200525977 九、發明說明: 【發明所屬之技術領域】 本發明相關於一保密顯示裝置,用以顯示安全影像的系 統’及顯示安全影像的方法。 【先前技術】 在P· Tuyls等人的一篇文章中(名稱為” visual Crypt〇200525977 IX. Description of the invention: [Technical field to which the invention belongs] The present invention relates to a security display device, a system for displaying a secure image, and a method for displaying a secure image. [Prior art] In an article by P. Tuyls et al. (Named "visual Crypt〇"
Displays Enabling Secure Communications(能安全通訊之視 覺保密顯示器),,,發表於2〇〇3年3月12至14日在德國 Boppard所舉行有關普遍計算安全的第一國際會議中)揭示 -保密顯示裝置。此文章使用一加密原則,其利用兩”影 像”合併以產生一”清晰”(即未加密)影像。 —4文早揭v-裝置,丨具有一顯#螢幕及用以重疊該顯 不螢幕的一重豐螢幕。該重疊榮幕在一位置依存方式中控 制來自該顯示勞慕的亦始彳奉^ ^ 綦的先線傳輸。由該重疊螢幕傳輸的位置 ,存,係由-鍵圖案加以控制。當必須顯示—原始影像 〜/原始〜像调適(加密)成形成一加密影像圖案,俾該 加密影像圖案在根據該鍵圖案 時,將形成該原始影像。選擇該鍵圖$ J先學傳輸 影像未可由其本身加以認出1 °;曹:该调適的原始 原始影像成為可見的一鍵 幕,,。 乂下该重®螢幕將稱為”鍵螢 當使用一合適加密技術時 顯露該原始影像,即可二不用向無法產生該鍵圖案者 圖案的複製無法使用,因_ =該加密影像。為使該鍵 巧!吊地變動該鍵圖案。一計 98225.doc 200525977 算元件搞合至該螢幕以計算及提供該等鍵圖案,該計算涉 及未經授權人士無法取得的秘密資訊。當然。必須保證藉 由在加密影像圖案中包括公開資訊,可實現與該鍵圖案對 應的加密。 該計算元件可光學地拾取此公開資訊,使用該秘密資訊 從此公開資訊算出該鍵圖案。但,當然可使用其他同步方 式(諸如時間相關鍵圖案變動,或公開資訊分開傳送等)以 計算該鍵圖案。 玍岣晰影像的方式中,數個強有力觀點之一為角 密係在見到該影像前的最後階段光學地發生。不會形成习 I易禝製的電子清晰影像信號。此外,該鍵圖案在該鍵蜜 ::的產生可發生在一閉路元件中’其具有的特性报像智 :卡的特性。此—閉路式光學鍵圖案產生元件通常包含. :計算元件,用以計算鍵圖案;該鍵螢幕與其驅動電子 學;及-感應器(可選擇),用以讀取公開資 :用公開資訊以計算必須應用在該鍵勞幕的鍵圖Γ 此閉路式光學鍵圖案產生元件不f產生 建圖案 ^位置依存傳輸純形式產生—光學❹1光 案產生讀的大部分電子學可實現在 子 全元件基本上受到如一智慧卡中:件中… 措施保護。此令斜斜^對抗未經授權存取的 品4 十“秘密資訊的保密攻擊更因縫# 而,秘密資訊可否恢復當然仍有風險。 然 【發明内容】 本發明的其中-目的為增加該 ⑼不裝置的堅固,尤 98225.doc 200525977 '、疋亥光予鍵圖案產生元件與秘密資訊忙产 根據本發明之觀察,^對抗。 可由外部見到,因此使用該等時脈週^;像/時脈信號 使光學鍵圖宰產婊-从+ ▲ 屑的蜆祭(例如藉由 衝,以觀 在㈣㈣時脈週期中經受電磁财 衝以規祭該鍵圖案中形成的變 :磁脈 電)’保密攻擊會有風險…鎖此類==源耗 螢幕的像素或影像線時脈至少與使用該丄鍵 同步電路(不H统時鐘卜 μ作為-非 明庄忍,使用非同步電路以阻礙對秘密資訊 些應用所習知。惟,未曾揭示此技術用於光學鍵圖= 凡件/亦未明顯指示其對此類元件的應用,原因是此一元 棒基本上係-矩陣顯示元件,其必須供以規律時脈速率, 初看之下在此封閉力件中並+需要進一步保護。 【實施方式】 圖1說明一影像顯示系統。該系統包括一加密影像源 10、一接收器120、一顯示螢幕122、一鍵影像產生器 140、一重疊螢幕142,及一重疊驅動器144。加密影像源 10包括串聯的一清晰源100、一加密驅動器1〇2及一發射元 件1 04。接收器1201馬合至驅動顯示榮幕122。耗合鍵影像 產生器140以經由重疊驅動器ι44而驅動重疊螢幕142。 該影像顯示系統的基本操作實施例揭示於Ρ· Tuyls等人 的一篇文章中’名稱為 ”Visual Crypto Displays Enabling Secure Communications(能安全通訊之視覺保密顯示器)”, 98225.doc 200525977 發表於2003年3月i2至14日在德國B〇ppard所舉行 計算安全的第一國際會議中。 曰、 結合顯示螢幕I22及重疊螢幕M2用以顯 貝不一原始影像, /、對應至來自清晰影像源1 00的清晰影像。加穷元件⑺ 重疊螢幕142執行互補的加密及解密運算。加宓元4 及 行該原始影像(其由原始影像源丨0 0所產生)的數位代表的2 2 密’及計算-加密影像的數位代表。發射元件ι〇4例如: 由一公用網路,或藉由無線信號而傳送該加密影像的數位 代表。 接收器120接收該加密影像的數位代表,及使用此 以驅動顯示榮幕122,以顯示該加密影像。顯示勞幕可終 由產生-光強度圖案作為該影像中的位置函數以顯示該力: =像’但亦可藉由產生入射光的反射圖案,或背光傳送 圖案而顯示該加密影像。 重豐螢幕142光學地執行解密(如Tuyls等的文章中所 H疊榮幕142藉由在一位置依存方式中從顯示勞幕 二通過光而解密。鍵影像產生器14〇產生所需的鍵資訊以 才工制該位置依存性,及藉以控制顯示螢幕。該鍵資訊對庫 ^加密元件1〇2將原始影像加密所用的鍵。結果,顯示營 幕122及重豐螢幕的結合顯示該原始影像。 黎:佳鍵圖案產生器140、重疊驅動器m及重疊發幕142 ^在一共用封裳中,以形成—可攜式光學鍵圖案產生元 =使!者可將此—光學鍵圖案產生元件連接至入未受保 、丁螢幕122,以存取顯示在顯示螢幕122上的加密影 98225.doc 200525977 像。該光學鍵圖案產生元件亦可大體上永久地連接至-特 定顯示螢幕122。在此例中,該光學鍵圖案產生元件與該 顯示螢幕的顯示電子學間的電子分離供以防備劈裂。 圖2說明一光學鍵圖崇姦4 — 埏囵茶產生兀件實施例,其包括鍵產生 益140、重璺螢幕142、一驅動器控制器22、一 X驅動器 26、- y驅動器24’及一時脈電路28。時脈電路28定出驅 的時脈。.驅動器控制器22耗合至χ驅動器26及y驅動器Μ, 其白耦σ 重璺螢幕142。驅動器控制器22經由一非同步 介面20㈣合至鍵產生㈣“鍵產生器⑽實作為一非同 步電路。 動器控制器22的時脈’及藉此定出X驅動器26及y驅動器24Displays Enabling Secure Communications, published at the first international conference on universal computing security held in Boppard, Germany, March 12-14, 2003) Revealing-Confidential Display Devices . This article uses an encryption principle, which uses two "images" to merge to produce a "clear" (ie, unencrypted) image. —4 Wen early reveals the v-device, which has a display # screen and a heavy screen to overlap the display screen. The overlapping glory controls the front-line transmission from the display of Lao Mu also in a position-dependent manner. The position and storage transmitted by this overlapping screen are controlled by the-key pattern. When it must be displayed-original image ~ / original ~ image is adapted (encrypted) to form an encrypted image pattern. When the encrypted image pattern is based on the key pattern, the original image will be formed. Select this key map $ J to learn to transfer the image. The image cannot be recognized by itself 1 °; Cao: The original image that is adapted becomes a one-click screen that is visible. Your Majesty's screen will be called "Key Firefly" when using a suitable encryption technology to reveal the original image, you can use it without copying the pattern to the person who cannot produce the key pattern, because _ = the encrypted image. In order to make The key is clever! The key pattern is suspended. A 98225.doc 200525977 computing element is coupled to the screen to calculate and provide these key patterns. The calculation involves secret information that is not available to unauthorized persons. Of course. It must be guaranteed By including public information in the encrypted image pattern, encryption corresponding to the key pattern can be achieved. The computing element can optically pick up this public information and use the secret information to calculate the key pattern from this public information. However, of course, other information can be used Synchronous methods (such as time-dependent key pattern changes, or separate transmission of public information, etc.) to calculate the key pattern. One of several powerful ideas in the way of clearing images is that the angle system is the last one before seeing the image. This phase occurs optically. It does not form an electronic clear image signal that is easily produced by Xi. In addition, the key pattern can occur when the key honey :: is generated. Among the closed-circuit components, its characteristics are reported as smart cards: the characteristics of the card. This-closed-type optical key pattern generating element usually includes: a computing element to calculate the key pattern; the key screen and its driving electronics; and-sensing (Optional) to read public information: use public information to calculate the key map that must be applied to the key screen Γ This closed-circuit optical key pattern generating element does not generate a pattern ^ position-dependent transmission pure form— Most of the electronics that can be read in the optical case can be realized in the sub-components, which are basically protected by a smart card: in the piece ... measures to protect. This makes it obliquely ^ against the unauthorized access to the product 4 10 "secret information Secret attacks are even more difficult. Of course, there is still a risk of recovering secret information. [Summary of the Invention] One of the purposes of the present invention is to increase the robustness of the device, especially 98225.doc 200525977 ', the production of the key-pattern pattern generating element and secret information are in busy production. According to the observation of the present invention, ^ confrontation. Can be seen from the outside, so use the clock cycle ^; image / clock signal to make the optical key diagram 婊-from + ▲ sacrifice of shards (for example, by punching to observe the electromagnetic field during the ㈣㈣ clock cycle Cai Chong rules the change in the pattern of the key: magnetic pulse electricity) 'secret attacks will risk ... lock this type == source consumes screen pixels or image line clock at least with the use of the key synchronization circuit (not H As a system clock, μ μ is known as the use of non-synchronous circuits to hinder some applications of secret information. However, this technology has not been revealed for optical key diagrams = where / it is not clearly indicated for such components The reason is that this unitary rod is basically a matrix display element, which must be supplied with a regular clock rate. At first glance, it needs to be further protected in this closed force element. [Embodiment] Figure 1 illustrates an image Display system. The system includes an encrypted image source 10, a receiver 120, a display screen 122, a key image generator 140, an overlay screen 142, and an overlay driver 144. The encrypted image source 10 includes a clear source in series 100.An encrypted drive 1 〇2 and a transmitting element 104. The receiver 1201 is connected to the driving display glory 122. The consumable key image generator 140 drives the overlapping screen 142 via the overlapping driver ι44. The basic operation example of the image display system is disclosed in P · An article entitled "Visual Crypto Displays Enabling Secure Communications" in an article by Tuyls et al., 98225.doc 200525977, March 2-14, 2003, published by Boppard, Germany The first international conference on computing security is held. That is, the combined display screen I22 and the overlay screen M2 are used to display different original images, and correspond to clear images from a clear image source 100. Additive element ⑺ overlay screen 142 Complementary encryption and decryption operations are performed. Add the element 4 and the 2 2 digits represented by the original image (which is generated by the original image source 丨 0 0) and the digital representation of the calculated-encrypted image. Transmitting element ι〇 4 For example: The digital representation of the encrypted image is transmitted by a public network or by a wireless signal. The receiver 120 receives the digital representation of the encrypted image, And use this to drive the display screen 122 to display the encrypted image. The display screen can eventually be generated-a light intensity pattern as a function of position in the image to display the force: = like 'but also by generating incident light The reflected image, or the backlight transmission pattern, is used to display the encrypted image. Chongfeng screen 142 performs decryption optically (such as Tuyls et al. ’S superimposed screen 142 passes light from the display screen in a position-dependent manner). And decryption. The key image generator 14 generates the required key information to work out the position dependency and control the display screen. The key information is a key to the encryption element 102 for encrypting the original image. As a result, the combination of the display screen 122 and the Zhongfeng screen displays the original image. Li: Jia key pattern generator 140, overlapping driver m, and overlapping curtain 142 ^ In a common seal to form—portable optical key pattern generating element = enable! I can connect this—optical key pattern generating element connection Go to the uninsured D screen 122 to access the encrypted video 98225.doc 200525977 image displayed on the display screen 122. The optical key pattern generating element may also be substantially permanently connected to a specific display screen 122. In this example, electronic separation between the optical key pattern generating element and the display electronics of the display screen is provided to prevent cleavage. FIG. 2 illustrates an optical key diagram Chong 4—an example of a tea-producing element, which includes a key-producing benefit 140, a heavy-duty screen 142, a driver controller 22, an X-driver 26, a y-driver 24 ', and脉 电路 28。 Circuit 28. The clock circuit 28 determines the driving clock. The driver controller 22 is coupled to the x-driver 26 and the y-driver M, and its white coupling σ weights the screen 142. The driver controller 22 is coupled to the key generator via an asynchronous interface 20. The key generator is implemented as an asynchronous circuit. The clock of the actuator controller 22 and the X driver 26 and the y driver 24 are determined by this.
在運异驅動器控制器22、χ驅動器财丫驅動器^在週期 ϋ循衣中紅作’该週期性循環由時脈電路Μ以信號顯示。 在原白知的—方式中’ χ驅動器26及y驅動器24將影像資料 =列選擇信號放置在重疊螢幕142的操縱導體上。鍵產生 Γ β ^ ^影像賁料,並將該影像資料的相關資訊傳送 至驅動器控制器22,其使用該影像資料以控制X驅動器 2 6 (及/或y驅動器2 4)。 例如使用Tuyls等人的文章中所述一演算法,鍵產生器 使用秘始、貧訊以計算該影像資料。此涉及鍵產生器 中,. “路(通#為可程式電腦電路,未顯示)中數個電 路的運算。運I & & V係非同步的,意即該複合電路中的多種不 同電路開始說1 力作,以回應來自其他電路的個別請求信號, 及傳送個別灰A > 〜口知^唬,以回應該等請求信號何時已完成該 98225.doc -10- 200525977 * J動4乍€在收到一回應先前一要求信號的告知信號 ★才^產生新的一請求信號。回應鍵產生器140的數個 私路同步h取動作’並未使肖巾央系、統時鐘信號。 咖控制器22使用握手與鍵產生器14〇通訊。例如, 在由%'脈電路28以信號表示的時脈週期—開始,驅動器控 制器22傳送—請求信號至鍵產生11140巾的-電路。鐽產 :态140中的電路再產生一請求信號,以回應又產生數個 月长仏唬等等。產生數個告知信號作為回應,其又觸發數 個告知信號等等,直到告知該初始請求。通常,鍵產生器 140已設計好,俾一告知總會在時脈電路28的一時脈週期 内2達,或在驅動器控制器22回應一請求信號而載入鍵產 生时140所產生影像資料前經過的一預設整數的此類週期 到達。 圖3說明一實施例,其在鍵產生器14〇與驅動器控制器22 間耦合一記憶體30。在運算中,記憶體3〇用以儲存鍵產生 器140產生的影像資料。記憶體用於一第一及第二時序模 式中,其中其時序分別由鍵產生器140及時脈電路28控 制。在第一模式中,鍵產生器140計算該影像資料,並將 其寫入記憶體30中。第一模式係一非同步模式,其中鍵產 生器140藉由非同步握手控制時序。第二模式係一同步模 式’其中時脈電路28同時控制記憶體30及驅動器控制器22 勺寺序’驅動态電路2 2輸出數個位址至記憶體3 〇,及用以 在日守脈電路28界定的數個時間點從記憶體3〇讀取影像資 料’及記憶體在時脈電路28界定的數個時間點應用數個位 98225.doc 200525977 址及驅動資料。 在一替代實施例中,驅動器控制器22經由非同步界面2〇 從鍵產生器讀取該影像資料,並同步將該影像資料寫入一 記憶體,稍後用以驅動X驅動器26及/或y驅動器24。 圖4又說明另一實施例,其中鍵產生器14〇控制時脈電路 28。鍵產生器140產生數個請求信號並將其施至時脈電路 28,時脈電路28回應各請求信號,在一延遲之後產生一告 知信號,其亦作為驅動電路22、X驅動器26及7驅動器24的 時脈信號使用。 (未顯示)以計算該鍵圖案,同時 秘密資訊及外部資訊的一函數, 影像偵測的資訊,或含有該加遂 較佳鍵產生器140使用連接至重疊螢幕142的數個感應器 ’同時作為鍵產生器140中儲存的In the different driver controller 22, the χ driver and the driver ^ are in red in the cycle 红 cycle, and the cycle is displayed by the clock circuit M as a signal. In the original method, the χ driver 26 and the y driver 24 place the image data = column selection signal on the manipulation conductor of the overlapping screen 142. The key generates Γ β ^ ^ image data, and transmits the relevant information of the image data to the drive controller 22, which uses the image data to control the X drive 2 6 (and / or the y drive 2 4). For example, using an algorithm described in the article by Tuyls et al., The key generator uses secret and lean information to calculate the image data. This involves the operation of several circuits in the key generator, "path (through # is a programmable computer circuit, not shown). Operation I & & V is asynchronous, meaning a variety of different in this composite circuit The circuit begins to say 1 masterpiece to respond to individual request signals from other circuits, and to transmit individual gray A > ~ spoken ^ blind, in response to when these request signals have completed the 98225.doc -10- 200525977 * J 动 4 At first, it received a notification signal that responded to a previous request signal before generating a new request signal. The response of several private channels of the key generator 140 to synchronize the fetching action 'has not caused the Shaw system and the clock signal. The coffee controller 22 communicates with the key generator 14 using a handshake. For example, at the clock cycle represented by the pulse circuit 28, the driver controller 22 sends a request signal to the circuit that generates 11140 keys.鐽 Production: The circuit in state 140 generates a request signal in response to several months of bluffs and so on. It generates several notification signals in response, which triggers several notification signals and so on, until the initial signal is notified. Request. Usually, The generator 140 has been designed, and it will be notified that it will always reach 2 within a clock cycle of the clock circuit 28, or a driver controller 22 responds to a request signal and loads the image data generated by 140 before the key is generated. Such a period of a preset integer arrives. FIG. 3 illustrates an embodiment in which a memory 30 is coupled between the key generator 14 and the driver controller 22. In operation, the memory 30 is used to store the key generator 140. The generated image data. The memory is used in a first and second timing mode, wherein the timing is controlled by the key generator 140 and the clock circuit 28. In the first mode, the key generator 140 calculates the image data, and Write it into the memory 30. The first mode is an asynchronous mode in which the key generator 140 controls the timing by asynchronous handshake. The second mode is a synchronous mode in which the clock circuit 28 controls the memory 30 and The driver controller 22 scoops the sequence of the 'drive state circuit 2 2 to output several addresses to the memory 3 0 and reads image data from the memory 30 at several time points defined by the day guard circuit 28' and Memory in A number of time points defined by the pulse circuit 28 apply a number of bits 98225.doc 200525977 address and driving data. In an alternative embodiment, the driver controller 22 reads the image data from the key generator via the asynchronous interface 20, and The image data is synchronously written into a memory, which is later used to drive the X drive 26 and / or the y drive 24. Fig. 4 illustrates another embodiment in which the key generator 14 controls the clock circuit 28. The key generator 140 generates a plurality of request signals and applies them to the clock circuit 28. The clock circuit 28 responds to each request signal and generates a notification signal after a delay, which also serves as the time for the driving circuit 22, the X driver 26, and the 7 driver 24. Pulse signal is used. (Not shown) to calculate the key pattern, as well as a function of secret and external information, image detection information, or the key generator 140 containing the enhanced preferred key generator 140 using several sensors connected to the overlay screen 142 at the same time As stored in the key generator 140
或者, °亥外部資訊例如可為到達重疊螢暮Alternatively, the external information may be, for example, the arrival overlapping firefly
的一系列不同 明本發明,但應了解可作 -本身可為一光源,該加密 一位置函數,顯示螢幕122 98225.doc 200525977 I:供影像控制傳輸性用於來自背面來源的光線,或顯示 赏幕122可為具影像控敍射的螢幕(該例子令重疊營幕可 依該鍵圖案而控制往返顯示螢幕的傳輸)。在各例子卜 顯不螢幕122產生通過重疊螢幕J42的光特性的位置依存 I1生。反而’當然亦可利用該加密影像控制一重疊勞幕,及 利用該鍵圖案控制該顯示螢幕。此外,雖然已揭示本發明 用於一重疊螢幕’其位置選擇地阻礙或通過光,應了解亦 可使用其他形式的位置依存傳輸性,例如類似連續地可調 整傳輸性’而非二元的開/關特性、顏色依存傳輸性等。 此外雖然可使用Tuyls文章中揭示的加密及解密技術以 產生》亥鍵圖案,應了解本發明並未侷限於使用此等鍵圖 【圖式簡單說明】 已使用以下附圖詳細說明本發明此等及其他目的及有利 概念。 圖1說明一影像顯示系統;及 圖2至4說明數個光學鍵圖案產生元件。 【主要元件符號說明】 10 加密影像源 20 非同步介面 22 驅動器控制器 24 y驅動器 26 X驅動器 28 時脈電路 98225.doc -13- 200525977 30 記憶體 100 清晰影像源 102 加密元件 104 發射元件 120 接收器 122 顯示螢幕 140 鍵影像產生器 142 重疊螢幕 144 重疊驅動器 98225.doc -14-A series of different inventions, but it should be understood that it can be made-itself can be a light source, the encryption a position function, display screen 122 98225.doc 200525977 I: for image control transmission for light from a source from the back, or display The viewing screen 122 can be a screen with image-controlled narrative (this example allows the overlay screen to control the transmission of the round-trip display screen according to the key pattern). In each example, the position at which the screen 122 generates the light characteristics passing through the superimposed screen J42 depends on I1. Instead, of course, you can also use the encrypted image to control an overlay screen, and use the key pattern to control the display screen. In addition, although it has been disclosed that the present invention is used in an overlay screen where its position selectively blocks or passes light, it should be understood that other forms of position-dependent transmission may be used, such as similarly continuously adjustable transmission, instead of binary opening. / Off characteristics, color-dependent transmission, etc. In addition, although the encryption and decryption techniques disclosed in the Tuyls article can be used to generate the key pattern, it should be understood that the invention is not limited to the use of these key diagrams. [Schematic description] The invention has been described in detail using the following drawings And other purposes and beneficial concepts. Figure 1 illustrates an image display system; and Figures 2 to 4 illustrate several optical key pattern generating elements. [Description of main component symbols] 10 Encrypted image source 20 Asynchronous interface 22 Drive controller 24 y drive 26 X drive 28 Clock circuit 98225.doc -13- 200525977 30 Memory 100 Clear image source 102 Encryption element 104 Transmitting element 120 Receive Device 122 display screen 140 key image generator 142 overlay screen 144 overlay driver 98225.doc -14-