TW200525977A - Crypto display apparatus, system and method for displaying secured images - Google Patents

Crypto display apparatus, system and method for displaying secured images Download PDF

Info

Publication number
TW200525977A
TW200525977A TW93138962A TW93138962A TW200525977A TW 200525977 A TW200525977 A TW 200525977A TW 93138962 A TW93138962 A TW 93138962A TW 93138962 A TW93138962 A TW 93138962A TW 200525977 A TW200525977 A TW 200525977A
Authority
TW
Taiwan
Prior art keywords
optical
key
pattern
circuit
image
Prior art date
Application number
TW93138962A
Other languages
Chinese (zh)
Inventor
Mark Thomas Johnson
Adrianus Marinus Gerardus Peeters
Jozef Laurentius Wilhelmus Kessels
Pim Theo Tuyls
Original Assignee
Koninkl Philips Electronics Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninkl Philips Electronics Nv filed Critical Koninkl Philips Electronics Nv
Publication of TW200525977A publication Critical patent/TW200525977A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4493Subsequently rendering the image intelligible using a co-operating image, mask or the like

Abstract

This invention reveals a crypto display apparatus. It comprises a first, and a second spatial optical pattern generation device (120, 122, 14). The first device generates an encrypted optical image pattern. The second device (14) generates an optical key pattern. The first and second devices (120, 122, 14) are spatially arrangement relative to one another. Therefore, the output image is formed by optical interaction of the optical encrypted image pattern and the optical key pattern. A key information computation circuit (140), in the second device computes information that controls the optical key pattern. The key information computation circuit (140) is an asynchronous circuit. Preferably, the second device comprises a synchronously operated display screen (142), and an asynchronous-synchronous interface between the computation circuit (140) and the display screen (142).

Description

200525977 九、發明說明: 【發明所屬之技術領域】 本發明相關於一保密顯示裝置,用以顯示安全影像的系 統’及顯示安全影像的方法。 【先前技術】 在P· Tuyls等人的一篇文章中(名稱為” visual Crypt〇200525977 IX. Description of the invention: [Technical field to which the invention belongs] The present invention relates to a security display device, a system for displaying a secure image, and a method for displaying a secure image. [Prior art] In an article by P. Tuyls et al. (Named "visual Crypt〇"

Displays Enabling Secure Communications(能安全通訊之視 覺保密顯示器),,,發表於2〇〇3年3月12至14日在德國 Boppard所舉行有關普遍計算安全的第一國際會議中)揭示 -保密顯示裝置。此文章使用一加密原則,其利用兩”影 像”合併以產生一”清晰”(即未加密)影像。 —4文早揭v-裝置,丨具有一顯#螢幕及用以重疊該顯 不螢幕的一重豐螢幕。該重疊榮幕在一位置依存方式中控 制來自該顯示勞慕的亦始彳奉^ ^ 綦的先線傳輸。由該重疊螢幕傳輸的位置 ,存,係由-鍵圖案加以控制。當必須顯示—原始影像 〜/原始〜像调適(加密)成形成一加密影像圖案,俾該 加密影像圖案在根據該鍵圖案 時,將形成該原始影像。選擇該鍵圖$ J先學傳輸 影像未可由其本身加以認出1 °;曹:该调適的原始 原始影像成為可見的一鍵 幕,,。 乂下该重®螢幕將稱為”鍵螢 當使用一合適加密技術時 顯露該原始影像,即可二不用向無法產生該鍵圖案者 圖案的複製無法使用,因_ =該加密影像。為使該鍵 巧!吊地變動該鍵圖案。一計 98225.doc 200525977 算元件搞合至該螢幕以計算及提供該等鍵圖案,該計算涉 及未經授權人士無法取得的秘密資訊。當然。必須保證藉 由在加密影像圖案中包括公開資訊,可實現與該鍵圖案對 應的加密。 該計算元件可光學地拾取此公開資訊,使用該秘密資訊 從此公開資訊算出該鍵圖案。但,當然可使用其他同步方 式(諸如時間相關鍵圖案變動,或公開資訊分開傳送等)以 計算該鍵圖案。 玍岣晰影像的方式中,數個強有力觀點之一為角 密係在見到該影像前的最後階段光學地發生。不會形成习 I易禝製的電子清晰影像信號。此外,該鍵圖案在該鍵蜜 ::的產生可發生在一閉路元件中’其具有的特性报像智 :卡的特性。此—閉路式光學鍵圖案產生元件通常包含. :計算元件,用以計算鍵圖案;該鍵螢幕與其驅動電子 學;及-感應器(可選擇),用以讀取公開資 :用公開資訊以計算必須應用在該鍵勞幕的鍵圖Γ 此閉路式光學鍵圖案產生元件不f產生 建圖案 ^位置依存傳輸純形式產生—光學❹1光 案產生讀的大部分電子學可實現在 子 全元件基本上受到如一智慧卡中:件中… 措施保護。此令斜斜^對抗未經授權存取的 品4 十“秘密資訊的保密攻擊更因縫# 而,秘密資訊可否恢復當然仍有風險。 然 【發明内容】 本發明的其中-目的為增加該 ⑼不裝置的堅固,尤 98225.doc 200525977 '、疋亥光予鍵圖案產生元件與秘密資訊忙产 根據本發明之觀察,^對抗。 可由外部見到,因此使用該等時脈週^;像/時脈信號 使光學鍵圖宰產婊-从+ ▲ 屑的蜆祭(例如藉由 衝,以觀 在㈣㈣時脈週期中經受電磁财 衝以規祭該鍵圖案中形成的變 :磁脈 電)’保密攻擊會有風險…鎖此類==源耗 螢幕的像素或影像線時脈至少與使用該丄鍵 同步電路(不H统時鐘卜 μ作為-非 明庄忍,使用非同步電路以阻礙對秘密資訊 些應用所習知。惟,未曾揭示此技術用於光學鍵圖= 凡件/亦未明顯指示其對此類元件的應用,原因是此一元 棒基本上係-矩陣顯示元件,其必須供以規律時脈速率, 初看之下在此封閉力件中並+需要進一步保護。 【實施方式】 圖1說明一影像顯示系統。該系統包括一加密影像源 10、一接收器120、一顯示螢幕122、一鍵影像產生器 140、一重疊螢幕142,及一重疊驅動器144。加密影像源 10包括串聯的一清晰源100、一加密驅動器1〇2及一發射元 件1 04。接收器1201馬合至驅動顯示榮幕122。耗合鍵影像 產生器140以經由重疊驅動器ι44而驅動重疊螢幕142。 該影像顯示系統的基本操作實施例揭示於Ρ· Tuyls等人 的一篇文章中’名稱為 ”Visual Crypto Displays Enabling Secure Communications(能安全通訊之視覺保密顯示器)”, 98225.doc 200525977 發表於2003年3月i2至14日在德國B〇ppard所舉行 計算安全的第一國際會議中。 曰、 結合顯示螢幕I22及重疊螢幕M2用以顯 貝不一原始影像, /、對應至來自清晰影像源1 00的清晰影像。加穷元件⑺ 重疊螢幕142執行互補的加密及解密運算。加宓元4 及 行該原始影像(其由原始影像源丨0 0所產生)的數位代表的2 2 密’及計算-加密影像的數位代表。發射元件ι〇4例如: 由一公用網路,或藉由無線信號而傳送該加密影像的數位 代表。 接收器120接收該加密影像的數位代表,及使用此 以驅動顯示榮幕122,以顯示該加密影像。顯示勞幕可終 由產生-光強度圖案作為該影像中的位置函數以顯示該力: =像’但亦可藉由產生入射光的反射圖案,或背光傳送 圖案而顯示該加密影像。 重豐螢幕142光學地執行解密(如Tuyls等的文章中所 H疊榮幕142藉由在一位置依存方式中從顯示勞幕 二通過光而解密。鍵影像產生器14〇產生所需的鍵資訊以 才工制該位置依存性,及藉以控制顯示螢幕。該鍵資訊對庫 ^加密元件1〇2將原始影像加密所用的鍵。結果,顯示營 幕122及重豐螢幕的結合顯示該原始影像。 黎:佳鍵圖案產生器140、重疊驅動器m及重疊發幕142 ^在一共用封裳中,以形成—可攜式光學鍵圖案產生元 =使!者可將此—光學鍵圖案產生元件連接至入未受保 、丁螢幕122,以存取顯示在顯示螢幕122上的加密影 98225.doc 200525977 像。該光學鍵圖案產生元件亦可大體上永久地連接至-特 定顯示螢幕122。在此例中,該光學鍵圖案產生元件與該 顯示螢幕的顯示電子學間的電子分離供以防備劈裂。 圖2說明一光學鍵圖崇姦4 — 埏囵茶產生兀件實施例,其包括鍵產生 益140、重璺螢幕142、一驅動器控制器22、一 X驅動器 26、- y驅動器24’及一時脈電路28。時脈電路28定出驅 的時脈。.驅動器控制器22耗合至χ驅動器26及y驅動器Μ, 其白耦σ 重璺螢幕142。驅動器控制器22經由一非同步 介面20㈣合至鍵產生㈣“鍵產生器⑽實作為一非同 步電路。 動器控制器22的時脈’及藉此定出X驅動器26及y驅動器24Displays Enabling Secure Communications, published at the first international conference on universal computing security held in Boppard, Germany, March 12-14, 2003) Revealing-Confidential Display Devices . This article uses an encryption principle, which uses two "images" to merge to produce a "clear" (ie, unencrypted) image. —4 Wen early reveals the v-device, which has a display # screen and a heavy screen to overlap the display screen. The overlapping glory controls the front-line transmission from the display of Lao Mu also in a position-dependent manner. The position and storage transmitted by this overlapping screen are controlled by the-key pattern. When it must be displayed-original image ~ / original ~ image is adapted (encrypted) to form an encrypted image pattern. When the encrypted image pattern is based on the key pattern, the original image will be formed. Select this key map $ J to learn to transfer the image. The image cannot be recognized by itself 1 °; Cao: The original image that is adapted becomes a one-click screen that is visible. Your Majesty's screen will be called "Key Firefly" when using a suitable encryption technology to reveal the original image, you can use it without copying the pattern to the person who cannot produce the key pattern, because _ = the encrypted image. In order to make The key is clever! The key pattern is suspended. A 98225.doc 200525977 computing element is coupled to the screen to calculate and provide these key patterns. The calculation involves secret information that is not available to unauthorized persons. Of course. It must be guaranteed By including public information in the encrypted image pattern, encryption corresponding to the key pattern can be achieved. The computing element can optically pick up this public information and use the secret information to calculate the key pattern from this public information. However, of course, other information can be used Synchronous methods (such as time-dependent key pattern changes, or separate transmission of public information, etc.) to calculate the key pattern. One of several powerful ideas in the way of clearing images is that the angle system is the last one before seeing the image. This phase occurs optically. It does not form an electronic clear image signal that is easily produced by Xi. In addition, the key pattern can occur when the key honey :: is generated. Among the closed-circuit components, its characteristics are reported as smart cards: the characteristics of the card. This-closed-type optical key pattern generating element usually includes: a computing element to calculate the key pattern; the key screen and its driving electronics; and-sensing (Optional) to read public information: use public information to calculate the key map that must be applied to the key screen Γ This closed-circuit optical key pattern generating element does not generate a pattern ^ position-dependent transmission pure form— Most of the electronics that can be read in the optical case can be realized in the sub-components, which are basically protected by a smart card: in the piece ... measures to protect. This makes it obliquely ^ against the unauthorized access to the product 4 10 "secret information Secret attacks are even more difficult. Of course, there is still a risk of recovering secret information. [Summary of the Invention] One of the purposes of the present invention is to increase the robustness of the device, especially 98225.doc 200525977 ', the production of the key-pattern pattern generating element and secret information are in busy production. According to the observation of the present invention, ^ confrontation. Can be seen from the outside, so use the clock cycle ^; image / clock signal to make the optical key diagram 婊-from + ▲ sacrifice of shards (for example, by punching to observe the electromagnetic field during the ㈣㈣ clock cycle Cai Chong rules the change in the pattern of the key: magnetic pulse electricity) 'secret attacks will risk ... lock this type == source consumes screen pixels or image line clock at least with the use of the key synchronization circuit (not H As a system clock, μ μ is known as the use of non-synchronous circuits to hinder some applications of secret information. However, this technology has not been revealed for optical key diagrams = where / it is not clearly indicated for such components The reason is that this unitary rod is basically a matrix display element, which must be supplied with a regular clock rate. At first glance, it needs to be further protected in this closed force element. [Embodiment] Figure 1 illustrates an image Display system. The system includes an encrypted image source 10, a receiver 120, a display screen 122, a key image generator 140, an overlay screen 142, and an overlay driver 144. The encrypted image source 10 includes a clear source in series 100.An encrypted drive 1 〇2 and a transmitting element 104. The receiver 1201 is connected to the driving display glory 122. The consumable key image generator 140 drives the overlapping screen 142 via the overlapping driver ι44. The basic operation example of the image display system is disclosed in P · An article entitled "Visual Crypto Displays Enabling Secure Communications" in an article by Tuyls et al., 98225.doc 200525977, March 2-14, 2003, published by Boppard, Germany The first international conference on computing security is held. That is, the combined display screen I22 and the overlay screen M2 are used to display different original images, and correspond to clear images from a clear image source 100. Additive element ⑺ overlay screen 142 Complementary encryption and decryption operations are performed. Add the element 4 and the 2 2 digits represented by the original image (which is generated by the original image source 丨 0 0) and the digital representation of the calculated-encrypted image. Transmitting element ι〇 4 For example: The digital representation of the encrypted image is transmitted by a public network or by a wireless signal. The receiver 120 receives the digital representation of the encrypted image, And use this to drive the display screen 122 to display the encrypted image. The display screen can eventually be generated-a light intensity pattern as a function of position in the image to display the force: = like 'but also by generating incident light The reflected image, or the backlight transmission pattern, is used to display the encrypted image. Chongfeng screen 142 performs decryption optically (such as Tuyls et al. ’S superimposed screen 142 passes light from the display screen in a position-dependent manner). And decryption. The key image generator 14 generates the required key information to work out the position dependency and control the display screen. The key information is a key to the encryption element 102 for encrypting the original image. As a result, the combination of the display screen 122 and the Zhongfeng screen displays the original image. Li: Jia key pattern generator 140, overlapping driver m, and overlapping curtain 142 ^ In a common seal to form—portable optical key pattern generating element = enable! I can connect this—optical key pattern generating element connection Go to the uninsured D screen 122 to access the encrypted video 98225.doc 200525977 image displayed on the display screen 122. The optical key pattern generating element may also be substantially permanently connected to a specific display screen 122. In this example, electronic separation between the optical key pattern generating element and the display electronics of the display screen is provided to prevent cleavage. FIG. 2 illustrates an optical key diagram Chong 4—an example of a tea-producing element, which includes a key-producing benefit 140, a heavy-duty screen 142, a driver controller 22, an X-driver 26, a y-driver 24 ', and脉 电路 28。 Circuit 28. The clock circuit 28 determines the driving clock. The driver controller 22 is coupled to the x-driver 26 and the y-driver M, and its white coupling σ weights the screen 142. The driver controller 22 is coupled to the key generator via an asynchronous interface 20. The key generator is implemented as an asynchronous circuit. The clock of the actuator controller 22 and the X driver 26 and the y driver 24 are determined by this.

在運异驅動器控制器22、χ驅動器财丫驅動器^在週期 ϋ循衣中紅作’该週期性循環由時脈電路Μ以信號顯示。 在原白知的—方式中’ χ驅動器26及y驅動器24將影像資料 =列選擇信號放置在重疊螢幕142的操縱導體上。鍵產生 Γ β ^ ^影像賁料,並將該影像資料的相關資訊傳送 至驅動器控制器22,其使用該影像資料以控制X驅動器 2 6 (及/或y驅動器2 4)。 例如使用Tuyls等人的文章中所述一演算法,鍵產生器 使用秘始、貧訊以計算該影像資料。此涉及鍵產生器 中,. “路(通#為可程式電腦電路,未顯示)中數個電 路的運算。運I & & V係非同步的,意即該複合電路中的多種不 同電路開始說1 力作,以回應來自其他電路的個別請求信號, 及傳送個別灰A > 〜口知^唬,以回應該等請求信號何時已完成該 98225.doc -10- 200525977 * J動4乍€在收到一回應先前一要求信號的告知信號 ★才^產生新的一請求信號。回應鍵產生器140的數個 私路同步h取動作’並未使肖巾央系、統時鐘信號。 咖控制器22使用握手與鍵產生器14〇通訊。例如, 在由%'脈電路28以信號表示的時脈週期—開始,驅動器控 制器22傳送—請求信號至鍵產生11140巾的-電路。鐽產 :态140中的電路再產生一請求信號,以回應又產生數個 月长仏唬等等。產生數個告知信號作為回應,其又觸發數 個告知信號等等,直到告知該初始請求。通常,鍵產生器 140已設計好,俾一告知總會在時脈電路28的一時脈週期 内2達,或在驅動器控制器22回應一請求信號而載入鍵產 生时140所產生影像資料前經過的一預設整數的此類週期 到達。 圖3說明一實施例,其在鍵產生器14〇與驅動器控制器22 間耦合一記憶體30。在運算中,記憶體3〇用以儲存鍵產生 器140產生的影像資料。記憶體用於一第一及第二時序模 式中,其中其時序分別由鍵產生器140及時脈電路28控 制。在第一模式中,鍵產生器140計算該影像資料,並將 其寫入記憶體30中。第一模式係一非同步模式,其中鍵產 生器140藉由非同步握手控制時序。第二模式係一同步模 式’其中時脈電路28同時控制記憶體30及驅動器控制器22 勺寺序’驅動态電路2 2輸出數個位址至記憶體3 〇,及用以 在日守脈電路28界定的數個時間點從記憶體3〇讀取影像資 料’及記憶體在時脈電路28界定的數個時間點應用數個位 98225.doc 200525977 址及驅動資料。 在一替代實施例中,驅動器控制器22經由非同步界面2〇 從鍵產生器讀取該影像資料,並同步將該影像資料寫入一 記憶體,稍後用以驅動X驅動器26及/或y驅動器24。 圖4又說明另一實施例,其中鍵產生器14〇控制時脈電路 28。鍵產生器140產生數個請求信號並將其施至時脈電路 28,時脈電路28回應各請求信號,在一延遲之後產生一告 知信號,其亦作為驅動電路22、X驅動器26及7驅動器24的 時脈信號使用。 (未顯示)以計算該鍵圖案,同時 秘密資訊及外部資訊的一函數, 影像偵測的資訊,或含有該加遂 較佳鍵產生器140使用連接至重疊螢幕142的數個感應器 ’同時作為鍵產生器140中儲存的In the different driver controller 22, the χ driver and the driver ^ are in red in the cycle 红 cycle, and the cycle is displayed by the clock circuit M as a signal. In the original method, the χ driver 26 and the y driver 24 place the image data = column selection signal on the manipulation conductor of the overlapping screen 142. The key generates Γ β ^ ^ image data, and transmits the relevant information of the image data to the drive controller 22, which uses the image data to control the X drive 2 6 (and / or the y drive 2 4). For example, using an algorithm described in the article by Tuyls et al., The key generator uses secret and lean information to calculate the image data. This involves the operation of several circuits in the key generator, "path (through # is a programmable computer circuit, not shown). Operation I & & V is asynchronous, meaning a variety of different in this composite circuit The circuit begins to say 1 masterpiece to respond to individual request signals from other circuits, and to transmit individual gray A > ~ spoken ^ blind, in response to when these request signals have completed the 98225.doc -10- 200525977 * J 动 4 At first, it received a notification signal that responded to a previous request signal before generating a new request signal. The response of several private channels of the key generator 140 to synchronize the fetching action 'has not caused the Shaw system and the clock signal. The coffee controller 22 communicates with the key generator 14 using a handshake. For example, at the clock cycle represented by the pulse circuit 28, the driver controller 22 sends a request signal to the circuit that generates 11140 keys.鐽 Production: The circuit in state 140 generates a request signal in response to several months of bluffs and so on. It generates several notification signals in response, which triggers several notification signals and so on, until the initial signal is notified. Request. Usually, The generator 140 has been designed, and it will be notified that it will always reach 2 within a clock cycle of the clock circuit 28, or a driver controller 22 responds to a request signal and loads the image data generated by 140 before the key is generated. Such a period of a preset integer arrives. FIG. 3 illustrates an embodiment in which a memory 30 is coupled between the key generator 14 and the driver controller 22. In operation, the memory 30 is used to store the key generator 140. The generated image data. The memory is used in a first and second timing mode, wherein the timing is controlled by the key generator 140 and the clock circuit 28. In the first mode, the key generator 140 calculates the image data, and Write it into the memory 30. The first mode is an asynchronous mode in which the key generator 140 controls the timing by asynchronous handshake. The second mode is a synchronous mode in which the clock circuit 28 controls the memory 30 and The driver controller 22 scoops the sequence of the 'drive state circuit 2 2 to output several addresses to the memory 3 0 and reads image data from the memory 30 at several time points defined by the day guard circuit 28' and Memory in A number of time points defined by the pulse circuit 28 apply a number of bits 98225.doc 200525977 address and driving data. In an alternative embodiment, the driver controller 22 reads the image data from the key generator via the asynchronous interface 20, and The image data is synchronously written into a memory, which is later used to drive the X drive 26 and / or the y drive 24. Fig. 4 illustrates another embodiment in which the key generator 14 controls the clock circuit 28. The key generator 140 generates a plurality of request signals and applies them to the clock circuit 28. The clock circuit 28 responds to each request signal and generates a notification signal after a delay, which also serves as the time for the driving circuit 22, the X driver 26, and the 7 driver 24. Pulse signal is used. (Not shown) to calculate the key pattern, as well as a function of secret and external information, image detection information, or the key generator 140 containing the enhanced preferred key generator 140 using several sensors connected to the overlay screen 142 at the same time As stored in the key generator 140

或者, °亥外部資訊例如可為到達重疊螢暮Alternatively, the external information may be, for example, the arrival overlapping firefly

的一系列不同 明本發明,但應了解可作 -本身可為一光源,該加密 一位置函數,顯示螢幕122 98225.doc 200525977 I:供影像控制傳輸性用於來自背面來源的光線,或顯示 赏幕122可為具影像控敍射的螢幕(該例子令重疊營幕可 依該鍵圖案而控制往返顯示螢幕的傳輸)。在各例子卜 顯不螢幕122產生通過重疊螢幕J42的光特性的位置依存 I1生。反而’當然亦可利用該加密影像控制一重疊勞幕,及 利用該鍵圖案控制該顯示螢幕。此外,雖然已揭示本發明 用於一重疊螢幕’其位置選擇地阻礙或通過光,應了解亦 可使用其他形式的位置依存傳輸性,例如類似連續地可調 整傳輸性’而非二元的開/關特性、顏色依存傳輸性等。 此外雖然可使用Tuyls文章中揭示的加密及解密技術以 產生》亥鍵圖案,應了解本發明並未侷限於使用此等鍵圖 【圖式簡單說明】 已使用以下附圖詳細說明本發明此等及其他目的及有利 概念。 圖1說明一影像顯示系統;及 圖2至4說明數個光學鍵圖案產生元件。 【主要元件符號說明】 10 加密影像源 20 非同步介面 22 驅動器控制器 24 y驅動器 26 X驅動器 28 時脈電路 98225.doc -13- 200525977 30 記憶體 100 清晰影像源 102 加密元件 104 發射元件 120 接收器 122 顯示螢幕 140 鍵影像產生器 142 重疊螢幕 144 重疊驅動器 98225.doc -14-A series of different inventions, but it should be understood that it can be made-itself can be a light source, the encryption a position function, display screen 122 98225.doc 200525977 I: for image control transmission for light from a source from the back, or display The viewing screen 122 can be a screen with image-controlled narrative (this example allows the overlay screen to control the transmission of the round-trip display screen according to the key pattern). In each example, the position at which the screen 122 generates the light characteristics passing through the superimposed screen J42 depends on I1. Instead, of course, you can also use the encrypted image to control an overlay screen, and use the key pattern to control the display screen. In addition, although it has been disclosed that the present invention is used in an overlay screen where its position selectively blocks or passes light, it should be understood that other forms of position-dependent transmission may be used, such as similarly continuously adjustable transmission, instead of binary opening. / Off characteristics, color-dependent transmission, etc. In addition, although the encryption and decryption techniques disclosed in the Tuyls article can be used to generate the key pattern, it should be understood that the invention is not limited to the use of these key diagrams. [Schematic description] The invention has been described in detail using the following drawings And other purposes and beneficial concepts. Figure 1 illustrates an image display system; and Figures 2 to 4 illustrate several optical key pattern generating elements. [Description of main component symbols] 10 Encrypted image source 20 Asynchronous interface 22 Drive controller 24 y drive 26 X drive 28 Clock circuit 98225.doc -13- 200525977 30 Memory 100 Clear image source 102 Encryption element 104 Transmitting element 120 Receive Device 122 display screen 140 key image generator 142 overlay screen 144 overlay driver 98225.doc -14-

Claims (1)

200525977 十、申請專利範圍: 1. 一種保密顯示裝置,包括: 一第一空間光學圖案產生元件(120, 122),其配置成產 生一加密光學影像圖案; 第一空間光學圖案產生元件(14),其配置成產生一光 學鍵圖案,該等第一及第二光學圖案產生元件(12〇,122, 14)具有一相互空間配置,俾藉由該光學加密影像圖案及 該光學鍵圖案之光學互動而形成一輸出影像;及 ^鍵貝訊計算電路(140),其配置成計算用以控制該光 學鍵圖案之資訊,該鍵資訊計算電路(14〇)係一非同步電 路。 ζ·如#采項1之保密 ⑽包括: ”…生兀 :同步操作之顯示驅動電路(22,24,26), 顯示器(142),·及 σ :握手介面,其在該驅動電路(22 計算電路(140)之間耦合。 亥鍵貝》 3·如請求们之保密顯示裝置,包括 顯示元件(142)盥i + 匕L體(30),其在一 午U42)與该鍵貧訊計算電路⑽ 配成在—第_、口, 算電路⑽)寫入用以控制該光學鍵 ^該鍵資訊計 第二、同步模式中操作, .之貝訊,及在一 Π4)^ n 八中该第二光學圖窣/社 ⑽項取用以控制該光學鍵圖案 3案產生凡件 示元件(142)上之光學鍵圖案。貝Β用以控制該顯 98225.doc 200525977 4·如請求項1之保密顯示裝置,其中將該第二光學圖案產 生兀件(14)及該鍵資訊計算電路(14〇)共同封裝在一防偽 设體中,除了該光學輪出以外該殼體未具有信號輸出提 供該光學鍵圖案。 5 ·種用於光學加密影像資訊之光學鍵圖案產生元件 (14),該元件包括一封裝,及在該封裝内包括·· 一鍵貧訊計算電路(14〇),其配置成計算用以控制〜光 學鍵圖案之資訊,該鍵資訊計算電路係一非同步電路; 及 , 一空間光學圖案產生元件(142, 22, 24, %),其柄合至 該鍵資訊計算電路以產生該光學鍵圖案。 6· 如:月求項5之光學鍵圖案產生元件,其中該光學圖索產 生το件(142, 22, 24, 26)包括-同步操作之驅動電路⑵ Α叫及-握手介面,該介面在該驅動電路⑺,% % 與该鍵貧訊計算電路(140)之間耦合。 98225.doc200525977 X. Patent application scope: 1. A security display device comprising: a first spatial optical pattern generating element (120, 122) configured to generate an encrypted optical image pattern; a first spatial optical pattern generating element (14) It is configured to generate an optical key pattern, and the first and second optical pattern generating elements (120, 122, 14) have a mutual spatial configuration, and the optical encryption image pattern and the optical key pattern are optically Interacting to form an output image; and ^ key Bess calculation circuit (140) configured to calculate information for controlling the optical key pattern, the key information calculation circuit (14) is an asynchronous circuit. ζ · 如 # Adopting the confidentiality of item 1 includes: ……: display driving circuit (22,24,26) for synchronous operation, display (142), and σ: handshake interface, which is in the driving circuit (22 Coupling between computing circuits (140). Haijianbei 3. If requested, the security display device includes a display element (142) and a body + (30), which is at least U42) with the key at noon. The calculation circuit ⑽ is configured to be written in the —-th, 口, calculation circuit ⑽) to control the optical key ^ the key information meter is operated in the second, synchronous mode,. Of the Bessin, and a Π 4) ^ n eight The second optical map / community item is used to control the optical key pattern on the optical element pattern (142) generated by the optical key pattern 3. The case is used to control the display 98225.doc 200525977 4. If requested The security display device of item 1, wherein the second optical pattern generating element (14) and the key information calculation circuit (14) are collectively packaged in an anti-counterfeiting body, and the housing does not have Signal output provides this optical key pattern. 5 · Optical keys for optically encrypted image information A component (14) including a package, and a key-poor computing circuit (14) included in the package, configured to calculate information for controlling ~ optical key patterns, and the key information is calculated The circuit is a non-synchronous circuit; and a spatial optical pattern generating element (142, 22, 24,%) whose handle is coupled to the key information calculation circuit to generate the optical key pattern. 6 · Example: month 5 Optical key pattern generating element, wherein the optical pattern generating component (142, 22, 24, 26) includes a driving circuit for synchronous operation ⑵ Α and-a handshake interface, the interface is in the driving circuit ⑺,%% and the Coupling between key-poor computing circuits (140).
TW93138962A 2003-12-18 2004-12-15 Crypto display apparatus, system and method for displaying secured images TW200525977A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0329304A GB0329304D0 (en) 2003-12-18 2003-12-18 Crypto display apparatus, system and method for displaying secured images

Publications (1)

Publication Number Publication Date
TW200525977A true TW200525977A (en) 2005-08-01

Family

ID=30471281

Family Applications (1)

Application Number Title Priority Date Filing Date
TW93138962A TW200525977A (en) 2003-12-18 2004-12-15 Crypto display apparatus, system and method for displaying secured images

Country Status (3)

Country Link
GB (1) GB0329304D0 (en)
TW (1) TW200525977A (en)
WO (1) WO2005062282A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009033919A1 (en) * 2009-07-20 2011-01-27 Giesecke & Devrient Gmbh Secure display of user data on a telecommunication terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2806230B1 (en) * 2000-03-09 2002-05-24 France Telecom METHOD AND DEVICE FOR CONFIDENTIAL READING OF DATA

Also Published As

Publication number Publication date
GB0329304D0 (en) 2004-01-21
WO2005062282A1 (en) 2005-07-07

Similar Documents

Publication Publication Date Title
US8966656B2 (en) Displaying private information using alternate frame sequencing
US7191338B2 (en) Secure method for providing privately viewable data in a publicly viewable display
US9679126B2 (en) Decryption device, method for decrypting and method and system for secure data transmission
CN106685905A (en) Systems and methods of encrypted transmission of web pages
TW200951911A (en) Display device and method for transmitting clock signal during blank period
Migicovsky et al. Outsmarting proctors with smartwatches: A case study on wearable computing security
JP2005517218A (en) Method and apparatus for secure image message communication
CN104284054B (en) Multi-image encrypting and decrypting method based on ghost imaging and public key cryptography
CN109787758A (en) Anti- quantum calculation MQV cryptographic key negotiation method and system based on private key pond and Elgamal
US8270604B2 (en) System and method for remote signature acquisition
CN109951274A (en) The point-to-point method for message transmission of anti-quantum calculation and system based on private key pond
CN106663389A (en) Methods and apparatus for cryptography
Schneier Attacking machine learning systems
US20060026428A1 (en) Key synchronization in an image cryptographic systems
TW201643764A (en) Security schemes for electronic paper display devices
JP2008282238A (en) Name card information acquisition system and name card information acquisition method
TW200525977A (en) Crypto display apparatus, system and method for displaying secured images
CA2792320C (en) Displaying private information using alternate frame sequencing
CN101533504A (en) Electric medical affairs system and device
Bernsland et al. CS: NO–an Extended Reality Experience for Cyber Security Education
JP3973045B2 (en) Privacy protection encryption method, privacy protection encryption system, and privacy protection encryption program
CN2788246Y (en) Intelligent dynamic display secret keyboard
CN112861156B (en) Secure communication method and device for display data, electronic equipment and storage medium
CN201188237Y (en) Private cipher input system
Han et al. Optical key bit stream generator