實施例 所載; 圖6係一電腦系統之示範型式機器之輪廓圖,系統之 内有一組指令可能被執行,該組指令為使該機器執行完成 任一此所討論之方法。 圖7係一資料封包之概要圖示,封包用來經由圖1資料 分配系統中之網路分配一部份或全部資訊。200417217 A brief description of the drawings will now explain the accompanying drawings of the present invention in more detail, in which: FIG. 1 is a schematic diagram of a data distribution system according to an embodiment of the present invention; The outline of the encryption process in one embodiment is not shown in FIG. 3. FIG. 3 is a schematic diagram of the decryption process in accordance with an embodiment of the present invention. FIG. 4 is an MPEG-4 AU that has been encrypted and added to an outer envelope and re-encrypted. A schematic diagram of the format after the synchronization flag, according to an embodiment of the present invention; Figures 5 A and 5 B are schematic diagrams describing the use of the resynchronization flag to perform resynchronization in the event of data loss According to a certain embodiment of the present invention; FIG. 6 is an outline diagram of an exemplary type of machine of a computer system. A set of instructions in the system may be executed. method. FIG. 7 is a schematic diagram of a data packet, and the packet is used to distribute some or all of the information through the network in the data distribution system of FIG. 1.
第45頁Page 45
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW92103180A TWI290427B (en) | 2003-02-17 | 2003-02-17 | Digital content distribution system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW92103180A TWI290427B (en) | 2003-02-17 | 2003-02-17 | Digital content distribution system |
Publications (2)
Publication Number | Publication Date |
---|---|
TW200417217A true TW200417217A (en) | 2004-09-01 |
TWI290427B TWI290427B (en) | 2007-11-21 |
Family
ID=39301455
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW92103180A TWI290427B (en) | 2003-02-17 | 2003-02-17 | Digital content distribution system |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI290427B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI511543B (en) * | 2010-12-20 | 2015-12-01 | Univ Hungkuang | Work division method and system for improving worst waiting time |
-
2003
- 2003-02-17 TW TW92103180A patent/TWI290427B/en active
Also Published As
Publication number | Publication date |
---|---|
TWI290427B (en) | 2007-11-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100450177C (en) | Digital content distribution system | |
US6460137B1 (en) | Encryption processing system | |
CN111327620B (en) | Data security traceability and access control system under cloud computing framework | |
CN102100031A (en) | Apparatus and method for providing a security service in a user interface | |
US20100150352A1 (en) | Secure self managed data (ssmd) | |
CN103338385A (en) | Video processing system and corresponding method | |
CN101243687A (en) | Protecting elementary stream content | |
CN106067874B (en) | It is a kind of by the method for data record to server end, terminal and server | |
CN101243640A (en) | Protecting elementary stream content | |
JP2010259057A (en) | Method of distributing digital content | |
EP1738276A1 (en) | Motion picture file encryption method and digital rights management method using the same | |
CN106027235A (en) | PCI password card, and password operation method and system for massive keys | |
CN105704545A (en) | Secret key synchronizing information transmission method based on H.264 video stream | |
CN110012260B (en) | Video conference content protection method, device, equipment and system | |
CN102842053B (en) | A kind of false proof figure code label and manufacture method thereof | |
CN112347493A (en) | Encryption, decryption and graying method for OFD (office file) | |
CN108141615A (en) | MPEG transports frame synchronization | |
CN109743305A (en) | The method for realizing applicating text data protection in the application of Intelligent dialogue system | |
KR101584127B1 (en) | System and method for deniable encryption | |
JP2004534479A (en) | Redundant stream cipher information in the next packet of the encrypted frame | |
TW200417217A (en) | Digital content distribution system | |
JP2010145691A (en) | Content encrypting apparatus, content decrypting apparatus, and data conversion method | |
Soni | Performance analysis of cascaded hybrid symmetric encryption models | |
CN105790928A (en) | File segmenting method based on digital abstract | |
CN102098293B (en) | Method for previewing encrypted email |