TW200820037A - Content control system and method using certificate chains - Google Patents

Content control system and method using certificate chains Download PDF

Info

Publication number
TW200820037A
TW200820037A TW096124594A TW96124594A TW200820037A TW 200820037 A TW200820037 A TW 200820037A TW 096124594 A TW096124594 A TW 096124594A TW 96124594 A TW96124594 A TW 96124594A TW 200820037 A TW200820037 A TW 200820037A
Authority
TW
Taiwan
Prior art keywords
voucher
entity
credential
chain
access control
Prior art date
Application number
TW096124594A
Other languages
Chinese (zh)
Inventor
Michael Holtzman
Ron Barzilai
Rotem Sela
Fabrice Jogand-Coulomb
Original Assignee
Sandisk Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/557,028 external-priority patent/US8140843B2/en
Priority claimed from US11/557,010 external-priority patent/US20080010449A1/en
Application filed by Sandisk Corp filed Critical Sandisk Corp
Publication of TW200820037A publication Critical patent/TW200820037A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be overwritten by the next one in the sequence.

Description

200820037 九、發明說明: 【發明所屬之技術領域】 本發明大致上係關於記憶體系統,且尤其係關於一種具 有多用途内容控制特徵之記憶體系統。 【先前技術】 諸如卜夬閃a己丨思體卡之儲存裝置係已經變成用於儲存諸如 相片之數位内容的儲存媒體之選擇。快閃記憶體卡亦可以 被使用於散佈其他類型媒體内容。再者,種類增加的主機 : 裝置(諸如電腦、數位相機、行動電話、個人數位助理及 諸如MP3播放機之媒體播放機)現在係具有呈現儲存於快閃 A 1思體卡内的媒體内容之能力。因此,對於快閃記憶體卡 以及其他類型行動儲存裝置而言,係具有很大的潛能變成 用於散佈數位内容的廣泛使用傳播媒介。 數位内容之擁有者及散佈者之主要考量之一係:在該内 容已經透過自諸如網際網路之網路下載或透過儲存裝置上 之内容的散佈而被散佈之後,應僅一經授權當事人被允許 存取該内容。一種避免未經授權存取之方式係使用一種用 於在内容存取被授予給當事人之前建置該當事人之身份之 系統。諸如公開密鑰基礎結構(PKI)之系統係已經被發 展,以用於此目的。於一種公開密鑰基礎結構系統中,稱 為憑證授權單位(Certificate Authority; CA)之受信任的授 權單位發佈憑證,以證明個人及組織之身份。諸如想要建 置身份之證明的組織及個人之當事人可用適當的證據向該 憑證授權單位登錄,以證明其之身份。在已經向該憑證授 122367.doc 200820037 權單位證明當事人之身份之後,該憑證授權單位將發佈一 憑證給此當事人。該憑證典型地包含:發佈該憑證之該憑 證授權單位的名稱、該憑證發佈給予之當事人的名稱、該 當事人的一個公開密鑰以及藉由該憑證授權單位之一私有 密鑰所簽名(典型地,係藉由將該公開密鑰之一摘要加密) 之當事人的公開密餘。200820037 IX. DESCRIPTION OF THE INVENTION: TECHNICAL FIELD OF THE INVENTION The present invention relates generally to memory systems, and more particularly to a memory system having multi-purpose content control features. [Prior Art] A storage device such as a dice card has become a storage medium for storing digital content such as photos. Flash memory cards can also be used to distribute other types of media content. Furthermore, an increased variety of hosts: Devices (such as computers, digital cameras, mobile phones, personal digital assistants, and media players such as MP3 players) now have the ability to present media content stored in the Flash A 1 Sphyn card. ability. Therefore, for flash memory cards and other types of mobile storage devices, there is a great potential to become a widely used medium for distributing digital content. One of the main considerations for the owner and distributor of digital content is that after the content has been distributed through the distribution of content from a network such as the Internet or through the storage device, only authorized parties are allowed. Access the content. One way to avoid unauthorized access is to use a system for establishing the identity of the party before the content access is granted to the party. Systems such as Public Key Infrastructure (PKI) have been developed for this purpose. In a public key infrastructure system, a trusted authority, called a Certificate Authority (CA), issues credentials to prove the identity of individuals and organizations. The parties to the organization and individuals, such as those who wish to establish a certificate of identity, may use the appropriate evidence to log in to the certificate authority to prove their identity. After the certificate has been granted to the voucher, the voucher authority will issue a voucher to the party. The voucher typically includes: the name of the voucher authority that issued the voucher, the name of the party to whom the voucher was issued, a public key of the party, and a private key signed by one of the voucher authorities (typically , by the public secret of the party by encrypting one of the public keys.

憑證授權單位之私有密鑰及公開密鑰係相關的,使得使 用公開密鑰加密之任何資料係可以藉由該私有密鑰予以解 密,且反之亦然。因此,私有密鑰及公開密鑰形成一密鑰 對。於RS A Security股份有限公司於2002年6月14日提出之 PKCS#1 V2.l:RSA Cryptography Standard"中提供用於密 碼編譯之私有及公開密鑰對之解說。憑證授權單位之公開 密餘係被實施成可公開取用。因此,當一當事人想要驗證 由另-個當事人所提交之憑證是否係真實的時,該驗證當 事=可以利用一解密演算法,僅使用該憑證授權單位之公 1山鑰來解费該憑證内之公開密鑰之經加密摘要。典型 ::亦於该憑證中識別該解密演算法。假如該憑證内之公 之經加密摘要匹配於該憑證内之未經加密公開密鑰 貝]根據 壬该憑證授權單位及該憑證授權單位 公開密鍮夕吉念α 丨隹干m 被鼠改,且係二的此係證明該憑證内的公開密鑰係尚未 :了驗證—當事人的身份,典型地 ::::如,隨機號碼),且要求另-當二::: 對於該挑戰的回應(亦即,以另-當事人之私有 122367.doc 200820037 密鑰加密的隨機號碼)。當該回應及憑證被接收時,該驗 證當事人首先藉由上述程序驗證是否該憑證内之公開密鑰 係真實的。假如該公開密鑰係被驗證為真實的,則該驗證 當事人可接著使用該憑證内之公開密鑰來解密該回應,且 比較該結果及原始傳送之該隨機號碼隨機號碼。假如其係 匹配,此係意謂另一當事人確實具有正確的私有密鑰,且 因此理由而證明其身份。假如該憑證内的公開密鑰係非真The private key and public key of the voucher authority are related so that any data encrypted with the public key can be decrypted by the private key and vice versa. Therefore, the private key and the public key form a key pair. The private and public key pair for cryptographic compilation is provided in the PKCS#1 V2.l:RSA Cryptography Standard" proposed by RS A Security Co., Ltd. on June 14, 2002. The disclosure of the voucher authority is implemented to be publicly available. Therefore, when a party wants to verify whether the documents submitted by another party are authentic, the verification can be solved by using a decryption algorithm and using only the public key of the certificate authority. Encrypted summary of the public key within the voucher. Typically, the decryption algorithm is also identified in the voucher. If the publicly encrypted digest in the voucher matches the unencrypted public key in the voucher, according to the voucher authorized unit and the voucher authorized unit, the secret custody is performed by the mouse, And this is the proof that the public key in the voucher has not yet been verified - the identity of the party, typically :::: eg, random number), and requires another - when two::: response to the challenge (ie, a random number encrypted with another party's private 122367.doc 200820037 key). When the response and the voucher are received, the verification party first verifies by the above procedure whether the public key in the voucher is authentic. If the public key is verified to be authentic, the verification party can then use the public key within the voucher to decrypt the response and compare the result with the random number of the random number originally transmitted. If it matches, this means that another party does have the correct private key and, for this reason, proves its identity. If the public key in the voucher is not true

實的,或者假如該解密之回應無法匹配該挑戰,則鑑認失 敗。因此,一想要證明身价夕各重 文立豸切之s事人將需要持有該憑證 及相關的私有密鑰。 藉由上述機制’可能不彼此信任的兩個t事人可以使用 上述程序’藉由驗證另一當事人中另一當事人之公開密鑰 而建置信任。由國際電信聯盟(ITU)之電信標準化部門 (Ιτυ-τ)而來的建議書χ·509係規定憑證架構之標準。關於 憑證及其之使用之更詳細資訊,請參閱此標準。 在行政機構中及在大型組織中,為了便利,對於稱為根 憑證授權單位之較高層級憑證授權單位而言,委派發佈憑 證之責任給若干較低層級憑證授權單位係可能適當的。舉 例而言,於一種兩層級式階層架構中,於最高層級之根喝 證授柘早位發佈憑證給較低層級憑證授權單位 等::層、:授權早位之公開密鑰係真實的。接著,彼等較 :::核單位係透過上述之登錄程序發佈 人。此驗證程序係自該憑證鏈之頂端開始。該㈣ I 將"'先使用該根憑證授權單位之該公開密鑰(已知:真實 122367.doc 200820037 的)以首先驗證該較低層級憑證授權單位之公開密鑰之真 實性。一旦該較低層級憑證授權單位之該公開密鑰之真實 性已經被驗證,則可藉由使用該較低層級憑證授權單位之 經驗證公開密鑰來驗證經受到較低層級憑證授權單位發佈 一憑證至其之當事人之公開密鍮之真實性。接著,由該根 憑證授權單位及較低層級憑證授權單位所發佈之該等憑證 係形成一含其身份正被驗證之當事人之兩個憑證的憑證 鏈。 憑證階層架構當然可以包含兩層以上層級,其中,除了 根憑證授權單位以外之於較低層級之每一個憑證授權單位 自一較高層級憑證授權單位推導出其授權,且係具有一含 有由較高層級憑證授權單位所發佈之其公開密鑰的憑證。 因此,為了驗證另一當事人之公開密鑰之真實性,可能需 要追蹤至該根憑證授權單位之路徑或憑證鏈。換句話說, 為了建置一當事人的身份,其身份需要被證明之當事人係 可能需要產生整個憑證鏈,由其自己的憑證至該根憑證授 權單位憑證之所有路徑。 如上文所述,該根憑證及發給憑證授權單位之所有憑證 (諸如於上述憑證階層架構中發給較低層級憑證授權單位 之憑證)係實施成可公開取得。目前,用於證明身份之憑 證的提交係已經採用兩種形式。於一第一形式中,想要被 鑑認之當事人僅提交由一個憑證授權單位所發佈之其自己 憑證,該憑證係該憑證鏈中最後一個憑證。假如該驗證當 事人不具有發佈該憑證之該憑證授權單位的公開密鑰,則 122367.doc 200820037 由此當事人決定獲得該憑證授權單位之該公開密鑰,以實 施驗證。假使需要一較高授權單位之公開密鑰來驗證一較 低層級憑證授權單位之公開密鑰,該驗證當事人將需要使 用該等授權單位内之發行者的名稱,而追蹤至該憑證及較 高層級憑證授權單位之公開密鑰之路徑。此程序持續,直 到驗證當事人抵達已知其公開密鑰為真實的而不需進一步 驗證之憑證授權單位為止。 於憑證鑑認之一第二形式中,雖然可以由想要被鑑認之 當事人提交該憑證鏈内所有憑證,然而不需要以任何特定 順序提交該等憑證。假如想要被鑑認之當事人亦連同憑證 一起提交關於被傳送至該驗證當事人之憑證鏈中憑證之正 確順序的資訊,則此資訊係可能於該訊息中出現較晚,使 得該驗證當事人可能不知道該等憑證的正確序列,直到整 個憑證鏈已經被接收為止。 第一形式之憑證交換及驗證確保驗證當事人能夠存取遺 失的憑證。雖然對於諸如電腦及行動電話之裝置存取諸如 網際網路之網路以獲得遺失的憑證係可能的,然而諸如快 閃記憶體卡之儲存裝置係尚未被使用於自己如此實施。 於第二形式之憑證交換及驗證中,於傳送至該驗證裝置 之訊息中提交所有憑證,使該驗證裝置不需要獲得該等憑 證。然而,該等憑證係可能不以任何特定順序予以傳送, 且關於該憑證鏈中之憑證順序的資訊係可以出現於該訊息 之任何位置,諸如於該訊息之結束處。此係意謂在該憑證 鏈中任何特定憑證能夠被分析以用於驗證之前,需要在驗 122367.doc -10- 200820037 證能夠開始之前接收及儲存整個憑證群組 如電腦、個人數位助理及行動電話之 ^十於堵 不是問題,然而此對於儲存裝置而 衣置而5 ’可能 驻罢危 σ 了犯呈現問題。儲存 4置係可以具有内建記憶體容量及處理能力, 限,以致於無法儲存及有效地分析長串的憑證Γ田又 2上述♦多Μ及問題,目前使用於儲存裝置及主機 、中之糸統無任何一個係完全滿意的。因此,係期望提 供具有較佳特徵之改良系統。Really, or if the decrypted response does not match the challenge, the authentication fails. Therefore, one who wants to prove that he is worthy of the singularity will need to hold the certificate and the relevant private key. By the above mechanism, two t-things who may not trust each other can use the above procedure to build trust by verifying the public key of another party in another party. Recommendation χ 509 from the Telecommunication Standardization Sector (Ιτυ-τ) of the International Telecommunication Union (ITU) specifies the standard for the credential architecture. See this standard for more details on the voucher and its use. In administrative agencies and in large organizations, for the convenience of a higher level voucher authority for a root certificate authority, it may be appropriate to delegate the responsibility for issuing a voucher to a number of lower level voucher authorities. For example, in a two-tier hierarchical structure, at the highest level, the license is issued to issue a certificate to a lower-level certificate authority, etc.:: Layer: The public key of the authorized early is true. Then, they are compared to the ::: nuclear unit through the above-mentioned login program publisher. This verification process begins at the top of the credential chain. The (4) I will "' use the public key of the root certificate authority (known: true 122367.doc 200820037) to first verify the authenticity of the public key of the lower level certificate authority. Once the authenticity of the public key of the lower level voucher authority has been verified, the verification by the lower level voucher authority may be verified by using the verified public key of the lower level voucher authority. The authenticity of the disclosure of the voucher to its parties. The credentials issued by the root certificate authority and the lower level certificate authority form a voucher chain containing two credentials for the party whose identity is being verified. The credential hierarchy may of course comprise more than two levels, wherein each credential authorization unit other than the root credential authorization unit derives its authorization from a higher level credential authorization unit, and has a The voucher of the public key issued by the high-level voucher authority. Therefore, in order to verify the authenticity of another party's public key, it may be necessary to trace the path or credential chain to the root credential authority. In other words, in order to establish the identity of a party, the identity of the party that needs to be certified may need to generate the entire voucher chain, from its own credentials to all paths of the voucher's credentials. As described above, the root voucher and all voucher issued to the voucher authority (such as the voucher issued to the lower level voucher authority in the voucher hierarchy) are implemented to be publicly available. Currently, submissions for the certification of identity have been in two forms. In a first form, the party that wants to be authenticated submits only its own credentials issued by a voucher authority, the voucher being the last voucher in the voucher chain. If the verification party does not have the public key of the certificate authority that issued the certificate, then the party will determine the public key of the certificate authority to perform the verification. If a public key of a higher authority is required to verify the public key of a lower level certificate authority, the verification party will need to use the name of the issuer within the authorized unit and track to the certificate and higher The path of the public key of the hierarchical certificate authority. This procedure continues until the party is verified to have arrived at a certificate authority whose known public key is authentic and does not require further verification. In the second form of one of the credential authentication, although all the credentials in the credential chain can be submitted by the party who wants to be authenticated, it is not necessary to submit the credential in any particular order. If the party wishing to be authenticated also submits information along with the voucher regarding the correct order of the voucher being transmitted to the voucher chain of the verification party, the information may appear later in the message, so that the verification party may not Know the correct sequence of such credentials until the entire credential chain has been received. The first form of voucher exchange and verification ensures that the verification party has access to the lost voucher. While it is possible for devices such as computers and mobile phones to access a network such as the Internet to obtain lost credentials, storage devices such as flash memory cards have not been used for their own implementation. In the second form of voucher exchange and verification, all credentials are submitted in the message transmitted to the verification device so that the verification device does not need to obtain such credentials. However, such documents may not be transmitted in any particular order, and information about the order of the documents in the voucher chain may appear anywhere in the message, such as at the end of the message. This means that before any particular document in the voucher chain can be analyzed for verification, it is necessary to receive and store the entire voucher group such as computer, personal digital assistant and action before the test can begin. It is not a problem to block the phone. However, this is for the storage device and the 5' may be in danger. The storage 4 system can have built-in memory capacity and processing capacity, so that it can not store and effectively analyze long strings of voucher, and the above-mentioned ♦ multiple problems and problems are currently used in storage devices and hosts, and in the middle. None of the systems is completely satisfactory. Therefore, it is desirable to provide an improved system with preferred features.

Ο 【發明内容】 -憑證鏈包含複數個連續的憑證串。每一憑證串包含至 少-個憑證。當於驗證實體處接收彼等憑證串日夺,該實體 係以一序列驗證彼等憑證串。假如該等憑證串係以相同於 其被驗證的序列予以接收’則上述困難將被避免。假如該 等憑證串係以此方式接收,且假如整個憑證串被接收,則 儲存裝置係可以容易地被使用於驗證該憑證鍵内這些憑證 之真實性。 “ 因為該憑證鏈内之連續的憑證串係以相同於其被驗證的 序列予以接收,此係意謂在個別的憑證串被接收及驗證之 後,不再需要該憑證串内的資訊。根據另一項實施例,被 接收及儲存於記憶體裝置内之至少_個憑證串可被該序列 中之-後續憑證串所覆寫。以此方式,可大幅減少必須被 保留以用於儲存用於驗證之憑證鏈内的憑證之儲存空間 量° 於本文所參照之所有專利、專利申請案、文章、書籍 122367.doc 200820037 規格、標準、其他出版品、文件及事物係藉此以參照方式 整體於此併人以用於所有目# ϋ程度上,在任何併 入之出版品、文件或事物之間之一個名詞的定義或使用上 的任何某種程度的不一致或衝突時,應以於本文件内的名 詞之定義及使用為準。 【實施方式】 圖1之方塊圖顯示示範性記憶體系統,可在該示範性記Ο [Summary of the Invention] - The voucher chain contains a plurality of consecutive voucher strings. Each credential contains at least one credential. When the authentication entity receives their credentials, the entity verifies their credentials in a sequence. The above difficulties will be avoided if the credential strings are received in the same sequence as they are verified. If the credential strings are received in this manner, and if the entire credential string is received, then the storage device can be readily used to verify the authenticity of the credential within the credential key. “Because successive credential strings within the credential chain are received in the same sequence as they are verified, this means that after the individual credential strings are received and verified, the information in the credential string is no longer needed. In one embodiment, at least one of the credential strings received and stored in the memory device can be overwritten by the subsequent credential string in the sequence. In this way, the reduction must be preserved for storage for storage. The amount of storage space for the voucher in the voucher chain of verification. All patents, patent applications, articles, books referenced in this document. 122367.doc 200820037 Specifications, standards, other publications, documents and things are hereby incorporated by reference. This document shall be used for all purposes, in any degree of inconsistency or conflict in the definition or use of a noun between any incorporated publication, document or thing, and shall be used in this document. The definition and use of the nouns in the first embodiment. [Embodiment] The block diagram of Fig. 1 shows an exemplary memory system in which the exemplary memory can be recorded.

憶體系統申實施本發明之各項態様。如示於圖丨,該記憶 體系統10包含一中央處理單元12、—緩衝管理單元 _U)14、-主機介面模組(him)16及—快閃記憶體介面 模組师)18、-快閃記憶體2〇及一周邊裝置存取模組 (PAM)22。記憶體系統!〇係透過一主機介面匯流排%及埠 26a而與一主機裝置24通訊。快閃記憶體2〇(其可屬於反及 (NAND)型)提供用於該主機裝置24之資料儲存,該主機裝 置24可以係-數位相機、一個人電腦、一個人數位助理、 〇 一數位媒體播放機(諸如一Mp3播放機)、一行動電話、一 視訊轉換器或其他數位裝置或設備。用於中央處理單元Μ 之軟體碼係亦可以儲存於快閃記憶體2〇之中。快閃呓栌體 介面模組㈣透過-快閃記憶體介面匯流排28及谭2㈣ 連接至該快閃記憶體2〇。主機介面模組16係適合用於連接 至-主機裝置。該周邊裝置存取模組22選擇用於鱼該中央 處理單元12通訊之適當的控制器模組,諸如快閃記憶體介 面模組、主機介面模組及緩衝管理單h於-項實施例 中’該系統1G於虛線方塊内之所有組件可被包封於一單一 122367.doc •12· 200820037 單兀之中,諸如於記憶體卡或記憶體條10,之内,較佳地係 被囊封。該記憶體系統1 〇係可卸除地連接至主裝置Μ,使 得系統10内的内容可被許多不同的主機裝置之每一者所存 取0 於下文中,記憶體系統10亦被稱為記憶體裝置,或僅 稱為記憶體裝置或裝置。雖然本文中藉由引用快閃記憶體 來闡釋本發明,但是本發明亦可以應用於其他類型呓伊 體’諸如磁碟,光碟,以及其他類型可重寫非揮發性記憶 王機直接記憶體存取 该緩衝管理單元14包含 (HDMA)32,一快閃直接記憶體存取(fdma)34,—仲裁器 36,-緩衝隨機存取記憶體(BRam)38a —密碼編譯引擎 4〇。δ亥仲裁器36係一共用匯流排仲裁器,使得僅—主栌器 (master)或起始器(其可以係該主機直接記憶體存取^該 快閃直接記憶體存取34或中央處理單元12)可於任何時間 為作用中狀態’且從屬器或目標係緩衝隨機存取記憶體 38。該仲裁器負責通道化適當的起始器請求至該緩衝隨機 存取記憶體38。該主機直接記憶體存取32及該快閃直接―己 憶體存取34負責介於該主機介面模組16、該快閃記憶體介 面核組18與該緩衝隨機存取記憶體38或者中央處理單元产 機存取記憶體(CPU RAM)12a之間傳輸之資料。該: 接記憶體:取32及該快閃直接記憶體存取34之操作係傳統 二二=:於本文詳細敘述。該緩衝隨機存取記憶體38 係用於儲存"於該主機装置24與快閃記憶體2〇之間傳通之 122367.doc 200820037 貝料。该主機直接記憶體存取32及該快閃直接記憶體存取 34負責介於該主機介面模組16/該快閃記憶體介面模㈣ 與該緩衝隨機存取記憶體38或者中央處理單元隨機存取記 體12a之間傳送資料’且用於指示區段(s⑽。〇完成。 ^ 員Λ靶例中,§己憶體系統10產生用於加密及/或解 Ο 在之在鑰值,其中,該密錄值較佳地係實質上無法被外部 裝置(諸如主機裝置24)所存取。或者,該密錄值亦可以在 »亥系統10之外產生(諸如藉由一使用權伺服器(〗心口“ server)所產生)且被傳送至系統1〇。不論該密鑰值係如何 產生,一旦該密鑰值被儲存於系統1〇之 體將能夠存取該密瑜值。然而,加密及解密典型二:: 4案方式實施’此乃因該主機裝置係以檀案之形式將資 料讀取及寫入至記憶體系統1〇。類似於許多其他類型儲存 裝置’記憶體裝置10係不管理檔案。雖然記憶體2〇確實儲 存一播案配置表(FAT)(其中,該等檔案之邏輯位址係被識 別)’但是該檔案配置表典型地係由該主機裝置24所存取 及管理,而非由該控制器12所存取及管理。因此,為了加 密於-特定檔案内的資料,該控制器12係必須依賴該主機 裝置,以傳送該記憶體20内該檔案中之資料的邏輯位址, 使得可由該系統10使用僅限於系統1〇可取得之密鑰值來尋 找及加密及/或解密該特定檔案之資料。 為了提供對於該主機裝置24及記憶體系統1〇兩者之控制 代碼(handle),以指向用於以密碼編譯方式處理檔案内的 資料之相同的密鑰,該主機裝置係提供用於由該系統⑺產 122367.doc -14- 200820037 生或被傳达至系統10之每—密鑰值之參照(reference),其 中,此類參照係可以僅為一密鑰10。因此,使該主機裝置 24相關聯於由系統1〇用一密鍮1〇以密碼編譯方式處理的每 一檔案,且使該系統10相關聯於用於用由該主機所提供之 密鑰ID以密碼編譯方式處理資料的每一密鑰值因此,當該 主機請求經以密碼編譯方式處理之資料時,其將傳送 求連同-密鑰ID以及將自記憶體2G擷取或儲存於記憶體 内之資料的邏輯位址至系統1G。系統1G產生或接收一密餘 值’並錢由該主機裝置24所提供之該密鑰軸關聯於此 密鎗值’且實施密碼編譯處理。以此方式,不需要改變記 憶體系統10操作之方式’同時允許其使用密鑰而完全控制 密碼編譯處理,包含對於密鑰值之獨佔式存取。換句話 說’ 一旦該密鑰值被儲存於系統1G之中或由系統ι〇予以產 生’該系統係持續允許該主機裝置24藉由具有對於播案配 置表之獨佔式控制而管理該等檔案,同時其係維持對於使 用於密碼編譯處理之密職的管理之獨佔式控制。在 密鑰值被儲存於記憶體系統1Q之後,該主機裝置Μ無管理 用於資料密碼編譯處理之密鑰值的責任。 於一項實施财’由該主機裝置24所提供之密細 送至該記憶體系統或由該記情體 号 U體糸統所產生之密繪值係形 成-數里的兩個屬性,於下文稱為"内容加密密鍮⑷一The memory system is intended to implement the various aspects of the present invention. As shown in the figure, the memory system 10 includes a central processing unit 12, a buffer management unit_U 14, a host interface module (him) 16, and a flash memory interface module. Flash memory 2 and a peripheral device access module (PAM) 22. Memory system! The system communicates with a host device 24 through a host interface bus % and 埠 26a. Flash memory 2 (which may be of the inverse (NAND) type) provides data storage for the host device 24, which can be a digital camera, a personal computer, a number of assistants, and a digital media player. Machine (such as an Mp3 player), a mobile phone, a video converter or other digital device or device. The software code system for the central processing unit 亦 can also be stored in the flash memory. The flash memory interface module (4) is connected to the flash memory 2 through the flash memory interface bus 28 and the tan 2 (4). The host interface module 16 is suitable for connection to a host device. The peripheral device access module 22 selects an appropriate controller module for communication of the central processing unit 12, such as a flash memory interface module, a host interface module, and a buffer management list. 'All components of the system 1G in the dashed box can be enclosed in a single 122367.doc •12·200820037 unit, such as a memory card or memory strip 10, preferably a capsule. seal. The memory system 1 is removably coupled to the host device such that the contents of the system 10 are accessible by each of a number of different host devices. Hereinafter, the memory system 10 is also referred to as A memory device, or simply a memory device or device. Although the invention is illustrated herein by reference to flash memory, the invention is also applicable to other types of 呓 体 '' such as magnetic disks, optical disks, and other types of rewritable non-volatile memory king memory direct memory storage. The buffer management unit 14 includes (HDMA) 32, a flash direct memory access (fdma) 34, an arbiter 36, a buffered random access memory (BRam) 38a, and a cryptographic compilation engine. The δ arbiter 36 is a shared bus arbitrator, such that only the master or initiator (which can be the host direct memory access ^ flash direct memory access 34 or central processing Unit 12) may be in an active state at any time and buffer the random access memory 38 from the slave or target. The arbiter is responsible for channelizing the appropriate initiator request to the buffered random access memory 38. The host direct memory access 32 and the flash direct memory access 34 are responsible for the host interface module 16, the flash memory interface core group 18 and the buffer random access memory 38 or the central The processing unit transfers the data transferred between the memory (CPU RAM) 12a. The memory: the operation of the 32 and the flash direct memory access 34 is conventional. The second two is: described in detail herein. The buffered random access memory 38 is used to store the 122367.doc 200820037 material that is transmitted between the host device 24 and the flash memory. The host direct memory access 32 and the flash direct memory access 34 are responsible for random interaction between the host interface module 16/the flash memory interface module (4) and the buffer random access memory 38 or the central processing unit. The data is transferred between the access tokens 12a and is used to indicate the segment (s(10). 〇Complete. ^ In the target case, the § memory system 10 is generated for encryption and/or decoding in the key value, Wherein, the cipher value is preferably substantially inaccessible to an external device (such as the host device 24). Alternatively, the cipher value may be generated outside the system 10 (such as by a usage right servo) The device (generated by the "server") is transmitted to the system 1. Regardless of how the key value is generated, once the key value is stored in the system, the value will be accessible. , encryption and decryption typical two:: 4 case implementation 'This is because the host device is to read and write data to the memory system in the form of a Tan file. Similar to many other types of storage device 'memory device The 10 series does not manage files. Although the memory 2 is indeed Save a schedule configuration table (FAT) (where the logical addresses of the files are identified) 'but the profile configuration table is typically accessed and managed by the host device 24, rather than by the controller 12 Accessed and managed. Therefore, in order to encrypt the data in the specific file, the controller 12 must rely on the host device to transmit the logical address of the data in the file in the memory 20 so that the system can be 10 using the key value that is only available to the system 1 to find and encrypt and/or decrypt the data of the particular file. To provide a control code for both the host device 24 and the memory system 1 Pointing to the same key used to process the data in the archive by cryptographic compilation, the host device is provided for each key generated by the system (7) 122367.doc -14- 200820037 or transmitted to the system 10 A reference to a value, wherein such a reference system can be only a key 10. Therefore, the host device 24 is associated with each file that is processed by the system 1 in a cryptographically compiled manner. And make this System 10 is associated with each key value used to process data in a cryptographically compiled manner with a key ID provided by the host. Therefore, when the host requests data processed by cryptographic compilation, it will transmit the request together with a key ID and a logical address of the data retrieved or stored in the memory from the memory 2G to the system 1G. The system 1G generates or receives a secret value 'and the secret provided by the host device 24 The key axis is associated with this secret gun value' and the cryptographic compilation process is implemented. In this way, there is no need to change the way the memory system 10 operates' while allowing it to use the key to fully control the cryptographic compilation process, including exclusive use of the key value. In other words, 'once the key value is stored in system 1G or generated by system ι', the system continues to allow the host device 24 to have exclusive control over the playlist configuration table. Manage these files while maintaining exclusive control over the management of secret jobs used for cryptographic compilation. After the key value is stored in the memory system 1Q, the host device has no responsibility for managing the key value for the data cryptographic process. In an implementation, the density provided by the host device 24 is sent to the memory system or the cryptographic values generated by the semaphore U system are formed into two values. Hereinafter referred to as "content encryption key (4) one

ErrrKey,CEK)”或”咖”。耗該主機裝置2何使 母一後鑰ID相關聯於一或多 π成—^ 1疋通主機裝置24亦 可使母—續1D相關聯於未餘織的資料或者以任何方式 122367.doc 15 200820037 組織之資料,且係不受限於組織成為完整檔案之資料。 為了使-使用者或應用程式獲得存取系統1〇内受保護的 内容或區域’將需要使用向系統10預登錄的一認證 (credential來鑑認該使用者或應用程式。一認證相關聯於 經授予給具有該認證之特定使用者或應用程式之存取權。 於預登錄程序中,系統10儲存—記錄,該記錄包含該使用 者或應用程式之該身份及認證’以及由該使用者或應用程 式所決定且透過該主機裝置24提供之與此身份及認證相關 聯之存取權。纟已經完成該預登錄之後’當該使用者或應 用程式請求將資料寫人至記憶體2叫,其將需要透過該主 機裝置提供其身份及認證、一用於加密該資料之密鑰、 及經加密資料被儲存之邏輯位址。系統1〇產生或接收一密 鑰值,且使該密鑰值相關聯於由該主機裝置所提供之密鑰 ID,且將用於加密待寫入之資料的密餘值之密餘①儲存於 用於該使用者或應用程式之記錄或表中。接著,加密該資ErrrKey, CEK) or "Caf". How does the host device 2 associate the parent-back key ID with one or more π-------------------------------------------------------------------- The information or organization of the information in any way is not limited to the organization's information as a complete file. In order to enable the user or application to access the protected content or area within the system. 'You will need to use a credential to pre-login to the system 10 to authenticate the user or application. An authentication is associated with access granted to a particular user or application that has the certificate. Pre-login In the program, system 10 stores a record containing the identity and authentication of the user or application and associated with the identity and authentication provided by the user or application and provided through the host device 24. Access rights. After the pre-login has been completed, 'When the user or application requests to write the data to the memory 2, it will need to provide its identity and authentication through the host device. a key for encrypting the data, and a logical address to which the encrypted data is stored. The system 1 generates or receives a key value and associates the key value with a key ID provided by the host device, and The secret 1 for encrypting the secret value of the data to be written is stored in a record or table for the user or application. Then, the capital is encrypted.

料且儲存經加密資料於該主機所指定之位址處以及其產生 或接收之密鑰值。 當一使用者或應用程式請求自記憶體2〇讀取經加密資料 時,其將需要提供其身份及認證、用於先前用於加密該請 求貝料之密鑰之密鑰ID、及該經加密資料被儲存之邏輯位 址系統1 0接著比對由該主機所提供之使用者或應用程式 身份及認證與儲存於其之記錄内的身份及認證。假如匹 配,則系統10將接著自其之記憶體内擷取與由該使用者或 應用程式所提供之密鑰ID相相關聯的密鑰值,使用該密鑰 122367.doc -16- 200820037 值解密儲存於該主機裝置所指定之位址處之資料,且傳送 该解密資料至該使用者或應用程式。 藉由分離該等鑑認認證與用於密碼編譯處理之密鑰的管 理’接著分享存取資料之權利而不共用認證係可能的。因 此,一群組具有不同認證之使用者或應用程式可存取用於 存取相同資料之相同的密鑰,而該群組以外的使用者係不 能存取。雖然一群組内所有使用者或應用程式係可以存取 相同的資料,其可以仍然具有不同的權利。因此,某些使 用者可以具有唯讀存取,而其他使用者可以具有唯寫存 取,而又其他使用者係可以具有唯讀存取及唯寫存取兩 者。因為系統1 〇維持一含有該使用者或應用程式之身份及 涊證、其可存取之密鑰ID以及每一密鑰1〇所相關聯之存取 權的e錄,所以對於系統丨〇而言,增加或刪除特定使用者 或應用程式之密鑰ID且改變與此密鑰ID相關聯的存取權、 自一使用者或應用程式委派存取權給另一使用者或應用程 式、或者甚至刪除或增加用於使用者或應用程式之記錄或 表係可能的,所有皆受控於一適當經鑑認之主機裝置。儲 存之記錄可指定一用於存取某些密鑰所需要的安全通道。 可使用對稱或非對稱演算法以及密碼來實行鑑認。 特別重要的疋該s己憶體糸統1 〇内的受到保護的内容之可 攜性。於存取該密鑰值係受到該記憶體系統控制之實施例 中,g併入該糸統之兄憶體系統或儲存裝置係自一外部系 統轉移至另一外部系統時,維持儲存於其内之内容的安全 性。不論該密鑰係由該記憶體系統所產生或者起源於該記 122367.doc -17 - 200820037 憶體系統外,外部系統無 ^ Ρ η - - ^ ^ 亍狁10内之此類内容,除 非已以-元王受到該記憶體系統控 轉。i 54- |丨Α 〈方式5忍外部糸 ,,,H 取你π全党控於該記憶體系 統,且夕卜部糸、统可僅以一根 # Μ β U體糸統内預設記錄所 才二制之方式進行存取。假如一 該請求將被拒絕。 以糸不付合此類記錄,則And storing the encrypted data at the address specified by the host and the key value it generates or receives. When a user or application requests to read encrypted data from memory 2, it will need to provide its identity and authentication, the key ID used to encrypt the key used to encrypt the request, and the The logical address system 10 in which the encrypted data is stored is then compared to the identity or authentication of the user or application identity provided by the host and authenticated and stored in its record. If it matches, the system 10 will then retrieve from its memory the key value associated with the key ID provided by the user or application, using the key 122367.doc -16-200820037 Decrypting the data stored at the address specified by the host device and transmitting the decrypted data to the user or application. By separating the authentication of the authentication and the key used for cryptographic processing, then sharing the right to access the data without sharing the authentication is possible. Therefore, a group of users or applications with different authentications can access the same key used to access the same data, and users outside the group cannot access it. Although all users or applications in a group can access the same material, they can still have different rights. Therefore, some users may have read-only access, while other users may have write-only access, while other users may have both read-only access and write-only access. Because System 1 maintains an e-record containing the identity and credentials of the user or application, its accessible key ID, and the access rights associated with each key, Adding or deleting a key ID for a particular user or application and changing the access rights associated with the key ID, delegating access from one user or application to another user or application, Or even deleting or adding to the record or representation of the user or application, all controlled by a properly authenticated host device. The stored record can specify a secure channel needed to access certain keys. A symmetric or asymmetric algorithm and a password can be used to perform the authentication. Of particular importance is the portability of the protected content within the 己 糸 1 system. In an embodiment in which the access to the key value is controlled by the memory system, the g-incorporated system or storage device incorporated in the system is transferred from one external system to another external system, and remains stored therein The security of the content inside. Regardless of whether the key is generated by the memory system or originated from the memory system, the external system does not have such content in η η - - ^ ^ 亍狁 10 unless Take - the king is controlled by the memory system. i 54- |丨Α <Mode 5 tolerate external 糸,,,H Take your π all-party control over the memory system, and the eve of the 糸 糸, system can only be a single # Μ β U system within the preset record Access is done in the same way. If one of the requests will be rejected. If you do not pay for such records, then

=供在保護内容上較大的彈性,可以想像僅限於經 =㈣的使用者或應用程式才能存取該記憶體之某些區 ^下文稱為分割區)。當結合上述以密鑰為基礎之資料加 後之特徵時,系統10係提供較大的資料保護能力。如示於 圖2’該快閃記憶體20係可以使其之儲存容量被分割成為 弄多分割^ -使用者區域或分割區及自訂分割區。所有 使用者及應用程式可存取使用者區域或分割區p〇,而不需 要鐘5忍°雖然任何應用程式或使用者可讀取或寫人至儲存 於該使用者區域内的資料的所有位域,假如所讀取之資 料係被加密,則無授權解密之使用者或應用程式無法存取 由儲存於一使用|區域内的位元值所表示的資訊。舉例而 言,由儲存於使用者區域P0内的檔案1〇2及1〇4所顯示。亦 儲存於該使用者區域的是未經加密檔案,諸如1〇6,其可 被所有應用程式及使用者讀取及瞭解。因此,象徵而言, 被加密之檔案係顯示為具有與其相關聯之鎖,諸如對於檔 案102及104而言。 雖然未經授權的應用程式或使用者無法瞭解於一使用者 區域P0内的經加密檔案,然而此類應用程式或使用者仍然 122367.doc -18 - 200820037 旎夠刪除或破壞該檔案,這對於一些應用程式而言可能為 不期望的。為了此目的,記憶體2〇亦包含受保護的自訂分 割區,諸如分割區P1&amp;P2,在無事先鑑認情況下無法存取 彼等自訂分割區。於此中請案内實施例中所允許的鑑認程 序係說明如下。 如亦顯示於圖2中,各種使用者或應用程式可以存取記 憶體20内的權案。因此,圖2顯示使用者丨及2及(執行於裝 置上之)應用程式1-4。在彼等實體被允許存取記憶體2〇内 又保羞的内谷之别,首先藉由一鑑認程序以下文說明之方 式鑑認彼等實體。於此程序中,需要於該主機端識別正在 明求存取之實體,以用於角色為基礎的存取控制。因此, 、在咕求存取之只體首先藉由提供諸如&quot;我是應用程式2且 我想要讀取檔案”之資訊,而識別自〔。接著,控制器匕 比對該身伤、鑑認資訊及請求與儲存於記憶體2〇或控制器 1/内之€錄。假如所有條件係、符合,則存取係被授予給此 類實體&amp;7F於圖2,使用者㈠皮允許讀取及寫入播案⑻ ^分割區P1 ’然而除了使用者1具有讀取及寫人檔案106至 刀d區P0之不x限制的權利之外,其僅可讀取檔案⑺之及 4另方面,使用者2不被允許存取檔案1 0 1及1 04,然 而可讀取及寫入存取檔案1〇2。如示於圖2,使用者m具 有相同的且入凋算法(AES),而應用程式1及3具有不同的 且入/寅算去(例如,RSA及⑽1GG1),其係亦與使用者】及2 之登入演算法不同。 女王儲存應用程式(SSA)係一種記憶體系統10之安全性 122367.doc -19- 200820037 應用程式,且闡釋本發明之一項實施例,其可被使用於實 鈿許多上述的特徵。安全儲存應用程式係可以建構為具有 儲存於該記憶體20或中央處理單元12内的非揮發記憶體 (未顯不)内的資料庫之軟體或電腦碼,且被讀入至隨機存 取記憶體12a中且由中央處理單元12所執行。所使用參照 安全儲存應用程式之字母縮寫係說明於下表:= For greater flexibility in protecting content, it is conceivable that only users or applications via = (4) can access certain areas of the memory (hereinafter referred to as partitions). When combined with the above-described key-based data addition features, system 10 provides greater data protection capabilities. As shown in Fig. 2', the flash memory 20 can be divided into a plurality of partitions - user areas or partitions and custom partitions. All users and applications can access the user area or partition p〇 without the need for a clock. Although any application or user can read or write to all the data stored in the user area. Bit field, if the data being read is encrypted, the user or application without authorization decryption cannot access the information represented by the bit value stored in a usage area. For example, it is displayed by files 1〇2 and 1〇4 stored in the user area P0. Also stored in the user area are unencrypted files, such as 1,6, which can be read and understood by all applications and users. Thus, symbolically, the encrypted file system is shown as having a lock associated with it, such as for files 102 and 104. Although an unauthorized application or user cannot know the encrypted file in a user area P0, such an application or user still has 122367.doc -18 - 200820037 to delete or destroy the file. Some applications may be undesirable. For this purpose, the memory 2〇 also contains protected custom partitions, such as partitions P1 & P2, which are inaccessible to them without prior authentication. The authentication procedures allowed in the examples in this case are explained below. As also shown in Figure 2, various users or applications can access the rights in the memory 20. Thus, Figure 2 shows the user 2 and 2 and (executed on the device) applications 1-4. In the case where the entities are allowed to access the internal memory of the memory 2, they are first identified by an authentication procedure in the manner described below. In this program, it is necessary to identify the entity that is being explicitly accessed on the host side for role-based access control. Therefore, the body that is requesting access is first identified by providing information such as &quot;I am application 2 and I want to read the file.] Then, the controller compares the injury, The identification information and the request are stored in the memory 2 or in the controller 1 . If all the conditions are met, the access system is granted to such entity &amp; 7F in Figure 2, the user (a) skin Allow reading and writing of the broadcast (8) ^ partition P1 'However, except that the user 1 has the right to read and write the file 106 to the knife d area P0, it can only read the file (7) and 4 On the other hand, user 2 is not allowed to access files 1 0 1 and 104, but can read and write access files 1〇2. As shown in Figure 2, user m has the same algorithm. (AES), while applications 1 and 3 have different in/out calculations (for example, RSA and (10) 1GG1), which are also different from the user and 2 login algorithms. Queen Storage Application (SSA) A security of the memory system 10 122367.doc -19- 200820037 application, and illustrating an embodiment of the present invention, It can be used to implement many of the above features. A secure storage application can be constructed as a software or computer having a database stored in non-volatile memory (not shown) in the memory 20 or central processing unit 12. The code is read into the random access memory 12a and executed by the central processing unit 12. The abbreviations of the reference secure storage application used are illustrated in the following table:

定義、字母縮窯及維宜Definition, letter kiln and vin

^ 體,具有真實 安全儲存應用程式且因而利用其之功能的任 何事物 安全儲存應用程式系統說明 資料安全性、完整性及存取控制係安全儲存應用程式之 主要角色。資料係明確地儲存於某種大量儲存裝置上的檔 案。女全儲存應用程式系統係位於儲存系統的上方,且增 加用於被儲存主機檔案之安全性層級,且透過安全性資料 結構而提供安全性功能,如下文所述。 該安全儲存應用程式之主要工作係管理相關聯於記憶體 内被儲存的(及安全的)内容的不同權利。記憶體應用程式 122367.doc -20- 200820037 需要管理多個使用者及對於多個健存的内容的内容權利。 自其之側而來的主機應用程式係看見此類應用程式可見之 驅動程式及分割區,以及管理及描緣該儲存裝置上儲存權 案之位置的播案配置表(FAt)。 於此h況下,δ亥儲存裝置使用分割成分割區之反及快閃 記憶體晶片,然而亦可使用其他行動儲存裝置且係屬於本 發明之範脅内。這些分割區係連續的邏輯位址緒 (thread),其中,一起始及一結束位址定義其邊界。因 f 此假如想要,可以藉由軟體(諸如儲存於記憶體2〇内的 軟體)而將限制賦加於對於隱藏分割區的存取,此類軟體 使此類限制相關聯於此類邊界内的位址。藉由該安全儲存 應用程式所管理之分割區邏輯位址邊界,使該安全儲存應 用程式可完全辨識分割區。該安全儲存應用程式系統使用 为割區,以實際上使資料安全免於未經授權之主機應用程 式。對於主機而言,該等分割區係一種定義儲存資料檔案 之專屬空間之機制。這些分割區可以係:公開的,其中, ° 可存取該儲存裝置的任何者可看見及知道該分割區存在於 該裝置上;或者私有的或隱藏的,其中,僅被選擇的主機 應用程式可存取及知道其存在於該儲存裝置上。 圖3係記憶體之示意圖,其顯示記憶體之分割區:p〇、 P1、P2及P3(顯然地,可採用少於或多於4個的分割區), 其中’ P0係一公開分割區,其可由任何實體存取而不需要 鑑認。 一私有分割區(諸如PI、P2及P3)隱藏對於其内之槽案的 122367.doc -21 - 200820037^ Body, anything that has a real secure storage application and thus leverages its capabilities. Secure Storage Application System Description Data Security, Integrity, and Access Control are the primary roles of secure storage applications. The data is stored in a file on a large number of storage devices. The female full storage application system is located above the storage system and adds a security level for the stored host files and provides security functionality through the security data structure, as described below. The primary task of the secure storage application is to manage the different rights associated with the stored (and secure) content in the memory. Memory Application 122367.doc -20- 200820037 Need to manage multiple users and content rights for multiple healthy content. The host application from its side sees the drivers and partitions visible to such applications, as well as the broadcast configuration table (FAt) that manages and maps the location of the rights stored on the storage device. In this case, the δHig storage device uses a reverse-flash memory chip that is divided into partitions, although other mobile storage devices may be used and are within the scope of the present invention. These partitions are consecutive logical bit threads, where a start and an end address define their boundaries. If f is desired, the restrictions can be imposed on the hidden partition by software (such as software stored in memory 2), such software associating such restrictions with such boundaries. The address inside. The secure storage application can fully recognize the partition by the partition logical address boundary managed by the secure storage application. The secure storage application system is used as a cut zone to virtually protect data from unauthorized host applications. For the host, these partitions are a mechanism for defining the exclusive space in which the data files are stored. The partitions may be: disclosed, wherein any of the storage devices accessible to the storage device may see and know that the partition exists on the device; or private or hidden, wherein only the selected host application It can be accessed and known to exist on the storage device. Figure 3 is a schematic diagram of a memory showing partitions of memory: p〇, P1, P2, and P3 (obviously, fewer or more than four partitions may be employed), where 'P0 is a public partition It can be accessed by any entity without authentication. A private partition (such as PI, P2, and P3) hides the slot case for it. 122367.doc -21 - 200820037

二取。藉由防止該主機存取該分割區1閃記憶體裝置 ^如,快閃記憶體卡)係傳送該分難内的f料檔案之保 心然而’此種保護係藉由賦加限制於存取儲存於該分判 區内該等邏輯位址處之資料,而吞沒駐留於該隱藏分割區 内所有檔案。換句話說’該等限制係相關聯於—邏輯位址 範圍。可存取該分割區的所有使用者/主機係可未無限制 存取内部的所有檔案。$了隔離不同的檔案及另一不同的 =案或者檔案群組’該安全儲存應用程式系統使用密餘及 密鍮參照或密鑰ID’而提供每-檔案或者檔案群組另一層 級安全性及完整性。用於加密在不同的記㈣位址處之^ 料的一特定密鑰值之一密鑰參照或密鑰1〇可被類推至一含 有該經加密資料之容器(container)或定義域(ά〇η^η卜因 此,於圖4中,該等密鑰參照或密鑰ID(例如,&quot;密鑰1&quot;及 &quot;密鑰2&quot;)係以繪圖方式顯示為圍繞使用相關聯於該等密鑰 ID之密鑰值加密之檔案之區域。 參照圖4,舉例而言,檔案A係可被所有實體存取而不需 要任何鑑認,因為其係顯示為不被任何密鑰ID所封入。即 使所有實體可讀取或覆寫公開分割區内的檔案B,然而稽 案B含有以一具有ID&quot;密鑰丨,,之密鑰予以加密之資料,所= 使得槽案B中所含有的資訊係不能被一實體存取,除非此 類實體有權存取此類密鑰。以此方式,使用密鑰值及密鑰 參照或密鑰ID係僅提供邏輯保護,其係相對於由上述分割 區所提供之保護類型。因此,可存取一分割區(公開的或 私有的)之任何主機能夠讀取或寫入整個分割區内的資 122367.doc -22- 200820037 料’包含經加密資料。然而,因為該資料係被加密,所以 未經授權的使用者係僅能夠破壞該資料。較佳地,其在無 偵測之下無法改變資料。藉由限制對於加密及/或解密密 鑰之存取,此特徵可僅允許經授權實體使用該資料。於^ 中亦使用一具有密鑰ID&quot;密鑰2”之密鑰來加密檔案8及 C 〇 可透過對稱加密法而提供資料機密性及完整性,該等對 稱加密方法使用内容加密密鑰(Content Encryption Key ; CEK),每内容加密密鑰一個。於該安全儲存應用程式實 施例中,於内容加密密鑰内的密鑰值係由快閃記憶體裝置 (例如,快閃記憶體卡)所產生或接收,該密鑰值係僅内部 使用且保持為避開外面世界的秘密。被加密或以密碼編譯 处之 &gt; 料係亦可以為雜凑的(hashed)或者密碼編譯係鍵 區塊的,以確保資料完整性。 並非於該分割區内的所有資料係以不同的密鑰予以加密 及相關聯於不同的密鑰1£&gt;。於公開或使用者檔案内或於作 業系統區域(亦即檔案配置表)内之某些邏輯位址係可以不 相關聯於任何密鑰或密鑰參照,且因而係可供可存取該分 割區本身之任何實體所使用。 一要求建立密鑰及分割區以及寫入及自其讀取資料或使 用該等密鑰之能力的實體係需要透過一存取控制記錄 (ACR)而登入該安全儲存應用程式系統。於該安全儲存應 用程式系統内一存取控制記錄的特殊權限(privilege)係稱 為π動作&quot;(action)。每一存取控制記錄係具有實施下列三種 122367.doc -23 - 200820037 類別的動作之權限··建 楚刀〇lJ區及猎鑰/密鑰ID ;在 割區及密錄;以及建立/更新其他存取控制存取刀 2控制記錄係被組織成群組,稱為存取控 =二:成功_一存取控制記錄,則該安全儲 得應用私式開啟一合:·、 μ θ期(session),透過該會期,可執行任 何存取控制記錄之動作。存 丁1 組係用於根據原則而控制存敌八^錄群 結構。 則工制存取分割區及密鑰之安全性資料 使用者分割區 該安全儲存應用程式系絲 土 + $糸統管理一或多個公開分割區,亦 稱為使用者分割區。此八宝丨 此刀割區係存在於該儲存裝置上且伟 可透過儲存裝置之桿準被敌宜、入人 係 铩旱項取寫入命令予以存取之一或多個 为割區。獲得關於分割區 吹, 大]以及其存在於該裝置上的 —貝訊較佳地無法對於該主機系統隱藏。 該安全儲存應用程式系㈣透過標準讀取寫人命令或該 安全儲存應用程式命令而能夠存取分龍。因此,較佳 地,存取分割區無法被 溉限用於特定存取控制記錄。然而, 該安全儲存應用程式系統 文茨寺主機裝置能夠限制存取 該使用者分割區。可個&amp;丨的 J個別啟用/停用讀取及寫入存取。允 許所有4種組合(例如,唯讀, ^ $舄(防寫保濩),讀取及寫 入,以及無存取權)。 該安全儲存應用程式李絲Take two. By preventing the host from accessing the partition 1 flash memory device, for example, a flash memory card, the transfer of the f file within the hard part is protected. However, the protection is limited by the addition. Taking the data stored at the logical addresses in the sub-judgment area, and engulfing all the files residing in the hidden partition. In other words, the restrictions are related to the logical address range. All users/hosts that have access to the partition have unrestricted access to all internal files. $ separates different files and another different case or file group 'The secure storage application system uses a secret and password reference or key ID' to provide another level of security per file or file group And integrity. A key reference or key 1 加密 used to encrypt a particular key value at a different (four) address can be analogized to a container or domain containing the encrypted data (ά) Thus, in FIG. 4, the key references or key IDs (eg, &quot;key 1&quot; and &quot;key 2&quot;) are graphically displayed as being associated with the use around The area of the file whose key value is encrypted by the key ID. Referring to Figure 4, for example, file A can be accessed by all entities without any authentication because it is displayed as being not by any key ID. Enclosed. Even if all entities can read or overwrite the file B in the public partition, the instance B contains the information encrypted with a key with the ID&quot;key, which makes the case B The information contained cannot be accessed by an entity unless such entity has access to such keys. In this way, the use of key values and key references or key IDs provides only logical protection, as opposed to The type of protection provided by the above-mentioned partition. Therefore, a partition can be accessed (public Or any of the hosts that are capable of reading or writing the entire partition. The information contains 'encrypted data.' However, because the data is encrypted, unauthorized users are The data can only be destroyed. Preferably, it cannot change the data without detection. By restricting access to the encryption and/or decryption key, this feature can only allow the authorized entity to use the data. A key with the key ID&quot;key 2&quot; is also used to encrypt files 8 and C. Data confidentiality and integrity can be provided by symmetric encryption using content encryption keys (Content Encryption) Key; CEK), one for each content encryption key. In the secure storage application embodiment, the key value in the content encryption key is generated by a flash memory device (eg, a flash memory card). Or receiving, the key value is only used internally and remains as a secret to avoid the outside world. The data that is encrypted or comcoded with the password can also be hashed or cryptographically keyed. Blocked to ensure data integrity. Not all data in the partition is encrypted with a different key and associated with a different key 1 £&gt; in the public or user profile or in the operating system Certain logical addresses within a region (i.e., a profile configuration table) may not be associated with any key or key reference and are therefore available to any entity that has access to the partition itself. The key and partition and the real system of writing and reading data or the ability to use the keys need to log into the secure storage application system via an Access Control Record (ACR). The special privilege of an access control record in the system is called π action &quot;(action). Each access control record has the authority to implement the following three types of actions in the 122367.doc -23 - 200820037 category. · Jian Chudao 〇 lJ area and hunting key / key ID; in the cutting area and secret record; and establish / update Other access control access knives 2 control records are organized into groups, called access control = two: success _ an access control record, then the secure storage application private open one: ·, μ θ period (session), through this session, can perform any access control record action. The Ding 1 group is used to control the structure of the enemy group according to the principle. The security access data for the partition access zone and the key user partition The secure storage application system + $ manages one or more public partitions, also known as user partitions. The arbor is located on the storage device and can be accessed by one or more of the cutting zones by the enemy of the storage device. It is better to be able to hide the partitioning system, and its presence on the device. The secure storage application system (4) can access the dragon through the standard read writer command or the secure storage application command. Therefore, it is preferred that the access partition cannot be limited to a particular access control record. However, the secure storage application system Vintz Temple host device can restrict access to the user partition. It is possible to enable/disable read and write accesses individually and individually. All four combinations are allowed (for example, read only, ^$舄 (anti-write protection), read and write, and no access). The safe storage application Li Si

飞糸、、先使存取控制記錄能夠使密鑰ID 相關聯於該使用者分割區内 1的“案,且使用相關聯於此類 岔餘ID之密餘來加密個別 U〜&amp;案。存取該等使用者分割區内 122367.doc -24 - 200820037 ㈣加《案以及設定對於該等分龍之存取權將使用該 安全儲存應用程式命令集而實行。上述特徵亦應用於未經 組織成檔案之資料。 安全儲存應用程式分割區 f Ο 有能夠僅透過該安全儲存應用程式命令存取之(避免未 經鑑認的當事人之)隱藏分割區。較佳地,該安全儲存應 用程式系統將*允許該主機裝置存取—安全儲存應用程式 刀割區’ 了透過一由登入至一存取控制記錄所建置之會 期之外。類似地’較㈣,該安全儲存應用程式將不提4 關於-安全儲存應用程式分龍之存在、大小及存取權限 之資訊,除非此請求係透過一已建置的會期而來。 對於分割區之存取權係自該存取控制記錄權限推導而 來。一旦一存取控制記錄登入至該安全儲存應用程式系 統,其可與其他存取控制記錄共用該分割區(敘述如下 文)。當建立一分割區時,該主機提供用於該分割區之一 參照名稱或者ID(例如,圖3及4十之Ρ0-Ρ3)。在對於該分割 區之進一步的讀取及寫入命令之中使用此參照。 儲存裝置之分割區 較佳地,該裝置之所有可用儲存容量被配置給使用者分 割區及目前組態的安全儲存應用程式分割區。因此,任何 重新分割操料冑涉到現有分割m新組態。對於节事 置容:的淨改變(所有分割區之大小的總和)將為零。該裝 置圮憶體空間内的分割區之ID係由該主機系統所定義。、 遠主機系統可重新分割現有分割區之一者 ★战為兩個較小 122367.doc -25- 200820037 的分割區’或者合併兩個現有分割區(其係可以或可以不 為相鄰的)成為一分割區。於經分割或經合併分割區内的 資料可被刪除或者保留不碰觸,其係根據該主機之判斷。 因為該儲存裝置之重新分割可導致資料的遺失(由於資 料被刪除或者使資料在該儲存裝置之邏輯位址空間内移 動),對重新分割之嚴格限制係由該安全儲存應用程式系 統所管理。僅一駐留於一根存取控制記錄群組内的存取控 制記錄(下文說明)被允許發佈一重新分割命令,且其僅可 參照由其所擁有的分割區。因為該安全儲存應用程式系統 不知道 &gt; 料係如何於該等分割區中組織(檔案配置表或其 他檔案系統結構),所以每當該裝置被重新分割時,重新 建構這些結構係該主機之責任。 使用者分割區之重新分割將改變主作業系統所觀看之此 分割區的大小及其他屬性。Flying, first enabling the access control record to associate the key ID with the "case" in the user partition, and encrypting the individual U~&amp; using the secret associated with such redundant ID Access to these user partitions 122367.doc -24 - 200820037 (4) Additions and settings for access to such breaks will be implemented using the secure storage application command set. The above features are also applied to Information organized into files. Secure Storage Application Partitions Ο There are hidden partitions that can be accessed only through the Secure Storage Application Command (to avoid unauthenticated parties). Preferably, the secure storage application The program system will *allow the host device to access - securely store the application's knife-cutting area' through a session established by logging into an access control record. Similarly, 'more (four), the secure storage application The information about the existence, size and access rights of the secure storage application will not be mentioned unless the request is made through an established session. Access to the partition is from that access. Recording authority is derived. Once an access control record is logged into the secure storage application system, it can share the partition with other access control records (described below). When a partition is created, the host provides Used for one of the partitions with a reference name or ID (eg, Figures 3 and 4, 0-Ρ3). This reference is used in further read and write commands for the partition. Preferably, all available storage capacity of the device is configured for the user partition and the currently configured secure storage application partition. Therefore, any re-segmentation involves a new configuration of the existing partition m. The net change (the sum of the sizes of all partitions) will be zero. The ID of the partition in the device space is defined by the host system. The remote host system can re-segment the existing partition. One of the battles is the division of two smaller 122367.doc -25- 200820037' or merge two existing partitions (which may or may not be adjacent) to become a partition. The data in the cut or merged partition can be deleted or left untouched, based on the judgment of the host. Because the re-segmentation of the storage device can result in the loss of data (because the data is deleted or the data is in the storage device) The strict restriction on re-segmentation is managed by the secure storage application system. Only one access control record (described below) resident in an access control record group is allowed. A re-segmentation command is issued, and it can only refer to the partitions owned by it. Because the secure storage application system does not know how the materials are organized in the partitions (file configuration table or other file system structure) Therefore, whenever the device is re-segmented, re-constructing these structures is the responsibility of the host. The re-segmentation of the user partition will change the size and other attributes of the partition viewed by the primary operating system.

在分割之後’確保該安㈣存應用程式系_任何存取 控制記錄係不正在參照非現有分割區係該主機系統的責 任。假如未適當地刪除或更新這些存取控制記錄,則未來 企圖代表這些存取㈣記錄存取非現有分㈣,將被該系 統偵測到及拒絕。關於被刪除的密鑰及密細採胡類似的 密鑰、密鑰ID及邏輯保護 當一檔案被寫入至某一障歲八 μ滅刀割區時,其係對於公眾為 I思藏。然而,一旦一實體^古虹&amp; β \ 貫體(有敵思的或者無敵意的)獲得對 该为割區之知識及存取,則 J 4私案係變成可用且易於瞭 122367.doc • 26 - 200820037After the splitting, 'ensure that the security (four) storage application system _ any access control record system is not referring to the non-existing partition is responsible for the host system. If these access control records are not properly deleted or updated, future attempts to access these (4) record access non-existing points (4) will be detected and rejected by the system. Keys, Key IDs, and Logical Protections for Deleted Keys and Density Huss When a file is written to a certain era, it is considered for the public. However, once an entity ^古虹 &amp; β \ 体 (civilistic or invulnerable) gains knowledge and access to the cut zone, the J 4 private case becomes available and easy to be 122367.doc • 26 - 200820037

解為了進—步使該檔案安全,該安全儲存應用程式可加 密該隱藏分割區内的檔案,纟中,用於存取解密該權案之 被矯之認證較佳地不同於用於存取該分割區的認證。由於 事實上4备案係完全由該主機所控制及管理,使一内容加密 密鑰相關聯於-檔案係_問題。連結該檔案與該安全前 應用程式認知的某物件(該密鑰ID)修正此問題。因此,當 由該安全儲存應m建立_密糾,該主機係使用由^ 安全儲存應用程式所建立之該密錄,使用於該密鑰之該密 鑰ID相關聯於經加密之資料。假如該密鑰連同密鍮ι〇 一起 被傳达至該安全儲存應用程式,則該密鑰及密鑰ι〇可輕易 地彼此相關聯。 該密鑰值及該密鑰ID提供邏輯安全性。相關聯於一給定 密鑰ID之所有資料(不論其之位置為何)係以該内容加密密 输(CEK)内相同的禮、餘值予以編密(cipher),該内容加密密 鑰之參照名稱或密鑰ID係由主機應用程式在建立時獨一地 k供。假如一實體(藉由透過一存取控制記錄進行鑑認)獲 得對一隱藏分割區之存取,且想要讀取或寫入該分割區内 的一經加密檔案,則其係需要可存取與該檔案相關聯之密 鑰ID。當授予用於該密鑰id之密鑰之存取時,該安全儲存 應用程式載入相關聯於此密鑰ID之内容加密密鑰内的密鑰 值,且在將資料傳送至該主機之前解密該資料,或在將資 料寫入至該快閃s己憶體2 0之前加密該資料。於一項實施例 中,相關聯於一密鑰ID之内容加密密鑰内的一密鑰值係由 該安全儲存應用程式系統隨機建立一次且由其維護。在該 122367.doc -27- 200820037 安全儲存應用程式系統外的任一實體皆不知道或不可存取 内容加密密鑰内之該密鑰值。外面的世界僅提供及使用— 參照或密鑰ID’而非内容加密密鑰内的密鑰值。該密鑰值 係受到徹底管理,且較佳地僅可由該安全儲存應用程式存 取。或者,該密鑰可被提供給該安全儲存應用程式系統。 該安全儲存應用程式系統使用任一(使用者定義的)下列 編密模式(所使用之真正的密碼編譯演算法以及内容加密 密瑜内的密鑰值係系統控制的’且係不透露給外面世 〇 界)·· 區塊模式-資料被分割成為區塊,該等區塊的每一者被 個別加密。此模式一般被認為較不安全且易受字典攻擊。 ;、、;而其將允终使用者隨機存取任一資料區塊。 鏈模式-資料被分割成為區塊,其係於加密程序期間被 鏈鎖(Chain)。每一區塊係被使用作為至下一加密程序之輸 入之一。於此模式中,雖然被認為較安全,然而資料係自 開始至結束予以循序寫入及讀取,建立一可能不被使用者 接受的過度耗用(overhead)。 雜湊的-具有額外建立一資料摘要之鏈模式,該資料摘 要可被用於確認資料完整性。 存取控制記錄及存取控制 忒安王儲存應用程式係設計成處置多個應用程式,其 中’。亥等應用程式之每一者於該系、统資料庫内被表示為一 具有節點的樹。介於該等應用程式之間之相互排斥係藉由 確保該等樹的分支之間無串擾而逹成。 122367.doc -28- 200820037 為了獲传存取該安全儲存應用程式系統,一實體需要透 過讜系統之存取控制記錄之一者來建置連接。由該安全儲 存應用程式系統根據内建於該使用者選擇待連接之存取控 制$己錄内的定義來管理登入程序。 該存取控制記錄係一對於該安全儲存應用程式系統之個 別登入點。該存取控制記錄係保有登入認證及鑑認方法。 亦駐留於該記錄内的係該安全儲存應用程式系統内的登入 權限,於其中係讀取及寫入特殊權限。此係顯示於圖5, 其係顯示相同存取控制記錄群組中的η個存取控制記錄。 此係意謂該η個存取控制記錄中至少一些者可共用對相同 密鑰之存取。因此,存取控制記錄#1及存取控制記錄如共 用對具有密鑰ID’’密鑰3’,之密鑰之存取,其中,存取控制 圮錄# 1及存取控制記錄#n係存取控制記錄ID,且,,密鑰3,, 係用於加密相關聯於”密餘3 ”之資料的密鑰之密鑰ID。亦 可使用相同的密鑰來加密及/或解密多個檔案,或者多組 資料。 該安全儲存應用程式系統支援數種登入該系統的類型, 其中,鑑認演算法及使用者認證係可以改變,因為一旦使 用者成功登入,該系統内的使用者特殊權限可改變。圖5 係再次顯示不同的登入演算法及認證。存取控制記錄# i指 定一密碼登入演算法及密碼為認證,而存取控制記錄#2指 定一公開密鎗基礎結構(PKI)登入演算法及公開密鑰為認 證。因此,為了登入,一實體將需要提交一有效的存取控 制記錄ID以及正確的登入演算法及認證。 122367.doc -29- 200820037 一旦一實體登入至該安全儲存應用程式系統之一存取控 制記錄’則在相關較該存取控制記錄的權限控制記錄 (PCR)中定義其權限(其制安全料應用程式命令之權 利)。於圖5中,根據所顯示之權限控制記錄,存取控制記 錄㈣予對相關聯於&quot;密鑰3&quot;之資料的唯讀權限,且存取 控制記錄#2授予對相關聯於,,密鑰5&quot;之資料的讀取及寫入 權限。 不同的存取控制記錄可共用㈣統内共同的利益及特殊 C 權限,諸如藉以讀取及寫入之密鍮。為了達成此目的,共 同具有某些事物之存取控制記錄被分組於存取控制記錄群 組(ACR群組)中。目此,存取控制記錄#1及存取控制記錄 #n共用對一具有密鑰ID,,密鑰3”之密鑰之存取。 存取控制記錄群組及其内之存取控制記錄係以樹狀階層 架構予以組織,且因此,除了建立保持敏感資料安全之安 全密鑰之外,一存取控制記錄較佳地係亦可夠建立對應於 Γ,其密鑰ID/分割區之其他存取控制記錄實體。這些存取控 、 制記錄子代將具有與其之父代(建立者)相同的或較少的權 限,且可被給予父代建立之任何密鑰的權限。不需要增 加,該等子代獲得對於其建立之任何密鑰的存取權限。此 係顯示於圖6。因此,存取控制記錄群組12〇内所有存取控 制記錄係由存取控制記錄122所建立,且此類存取控制記 錄中之兩者係繼承自存取控制記錄122之對存取相關聯於 π密鑰3&quot;之資料之權限。 存取控制記錄群組 122367.doc -30- 200820037 登入至該安全儲存應用程式系統係藉由指定一存取控制 、彔f、、且及w亥存取控制纪錄群組内的一存取控制記錄而者 行。 、只 獨 ID(參照名稱),其係 每一存取控制記錄群組具有 使用作為-索引,以指向在安全儲存應用程式資料庫中的 其項目。當建立該存取控制記錄群組時,該存取控制記錄 群組名無被提供給該安全儲存應用程m假如所提供 之存取控制記錄群組名稱係已經存在㈣助,則該安全 儲存應用程式將拒絕該建立操作。In order to make the file safe, the secure storage application can encrypt the file in the hidden partition, and the authenticated authentication for accessing and decrypting the right is preferably different from that used for access. The authentication of the partition. Since the fact that the 4 file is completely controlled and managed by the host, a content encryption key is associated with the file system. Attaching the file to an object (the key ID) recognized by the pre-security application fixes the problem. Therefore, when the secure storage should be established, the host uses the secret record established by the secure storage application, and the key ID used for the key is associated with the encrypted material. If the key is communicated to the secure storage application along with the key, the key and key ι can be easily associated with each other. The key value and the key ID provide logical security. All the data associated with a given key ID (regardless of its location) is ciphered by the same ritual and residual value in the content encryption key (CEK), the content encryption key is referenced The name or key ID is uniquely provided by the host application at the time of creation. If an entity (by authenticating through an access control record) obtains access to a hidden partition and wants to read or write an encrypted file within the partition, it needs to be accessible. The key ID associated with the file. When the access to the key for the key id is granted, the secure storage application loads the key value in the content encryption key associated with the key ID and before transferring the data to the host Decrypt the data or encrypt the data before writing it to the flash memory. In one embodiment, a key value within a content encryption key associated with a key ID is randomly established and maintained by the secure storage application system. Any entity outside the 122367.doc -27- 200820037 secure storage application system does not know or cannot access the key value in the content encryption key. The outside world only provides and uses - reference or key ID' rather than the key value within the content encryption key. The key value is thoroughly managed and preferably only accessible by the secure storage application. Alternatively, the key can be provided to the secure storage application system. The secure storage application system uses either (user-defined) of the following ciphering modes (the real cryptographic compilation algorithm used and the content encryption system is controlled by the key value system) and is not disclosed to the outside world. Face-to-face)·· Block mode—The data is divided into blocks, each of which is individually encrypted. This mode is generally considered to be less secure and vulnerable to dictionary attacks. ;,;; and it will allow the user to randomly access any data block. Chain mode - The data is divided into blocks, which are chained during the encryption process. Each block is used as one of the inputs to the next encryption program. In this mode, although considered safer, the data is written and read sequentially from start to finish, creating an over-capacity that may not be accepted by the user. Hash-up - A chain pattern with additional data summaries that can be used to confirm data integrity. Access Control Recording and Access Control The King's Storage Application is designed to handle multiple applications, among them. Each of the applications, such as Hai, is represented in the system and database as a tree with nodes. Mutual exclusion between such applications is achieved by ensuring that there is no crosstalk between the branches of the trees. 122367.doc -28- 200820037 In order to gain access to the secure storage application system, an entity needs to establish a connection through one of the access control records of the system. The secure program is managed by the secure storage application system based on the definition built into the access control account that the user selects to connect to. The access control record is a separate entry point for the secure storage application system. The access control record retains login authentication and authentication methods. Also resident in the record are login privileges within the secure storage application system in which special permissions are read and written. This is shown in Figure 5, which shows n access control records in the same access control record group. This means that at least some of the n access control records can share access to the same key. Therefore, the access control record #1 and the access control record share the access to the key having the key ID ''key 3', wherein the access control record #1 and the access control record #n The access control record ID, and, key 3, is the key ID of the key used to encrypt the data associated with "Secret 3". The same key can also be used to encrypt and/or decrypt multiple files, or multiple sets of data. The secure storage application system supports several types of logins to the system, wherein the authentication algorithm and the user authentication system can be changed, because once the user successfully logs in, the user's special privileges within the system can be changed. Figure 5 shows the different login algorithms and authentication again. The access control record #i specifies a password login algorithm and password for authentication, and the access control record #2 specifies a public key infrastructure (PKI) login algorithm and public key authentication. Therefore, in order to log in, an entity will need to submit a valid access control record ID along with the correct login algorithm and authentication. 122367.doc -29- 200820037 Once an entity logs into one of the secure storage application systems, the access control record 'is defined in the permission control record (PCR) of the access control record (its security material) The right to the application command). In FIG. 5, based on the displayed rights control record, the access control record (4) grants read-only access to the data associated with the &quot;key 3&quot;, and the access control record #2 grants the association to, Read and write access to the data of the key 5&quot;. Different access control records can share (4) common interests and special C permissions, such as the key to read and write. To achieve this, access control records that have certain things in common are grouped into access control record groups (ACR groups). Therefore, the access control record #1 and the access control record #n share the access to a key having a key ID, and a key 3". The access control record group and the access control record therein It is organized in a tree hierarchy, and therefore, in addition to establishing a security key to maintain sensitive data security, an access control record may preferably be associated with a key ID/partition. Other access control record entities. These access control, record generation children will have the same or fewer rights as their parent (founder) and can be given access to any key established by the parent. Incidentally, the children obtain access to any of the keys they establish. This is shown in Figure 6. Thus, all access control records in the access control record group 12 are accessed by the access control record 122. Established, and both of such access control records are inherited from the access control record 122 for access to the data associated with the π key 3&quot; access control record group 122367.doc -30- 200820037 Login to the secure storage application By specifying an access control, 彔f, and an access control record in the access control record group, only the ID (reference name) is used for each access. The control record group has an use as an index to point to its item in the secure storage application database. When the access control record group is created, the access control record group name is not provided to the secure storage. Application m If the provided access control record group name already exists (4), the secure storage application will reject the setup operation.

存取控制記錄群組係詩管理對存取權限及管理權限之 委派隸制;如同將於下文中敘述。圖㈣兩個樹所提供 之力靶之係官理完全分開實體(諸如兩個不同的應用程 式’或者兩個不同的電腦使用者)之存取。為此目的,對 於,個存取程序實質上彼此獨立(亦即,實質上無串擾)係 可能重要的’即使兩者皆同時發生亦如此。此係咅謂每一 樹内額外存取控制記錄及存取控制記錄群組的鐘認、權限 以及建立未連接至其他樹並且非相依於其他樹。因此,當 於口己隱體10中使用該安全儲存應用程式系統時,允許爷圮 t體系統10同時饲服複數個應用程式。亦允許兩個應用/程 ’彼此獨立地存取兩組分開的資料(例如,一袓相片及一 =曲此係顯示於圖6。因此,應用程式或使用者正在 r6之上方部分的樹内之節點(存取控制 :聯於”密鑰3,,、&quot;密餘X&quot;及”密歌”之資料可包含相片。 應用程式或使用者正在透過圖6之下方部分的樹内之節點 122367.doc -31 - 200820037 味取人控制記錄)存取之相關聯於&quot;密鑰5&quot;及,,密鑰Y&quot;之資料 σ 3歌曲冑立§亥存取控制記錄群組之存取控制記錄僅 ;田X存取控制s己錄群組係無存取控制記錄項目時才且 有刪除該存取控制記錄群組的權限。 ^ 實體之安全儲存應用程式進入點(entry point):存取控制 記錄 於該安全儲存應用程式系統内的一存取控制記錄敘述該 ,f體被允許登人㈣統之方式。# —實體登人該安全儲存 &quot;^式系統時,其係需要指定對應於其將執行之鑑認程 序的存取控制記錄。一存取控制記錄包含一權限控制記錄 (:CR),其係、顯示使用者—旦如示於圖$之存取控制記錄中 疋義經4監認後,該使用者可執行的經授予之動作。該主機 端的實體提供所有存取控制記錄資料欄位。The access control record group is a delegated authority for access rights and administrative rights; as will be described below. Figure (iv) The two subjects provided by the two trees are completely separate from the entities (such as two different applications) or two different computer users. For this purpose, it is important that the access procedures are substantially independent of each other (i.e., substantially free of crosstalk), even if both occur simultaneously. This system means that the access, permissions, and establishment of additional access control records and access control record groups in each tree are not connected to other trees and are not dependent on other trees. Therefore, when the secure storage application system is used in the hidden body 10, the system 10 is allowed to feed a plurality of applications at the same time. It also allows two applications/processes to access two separate sets of data independently of each other (for example, a photo and a yoke are shown in Figure 6. Therefore, the application or user is in the tree above the r6 The node (access control: associated with the "key 3,", &quot; secret X&quot; and "sense song" data can contain photos. The application or user is passing through the nodes in the tree in the lower part of Figure 6. 122367.doc -31 - 200820037 The taster control record) access is associated with the &quot;key 5&quot; and, key Y&quot; data σ 3 songs § 存取 存取 access control record group access The control record is only; the field X access control group has no access control record item and has the right to delete the access control record group. ^ Entity secure storage application entry point: The access control records an access control record recorded in the secure storage application system, and the f body is allowed to be boarded (4). The method is required when the entity accesses the secure storage &quot; Specify the access control corresponding to the authentication procedure that it will execute Recording: An access control record includes a rights control record (:CR), which is displayed by the user, as shown in the access control record of FIG. The act of granting. The host-side entity provides all access control record data fields.

田實體係成功地登入至一存取控制記錄時,該實體將 能夠查詢所有存取控制記錄之分割區及密鑰存取權限以及 存取控制記錄屬性管理(ACAM)權限(下文予以敘述)。 存取控制記錄ID 备一安全儲存應用程式系統實體起始登入程序時,其係 而要私疋對應於該登入方法的存取控制記錄1〇(如同當建 立該存取控制記錄係被時由該主機予以提供),使得當已 經付合所有登入需求時,該安全儲存應用程式將設定正確 的演算法及選擇正確的權限控制記錄。當建立該存取控制 記錄時’該存取控制記錄10被提供給該安全儲存應用程式 系統。 122367.doc -32- 200820037 登入/鑑認演算法 該鑑認演算法指定何種登入程序將被該實體所使用,及 何種認證係需要,以提供使用者身份的證明。該安全儲存 應用程式系統支援數種標準的登人演算法,範圍為自無程 序(及無認證)及以密碼為基礎的程序至一根據對稱或:: 稱密碼編譯之雙向鑑認協定。 認證 該實體之認證係對應於該登人演算法,且係由該安全儲 存應用程式所使用以驗證及鑑認該使用者。一用於認證之 範例可以係一用於密碼鑑認之密碼/個人識別碼數字,用 於登入演算法驗證之登入演算法密鑰,等等。該等認證 (亦即,個人識別碼,對稱密鑰等等)之類型/格式係預先定 義的,且係自該鑑認模式中推導出;當建立該存取控制記 錄時,該等認證被提供給該安全儲存應用程式系統。該安 全儲存應用程式系統對於定義、散佈及管理這些認證沒有 責任,惟以公開密鑰基礎結構為基礎的鑑認例外,其中, 可使用該裝置(例如快閃記憶體卡)來建立該RSA或其他類 型密鑰對,並且公開密鑰可被匯出,以用於認證建立。 權限控制記錄(PCR) 權限控制記錄顯示在登入該安全儲存應用程式系統之後 授予該實體之事項’及成功地傳送該存取控制記錄之鑑認 程序。有三種類型權限類別:分割區及密鑰之建立權限; 分割區及密鑰之存取權限;及實體存取控制記錄屬性之管 理權限。 122367.doc -33- 200820037 存取分割區 此段洛的權限控制記錄含有該實體於成 ==段時可存取之分割區的清單(使用提== 1存應用程式系統之其ID)。對於每一分割區,存 里被被限定為唯寫或唯讀或者可以指定完全的寫入/ :利。因此’圖5中之該存取控制記錄#1可存取分割區#2 / 套=3 = _#1°#^^_制記錄内的限制 亥4女全儲存應用程式分龍及公開分割區。 可藉由至裝載該安全儲存應用程式 田根存取控制記錄(下文予以說明)被建立成且有pp 二=控:錄僅可限制正規讀取及寫入命令存取該 ,品較仏地,於该安全儲存應用程式李統 取控制記錄係僅只有當其建立時,能夠被限 :控:記錄具有讀取/寫入該公開分割區之權限時了= 地,無法去除其權限。 1乂仏When the real system successfully logs into an access control record, the entity will be able to query the partition and key access rights of all access control records and access control record attribute management (ACAM) permissions (described below). Access Control Record ID When a secure storage application system entity initiates a login procedure, it is required to privately access the access control record corresponding to the login method (as when the access control record is established) The host provides it so that when all login requirements have been fulfilled, the secure storage application will set the correct algorithm and select the correct permission control record. The access control record 10 is provided to the secure storage application system when the access control record is created. 122367.doc -32- 200820037 Login/Authorization Algorithm This authentication algorithm specifies which login program will be used by the entity and which authentication system is required to provide proof of the user's identity. The Secure Storage Application System supports several standard drop-in algorithms ranging from no-program (and no-authentication) and password-based programs to a two-way authentication protocol based on symmetric or :: cryptographic compilation. Authentication The authentication of the entity corresponds to the denial algorithm and is used by the secure storage application to verify and authenticate the user. An example for authentication may be a password/personal identification number for password authentication, a login algorithm key for login algorithm verification, and the like. The type/format of such authentication (ie, personal identification number, symmetric key, etc.) is predefined and derived from the authentication mode; when the access control record is established, the authentication is Provided to the secure storage application system. The secure storage application system is not responsible for defining, distributing, and managing these authentications, except for public key infrastructure-based authentication exceptions, where the device (such as a flash memory card) can be used to establish the RSA or Other types of key pairs, and public keys can be exported for authentication establishment. The Rights Control Record (PCR) permission control record shows the item granted to the entity after logging in to the secure storage application system and the authentication procedure for successfully transmitting the access control record. There are three types of permission categories: partition and key establishment authority; partition and key access rights; and entity access control record attribute management rights. 122367.doc -33- 200820037 Access Partition The permission control record of this section contains a list of partitions that the entity can access when it becomes == (using the ID == 1 to store the ID of the application system). For each partition, the store is defined as write-only or read-only or can specify a full write/:profit. Therefore, the access control record #1 in Figure 5 can access the partition #2 / set = 3 = _#1 ° # ^ ^ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Area. By adding to the secure storage application, the Tamen Access Control Record (described below) is created and has pp 2 = control: recording can only restrict regular read and write commands to access the product. In the secure storage application, Li Tong takes control records only when it is established, it can be restricted: control: the record has the right to read/write the public partition = land, can not remove its permissions. 1乂仏

存取密鑰ID 控=的權限控制記錄含有當該實體登入程序符合存取 資料。所=時=實體可存取的密输1D之清單所相關聯的 控二:餘1D係相關聯於-駐留於出現於該權限The access control key of the access key ID control = contains the access data when the entity login program matches. ===The entity can access the list of the secret 1D associated with the control 2: the remaining 1D system is associated with - resides in the permission

係不Γ 割㈣的—或多個檔案。因為該等密鑰ID 目關聯於該裝置(例如,快閃記憶體卡)内的邏輯位 122367.doc -34- 200820037 址所以當-個以上的分割區係相關聯於一特定存取控制 二:時,該等檔案可位於該等分割區之任-者中。於該權 二制§己錄内指定之密鑰10可各具有一組不同存取權利。 對密鑰ID所指向之資料的存取可被限制成唯寫或唯讀,或 者可以指定完全的寫入/讀取權利。 存取控制記錄屬性管理(ACAM) /本段落敘述於某些情況下’如何可改變該存取控制記錄 系統之屬性。 於該安全儲存應用程式季统中 征叭乐、、死f可准許之存取控制記錄屬 性管理動作係·· 1·建立/刪除/更新存取控制記錄群組及存取控制記錄。 2·建立/刪除分割區及密鑰。 3·委派存取權給密鑰及分割區。 μ又代存取控制記錄較佳地無法編輯存取控制記錄屬性 官理權限。較佳地,此需要該存取控制記錄之刪除及重新 Ο ,立。再者’較佳地,對於由該存取控制記錄所建立之一 密鑰ID的存取權限無法被去除。 -存取控制記錄係可以具有建立其他存取控制記錄及存 取控制記錄群組的容詈0读#六 、 听旳谷里建立存取控制記錄亦可以意謂委 派由其建立者所持有的一些或全部存取控制記錄屬性管理 給彼等存取控制記錄。且有逮 六 ^ ,、有建立存取控制記錄之權限係意 明具有下列動作的權限: 1.定義及編輯子代的認證.較佳地,一旦被該建立存取控 制記錄所設定,該鐘認方法無法被編輯。該等認證係可以 122367.doc -35- 200820037 於已經定義用於子代的㈣演算法之邊界内被改變。 2·刪除一存取控制記錄。 委派建立權限給子代存取控制記錄(因而具有孫代)。 -有建立其他存取控制記錄權限之存取控制記錄係具 有委派解除封^(unbk)ek)權限給其建立之存取控制記錄的 權限(雖然其係可能不具有解除封鎖存取控制記錄之權 限)°该父代將於該子代存取控制記錄中置放一指向其解 除封鎖者之參照。 #該父代存取控制記錄係具有刪除其子代存取控制記錄的 權限之唯存取控制記錄。當—存取控制記錄刪除其建立 之一較低層級存取控制記料,由該較低層級存取控制記 、彔所繁衍的所有存取控制記錄係亦自動被刪除。當一存取 控制圯錄被刪除,則其建立之所有密鑰及分割區被刪 除。 存取控制纪錄可更新其自己的記錄係具有兩項例外: h密碼/個人識別碼,雖然密碼/個人識別碼係由該建立 存取控制記錄所設定,僅由包含密碼/個人識別碼之存取 控制記錄可更新該密碼/個人識別碼。 2·—根存取控制記錄係可以刪除自己及其駐留的存取控 制記錄群組。 委派存取權利給密鑰及分割區 存取控制圯錄及其之存取控制記錄群組被組合於樹狀階 層木構之中,其中,該根存取控制記錄群組及其内之該等 存取控制圯錄係於該樹的上方(例如圖6中之根存取控制記 122367.doc -36- 200820037 錄群組13〇及132)。於該安全儲存應用程式系統中可且有 數個存取控制記錄群組,雖然該等存取控制記錄群έ且係彼 此完全分離。於一存取控制記錄群組内的一存取控制記錄 可委派對於其之密鑰的存取權限給其所在的相同存取控制 記錄群組内的所有存取控制記錄,且委派給所有由其^立 ,存取控制記錄。較佳地,建立密鑰之權限包含委則吏用 該等密鑰之存取權限之權限。 對於密鑰之權限係分為三種類別: ’ 丨.存取·此係定義對於該密鍮之存取權限,亦即,福取 寫入。 |靖取, =有權-依敎義…建立—密餘之存取控制記錄係其 擁有者。此擁有權可自一存取控制記錄委派給另一存取控 密鑰之 == 提係彼等存取控制記錄係在相同的存取控制記 、彔_、、且中或在一子代存取控制記錄群組中 擁有權提供#其刪除以及委派權ρ艮給它之權限 G 權委派_此權限使該存取控制記錄能夠委派其所保 y存取㈣記料委派對其建立之㈣以及其具有存 取權限之其他分割區的存取權限。 —權限委派係藉由將該等分割區之名稱及密鎗出加入至指 取控制記錄的權限控制記錄之中而實行。委派密錄 子:榷:係可以藉由該密鑰ID或者藉由敘述存取權限係用 於委派存取控制記錄之所有建立的密餘而實行。 存取控制記錄之封鎖及解除封鎖 122367.doc -37- 200820037 存取控制,己錄可具有一封鎖計數器,當該實體對於該 系統之存取控制記錄鑑認程序係不成功時累加該封鎖計數 器。當達到某—最大數量之不成功鑑認時,該安全儲存應 用程式系統將封鎖該存取控制記錄。 ,該被封鎖存取控制記錄可被另—存取控龍錄解除封 鎖,該另-存取控制記錄係被該被封鎖存取控制記錄所參 照。對於該解除封鎖存取控制記錄之參照係被其之建立者 ΟIt is not necessary to cut (4) - or multiple files. Because the key IDs are associated with logical bits 122367.doc -34 - 200820037 within the device (eg, a flash memory card), when more than one partition is associated with a particular access control two At the time, the files may be located among the persons of the divisions. The keys 10 specified in the rights record may each have a different set of access rights. Access to the material pointed to by the key ID can be restricted to write-only or read-only, or a full write/read right can be specified. Access Control Record Attribute Management (ACAM) / This paragraph describes how to change the attributes of the access control record system in some cases. In the secure storage application system, the access control record attribute management operation system is enabled, and the access control record group and the access control record are created/deleted/updated. 2. Create/delete partitions and keys. 3. Delegate access to the key and partition. The μ generation access control record preferably cannot edit the access control record attribute. Preferably, this requires the deletion and re-opening of the access control record. Further, preferably, access rights to one of the key IDs established by the access control record cannot be removed. - The access control record system may have a set of access control records and access control record groups. 6. The establishment of an access control record in the listening valley may also mean that the delegation is held by the creator. Some or all of the access control record attributes are managed to their access control records. And there are arrests, and the authority to establish access control records is intended to have the following actions: 1. Define and edit the authentication of the child. Preferably, once set by the established access control record, The clock recognition method cannot be edited. Such certifications may be changed within the boundaries of the (four) algorithm that has been defined for the children, 122367.doc -35- 200820037. 2. Delete an access control record. Delegate permissions to child access control records (and thus grandchildren). - an access control record having permission to establish other access control records has the authority to delegate access control records to the access control record (although it may not have the unblocked access control record) Permission) ° The parent will place a reference to the unblocked person in the child access control record. The parent access control record has a unique access control record that deletes the permissions of its child access control records. When the access control record deletes one of the lower level access control records, the access control record system that is propagated by the lower level access control record is automatically deleted. When an access control record is deleted, all keys and partitions it creates are deleted. The access control record can update its own record with two exceptions: h password/personal identification code, although the password/personal identification code is set by the established access control record, only by the password/personal identification code. Take the control record to update the password/personal identification number. 2·—The root access control record can delete itself and the access control record group it resides on. Delegate access rights to the key and partition access control records and their access control record groups are combined in a tree hierarchy, wherein the root access control record group and the The access control records are located above the tree (e.g., root access control record 122367.doc-36-200820037 in Figure 6 for groups 13 and 132). There may be several access control record groups in the secure storage application system, although the access control records are completely separate from each other. An access control record in an access control record group can delegate access rights to its key to all access control records in the same access control record group in which it resides, and delegate to all access control records Its standing, access control records. Preferably, the authority to establish a key includes the authority to use the access rights of the keys. The rights to the key are divided into three categories: ’ 存取. Access 此 This defines the access rights for the key, that is, the fetch write. |Jing take, = right - rely on Yi... establish - the access control record of the secret is its owner. This ownership can be delegated from one access control record to another access control key == the access control records are in the same access control record, 彔_, , and in a child Ownership in the access control record group. Its deletion and delegation rights ρ 艮 its authority G authority _ this privilege enables the access control record to delegate its guaranteed y access (4) the delegation is established (d) and access rights to other partitions with access rights. - The authority delegation is carried out by adding the names of the divisions and the secret guns to the authority control record for the control record. Delegate secrets: 榷: can be implemented by the key ID or by narrating access rights for all established secrets of the delegate access control record. Access control record blocking and unblocking 122367.doc -37- 200820037 Access control, recorded can have a lock counter, accumulate the lock counter when the entity's access control record identification procedure for the system is unsuccessful . The secure storage application system will block the access control record when a certain maximum number of unsuccessful authentications is reached. The blocked access control record can be unblocked by another access control record, which is referenced by the blocked access control record. The reference for the unblocking access control record is the creator of the Ο

予以歧。較佳地’該解除封鎖存取控制記錄係於位於與 該被封鎖存取控制記錄之建立者相同的存取控制記錄群組 中,且具有•’解除封鎖,,權限。 該系統㈣任何其他存取控龍料無法解除封鎖該被 封鎖存取控制記錄。-存取控制記錄可被組態成具有一封 鎖計數H ’但是無-解除封鎖者存取㈣記錄。於此情況 下’假如此存取控制記錄被封鎖’則其無法被解除封鎖。 根存取控制記錄群組-建立一應用程式資料庫 該安全儲存應用m統係設計成處置多個應用程式, 並且隔離該多個應用程式之每—者的資料。該存取控制記 錄群組系統之該樹結構制於識別及隔離應用程式特定^ 資料的主要工具。該根存取控制記錄群組係於一應用程式 安全儲存應用程式資料庫樹之頂端,以守某些不同的行 為規則。可於該安全儲存應用程式系統中組態若干根存取 控制記錄群組。於圖6中顯示兩個根存取控制記錄群組130 及132。顯然地,可使用齡容十 ,^ ^夕或較少個存取控制記錄群 、、且’且係屬於本發明之範_内。 122367.doc -38 - 200820037 新的應用程式之裝置(例如,快閃記憶體卡) 於該裝置之新的應用程式之認證係透過將 記錄群組/存取控制記錄樹加入至該裝置的 用程式系%支援三種不_式的根存取控 (以及該根存取控制記錄群組之所有存取 限):Disagree. Preferably, the unblocking access control record is located in the same access control record group as the creator of the blocked access control record, and has &apos;unblocking, privilege. The system (4) any other access control material cannot unblock the blocked access control record. - The access control record can be configured to have a lock count H' but no-unblocker access (four) record. In this case, if the access control record is blocked, it cannot be unblocked. Root Access Control Record Group - Create an Application Database The Secure Storage Application System is designed to handle multiple applications and to isolate data for each of the multiple applications. The tree structure of the access control record group system is the primary tool for identifying and isolating application specific data. The root access control record group is at the top of an application secure storage application database tree to maintain certain different behavior rules. Several root access control record groups can be configured in the secure storage application system. Two root access control record groups 130 and 132 are shown in FIG. Obviously, it is possible to use a group of ages, a number of access control records, and 'and are within the scope of the invention. 122367.doc -38 - 200820037 New application device (eg flash memory card) The authentication of the new application for the device is done by adding the record group/access control record tree to the device. The program% supports three non-type root access controls (and all access limits for the root access control record group):

1·開放式·不需要任何種類的鑑認之任何使用者或實 一、或透過忒系統存取控制記錄鑑認之使用者/實體(下文 予以敘述)’可建立_新的根存取控制記錄群組。該開放 式模式實現在無任何安全性措施之下進行根存取控制記錄 群組之建立,同時所有資料傳送係於-開放式通道上(亦 P於發佈代理者(lssuance agency)之安全環境下)或者 經由一透過該系統存取控制記錄鑑認所建置之安全通道 (亦即,透過空氣(0TA)及後置發佈程序)而實行。 Ο 登錄用於一 及/或發佈一用 新的存取控制 程序而實行。 該安全儲存應 制記錄群組建立 控制記錄及其權 叙如忒系統存取控制記錄未經組態(此係一選用特徵), 且該根存取控制記錄群組建立模式係設定成”開放式,,,則 僅该開放式通道選項係可用。 2.叉控制的·僅透過該系統存取控制記錄鑑認之實體可 建立一新的根存取控制記錄群組。假如系統存取控制記錄 未經組態’則該安全儲存應用程式系統無法被設定為此模 式。 3 ·已封鎖:根存取控制記錄群組之建立被停用,且無額 外的根存取控制記錄群組可被加入至該系統。 122367.d〇( -39· 200820037 兩個安全儲存應用程式命令控制此特徵(這些命令係可 被任何使用者/實體所使用,而不必鑑認): 1. 方法組態命令於組態該安全儲存制程式系統,以 使用三種根存取控制記錄群組建立模式中之任-者。僅下 列模式改變係被允許:開放式+受控制的,受控制的今已 !鎖(亦即’假如該安全儲存應用程式系統目前被組態為 文控制的’則其係僅能夠被改變成已封鎖 2. 方法組態鎖定命令-用於停用該方法組態命令, 鎖定目前選擇的方法。 κ久 當-根存取控制記錄群組被建立,其處於啟用其存取押 制記錄之建立及組態(使用與套用至該根存取控制記錄群 組之建,相同的存取限制)之特殊初始化模式。於該根存 二】己錄群組組態私序結束處,當該實體明確地將其切 換至操作模式時,不再 八 个丹j更新現有的存取控制記錄,且不 再可建立額外的存取控制記錄。 :旦一根存取控制記錄群組係置放於標準模式中,僅能 夠藉由透過其存取㈣㈣巾㈣派具有刪除該根存取控 制3己錄群組之權限的—存取控制記錄登人該系統,才能刪 除該根存取控制記錄群組。此絲了該特殊初始化模式之 外,根存取控制記錄群組之另一例外;較佳地,其係可含 有具有刪除其自己的存取控制記錄群組之存取控制記錄 的僅有的存取控制記錄群組,此係相對於下一樹層級内的 存取控制記錄群組。 一根存取控制記錄及-標準存取控制記錄之間之第三及 I22367.doc 200820037 取後差異在於’其係該系統中唯—可具有建立及刪除分割 區之權限的存取控制記錄。 安全儲存應用程式系統之存取控制記錄 該系統存取㈣記錄可詩下列兩項安全儲存應用程式 操作: 丄·在歒忍環境内一安全通道的保 錄/存取控制記錄群組樹 〇 別及41認裝載該安全儲存應用程式系統之裝置。 /乂,地,錢全儲存應用程式系統内可僅有—系統存取 技制:己錄’且一旦被定義,較佳地,其無法被改變。當建 立口亥系統存取控制記錄時,係不需要系統鐘認;只需要一 安全館存應用程式命令。,,建立系統存取控制記錄”特徵可 ^用(類似於”建立根存取控制記錄群組”特徵)。在該系 錄八控人制記錄係被建立之後,該”建立系統存取控制記 料特^係無效果,因為較佳地,僅—系統存取控制記 、 録係被允許的。 :於建立之程序中,該系統存取控制記錄係不操作的。 取=時’ 一特殊的命令係需要被發佈’其指示該系統存 工制㈣係被建立且係準備好進行。在此點之後,該系 、”:取控制記錄較佳地無法被更新或取代。 ’、 存:二制記錄於該安全健存應用程式中建立該根 層其具有增加/改變該根 封鎖”疒敢直到忒主機係滿意其且封鎖其之時間為止。 根存取控制記錄群組基本上係切斷其接至該系統之 122367.doc 41 200820037 連接,且呈現其防竄改證明(temper pr〇〇f)。此時,任一者 皆無法改變/編輯該根存取控制記錄群組及其内之存取控 制記錄。此係透過一安全儲存應用程式命令而實行。停用 ^存取控制記錄冑組之建立具有—永久的&amp;果且無法進行 還原。於圖7顯不牵涉到該系、統存取控制記錄的上述特 徵。該系統存取控制記錄係用於建立三個不同的根存取控 制圮錄群組。於這些根存取控制記錄群組被建立之後某一 $點時,自该主機傳送該安全儲存應用程式命令,以自該 系統存取控制記錄封鎖該等根存取控制記錄群組,藉此停 用邊建立根存取控制記錄群組”特徵,如圖7中連接該系 統存取控制記錄及該等根存取控制記錄群組之虛線所示。 此呈現η亥一個根存取控制記錄群組之防竄改證明。於該等 根存取控制記錄群組被封鎖之前或之後,可使用該三個根 存取控制記錄群組來建立子代存取控制記錄群組,以形成 三個個別的樹。 上述之特徵係提供内容擁有者於組態具有内容之安全產 的大彈〖生。安全產品需要被,,發佈&quot;。發佈係置放識別密 鑰之耘序,藉由該識別密鑰,該裝置可識別該主機,且反 之亦然°冑別該裝置(例如’㈣記憶體卡)係使該主機能 夠決定是否其可相信具有其之秘密。另一方面,識別該主 機係使η亥裝置此夠僅限於該主機被允許之情況下強制實行 安王性原則(授予及執行一特定主機命令)。 被設計成伺服多數個應用程式之產品將具有數個識別密 鑰忒產品可被·· ”預先發佈&quot;,於製造期間在裝運之前儲 122367.doc -42- 200820037 存也鑰,或者”後發佈”,於裝運之後增加新的密輪 後發佈而言,記憶體裝置(例如,記憶體卡)係需要宜 種主控或l置層級㈣,其係被用於識別被允許將二 式加入至該裝置之實體。 i 上述特被實現將一產品組態成啟用/停用後發佈。 外’可在裝運之後安全地進行該後置發佈組態。該裝 可以作為零售產品被購買,該零售產品上不具有除了上、1. Open type · Any user or real who does not need any kind of authentication, or a user/entity (described below) that accesses the control record by the system access system can establish _ new root access control Record the group. The open mode enables root access control record group establishment without any security measures, and all data transmission is on the open channel (also in the security environment of the lssuance agency) Or via a secure channel (ie, through air (0TA) and post-release program) established through the system access control record authentication. Ο Login for one and/or release using a new access control program. The secure storage should record the group establishment control record and its rights such as the system access control record is not configured (this is an optional feature), and the root access control record group establishment mode is set to "open Only, the open channel option is available. 2. Fork control · Only the entity that accesses the control record authentication through the system can create a new root access control record group. If the system access control The record is not configured 'The secure storage application system cannot be set to this mode. 3 · Blocked: The root access control record group is disabled and no additional root access control record group is available. Added to the system. 122367.d〇( -39. 200820037 Two Secure Storage Application commands control this feature (these commands can be used by any user/entity without having to authenticate): 1. Method Configuration Command to configure the secure storage system to use any of the three root access control record group establishment modes. Only the following mode changes are allowed: open + controlled, controlled ! lock (ie 'if the secure storage application system is currently configured as text control' then its can only be changed to blocked 2. Method configuration lock command - used to deactivate the method configuration command, Locking the currently selected method. The κ 久当-root access control record group is created, which is in the process of enabling the establishment and configuration of its access control record (using and applying to the root access control record group). The special initialization mode of the same access limit). At the end of the private sequence of the recorded group, when the entity explicitly switches it to the operating mode, it is no longer updated. Access control records, and no additional access control records can be created. Once an access control record group is placed in standard mode, it can only be deleted by accessing (4) (4) wipes (4) The access control record of the root access control group 3 accesses the system to delete the root access control record group. This root access control record group is outside the special initialization mode. Another exception; better It may contain the only access control record group with access control records that delete its own access control record group, which is relative to the access control record group within the next tree level. The third difference between the access control record and the standard access control record and the I22367.doc 200820037 is that the difference is that it is the only access control record in the system that has the authority to create and delete partitions. The access control record of the application system records the system access (4) records the following two secure storage application operations: 丄·In the environment of a secure channel, the security record/access control record group tree identification and 41 The device that loads the secure storage application system can be used only in the application system: the system access technology: recorded "and once defined, preferably, it cannot be changed. When the mouth system access control record is established, the system does not need to be recognized by the system; only a secure library application command is required. , the "establish system access control record" feature can be used (similar to "establish root access control record group" feature). After the system is established, the system access control is established. Recording is not effective because, preferably, only the system access control record and recording system are allowed. : In the established program, the system access control record is not operated. Take = when 'a special command system needs to be issued' which indicates that the system's deposit system (four) is established and ready to proceed. After this point, the system, ": control record is preferably not updated or replaced. ', save: two records recorded in the secure application to establish the root layer with the addition / change of the root blockade" I dare until the host is satisfied with it and the time is blocked. The root access control record group essentially disconnects its connection to the system and presents its tamper proof (temper pr〇〇f). At this time, neither of the root access control record groups nor the access control records therein can be changed/edited. This is done through a secure storage application command. Disabling the ^Access Control Recording group is established with a permanent &amp; and cannot be restored. The above features of the system access control record are not explicitly shown in FIG. The system access control record is used to create three different root access control record groups. After the root access control record group is established at a certain point, the secure storage application command is transmitted from the host to block the root access control record group from the system access control record. The feature of "establishing the root access control record group" is as shown by the dotted line connecting the system access control record and the root access control record group in Fig. 7. This presents a root access control record Group tamper proof. Before or after the root access control record group is blocked, the three root access control record groups can be used to create a child access control record group to form three Individual tree. The above characteristics are provided by the content owner in the configuration of the security product with the content of the security. The security product needs to be, issued, and the release system. Identifying the key, the device can identify the host, and vice versa. Screening the device (eg, '(four) memory card) enables the host to decide if it can believe it has its secret. On the other hand, identify the host This makes it possible to enforce the Angola principle (grant and execute a specific host command) only if the host is allowed. Products designed to serve a majority of applications will have several identification keys. Can be pre-released by the "pre-release", during the manufacturing period, before the shipment, save 122367.doc -42- 200820037 deposit key, or "post-release", after the new post-shipment is added after the shipment, the memory device (eg, a memory card) requires a suitable master or level (4) that is used to identify the entity that is allowed to add the two to the device. i The above implementation is implemented by configuring a product to be enabled/disabled. The post-release configuration can be safely performed after shipment. The package can be purchased as a retail product that does not have

述主控或裝置層級密鍮之外的密鑰,且接著係由新的 者、、且心μ啟用或停用進—步的後發佈應用程式。 因此’漆系統存取控制記錄之特徵提供完成上述目標之 能力: _不具有系統存取控制記錄之記憶體裝置將允許無限制 及無控制增加應用程式。 二具有系統存取控制記錄之記憶體裝置可被組態成停 用汶系統存取控制記錄建立,其係意謂無任何控制增加新 制程式之方法(除非建立新的根存取控制記錄群組 w 徵亦被停用)。 、 -具有系統存取控制記錄之記憶體裝置將僅允許經由一 透過使用忒系統存取控制記錄認證之鑑認程序所建置之安 全通道以受控制方式增加應用程式。 -具有系統存取控制記錄之記憶體裝置可被組態成在應 用私式已經被加入之前或之後,停用該加入應用程式特 徵。 密鑰ID清單 122367.doc -43- 200820037 密鑰ID係根據特定存取控制記錄請求而建立;然而,於 記憶體系統10中,其係僅由該安全儲存應用程式系統所使 用。當一密鑰ID被建立時,下列資料係由建立存取控制記 錄所提供或提供給建立存取控制記錄: 1.密鑰ID。該ID係由該實體透過該主機所提供,且係用 於參照該密鑰及於所有進一步讀取或寫入存取中使用該密 餘加密或解密之資料。 2·密鑰編密及資料完整性模式(上述已封鎖、已鏈鎖及雜 凑模式且如下文所敘述)。 除了主機提供的屬性之外,下列資料係由該安全儲存應 用程式系統所維護: 1.密鑰ID擁有者。該存取控制記錄之m係該擁有者。當 一密鑰ID被建立時,該建立者存取控制記錄係其擁有者。 然而,密鑰ID擁有權可被轉移至另一存取控制記錄。較佳 地,僅該密鑰ID擁有者係被允許轉移一密鑰ID之擁有權及 委派一密鑰ID。委派存取權限給相關聯的密鑰及廢止這些 權利可由該密鑰ID擁有者或被指派具有委派權限之任何其 他存取控制記錄所管理。每當企圖實施彼等操作之任一者 時’只有在該請求的存取控制記係被授權之下,該安全儲 存應用程式系統才授予此企圖。 2·内容加密密鑰(CEK)。此係其之密鑰值係被用於編密 相關聯於該密鑰ID或該密鑰ID所指向之内容之内容加密密 鑰。該密鑰值可以係一由該安全儲存應用程式系統所建立 之128位元之登入演算法隨機密鑰。 122367.doc -44 - 200820037 3· MAC及IV值。用於鏈區塊編密(CBC)加密演算法中之 動態資訊(訊息鑑認碼及起始向量)。 參照圖8 A-16之流程圖而顯示該安全儲存應用程式之各 種特徵,其中,一步驟之左方的” H”係意謂該操作係由該 主機所實施,且&quot;C”係意謂該操作係由該記憶體卡所實 施。雖然參照記憶體卡而顯示這些安全儲存應用程式特 徵,應瞭解的是,這些特徵係亦可應用於其他實體形式中 之纪憶體裝置。為了建立一系統存取控制記錄,該主機發 佈一命令給該記憶體裝置10内的安全儲存應用程式,以建 立系統存取控制記錄(方塊2 0 2)。該裝置丨〇係藉由檢查是否 糸統存取控制§己錄係已經存在而回應(方塊204,菱形 2〇6)。假如其係已經存在,則裝置1〇傳回失敗及停止(橢圓 形208)。假如其係尚未存在,則記憶體1〇係檢查系統存取 控制記錄建立是否被允許(菱形21〇),且假如不被允許,則 傳口 失敗狀恶(方塊212)。因此,可有若干案例,其中, 該裝置發行者係不允許一系統存取控制記錄的建立,諸如 於所需之安全性特徵係、已經被預先決定,使得不需要系統 存取控制記錄的情況。假如此係被允許,則該裝置1〇傳回 確疋(OK)狀悲且等待來自该主機的系統存取控制記錄認證 (方塊214)。該主機檢查該安全儲存應用程式狀態及是否該 裝置10係已經指示-系統存取控制記錄的建立係被允許 (方塊職菱形218)。假如建立係不被允許或者一系統存 取控制記錄係已經存在,則該主機停止(橢圓形22〇)。假如 該裝置1G係已經指示U存取控龍錄的建立係被允 122367.doc •45- 200820037 許,則該主機係發佈一安全儲存應用程式命令,以定義其 之a入⑽也,且傳送该登入認證至該裝置丨〇(方塊。該 裝置ίο用所接收之認證來更新一系統存取控制記錄記錄, 且傳回確定&quot;狀態(方塊22句。為了回應此狀態訊號,該主 機發佈安全儲存應用程式命令,其指示該系統存取控制記 錄係準,好(方塊226)。該裝置_以鎖定該系統存取控制 »己錄使知其纟法被更新或取代而回應(方塊228)。此係鎖定 X系、、先存取控制§己錄之特徵及其用於對於主機識別該裝置 10之身份。 1用於建立新的樹(新的根存取控制記錄群組及存取控制 記錄)的程序係由於該裝置内組態這些功能之方式而決 定。圖9係說明該等程序。該主機⑽該記憶體系統邮 者遵循此。假如增加新的根存取控制記料㈣全然被停 用,則無法增加新的根存取控制記錄群組(菱形Μ十假如 其係被啟用但需要-系統存取控制記錄,則該主機透過該 系統存取控制記錄進行鏜認,且在發佈,,建立根存取控制 記錄群組”命令方乂 二7方鬼254之刖建置一安全通道(菱形25〇,方塊 252)。假如不需要系統存取控制記錄(菱形248),則該主機 24可發佈該”建立根存取控制記錄群組”命令而不需鑑認, 且進仃至方塊254。假如1统存取㈣記錄確實存在,則該 係可广使用它,即使其係不需要亦如此(未示於該流 ^假如該功能被停用,則該裝置(例如快閃記憶體卡) 將拒絕建立-新的根存取㈣記錄群㈣任何㈣,且假) 如需要系統存取控制記錄,則其將拒絕一建立一新的根存 122367.doc -46 - 200820037 取控制記錄群組而不鑑認之企圖(菱形246及250)。於方塊 254中新建立的存取控制記錄群組及存取控制記錄現在係 切換成操作模式,使得於此類存取控制記錄群組内的存取 控制記錄無法被更新或改變,且無存取控制記錄可被加入 彼等存取控制記錄群組之中(方塊256)。接著,該系統係可 k用地被鎖疋,使仔無法建立額外的根存取控制記錄群組 (方塊258)。虛線方塊258係一指示此步驟係選用的步驟的 慣例。於本申請案之圖式内的流程圖内所有虛線方塊係選 用的步驟。此係允許該内容擁有者封鎖將該裝置1〇用於可 模仿一具有合法内容的真品記憶體裝置的其他非法目的。 為了建立存取控制記錄(除了該根存取控制記錄群組内 存取控制記錄以外,如上文所述),可以具有建立一存取 控制記錄之權利的任何存取控制記錄開始(方塊,如示 於圖1〇。任何實體可企圖透過該主機24藉由提供進入點之 存取控制記錄身份以及具有所有想要建立之必要的屬性之 存取控制記錄而進人(方塊272)。該安全儲存應用程式檢查 對於該存取控制記錄身份之匹配及具有如此身份之存取控 制記錄是否具有建立—存取控制記錄的權限(方塊⑺)。假 如該請求係被驗證為經授權,則該裝置1〇内的安全儲存應 用程式係建立一存取控制記錄(方塊276)。 圖11係顯示兩個存取控制記錄群組,其係顯示—對於使 用圖10之方法之安全性應用程式有用的樹。因此,於行銷 存取控制記錄群組内具有身#ml之存取控制記錄具有建立 一存取控制記錄的權限。該存取控制記錄ml亦具有使用用 122367.doc -47- 200820037 於讀取或寫入相關聯於密输ID &quot;杆 山、仃銷貧訊”的資料及相關聯 於密鑰ID”價格清單,,的資料之宓 貝在鑰的權限。使用圖10之方 法,建立具有兩個存取控制今々 取徑制δ己錄的銷售存取控制記錄群 組:s 1及s2,其係僅呈右斜你 ,、有對於用於存取相關聯於該密鑰 ID”價格清單”之定價資料穷 貝丁十1在鑰的言買取權限,而無存取相 關聯於該密鑰IDπ銷售資訊,,之次 〇貝㉛之貝枓所需的密鑰的讀取權 限。以此方式’具有存取和制彳 ^ 徑制冗錄si及S2之實體係僅能夠 言買取而不能夠改變定價資料,且A key other than the master or device level key, and then the newer, and the core μ enable or disable the post-release application. Thus the 'paint system access control record' feature provides the ability to accomplish the above objectives: _ A memory device that does not have a system access control record will allow unlimited and no control to add an application. 2. A memory device having a system access control record can be configured to disable the establishment of a system access control record, which means that there is no control to add a new program (unless a new root access control record group is created) w sign is also disabled). - The memory device with the system access control record will only allow the application to be added in a controlled manner via a secure channel established by the authentication program using the system access control record authentication. - The memory device with system access control record can be configured to deactivate the add application feature before or after the application private has been added. Key ID List 122367.doc -43- 200820037 The key ID is established based on a particular access control record request; however, in the memory system 10, it is only used by the secure storage application system. When a key ID is created, the following data is provided by the established access control record or provided to establish an access control record: 1. Key ID. The ID is provided by the entity through the host and is used to reference the key and use the secret encrypted or decrypted material in all further read or write accesses. 2. Key Encryption and Data Integrity Mode (the above-mentioned blocked, chained and hashed modes are described below). In addition to the properties provided by the host, the following information is maintained by the secure storage application system: 1. The key ID owner. The access control record is the owner of the record. When a key ID is established, the creator access control record is its owner. However, the key ID ownership can be transferred to another access control record. Preferably, only the key ID owner is allowed to transfer ownership of a key ID and delegate a key ID. Delegate access rights to associated keys and revoke these rights can be managed by the key ID owner or any other access control record assigned to delegate authority. The secure storage application system grants this attempt whenever an attempt is made to perform any of its operations only if the access control record of the request is authorized. 2. Content Encryption Key (CEK). This is the key value used to encode the content encryption key associated with the key ID or the content to which the key ID is directed. The key value can be a 128-bit login algorithm random key established by the secure storage application system. 122367.doc -44 - 200820037 3. MAC and IV values. Dynamic information (message identification code and start vector) used in the Chain Block Coding (CBC) encryption algorithm. Referring to the flowchart of FIG. 8A-16, various features of the secure storage application are displayed. The "H" system on the left of the step means that the operation is implemented by the host, and the "C" system is intended. It is said that the operation is implemented by the memory card. Although these secure storage application features are displayed with reference to the memory card, it should be understood that these features can also be applied to other memory devices in the physical form. A system access control record, the host issues a command to the secure storage application in the memory device 10 to establish a system access control record (block 202). The device is checked by the system. The access control § has already existed and responded (block 204, diamond 2〇6). If the system already exists, the device 1 returns a failure and stops (oval 208). If the system does not yet exist, then the memory Whether the access control record establishment is allowed (diamond 21〇), and if not allowed, the pass fails (block 212). Therefore, there may be several cases in which the device sends The walker does not allow the establishment of a system access control record, such as the required security profile, which has been predetermined so that the system does not need to access the control record. If so, the device is enabled. Returning OK (OK) and waiting for system access control record authentication from the host (block 214). The host checks the status of the secure storage application and if the device 10 has indicated - the system access control record The establishment is allowed (block diamond 218). If the establishment is not allowed or a system access control record system already exists, the host stops (oval 22〇). If the device 1G system has indicated U access control The establishment of Longlu is permitted by 122367.doc •45-200820037. The host releases a secure storage application command to define its entry into (10) and transmits the login authentication to the device (block). The device ίο updates the system access control record with the received authentication, and returns a determination &quot; status (block 22). In response to this status signal, the host issues a secure store. An application command is instructed to indicate that the system accesses the control record criteria (block 226). The device _ responds by locking the system access control to indicate that the method is updated or replaced (block 228). This is a feature that locks the X-system, first access control, and its identity for identifying the device 10 for the host. 1 Used to create a new tree (new root access control record group and access) The program for controlling the recording is determined by the way in which the functions are configured in the device. Figure 9 illustrates the programs. The host (10) the memory system postal follows this. If a new root access control record is added (4) If it is completely disabled, it is impossible to add a new root access control record group (the diamond is enabled if it is enabled but requires - the system access control record, then the host accesses the control record for recognition, and In the release, the establishment of the root access control record group "Command" 7 7 7 254 254 254 254 254 254 254 254 254 。 。 。 。 。 。 。 。 。 。 。 。 菱 菱 菱 菱If the system access control record (diamond 248) is not required, then the host 24 can issue the "Create Root Access Control Record Group" command without authentication and proceed to block 254. If the system access (4) record does exist, the system can use it widely, even if it is not required (not shown in the stream) if the function is disabled, the device (such as a flash memory card) Will refuse to establish - new root access (four) record group (four) any (four), and false) if the system access control record is required, it will refuse to establish a new root store 122367.doc -46 - 200820037 take control record group No attempt to identify (diamonds 246 and 250). The newly established access control record group and access control record in block 254 are now switched to the operational mode such that access control records within such access control record group cannot be updated or changed, and are not stored. The fetch control records can be added to their access control record group (block 256). The system is then locked, so that an additional root access control record group cannot be created (block 258). The dashed box 258 is a convention that indicates the steps selected for this step. All of the dashed lines in the flow diagrams within the drawings of the present application are selected. This allows the content owner to block the use of the device 1 for other illegal purposes that can mimic a genuine memory device with legitimate content. In order to establish an access control record (in addition to the access control record within the root access control record group, as described above), any access control record having the right to establish an access control record may begin (block, as shown) In Figure 1, any entity may attempt to enter through the host 24 by providing an access point access control record identity and an access control record having all the attributes necessary to establish (block 272). The application checks whether the identity of the access control record matches and the access control record having the identity has the right to establish an access control record (block (7)). If the request is verified as authorized, the device 1 The secure storage application within the device establishes an access control record (block 276). Figure 11 shows two access control record groups that are displayed - a tree useful for security applications using the method of Figure 10. Therefore, the access control record having the body #ml in the marketing access control record group has the authority to establish an access control record. The control record ml also has the use of 122367.doc -47-200820037 for reading or writing the data associated with the secret ID &quot;Liangshan, the sales of the news and the associated key ID" price list, The data is in the key of the key. Using the method of Figure 10, the sales access control record group with two access control rules is created: s 1 and s2, which are only right Oblique you, there is a pricing information for accessing the price list associated with the key ID "price list", and the access is associated with the key IDπ sales information, The read permission of the key required for the shell of the mussel 31. In this way, the system with access and system 冗 si si si and S2 can only buy and not change the pricing data. And

^ i將不可存取行銷資料。另 -方面’存取控制記錄m2;F具有建立存取控制記錄的權 限,且僅具有對於用於存取相關聯於密鑰m&quot;價格清單&quot;及 相關聯於密鑰ID”行銷資訊,,之f料的密狀讀取權限。 因此,可以使用上述之方式委派存取權,其中,…委 派讀取定價資料的權利給sl&amp;s2。在牵涉到大型行銷及銷 售群組之情況下,此係特別有㈣。在僅—或少數銷售人 員之下,可以不需要使用圖10之方法。反而是,存取權係 可以由一存取控制記錄委派給於相同的存取控制記錄群組 内於一較低層級或相同層級的存取控制記錄,如示於圖 12首先,该實體進入用於此類存取控制記錄群組的樹, 其方式係藉由以一上述方法透過該主機指定該樹中之一存 取控制記錄(方塊280)。接著,該主機將指定該存取控制記 錄及委派給其之權利。該安全儲存應用程式係檢查用於此 類存取控制記錄的樹及該存取控制記錄是否具有委派權利 給指定的另一存取控制記錄的權限(方塊282)。假如其是, 則該等權利係被委派(方塊284);假如不是,則停止。該結 122367.doc -48- 200820037 果係顯示於圖13°於此情況下,存取控制記錄⑽具有委派 項取榷限給該存取控制記錄sl的權限,使得在委派之後, 山字能夠制-存取價格諸的密鑰。假如如係且有存取 定價資料及如此委派之權限的相同或較大的權利,則此可 被實施。於-項實施例中,ml在委派之後維持其存取權。 較佳地,可在受限制條件下(而非永久地)委派存取權,諸 如一段有限的時間、有限的存取次數等等。^ i will not be able to access marketing materials. Another aspect of the access control record m2; F has the authority to establish an access control record, and only has marketing information for accessing the key associated with the key m&quot;price list&quot; and associated key ID. The secret read permission of the f material. Therefore, the access method can be delegated in the above manner, where... the right to read the pricing data is delegated to sl&amp;s2. In the case of large marketing and sales groups involved This is particularly useful in (4). Under only a few or a few salespeople, the method of Figure 10 may not be required. Instead, the access rights may be delegated to the same access control record group by an access control record. An access control record within a group at a lower level or the same level, as shown in FIG. 12, first, the entity enters a tree for such an access control record group by transmitting the method in a manner described above The host specifies one of the access control records in the tree (block 280). The host then specifies the access control record and the rights delegated to it. The secure storage application checks for such access control records. And whether the access control record has the right to delegate rights to the specified other access control record (block 282). If it is, then the rights are delegated (block 284); if not, then stop. 122367.doc -48- 200820037 The effect is shown in Figure 13. In this case, the access control record (10) has the authority to delegate the access control record sl, so that after the delegation, the mountain can be made - The key to access the price. This can be implemented if there is an access pricing material and the same or greater rights to such delegated rights. In the embodiment, ml maintains its existence after delegation. Preferably, access rights can be delegated under restricted conditions, rather than permanently, such as a limited time, a limited number of accesses, and the like.

圖14顯示詩建立—密鑰及錢⑴之料。該實體透過 一存取控制記錄進行鑑認(方塊3〇2)。該實體請求用由該主 機所指定之ID來建立密鑰建立(方塊3〇4)。該安全儲存應 用程式檢查及觀看所指定之存取控制記錄是否具有如此實 施之權限(菱形3G6)。舉例而言,假如該密錄係被用於存二 一特別分割區内的資料,則該安全儲存應用程式將檢查及 觀看該存取控制記錄是否可存取此分割區。假如該存取控 制記錄經授權,則該記憶體裝置10建立一相關聯於由該主 機所提供之密鑰ID的密鑰值(方塊308),且儲存該密瑜出 於該存取控制記錄之中,及儲存該密鑰值於其記憶體(控 制1§相關聯的記憶體或記憶體2〇)内,且根據由該實體所 提供之資訊而指派權利及權限(方塊31〇),且用此類經指派 的權利及權限來修改此類存取控制記錄的權限控制記錄 (方塊312)。因此,該密鍮之建立者具有所有可取得的權 利,諸如讀取及寫入權限、委派及與相同存取控制記錄群 組内其他存取控制記或於一較低層級之存取控制 之權利,及轉移該密鑰之擁有權之權利。 122367.doc -49- 200820037 一存取控制記錄可改變於該安全儲存應用程式系統内另 一存取控制記錄之權限(或全然存在),如示於圖丨5。一實 體係可以如前一樣透過一存取控制記錄而進入一樹;於一 f月況下’ $亥實體被鑑遇且接著其指定一存取控制記錄(方 塊330,332)。其請求一目標存取控制記錄之刪除或一目 標存取控制記錄内之權限(方塊334)。假如所指定之存取控 制記錄或於如此時間為作用中狀態之存取控制記錄具有如 此實施之權利(菱形336),則該目標存取控制記錄被刪除, 或者該目標存取控制記錄之權限控制記錄被改變以刪除此 類權限(方塊338)。假如此未經授權,則該系統停止。 在上述私序之後,该目標將不再能夠存取在該程序之前 其能夠存取之資料。如示於圖16,一實體係可能企圖進入 該目標存取控制記錄(方塊35〇),且發現到該鑑認程序失 敗,因為先前存在的存取控制記錄ID係不再出現於該安全 儲存應用程式之中,使得存取權係被拒絕(菱形352)。假設 該存取控制記錄ID尚未被刪除,則該實體指定一存取控制 記錄(方塊354)及於一特別分割區内的密鑰⑴及/或資料, 且接著該安全儲存應用程式根據此類存取控制記錄的權限 控制記錄檢查是否准許該密鑰1〇或分割區存取請求(菱形 358)。假如该權限已被刪除或已經過期,則該請求再次被 拒絕。否則,該請係被授予(方塊360)。 ,上述程序敘述該裝置(例如,快閃記憶體卡)如何管理對 叉保護的資料之存取,而不論是否該存取控制記錄及其之 權限控制舌己錄係剛剛被另一存取控制記錄予以改變或者開 122367.doc -50- 200820037 始係如此組態。 會期 該安全儲存應用程式系統被設計成處置同時登入的多個 使用者。當使用此特徵時,僅在用於鑑認一特定實體的存 取控制記錄具有用於所請求動作的權限之情況下,由該安 王館存應用私式所接收之所有命令係相關聯於該實體且 執行。 、 /'Figure 14 shows the poem creation - key and money (1). The entity authenticates via an access control record (block 3〇2). The entity requests to establish a key establishment with the ID specified by the host (block 3〇4). The secure storage application checks and sees if the specified access control record has the authority to do so (diamond 3G6). For example, if the secret recording system is used to store data in a particular partition, the secure storage application will check and see if the access control record has access to the partition. If the access control record is authorized, the memory device 10 establishes a key value associated with the key ID provided by the host (block 308), and stores the password for the access control record. And storing the key value in its memory (control 1 § associated memory or memory 2), and assigning rights and rights based on the information provided by the entity (block 31〇), The rights control records of such access control records are modified with such assigned rights and rights (block 312). Thus, the creator of the key has all available rights, such as read and write access, delegation and access control with other access control records in the same access control record group or at a lower level. Rights, and the right to transfer ownership of the key. 122367.doc -49- 200820037 An access control record can be changed to the right (or in existence) of another access control record in the secure storage application system, as shown in Figure 5. A real system can enter a tree through an access control record as before; in the case of a month, the entity is authenticated and then it specifies an access control record (blocks 330, 332). It requests a deletion of a target access control record or a permission within a target access control record (block 334). If the specified access control record or the access control record in the active state at this time has the right to do so (diamond 336), then the target access control record is deleted, or the target access control record has permission The control record is changed to delete such permissions (block 338). If this is not authorized, the system stops. After the above private sequence, the target will no longer be able to access the data it was able to access before the program. As shown in Figure 16, a real system may attempt to enter the target access control record (block 35A) and find that the authentication procedure failed because the pre-existing access control record ID no longer appears in the secure storage. Among the applications, the access rights are denied (diamond 352). Assuming that the access control record ID has not been deleted, the entity specifies an access control record (block 354) and a key (1) and/or data within a particular partition, and then the secure storage application is based on such The access control record of the access control record checks whether the key 1 or partition access request is granted (diamond 358). If the permission has been deleted or has expired, the request is rejected again. Otherwise, the request is granted (block 360). The above procedure describes how the device (eg, a flash memory card) manages access to the fork protected data, whether or not the access control record and its rights control system have just been controlled by another access control system. The record is changed or opened 122367.doc -50- 200820037. Session The Secure Storage Application System is designed to handle multiple users logging in at the same time. When this feature is used, all commands received by the Anjun store application private are associated with each other only if the access control record used to authenticate a particular entity has the authority for the requested action. This entity is executed. , /'

。多個實體係透過會期觀念予以支援。一會期係於該鑑認 私序』間予以建置’且由該安全儲存應用程式系統指派一 曰期ID。,亥會期ID係内部相關聯於用於登入該系統之存取 控制記錄,且被匯中^^I挪 俽m ai、、Ό該實體,以在所有進一步的安全儲 存應用程式命令中使用。 該^全儲存應用程式系統支援兩種類型會期:開放式會 ,—月與肖定鐘認程序相關的會期類型係定義 於存取控制記錄之中。該安全儲存應用程式系統將以類似 於強制實行該鑑認本身之方式強制實行會期建置。因為該 2控制記錄定義該等實體權限,所以此機制使系統設計 此夠使安全通道相關聯於存取特定密繪①或調用特定存 :控制記錄管理操作(亦即’建立新的存取控制記錄及設 定認證)。 開放式會期 開=會期係一用一會期ID識別但不以匯流排加密之會 待用:有命令及資料係公開被傳送。此種操作模式較佳地 -❹者或多實體環境中’其中,該等實體係非 122367.doc -51 · 200820037 構成威脅模型亦非於該匯流排上的竊聽的一部分。 雖然不保護資料之傳送亦不實現該主機端之應用程式之 間之有效率的防火牆,但是該開放式會期模式使該安全儲 存應用程式系統能夠僅允許存取目前經鐘認 錄所允許的資訊。 該開放式會期係亦能夠被使用於一分割區或一密鑰係需 要被保護之情況。然而,在一有效鑑認程序之後,存取被 授予給該主機上所有實體。各種主機應用程式用以獲得經 鑑認存取控制記錄之權限而需要共用的唯一事物係會期 ID。此係顯示於圖17A。在線_上方之步驟係由該主機“ 所採用之步驟。在-實體係對於存取控制記錄ι經鑑認(方 塊402)之後,其請求存取該記憶體裝置1()内—相關聯於一 密鑰ID X之檔案(方塊4()4,儀及彻)。假如該存取控制 記錄丨之該權限控制記錄允許此類存取’則裝置1〇授予該 請求(菱形41〇)。假如不允許,則該系統返回方塊402。在 鑑認完成之後,該記憶體系統1〇係僅藉由該指派的會期 ID(且非該等存取控制記錄認證)而識別正在發佈 實體。-旦該存取控制記錄1係於—開放式會期中獲得存 取其之權限控制記錄内相關聯於該等密餘m之資料,則任 何其他應用程式或使用者可藉由指定介於該主機Μ上不同 的應用程式所共用的正確會期1〇,來存取相同的資料。此 特徵於應用程式中為有利的’其中,對於使用者而言,僅 月b夠登入-次、能夠存取所有關聯於不同應用程式用以實 行登入之帳戶的資料,係更方便的。因此,一行動電話的 122367.doc -52· 200820037 使用者可能夠存取記憶體20内儲存的電子郵件且聽館存的 音樂’而不需要多次登入。另一方面,不被該存取控制記 錄1所内含的資料係不可存取。因此,相同的行動電話的 使用者係可以具有有價值的内容,諸如可透過一分離的帳 戶存取控制記錄2存取之遊戲及相片。此係他不想要借^ 的電話的其他人存取的資料,即使他可能不介意其他人可 以透過他的第一帳戶存取控制記錄丨存取資料。於開放式 會期中㈣資料之存取分開0兩個分離帳戶時料 存取存取控制記錄1,提供容易使用以及提供有價值的資 料之保護。 ' 、 為了更進-步易於在該等主機應用程式之間共用該會期 ID之耘序,當一存取控制記錄正在請求一開放式會期時, 其可明確地請求該會期將被指派&quot;〇&quot; IE^以此方式,應用 程式可被設計成使用一預先定義的會期ID。唯一限制:, 因為明顯的理由’於一特定時間僅可鑑認一正在請求會期 〇之存取控制記錄。-鑑認另—正在請求會期q之存取控制 記錄的企圖將被拒絕。 安全會期 為了增加一層安全性,該會期⑴可被使用,如示於圖 HB。接著,該記憶體10亦儲存作用中狀態會期之合期 I於圖17B中,舉例而言,為了能狗存取一相關聯;;密 鑰ID X之標案’在該實體被允許存取該標案之冑,該實體 亦將需要提供一會⑽,諸如會期m &quot;A” (方塊* 412及414)。以此方式,除非該請求實體係知道正確的會 122367.doc -53- 200820037 期ID,否則其無法存取該記憶體1〇。因為該會期⑴係於該 會期結束之後被刪除且對於每一會期而言係不同的,所以 -實體係僅當其已經能夠提供會期號碼時,才能能夠獲得 存取。 &quot;該安全儲存制程❹統係藉由使用該會期Μ,而追 從疋否口ρ 7係真的來自正確經鐘認的實體。對於有攻擊 者將嘗試使用-開放式通道以傳送有惡意的命令之恐嚇的 應用程式及使用情況而言,該主機應用程式係使用一安全 會期(一安全通道)。 當使用一安全通道時,該會期1D以及整個命令係以安全 通道加密(會期)密鑰予以加密,且該安全性等級係與該主 機端實施一樣高。 終止一會期 於下列任-狀財,終止—會期,且登出該存取控制記 錄: Ο 1. 該實體係發佈-明確的會期結束命令。 2. 通訊時間逾期。—特定實體在—段㈣(如存取控制記 錄參數之一者所定義)未發佈任何命令。 3. 在裝置(例如快閃記憶體卡)重設及/或電源循環之後, 終止所有開放式會期。 資料完整性服務 該女王儲存應用&amp;式系統驗證該安全儲存應用程式資料 庫(其係含有所有存取控制記錄、權限控制記錄等等)之完 正!·生此外ϋ過密鑰ID機制而提供用於實體資料的資料 122367.doc -54· 200820037 完整性服務。 叙如一始、鑰ID經組、^ ^ 雜湊值係與_容力p =雜騎為其加密演算法,則該 〜己铱夕* 及1V並排地儲存於該内容加密 在鑰6己錄之中。於寫入 在 值係於讀取##_^ #异及儲存雜湊值。雜凑 間所儲存之值相比n每寫操作期 額外的資料6母田5亥只體正在存取該密鑰ID時, 的(用 ’、、1㈠碼編#方式)串接至舊的資料及經更新 f. Multiple real systems are supported through the concept of the session. A session is established between the authentication private sequence and a periodic ID is assigned by the secure storage application system. The ID is internally associated with the access control record used to log into the system, and is spoofed by the entity, for use in all further secure storage application commands. . The full storage application system supports two types of session periods: an open session, and the type of session associated with the month is defined in the access control record. The secure storage application system will enforce the session build in a manner similar to the enforcement of the authentication itself. Because the 2 control record defines these entity permissions, this mechanism allows the system to design this to enable the secure channel to be associated with accessing a particular crypto 1 or to call a specific privilege: control record management operations (ie, 'establish new access control' Record and set the certification). Open-ended session On = session is a session that is identified by a session ID but not encrypted by a bus. Standby: Commands and data are publicly transmitted. This mode of operation is preferably in a squatter or multi-entity environment where the real system is not part of the threatening model and is not part of the eavesdropping on the bus. Although the transfer of unprotected data does not enable an efficient firewall between the applications on the host side, the open session mode enables the secure storage application system to only allow access to the current clock. News. The open session can also be used in a partition or a key system needs to be protected. However, after a valid authentication procedure, access is granted to all entities on the host. The only thing that the various host applications need to share in order to gain access to the access control record is the session ID. This is shown in Figure 17A. The online_upper step is the step taken by the host. After the real system has authenticated the access control record (block 402), it requests access to the memory device 1() - associated with A file of key ID X (block 4 () 4, instrument and gram). If the access control record 该 the privilege control record allows such access ' then the device 1 〇 grant the request (diamond 41 〇). If not, the system returns to block 402. After the authentication is completed, the memory system 1 identifies the publishing entity only by the assigned session ID (and not the access control record authentication). - If the access control record 1 is obtained in the access control record of the open session, the data associated with the secret m is associated with any other application or user. The host has the correct duration of 1 共用 shared by different applications to access the same data. This feature is beneficial in the application 'where, for the user, only the monthly b is enough to log in - times, can Access all associated with different applications It is more convenient to log in to the account account. Therefore, a mobile phone 122367.doc -52· 200820037 user can access the email stored in the memory 20 and listen to the music stored in the library' without much need On the other hand, the data not contained in the access control record 1 is inaccessible. Therefore, the user of the same mobile phone can have valuable content, such as being stored through a separate account. Take control of the game and photos accessed by the record 2. This is the material that he does not want to access by the other person on the phone, even though he may not mind that other people can access the control record through his first account. In the open session (4) access to the data separates 0 separate accounts, accessing access control records1, providing easy protection and providing valuable data protection. ', in order to be more advanced, easy to be in these The order of the session ID is shared between the host applications. When an access control record is requesting an open session, it can explicitly request that the session be assigned &quot;〇&quot; IE^ The application can be designed to use a predefined session ID. The only restriction is that, for obvious reasons, it is only possible to identify an access control record that is being requested at a specific time. - An attempt to request an access control record for the session q will be rejected. Security session To add a layer of security, the session (1) can be used, as shown in Figure HB. Then, the memory 10 is also in storage. The period of the status period I is in Figure 17B, for example, in order to be able to access the dog; the key ID X is marked 'after the entity is allowed to access the standard, the entity is also A session (10) will be required, such as the duration m &quot;A" (squares * 412 and 414). In this way, unless the requesting system knows the correct ID of the period, it cannot access the memory. Since the session (1) is deleted after the end of the session and is different for each session, the real system can only be accessed if it is already able to provide the session number. &quot; The secure storage process is based on the use of the session, and the follow-up is really from the correct entity. The host application uses a secure session (a secure channel) for applications and usage scenarios where an attacker will attempt to use an open channel to transmit malicious commands. When a secure channel is used, the session 1D and the entire command are encrypted with a secure channel encryption (session) key, and the security level is as high as the host implementation. Termination of a session in the following - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2. The communication time is overdue. - A specific entity has not issued any commands in the paragraph (4) (as defined by one of the access control record parameters). 3. Terminate all open sessions after resetting and/or power cycling of the device (eg flash memory card). Data Integrity Service The Queen Storage Application &amp; System verifies that the secure storage application database (which contains all access control records, permission control records, etc.) is complete! Provide information for physical information 122367.doc -54· 200820037 Integrity Services. As the beginning, the key ID group, the ^ ^ hash value system and the _ capacity p = chic ride for its encryption algorithm, then the ~ 铱 铱 及 and 1V are stored side by side in the content encryption in the key 6 recorded in. The value written in the value is read ##_^# and the hash value is stored. The value stored in the hash is compared to the extra data per write operation period. 6 When the parent domain is accessing the key ID, it is connected to the old one by the ',, 1 (one) code ## method). Information and updated f

的(用於項取或寫人之)適合雜湊值。 =該主機知道相關聯於一密細或由一 =料權案’所以該主機係以下列方式明確地管理 元整性功能的數項態樣: J·一相關聯於一密鑰1D或由-密鑰ID指向的資料檔案係 攸頭到尾被寫入或讀取。存取該檔案之部分的任何企圖將 使其混亂’原因係該安全儲存應用程式系統正在使用一鏈 區塊密碼加密方法且產生該整個資料的-雜湊訊息摘要。 2·不而要處理-連續串流内(該資料串流可交錯其他密輪 ID之貝料串流’且係可以於多個會期上分割)的資料,原 因係中間的雜湊值係由該安全儲存應用程式系統所維護。 然而’假如該資料串流係重新開#,則該實體將需要明確 地扣示該安全儲存應用程式系統重設該等雜湊值。 3·當一讀取操作完成時,該主機明確地請求該安全儲存 應用程式系統藉由比較所讀取雜湊其及寫入操作期間所計 异之雜湊值來確認該讀取之雜凑。 4 ·該女全儲存應用程式系統亦提供一 ”設設讀取”操作。 122367.doc -55- 200820037 此特徵係將串流經過加密引擎的資料u將不傳送其出 去至該主機。此特徵可被用於在資料真正自該裝置(例如 !·夬閃d fe體卡)讀取出之前,確認資料完整性。 隨機號碼產生 /安王儲存應用程式系、統將使外部實體能夠使用内部隨 機號碼產± g ’且請求隨機號碼被使肖於該安全儲存應用 私式系統之外。此服務係可被任何主機使用,且不需要鑑 認0 i(for item or write) suitable for hash values. = The host knows that it is associated with a secret or by a material right' so the host explicitly manages several aspects of the meta-feature function in the following way: J. One is associated with a key 1D or by - The data file pointed to by the key ID is written or read from beginning to end. Any attempt to access a portion of the file will confuse the reason that the secure storage application system is using a chain block cipher encryption method and generating a hash message digest of the entire data. 2. Don't deal with it - the data in the continuous stream (the data stream can be interleaved with other shells of the secret ID and can be split over multiple sessions), because the middle of the hash value is This secure storage application system is maintained. However, if the data stream is reopened #, the entity will need to explicitly deny the secure storage application system to reset the hash values. 3. When a read operation is completed, the host explicitly requests the secure storage application system to confirm the hash of the read by comparing the hashes it has read and the hash values that were calculated during the write operation. 4 • The female full storage application system also provides a “set read” operation. 122367.doc -55- 200820037 This feature will not stream the data that is streamed through the encryption engine to the host. This feature can be used to confirm data integrity before the material is actually read from the device (eg, a flash card). The random number generation / An Wang storage application system will enable the external entity to use the internal random number to generate ± g ' and request the random number to be outside the secure storage application private system. This service is available to any host and does not require authentication 0 i

RSA密鑰對產生 該安全儲存應用程式系統將使外部使用者能夠使用内部 S A山餘對建立特徵,且請求—對密鑰對被使用於該安全 儲存應用程式系統之外。此服務係可被任何主機使用,且 不需要鑑認。 替代實施例 不使用階層架構方式,類似的結果可使 貝科犀方式 而逹成,如示於圖18 + =不於圖1 8 ’ -含有用於實體之認證、鐘認方法、失敗 曰4的最大次數及解除封鎖所需之認證最小數目的清 被輸入儲存於控制器12或記憶體2〇内之一資料庫之中,兮 清單使認證需求相關於由該記憶體1〇之該控 : 該資料庫中之原則(對於密錄及分割區之讀斤:: 取’安全通道需求)。亦儲存於該f料庫的於存 錄及分割區之約束及限制。因此,一些實體(例如 官理者)係可以於一白色清單上,其係意謂這些實體可存 122367.doc -56 - 200820037 取所有密鑰及分割區。其他實體係可以 :其:!任何資訊之企圖將被封鎖。該限制二 存取苹2及/或分割區料的。此係意謂僅某些實體可 密錄友分割區,且某些實體無法如此實施。 區戎 身上,而不蛹内容所在的分割 二 加密或解密該内容之密鑰為何。因此,某些資料 (例如’歌曲)係可以具有豆僅么 有八僅此夠被别5個存取它們的主機 被許取^取!^屬性,或者其他資料(例如,電影)係僅能夠 口貝限次數的屬性,而不論哪些實體具有存取權。 鍛認 密碼保護 •密碼保護係意謂需要提交一密碼,以存取受保護的區 域。除非其無法超過一個密碼’否則密碼可相關聯於不同 的權利,諸如讀取存取及/或寫入存取。 1碼保護係意謂該裝置(例如’快閃記憶體卡)可驗證 Ο 由該主機所提供之密碼,亦即該裝置亦具有儲存於裝置管 理安全記憶體區域内的密碼。 發佈及限制 .密碼係受限於重新播放攻擊。因為在每一提交之後密 碼係不改變’所以其可相同地重新傳送。其係意謂假如將 被保護的資料係有價值的’則密媽係不應該被使用,且通 訊匯流排係容易被存取。 •密碼可保護存取儲存的資料,然而係不應該被使用於 保護資料(非一密鑰)。 122367.doc -57- 200820037 •為了增加與密碼相關聯的安全性等級,其可使用一主 控密鑰而多樣化,結果為駭客一份資料係不搞垮整個系 統。一以會期密鑰為基礎的安全通訊通道可被用於傳送該 密碼。 圖19繪示使用一密碼進行鑑認之流程圖。該實體係傳送 一帳戶ID及密碼至系統10(例如,快閃記憶體卡)。該系統 係檢查看看是否該密碼係匹配於其記憶體内的密碼。假如RSA Key Pair Generation The secure storage application system will enable external users to create features using internal SA pairs and request-pair key pairs are used outside of the secure storage application system. This service is available to any host and does not require authentication. Alternate embodiments do not use a hierarchical architecture approach, similar results can be made by the Becco rhymes, as shown in Figure 18 + = not Figure 18 8 - contains authentication for entities, clock recognition methods, failures 曰 4 The maximum number of times and the minimum number of authentications required to release the blockade are stored in a database in the controller 12 or the memory 2, and the list is related to the authentication requirement associated with the control by the memory. : The principle in this database (for the reading of secrets and partitions:: Take the 'safe channel requirements'). It is also stored in the library and the constraints and restrictions on the storage and division. Therefore, some entities (such as the official) can be on a white list, which means that these entities can store all keys and partitions. Other real systems can: :: Any attempt to information will be blocked. This restriction 2 accesses the apple 2 and/or the partition material. This means that only certain entities can secretly record a partition, and some entities cannot do so. Zone 戎, not the division where the content is located. 2 What is the key to encrypt or decrypt the content? Therefore, some materials (such as 'songs') can have only eight beans, only enough to be accessed by the other five users who access them! ^Attributes, or other materials (for example, movies) can only A property of a limited number of times, regardless of which entities have access rights. Forging Password Protection • Password protection means that a password needs to be submitted to access the protected area. Unless it cannot exceed a password', the password can be associated with different rights, such as read access and/or write access. A 1-code protection means that the device (e.g., a 'flash memory card') can verify the password provided by the host, i.e., the device also has a password stored in the device management secure memory area. Release and Restrictions. Passwords are subject to replay attacks. Since the password does not change after each submission, it can be retransmitted identically. It means that if the protected data is valuable, then the mother should not be used and the communication bus is easily accessible. • Passwords protect access to stored data, but should not be used to protect data (not a key). 122367.doc -57- 200820037 • In order to increase the level of security associated with a password, it can be diversified using a master key, with the result that a database of hackers does not mess up the entire system. A secure communication channel based on the session key can be used to transfer the password. Figure 19 is a flow chart showing the use of a password for authentication. The real system transmits an account ID and password to system 10 (e.g., a flash memory card). The system checks to see if the password matches the password in its memory. if

其係匹配,則傳回經鑑認狀態。否則,累加用於該帳戶之 錯誤計數器,且該實體係被要求重新輸入一帳戶m及密 碼。假如該計數器係滿溢,則㈣統傳回存取被拒絕的狀 態0 Ο 對稱密鑰 對稱密錄演算法係意謂於加密及解密兩端使用相同的密 鑰。其係意謂該密鑰係在通訊 每一端應該實施彼此的逆演算 算法及於另一端之解密演算法 演算法以通訊。 之前已經預先同意。此外, 法,亦即,於一端之加密演 。兩端係不需要實施該兩種 •對稱密鑰鑑認係意謂裝置(例如,快閃記憶體卡)及主 機共用相同的密瑜且具有相同的密碼編譯演算法(直接及 逆向,例如,DES及DES-1)。 •對稱密鑰鑑認係意謂挑戰-回應(保護防止重新播放攻 擊)。受保護的裝置產生-用於其他裝置的挑戰,且兩者 計算回應。該鑑認裝置傳回該回應,且該受保護裝置檢查 122367.doc -58- 200820037 該回應,且據此因而確認鑑認。接荽 ^ ^ ^ Ha , 俊者,與鑑認相關的權利 可被授予。 鑑認可以係: •外部的:該裝置(例如快閃記憶體卡)鑑認外部的世 界,亦即,該裝置確認-給定主機或應用程式之認證。 •相互的:於兩端上產生一挑戰。 •内部的:該主機應用程式鑑認該裝置(亦即,快閃記 憶體卡),亦即,主機檢查是否裝置對於其之應用程式而 言係真實的。 為了增加整個系統的安全性等級(亦即,破壞_者係非 破壞全部), μ •對稱密鑰係通常使用一主控密鑰而與多樣化結合。 相互鑑認使用來自兩端的挑戰,以確保挑戰係一直每 的挑戰。 一只 加密 對稱密鑰密碼編譯亦用於加密,因為其係一非 一 μ Γ吊有效率 的演算法,亦即,其係不需要一功能強大的中央處理單一 來處置密碼編譯。 70 當用於使一通訊通道安全時: •兩端裝置必須知道用於使該通道安全(亦即 — 加密所 有傳出資料且解密所有傳入資料)的會期密鑰。通常使用 一預先共用的安全對稱密鑰或使用公開密鑰基礎結構而 置此會期密瑜。 •兩端裝置係必須知道及實施相同的密碼編譯演算法。 122367.doc -59- 200820037 簽名 々對稱密鑰亦可使用於簽名資料。於此情況下,簽名係加 -的4刀結果。保持該結果為部分的允許簽名與所需一 樣多次,而不顯露該密餘值。 發佈及限制 對稱演算法係非常有效率且安全的,然而其係以—預共 用秘密為基礎。該發佈係以—動態方式安全地共用此秘If it matches, it will return to the authenticated state. Otherwise, the error counter for the account is accumulated and the real system is required to re-enter an account m and password. If the counter is full, then (4) the status of the access denied is 0. Symmetric Key The symmetric secret recording algorithm means that the same key is used at both ends of the encryption and decryption. It means that the key should implement each other's inverse algorithm at each end of the communication and the decryption algorithm at the other end to communicate. I have previously agreed in advance. In addition, the law, that is, the encryption at one end. Both ends do not need to implement the two types of symmetric key authentication means that the device (for example, a flash memory card) and the host share the same secret and have the same cryptographic algorithm (direct and reverse, for example, DES and DES-1). • Symmetric key authentication means challenge-response (protection against replay attacks). Protected devices generate - challenges for other devices, and both calculate responses. The authentication device returns the response and the protected device checks the response 122367.doc -58- 200820037 and accordingly confirms the authentication.荽 ^ ^ ^ Ha, Jun, the right related to identification can be granted. Authentication can be: • External: The device (such as a flash memory card) recognizes the outside world, that is, the device confirms - the authentication of a given host or application. • Mutual: creates a challenge on both ends. • Internal: The host application authenticates the device (i.e., the flash memory card), that is, the host checks if the device is authentic for its application. In order to increase the security level of the entire system (i.e., destroying the non-destructive all), the μ symmetric key system is usually combined with diversification using a master key. Mutual identification uses challenges from both ends to ensure that the challenge is always challenging. An encrypted symmetric key cipher is also used for encryption because it is an efficient algorithm that does not require a powerful central processing unit to handle cryptographic compilation. 70 When used to secure a communication channel: • Both devices must know the session key used to secure the channel (ie, encrypt all outgoing data and decrypt all incoming data). This is usually done using a pre-shared secure symmetric key or using a public key infrastructure. • Both devices must know and implement the same cryptographic compilation algorithm. 122367.doc -59- 200820037 Signature The symmetric key can also be used for signature data. In this case, the signature is added with a 4-knife result. Keeping the result as part of the allowed signature is as many times as needed without revealing the secret value. Release and Limitation Symmetric algorithms are very efficient and secure, yet they are based on pre-common secrets. The release securely shares this secret in a dynamic way

密,且可能使其為隨機的(像是—會期密鑰)。此想法係一 共用的秘密係不易於長期保持安全的,且係幾乎不可能鱼 多個人員共用。 〃 為了促進此操作’已經發明公開密鑰演算法,因為其係 允許秘密交換,而不共用該等秘密。 非對稱鑑認程序 以非對稱密鑰為基礎的鑑認使用傳送命令之一系列資 料其係取終建構用於安全通道通訊之會期密输。基本協 定係對於該安全儲存應用程式系統鑑認該使用者。協定變 化係允許·相互鑑認,其中,該使用者係必須鑑認他想要 使用的存取控制記錄;以及雙因素鑑認。 較佳地,該安全儲存應用程式之非對稱鑑認協定使用公 開密鑰基礎結構(PKI)及RSA演算法。如由這些演算法所定 2,該鑑認程序内每一當事人係被允許建立其自己的rsa 密鑰對。每一 RSA密鑰對係由公開密鑰及私有密鑰所組 成因為&quot;亥等岔输係匿名的,所以其無法提供身份的證 月该公開密鑰基礎結構層尋求一第三方且受信任的當事 122367.doc -60- 200820037 人,其簽名該等公開密鑰之每一者。該受信任的當事人之 公開密鑰係於將彼此鑑認之當事人之間預先共用,且係使 用於驗證該等當事人的公開密鑰。一旦信任係被建置(兩 個當事人決定由另一當事人所提供之公開密鑰可被信 任),該協定係持續鑑認(驗證每一當事人保存匹配的私有 密鑰)以及密鑰交換。此可透過示於圖22及23中之挑戰回 應機制而實施,如下文所述。 含有該加上簽名的公開密鑰之結構被稱為一憑證。簽名 該等憑證的受信任當事人被稱為憑證授權單位(CA)。為了 使一當事人成為經鑑認,其具有一RSA密鑰對及一證明該 公開密鑰的真實性之憑證。該憑證係由一憑證授權單位加 上簽名,该憑證授權單位係受到另一(鑑認)當事人信任。 該鏗認當事人係被期望於其之財產上具有其受信任的憑證 授權單位之公開密鑰。 该安全儲存應用程式系統允許憑證鏈。此係意謂被識別 之虽事人的公開密鑰係可以由一與該識別當事人所信任的 不同的憑證授權單位加上簽名。於此情況下,該被識別當 事人除了提供其自己的憑證之外,亦提供對其公開密瑜加 上簽名之憑證授權單位的憑證。假如該第二層級憑證係仍 然不被另一當事人所信任(未被其受信任的憑證授權單位 加上簽名)’則可提供一第三層級憑證。於此憑證鏈演算 法之中’每-當事人係將持有需要鑑認其公開密錄之憑證 的完整清單。&amp;係顯示於圖23及24。用於此種類型存取控 制記錄相互鑑認所需要之認證係所選長度之RSA密鑰對。 122367.doc -61 - 200820037 安全儲存應用程式憑證 安全儲存應用程式係採用[X·509]第3版數位憑證。 [X· 5 09]係^一種痛又用途標準;於此所述之該安全儲存應用 程式憑證資料檔係進一步說明及限制憑證定義攔位之内 容。該憑證資料檔亦定義用於憑證鏈、安全儲存應用程式 憑證之確認及憑證廢止清單(CRL)資料檔之管理所定義之 信任的階層架構。 該憑證係被認為為公開資訊(如同内部的公開密鑰),且 因而係不被加密。然而,其包含一RSA簽名,其係驗證該 公開密鑰以及所有其他資訊攔位未被竄改。 [X.509]係定義每一攔位係使ffiASN l標準而格式化,其 接著使用用於資料編碼之DER格式。 安全儲存應用程式憑證概觀 顯示於圖20及21之該安全儲存應用程式憑證管理架構之 一項實施例包含用於該主機之無限層級階層架構及用於該 裝置至多3層級階層架構,然而對於該裝置可使用多於或 少於3的層級數。 王機憑證階層架構 該裝置係根據兩項因素而鑑認主機:儲存於該裝置内的 根憑證授權單位憑證(作為—存取控制記錄認證,於該存 取控制記錄之建立時予以儲存)及由嘗試存取該裝置之實 體所提供的憑證/憑證鏈(用於該特定存取控制記錄)。 為存取控制記錄而言,該主機憑證授權單位係作 ^ 4權早位(此係駐留於該等存取㈣記錄認證 122367.doc -62- 200820037 内的憑證)。舉例而言,對於一在 &gt; 、 存取控制§己錄而言,該根 憑證授權單位可以係,,主機旧證授權單位(第2層級)憑證”, 且對於另一存取控制記錄而言,該根憑證授權單位可以係 ”主機根憑證授權單位憑證&quot;。對於每_存取控制記錄而 y持有由該根憑證授權單位簽名之一憑證(或者一連接 該根憑證授權單位至終端實體憑證之憑證鏈)之每一實體 7登入該存取控制記錄,前提係其具㈣於該終端實體憑 呑豆之對應的私有密論。如t y ^ ^ ^如上文所述,憑證係公開的知識, 且係非保持秘密的。 由該根憑證授權單位所發佈之所有憑證擁有者(及對應 的私有密鑰)可登人該存取控制記錄的事實係意謂,對於 一特定存取控制記錄之鑑認係由儲存於該存取控制記錄認 證内之根憑證授權單位的發行者所決定。換句話說,該根 憑證授權單位之發行者可㈣、管職存取㈣記錄的鐘認 方案的實體。 主機根憑證Confidential, and may make it random (like - session key). This idea is that a shared secret system is not easy to maintain safe for a long time, and it is almost impossible for fish to be shared by multiple people.公开 In order to facilitate this operation, a public key algorithm has been invented because it allows secret exchanges without sharing the secrets. Asymmetric authentication procedures Asymmetric key-based authentication uses a series of transmission commands that are ultimately constructed for the secure transmission of secure channel communications. The basic agreement identifies the user for the secure storage application system. The protocol change allows for mutual authentication, where the user must identify the access control record he wants to use; and two-factor authentication. Preferably, the asymmetric authentication protocol of the secure storage application uses a public key infrastructure (PKI) and an RSA algorithm. As determined by these algorithms 2, each party within the authentication procedure is allowed to establish its own rsa key pair. Each RSA key pair is composed of a public key and a private key because the "Han" is anonymous, so it cannot provide the identity of the month. The public key infrastructure layer seeks a third party and is trusted. The person in charge 122367.doc -60- 200820037, who signed each of these public keys. The public key of the trusted party is pre-shared between the parties who authenticate each other and is used to verify the public key of the parties. Once the trust is established (the two parties decide that the public key provided by the other party can be trusted), the agreement is continuous authentication (verifying each party to hold the matching private key) and key exchange. This can be implemented by the challenge response mechanism shown in Figures 22 and 23, as described below. The structure containing the signed public key is called a credential. Signing Trusted parties to these credentials are referred to as Credential Authorization Units (CAs). In order for a party to be authenticated, it has an RSA key pair and a certificate that proves the authenticity of the public key. The voucher is signed by a voucher authority that is authorized by another (authenticated) party. The acknowledgment party is expected to have a public key of its trusted voucher authority on its property. The secure storage application system allows a credential chain. This means that the public key of the person being identified can be signed by a different credential authority that is trusted by the identifying party. In this case, in addition to providing its own credentials, the identified party also provides credentials for the certificate authority that has signed the public secret. A third level of credentials may be provided if the second level of credentials is still not trusted by another party (not signed by its trusted certificate authority). In this voucher chain algorithm, each party will hold a complete list of documents that need to be authenticated. & is shown in Figures 23 and 24. The authentication required for mutual authentication of this type of access control record is the RSA key pair of the selected length. 122367.doc -61 - 200820037 Secure Storage Application Credentials The Secure Storage application uses the [X·509] version 3 digital certificate. [X·5 09] is a painful and use standard; the secure storage application voucher data file described herein further describes and limits the content of the voucher definition block. The voucher data file also defines a hierarchy of trusts defined by the credential chain, the confirmation of the secure storage application credentials, and the management of the credential revocation list (CRL) profile. The voucher is considered to be public information (like an internal public key) and is therefore not encrypted. However, it contains an RSA signature that verifies that the public key and all other information interceptions have not been tampered with. [X.509] defines each interceptor to be formatted by the ffiASN standard, which in turn uses the DER format for data encoding. An example of the secure storage application voucher management structure shown in Figures 20 and 21 includes an infinite hierarchical hierarchy for the host and at most 3 hierarchical hierarchies for the device, however The device may use more or less than 3 levels. Wang Ji voucher hierarchy The device authenticates the host according to two factors: the root certificate authority unit certificate stored in the device (as the access control record authentication, stored when the access control record is established) and A voucher/credential chain (for that particular access control record) provided by the entity attempting to access the device. For access control records, the host credential authorization unit is preemptive (this is the credential that resides in the access (4) record authentication 122367.doc -62- 200820037). For example, for a &gt; access control § record, the root certificate authority can be, the host old certificate authority (level 2) certificate, and for another access control record In other words, the root certificate authority may be the "host root certificate authority unit certificate". Each entity 7 holding one of the credentials signed by the root certificate authority (or a certificate chain connecting the root certificate authority to the terminal entity certificate) is logged into the access control record for each_access control record, The premise is that it has (4) the private secret of the corresponding entity in the terminal entity. As t y ^ ^ ^ As mentioned above, the voucher is a publicly available knowledge and is not kept secret. The fact that all the certificate holders (and corresponding private keys) issued by the root certificate authority can vote for the access control record means that the authentication for a particular access control record is stored in the The issuer of the root certificate authority within the access control record certificate is determined by the issuer. In other words, the issuer of the root certificate authority can (4), the management access (4) record the entity of the clock recognition program. Host root certificate

»亥根心、係„亥女全儲存應用程式正在用於開始驗證嘗試 登入(主機)之實體的公開密鑰之受信任的憑證授權單位憑 證。當該存取㈣記錄被建立以作為料存取控制記錄認 證之部分時,提供此憑證。其剌於該公開密餘基礎結構 系統之信任的根,且因此,其係假設由一受信任的實體 (一父代存取控制記錄或製造/組態受信任的環境)所提供。 該安全健存應用程式使用丨么V開密瑜以驗證該憑證簽名而 驗該心、也。4主機根憑證係經加密地儲存於一非揮發性 122367.doc •63- 200820037 石己’丨思體之中(未顯不於圖1、,g ^ W- ^ &lt; I ' 口 U且該裝置之秘密密鑰較佳地係 僅可由系統10之圖1的中央處理單元12所存取。 主機憑證鏈 主機憑證鏈係於鑑認期間提供給該安全儲存應用程式的 憑證。在完成該主機憑證鏈之處理之後,於該裝置中應未 儲存該主機憑證鏈之回憶。 圖20繪示若干不同的主機憑證鏈之主機憑證層級階層架 構之示意圖。如示於圖20,該主機憑證係可以具有許多不 同的憑證鏈,其中,僅三個係被顯示: Α1·主機根憑證授權單位憑證5〇2、主機i憑證授權單位 (第二層級)憑證504及主機憑證5〇6 ; B1.主機根憑證授權單位憑證5〇2、主機n憑證授權單位 (第二層級)憑證508,主機1憑證授權單位(第三層級)憑證 5 10及主機憑證512 ; C1·主機根憑證授權單位憑證5〇2、主機η憑證授權單位 (第二層級)憑證508及主機憑證514。 上述之三個憑證鏈Al、Β1及C1係顯示可被用於證明該 主機之公開密鑰係為真實的之三個可能的主機憑證鏈。參 照上述憑證鏈Α1及圖20,該主機1憑證授權單位(第二層 級)憑證504内的公開密鑰係藉由該主機根憑證授權單位的 私有Φ鑰而被簽名(亦即,藉由加密該公開密鑰之摘要), 該主機根憑證授權單位的公開密鑰係於該主機根憑證授權 單位憑證502之内。於該主機憑證506内的主機公開密鑰係 接著由該主機1憑證授權單位(第二層級)之該私有密鑰所簽 122367.doc -64 - 200820037 名,該主機!憑證授權單位(第二層級)的 該主機1憑證授權單位(第二層級㈣广鑰係提供於 具有該主機根憑證授權單位的公開了鑰之因此,一 證上述憑證鏈八;!之真實性 實體係將能夠驗 、 F馬弟一步驟,哕每麟於从扣 其擁有之該主機根憑證授權單 〜Λ體係使用 該主機傳送至其之主機丨憑證授權之單 / Ο 内經簽名的公開密鑰,且比較該經解二 =及)憑_ 及由該主機所傳送之該主機旧證授權n簽名公開密鑰 内之未以名的公開密鑰的摘要。假如該兩者係匹 配,則該主機1憑證授權單位(第二 鑑認,且該實體接著將使詩主機;、:)之該公開密鑰係被 1更用w亥主機1憑證授權單位(第二層 經鑑認公開密餘,以解密由該主機傳送之該主: 憑:506内之該主機1憑證授權單位(第二層級)的私有密鑰 :斤名之主機的公開密鑰。假如該經解密的簽名值匹配由 以主機所傳达之該主機憑證506内之該公開密餘的摘要之 值則β主機之該公開密输係接著亦被鑑認。可用類似的 方式使用該憑證鏈B1&amp;C1以用於鑑認。 如同將由上述牵涉到憑證鏈幻之程序所注意到,來自需 要被:實體驗證之該主機的第一公開密鑰係於該主機1憑 二,權單位(第二層級)内的密鑰,且非為該主機根憑證授 ,羊位憑證。因此,該主機僅需要#送該主機i憑證授權 單位(第二層級)憑證504及該主機憑證506給該實體,使得 ^主機1憑證授權單位(第二層級)憑證將為該憑證鏈中需要 被傳迗的第一憑證。如上文所示,憑證驗證的序列係如 122367.doc -65 - 200820037 下。該驗證實體(於此情況下,即記憶體裝置1〇)首先驗證 該憑證鏈中該第一憑證内的公開密鑰的真實性,其在此情 況下係在該根憑證授權單位下方的憑證授權單位的憑證 5 04。在此類憑證内的公開密鑰被驗證為真實的之後,穿 置10接著係進行至驗證下一憑證,於此情況下係該主機憑 證506。藉由相㈤的符記’可應用—類似的驗證序列,其 中,該憑證鏈含有兩個以上憑證,其開始於緊接在該根; 方的憑證,而結束於將被鑑認之實體的憑證。 裝置憑證階層架構 該主機係根據兩項因素而鑑認該裝置:儲存於該主機内 的裝置根憑證授權單位憑證及由該裝置提供給該主機之憑 證/憑證鏈(其係於該存取控制記錄建立時提供給該裝置, 以作為-認證)。用於由該主機鑑認該裝置的程序係類似 於上文所述該裝置鑑認該主機之程序。 裝置憑證鏈 啤诉綠仔取控制從麟對的憑證。其係當 =子取控制記錄被建立時提供給該卡。該安全儲存應用程 二別儲存這些憑證,且將純認期間,逐—地提供憑證 機。該安全儲存應用程式使用這些憑證以鑑認該主 :二亥袭置能夠處理一含3個憑證的憑證鏈,'然而可使用 同而=個的若干憑證。憑證的數量係因存取控制記錄不 =:。其係當該存取控制記錄被建立時予以決定。該 們專运該憑證鏈給該主機’然而,其係不需要分析它 原因係其係不使用該憑證鏈資料。 122367.doc -66- 200820037 圖2 1顯示裝置憑證層級階層架構之示意圖,用於顯示使 用安全儲存應用程式用於諸如儲存裝置之裝置的1至n不同 的憑證鏈。示於圖2 1之該η個不同的憑證鏈係如下: Α2·裝置根憑證授權單位憑證520,裝置1憑證授權單位 (製造商)憑證522及裝置憑證5;24 ; Β2·裝置根憑證授權單位憑證520,裝置η憑證授權單位 (製造商)憑證526及裝置憑證528。 該安全儲存應用程式裝置係可以由1至η個不同的製造商 所製造,每一製造商係具有其自己的裝置憑證授權單位憑 證。因此,於用於一特定裝置之裝置憑證内的公開密鑰係 藉由其製造商的私有密鑰予以簽名,且接著該製造商的公 開密鍮係由該裝置根憑證授權單位的私有密鑰予以簽名。 該裝置之該公開密錄被驗證的方式係類似於上述該主機之 公開密鑰之情況下的方式。當在上述用於主機之憑證鏈^ 之驗證之情況時,不需要傳送該裝置根憑證授權單位憑 證,且該等憑證鏈内需要被傳送之第一憑證係裝置i憑證 授權單位(製造商)憑證,其後接著裝置憑證,i係自1至η的 整數。 於示於圖2 1之實施例中,該裝置將提交兩個憑證:裝置 i憑證授權單位(製造商)憑證,其後接著其自己的裝置憑 證。該裝置i憑證授權單位(製造商)憑證係製造該如此裝置 之製造商且係提供私有密鑰以簽名該裝置之公開密鑰的製 造商的憑證。當該裝置i憑證授權單位(製造商)憑證係由該 主機予以接收時,該主機使用其擁有的根憑證授權單位之 122367.doc -67- 200820037 公開密矯’以解密及驗證該裝置i憑證授權單 開密鑰。假如此驗證失敗,則該主機將中止”;i )公 ::=置_已失敗。假如鑑認成功,則該二系傳= 0月Ί、口遠裝置,以用於下一馮證。接 /、, M + i 接者,該裝置係以—類 &gt;、方式,傳送其將被該主機驗證之自己的裝置憑證。 上述驗證程序係亦更詳細地顯示於圖22及U。 φ 5 »1 ^ 、固 22»Haigen, the “Full Female Storage Application” is being used to start verifying the trusted voucher authority certificate of the public key of the entity attempting to log in (host). When the access (four) record is created as a stock This certificate is provided when the part of the control record authentication is taken. It is based on the root of the trust of the publicly available infrastructure system and, therefore, is assumed to be controlled by a trusted entity (a parent access control record or manufacturing/ The configuration is provided by the trusted environment. The security application uses the certificate to verify the signature and verify the heart. Also, the host root certificate is encrypted and stored in a non-volatile 122367. .doc •63- 200820037 ishi ji's body (not shown in Figure 1, g ^ W- ^ &lt; I 'port U and the secret key of the device is preferably only available from system 10 Accessed by the central processing unit 12 of Figure 1. The host credential chain host credential chain is a credential provided to the secure storage application during authentication. After the processing of the host credential chain is completed, the device should not be stored. Memory of the host credential chain Figure 20 illustrates a schematic diagram of a host credential hierarchy of a number of different host credential chains. As shown in Figure 20, the host credential can have many different credential chains, of which only three are displayed: Α1·Host Root certificate authority unit certificate 5〇2, host i certificate authority unit (second level) certificate 504 and host certificate 5〇6; B1. host root certificate authority unit certificate 5〇2, host n certificate authority unit (second level) Voucher 508, host 1 voucher authorization unit (third level) voucher 5 10 and host voucher 512; C1 · host root voucher authorization unit voucher 5〇2, host n voucher authorization unit (second level) voucher 508 and host voucher 514. The above three credential chains A1, Β1 and C1 show three possible host credential chains that can be used to prove that the host's public key is authentic. Referring to the voucher chain Α1 and Figure 20, the host 1 credential The public key in the authorization unit (second level) voucher 504 is signed by the private Φ key of the host root certificate authority (ie, by encrypting the summary of the public key), the host root The public key of the authorized unit is within the host root certificate authority unit voucher 502. The host public key in the host voucher 506 is then followed by the private key of the host 1 voucher authority (second level) Signed 122367.doc -64 - 200820037, the host! Credential Authorization Unit (Level 2) of the Host 1 Credential Authorization Unit (Second Level (4) Wide Key System is provided to the public key with the host root certificate authority Therefore, the authenticity system of the above-mentioned voucher chain VIII will be able to test, and the F-Mart will take a step, and the 哕 哕 哕 从 从 其 拥有 拥有 拥有 拥有 拥有 主机 主机 主机 主机 主机 主机 主机 主机 主机Host/Certificate Authorized Order/ Ο The signed public key, and compare the solution == and) by _ and the host's old certificate issued by the host is not authorized by the name of the public key A summary of the public key. If the two match, the host 1 credential authorization unit (the second authentication, and the entity will then make the poem host;, :) the public key is used by the 1st host 1 credential authorization unit ( The second layer is authenticated to disclose the secret transmitted by the host: by the private key of the host 1 credential authorization unit (second level) in the 506: the public key of the host of the name. If the decrypted signature value matches the value of the digest of the public secret in the host credential 506 communicated by the host, then the public secret of the beta host is then also authenticated. This can be used in a similar manner. The voucher chain B1 &amp; C1 is used for authentication. As noted by the above-mentioned procedure involving the credential chain, the first public key from the host that needs to be verified by the entity is tied to the host 1 The key in (the second level), and not the master certificate, the sheep certificate. Therefore, the host only needs to send the host i certificate authority (second level) certificate 504 and the host certificate 506 The entity, making ^host 1 credential authorization The (second level) voucher will be the first voucher in the voucher chain that needs to be forwarded. As shown above, the sequence of voucher verification is as follows 122367.doc -65 - 200820037. The verification entity (in this case, That is, the memory device 1) first verifies the authenticity of the public key in the first credential in the credential chain, which in this case is the credential of the credential authority unit under the root credential authority unit. After the public key in the class certificate is verified as authentic, the wearer 10 proceeds to verify the next voucher, in this case the host credential 506. The signature of the phase (five) is applicable - similar verification a sequence wherein the credential chain contains more than two credentials starting with the credentials of the party immediately ending with the credentials of the entity to be authenticated. Device Credential Hierarchy The host is based on two factors Identifying the device: a device root certificate authority unit voucher stored in the host and a voucher/credential chain provided by the device to the host (which is provided to the device when the access control record is established) The procedure for authenticating the device by the host is similar to the procedure for the device to authenticate the host as described above. The device voucher chain v. Green is taking control of the voucher from the pair. The control record is provided to the card when it is created. The secure storage application stores the credentials and provides the voucher machine one by one during the purely recognized period. The secure storage application uses the credentials to authenticate the master: The squad can handle a voucher chain with 3 vouchers, 'however, several vouchers of the same = can be used. The number of vouchers is because the access control record is not =:. When the access control record is created It is decided that the voucher chain is dedicated to the host. However, it is not necessary to analyze the reason why it does not use the voucher chain data. 122367.doc -66- 200820037 Figure 2 1 shows the device credential hierarchy structure Schematic diagram for displaying 1 to n different credential chains using a secure storage application for devices such as storage devices. The n different credential chains shown in Figure 21 are as follows: Α2·Device Root Credential Authorization Unit Credential 520, Device 1 Credential Authorization Unit (Manufacturer) Credential 522 and Device Credential 5; 24; Β2·Device Root Credential Authorization Unit voucher 520, device n voucher authorization unit (manufacturer) voucher 526 and device voucher 528. The secure storage application device can be manufactured by 1 to n different manufacturers, each manufacturer having its own device certificate authority certificate. Thus, the public key in the device credential for a particular device is signed by its manufacturer's private key, and then the manufacturer's public key is the private key of the device's root credential authority. Sign it. The manner in which the public privilege of the device is verified is similar to the manner in which the host's public key is described above. When in the above-mentioned case for the verification of the certificate chain of the host, it is not necessary to transmit the device root certificate authority unit certificate, and the first certificate system device i certificate authority (manufacturer) that needs to be transmitted in the certificate chain The voucher followed by the device voucher, i is an integer from 1 to η. In the embodiment shown in Figure 21, the device will submit two credentials: the device i voucher authority (manufacturer) voucher followed by its own device credential. The device i certificate authority (manufacturer) voucher is the manufacturer's certificate that manufactures the device and provides the private key to sign the device's public key. When the device i certificate authority (manufacturer) certificate is received by the host, the host uses its own root certificate authority unit 122367.doc -67-200820037 to disclose the secret correction to decrypt and verify the device i certificate. Authorization order to open the key. If the verification fails, the host will abort ";i) public::=set_ has failed. If the authentication is successful, then the second transmission = 0 month, the remote device, for the next Feng card. Connected to, /, M + i, the device transmits its own device credentials to be verified by the host in the form of -> The above verification procedures are also shown in more detail in Figures 22 and U. 5 »1 ^ , solid 22

、/王服務模組系統”係一軟體模組,其係實施本文所 =之安全儲存應用程式系統以及下文敘述之其他功能。安 全服務模組系統係可以建構為軟體或電腦碼,其具有儲存 於記憶體20或中央處理單元12内的一非揮發性記憶體 顯不)内的資料庫,且係由該中央處理單元12讀取至隨機 存取記憶體12a之中且予以執行。 如不於圖22,該程序内有三個階段,其中,裝置ι〇内的 安全服務模組系統542鑑認一主機系統540。於第一公開密 鑰驗證階段中,該主機系統540傳送該安全服務模組命令 内該主機憑證鏈給該安全服務模組系統542。該安全服務 模組系統542使用位於該存取控制記錄55〇内之該主機根憑 證548内的根憑證授權單位公開密鑰,而驗證(方塊552)該 主機憑證544及該主機公開密鑰546之真實性。若牵涉到介 於違根憑證授權單位與該主機之間的一中間憑證授權單位 549 ’則於方塊552,該中間憑證授權單位549亦被用於驗 證。假設該驗證或程序(方塊552)係成功的,則該安全服務 模組系統542係接著進行至第二階段。 该安全服務模組系統542產生一隨機號碼554且傳送該隨 122367.doc -68- 200820037 機號碼5 5 4作兔 ». 該主機“Λ 喊而至該主機系統54°。系統54。使用 且僖μ ”,私有密鑰547簽名該隨機號碼554(方塊556), I z、、工簽名的隨機號碼作為對於該挑戰的回應。該回 應係使m機公開密鍮546予以解密(方塊 且 ,機號碼554相比較(方塊州。假設該經解密回應匹配該 Ik機j碼554,則該挑戰回應係成功的。 f % u 於第:階段中,隨機號碼562係使用該主機公開密餘W 予乂加密接著,該隨機號碼562係會期密鍮。該主機系 、、先540可藉由使用其之私有密餘解密(方塊$叫來自該安全 服«組系統542之該經加密的隨機號碼犯,而獲得該會 期密鑰。藉由此會期密鑰,接著可起始介於該主機系統 540與該安全服務模組系統542之間的安全通訊m係顯 示單向非對稱鑑認,其中,該主機系統540係由裝置10 内之該安全服務模組系統542予以鑑認。圖以係一協定 圖,其顯示一類似於圖22之單向鐘認協定之雙向相互鐘認 私序,其中,圖23中之該安全服務模組系統542係亦由該 主機系統54〇予以鑑認。 圖24繪示本發明之一項實施例之憑證鏈59〇的圖式。如 上文所述,需要被提交用於驗證之憑證鏈可包含若干憑 證。因此’圖24之憑證鏈包含總計9個憑證,該等憑證全 部係可以需要被驗證以用於鑑認。如說明於上文之先前技 術部分,於用於憑證驗證的現有系統中,在傳送一不完整 的憑證鏈,或者若傳送整個憑證,而該等憑證係不以任何 特疋的順序予以傳送,使得接收者係將不能夠分析該等憑 122367.doc -69- 200820037 證,直到整個憑證群組係已經被接收及儲存為土。因為於 一憑證鏈内憑證之數量係事先不知道,所以此可呈現一問 題。一大量的儲存空間係可能需要被保留,以用於儲存不 確定長度的憑證鏈。此可以係一對於實施驗證之儲存裝置 的問題。 本發明之一項實施例係根據:該問題可藉由主機裝置以 與該憑證鏈將被該儲存裝置驗證之相同順序傳送其之憑證 鏈之一系統所減輕之認知。因此,如示於圖24,憑證之憑 證鏈590係:開始於憑證鏈590(1),其係緊接在該主機根憑 證下方的憑證;且結束於憑證590(9),其係該主機憑證。 因此,裝置10將首先驗證憑證590(1)内之公開密鑰,其後 接著憑證590(2)内之公開密鑰的驗證,以此類推,直到憑 證590(9)内的主機公開密鑰被驗證為止。接著,此係完成 整個憑證鏈5 9 0之驗證程序。因此,假如該主機裝置係以 與該憑證鏈將被驗證之相同順序或序列而傳送該憑證鏈 5 9 0至記憶體裝置10,則記憶體裝置1 〇可當每〆憑證被接 (; 收時開始驗證每一憑證,而不需要等待直到該憑證鏈590 内全部9個憑證已經被接收為止。 因此,於一項實施例中,該主機裝置係一次傳送該憑證 鏈590内一憑證至記憶體裝置1〇。接著,記憶體裝置1〇將 必須一次儲存一單一憑證。在該憑證係已經被驗證之後, 其可被由該主機所傳送之下一憑證予以覆寫,惟該憑證鏈 中最後一憑證除外。以此方式,在任何時間,記憶體裝置 10將需要保留用於僅儲存一單一憑證的空間。 122367.doc -70- 200820037 該記憶體裝置係將需要知道該整個憑證鏈590何時已經 被接收。因此,較佳地,最後一憑證590(9)係含有其係該 憑證鏈内最後一憑證之一指示項或一項指示。此特徵係顯 示於圖25,其顯示一控制區段的資訊的表,該控制區段係 在由該主機傳送至該記憶體裝置10之憑證緩衝區之前。如 示於圖25,憑證590(9)之控制區段含有一引數名稱&quot;,為最 後的’旗標”。接著,記憶體裝置10可藉由檢查是否該’為最 後的’旗標係被設定,而驗證憑證590(9)係該憑證鏈内最後 一憑證,以決定是否所接收之憑證係該憑證鏈中最後一個 憑證。 於一替代實施例中,憑證鏈5 9 0内之憑證係可非以逐一 方式予以傳送,而係以含一個、兩個或三個憑證之群組予 以傳送。明顯地,可使用具有其他數量之憑證的群組或者 群組中相同數量之憑證。因此,憑證鏈590包含5個連續的 憑證串591、593、595、597及599。該等憑證串之每一者 含有至少一憑證。一連續的憑證串係含有下列憑證的憑證 串:緊接於該憑證鏈中位於該討論中憑證串之前的憑證串 之憑證(開始憑證);緊接在該憑證鏈内該討論中憑證串的 後的憑證串的憑證(結尾憑證);以及介於該開始憑證與結 尾憑證之間之所有憑證。舉例而言,憑證串593含有三個 憑證590(2)、590(3)及590(4)。該5個憑證串係由記憶體裝 置10以下列序列驗證:591、593、595、597且以599結 束。因此,假如該5個憑證串係以與記憶體裝置10所實施 之驗證相同的序列予以傳送及接收,則該記憶體裝置在彼 122367.doc •71 - 200820037The "/Service Module System" is a software module that implements the secure storage application system as described in this document and other functions described below. The security service module system can be constructed as a software or computer code with storage. The database in the memory 20 or a non-volatile memory in the central processing unit 12 is read by the central processing unit 12 into the random access memory 12a and executed. In Figure 22, there are three phases in the program, wherein the security service module system 542 within the device ι identifies a host system 540. In the first public key verification phase, the host system 540 transmits the security service module. The host credential chain within the group command is given to the security service module system 542. The security service module system 542 uses the root credential within the host root credential 548 within the access control record 55 to authorize the unit public key, and Verifying (block 552) the authenticity of the host credential 544 and the host public key 546. If an intermediate credential authorization unit between the root credential authority and the host is involved 54 9 'At block 552, the intermediate voucher authority 549 is also used for verification. Assuming the verification or procedure (block 552) is successful, the security service module system 542 proceeds to the second phase. The service module system 542 generates a random number 554 and transmits the same as the 122367.doc -68-200820037 machine number 5 5 4 for the rabbit. The host "screams to the host system 54°. System 54. Using and 僖μ", the private key 547 signs the random number 554 (block 556), I z, the worker-signed random number as a response to the challenge. The response causes the m-machine public key 546 to decrypt (block Moreover, the machine number 554 is compared (square state. Assuming that the decrypted response matches the Ik machine j code 554, the challenge response is successful. f % u In the phase: the random number 562 is used to disclose the secret. Then, the random number 562 is secreted. The host system, the first 540 can be decrypted by using its private secret (block $ is called encrypted from the security service «group system 542 The random number is committed, and the session key is obtained. By means of the session key, then the secure communication between the host system 540 and the security service module system 542 can be initiated. Symmetric authentication, wherein the host system 540 is authenticated by the security service module system 542 within the device 10. The figure is a protocol diagram showing a two-way mutual similar to the one-way clocking agreement of Figure 22. The clock recognizes the private order, which is the one in Figure 23. The full service module system 542 is also authenticated by the host system 54. Figure 24 is a diagram of a credential chain 59A of an embodiment of the present invention. As described above, it needs to be submitted for verification. The voucher chain may contain several voucher. Therefore, the voucher chain of Figure 24 contains a total of 9 voucher, all of which may need to be verified for authentication. As explained in the prior art section above, for voucher verification. In an existing system, an incomplete voucher chain is transmitted, or if the entire voucher is transmitted, and the voucher is not transmitted in any particular order, the recipient will not be able to analyze the voucher 122367.doc - 69- 200820037 certificate, until the entire voucher group has been received and stored as soil. Because the number of voucher in a voucher chain is not known in advance, this can present a problem. A large amount of storage space may need to be retained For storing a voucher chain of indeterminate length. This may be a problem for a storage device that performs verification. An embodiment of the present invention is based on: the problem can be solved by a host The knowledge mitigated by one of the voucher chains that are transmitted in the same order as the voucher chain will be verified by the storage device. Thus, as shown in Figure 24, the voucher chain 590 of the voucher begins: voucher chain 590 (1) ), which is the credential immediately below the host root credential; and ends with credential 590(9), which is the host credential. Thus, device 10 will first verify the public key in credential 590(1), followed by The verification of the public key in voucher 590(2) is followed, and so on, until the host public key in voucher 590(9) is verified. Then, this completes the verification process for the entire credential chain 59. If the host device transmits the credential chain 59 to the memory device 10 in the same order or sequence as the credential chain is to be verified, the memory device 1 can be connected to each voucher (; Each credential is verified to be verified without waiting until all nine credentials in the credential chain 590 have been received. Thus, in one embodiment, the host device transmits a credential in the credential chain 590 to the memory device 1 at a time. Next, the memory device 1 will have to store a single voucher at a time. After the voucher has been verified, it can be overwritten by a voucher sent by the host, except for the last voucher in the voucher chain. In this way, at any time, the memory device 10 will need to reserve space for storing only a single credential. 122367.doc -70- 200820037 The memory device will need to know when the entire credential chain 590 has been received. Therefore, preferably, the last voucher 590(9) contains an indication or an indication that it is one of the last voucher in the voucher chain. This feature is shown in Figure 25, which shows a table of information for a control section that is transmitted by the host to the credential buffer of the memory device 10. As shown in Figure 25, the control section of voucher 590(9) contains an argument name &quot;, which is the last 'flag.' Next, memory device 10 can check if the 'be the last' flag The verification voucher 590(9) is the last voucher in the voucher chain to determine whether the received voucher is the last voucher in the voucher chain. In an alternative embodiment, the voucher chain is within 5 0 0 The voucher may not be transmitted one by one, but is transmitted in groups containing one, two or three voucher. Obviously, the same number of voucher in a group or group with other numbers of voucher may be used. Thus, credential chain 590 contains five consecutive credential strings 591, 593, 595, 597, and 599. Each of the credential strings contains at least one credential. A contiguous credential string is a credential string containing the following credentials: a voucher (starting voucher) of the voucher string located in the voucher chain before the voucher string in the voucher; a voucher (end credential) of the voucher string following the voucher string in the voucher chain; Start voucher and knot All credentials between the trailing vouchers. For example, the credential string 593 contains three credentials 590(2), 590(3), and 590(4). The five credential strings are verified by the memory device 10 in the following sequence: 591, 593, 595, 597 and ending with 599. Therefore, if the five credential strings are transmitted and received in the same sequence as the verification performed by the memory device 10, the memory device is at the same end. 71 - 200820037

等憑證串已經被驗證之後,將不需要儲存任一憑證串,且 惟2後一憑證串除外的所有可被來自該主機而到逹的下一 心也串所覆寫。如同先前的實施例,期望該憑證鏈内最後 :憑證係含有一諸如一旗標的指示項,其係被設定為一特 定的值,以指不其係該憑證鏈内最後一憑證。於此實施例 中,该記憶體裝置將僅需要保留足以儲存該5個憑證串内 最大數里的憑證的空間。因Λ,假如該主機首先係通知該 記憶體裝置1G其意欲傳送之最長憑證串,該記憶體裝置1〇 係僅需保留用於最長憑證串列之足夠空間。 車乂佺地,由该主機所傳送之該憑證鏈内每一憑證的長度 不超過由該憑證所檢定的公開密鑰之長度的4倍。類似 地’較佳地’由該記憶體裝置1G傳送至_主機裝置以檢定 該記憶體裝置之公開密鍮之憑證的長度不超過由該憑證所 檢定的公開密鑰之長度的4倍。 上述用於憑證鏈之驗證的實施例係顯示於圖26之流程圖 之中'、中’對於簡化起見’於每-群組内的憑證數量係 假設為1。如示於圖26’該主機係循序傳送該憑證鏈内之 憑證至該卡。以該憑證鏈内之第一憑證(典型土也,接在該 根憑證之後的憑證’如上文所述)開始,該卡循序接收來 自正制認之該主機的憑證鏈(方塊6降接著,該卡係驗 證每一接收到的憑證,且假如任-憑證係驗證失敗,則中 假如該等憑證之任—驗證失敗,則該卡通知該 機(方塊6G4,6G6)。接著,該卡係]貞測是否最後一渴證 已經被接收及驗證(菱形,。假如最後一憑證尚未被接收 122367.doc •72· 200820037 及驗證,則該卡返回方塊602,以繼續接收及驗證來自該 主機的憑證。假如最後一憑證已經被接收及驗證,則該卡 在憑證驗證之後,進行至下一階段(610)。雖然圖26及以下 後續圖内之特徵係引用記憶體卡作為範例,應瞭解的是, 這些特徵係亦可應用於具有非記憶體卡之實體形式之記憶 體裝置。After the credential string has been verified, there will be no need to store any credential string, and all but the next one of the credential strings can be overwritten by the next thread from the host. As in the previous embodiment, it is desirable that the last in the voucher chain contains an indication such as a flag that is set to a specific value to indicate that it is the last voucher in the voucher chain. In this embodiment, the memory device will only need to reserve enough space to store the credentials in the maximum number of the five credential strings. Therefore, if the host first notifies the memory device 1G of the longest credential string it intends to transmit, the memory device 1 only needs to reserve enough space for the longest credential string. In the vehicle, the length of each voucher in the voucher chain transmitted by the host does not exceed 4 times the length of the public key authenticated by the voucher. Similarly, the length of the voucher transmitted by the memory device 1G to the host device to verify the public device of the memory device is no more than four times the length of the public key authenticated by the voucher. The above-described embodiment for verification of the credential chain is shown in the flow chart of Fig. 26, and 'for the sake of simplicity', the number of documents in each group is assumed to be 1. As shown in Figure 26, the host sequentially transmits the credentials in the voucher chain to the card. Starting with the first voucher in the voucher chain (typically, the voucher following the root voucher as described above), the card sequentially receives the voucher chain from the host that is being recognized (block 6 is followed, The card verifies each received credential, and if the credential-authentication verification fails, the card notifies the machine if the verification fails (blocks 6G4, 6G6). Then, the card is ] Detect if the last craving has been received and verified (diamond, if the last vouch has not been received 122367.doc • 72· 200820037 and verified, then the card returns to block 602 to continue receiving and verifying from the host Voucher. If the last voucher has been received and verified, the card proceeds to the next stage (610) after the voucher is verified. Although the features in Figure 26 and the following figures refer to the memory card as an example, it should be understood. Yes, these features can also be applied to memory devices having a physical form other than a memory card.

§该卡正在鑑認該主機時由該主機所實施之程序係顯示 於圖27。如示於圖27,該主機傳送該憑證鏈内下一憑證至 該卡(方塊620),典型地係以一接在該根憑證之後的憑證開 始。接著,該主機係決定是否已經接收到來自該卡之一指 示鑑認失敗的中止通知(菱形622)。假如已經接收一中止通 去貝丨u亥主機停止(方塊624)。假如尚未接收一中止通知, 則該主機係藉由檢查是否已經於被傳送之最後一憑證中設 定’為最後的旗標,,而檢查看看是否已經傳送該憑證鏈内 最後一憑證(方塊626)。假如已經傳送最後一憑證,則在憑 證驗證之後,該主機進行至下一階段(方塊628)。如示於'圖 22及23,下一階段可以係一挑戰回應,其後係接著會期密 鑰建立。假如尚未傳送該憑證鏈内最後一憑證,則該主機 返回方塊620 ’以傳送該憑證鏈内下一憑證。 當該卡正被鑑認時由該卡及該主機所採取的動作係顯示 於圖28及29。如示於圖28,在開始之後,該卡係等待一來 ^該主機的請求,以傳送該憑證鏈内之-憑證(方塊63〇, 曼形632)。假如未接收到來自該主機的-請求,則該卡將 返回菱形632。假如接收到來自該主機的_請求㈣卡 122367.doc -73- 200820037 接著將傳送該憑證鏈内下—憑證,其係以應該被傳送之第 -憑證開始(典型地,以接在該根憑證之後的憑證開始八方 塊634)。該卡決定是否已接收到而來自該主機的—失敗通 知(方塊636)。假如已接收到一失敗通知,則該卡停止(方 塊637)。假如未接收到任何失敗通知,則該卡決定是否已 傳送最後-憑證(菱形638)。假如尚未傳送最後―憑證,% 該卡返回菱形632且等待直到其接收來自該主機的下一請 求為止,以用於傳送該憑證鍵内之下一憑證。假如已傳送 最後一憑證,則該卡係進行至下一階段(方塊639)。 Ο 圖29顯示當該卡係正在被鑑認時,該主機所採取之動 作。該主機傳送對於該憑證鏈内之下一憑證之請求至該 卡,其係以對於將被傳送之第一憑證的請求開始(方塊 640)。接著,该主機驗證每一接收到的憑證,且假如驗證 失敗,則中止該程序且通知該卡(方塊642)。假如驗證通 過’則》亥主機私查看看是否已接收且成功地驗證最後一憑 證(菱形644)。假如尚未接收及成功地驗證最後一憑證,= 該主機返回方塊640,以傳送一對於該憑證鏈内下一憑證 之請求。假如已接收及成功地驗證最後一憑證,則在憑證 驗證之後’忒主機進行至下一階段(方塊646)。 憑證廢止 當發佈一憑證時,期望於其整個有效期間被使用。然 而,各種情況可能導致一憑證在有效期間到期之前變成無 效的。此類情況包含名稱改變’主題與憑證授權單位之間 之關聯性改變(例如’一員工終止與一組織之雇用關係), 122367.doc -74- 200820037 於此類情況下,該憑 及危及或懷疑危及對應的私有密靖 證授權單位係需要廢止該憑證。 =錯存應用程式係以不同的方式啟用憑證廢止,每 存取控制記錄可被組態以用於一用於廢止憑 法。一存取控制記錄可被組態成不支援_廢 、疋方 情況下,每-憑證係被認為有效的,直到其之到期曰:: 止。或者可採用憑證廢止清單。作為又另—方』為 ί ❹ =方案可特定用於一特別的應用程式,或者應用:: 廢止值,而指定三種廢止方案中被採用的廢止方宰= 一存取控制記錄被建立成不具有廢止方案,則對於^ :了=一能夠被該存取控制記錄擁有者啟動的廢止巧 係可-的。記憶體裝置憑證之廢止係由該主機予以強制二 :’而:由該安全儲存應用程式安全性系統予以強制; :::: 子取控制記錄擁有者負責管理一主機根憑證的廢 制記錄的憑證而實施。 專存取抆 憑證廢止清單(CRL) 週:=存應用程式系統使&quot;止方案,其係牽涉到 ,佈無為一憑證廢止清單之經簽名資料結構之 -憑證授權單位。一憑證廢止清單係一時間戮記清單,盆 識別由-憑證授權單位(發佈討論中的憑證之瑪巧 權單位m簽名之經廢止憑證,且實施成可由公眾二: 使用每一經廢止憑證係藉由其憑證序號而於—憑證廢止 122367.doc -75- 200820037 清單中予以識別。該憑證廢止清單的大小係任意的,且係 取決於經廢止的未到期憑證之數量。當一裝置使用一憑證 (例如,用於驗證一主機的身份)時,該裝置不僅檢查該憑 證簽名(及有效性),而且亦比對透過一憑證廢止清單接收 之序號清單而驗證該憑證。假如於發佈該憑證的憑證授權 單位所發佈之憑證廢止清單上找到一諸如一憑證之序號的 識別,則此係指示該等憑證係已經被廢止且不再有效。 該憑證廢止清單亦將需要被驗證為真實的,以使其作為 確認憑證之目的。憑證廢止清單係使用發佈該憑證廢止清 單的憑證授權單位的私有密鑰予以簽名,且可藉由使用該 憑證授權單位的公開密鑰解密該經簽名的憑證廢止清單而 被驗證為真實的。假如該經解密的憑證廢止清單匹配該未 經簽名的憑證廢止清單之摘要,則此係意謂該憑證廢止清 單係未曾被竄改且係真實的。憑證廢止清單係通常使用一 雜湊演算法而被雜湊,以獲得其之摘要,且該等摘要係藉 由該憑證授權單位的私有密鑰予以加密。為了驗證是否一 憑證廢止清單係有效的,該經簽名的憑證廢止清單(亦 即,經雜湊及經加密的憑證廢止清單)係使用該憑證授權 單位的公開密鑰予以解密,以得出一經解密及經雜湊的憑 證廢止清單(亦即,該憑證廢止清單的一摘要)。接著,其 係與該經雜湊的憑證廢止清單比較。因此,該驗證程序可 時常牽涉到雜湊該憑證廢止清單以用於與經解密及經雜湊 的憑證廢止清單相比較的步驟。 該等憑證廢止清單方案的特性之一係,該憑證(對於該 122367.doc -76- 200820037 憑證廢止清單)之確認可與獲得該憑證廢止清單分開實 施。憑證廢止清單係亦由適切的憑證之發行者予以簽名, 且係以上述之方式,使用發佈該等憑證廢止清單之憑證授 權單位的公開密鑰,以一類似於憑證驗證之類似方式來驗 證憑證廢止清單。該記憶體裝置驗證該簽名係屬於該憑證 廢止清單且該憑證廢止清單之發行者匹配該憑證之發行 者。該憑證廢止清單方案之另一特性係,可藉由完全相同 於該等憑證本身的手段散佈憑證廢止清單,亦即,經由不 受信任的伺服器及不受信任的通訊。憑證廢止清單及其之 特性係詳細說明於X.509標準之中。 憑證廢止清單之安全儲存應用程式基礎架構 安全儲存應用程式使用該憑證廢止清單方案而提供一用 於主機廢止之基礎結構。當以憑證廢止清單廢止方案鑑認 一 RSA為基礎的存取控制記錄時’該主機係將作為一額外 的欄位之一憑證廢止清單(假如發行者憑證授權單位未廢 止任何憑證,則可能為一空的憑證廢止清單)加入至一集 合憑證命令之中。此欄位將含有一由該憑證的發行者所簽 名之憑證廢止清單。當此欄位係存在時,該記憶體裝置10 首先驗證該集合憑證命令内的憑證。獲得及存取該憑證廢 止清單存放庫(repository)係完全為該主機之責任。憑證廢 止清單係於其為有效期間的時期(憑證廢止清單到期時期 (CET)而發佈。於驗證期間,假如目前的時間係被發現為 不在此時期内,則該憑證廢止清單係被認為有缺陷的,且 不能夠被用於憑證驗證。接著,結果係該憑證的鑑認失 122367.doc -77- 200820037 敗。 於傳統的憑證驗證方法中,該鑑認或驗證實體被期望持 有憑證廢止清單或能夠自憑證授權單位擷取憑證廢止清 單^比㈣清單以檢查提交用於鑑認之憑證的序號,以 決定是否所提交的憑證係已經被廢止。在鑑認或驗證實體 係-記憶縣置之情況下,該記憶體裝置係可能尚未被使 用於自己自憑證授權單位擷取憑證廢止清單。假如一憑證 廢止清單係預先儲存於該裝置内,則此類清單係可變成過 期的,使得在該安裝日期之後所廢止的憑證將不出現於該 清單上。此將使使用者能夠使用一經廢止憑證存取該儲存 裝置。此係不期望的。 在一項實施例中,可藉由一種系統來解決上述問題,其 中,想要被鑑認之實體提交一憑證廢止清單連同將被鑑認 之憑證給該鑑認實體,該鑑認實體可以係一記憶體裝置 1 〇。該鑑認實體接著驗證接收到之憑證及憑證廢止清單的 真實性。该鑑認實體藉由檢查是否該憑證之識別(諸如該 憑證之序號)係出現於該憑證廢止清單上,而檢查是否該 憑證係於該憑證廢止清單上。 鑑於上述内容,一非對稱鑑認方案可被用於介於一主機 展置與a己憶體裝置1 〇之間的相互鑑認。想要對於該記情、體 裝置10而被鑑認之該主機裝置係將需要提供其憑證鏈及對 應的憑證廢止清單。另一方面,主機裝置係已經被用於連 接至憑證授權早位以獲得憑證廢止清單,使得當記憶體裝 置10係將被主機裝置予以鑑認時,該記憶體裝置不需要將 122367.doc -78- 200820037 憑證廢止清單連同其憑證或憑證鏈提交給該等主機裴置。 崔近年來,係有擴大數量之不同類型可用於播放内^的可 攜式裝置,諸如不同内建的或獨立的音樂播放機 ' 爪…播 放機、仃動電話、個人數位助理及筆記型電腦。雖然連接 此類裝置至全球網路(www)以自憑證授權單位存^憑證 驗證清單係可能的,然而典型地,許多使用者非每天= 至web’反而是僅獲得新的内容或更新訂購(諸如每幾週) 才連接至Web。因此,對於此類使用者而言,必須更頻繁 地自憑證授權單位獲得憑證廢止清單可能係麻須的。對於 此類使用者而言,可於該儲存裝置本身之一較好 6蒦區域中儲存該憑證廢止清單及亦可選用之將需要被提交 給一儲存裳置以存取受保護内容之主機憑證。於許多類型 儲存裝置(例如快閃記憶體)之中,該等儲存裝置之未受保 護區域係由主機裝置所管理,而非該等儲存裝置自己所管 理。以此方式,對於該使用者(至該主機裝置)而言,不需 要必須連接至該網路,以獲得更多最新的憑證廢止清單。 2主機t置係可以僅自該儲存裝置之不安全區域掏取此類 資訊’且接著轉向及提交此類憑證及清單給該儲存器或記 憶體裝置’以存取該儲存裝置内受保護内容。因為用於存 取受保護内容的憑證及其對應的憑證廢止清單典型地係於 某時期為有效的,所以只要其係仍然有效的’則該使用者 將不需要獲得最新的憑證或憑證廢止清單。上述特徵使使 用者月b夠於相备長的期間當該憑證及憑證廢止清單皆為有 效時,方便存取該憑證及憑證廢止清單,而不需要連接至 122367.doc -79- 200820037 該憑證授權單位,以用於經更新資訊。 上述程序係顯示於圖30及31之流程圖之中。如示於圖 30,該主機24自該記憶體裝置10之不安全公開區域讀取關 於該主機將提交給該記憶體裝置以用於鑑認之一憑證的憑 證廢止清單(方塊652)。因為該憑證廢止清單係儲存於該記 憶體之一不安全區域,所以在該憑證廢止清單能夠被該主 機獲彳于之前,係不需要鑑認。因為該憑證廢止清單係儲存 於该圮憶體裝置之公開區域,所以該憑證廢止清單的讀取 係受到該主機裝置24控制。接著,該主機傳送憑證廢止清 單連同將被驗證之憑證至該記憶體裝置(方塊654),且進行 至下一階段,除非其接收來自該記憶體裝置1〇之一失敗通 知(方塊656)。參照圖31,該記憶體裝置係接收來自該主機 的憑證廢止清單及憑證(方塊658),且檢查是否該憑證之序 號係於該憑證廢止清單上(方塊66〇),以及其他方面㈠列 如i是否該憑證廢止清單係已經過期)。假如於該憑證廢 止清單上找到該憑證之序號或者因其他理由而失敗,則該 記憶體裝置傳送一失敗通知給該主機(方塊662)。以此方 式不同的主機可獲得儲存於該記憶體裝置之公開區域内 的心也廢止π單,原因係相同的憑證廢止清單可被用於不 =主機的鐘認。如上文所述,為了使用者方便,將使用該 心也廢止q單而被驗證之憑證較佳地係亦可以與該憑證廢 止清早一起儲存於記憶體裝置10之一不安全區域内。然 而’ Ή證係可用於僅由言亥憑證被發佈之該主機對於記憶 體裝置之鑑認。 122367.doc 200820037 在該憑證廢止清單係於其欄位内含有一用於下一更新時 間之情況下,如示於圖32,於裝置1〇内的安全儲存應用程 式係亦對照此時間而檢查目前時間,以看看是否目前時間 係於此時間之後;假如其係如此,則鑑認亦失敗。因此, 較佳地,該安全儲存應用程式對照目前的時間(或者對照 該憑證廢止清單被該記憶體裝置10接收到的時間)檢查下 更新的時間以及憑證廢止清單到期時期。§ The program implemented by the host while the card is authenticating the host is shown in Figure 27. As shown in Figure 27, the host transmits the next voucher in the voucher chain to the card (block 620), typically starting with a credential following the root credential. Next, the host determines whether an abort notification (diamond 622) from one of the cards indicating that the authentication failed has been received. If an abort has been received, the host stops (Block 624). If a suspension notification has not been received, the host checks to see if the last token in the credential chain has been transmitted by checking if the last flag has been set in the last voucher being transmitted (block 626). ). If the last credential has been transmitted, then after the credential verification, the host proceeds to the next stage (block 628). As shown in Figures 22 and 23, the next phase can be a challenge response followed by the establishment of a session key. If the last credential in the credential chain has not been transmitted, the host returns to block 620' to transmit the next credential within the credential chain. The actions taken by the card and the host when the card is being authenticated are shown in Figures 28 and 29. As shown in Fig. 28, after the start, the card waits for a request from the host to transmit the voucher in the voucher chain (block 63, man shape 632). If a request from the host is not received, the card will return to diamond 632. If the _Request (4) card 122367.doc -73- 200820037 received from the host is then transmitted, the voucher chain will be transferred to the voucher, which begins with the first voucher that should be transmitted (typically, to the root certificate) The subsequent voucher begins with eight blocks 634). The card determines if a failure notification has been received from the host (block 636). If a failure notification has been received, the card is stopped (block 637). If no failure notification is received, the card determines if the last-voucher has been transmitted (diamond 638). If the last "voucher" has not been transmitted, the card returns to diamond 632 and waits until it receives the next request from the host for transmitting the next voucher in the voucher key. If the last voucher has been transmitted, the card proceeds to the next stage (block 639). Ο Figure 29 shows the actions taken by the host when the card is being authenticated. The host transmits a request for the next voucher in the voucher chain to the card, starting with a request for the first voucher to be transmitted (block 640). The host then verifies each received credential and if the verification fails, the program is aborted and the card is notified (block 642). If the verification is passed, then the host is privately checked to see if it has been received and the last certificate has been successfully verified (diamond 644). If the last credential has not been received and successfully verified, the host returns to block 640 to transmit a request for the next credential within the credential chain. If the last credential has been received and successfully verified, then after the credential verification, the host proceeds to the next stage (block 646). Voucher abolition When a voucher is issued, it is expected to be used throughout its validity period. However, various situations may result in a voucher becoming ineffective until the expiration of the validity period. Such circumstances include a change in the name of the subject change and the authority of the certificate authority (eg 'an employee termination relationship with an organization'), 122367.doc -74- 200820037 in such cases, the compromise or It is suspected that the corresponding private immigration authorization unit is in danger of abolishing the certificate. = The staggered application enables credential revocation in different ways, and each access control record can be configured for use in abolishing the remedy. An access control record can be configured to not support _discontinuation, and each-voucher is considered valid until it expires::. Alternatively, a voucher revocation list can be used. As another 方 为 ❹ = scheme can be specified for a particular application, or application:: abolish the value, and specify the abolishment of the three abolition schemes = an access control record is established as With the abolition scheme, for ^: = a can be activated by the access control record owner can be -. The abolition of the memory device credentials is enforced by the host: 'And: is enforced by the secure storage application security system; :::: The child control record owner is responsible for managing the waste records of a host root certificate. Implemented with credentials. Special Access 凭证 Credential Revocation List (CRL) Week: = The application system makes the &quot;Stop scheme, which involves the non-vouching vouchers of the signed data structure - the certificate authority. A voucher revocation list is a time-stamped list, and the pot identification is issued by the voucher authorized unit (issuing the abolished voucher signed by the m-smart unit m of the voucher in question, and implemented as a public second: using each abolition certificate It is identified by its voucher serial number in the list of voucher abolitions 122367.doc -75- 200820037. The size of the voucher revocation list is arbitrary and depends on the number of expired unexpired voucher. When the voucher (for example, to verify the identity of a host), the device not only checks the voucher signature (and validity), but also verifies the voucher against the serial number list received through a voucher revocation list. If the identification of the serial number of a voucher is found on the voucher revocation list issued by the voucher authority, the system indicates that the voucher has been revoked and is no longer valid. The voucher revocation list will also need to be verified as authentic. For the purpose of confirming the voucher. The voucher revocation list is the private use of the voucher authority that issued the voucher revocation list. The key is signed and can be verified as authentic by decrypting the signed voucher revocation list using the voucher authority's public key. If the decrypted voucher revocation list matches the unsigned voucher revocation list Abstract, this means that the voucher revocation list has not been tampered with and is true. The voucher revocation list is usually hashed using a hash algorithm to obtain a summary thereof, and the abstracts are authorized by the voucher. The unit's private key is encrypted. In order to verify whether a voucher revocation list is valid, the signed voucher revocation list (ie, the hashed and encrypted voucher revocation list) is the public key used to authorize the voucher Declassified to obtain a decrypted and hashed voucher revocation list (ie, a summary of the voucher revocation list). It is then compared to the hashed voucher revocation list. Therefore, the verification process can often involve The step of hashing the voucher revocation list for comparison with the decrypted and hashed voucher revocation list. One of the characteristics of the voucher revocation list scheme is that the confirmation of the voucher (for the document revocation list of 122367.doc -76-200820037) can be implemented separately from obtaining the revocation list of the voucher. The voucher revocation list is also issued by the appropriate voucher. The signature is signed, and in the manner described above, the voucher revocation list is verified in a similar manner to voucher verification using the public key of the voucher authority that issued the voucher revocation list. The memory device verifies the signature system The issuer of the voucher revocation list and the issuer of the voucher revocation list matches the issuer of the voucher. Another feature of the voucher revocation list scheme is that the voucher revocation list can be distributed by means of exactly the same as the voucher itself, ie Through an untrusted server and untrusted communication, the certificate revocation list and its characteristics are detailed in the X.509 standard. Secure Storage Application Infrastructure for Credential Revocation List The Secure Storage application uses this voucher to abolish the inventory scheme to provide an infrastructure for host abolition. When the RSA-based access control record is authenticated by the voucher revocation list revocation scheme, the host system will be used as one of the additional fields to revoke the list (if the issuer certificate authority does not revoke any voucher, it may be An empty voucher revocation list is added to a set of voucher commands. This field will contain a list of vouchers that are signed by the issuer of the voucher. When this field is present, the memory device 10 first verifies the credentials within the set of credentials commands. Obtaining and accessing the voucher revocation list repository is entirely the responsibility of the host. The voucher revocation list is issued during the period in which it is valid (Certificate Revocation List Expiration Period (CET). During the verification period, if the current time is found to be out of the time period, the voucher revocation list is considered to have Defective, and can not be used for credential verification. Then, the result is that the credential's identification loss is 122367.doc -77- 200820037. In the traditional credential verification method, the authentication or verification entity is expected to hold the credential Abolish the list or be able to retrieve the voucher revocation list from the voucher authority to compare the (4) list to check the serial number of the voucher submitted for verification to determine whether the submitted voucher has been revoked. In the authentication or verification system - memory In the case of a county, the memory device may not have been used by itself to obtain a voucher revocation list from the certificate authority. If a voucher revocation list is pre-stored in the device, such a list may become expired. The voucher that was revoked after the installation date will not appear on the list. This will enable the user to access the revocation certificate. This is not desirable. In one embodiment, the above problem can be solved by a system in which an entity that wants to be authenticated submits a voucher revocation list along with the voucher to be authenticated. The authenticating entity may be a memory device 1. The authenticating entity then verifies the authenticity of the received voucher and the voucher revocation list. The authenticating entity checks whether the voucher is identified (such as the credential) The serial number appears on the voucher revocation list, and it is checked whether the voucher is on the voucher revocation list. In view of the above, an asymmetric authentication scheme can be used between a host display and a mnemonic Mutual authentication between devices 1 . The host device that is to be authenticated for the ticker and device 10 will need to provide its credential chain and corresponding vouchers list. On the other hand, the host device is already Used to connect to the voucher authorization early to obtain a voucher revocation list so that when the memory device 10 is to be authenticated by the host device, the memory device does not need to be 122367.doc -78- 200820037 The voucher revocation list is submitted to the host device along with its voucher or voucher chain. In recent years, Cui has an expanded number of different types of portable devices that can be used to play inside, such as different built-in or independent music playback. Machine 'claws...players, incitement phones, personal digital assistants, and notebook computers. Although it is possible to connect such devices to the global network (www) to store the voucher verification list from a voucher authority, typically many The user does not go to the web every day = instead of just getting new content or updating the subscription (such as every few weeks) to connect to the Web. Therefore, for such users, the credentials must be abolished more frequently from the certificate authority. The list may be a whisker. For such users, the voucher revocation list may be stored in a better area of the storage device itself and may also be submitted to a storage shelf for storage. Take the host certificate of the protected content. Among many types of storage devices (e.g., flash memory), the unprotected areas of the storage devices are managed by the host device rather than being managed by the storage devices themselves. In this way, it is not necessary for the user (to the host device) to be connected to the network to obtain more up-to-date voucher revocation lists. 2 host t can only retrieve such information from the unsecured area of the storage device 'and then turn and submit such credentials and list to the storage or memory device' to access the protected content in the storage device . Since the voucher used to access the protected content and its corresponding voucher revocation list are typically valid for a certain period of time, the user will not need to obtain the latest voucher or voucher revocation list as long as the system is still valid. . The above feature enables the user to have access to the voucher and the voucher revocation list when the voucher and the voucher revocation list are both valid, and does not need to be connected to 122367.doc -79- 200820037 Authorized unit for updated information. The above procedure is shown in the flowcharts of Figs. As shown in Figure 30, the host 24 reads from the unsecure open area of the memory device 10 a voucher list for the one of the voucher that the host will submit to the memory device for identification (block 652). Since the voucher revocation list is stored in an unsafe area of the memory, no authentication is required until the voucher revocation list can be obtained by the host. Since the voucher revocation list is stored in the public area of the memory device, the reading of the voucher revocation list is controlled by the host device 24. Next, the host transmits a voucher revocation list along with the voucher to be verified to the memory device (block 654) and proceeds to the next stage unless it receives a failure notification from the memory device 1 (block 656). Referring to Figure 31, the memory device receives a voucher revocation list and credentials from the host (block 658) and checks if the voucher number is on the voucher revocation list (block 66), and other aspects (a) Whether the voucher revocation list has expired). If the serial number of the voucher is found on the voucher revocation list or fails for other reasons, the memory device transmits a failure notification to the host (block 662). The host that is different in this way can obtain the heart stored in the public area of the memory device and also revoke the π list, because the same certificate revocation list can be used for the clock recognition of the host. As described above, for the convenience of the user, the certificate that is verified by using the heart and also the abolished q is preferably stored in an unsafe area of the memory device 10 together with the voucher. However, the Ή certificate can be used for the authentication of the memory device by the host that is issued only by the vouchers. 122367.doc 200820037 In the case where the voucher revocation list is included in the field for the next update time, as shown in Figure 32, the secure storage application system in device 1 is also checked against this time. The current time to see if the current time is after this time; if it is, then the recognition will also fail. Therefore, preferably, the secure storage application checks the time of the next update and the expiration date of the voucher revocation list against the current time (or the time received by the memory device 10 against the voucher revocation list).

如上文所述,假如該憑證廢止清單含有長經廢止憑證識 別清單,則處理(例如雜湊)及搜尋清單申是否有由該主機 提交=憑證的序號可能花卜段長時間,特別是在該處理 及搜尋係依序實施之情況下。因此,$了加速該程序,處 理及搜尋係可以同時被實施。再者,假如整個憑證廢止清 單在其被處理及搜尋之前需要被接收,則該程序係亦可以 為費時的。申請人係體認到:可藉由隨著該憑證廢止清單 之部分被接收時(迅速地)予以處理及搜尋而迅速執行該程 序,使得當該憑證廢止清單之最後—部分被接收時,該程 序係即將完成。 圖33及34係顯示上述廢止方案之特徵。於該鑑認實體 (例如,—諸如—記憶體卡之記憶體褒置)處,自想要被鐘 認之實體接收憑證及憑證廢止清單(方塊7〇2)。未經加密的 憑證廢止清單之部分被處理(例如雜湊)並且同時搜尋此等 部分中是否有所提交之憑證的識別(例如,序號)。該等經 處理的W如經雜凑的)憑證廢止清單部分被編譯成為一經 雜湊的完整憑證廢止清單,其係與該完整經解密及經雜凑 122367.doc -81- 200820037 的憑證廢止清單相比較,該完整經解密 ^ 工雜凑的憑證廢 止清單係由編譯自想要被鑑認之實體接 &quot; 1人心邊專部分的經 解密憑證廢止清單部分而形成。假如該 、 平又1糸私不該比較 中”、、匹配,則鑑認係失敗。該鑑認實體乂 θ…、曰刖的時間As described above, if the voucher revocation list contains a long-term revoked voucher identification list, then the processing (eg, hash) and the search list application are submitted by the host = the serial number of the voucher may take a long time, especially in the process. And the search system is implemented in sequence. Therefore, $ speeds up the process, and the processing and search systems can be implemented at the same time. Furthermore, if the entire voucher revocation list needs to be received before it is processed and searched, the program can also be time consuming. The applicant system recognizes that the procedure can be quickly executed by processing (searching) and searching as soon as the portion of the voucher revocation list is received, such that when the last part of the voucher revocation list is received, the The program is about to be completed. Figures 33 and 34 show the features of the abolition scheme described above. At the authentication entity (e.g., - such as a memory card memory device), the voucher and voucher revocation list is received from the entity that is desired to be queried (block 7〇2). The portion of the unencrypted voucher revocation list is processed (e.g., hashed) and the identification of the voucher (e.g., serial number) in the submitted portion is also searched for. The processed W as a hashed voucher revocation list portion is compiled into a hashed complete voucher revocation list that is associated with the complete decrypted and hashed 122367.doc -81-200820037 voucher revocation list. In comparison, the complete decrypted voucher revocation list is formed by the decrypted voucher list that is compiled from the entity to be authenticated. If the flat, the 1st and the private are not to compare "," and match, the authentication system fails. The time of the authentication entity 乂 θ..., 曰刖

來檢查下一更新的時間以及憑證廢止清單到期時期(方塊 ,谓)。假如於該憑證廢止清單上找到所提交的憑證 之識別,或者假如目前的時間係不在該憑證廢止清單_ 時期之内’或者假如已超過下一更新憑證廢止清單之時間 (方塊71〇),則鑑認亦失敗。於一些實施方式中,儲存用^二 編譯之該等經雜湊憑證廢止清單部分及該等級解密雜凑憑 證廢止清單部分可不需要大量的記憶體空間。 當一實體(例如,該主機)想要被鑑認,其將傳送其憑證 及憑證廢止清單給該鑑認實體(方塊722),且進行至下一階 段(方塊724)。此係顯示於圖34。 假如該實體係提交一用於鑑認之憑證鏈,則可實施一類 似於上述之程序。於此事件中,將需要對於該憑證鏈内每 一憑證連同其對應的憑證廢止清單重複上述程序。每一憑 證及其憑證廢止清單係可隨著其被接收時予以處理,而不 需要等待接收該憑證鏈中之其餘憑證及其對應的憑證廢止 清單。 身份物件(IDO) 身份物件係一受保護物件,其係設計成允許諸如一快閃 e己fe體卡之該記憶體裝置1 〇儲存一 RSA密鑰對或其他類型 岔碼編譯ID。該身份物件包含任何類型密碼編譯m,其可 122367.doc -82- 200820037 Ο 被用於簽名及驗證身份、以及加密及解密資料。該身份物 件亦包含一來自一憑證授權單位的憑證(或者來自多個憑 證授權單位的一憑證鏈),以檢定該密鑰對内之公開密鑰 為真實的。該身份物件可被用於提供一外部實體或一内部 卡實體(亦即,該裝置本身、一内部應用程式等等,稱為 該身份物件之擁有者)之身份證明。因此,該卡非正在透 過一挑戰回應機制使用該RSA密鑰對或其他 —認該主機,以透«名提供給其之資料== =證明。換句話說,該身份物件係含有其擁有者的密碼 編澤ID。為了存取該身份物件内的密碼編譯ID,該主機將 首先而要破鑑認。如上文所述,該鑑認程序係受控於一存 取控制d錄。在該主機係已經被成功㈣之後,該身份物 件擁有者可使用該密碼編譯m來建置該擁有者對於另一當 事人之身份。舉例而言,該密碼編譯ID(例如,一公開-私 有密鑰對之私有密鑰)可被用於簽名由其他當事人透過該 主機提交之資料。該經簽名的f料及該身份 係代㈣身份物件之擁有者提交給其他當事人。由一二 技榷单位(亦即受信任的授權單位)檢定該憑證内之該 公開私有密鑰對之公開密鑰為真實的,使得其他當事人 I:任該公開密餘為真實的。接著,其他當事人可丄 =内,該公開密鑰來解密該經簽名的資料,且比較該經 的::貪料與由其他當事人所傳送之資料。假如該經解密 二匹配於由其他當事人所傳送之資料,則此係顯示該 4件之擁有者係真的具有存取該真實的私有密输之權 122367.d〇( -83 - 200820037 利’且因而其代表之實體係真實的。 X身伤物件之第二用途係使用該密碼編譯ID(諸如該 應密鑰本身)來保護指定給該身份物件之擁有者之資料。X 該資料係期望使用該身份物件公開密鑰而被加密。諸如— 記憶體卡之該記憶體裳置1〇將使用該私有密餘來解 料。 -亥身伤物件係-可對於任何類型存取控制記錄予以建立 之物件。於一項實施例中,一存取控制記錄可具有僅一個 :份物件。資料簽名及保護特徵兩者係該安全鍺存應用程 式糸統提供給任何能夠鑑認該存取控制記錄的實體之服 務。該身份物件之保護等級係與該存取控制記錄之登入梦 認方案一樣高。對於經繫結以具有_身份物件之一存取控 制記錄,可選擇任㈣認演算法。由建立者(主機)決定及 ㈣哪一演算法可最佳地保護該身份物件使用方式。一且 Ο 有:身份物件之存取㈣崎提供㈣證鏈,以回應於二 獲付该身份物件公開密鑰之命令。 當正在使用該身份物件以進行資料保護時 的經解密㈣料係^需要進 〃卞輸出 少的保濩。於此情況下, ==鼓勵使用一透過可用之鐘認演算法之任一者所 建置之安全通道。 當:立該身份物件時,選擇密矯長度以及pKc版 =二實施例中:開密鑰及私有密糾使用如 KCS#1 2.1版本定義之(指數,模數)表示。 於—項實施例中,於一身份物件建立期間所包含之資料 122367.doc -84- 200820037 係具有所選長度的RSA密鑰㈣及—憑證鏈,其係遞迴地 證明該公開密鑰之真實性。 擁有4身k物件之存取控制記錄將允許使用者資料的簽 名。此係透過兩個安全儲存應用程式命令而實施·· •設定使用者資料:提供—將被簽名之自由格式之資料緩 衝區。 •獲得安全儲存應用程式簽名:該卡將提供—rsa簽名 (使用該存取控制記錄私有密鑰)。取決於該物件之類 ,型,可根據pkCS#1 h5版本或版本來設定該簽名的 格式及大小。 使用一身份物件之操作係顯示於圖35_37,其中,該記 憶體裝置10係-快閃記憶體卡,且該卡係該身份物件之擁 有者圖3 5係顯示一由該卡簽名傳送給一主機之資料所實 轭之私序。參照圖35,在一主機被鑑認之後(方塊8〇2),如 由上述树狀結構之一節點處之一存取控制記錄所控制, 該卡係等待用於一憑證之一主機請求(菱形8〇4)。在接收該 請求之後,該卡傳送該憑證,且返回菱形8〇4,以用於下 一主機請求(方塊806)。假如需要傳送一憑證鏈以檢定由該 卡所擁有之該身份物件的公開密鑰,則重複上述動作,直 到該憑證鏈内所有憑證已經被傳送至該主機。在每一憑證 已經被傳送至該主機之後,該卡等待來自該主機之其他命 令(菱形808)。假如於一預設時期期間内未接收到來自該主 機的命令,則該卡返回菱形804。於接收來自該主機的資 料及一命令時,該卡檢查以看看是否該命令係用於簽名資 122367.doc -85 - 200820037 枓(菱形810)。假如該命令係用於 ..v ^ ^ ^ 、僉名貝科,則該卡係以該 身份物件内之該私有密鑰簽 A的眘料…八 且接著傳送該經簽 亥主機(方塊812)’且返回菱形_。假如來自 该主機的命令係非用於簽名來 曰A主機的資料,則該卡使To check the time of the next update and the expiration of the voucher revocation list (block, predicate). If the identification of the submitted voucher is found on the voucher revocation list, or if the current time is not within the voucher revocation list _ period or if the time of the next updated voucher revocation list has been exceeded (block 71〇), then The identification also failed. In some embodiments, storing the hashed voucher list portion and the level decrypting the voucher revocation list portion compiled with the second file may not require a large amount of memory space. When an entity (e.g., the host) wants to be authenticated, it will transmit its voucher and voucher revocation list to the authenticating entity (block 722) and proceed to the next stage (block 724). This is shown in Figure 34. If the real system submits a credential chain for authentication, a procedure similar to that described above can be implemented. In this event, the above procedure will need to be repeated for each voucher in the voucher chain along with its corresponding voucher revocation list. Each voucher and its voucher revocation list can be processed as it is received, without waiting to receive the remaining voucher in the voucher chain and its corresponding voucher revocation list. Identity Object (IDO) An identity object is a protected object that is designed to allow a memory device, such as a flash card, to store an RSA key pair or other type of weight compilation ID. The identity object contains any type of cryptographic compilation m that can be used to sign and verify identity, as well as encrypt and decrypt data. The identity object also contains a voucher from a voucher authority (or a voucher chain from multiple voucher authorities) to verify that the public key within the pair is authentic. The identity object can be used to provide identification of an external entity or an internal card entity (i.e., the device itself, an internal application, etc., referred to as the owner of the identity object). Therefore, the card is not using the RSA key pair or other - through the challenge response mechanism - to identify the host, to provide the information to its name == = proof. In other words, the identity object contains its owner's password code ID. In order to access the password compilation ID in the identity object, the host will first break the authentication. As described above, the authentication procedure is controlled by an access control d-record. After the host system has been successfully (4), the identity object owner can use the password to compile m to establish the identity of the owner for another party. For example, the cryptographic compilation ID (e.g., a public-private key pair private key) can be used to sign material submitted by other parties through the host. The signed f material and the owner of the identity (4) identity object are submitted to other parties. The public key of the public private key pair in the voucher is verified by the technical unit (i.e., the trusted authority) to make the other party I: the public secret is true. Then, the other party can 丄 = the public key to decrypt the signed data, and compare the:: greed with the information transmitted by other parties. If the decrypted two matches the information transmitted by other parties, then this shows that the owner of the four pieces really has the right to access the real private secret. 122367.d〇( -83 - 200820037 利利' And thus the representative system is true. The second use of the X-injury object uses the cryptographic ID (such as the key itself) to protect the information assigned to the owner of the identity object. X This information is expected Encrypted using the identity object public key. For example, the memory card's memory will be used to unpack the private secret. - The body object can be used for any type of access control record. An object is created. In one embodiment, an access control record can have only one: part of the object. Both the data signature and the protection feature are provided by the secure memory application system to any one that can authenticate the access control. The service of the recorded entity. The protection level of the identity object is as high as the login authentication scheme of the access control record. For the transaction control record with one of the _ identity objects, you can choose any (4) The recognition algorithm is determined by the creator (host) and (4) which algorithm can best protect the identity object usage. One is: access to the identity object (4) Saki provides (4) the chain, in response to the second The order to pay the public key of the identity object. When the identity object is being used for data protection, the decrypted (four) material system requires a small amount of output. In this case, == encourages the use of one through the available The secure channel established by any of the clock recognition algorithms. When: the identity object is selected, select the secret correction length and pKc version = two embodiments: open key and private secret correction use such as KCS#1 2.1 The definition (index, modulus) of the version definition. In the embodiment, the information contained in the identity object creation period 122367.doc -84- 200820037 is an RSA key (4) and a voucher chain with a selected length. It recursively proves the authenticity of the public key. The access control record with 4 objects will allow the user's data to be signed. This is implemented by two secure storage application commands. Information: For the free-form data buffer to be signed. • Secure storage application signature: The card will provide the -rsa signature (using the access control to record the private key). Depending on the object, type, The format and size of the signature are set according to the pkCS#1 h5 version or version. The operation of using an identity object is shown in Figure 35_37, where the memory device 10 is a flash memory card and the card is the identity The owner of the object Figure 5 shows the private order of the yoke of the data transmitted by the card signature to a host. Referring to Figure 35, after a host is authenticated (block 8〇2), as described above One of the nodes at the node is controlled by an access control record that is waiting for one of the credentials of a host request (diamond 8〇4). After receiving the request, the card transmits the voucher and returns to diamond 8〇4 for the next host request (block 806). If a voucher chain needs to be transmitted to verify the public key of the identity object owned by the card, the above action is repeated until all credentials in the voucher chain have been transferred to the host. After each voucher has been transferred to the host, the card waits for other commands from the host (diamond 808). If the command from the host is not received during a predetermined period of time, the card returns to diamond 804. Upon receiving the data from the host and a command, the card checks to see if the command is for signatures (diamond 810). If the command is for ..v ^ ^ ^, the name of the Becco, then the card is the caution of the private key sign A in the identity object... and then the signed host (block 812) ) 'and return diamond _. If the command from the host is not used to sign the data of the host, then the card makes

用该身份物件内之該私有密鑰, A ’ 繪以解费该接收到的資料 (方塊814),且返回菱形8〇4。 圖36顯示在該衫名之資料傳送給該主機時由該主機所 實施之程序。參照圖36,該主機傳送鑑認資訊給該卡(方 塊822)。在如上文之一樹狀結構之—節點處之一存取控制 記錄所控制之成功㈣之後’該主機傳送請求至該卡以用 於憑證鏈’且接收該憑證鏈(方塊824)β在已經驗證該卡之 該公開密鑰之後,該主機傳送資料給該卡以用於簽名且 接收藉由該卡之私有密鑰所簽名之資料(方塊82幻。With the private key in the identity object, A' is drawn to resolve the received data (block 814) and returns to diamond 8.4. Figure 36 shows the procedure implemented by the host when the name of the shirt is transferred to the host. Referring to Figure 36, the host transmits authentication information to the card (block 822). After the success (4) controlled by the access control record at one of the nodes of the tree structure as described above, 'the host transmits a request to the card for the voucher chain' and receives the voucher chain (block 824) β has been verified After the public key of the card, the host transmits the data to the card for signing and receiving the information signed by the private key of the card (block 82).

G 圖37係顯示當該主機使用該卡之公開密鑰解密資料且傳 送該經解密的資料至該卡時由該主機所實施之程序。參照 圖37,该主機傳送鑑認資訊給該卡(方塊862)。在成功實施 由存取控制δ己錄控制之鑑認之後,該主機傳送請求給該 卡,以要求憑證鏈(方塊864),該憑證鏈係驗證該身份物件 内該卡的公開密鑰所需的,且傳送請求至該卡,以要求資 料。在已驗證該身份物件内之該卡的該公開密鑰之後該 主機使用該卡之經驗證公開密鑰來加密來自該卡的資料, 且傳送其至該卡(方塊866,868)。 ‘ 查詢 主機及應用程式係需要持有關於其正一起工作以執行系 122367.doc -86- 200820037 主機及 用程式 不是公 權利。 主機可 統操作之記憶料置或卡的某些資訊。舉例而言, 應用程式可需要知道儲存於該記憶體卡上的哪些應 係可供則(inv_tiQn)。該主機所需之資訊有時候 開的知識’其係意謂並非每_實體係具有擁有它的 為了鑑別經授權與未經授權之使用者,需要提供一 使用之兩種問方法。 一般資訊查詢 此查詢公佈系統公開資訊,而無限制。儲存於該等記情 體裝置内之機密資訊包含兩個部分:一共用部分及一非共 用口P刀It機在資訊的一部分包含可以對於個別實體為專 屬的貧訊,使得每一實體應被允許僅存取其自己的專屬資 訊,而不能夠存取其他實體的專屬機密資訊。此種機密資 訊類型係不被共用,且形成該機密資訊的未共用部分。'G Figure 37 shows the procedure implemented by the host when the host decrypts the material using the card's public key and transmits the decrypted material to the card. Referring to Figure 37, the host transmits authentication information to the card (block 862). After successful implementation of the authentication by the access control δ record control, the host transmits a request to the card to request a credential chain (block 864) that is required to verify the public key of the card within the identity object. And send a request to the card to request information. After the public key of the card in the identity object has been verified, the host encrypts the material from the card using the verified public key of the card and transmits it to the card (blocks 866, 868). ‘ Query host and application systems need to hold the system and applications that are working together to implement the system. The host and application are not public rights. Some information about the memory device or the card that the host can operate. For example, an application may need to know which of the dependencies stored on the memory card are available (inv_tiQn). The information required by the host is sometimes open to the knowledge that it does not have to have it. In order to authenticate authorized and unauthorized users, there is a need to provide a method of use. General Information Enquiry This inquiry discloses system public information without restriction. The confidential information stored in the ticker device comprises two parts: a shared part and a non-shared port P-tool. The part of the information contains a partial message that can be exclusive to the individual entity, so that each entity should be Allows access to only its own proprietary information, as well as access to proprietary confidential information from other entities. Such confidential information types are not shared and form an unshared portion of the confidential information. '

通常被想成公開的某些資訊於某些情況下係可能被認為 機猎的,諸如駐留於該卡内的應用程式之名稱及其生命週 期狀態。此之另一範例可係根存取控制記錄名稱,其被認 為公開的’然而對於某些安全儲存應用程式使用情況而言 可以係機密的。對於這些情況而言,該系統應回應於一般 資訊查詢而提供一選項’保持此資訊僅能由所有經鑑認的 使用者使用’然而係不能被未經鑑認的使用者使用。此類 資訊構成該機密資訊的共用部分。該機密資訊的共用部分 的一範例可包含一根存取控制記錄清單,即目前出現於該 裝置上的所有根存取控制記錄的清單。 透過該一般資訊查詢來存取公開資訊係不需要該主機/ 122367.doc -87- 200820037 使用者登入一存取控制記錄。因此,具有安全儲存應用程 式標準知識之任何實體可執行及接收該資訊。就安全儲存 應用程式而論,此查詢命令係在無一會期號碼之下被處 置。然而,假如期望由一實體存取該機密資訊的共用部 分,則需要首先透過控制存取該記憶體裝置内的資料之任 何控制結構(例如,任一存取控制記錄)來鑑認該實體。在 成功鑑認之後,該實體將能夠透過一般資訊查詢而存取 忒機密貧訊的該共用部分。如上文所說明,該鑑認程序將 導致用於存取之一安全儲存應用程式會期號碼或者ID。 謹慎資訊查詢 關於個別存取控制記錄及其系統存取及資產的私有資訊 係被認為謹慎的,且需要明確鑑認。因此,此種查詢要求 在接收用於資訊查詢的授權之前,進行存取控制記錄登入 及鑑認(假如鑑認係由該存取控制記錄所指定)。此項查詢 係需要一安全儲存應用程式會期號碼。 在洋細敘述兩種類型查詢之前,首先敘述索引群組作為 一用於實施該等查詢之實務解決方案之觀念係將為有用 的。 索引群組 執行於可能的安全儲存應用程式主機上之應用程式係被 該主機上的作業系統及系統驅動程式要求指定意欲被讀取 之區段數。接著,此係意謂該主機應用程式需要知道對於 每一安全儲存應用程式讀取操作而言,需要讀取多少個區 段0 122367.doc -88- 200820037 因為查詢操作的本質旨名 古通當Γ 請求f訊的實體而 二㈣省A °、的貧訊’所以對於該主機應用程式而言, 發佈该查詢且猜測該操作所需之區段數係有困難的。 Ο Ο 僅,:解::問74 ’该安全儲存應用程式查詢輸出緩衝區 邱t3母――詢請求—區段(512位元組)。為輸出資訊的-^ 刀之物件係組織於稱為索引群組之中。每—類型物件可 具有一不同的位元組大小,其係考慮到可以適配於一單一 區段之物件數。此定義該物件之索引群組。假如一物件具 有7個位几組的大小,則用於該物件之索引群組將含有 =2:個物件。假如總共有56個此類物件,則其將已經被 ^、、3個索引群組,其中,物件τ(第_物件)起始第一 索引群組,物件”25,’起始第一 + d4 〇 , 《一索引群組且物件,,5〇”起始第 二且為最後索引群組。 系統查詢(一般資訊查詢) 此查詢提供關於該裳置内之該支援安全儲存應用程式系 =被設定之目前的系統之-般公開資訊,像是執行於該 裝置上之不同的樹及靡用劣5 , 何汉應用転式。類似於下文所述之存取控 制記錄查詢(謹慎杳% \ 4 n + M 旬),该糸統查詢經結構化以給予數個 查詢選項: •一般的-安全儲存應用程式支援版本。 •安全儲存應用程式-目前ψ 八目别出現於該裝置上之所有安全 存應用程式之應用程式清單,包含其之執行狀態。 上述列出的資訊係公開資訊。如同該存取控制記錄杳 為’為了使主機不需要知道對於該查詢輸出緩衝區待讀取 122367.doc •89- 200820037 夕;個ΐϋ又’將有一自該裝置傳回的區段,同時 主機能夠進—步查詢額外的索引群組。因&amp;,假如财子取 控制記錄物件之數量超過用於索引群組T之輸出緩衝區 大小的數量’則該主機可以接下來的索引群組&quot;i&quot;傳送另 一查詢請求。 存取控制記錄查詢(謹慎資訊查詢)Some of the information that is often thought of as public may in some cases be considered hunted, such as the name of the application residing on the card and its life cycle state. Another example of this is to root the access control record name, which is considered publicly 'although it can be confidential for some secure storage application usage. For these cases, the system should provide an option in response to a general information query 'keep this information available only to all authenticated users', however it cannot be used by unidentified users. Such information constitutes a common part of the confidential information. An example of a shared portion of the confidential information may include a list of access control records, i.e., a list of all root access control records currently present on the device. Access to the public information through the general information query does not require the host/122367.doc -87- 200820037 user to log in to an access control record. Therefore, any entity with knowledge of secure storage application standards can execute and receive this information. In the case of a secure storage application, this query command is placed under a no-session number. However, if it is desired to have access to the shared portion of the confidential information by an entity, then the entity must first be authenticated by any control structure (e.g., any access control record) that controls access to the data within the memory device. After successful identification, the entity will be able to access the shared portion of the confidential information through general information enquiries. As explained above, the authentication procedure will result in accessing one of the secure storage application session numbers or IDs. Cautious Information Enquiries Private information about individual access control records and their system access and assets is considered prudent and requires explicit identification. Therefore, such a query requires access control record entry and authentication (if the authentication is specified by the access control record) before receiving the authorization for the information inquiry. This query requires a secure storage application session number. Before describing two types of queries in detail, it would be useful to first describe the concept of index groups as a practical solution for implementing such queries. Index Group The application executed on the possible secure storage application host is specified by the operating system and system driver requirements on the host. Then, this means that the host application needs to know how many segments to read for each secure storage application read operation. 122367.doc -88- 200820037 Because the nature of the query operation is called Gutongdang Γ The entity requesting the message and the second (four) province A °, the poor news 'so for the host application, it is difficult to publish the query and guess the number of segments required for the operation. Ο Ο Only, : Solution:: Ask 74 ’ The secure storage application query output buffer Qiu t3 mother - request request - section (512 octets). The object of the -^ knife for outputting information is organized into an index group. Each type of object can have a different byte size, taking into account the number of objects that can be adapted to a single segment. This defines the index group for this object. If an object has a size of 7 bits, the index group for that object will contain = 2: objects. If there are 56 such objects in total, then they will have been indexed by ^, 3, where object τ (the first object) starts the first index group, object "25, 'starts the first + D4 〇, “An index group and object, 5〇” starts with the second and is the last index group. System Enquiry (General Information Enquiry) This inquiry provides general information about the current secure system of the supported secure storage application system in the slot, such as the different trees and applications implemented on the device. Inferior 5, He Han application style. Similar to the access control record query described below (Cautious 杳% \ 4 n + M), the wiki query is structured to give several query options: • General - Secure Storage Application Support Version. • Secure Storage Application - The current list of applications for all secure applications on the device, including their execution status. The information listed above is public information. As the access control record is 'in order for the host to not need to know the output buffer for the query to be read 122367.doc •89- 200820037 eve; the ΐϋ ΐϋ 'will have a segment returned from the device, while the host Ability to step through additional index groups. Because &amp;, if the number of control record objects exceeds the number of output buffer sizes used to index group T' then the host can send another query request to the next index group &quot;i&quot;. Access control record query (careful information query)

該安全儲存應用程式存取控制記錄查詢命令意欲供應該 存取控制記錄使用者關於該存取控制記錄之系統資源的資 訊,像是密鑰及應用程式10,分割區及子代存取控制記 錄。該查詢資訊係僅關於登入存取控制記錄且非關於該系 統樹上之其他存取控制記錄。換句話說,存取係限於僅僅 在牵涉到的存取控制記錄之權限τ可存取的機密資訊的部 分。 使用者可查詢下列三個不同的存取控制記錄物件: •分割區-名稱及存取權(擁有者,讀取,寫入)。 •密鑰ID及應用程式ID-名稱及存取權(擁有者,讀取,寫 •子代存取控制記錄-一直接子代存取控制記錄的存取控 制記錄及存取控制記錄群組名稱。 •身份物件及安全資料物件(下文敘述)_名稱及存取權(擁 有者,讀取,寫入)。 因為與一存取控制記錄連接之物件數量係可以改變,且 該資訊係可能超過512個位元組(一區段)。在未事先知道物 件數量之下,該使用者無法知道需要自該襞置内之該安全 122367.doc -90- 200820037 儲存應用ι式系統讀取多少個區&amp;,以獲得全部的清單。 因此,由該安全儲存應用程式系統所提供之每一物件清單 係被分割成為若干索引群組,其係類似於上述系統查詢之 情況。一索引群組係適配於一區段的物件數量,亦即可自 該裝置内之安全儲存應用程式系統於一區段内傳送多少個 物件至該主機。此使該裝置内之該安全儲存應用程式系統 傳运一被請求的索引群組之一區段。該主機/使用者將接 收該等被查詢物件之一緩衝區,該緩衝區内之物件數量。 假如該緩衝區係滿的,則該使用者可查詢下一物件索引群 組。 圖38顯示一牵涉到一般資訊查詢之操作的流程圖。參照 圖38,當該安全儲存應用程式系統接收來自一實體的一般 資訊查詢(方塊902)時,該系統決定是否該實體已經被鑑認 (菱形904)。假如該實體已經被鑑認,則該系統向該實體供 應公開資訊及該機密資訊之共用部分(方塊906)。假如其該 實體尚未被鑑認,則該系統向該實體供應僅公開資訊(方 塊908)。 圖39顯示一牵涉到一謹慎資訊查詢之操作的流程圖。參 照圖39,當該安全儲存應用程式系統係接收來自一實體的 一謹慎資訊查詢(方塊922)時,該系統決定是否該實體已經 被鑑認(菱形924)。假如該實體已經被鑑認,則該系統向該 實體供應機密資訊(方塊926)。假如該實體尚未被鑑認,則 該系統係拒絕該實體存取機密資訊(方塊928)。 特徵組延伸(FSE) 122367.doc •91 - 200820037 吹許夕h况下’於該卡上執行該安全儲存應用程式内的 貝;斗地里活動(例如,drm使用權物件確認)係非常有利 的相對於所有資料處理工作係於該主機上執行之替代解 決方案,該所得系統係將為更安全的,更有效率的,且較 不依賴於主機。 /亥女王儲存應用程式安全性系統包含一組鑑認演算法及The secure storage application access control record query command is intended to provide information about the system resources of the access control record user regarding the access control record, such as the key and application 10, the partition and the child access control record. . The query information is only about the login access control record and not about other access control records on the system tree. In other words, the access is limited to the portion of the confidential information that is accessible only to the rights τ of the access control record involved. The user can query the following three different access control record objects: • Partition - Name and access rights (owner, read, write). • Key ID and Application ID - Name and Access Rights (Owner, Read, Write • Child Access Control Record - A Direct Child Access Control Record Access Control Record and Access Control Record Group Name. • Identity and security data objects (described below) _ name and access rights (owner, read, write). Because the number of objects connected to an access control record can be changed, and the information may be More than 512 bytes (one segment). Without knowing the number of objects in advance, the user cannot know the security that needs to be read from the device. 122367.doc -90- 200820037 How much does the storage application system read? The area &amp; to get the full list. Therefore, each item list provided by the secure storage application system is divided into several index groups, which are similar to the above system query. An index group The number of items that are adapted to a segment, that is, how many items are transferred to the host from a secure storage application system within the device to the host. This enables the secure storage in the device. The program system transports a segment of the requested index group. The host/user will receive a buffer of the object being queried, the number of objects in the buffer. If the buffer is full, The user can then query the next object index group. Figure 38 shows a flow diagram of an operation involving a general information query. Referring to Figure 38, the secure storage application system receives a general information query from an entity (block 902). When the system determines whether the entity has been authenticated (diamond 904). If the entity has been authenticated, the system supplies the entity with the public information and the shared portion of the confidential information (block 906). If the entity has not been authenticated, then the system supplies the entity with only public information (block 908). Figure 39 shows a flow diagram of an operation involving a cautious information query. Referring to Figure 39, when the secure storage application system receives When a cautious information query from an entity (block 922), the system determines if the entity has been authenticated (diamond 924). If the entity has been authenticated, then The system supplies the entity with confidential information (block 926). If the entity has not been authenticated, the system denies the entity access to the confidential information (block 928). Feature Group Extension (FSE) 122367.doc •91 - 200820037 In the case of Xu Xi, the implementation of the secure storage application on the card; the activities in the battlefield (for example, the identification of the right to use the drm) are very advantageous for all data processing operations performed on the host. Alternative solutions, the resulting system will be more secure, more efficient, and less dependent on the host. /Hai Queen Storage Application Security System includes a set of recognition algorithms and

^八係叹什成控制存取及使用由該記憶體卡所儲 存&amp;理及保遵的物件之集合。一旦一主機獲得存取權, 該主機將接著處理儲存於該記憶體裝置内之資料,其中, 存取《亥。己L體表置係受控於該安全儲存應用程式。狹而, 假設該資料本質係非常應用程式特定的,且因此,該資料 格式及資料處理係皆非定義於該安全儲存應用程式之中, 該安全儲存心程式不處理館存於該等裝置上的資料。 本發明之—項實施例係根據下列認知:該安全储存應用 程式系統可被增強,以允許主機執行通常由該記憶體卡内 之主機所實施之-些功能。因此,該等主機之一些軟體應 用知式可被分割成為兩個部分:仍然由該主機實施之一部 以及現在由該卡實施之另—部分。對於許多應用程 式’此增強貧料處理的安全性及效率。為了此目的,可加 入-稱為特徵組延伸之機制,以增強該安全儲存應用程式 之能力。在本文中,由該卡以此方式所執行之特徵組延伸 内的主機應用程式亦稱為内部應用程式,或裝置内部應用 程式。 μ 種延伸基本安全 該增強的安全儲存應用程式系統提供一 122367.doc -92- 200820037 儲存應用程式命令組的機制,其係透過導入卡應用程式而 提供该卡之鑑認及存取控制。^應用程式被假設為亦實 加除了該安全儲存應用程式之服務以外的服務(例如, DRM機制,電子商務交易)。該安全儲存應用程式特徵組 延伸係一種設計成增強具有資料處理軟體/硬體模組之標 準安全儲存應用程式安全性系統的機制,其可以係專屬 的。除了能夠使用上述查詢獲得的資訊之外,由該安全儲 存應用程式特徵組延伸系統所定義之服務使主機裝置能夠 查詢該卡,以用於可用之應用程式,選擇及與一特定應用 程式通訊。上述之一般查詢及謹慎查詢係可以使用於此目 的0 使用兩種延伸卡之安全儲存應用程式特徵組延伸内特徵 組之方法: •提供服務-實現此特徵之方式為,透過允許經授權實體 C) 使用-稱為通訊管道(pipe)之命令通道直接與該内部應 用程式通訊,該通訊管道可以係專屬的。 •安全儲存應用程式標準存取控制原則的延伸-實現此特 徵之方^為透過使内部的受保護資料物件(例如,内容 =密密餘、下文敘述之安全資料物件(SD〇))相關聯於内 部卡應用程式。每當此類物件被存取時,假如滿足所定 義準!!安全儲存應用程式原則,則調用相關聯的應 用广式’糟此除了利用該等標準的安全儲存 :::的!利用至少-條件。較佳地,該條件將不 #的女全儲存應用程式原則衝突。只有亦滿足在此 122367.doc -93 - 200820037 額外的條件之情況下,才授予存取。在進—步詳細說明 &quot;亥特彳政組延伸之能力之前,現在將說明特徵組延伸以及 該通訊管道及與全資料物件之架構態樣。 安全服務模組(SSM)及相關模組 圖40A係一記憶體裝置1〇(諸如一快閃記憶體卡)連接至 一主機裝置24的系統架構1000之功能方塊圖,以闡釋本發 明之一項實施例。該卡20之該記憶體裝置内的軟體模組之 主要組件如下: 安全儲存應用程式傳輸層1〇〇2 該安全儲存應用程式傳輸層係卡協定相依的。其處置該 卡1〇之該協定層上之主機端安全儲存應用程式請求(命 令),且接著將其中繼至安全服務模組Αρι。所有主機·卡 同步化及安全儲存應用程式命令識別係於此模組内實施。 该傳輸層亦係負責主機24與卡1〇之間所有資料傳送。 安全服務模組核心1 〇〇4 此模組係該安全儲存應用程式實施方案之一重要的部 分。該安全服務模組核心實施該安全儲存應用程式架構。 更明確δ之,該安全服務模組核心實施該安全儲存應用程 式樹及存取控制記錄系統以及組成該系統之所有上述對應 規則。該安全服務模組核心模組使用一密碼編譯庫1〇12, 以支援該安全儲存應用程式安全性及密碼編譯特徵,諸如 加密、解密及雜湊。 安全服務模組核心API 1006 此係主機及内部應用程式將介接於該安全服務模組核心 122367.doc -94- 200820037 以實行安全儲存應用程式操作之層。如示於圖4〇A,主機 24及裝置内部應用程式1〇1〇將使用相同的Αρι。 安全性應用程式管理員模組(SAMM) 1008 安全性應用程式管理員模組非屬該安全儲存應用程式系 統之部分,然而其係控制介接於該安全儲存應用程式系統 之裝置内部應用程式之卡内的一重要的模組。 該安全性應用程式管理員模組管理所有裝置内部執行中 之應用程式’其包含: 1 ·應用程式生命週期監視及控制。 2 ·應用程式初始化。 3·應用程式/主機/安全服務模組介面。 裝置内部應用程式1010 裝置内部應用程式係經准許於該卡端上執行之應用程 式。彼等裝置内部應用程式係被安全性應用程式管理員模 組所管理,且係可存取該安全儲存應用程式系統。該安全 {) 服務模組核心亦提供該等主機端應用程式與該等内部應用 程式之間之一通訊管道。用於此類内部執行應用程式之範 例係DRM應用程式及單次密碼(〇ne time passw扣d ; 〇τρ) 應用程式,如下文作進一步說明。 裝置管理系統(DMS)lOl 1 此模組含有在一後裝運(通常稱為後發佈)模式中更新該 卡之系統及應用程式韌體以及增加/移除服務所需之處理 程序及協定。 圖40B係該安全服務模組核心1〇〇4之内部軟體模組之功 122367.doc -95 - 200820037 能方塊圖。如示於圖40B,核心1〇〇4包含一安全儲存應用 程式命令處理常式(command handler)1〇22。處理常式1〇22 係於命令被傳送至該安全儲存應用程式管理員1〇24之前, 剖析起源於該主機或起源於該裝置内部應用程式1〇1〇的該 等安全儲存應用程式命令。所有安全儲存應用程式安全性 資料結構(諸如存取控制記錄群組及存取控制記錄)以及所 有安全儲存應用程式規則及原則係儲存於該安全儲存應用 私式貪料庫1026之中。安全儲存應用程式管理員1〇24實行 由該等存取控制記錄及存取控制記錄群組以及儲存於資料 庫1026内之其他控制結構所行使之控制。其他物件(諸如 身份物件)以及安全資料物件亦係儲存於該安全儲存應用 程式資料庫1026之中。安全儲存應用程式管理員1〇24實行 由該等存取控制記錄及存取控制記錄群組以及儲存於資料 庫10 2 6内之其他控制結構所行使之控制。由該安全儲存應 用程式非安全操作模組1028處置不牽涉到安全儲存應用程 式之非安全操作。由該安全儲存應用程式安全操作模組 1030處置在該安全儲存應用程式架構下的安全操作。模組 1032係一連接模組1030至該密碼編譯庫1〇12之介面。模組 1034係一連接模組1026及1028至圖1中該快閃記憶體“之 層。 通訊(或傳遞(Pass-Through))管道 當由該安全服務模組核心及安全性應用程式管理員模組 控制時,該等傳遞管道物件使經授權主機端之實體能夠與 該等内部應用程式通訊。介於該主機與該内部應用程式之 122367.doc -96- 200820037 間/之資㈣送係透過send及RECEIVE命令(定義如下)而 實行。實際的命令係應隸式特定的。建立該管道之該實 體(存取控制記錄)將需要提供該管道名稱及將開啟—通道 至其之應用程式的ID。如同具有所有其他受保護物件,該 存取控制記錄係變成其擁有者,且被允許根據標準的委2 2則及限制而委派使用權利以及擁有權給其他存取控制記 假如在被鑑認實體之存取控制記錄屬性管理中設定 CREATE_PIPE權限,則—該被鐘認實體將被允許建立管 料件。只有於該實社權限㈣崎巾歧在寫入或讀 取官道權限之情況下,才允許與内部應用程式之通訊。只 2該實體係該管道擁有者或於該實體之權限控制記錄中 設定委派存取權之情況下,才允許擁有權及存取權委派。 :同所有其他權限’當委派擁有權給另一存取控制記錄 時’較佳地’剝除該原始擁有者對於該裝置應用程式之 有權限。 較佳地,對於-特定應用程式,建立僅—通訊管道。較 仏地’建立—第二管道及連接該第二管道至—已經連接之 應用耘式之鲁試將被該安全服務模組系統10㈧所拒絕。因 此’較佳地’介於該等裝置内部應用程式1010之一者與一 通訊管道之間係有ml之關係。’然而,多個存取控制記錄 可與一裝置内部應用程式通訊(透過委派機制)。一單一存 取控制記錄可與數個裝置應m通訊(透過連接至不同 應用程式之多個管道之委派或擁有權)。較佳地,控制不 122367.doc •97- 200820037 同的管道之存取控制記錄係位於6 π π全分離的樹之節點上, 使得該等通訊管道之間係無串擾。 介於該主機與一特定應用程式之間傳送資料係使用下列 命令而實行: • WRITE PASS THR〇UGH(寫入值、疮、 (馬入傳遞)-將自該主機傳送一 未格式化的資料緩衝區至該桊 必展置内部應用程式。 • READPASSTH卿GH(讀取傳遞)_將自該域傳送一未 ί Ο 格式化的資料緩衝區至該裝置内部應用程式,且一旦該 内部處理係完成,將輸出一夫 禾彳。式化的資料緩衝區回到 該主機。 寫入傳遞命令及讀取傳遞命令 P 故供主機想要通訊之裝置 内部應用程式1008之ID作為參數。兮音触y 及實體榷限將被確認, 且假如該請求實體(亦即,主控該實體正在使用之會期之 存取控制記錄)具有使用連接至該被請求應用程式之管道 的權限’則該資料緩衝區將被中斷,且命令被執行。 此通訊方法係允許該主機應用程式透過該安全健存應用 程式存取控制記錄會期通道傳送廠商/專屬的特定命令至 一裝置内部應用程式。 安全資料物件(SDO) 一能夠結合特徵組延伸而被使 饭1之用之有用的物件係安全資 料物件。 ' 該安全資料物件係作為—用 女儲存敏感資訊的一般 用途谷器。類似於内容加密密 ^ ^ Q 干其係由一存取控制 纪錄擁有,且可於存取控制 郑之間委派存取權及擁有 122367.doc -98- 200820037 權。安全資料物件含有根據預先定義的原則限制而被保護 及使用之資料,且可選擇地,具有至一裝置内部應用程式^Basic Singcheng controls access and use of the collection of objects stored and used by the memory card. Once a host gains access, the host will then process the data stored in the memory device, where access is made. The L-body is controlled by the secure storage application. Narrowly, it is assumed that the material is very application-specific and, therefore, the data format and data processing system are not defined in the secure storage application. The secure storage program does not process the library on the device. data of. The present invention is based on the recognition that the secure storage application system can be enhanced to allow the host to perform functions that are typically performed by hosts within the memory card. Therefore, some of the software application knowers of these hosts can be split into two parts: one that is still implemented by the host and another part that is now implemented by the card. For many applications, this enhances the safety and efficiency of lean processing. For this purpose, a mechanism called feature set extension can be added to enhance the capabilities of the secure storage application. In this document, the host application within the feature set extension performed by the card in this manner is also referred to as an internal application or an internal application. μ Extended Basic Security The enhanced Secure Storage Application System provides a mechanism for storing application command groups, which provides authentication and access control for the card through the import of the card application. ^ The application is assumed to be a service other than the service of the secure storage application (for example, DRM mechanism, e-commerce transaction). The Secure Storage Application Feature Group extension is a mechanism designed to enhance the standard secure storage application security system with data processing software/hardware modules, which can be proprietary. In addition to the information that can be obtained using the above query, the service defined by the secure storage application feature set extension system enables the host device to query the card for available applications, select and communicate with a particular application. The above general query and cautious query can be used for this purpose. 0 The method of using the two extended cards to securely store the application feature set to extend the inner feature set: • Provide the service - the way to implement this feature is by allowing the authorized entity C Use a command channel called a pipe to communicate directly with the internal application, which can be proprietary. • Extension of the standard access control principle for secure storage applications - the way to achieve this feature is by associating internal protected data objects (eg, content = dense secrets, security data objects (SD) described below) For internal card applications. Whenever such an object is accessed, if the defined criteria are met!! Safely store the application principle, then the associated application is invoked. In addition to using the standard secure storage:::! At least - condition. Preferably, this condition will conflict with the principle of the female full storage application. Access is granted only if the additional conditions of 122367.doc -93 - 200820037 are also met. Before proceeding with the detailed description of the ability of the Hurst Group to extend, it will now explain the feature set extension and the architectural aspects of the communication pipeline and the full data object. Security Service Module (SSM) and related modules FIG. 40A is a functional block diagram of a system architecture 1000 connected to a host device 24 by a memory device (such as a flash memory card) to illustrate one of the present inventions. Item. The main components of the software module in the memory device of the card 20 are as follows: Secure Storage Application Transport Layer 1〇〇2 The Secure Storage Application Transport Layer is card-dependent. It handles the host-side secure storage application request (command) on the protocol layer of the card, and then relays it to the security service module Αρι. All host card synchronization and secure storage application command identification is implemented in this module. The transport layer is also responsible for all data transfer between the host 24 and the card. Security Services Module Core 1 〇〇4 This module is an important part of this secure storage application implementation. The security service module core implements the secure storage application architecture. More specifically, the security service module core implements the secure storage application tree and access control record system and all of the above corresponding rules that make up the system. The security service module core module uses a password compilation library 1〇12 to support the secure storage application security and password compilation features such as encryption, decryption and hashing. Security Service Module Core API 1006 This host and internal applications will be interfaced to the Security Services Module Core 122367.doc -94 - 200820037 to implement a layer of secure storage application operations. As shown in Figure 4A, the host 24 and the internal application 1〇1〇 will use the same Αρι. Security Application Administrator Module (SAMM) 1008 The Security Application Administrator Module is not part of the Secure Storage Application System. However, it controls the internal application of the Secure Storage Application System. An important module in the card. The security application administrator module manages all of the internal applications of the device's including: 1 • Application lifecycle monitoring and control. 2 · Application initialization. 3. Application/host/security service module interface. In-device application 1010 The internal application of the device is the application that is permitted to execute on the card. Their internal applications are managed by the Security Application Administrator module and are accessible to the Secure Storage Application System. The security {) service module core also provides a communication channel between the host applications and the internal applications. The example for such an internal execution application is the DRM application and the single-password (〇ne time passw de d; 〇τρ) application, as further explained below. Device Management System (DMS) 101 This module contains the procedures and protocols required to update the card's system and application firmware and add/remove services in a post-shipment (commonly referred to as post-release) mode. FIG. 40B is a block diagram of the internal software module of the core of the security service module core 122 12 367.doc -95 - 200820037. As shown in Figure 40B, core 1-4 includes a secure storage application command handler handler 〇22. Processing routines 〇22 analyze the commands originating from the host or originating from the internal application of the device before the command is transmitted to the secure storage application administrator 1〇24. All secure storage application security data structures (such as access control record groups and access control records) and all secure storage application rules and principles are stored in the secure storage application private scam library 1026. The secure storage application manager 1 24 performs the control exercised by the access control record and access control record groups and other control structures stored in the database 1026. Other items (such as identity items) and security data items are also stored in the secure storage application database 1026. The secure storage application manager 1 24 performs the control exercised by the access control record and access control record groups and other control structures stored in the database 106. The non-secure operation of the secure storage application is handled by the secure storage application non-secure operating module 1028. The secure storage application security operating module 1030 handles security operations under the secure storage application architecture. The module 1032 is an interface between the connection module 1030 and the cryptographic compilation library 〇12. The module 1034 is a layer connecting the modules 1026 and 1028 to the flash memory of FIG. 1. The communication (or Pass-Through) pipeline is used by the security service module core and the security application administrator. When the module is controlled, the pipeline objects enable the entity of the authorized host to communicate with the internal application. The host and the internal application are between 122367.doc -96-200820037/(4) This is done by the send and RECEIVE commands (defined below). The actual command should be specific to the genre. The entity that created the pipe (access control record) will need to provide the pipe name and the application to be opened - the channel to it. ID. As with all other protected objects, the access control record becomes its owner and is allowed to delegate usage rights and ownership to other access control records according to standard rules and restrictions. If the CREATE_PIPE privilege is set in the attribute management of the access control record of the authentication entity, then the identifiable entity will be allowed to establish the pipe material. Only the authority of the entity (4) The communication with the internal application is allowed only when the authority of the official channel is read or read. Only the real system of the pipeline owner or the delegated access right in the authority control record of the entity is allowed to own. Rights and Access Rights Delegation: With all other rights 'When delegated ownership to another access control record, 'preferably' strips the original owner's authority over the device application. Preferably, for - a specific application, establishing only the communication pipeline. The tricky 'establishment - the second pipeline and the connection to the second pipeline to the connected application will be rejected by the security service module system 10 (eight). 'Better' is a relationship between one of the internal applications 1010 of the device and a communication pipe. 'However, multiple access control records can communicate with an internal application of the device (through the delegation mechanism) A single access control record can communicate with several devices (via delegation or ownership of multiple pipes connected to different applications). Preferably, control is not 122367.doc •9 7- 200820037 The access control record of the same pipeline is located at the node of the 6 π π fully separated tree, so that there is no crosstalk between the communication pipes. The data is transmitted between the host and a specific application. The following commands are implemented: • WRITE PASS THR〇UGH (Write Value, Sore, (Mass In) - will transfer an unformatted data buffer from the host to the internal application. • READPASSTH GH (read pass) _ will transfer an unformatted data buffer from the field to the internal application of the device, and once the internal processing system is completed, the data buffer will be output. The host. The write transfer command and the read transfer command P are provided for the host to communicate with the device. The ID of the internal application 1008 is used as a parameter. The voice y and entity privilege will be acknowledged, and if the requesting entity (ie, the access control record hosting the session in use by the entity) has permission to use the pipe connected to the requested application' The data buffer will be interrupted and the command will be executed. The communication method allows the host application to access the control record session channel to transmit the vendor/specific specific command to an internal device application through the secure application. Safety Data Object (SDO) A useful item that can be used in conjunction with a feature set extension to make a meal 1 a safety item. ' This safety data item is used as a general purpose barn for women to store sensitive information. Similar to the content encryption key ^ ^ Q is owned by an access control record, and can be delegated access between the access control and has the right to have 122367.doc -98- 200820037. The safety data item contains information that is protected and used in accordance with pre-defined principles and, optionally, has an internal application to the device.

Ο 1008之連結。較佳地,該敏感資料非係由該安全儲存應用 程式系統予以使用或解譯,而是由該物件之擁有者及使用 者所使用或解譯。換句話說,該安全儲存應用程式系統不 辨明其所處置之資料内的資訊。以此方式,當於主機與該 等資料物件之間傳送資料時,該物件内之該資料的擁有者 及使用者可較不關心歸因於介接於該安全儲存應用程式系 統所造成的敏感資訊之損失。因此,安全資料物件係由該 主機系統(或内部應用程式)所建立,且被指派一串id,類 似於建立内容加密密鑰之方式。於建立時,該主機係除了 提供名稱之外,亦提供經連結至該安全資料物件之應用程 式之一應用程式ID及將被該安全儲存應用程式儲存、完整 性驗證及接收之一資料區塊。 類似於内容加密密鑰’安全資料物件較佳地係僅於—安 全儲存應用程式會期内予以建立。用於開啟該會期 控制記錄變成該安全資料物件之擁有者,且係 安全資料物件之權利、寫入及讀取敏感資料以及委派二 權及存取該安全㈣物件之權 其之子代或於相同的存取控制記錄群組之内)。 該等寫人及讀取操作係專門為該安全資料物件之擁有去 所保留。-寫人操仙提供的資料緩衝 ㈣ 資料物件之物件資料。—讀取操作將縣 ^見^全 之完整的資料記錄。 王貝料物件 122367.doc -99- 200820037 允許具有適當存取權限的非擁有者存取控制記錄進行安 全資料物件存取操作係。定義下列操作: • SDO Set(安全資料物件設定),應用程式⑴被定義:將 由具有該應用程式ID之該内部安全儲存應用程式處理該資 料。藉由相關聯於該安全資料物件而調用該應用程式。作 為一選用結果,該應用程式將寫入該安全資料物件。Ο Link of 1008. Preferably, the sensitive material is not used or interpreted by the secure storage application system, but is used or interpreted by the owner and user of the object. In other words, the secure storage application system does not identify the information in the data it disposes. In this way, when the data is transferred between the host and the data objects, the owner and user of the data in the object can be less concerned with the sensitivity caused by the connection to the secure storage application system. Loss of information. Therefore, the secure data object is created by the host system (or internal application) and assigned a string of ids similar to the way the content encryption key is established. In addition to providing the name, the host also provides an application ID linked to the secure data object and one of the data blocks to be stored, integrity verified and received by the secure storage application. . Similar to the content encryption key, the security data item is preferably created only during the secure storage application session. The child control record used to open the session control record becomes the owner of the security data object, and is the right to secure the data object, write and read the sensitive data, and delegate the rights to the second party and access the security object. Within the same access control record group). These writers and read operations are reserved exclusively for the possession of the secure data item. - Write the data buffer provided by the person. (4) The object information of the data object. - The read operation will record the complete data of the county. Wang Beiwu Objects 122367.doc -99- 200820037 Allow non-owner access control records with appropriate access rights to secure data access operations. The following operations are defined: • SDO Set, the application (1) is defined: the data will be processed by the internal secure storage application with the application ID. The application is invoked by being associated with the secure data object. As a result of the selection, the application will write the security data object.

• SDO Set(安全資料物件設定),應用程式m係空值 (null):此選項無效,且將提示一不合法命令錯誤。該 命令需要一執行於該卡内的内部應用程式。 SDO Get(安全貢料物件獲得),應用程式id被定義:將 由具有該應程幻D之該裝置㈣應肖㈣處理該請求。 藉由相關聯於該安全資料物件而制該應用程式。輸出 (雖然未被定義)將被傳回該請求者。該應隸式將可選擇 地讀取該安全資料物件。 SDO Get(安全資料物件獲得),應用程式係空值··此 選項無效’且將提示—不合法命令錯誤。該Get命令需要 一執行於該卡内的内部應用程式。 女王貝料物件相關權限:一存取控制記錄可以係 王貝料物件擁有者或只是具有存取權限(Μ,㈣,或者兩 =此外’-存取控制記錄可被允許傳遞對於非其擁有 的女全㈣物件的存取權至另—存取㈣㈣。假如_ = 制二具有存取控制記錄屬性管理權限’則該存取控 :錄係可以明確地被准許建立安全資料物件且委派存取 122367.doc •100- 200820037 内部存取控制記錄 内部存取控制記錄類似於具有一權限控制記錄的任何存 取控制記錄,惟該裝置10之外部的實體無法登入該存取控 制記錄除外。而是,當在圖40B之該安全儲存應用程式管 理員1024之控制下的物件或相關聯於其之應用程式被調用 時’圖40B之該安全儲存應用程式管理員1〇24自動登入該 内部存取控制記錄。因為嘗試獲得存取之實體係一該卡或 記憶體裝置内部的實體,所以係不需要鑑認。該安全儲存 應用程式管理員1024將僅傳送一會期密鑰至該内部存取控 制記錄,以啟用内部通訊。 將使用兩個範例顯示特徵組延伸之能力:單次密碼產生 及數位權管理。在敘述單次密碼產生之範例之前,首先將 說明雙因素鑑認之發佈。 單次密碼之實施例 雙因素鑑認(DFA) 雙因素鑑認係一項鑑認協定,其設計成藉由加入一額外 的秘密”一第二因素”至標準使用者認證(亦即,使用者名稱 及氆碼)’而增強個人登入至(例如)一 web服務伺服器之安 全性。該第二秘密典型地係該使用者於其持有物中所具有 的只體女全付έ己内儲存的某事物。於登入程序期間,該使 用者需要提供持有證明作為該登入認證之一部分。一證明 持有之Φ用方式係使用一單次密碼,其係一僅適合於一單 登入之密碼,其係由該安全符記所產生及輸出。假如該 使用者能夠提供正確的單次密碼,則其係被認為充分證明 122367.doc -101 - 200820037 曾兮:f ^的擁有’因為無該符記之下以密碼編譯方式計 如:☆馬係不可實行的。因為該單次密碼係僅適合於 且人所H使用者係應該於登人時具有該符記,因 :、、、使用-自-先前登人所捕捉到的舊密碼將不再有效。 :述於下面&amp;落的$品係使用該安全儲存應用程式安全 性資料結構,加上一特徵組延伸設計,以計算於該單次密 馬系列中下一密碼,以實行一具有多個”虛擬&quot;安全符記之快 閃記憶體卡,每一符記產生一不同系列的密碼(其可被使用 於:入不同的_網站)。此系統之-方塊圖係顯示於圖41。 疋整的系統1050包含一鑑認伺服器1〇52、一網際網路伺 服器1054及一具有符記1〇58之使用者1〇56。第一步驟係同 意該鏗認伺服器與該使用者之間的一共用秘密(亦稱為種 子t、應)。忒使用者1 〇56將請求一將被發佈之秘密或種 子,且將儲存其於該安全符記1〇58之中。下一步驟係繫結 發佈之秘密或種子與一特定web服務伺服器。一旦此係完 成,該鑑認可發生。該使用者將指示該符記產生一單次密 碼。具有該使用者名稱及密碼之單次密碼係被傳送至網際 網路伺服器1054。該網際網路伺服器1054轉遞該單次密碼 至該鑑認伺服器1052,要求其驗證該使用者之ID。該鐘認 伺服器亦將產生一單次密碼,且因為該單次密碼係自一共 用秘密連同該符記予以產生,所以其係應該匹配自該符記 產生的單次密碼。假如一項匹配係被找到,則該使用者之 ID係被驗證,且該鑑認伺服器將傳回一肯定確認給該網際 網路伺服器1054,該網際網路伺服器1054將完成該使用者 122367.doc -102- 200820037 登入程序。 性用於該單次密碼產生之特徵組延伸實施方案具有下列特 •於該卡内安全地儲存(經加密)該單次密碼種子。 •該密碼產生演算法係於該卡内執行。 •該裝置Π)可模擬多個虛擬符記,每—虛擬符記係存_ 不同的種子,且可以使用不同的密碼產生演算法。• SDO Set (safe data object setting), application m is null (null): This option is invalid and will prompt an illegal command error. This command requires an internal application that is executed on the card. SDO Get (the security tribute object is obtained), the application id is defined: the request will be processed by the device (4) with the application D (4). The application is made by associating the security data object. The output (although not defined) will be passed back to the requester. The security object will optionally be read by the affiliation. SDO Get (secure data object acquisition), the application is null (this option is invalid) and will prompt - illegal command error. The Get command requires an internal application that is executed on the card. Queen's beaker object related permissions: an access control record can be the king of the object owner or just have access rights (Μ, (4), or two = additional '- access control records can be allowed to pass for non-owned The access rights of the female (four) object to the other - access (four) (four). If _ = system 2 has access control record attribute management authority ' then the access control: the record system can be explicitly allowed to establish a secure data object and delegate access 122367.doc •100- 200820037 Internal Access Control Recording An internal access control record is similar to any access control record with an access control record, except that an entity outside the device 10 cannot log into the access control record. When the object under the control of the secure storage application manager 1024 of FIG. 40B or the application associated with it is invoked, the secure storage application administrator 1 24 of FIG. 40B automatically logs in to the internal access. Controlling the record. Because it attempts to gain access to the real system of the card or the entity inside the memory device, no authentication is required. The secure storage application administrator 1024 will only transmit a session key to the internal access control record to enable internal communication. Two examples will be used to show the ability to extend feature sets: single-password generation and digital rights management. Before the example, the release of two-factor authentication will be explained first. Two-factor authentication (DFA) Two-factor authentication is a recognition agreement designed to add an additional secret. The second factor "to standard user authentication (ie, user name and weight)" enhances the security of the individual's login to, for example, a web service server. The second secret is typically held by the user. Some of the things that are stored in the body are all stored in the store. During the login process, the user needs to provide proof of possession as part of the login authentication. A single-password, which is only suitable for a single-entry password, which is generated and output by the security token. If the user can provide the correct one-time password, it is considered to be charged. Sub-certificate 122367.doc -101 - 200820037 Zeng Wei: f ^'s possession 'Because there is no such code under the cryptographic compilation method: ☆ The horse system is not practicable. Because the single password is only suitable for people. The H user system should have this token when you log in, because the old password captured by -, ,, using - from - previous login will no longer be valid. : The following is the &amp; Securely store the application security data structure, plus a feature set extension design to calculate the next password in the single Mickey series to implement a flash memory card with multiple "virtual" security tokens Each token generates a different series of passwords (which can be used to: enter a different _ website). The block diagram of this system is shown in Figure 41. The throttled system 1050 includes an authentication server 1〇52, an internet server 1054, and a user 1〇56 having a token. The first step is to agree to a shared secret (also known as seed t, should) between the server and the user. User 1 〇 56 will request a secret or seed to be posted and will store it in the security token 1〇58. The next step is to tie the secret or seed to a specific web service server. Once the system is completed, the identification takes place. The user will instruct the token to generate a single password. A one-time password with the username and password is transmitted to the Internet server 1054. The Internet server 1054 forwards the one-time password to the authentication server 1052 and asks it to verify the ID of the user. The clock authentication server will also generate a single password, and since the single password is generated from a common secret along with the token, it should match the single password generated from the token. If a match is found, the user's ID is verified and the authentication server will send back a positive confirmation to the internet server 1054, which will complete the use. 122137.doc -102- 200820037 Login procedure. The feature set extension implementation for the single cipher generation has the following features to securely store (encrypt) the single cipher seed within the card. • The password generation algorithm is executed within the card. • The device Π) can simulate multiple virtual tokens, each virtual token is stored in a different seed, and different passwords can be used to generate the algorithm.

• a亥裝置1 0係提供一安令f在令,A 協疋以自该鑑認伺服器傳送 該種子至該裝置。 用於單次密碼種子供應及單次密碼產生之安全健存應用 私式特徵係顯示於圖42,其中,實線箭頭係顯示擁有權或 絲權,且虛線箭頭係顯示關聯性或連結。如示於圖42, 於安全儲存應用程式特徵組延伸系統1100中,可透過一或 多:通訊管道1104來存取軟體程式碼特徵組延伸·,通 訊官道1104係受控於N個應用程式存取控制記錄之各 者於下述K把例中,僅顯示一特徵組延伸軟體應用程 式’且對於每-特徵組延伸應用程式,僅有—通訊管道。 而應瞭解的疋’可以利用—個以上特徵組延伸應用程 式。雖然圖42係僅顯示一通訊管道,應瞭解的是,可以使 用複數個通訊管道。所有此類變化係可行的。來昭圖 椒、彻及42’該特徵組延伸⑽可以係一用於單;;密 碼供應之應用程式’且形成圖4〇A之裝置内部應用程式 子集σ控制結構(存取控制記錄1 1 〇 1、1 1 03、 1110)係*全鍺存應用程式内之安全性資料結構的 122367.doc 200820037 P刀且係儲存於該安全儲存應用程式資料庫⑺%之 一: 身知物件1120、身份物件1122及通訊管道11〇4之 、料、。構亦係、儲存於該安全儲存應用程式資料庫⑺^之 中。 &gt;圖GA及4GB,牵涉到該等存取控制記錄及資料結 構=安全性相關操作(例如會期内之資料傳送,以及諸如 加密、解密與雜凑之操作)係在介面贈及密碼編譯庫 1〇12之輔助之下,由模組则所處置。安全服務模組核心 I 1006不區別牽涉到與主機互動之存取控制記錄(外部 的存取控制記錄)的操作及不與主機互動之内部的存取控 制。己錄之操作,且因而係不區別牽涉到主機之操作相對於 裝置内部應用程式1010之操作。以此方式,控制由主機端 實體所實行之存取以及由裝置内部應用程式刪所實行之 存取係㈣相同的控制。此導致用於劃分主機端應用 程式與裝置内部應用程式1〇1〇之間之資料處理的彈性。該 等内部應用程式1010(例如圖42中之特徵組延伸ιι〇2)相關 聯於該等内部存取控制記錄(例如圖42中之存取控制記錄 n〇3) ’且係透過該等内部存取控制記錄之控制予以調 用0 再者,諸如具有相關聯的安全儲存應用程式規則及原則 之存取控制記錄及存取控制記錄群組之安全性資料結構較 佳地係控制對重要資訊的存取’諸如安全資料物件内之内 容或能夠自安全資料物件内之内容推導出之資訊,使得外 部或内部應用程式係僅能夠根據該等安全儲存應用程式 122367.doc -104- 200820037• The ahai device 1 0 provides an order f, and the A protocol transmits the seed from the authentication server to the device. Secure Health Application for Single Cipher Seed Provisioning and Single Password Generation The private feature is shown in Figure 42, where the solid arrow indicates ownership or silk weight and the dashed arrow indicates relevance or link. As shown in FIG. 42, in the secure storage application feature group extension system 1100, the software code feature group extension can be accessed through one or more communication channels 1104, and the communication channel 1104 is controlled by N applications. Each of the access control records is shown in the following K example, only a feature set extension software application 'and for each feature group extension application, only the communication pipe. However, it should be understood that more than one feature group can be used to extend the application. Although Figure 42 shows only one communication pipe, it should be understood that a plurality of communication pipes can be used. All such changes are possible. The model group extension (10) can be used for a single; password-applied application' and forms the device internal application subset σ control structure of Figure 4A (access control record 1) 1 〇 1, 1 1 03, 1110) is a fully stored data security structure in the application 122367.doc 200820037 P knife is stored in the secure storage application database (7)%: Know the object 1120 , the identity object 1122 and the communication pipe 11〇4, material,. The structure is also stored in the secure storage application database (7)^. &gt; Map GA and 4GB, involving such access control records and data structure = security related operations (such as data transfer during the session, and operations such as encryption, decryption and hashing) are provided in the interface and password compilation With the help of the library 1〇12, it is disposed of by the module. The Security Services Module Core I 1006 does not distinguish between operations involving access control records (external access control records) that interact with the host and internal access control that does not interact with the host. The recorded operations, and thus the indiscriminate operation of the host, relative to the operation of the in-app application 1010. In this way, the same control is performed by the access performed by the host entity and by the access system (4) implemented by the internal application of the device. This results in the flexibility to divide the data processing between the host application and the internal application of the device. The internal applications 1010 (eg, feature set extensions in FIG. 42) are associated with the internal access control records (eg, access control records n〇3 in FIG. 42) and are transmitted through the internals. The control of the access control record is invoked. Furthermore, the security data structure of the access control record and access control record group, such as the associated secure storage application rules and principles, preferably controls the important information. Accessing information such as content within a secure data object or content that can be derived from content within a secure data object, such that external or internal applications can only be stored according to such secure storage applications 122367.doc -104 - 200820037

Ο 則及原則而存取該内容或資訊。舉例而言,假如兩個不同 的使用者可調用豸等裝置内部應用程式1〇1〇之一個別裝置 内部應用程式來處理資料,則使用位於分離的樹狀階層年 構内之内部存取控制記錄來控制該兩個使用者所實施^存 取’使得其之間係無串擾。以此方式,該兩個使用者皆能 夠存取-共同組裝置内部應用程式i 〇 i 〇以用於處理資料, 而不擔心該等安全資料物件内之内容或資訊的擁有者喪失 對於該内容或資訊的控制。舉例而言,對儲存由該等裝置 内部應用程式1010所存取之安全資料物件資料之存取可受 控於位於分開的樹狀階層架構内之存取控制記錄,使得2 之間係無串擾4種控制方式係類似於上述安全儲存應用 程式控制存取資料之方式。此係對於内容擁有者及使用者 提供儲存於該等資料物件内的資料的安全性。 參照圖42,S於該單次密碼㈣主機應用程 &lt;所需之軟 體應用程式碼之-部分被儲存(例如,在記憶體卡發佈之 前預先儲存或在記憶體卡發佈之後載入)於該記憶體裝置 10内作為特徵組延伸1102内之應用程式係可能的。為了執 行此類程式碼,該主機將首先需要透過該N個驗證存取控 制記錄1106中之一者進行鑑認(N係一正整數),以獲得對 於管道11〇4之存取。該主機亦將需要提供一用於識別其祁 要調用之單次密碼相關之應用程式的應用程式m。在二^ ^監認之後,可存取此類程式碼,以用於透過相關聯於該 單次密碼相關之應用程式的管道11〇4而執行。如上文所注 意到,較佳地,介於一管道11〇4與一特定應用程式(諸如 122367.doc •105- 200820037 一單次岔碼相關内部應用程式)之間係有1對1的關係。如 不於圖42,多個存取控制記錄11 06可共有對一共同管道 11 04之控制。一存取控制記錄亦可控制一個以上管道。 圖42顯示統稱為物件1114之安全資料物件1、安全資料 物件2及安全資料物件3,每一者係含有資料,諸如用於單 次欲碼產生之一種子,該種子係有價值的且較佳為被加 雄、。介於該三個資料物件與特徵組延伸丨丨〇2之間之連結或 關聯性1108顯示該等物件之屬性在於:當存取該等物件中 之任者時,於具有該安全資料物件之屬性内一應用程式 ID之特徵組延伸11〇2内之應用程式將被調用,且該應用程 式將由該記憶體裝置之中央處理單元12所執行,而不需要 接收任何進一步的主機命令(圖丨)。 參照圖42,在一使用者可開始該單次密碼程序之前,該 等安全性資料結構(存取控制記錄11〇1、11〇3、11〇6及 1110)已被建立成具有用於控制該單次密碼程序之權限控 制記錄。該使用者將需要具有存取權,以透過鑑認伺服器 存取控制記錄1106之一而調用一單次密碼裝置内部應用程 式1102。該使用者亦將需要具有對於將透N個使用者存取 控制記錄11 1 〇之一而產生之單次密碼的存取權。可以於該 單次密碼種子供應程序期間被建立該等安全資料物件 1114。較佳地,該内部存取控制記錄丨1〇3已建立及控制該 身份物件1116。該内部存取控制記錄丨丨〇3係在其被建立之 後,亦控制該等安全資料物件1114。當存取該等安全資料 物件1114時,於圖40B内之該安全儲存應用程式管理員 122367.doc -106 - 200820037 顧自動登人該内部存取控制記錄11G3。該内部存取控制 ,己錄11 G3係相關聯於特徵組延伸。於該單次密碼種子 t、縣序期間,該等安全資料物件⑴何變成相關聯於該 ^寺Η、I伸,如虛線丨丨〇8所示。在該關聯性就緒之後,當 /械存取β亥等安全資料物件時,該關聯性i⑽係將導致 2徵組延伸1102被調用,而不需要來自該主機的一進一步 明求备透過N個存取控制記錄1106之一存取通訊管道 1G4%目侧内之該安全料應用程式管理員1024亦自 動且入w亥存取控制記錄i i 〇3。於此兩者情況下(存取安全 貝料物件1114及官道J 1〇4),該安全儲存應用程式管理員 將傳达-會期號碼至該特徵組延伸贈,該會期號碼將識 別至該内部存取控制記錄1103之通道。 該單次密碼操作係牽涉到兩個階段:一示於圖43之種子 供應階段;及一示於圖44之單次密碼產生階段。參照圖 40 42將亦此夠有助於說明。圖43繪示該種子供應程序之 協定圖。如示於圖43,由主機(諸如主機24)以及由該卡採 取各種動作。採取各種動作之卡上的—實體係圖嫩及 40B之該安全服務模組系統,其包含該安全服務模組核心 1〇〇4。採取各種動作之卡上的另一實體係顯示於圖42之該 特徵組延伸11〇2。 於雙因素鑑認之中,該使用者係請求一種子被發佈,且 一旦該種子被發佈,該種子係被儲存於一安全符記之中。 於此範例中,該安全符記係該記憶體裝置或卡。該使用者 向圖42中該等鑑認存取控制記錄11〇6之一者進行鑑認,以 122367.doc •107- 200820037 ^得存取該安全服務模Μ統(箭頭1122)。假設㈣成功 (刖頭1124) ’㈣使用者請求一種子(箭頭ιΐ26)。該主機 傳送該請求,以藉由選擇一用於簽名該種子請求之特別的 應用程式U02而將該種子請求簽名至該卡。假如該使用者 不知道需要被調用之該特別的應用程式之m,則可自裝置 10獲得該資訊,舉例而言,透過一對於該裝置之謹慎查 詢。接者,該使用者輸入應被調用之應用矛呈式之應用程式 ID ’藉此亦選擇—對應於該應用程式之通訊管道。接著, 透過該對應的通訊管道,在—傳遞命令中轉遞該使用者命 令至來自該使用者之該應用程式ID所指定之應用程式(箭 頭1128)。被調用之應用程式係藉由該指定之身份物件(諸 如圖42内之身份物件1112)内的公開密鑰而請求一簽名。 該安全服務模組系統使用該身份物件之該公開密鑰簽名 該種子請求,且通知該應用程式該簽名係完成(箭頭 1132)。接著,該被調用之應用程式請求該身份物件之憑 證鏈(箭頭1134)。為了回應,該安全服務模組系統提供由 該存取控制記錄1103所控制之該身份物件之憑證鏈(箭頭 1136)。接著,該被調用之應用程式透過該通訊管道,提 供該經簽名的種子請求及該身份物件之該憑證鏈至該安全 服務模組系統,該安全服務模組系統轉遞該經簽名的種子 請求及該身份物件之該憑證鏈至該主機(箭頭U38)。透過 該通訊管道傳送該經簽名的種子請求及該身份物件之該憑 證鏈的係透過建置於圖40A之該安全性應用程式管理員模 組1008及該安全服務模組核心1004之間的回呼(callback)功 122367.doc -108- 200820037 能’其中,將於下文說明該回呼功能。 接著,由該主機接收到的該經簽名的種子請求及該身份 物件之該憑證鏈被傳送至如示於圖W之㈣認祠服器 1052。由該卡所提供之憑證鏈檢定該經簽名的種子請求係 起源於又信任的符記,使得該鑑認伺服器1〇52係想要提供 該秘密種子給該卡。因此,該鐘認伺服器㈣傳送以該身 份物件之該公開密鑰加密之種子連同該使用者存取控制記 錄資訊一起給該主機。該使用者資訊指示出在該n個使用 者存取控制記錄中使該使用者具有存取將被產生之該單次 密碼的權利的存取控制記錄。該主機藉由提供該應用程式 ID而調用特徵組延伸11〇2内一單次密碼應用程式,藉此亦 選擇對應於該應用程式之通訊管道,且轉遞該使用者存取 控制記錄資訊至該安全服務模組系統(箭頭丨14〇)。接著, 。亥、、盈加後的種子及該使用者存取控制記錄資訊係透過該通 訊管道被轉遞至該選擇出之應用程式(箭頭1142)。該被調 用之應用程式傳送一請求至該安全服務模組系統,以用於 使用該身份物件之私有密鑰,而解密該種子(箭頭1144)。 該安全服務模組系統解密該種子且傳送一解密已經完成之 通知給該應用程式(箭頭1146)。接著,該被調用之應用程 式請求建立一安全資料物件之及於該安全資料物件内儲存 該種子。其亦請求使該安全資料物件相關聯於用於產生該 單次密碼之該單次密碼應用程式(其可以係相同於正在請 求之應用程式)之ID(箭頭1148)。該安全服務模組系統建立 該等安全資料物件1114之一者,且儲存該種子於該安全資 122367.doc -109- 200820037 科:件内,且使該安全資料物件相關聯於該單次密碼應用 程式之m’且當完成時傳送通知給該應用程式(箭頭 =。接著’該應用程式請求該安全服務模組系統根據 機所提供之使用者資訊,委派該内部存取控制記錄 之用於存取該安全資料物件1114之存取權,給適當的使用 者存取控制記錄(箭頭1152)。在已經完成委派之後,該安 全服務模組系統通知該應用程式(箭頭1154)。接著,該應 用程式係藉由—回呼功能,透過該通訊管道傳送該安U 麵之名稱(細)給該安全服務模組系統(箭頭ιΐ56)。、 接者’文全服務模組系統係轉遞該安全資料物件之名稱至 該主機(箭頭1158)。接著,該主機繫結該安全資料物件之 =稱與較用者存取控制記錄,使得該使用者係現在能夠 存取该安全資料物件。 現在將參照圖44中之協定圖而敘述單次密碼產生之程 序。為了獲得該單次密碼,該使用者將登入其具有存取權 之使用者存取控制記錄(箭頭1172)。假設該鑑認成功,則 該安全服務模㈣統通知該主機,且該主機傳送一”糾 獲得安全資料物件)命令給該安全服務模組(箭頭 :174 1 176) °如上文所述’儲存該種子之該安全資料物 件已經相關聯於-用於產生該單次密碼之應用程式。因 :4 :像疋以前一樣透過該通訊管道選擇-應用程式,該 :人在碼產生應用程式係藉由介於由該命令存取之安全資 =物件(箭頭1176)與該單次密碼產生應用程式之間的關聯 性所調用(箭頭1178)。接著,該單次密碼產生應用程式請 122367.doc -110- 200820037 …亥安全服務模組系統自該安全:㈣物件讀取該内容(亦 即^種子K箭頭謂)。較佳地,該安全服務模組不知道 違女全貪料物件之内容内包含的資訊,且將僅按該特徵組 延:指示來處理該安全資料物件内之資料。假如該種子被 加密’則此係可以牽涉到按該特徵組延伸命令在讀取之前 解密該種子。該安全服務模㈣統自該安 該種子,讀供該種子至該單次密碼產生應用程式(= 1182)。接著,該單次密碼產生應用程式產生該單次密碼 且提供該單次密碼給該安全服務模組系統(箭頭ιΐ8句。接 著該單次密碼係由該安全服務模組轉遞至該主機(箭頭 U86) ’接著,該主機轉遞該單次密碼至該鑑認伺服器 1052 ’以完成該雙因素鑑認鑑認程序。 回呼功能 〇 於圖40A之該安全服務模組核心1〇〇4與安全性應用程式 管理員模組丨008之間建置一泛用回呼功能。不同的裝置内 部應用程式及通訊管道可被登錄以具有此類功能。因此, 當調用一裝置内部應用程式時,該應用程式可使用此回呼 功能,以透過被用於傳送一主機命令至該應用程式之相同 通訊管道,將處理後之資料傳送至該安全服務模組系統。 DRM系統實施例 圖45繪不DRM系統的功能方塊圖,該DRM系統採用通 訊管道1104,、具有至特徵組延伸應用程式11〇2,之連結 1108’的内容加密密鑰1114,及用於控制該等功能以實施 DRJV[功能之控制結構ιι01,、11〇3,及11〇6,。如將被注意 122367.doc •111 · 200820037 到’圖45中之架構係相當類似於圖42之架構,惟該安全性 資料結構現在包含使用權伺服器存取控制記錄n 〇6,及播放 存取控制記錄111 0’(取代鑑認伺服器存取控制記錄及使用 者存取控制記錄)以及内容加密密鑰1114,(取代安全資料物 件)除外。此外,不牵涉到該身份物件,且因而於圖45中 省略該身份物件。可以於使用權供應程序中建立該等内容 加後、进鑰1114’。圖46之協定圖顯示一種用於使用權供應及 内谷下載之程序’其中,於使用權物件中提供密鑰。如同 於該單次密碼之實施例中,一想要獲得一授權之使用者將 首先需要在N個存取控制記錄π 0 6 ’之一者及N個存取控制 記錄1110,之一者之下取得存取權,使得可藉由一媒體播放 機(諸如一媒體播放機軟體應用程式)呈現内容。 如示於圖46,該主機向一使用權伺服器存取控制記錄 11 〇6彳箭頭1202)進行鑑認。假設鑑認成功(箭頭12〇4),則 该使用權伺服器提供一使用權樓案(license file)連同一内 容加密密鑰(密鑰ID及密鑰值)給該主機。該主機亦藉由提 供a亥應用程式ID至該卡上之該安全服務模組系統,而選擇 被調用之應用程式。該主機亦傳送播放機資訊(例如,於 一媒體播放機軟體應用程式上之資訊)(箭頭12〇6)。該播放 機資訊將指示在該N個播放機存取控制記錄111〇,之哪一者 之下’該播放機具有存取權。該安全服務模組系統係透過 對應於該選擇出之應用程式之通訊管道,而轉遞該使用權 才虽案及該内容加密密錄至該DRM應用程式(箭頭12〇8)。接 著’該被調用之應用程式請求該安全服務模組系統將該使 122367.doc -112- 200820037 用權檔案寫入至隱藏分割區之中(箭頭1210)。當係如此寫 入該使用權檔案時,該安全服務模組系統通知該應用程式 (箭頭1212)。接著,該DRM應用程式請求一被建立之内容 加密密鑰物件1114, ’且將來自該使用權檔案的密鑰值儲存 於該被建立之内容加密密鑰物件1114,之中。該drm應用 程式亦請求使該内容加密密鑰物件與相關聯於一drm應用 程式的ID (該D R Μ應用程式檢查相關聯於所提供之密鑰的 授權)(箭頭1214)。該安全服務模組系統完成這些工作,且 因而通知該應用程式(箭頭1216)。接著,該應用程式請求 根據由主機傳送之播放機資訊,而將對該内容加密密鑰 1114’之讀取存取權委派給—播放機存取控制記錄(該播放 機具有對該播放機存取控制記錄的存#内容之權限)(箭頭 ⑵^該,全服務模組系統實行該委派,且因而通知該 應用私式U頭122G)。由該應肖程式透過該通訊管道傳送存取 then access the content or information. For example, if two different users can call an internal application of one of the internal applications of the device to process the data, the internal access control record located in the separated tree hierarchy is used. To control the two users to implement ^ access 'such that there is no crosstalk between them. In this way, both users are able to access the co-group device internal application i 〇i 〇 for processing the data without fear that the owner of the content or information within the secure data object loses the content. Or control of information. For example, access to stored secure material object data accessed by the device internal application 1010 can be controlled by access control records located within a separate tree hierarchy such that there is no crosstalk between the two The four control methods are similar to the way the secure storage application controls access to data. This provides the content owner and user with the security of the data stored in those data items. Referring to FIG. 42, S is stored in the one-time password (four) host application &lt;-part of the required software application code (for example, pre-stored before the memory card is released or loaded after the memory card is released) The memory device 10 is possible as an application within the feature set extension 1102. In order to execute such a code, the host will first need to authenticate through one of the N authenticated access control records 1106 (N is a positive integer) to gain access to the pipeline 11〇4. The host will also need to provide an application m for identifying the application associated with the single password associated with it. After being authenticated, such code can be accessed for execution via the pipeline 11〇4 associated with the single password-related application. As noted above, preferably, there is a one-to-one relationship between a pipe 11〇4 and a particular application (such as 122367.doc • 105-200820037 a single weight related internal application). . If not in Figure 42, a plurality of access control records 116 can have control over a common conduit 11 04. An access control record can also control more than one pipe. Figure 42 shows a security data item 1, a security data item 2, and a security data item 3, collectively referred to as an object 1114, each containing data, such as one seed for a single desire to generate, the seed being valuable and more Jia is Jiaxiong. The link or association between the three data objects and the feature set extensions 2108 indicates that the attributes of the objects are: when accessing any of the objects, having the secure data object The application within the attribute ID of the application ID extension 11〇2 will be called, and the application will be executed by the central processing unit 12 of the memory device without receiving any further host commands (Fig. ). Referring to FIG. 42, the security profile (access control records 11〇1, 11〇3, 11〇6, and 1110) has been established to have control before a user can start the one-time password procedure. The permission control record of the single password program. The user will need to have access rights to invoke a single cryptographic device internal application 1102 through one of the authentication server access control records 1106. The user will also need to have access to a single password generated by accessing one of the N user access control records 11 1 . The secure data objects 1114 can be created during the single cryptographic seeding process. Preferably, the internal access control record 丨1〇3 has established and controlled the identity object 1116. The internal access control record 丨丨〇3 also controls the secure data items 1114 after it is created. When the secure data item 1114 is accessed, the secure storage application manager 122367.doc -106 - 200820037 in FIG. 40B automatically logs the internal access control record 11G3. The internal access control, the recorded 11 G3 system is associated with the feature set extension. During the single password seed t, the county order, how the security data objects (1) become associated with the temple, I stretch, as shown by the dotted line 丨丨〇 8. After the association is ready, when the security information object is accessed by the device, the association i(10) will cause the 2 syndrome extension 1102 to be invoked, without requiring a further explicit request from the host to pass through N The security application manager 1024 in the access control record 1106 accessing the communication channel 1G4% of the target side also automatically accesses the control record ii 〇3. In both cases (access to secure bedding object 1114 and official J 1〇4), the secure storage application administrator will communicate the session number to the feature group extension, which will identify the session number. The channel to the internal access control record 1103. The single cryptographic operation involves two phases: one is shown in the seed supply phase of Figure 43; and the single cryptographic generation phase is shown in Figure 44. Referring to Figure 40 42 will also be sufficient to aid in the description. Figure 43 is a diagram showing the agreement of the seed supply procedure. As shown in Figure 43, various actions are taken by the host (such as host 24) and by the card. The security service module system of the security system module is included in the card of the various actions and the security system module of the 40B. Another real system on the card that takes various actions is shown in Figure 42 as the feature set extension 11〇2. In two-factor authentication, the user requests a child to be published, and once the seed is published, the seed is stored in a security token. In this example, the security token is the memory device or card. The user authenticates one of the authentication access control records 11〇6 in Fig. 42 and accesses the security service module (arrow 1122) at 122367.doc • 107-200820037. Assume (4) success (Shantou 1124) ‘(4) The user requests a kind of child (arrow ιΐ26). The host transmits the request to sign the seed request to the card by selecting a particular application U02 for signing the seed request. If the user does not know the particular application m to be called, the information can be obtained from the device 10, for example, through a cautious query for the device. In response, the user enters the application ID of the application that should be invoked, thereby selecting - corresponding to the communication pipeline of the application. Then, through the corresponding communication pipe, the user command is forwarded to the application specified by the application ID of the user (arrow 1128). The called application requests a signature by the public key in the specified identity object (identity object 1112 in Figure 42). The security service module system signs the seed request using the public key of the identity object and notifies the application that the signature is complete (arrow 1132). The invoked application then requests the credential chain of the identity object (arrow 1134). In response, the security service module system provides a credential chain of the identity object controlled by the access control record 1103 (arrow 1136). Then, the called application provides the signed seed request and the credential chain of the identity object to the security service module system through the communication pipeline, and the security service module system forwards the signed seed request And the credential chain of the identity object is linked to the host (arrow U38). Transmitting the signed seed request and the credential chain of the identity object through the communication pipeline through the security application administrator module 1008 and the security service module core 1004 constructed in FIG. 40A The callback function 122367.doc -108- 200820037 can 'which will be explained below. Next, the signed seed request received by the host and the credential chain of the identity object are transmitted to the (4) fingerprint server 1052 as shown in FIG. The credential chain provided by the card verifies that the signed seed request originates from a trusted token such that the authentication server 1〇52 wants to provide the secret seed to the card. Therefore, the clock server (4) transmits the seed of the public key encryption of the identity object to the host along with the user access control record information. The user information indicates an access control record that gives the user the right to access the single password to be generated in the n user access control records. The host invokes the feature set to extend a single-password application within 11〇2 by providing the application ID, thereby selecting a communication channel corresponding to the application, and forwarding the user access control record information to The security service module system (arrow 丨 14〇). Then, . The seed, and the user access control record information are forwarded to the selected application (arrow 1142) through the communication pipe. The called application transmits a request to the security service module system for decrypting the seed using the private key of the identity object (arrow 1144). The security service module system decrypts the seed and transmits a notification that the decryption has been completed to the application (arrow 1146). The invoked application then requests to establish a secure data object and store the seed in the secure data object. It also requests that the secure profile object be associated with the ID of the single cipher application (which may be the same as the application being requested) for generating the single passcode (arrow 1148). The security service module system establishes one of the security data objects 1114, and stores the seed in the security component 122367.doc -109-200820037: and associates the security data object with the single password The application's m' and when notified completes the notification to the application (arrow =. Then 'the application requests the security service module system to delegate the user access information based on the user information provided by the machine Accessing the secure data item 1114, accessing the control record to the appropriate user (arrow 1152). After the delegation has been completed, the security service module system notifies the application (arrow 1154). The application transmits the name of the U-face (thin) to the security service module system (arrow ιΐ56) through the communication pipe through the callback function. The receiver's full service module system transfers the The name of the security data object is sent to the host (arrow 1158). Then, the host binds the security data object to the user access control record, so that the user system can now save The secure data item will now be described with reference to the protocol diagram in Figure 44. In order to obtain the single password, the user will log in to the user access control record with access rights (arrow 1172). If the authentication is successful, the security service module (4) informs the host, and the host transmits a "correct security data object" command to the security service module (arrow: 174 1 176) ° as described above 'The security data object that stores the seed has been associated with the application used to generate the single password. Because: 4: Select the application through the communication channel as before, this: the person generates the application in the code It is invoked by the association between the security element (arrow 1176) accessed by the command and the single password generation application (arrow 1178). Next, the single password generation application please 122367. Doc -110- 200820037 ...Hai security service module system since the security: (4) the object reads the content (that is, ^ seed K arrow said). Preferably, the security service module does not know that the female is completely greedy The information contained in the content of the piece, and will only be processed according to the feature: indication to process the data in the security data object. If the seed is encrypted, then this may involve the extension of the feature group before reading Decrypting the seed. The security service module (4) automatically reads the seed from the seed to the single password generation application (= 1182). Then, the single password generation application generates the single password and provides the A single password is given to the security service module system (arrow ιΐ8. Then the single password is forwarded by the security service module to the host (arrow U86). Then, the host forwards the single password to the certificate. The server 1052' is acknowledged to complete the two-factor authentication and authentication procedure. Callback function 建 A general-purpose callback function is established between the security service module core 1〇〇4 and the security application administrator module 丨008 in FIG. 40A. Different device internal applications and communication pipes can be logged in to have such functionality. Therefore, when an internal application is invoked, the application can use the callback function to transmit the processed data to the secure service module through the same communication channel used to transmit a host command to the application. Group system. DRM System Embodiment FIG. 45 depicts a functional block diagram of a non-DRM system employing a communication pipe 1104, a content encryption key 1114 having a link 1108' to a feature group extension application 11〇2, and for controlling These functions are implemented to implement DRJV [function control structures ιι01, 11〇3, and 11〇6. As will be noted 122367.doc • 111 · 200820037 to 'Architecture in Figure 45 is quite similar to the architecture of Figure 42, but the security data structure now contains the usage rights server access control record n 〇 6, and play save The control record 111 0' (instead of the authentication server access control record and the user access control record) and the content encryption key 1114 (excluding the security data object) are excluded. Moreover, the identity object is not involved, and thus the identity object is omitted in Figure 45. The content addition key 1114' can be established in the usage right provisioning program. The protocol diagram of Fig. 46 shows a procedure for use rights provisioning and intranet downloading where the key is provided in the usage rights object. As in the single-password embodiment, a user who wants to obtain an authorization will first need to have one of N access control records π 0 6 ' and N access control records 1110, one of which The access rights are obtained such that the content can be presented by a media player, such as a media player software application. As shown in Fig. 46, the host authenticates to a usage right server access control record 11 〇 6 彳 arrow 1202). Assuming the authentication is successful (arrow 12〇4), the usage right server provides a license file with the same content encryption key (key ID and key value) to the host. The host also selects the invoked application by providing the application ID to the secure service module system on the card. The host also transmits player information (e.g., information on a media player software application) (arrow 12〇6). The player information will indicate under which of the N player access control records 111, the player has access. The security service module system forwards the usage right through the communication channel corresponding to the selected application, and encrypts the content to the DRM application (arrow 12〇8). Then the called application requests the security service module system to write the 122367.doc -112-200820037 rights file into the hidden partition (arrow 1210). When the usage rights file is thus written, the security service module system notifies the application (arrow 1212). Next, the DRM application requests an established content encryption key object 1114, and stores the key value from the usage rights file in the created content encryption key object 1114. The drm application also requests the content encryption key object to be associated with the ID of a drm application (the D R Μ application checks the authorization associated with the provided key) (arrow 1214). The security service module system performs these tasks and thus notifies the application (arrow 1216). Next, the application requests to delegate read access to the content encryption key 1114' to the player access control record based on the player information transmitted by the host (the player has the player stored in the player) Take the permission to control the stored #content) (arrow (2) ^, the full service module system implements the delegation, and thus informs the application private U header 122G). Transmitted by the communication channel through the communication pipe

涉到安全性功能,使得該安 储存。 提供給該卡之該内容加密密鑰 案。該經加密的内容係由該主名 儲存該經加密的内容檔案不牵巧 全服務模組系統係不牵涉到該傳 該使用者係透過該主機而向 即,於上文箭頭1152及1154 該播放操作係顯示於圖47。 適合的播放存取控制記錄(亦 122367.doc -113 - 200820037The security function is involved, so that the security is stored. The content encryption key provided to the card. The encrypted content is stored by the primary name. The encrypted full-service module system is not involved in the transmission of the user through the host, as indicated by arrows 1152 and 1154 above. The playback operation is shown in Figure 47. Suitable playback access control record (also 122367.doc -113 - 200820037

中被委派取權至其之播放存取控制記錄)進行鑑認(箭 頭1242)。假設鑑認成功(箭頭124句,則該使用者接著傳送 一凊求,以讀取相關聯於該密鑰m之内容(箭頭1246)。於 接收該請求時,該安全服務模組系統將發現-DRM應用程 式之m係相關聯於正被存取之内容加密密鑰物件,且因而 將導致調用該被識別之DRM應用程式(箭·48)。該DRMThe user is delegated the right to play the access control record) for authentication (arrow 1242). Assuming the authentication is successful (arrow 124 sentences, the user then transmits a request to read the content associated with the key m (arrow 1246). Upon receiving the request, the security service module system will discover The m of the DRM application is associated with the content encryption key object being accessed, and thus will result in the call of the identified DRM application (arrow 48).

應用私式π求δ亥安全服務模組系統讀取相關聯於該密鑰ID 之資料(亦即’使用權)(箭頭125〇)。該安全服務模組不知 道其被請求讀取之資料㈣資訊,幻s處理來自該特徵組 延伸的請求,以實行該資料讀取程序。該安全服務模組系 統自該隱藏分割區讀取資料(亦即,使用權),且提供該資 料至該DRM應用程式(箭頭m2)。接著,該drm應用程式 解譯該資料,且檢查該資料内之使用權資訊,以看看該使 用權是否有效。假如該使用權仍然有效,則該臓應用程 式將向該安全服務模組系統通知准許進行内容解密(箭頭 1254)接著,°亥女全服務模組系統使用該内容加密密鑰 物件内之該歸值解密該請求的内容,且提供該經解密的 内容至該主機,以用於播放(箭頭1256)。假如該使用權不 再有效,則用於内容存取之請求係被拒絕。 假使來自該使用權伺服器的使用權内未提供任何密餘, 則該使用權供應及内容下載係將稍微不同於示於圖“之方 式。此類不同的方案係顯示於圖48之協定圖之中。圖钧與 圖48之間相同的步驟係以相同的元件符號予以識別。因 此,該主機及該安全服務模組系統首先進行鑑認(箭頭 122367.doc -114- 200820037 1202,1204)。該使用權伺服器提供該使用權檔案及該密 鑰ID(但疋無該密鑰值)給該主機,且該主機將轉遞所提供 之該使用權檔案及該密鑰ID連同該主機想要調用之該drm 應用程式的ID至該安全服務模組系統。該主機亦傳送播放 機貧訊(箭頭1206’)。接著,該安全服務模組系統係透過對 應於該選擇出之應用程式之通訊管道,而轉遞該使用權檀 案及該密鑰ID至該選擇出之DRM應用程式(箭頭12〇8)。接 著,該DRM應用程式請求將該使用權檔案寫入至隱藏分割 區之中(箭頭1210)。當已經如此寫入該使用權檔案時,該 安全服務模組系統通知該DRM應用程式(箭頭。接 著,該DRM應用程式請求該安全服務模組系統產生一密鑰 值、建立一内容加密密鑰物件、儲存該密鑰值於其中及使 該内容加密密鑰物件相關聯於一DRM應用程式之(箭頭 1214,)。纟已經符合該請求之後,該安全服務模組系統傳 送一通知給該DRM應用程式(箭頭1216)。接著,該DRM應 用程式將請求該安全服務模組纟統根據由主機傳送之播放 機貧訊’而委派對該内容加密㈣物件之讀取存取權給該 播放機存取控制記錄(箭頭1218)。當其係完成時,該安全 服務模組系統因而通知該DRM應用程式(箭頭122〇)。接 者’該DRM應用程式向該安全服務模組系統通知已經儲存 該使用權’其中,該通知係藉由一回呼功能透過該通訊管 被傳运(前頭1222)。此項通知被轉遞至該使用權伺服 器(箭頭1224)。該使用權伺服器接著傳送相關聯於一密錄 D之内4檔案至該安全服務模組系統(箭頭η%)。該安全 122367.doc -115- 200820037 服務模組系統以該密鑰10所識別之該密鑰值加密該内容, 而不牵涉到任何應用程式。如此加密及儲存於該卡上之内 容係可以使用圖47之協定而被播放。 於上述之單次密碼及DRM實施例中,該特徵組延伸 及1102’可含有許多不同的單次密碼及drm應用程式,以 供主機裝置選擇。使用者具有選擇及調用所要裝置内部應 用程式之選擇機會 雖然如此’介於該安全服務模組與該 特徵組延伸之間之整體關係係維持相同,使得使用者及資 料提供者可使用標準的協定組,以用於與該安全服務模组 互動及用於調用該特徵組延伸。使用者及提供者係不需要 變成牵涉到許多不同的裝置内部應用程式之特質,該等裝 置内部應用程式之一些者可以係專屬的。 再者,該等供應協定可些微不同,如同於圖46及48之情 況。在圖46之情況下,該使用權物件含有_密鍮值,然二 在圖48之情況下,該使用權物件無密鑰值。此差異要求略 微不同的協定,如上文所述。然而,圖47中之播放係相同 的,而不論如何供應該使用權◎因此,此差異將僅關於内 容提供者及散佈者,然而典型地係與消費者無關,消費者 t型地係僅牽涉到播放階段。因此,此架構提供給内容提 供者及散佈者客製化協定的大彈性,同時維持顧客容易使 用月顯地,自兩組以上供應協定所供應之資料推導而來 的資訊係可以仍然可使用第二協定存取。 由上述之實施例所提供之另一優點係,雖然外部實體 (諸如使用者)及該等裝置内部應用程式可共用對由該安全 122367.doc •116- 200820037 性資料結構所控制之資料的使用,但是使用者僅能夠存取 由該等裝置内部應用程式自所儲存的資料推導出之結果。 因此於該單次密碼之實施例中,該經過該等主機裝置之 使用者僅月b夠獲得該單次密碼,而無法獲得該種子值。於 二DRM貝施例中,該經過該等主機裝置之使用者係僅能夠 獲得所呈現的内容,然而不存取該使用權檔案或密碼編譯 密鑰。此特徵係允許消費者方便,而不損及安全性。 , 於—〇譲實施例中,該等裝置内部應用程式及主機皆不 ^ 能存取該等密碼編譯密鑰;僅該安全性資料結構可存取該 等也碼、扁#雄、鑰。於其他實施例中,除了該安全性資料結 構以外之實體係亦能夠存取該密碼編譯密鍮。該等密餘亦 能夠藉由該等裝置内部應用程式所產生,且接著由該安全 性資料結構所控制。 存取該等裝置内部應用程式及存取資訊(例如,單次密 馬及所呈現之内谷)係受控於相同的安全性資料結構。此 減少控制系統及成本之複雜度。 〇 ^ 藉由提供自該内部存取控制記錄(其控制對該等裝置内 邠應用%式之存取)委派存取權給一存取控制記錄(其控制 該等主機存取由調用該等裝置内部應用程式所獲得之資 訊)之能力’此特徵使達成上述特徵及功能係可能的。 應用程式特定之廢止方案 當被調用一裝置内部應用程式係時,亦可被修改該安全 性貧料結構之存取控制協定。舉例而言,該憑證廢止協定 可以係一使用憑證廢止清單之標準協定或一專屬協定。因 122367.doc -117- 200820037 藉㈣用1徵組延伸,該標準的憑證廢止清單廢止 協定可被-特徵組延伸專屬協定所取代。 二支迅廢止清單廢止方案,安全儲存應用程式 1 -駐留於該裝置㈣特定内部制程式,能夠透過介於 该裝置内部應用程式盘 、 矛式與4憑證授權單位或任何其他廢止授 權單位之間之—釔古、s〜 ^ ^ #有通巩通道而廢止主機。該内部應用程 式專屬廢止方孝传每阳 系係又限於該主機-應用程式之關係。 Ο C) 當組態應_式特h廢止方案時,該安全儲存應用程 ,、糸、、先將拒絕該憑證廢止清單(假如被提供),否則將使用 “及β專屬應用程式資料(S前透過—應用程式特定 通訊管道予以提供),以決定是否該給定的憑證被廢止。 文所述,—存取控制記錄係藉由指定-廢止值,而 疋種廢止方案(無廢止方案、標準憑證廢止清單方案 Μ用%式特定廢止方案)之哪一者被採用。當選擇該應 用^式特疋廢止方案選項時,該存取控制記錄將亦指定用 於:理該廢止方案之内部應用程式ID之一ID,且該憑證廢 止清單到期時期/APP—ID欄位内之值將對應於管理該廢止 ^案之内部應用程式ID。當鑑認該裝置時,安全儲存應用 %式系統接著將支持該内部應用程式之專屬方案。 士不以另一組協定取代一組協定,一裝置内部應用程式之 调用可對已經由該安全儲存應用程式所行使之存取控制賦 =額:的存取條件。舉例而言,可由一特徵組延伸進一步 2細檢查存取内容加密密鑰内之一密鑰值之權利。在該安 王儲存應用程式系統決定一存取控制記錄具有對一密餘值 122367.doc -118- 200820037 之存取權利之後,將在授 延 彈 杈于σ亥存取之别查詢該特徵組 此特徵允許内容擁有者控制對該内容之存取的大 性0 將瞭解的 齊,本發 義0 雖…、:上文已參照各種實施例而敘述本發明, 疋,可實行變化及修改,而未不偏離本發明之範 明之範㈣由後附申料圍及其均等物所定 【圖式簡單說明】The private π-seeking security service module system reads the data associated with the key ID (i.e., the 'right to use') (arrow 125 〇). The security service module does not know the information (4) that it is requested to read, and the request is processed from the feature group extension to implement the data reading process. The security service module system reads data (i.e., usage rights) from the hidden partition and provides the information to the DRM application (arrow m2). Next, the drm application interprets the data and checks the usage rights information in the data to see if the usage rights are valid. If the usage right is still valid, the application will notify the security service module system to permit content decryption (arrow 1254). Next, the full-service module system uses the content encryption key object. The value decrypts the content of the request and provides the decrypted content to the host for playback (arrow 1256). If the usage right is no longer valid, the request for content access is denied. If no secret is provided within the usage rights from the usage server, the usage rights and content downloads will be slightly different from the one shown in the figure. Such different schemes are shown in the agreement diagram of Figure 48. The same steps between Figure 钧 and Figure 48 are identified by the same component symbol. Therefore, the host and the security service module system are first authenticated (arrow 122367.doc -114- 200820037 1202, 1204) The usage right server provides the usage rights file and the key ID (but no such key value) to the host, and the host will forward the provided usage rights file and the key ID together with the host The ID of the drm application is to be called to the security service module system. The host also transmits the player's poor message (arrow 1206'). Then, the security service module system transmits the application corresponding to the selected one. The communication pipeline forwards the usage rights and the key ID to the selected DRM application (arrow 12〇8). Then, the DRM application requests to write the usage right file to the hidden partition. Among (arrow 1210). When the usage rights file has been written in this way, the security service module system notifies the DRM application (arrow. Then, the DRM application requests the security service module system to generate a key value, establish a content encryption key object, storing the key value therein and associating the content encryption key object with a DRM application (arrow 1214). After the request has been met, the security service module system transmits A notification to the DRM application (arrow 1216). The DRM application will then request the security service module to delegate read access to the content (four) object based on the player's poor message transmitted by the host. The player is given access control record (arrow 1218). When the system is completed, the security service module system thus notifies the DRM application (arrow 122). The recipient of the DRM application to the security service module The group system notifies that the usage right has been stored, wherein the notification is transmitted through the communication tube by a callback function (front 1222). The notification is forwarded to the usage right. The server (arrow 1224). The usage server then transmits the 4 files associated with a cipher D to the security service module system (arrow η%). The security 122367.doc -115- 200820037 service module The system encrypts the content with the key value identified by the key 10 without involving any application. The content so encrypted and stored on the card can be played using the protocol of Figure 47. In the secondary password and DRM embodiments, the feature set extension and 1102' may contain a number of different single-password and drm applications for host device selection. The user has the option of selecting and invoking the desired internal application of the device. 'The overall relationship between the security service module and the feature set extension remains the same, enabling users and data providers to use standard protocol groups for interaction with the security service module and for invoking This feature set extends. Users and providers do not need to be traits that involve many different internal applications of the device, and some of the internal applications of such devices can be proprietary. Furthermore, the supply agreements may be slightly different, as in the case of Figures 46 and 48. In the case of Fig. 46, the usage right object contains a _ secret value, and in the case of Fig. 48, the usage right object has no key value. This difference requires slightly different agreements, as described above. However, the playback in Figure 47 is the same, regardless of how the usage rights are provided. Therefore, this difference will only be with the content provider and the distributor, but typically it is not related to the consumer, and the consumer t-type system is only involved. To the playback stage. Therefore, this architecture provides great flexibility to content providers and distributors to customize agreements, while maintaining easy access to customers, and information derived from data supplied by more than two supply agreements can still be used. Two agreement access. Another advantage provided by the above embodiments is that external entities (such as users) and internal applications of the devices can share the use of data controlled by the security 122367.doc • 116- 200820037 data structure. However, the user can only access the results derived from the stored data by the internal applications of the devices. Therefore, in the embodiment of the single-password, the user who passes through the host devices can obtain the single password only for the month b, and the seed value cannot be obtained. In the second DRM embodiment, the user of the host device is only able to obtain the presented content, but does not access the usage rights file or password compilation key. This feature allows the consumer to be convenient without compromising security. In the embodiment, the internal application and the host of the device do not have access to the cryptographic key; only the security data structure can access the code, the squad, and the key. In other embodiments, the real system other than the security profile can also access the cryptographic key. The secrets can also be generated by the internal applications of the devices and then controlled by the security data structure. Access to the internal applications of such devices and access to information (eg, a single cipher and the inner valley presented) are controlled by the same security data structure. This reduces the complexity of the control system and cost.委 ^ by delegating access from the internal access control record (which controls access to % of the devices in the device) to an access control record (which controls the host access by calling the etc.) The ability to obtain information from the internal applications of the device' This feature makes it possible to achieve the above features and functions. Application-specific abolition scheme When an internal application system is invoked, the access control protocol for the security lean structure can also be modified. For example, the voucher revocation agreement may be a standard agreement or a proprietary agreement that uses the voucher revocation list. Because of the extension of the 1 levy group, the revoked list of vouchers of the standard can be replaced by the exclusive agreement of the feature group extension. Two quick abolition list abolition scheme, secure storage application 1 - resides in the device (4) specific internal programming, can be between the device internal application disk, spear and 4 certificate authority or any other abolished authorization unit - 钇古, s~ ^ ^ #有通巩 channels and abolish the host. This internal application exclusive abolished Fang Xiaochuan's yang system is limited to this host-application relationship. Ο C) When the configuration should be _typed, the safe storage application, 糸, 、 will reject the vouchers list (if provided), otherwise it will use “and β-specific application data (S Pre-existing through the application-specific communication pipeline to determine whether the given certificate is revoked. As stated, the access control record is specified by the abolition value and the abolition scheme (no abolition scheme, The standard voucher revocation list scheme uses which of the % specific abolition schemes is adopted. When the application option is selected, the access control record is also specified for: the internals of the abolition scheme One of the application ID IDs, and the value in the voucher revocation list expiration period/APP-ID field will correspond to the internal application ID that manages the abolition case. When the device is authenticated, the secure storage application % The system will then support the proprietary solution of the internal application. The set of agreements is replaced by another set of agreements, and the invocation of a device internal application can be performed by the secure storage application. The access control grants the amount of access conditions. For example, a feature group extension can further check the right to access one of the key values in the content encryption key. The Anwang storage application system determines one. After the access control record has access rights to a secret value of 122367.doc -118-200820037, the feature set will be queried during the grant of the grant to the σH. This feature allows the content owner to control the content. The nature of the access will be understood, and the present invention will be described with reference to various embodiments, and variations and modifications may be made without departing from the scope of the invention. (4) Set by the attached application and its equals [Simplified description of the drawings]

Ο /圖1繪示有助於闡釋本發明之與主機裝置通訊之記憶體 系統之方塊圖。 “ 圖2繪示有助於闡釋本發明之不同實施例之記憶體的不 同分割區及儲存於不同分割區之未經加密及經加密檔案之 不思圖,其中,對某些分割區及經加密檔案之存取係由存 取原則及鐘認程序所控制。 圖3繪不記憶體内不同分割區之記憶體的示意圖。 圖4繪示有助於闡釋本發明之不同實施例之示於圖3之記 憶體的不同分割區之檔案位置表的示意圖,其中,該等分 割區内某些檔案係被加密。 圖5繪示有助於闡釋本發明之不同實施例之一存取控制 記錄群組内之存取控制記錄及相關密鑰參照之示意圖。 圖6繪示有助於闡釋本發明之不同實施例之由存取控制 記錄群組及存取控制記錄所形成之樹狀結構之示意圖。 圖7繪示存取控制記錄群組之三個樹狀階層架構之樹的 示意圖’以闡釋樹的形式程序。 圖8Α及8Β繪示由一主機裝置及一諸如一記憶體卡之記 122367.doc •119- 200820037 憶體裝置所實行用於建立及佬 汉便用系統存取控制記錄之程 序的流程圖。 圖9繪示有助於闡釋本發明之不同實施例之一使用一系 統存取控制記錄以建立一存取 仔取控制纪錄群組之程序的流程 圖。 圖1〇緣示—用於建立—存取控制記錄之程序的流程圖。 圖11繪示樹狀階層架構之特定應用程式的兩個存取控制 記錄群組之示意圖。 ί ί) 圖12繪示一用於委派牲 女獻特疋權利之程序的流程圖。 圖1 3繪示一存取控告| °己錄群組及一存取控制記錄之示意 圖,以闡釋圖12之委派特程序。 圖14纟會示用於建立一 … 用於加役及/或解密用途之密鑰的 程序的流程圖。 圖1 5緣示一用於根撼— 據存取控制記錄移除存取權及/或 貧料存取權限之程序的流程圖。 用於田存取權及/或存取權限係已經被刪除 或已經過期時請求存取的程序的流程圖。 圖17Α及17Β緣示有助於 助於閣釋本發明之不同實施例之用 於鑑纟忍及授予存取密碼 $ + 一立 馬ν扁澤费鑰之原則之規則結構的組織 之不意圖。 示—用於根據原則來控制對受 取的 替代方法之資料結構的方塊圖。 :9繪7F使用密碼之鑑認程序的流程圖。 繪不若干主—鏈m 122367.doc -120- 200820037 圖21繪示若干裝置憑證鏈之圖式。 圖22及圖23(包含圖23 A及23B)繪示用於單向及互相鑑認 方案之程式的協定圖。 圖24繪示有助於闡釋本發明之一項實施例之一憑證鏈之 圖式。Ο / Figure 1 illustrates a block diagram of a memory system that facilitates communication with a host device in accordance with the present invention. FIG. 2 illustrates an unencrypted and encrypted file stored in different partitions of the memory of different embodiments of the present invention, wherein some partitions and The access to the encrypted file is controlled by the access principle and the clock recognition program. Figure 3 depicts a schematic diagram of memory that does not store different partitions within the body. Figure 4 illustrates a different embodiment of the present invention to facilitate the interpretation of the present invention. 3 is a schematic diagram of a file location table of different partitions of the memory of FIG. 3, wherein certain files in the partitions are encrypted. Figure 5 illustrates an access control record that facilitates explaining one of the different embodiments of the present invention. A schematic diagram of access control records and associated key references within a group. Figure 6 illustrates a tree structure formed by access control record groups and access control records to facilitate the interpretation of various embodiments of the present invention. Figure 7 is a schematic diagram of a tree of three tree hierarchy structures of an access control record group to illustrate the procedure of the tree. Figures 8 and 8 illustrate a host device and a memory card such as a memory card. 122367.doc • 119- 200820037 A flow chart of a program for establishing and accessing a system access control record is implemented by the memory device. Figure 9 is a diagram illustrating the use of a system access control record to facilitate the interpretation of one of the various embodiments of the present invention. A flow chart for establishing a program for accessing a control record group. Figure 1 is a flow chart showing a procedure for establishing an access control record. Figure 11 is a diagram showing a specific application of a tree hierarchy structure. A schematic diagram of two access control record groups. Figure 12 depicts a flow chart for a procedure for delegating a child's rights to the rights of the child. Figure 13 shows an access control report. A schematic diagram of an access control record to illustrate the delegating procedure of Figure 12. Figure 14A shows a flow diagram of a procedure for establishing a key for an escalation and/or decryption use. A flow chart for a procedure for removing access rights and/or poor access rights based on access control records. When the access rights and/or access rights for the field have been deleted or have expired Flowchart of the program requesting access. Figure 17Α and 17Β </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> A block diagram that controls the data structure of the accepted alternative method. : 9 depicts the flow chart of the 7F password-using authentication procedure. No main-chain m 122367.doc -120- 200820037 Figure 21 shows several device credential chains Figure 22 and Figure 23 (including Figures 23A and 23B) illustrate a protocol diagram for a unidirectional and mutual authentication scheme. Figure 24 illustrates one of the embodiments of the present invention. The schema of the credential chain.

/ I/ I

,圖25緣不在憑證緩衝區之前之一控制區段内的資訊的 表,泫資訊係由該主機傳送,用於傳送最後一憑證至一記 體衣置,其係顯示該憑證係該憑證鏈内最後一憑證之一 項才曰示,以闡釋本發明之另一項實施例。 圖26及27係分別顯示用於鑑認方案之卡及主機程序的流 程圖,其中,一記憶體卡正在鑑認一主機裝置。 圖28及29係分職示用於鑑認方案之卡及主機程序的流 程圖,其中,主機裝置正在鑑認一記憶體卡。 囷及3 1、、'q示刀別由一主機裝置及一記憶體裝置所實施 之私序的w &amp;圖’ |中’該主機裝置擷取儲存於該記憶體 裝置内的憑證廢止清單,以闡釋本發明之另_項實施例。 圖32緣tf列出憑證廢止清單内之欄位的憑證廢止清單圖 式,以闡釋本發明之另一項實施例。 回33及34分別緣示用於使用憑證廢止清單來驗證憑證之 卡及主機程序的流程圖。 圖3S緣示用於卡對傳 寻k至忒主機之_貝料加上簽名及用於 自该主機解密資料的卡程序的流程圖。 圖3 6繪示主機程序六 之次…a ’其中’卡對傳送至該主機 之貝枓加上簽名。 122367.doc -121 - 200820037 圖37繪示主機程序的流程圖,其中,該主機傳送經加密 資料至該記憶體卡。 圖38及39分別繪示用於一般資訊查詢及謹慎資訊查詢之 程序的流程圖。 圖4 0 A係一 §己憶體裝置(諸如一快閃記憶體卡)連接至一 主機裝置的系統架構之功能方塊圖,以闡釋本發明之一項 實施例。 圖40B繪示圖40A之安全服務模組核心的内部軟體模組 之功能方塊圖。 圖41繪示用於建立單次密碼之系統之方塊圖。 圖42繪示單次密碼種子供應及單次密碼產生之功能方塊 圖。 圖43繪示種子供應階段的協定圖。 圖44繪示單次密碼產生階段的協定圖。 圖45繪示DRM系統的功能方塊圖。 圖46繪示用於使用權供應及内容下載之程序的協定圖, 其中,使用權物件中提供密鑰。 圖47繪示用於播放操作之程序的協定圖。 圖48繪示一用於使用權供應及内容下載之程序的協定 圖,其中,使用權物件中未提供密鑰。 【主要元件符號說明】 10 記憶體系統 10, 記憶體卡或記憶體條 12 中央處理單元 122367.doc •122- 200820037 12a 中央處理單元隨機存取記憶體 14 緩衝管理單元(BMU) 16 主機介面模組(HIM) 18 快閃記憶體介面模組(FIM) 20 快閃記憶體 22 周邊裝置存取模組(PAM) 24 主機裝置 26 主機介面匯流排 26a 埠 28 快閃記憶體介面匯流排 28a 埠 32 主機直接記憶體存取(HDMA) 34 快閃直接記憶體存取(FDMA) 36 仲裁器 38 緩衝隨機存取記憶體(BRAM) 40 密碼編譯引擎 101 檔案 102及 104 檔案 106 未經加密檔案 130 根存取控制記錄群組 132 根存取控制記錄群組 502 主機根憑證授權單位憑證 504 主機1憑證授權單位(第二層級 506 主機憑證 122367.doc • 123 200820037 508 主機η憑證授權單位(第二層級)憑證 510 主機1憑證授權單位(第三層級)憑證 512 主機憑證 514 主機憑證 520 裝置根憑證授權單位憑證 522 裝置1憑證授權單位(製造商)憑證 524 裝置憑證 526 裝置η憑證授權單位(製造商)憑證 528 裝置憑證 542 安全服務模組系統 540 主機糸統 550 存取控制記錄 548 主機根憑證 544 主機憑證 546 主機公開密鑰 549 中間憑證授權單位 554 隨機號碼 547 私有密鑰 562 隨機號碼 590 憑證鍵 590(1) 憑證鏈 590(2) 憑證 590(9) 憑證 591 、 593 、 595 、 憑證串 122367.doc -124- 200820037 597及599 1000 系統架構 1002 安全儲存應用程式傳輸層 1004 安全服務模組核心 1006 安全服務模組核心API 1008 安全性應用程式管理員模組 1010 裝置内部應用程式 1011 裝置管理系統 1012 密碼編譯庫 1022 安全儲存應用程式命令處理常 1024 安全儲存應用程式管理員 1026 安全儲存應用程式資料庫 1028 安全儲存應用程式非安全操作 1030 安全儲存應用程式安全操作模 1032 模組 1034 模組 1050 系統 1052 鑑認伺服器 1054 網際網路伺服器 1056 使用者 1058 符記 1100 安全儲存應用程式特徵組延伸 1101 存取控制記錄 1101,、1103丨及 控制結構 統 122367.doc -125- 200820037 ΟFigure 25 is a table of information in one of the control sections before the credential buffer, and the information is transmitted by the host for transmitting the last credential to a record, which is the voucher chain One of the last vouchers is shown to illustrate another embodiment of the present invention. Figures 26 and 27 are flow diagrams showing the card and host program for the authentication scheme, respectively, wherein a memory card is authenticating a host device. Figures 28 and 29 are flow diagrams of the card and host program for the authentication scheme, wherein the host device is authenticating a memory card.囷 3 3 3 3 3 3 3 ' ' ' ' ' ' 由 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机To explain another embodiment of the present invention. The edge tf of Figure 32 lists the document revocation list schema for the fields in the voucher revocation list to illustrate another embodiment of the present invention. Referring back to 33 and 34, respectively, a flow chart for the card and host program for verifying the voucher using the voucher revocation list. Figure 3S shows a flow chart for a card program for card-to-carrying to the host and for signing and for decrypting the data from the host. Figure 36 shows the host program six times...a 'where the card is signed to the shell transmitted to the host. 122367.doc -121 - 200820037 Figure 37 illustrates a flow diagram of a host program in which the host transmits encrypted data to the memory card. 38 and 39 are flowcharts showing procedures for general information inquiry and cautious information inquiry, respectively. Figure 4 is a functional block diagram of a system architecture of a host device (such as a flash memory card) coupled to a host device to illustrate an embodiment of the present invention. 40B is a functional block diagram of an internal software module of the core of the security service module of FIG. 40A. Figure 41 is a block diagram of a system for establishing a one-time password. Figure 42 is a block diagram showing the function of a single password seed supply and a single password generation. Figure 43 depicts an agreement diagram for the seed supply phase. Figure 44 illustrates a protocol diagram for a single password generation phase. Figure 45 is a functional block diagram of the DRM system. Figure 46 is a diagram showing a protocol for a procedure for usage rights provisioning and content downloading, in which a key is provided in a usage rights object. Figure 47 is a diagram showing the protocol for a program for a playback operation. Figure 48 is a diagram showing a protocol for a procedure for use rights provisioning and content downloading in which a key is not provided in the usage rights object. [Main component symbol description] 10 Memory system 10, memory card or memory bank 12 Central processing unit 122367.doc • 122- 200820037 12a Central processing unit random access memory 14 Buffer management unit (BMU) 16 Host interface module Group (HIM) 18 Flash Memory Interface Module (FIM) 20 Flash Memory 22 Peripheral Access Module (PAM) 24 Host Device 26 Host Interface Bus 26a 埠 28 Flash Memory Interface Bus 28a 埠32 Host Direct Memory Access (HDMA) 34 Flash Direct Memory Access (FDMA) 36 Arbiter 38 Buffered Random Access Memory (BRAM) 40 Password Compilation Engine 101 Files 102 and 104 Files 106 Unencrypted Files 130 Root access control record group 132 root access control record group 502 host root certificate authority unit certificate 504 host 1 certificate authority unit (second level 506 host certificate 122367.doc • 123 200820037 508 host n certificate authority unit (second Level) Credential 510 Host 1 Credential Authorization Unit (Level 3) Credential 512 Host Credential 514 Host Credential 520 Device Document Authorization Unit Document 522 Device 1 Document Authorization Unit (Manufacturer) Document 524 Device Document 526 Device n Document Authorization Unit (Manufacturer) Document 528 Device Document 542 Security Service Module System 540 Host System 550 Access Control Record 548 Host Root Credential 544 Host Credential 546 Host Public Key 549 Intermediate Credential Authorization Unit 554 Random Number 547 Private Key 562 Random Number 590 Credential Key 590(1) Credential Chain 590(2) Credential 590(9) Credential 591, 593, 595, Credential String 122367.doc -124- 200820037 597 and 599 1000 System Architecture 1002 Secure Storage Application Transport Layer 1004 Security Service Module Core 1006 Security Service Module Core API 1008 Security Application Administrator Module 1010 Device Internal Application 1011 Device Management System 1012 Password Compilation Library 1022 Secure Storage Application Command Processing Normal 1024 Secure Storage Application Administrator 1026 Secure Storage Application Database 1028 Secure Storage Application Non-Security Operation 1030 Secure Storage Application Security Operation Mode 1032 Module 1034 Module 1050 System 1052 Authentication Server 1054 Internet Server 1056 User 1058 Symbol 1100 Secure Storage Application Feature Group Extension 1101 Access Control Record 1101, 1103 and Control Structure 122367.doc -125- 200820037 Ο

1106* 1102 軟體程式碼特徵組延伸 11021 特徵組延伸應用程式 1103 存取控制記錄 1104 通訊管道 1104, 通訊管道 1106 應用程式存取控制記錄 1106 存取控制記錄 1108 丨 連結(關聯性) 1110 存取控制記錄 1110’ 存取控制記錄 1114 安全資料物件 1114* 内容加密密鑰 1116 身份物件 1120 身份物件 1122 身份物件 122367.doc 126-1106* 1102 Software Code Feature Group Extension 11021 Feature Group Extension Application 1103 Access Control Record 1104 Communication Pipeline 1104, Communication Pipeline 1106 Application Access Control Record 1106 Access Control Record 1108 丨 Link (Affinity) 1110 Access Control Record 1110' Access Control Record 1114 Security Data Object 1114* Content Encryption Key 1116 Identity Object 1120 Identity Object 1122 Identity Object 122367.doc 126-

Claims (1)

200820037 十、申請專利範圍: 1· 一種用於由一第二實體鑑認一第一實體之方法,其 含: 、 於邊第二實體處接收一憑證鏈,以用於向該第二實體 鉍^ 4第一實體,該憑證鏈包含複數個連續的憑證串, 違等憑證串個別包含至少一憑證; 该第二實體係以一序列驗證該憑證鏈内之憑證串,其 ^一實體處以该序列接收該憑證鍵内之該蓉 ( 證串;及 心 於&quot;亥第二實體處偵測是否已接收到完整的憑證鏈。 2·=叫求項1之方法,其中,該偵測係偵測是否由該第二 貝體所接收之該等憑證之至少一者係該憑證鏈之最後_ 憑證。 3·如明求項2之方法,其係進一步包含驗證所接收到 等憑證。 ~ 4·=明求項2之方法,其中,該憑證鏈内之該最後一憑證 含有一其係該憑證鏈内之該最後一憑證之指示,且該偵 測係偵测該指示。 、 月求項2之方法’其中’該第一實體包含一記憶體裝 置且遠第二實體包含一主機裝置,該記憶體裝置係以 可卸除方式連接至該主機裝置。 如明求項5之方法’其進一步包含在接收到該憑證鏈内 =該最後一憑證之後除外,該第二實體在接收到該等憑 串之每一者之後,以該序列傳送一對於下一憑證串之 122367.doc 200820037 1月求至該第一實體。 7·如請求項6之方法,其進, 自該第二實體的每一請求 該第二實體。 8·如請求項1之方法,其中 置,且該第一實體包含一 可卸除方式連接至該主機 9·如請求項1之方法,其中 卡。 N 步包含该弟一實體回應於來 ,而傳送該等憑證串之一者至 ’該第二實體包含一記憶體裝 主機裝置,該記憶體裝置係以 裝置。 ’該第二實體包含一記憶體 10. 如請求項1之方法, 送該等憑證串至該第 該第一實體。 其進一步包含根據該序列連續地傳 二實體,以用於向該第二實體鑑認 η·如睛求項1之方法,#中,該等憑證串之每-者包含〆 :證,該第二實體包含-記憶體震置,該方法進-步包 :將在:第二實體處接收之該等憑證儲存於該記憶體裝 置中’其中’儲存於該記憶體裝置中之該憑證鏈内惟最 後-憑證除外的每—憑證被在該第二實體處接收之下一 憑證所覆寫。 月求員11之方法’其進一步包含在該記憶體裝置中配 置不起過足夠儲存一憑證之記憶體空間。 13· —種用於由_第二實體鑑認一第一實體之方法,其包 含: / —傳送憑证鏈至該第二實體,以用於向該第二實體鑑認 該第實體,該憑證鏈包含複數個連續的憑證串,該等 122367.doc 200820037 憑證串個別包含至少一憑證; 3亥第二實體係以-順序連續地驗證該憑證鏈内之該等 憑證串’其中’該憑證鏈内之該等憑W係以該順序予 以連續傳送。 I 14·如請求項13之方法’該第二實體係於一驗證程序中驗證 傳送至該第二實體之該等憑證,且當傳送至該第二實體 之至少一憑證係於該驗證程序中失敗時,該方法進一步 包含終止該驗證程序且傳送該終止之_項指示至二 實體。 15·如請求項14之方法’其進一步包含於該第一實體處接收 δ亥指不,且當該指示被接收時,停止該傳送。 16·如請求項13之方法,其中,傳送至該第二實體之該憑證 鏈内最後-憑證含有其係該憑證鏈内最後一憑證之指 ✓ ° 月长項13之方法,其中,該第_實體包含一記憶體裝 置且.亥第一實體包含一主機袭置,該記憶體裝置係以 可卸除方式連接至該主機裝置。 18·如:求項17之方法,其進一步包含在接收到該憑證鏈内 j亥最後一憑證之後除外,該第二實體在接收到該等憑 :串之每-者之後,以該順序傳送一對於下一憑證串之 睛求至該第一實體。 項18之方法,其進_步包含該第—實體回應於來 」亥弟二實體的每一請求,而傳送該等憑證串之一者至 该第二實體。 122367.doc 200820037 :长二3之方法,其中’該第二實體包含一記憶體裝 ,且該第—實體包含—主機裝置,該記憶體裝置係以 可卸除方式連接至該主機裝置。 21.如請求項13之方法’其中,該等憑證串之每一者包含一 :證,該第二實體係於一驗證程序中驗證該等憑證,且 其中,該傳㈣料傳送料憑證鏈至該k實體,以 用於向该弟二實體礙切兮结 供 、貫體銓5心6亥弟一實體,直到已經傳送該憑 〇立鏈内所有憑證為止,、, % 除非傳迗至該第二實體之該等憑 迅中之至少一憑證於該驗證程序中失敗。 22 ·如請求項j 3之方 套,、中,該第二實體包含一記憶體 卞0 23.如請求項13之方法, τ β寺憑證串之母一者包含一 憑證,該第二實體包含一 匕各w己隱體,該方法進一步包含將 在該第二實體處接收之兮# ;馬今 ' 收之°亥等憑适儲存於該記憶體中,豆 中’儲存於該記情,夕兮瑪 八 — U體之忒憑證鏈内惟最後一憑證除 Ο 母一憑證被在該第一眚 乐一a體處接收之下一憑證所覆寫。 24·如請求項23之方 ^ 套/、進一步包含在該記憶體裝置中配 置不超過足夠儲左 am 配 Ί储存一憑證之記憶體空間。 25· —種用於在_第一 、 ^實體與一第二實體之間相互鑑認之方 法,其包含: (a)於該弟二督辨 體處接收一弟一憑證鏈,以用於向哕 二實體鑑認該第—眚 μ弟 的,馬 ㈣“第一憑證鏈包含複數個連續 一::上二弟—憑證鏈内之該等憑證串個別包含至少 ^ ^第一實體係以一第一順序連續地驗證該第一 122367.doc 200820037 憑證鏈内之該等憑證串,其中,於該第二實體處以該第 一順序連續接收該第一憑證鏈鏈内之該等憑證串; (b) 於該第二實體處偵測是否已接收到來自該第一實體 的完整第一憑證鏈; (c) 於該第一實體處接收一第二憑證鏈,以用於向該第 一實體鑑認該第二實體,該第二憑證鏈包含複數個連續 的憑證串,該第二憑證鏈内之該等憑證串個別包含至少 一憑證,該第一實體係以一第二順序連續地驗證該第二 憑證鏈内之該等憑證串,其中,該第二憑證鏈内之該等 憑證串係以該第一順序予以連續接收;及 (d) 於該第一實體處偵測是否已接收到來自該第二實體 的完整第一憑證鏈。 26. 如請求項25之方法,其中,於(b)或(d)中之該偵測係偵 測是否所接收之該等憑證之至少一者係該第一憑證鏈或 該第二憑證鏈之最後一憑證。 27. 如請求項26之方法,其進一步包含於(a)或(c)之後於一驗 證程序中驗證所接收到之該等憑證,且當傳送至該第一 實體或該第二實體之至少一憑證係於該驗證程序中失敗 時,終止該驗證程序。 28. 如請求項26之方法,其中,該第一憑證鏈或該第二憑證 鏈内之該最後一憑證含有一其係該憑證鏈内之該最後一 憑證之指示。 29. 如請求項25之方法,其中,該第一實體包含一記憶體裝 置,且該第二實體包含一主機裝置,該記憶體裝置係以 122367.doc 200820037 可卸除方式連接至該主機裝置。 3 ·如明求項29之方法,其進一步包含:惟在接收到該第一 ^從鏈或忒第二憑證鏈内之該最後一憑證串之後除外, 該第一實體及該第二實體在⑷或⑷中接收每-憑證串之 後’以該第_順序或該第二順序傳送—用於下—憑證串 之請求至另一實體。 :明求項30之方法’其進一步包含該第一實體及該第二 ί 只體之~者回應於來自該另_實體的每_請求,而傳送 該等憑證串之一者至該另一實體。 32·=請求^之方法,其中,該第二實體包含-記憶體裝 ’且㈣-實體包含-主機裝置,該記憶體裝置係以 可卸除方式連接至該主機裝置。 33.:請求項32之方法,其中,㈣二實體包含-記憶體 34·如請求項33之方法,其進一步白人 鏈至嗲第一举辨 乂匕3依序傳送該第一憑證 體。 Λ體’以用於向該第二實體鐘認該第一實 35. :睛未項25之方法,其進一步包含將於 收^該等憑證串儲存於該第—實體或㈣ §己憶體中,其中,儲存於該記,It體内之p i、 該第二憑證鏈内惟最後—憑證除憑證鏈或 ⑷或⑷中循序接收之第—序㈣Ί證串係被於 寫。 4禾二序列憑證所覆 36. 如請求項35之方法,其進一步包 在4 §己憶體中配置不 122367.doc 200820037 超過足夠儲存該等憑證串之一者的記憶體空間。 37· -種用於由—第二實體存取於_第—實體處之資料的系 統,該系統包含該第二實體,該第二實體包含一憑證鏈 内=憑證,該憑證鏈經調適成自該第二實體循序傳送至 二第實體,其中,被循序傳送之該憑證鏈的最後一憑 &quot;五含有一其係該憑證鏈内最後一憑證之指示。 认如請求項37之系統,其進一步包含一於該第一實體處之 ·' /置以用於在δ亥等憑證被接收之後儲存該等憑 二’其中,該儲存裝置使該第—實體處接收到的惟該憑 也鏈中最後-憑證除外的每—憑證被在該第—實體處接 收到之該憑證鏈中的下一憑證所覆寫。 39.如請求項38之系統,其中,該儲存裝置係配置不超過足 =存—憑證之記憶體空間,以儲存於該第-實體處所 接收之憑證。 4〇·如請求項37之系統,其中, 隹該弟一實體處加密該資 :&quot;該第二實體進—步包括一用於解密該資料之密鑰, 该憑證鏈較該密鑰係真實的,該密㈣具有―長度, 且傳送至該第二實體夕兮,巧 轉内每-憑證之長度不超 過该岔鑰之長度的4倍。 41·如請求項37之系統,盆中 v T 4弟一實體包含一非揮發性 吕己憶體裝置,且該第二實於句 A ^ 貫體包合—主機裝置,其係以可 卸除方式連接至該記憶體裝置。 42· —種供應資料至一主機 微展置之圯憶體系統,其包含: 一非揮發性記憶體,其能夠儲存資料; 122367.doc 200820037 系絲拉1裔m機I置係可卸除地連接至該記憶體 ^ 4控制益係透過一鑑認程序來控制該主機裝置 :非揮發性記憶體裳置中之資料的存取;200820037 X. Patent application scope: 1. A method for authenticating a first entity by a second entity, comprising: receiving a credential chain at a second entity for use in the second entity ^4, the first entity, the voucher chain comprises a plurality of consecutive voucher strings, the v. voucher strings individually comprise at least one voucher; the second real system verifies the credential string in the voucher chain in a sequence, the entity The sequence receives the certificate in the voucher key (the string of the certificate; and the heart of the second entity detects whether the complete voucher chain has been received. 2·= the method of claim 1, wherein the detection system Detecting whether at least one of the vouchers received by the second shell is the last _ credential of the credential chain. 3. The method of claim 2, further comprising verifying the received credential. The method of claim 2, wherein the last voucher in the voucher chain contains an indication that the last voucher in the voucher chain is, and the detection system detects the indication. The method of item 2, wherein 'the first entity contains a memory device and the far second entity comprises a host device, the memory device being detachably connected to the host device. The method of claim 5, wherein the method further comprises receiving the voucher chain = Except after the last voucher, the second entity, after receiving each of the voucher strings, transmits a sequence of 122367.doc 200820037 for the next voucher string to the first entity in the sequence. The method of claim 6, wherein the second entity is requested from each of the second entities. 8. The method of claim 1, wherein the first entity includes a detachable connection to the host 9. The method of claim 1, wherein the card N step comprises the brother entity responding to, and transmitting one of the credential strings to the second entity comprising a memory device host device, the memory device The device is a device. The second entity contains a memory 10. The method of claim 1 sends the certificate string to the first entity. It further comprises continuously transmitting two entities according to the sequence for use in To the The method of the second entity to identify η·如相求1, in #, each of the voucher strings includes 〆: certificate, the second entity contains - memory oscillating, the method further The voucher received at the second entity is stored in the memory device and wherein each voucher other than the last-voucher stored in the voucher chain is received at the second entity The next voucher is overwritten. The method of the monthly requester 11 further includes configuring a memory space in the memory device that does not have enough to store a voucher. 13·- for identifying the second entity by the second entity A method of a first entity, comprising: transmitting a credential chain to the second entity for authenticating the second entity to the second entity, the credential chain comprising a plurality of consecutive credential strings, the 122367. Doc 200820037 The credential string individually contains at least one credential; 3H second real system continuously verifies the credential strings in the credential chain in the order - 'where the ones in the credential chain are continuously transmitted in this order . I 14. The method of claim 13 'the second real system validating the credentials transmitted to the second entity in a verification procedure, and when at least one certificate transmitted to the second entity is in the verification program In the event of a failure, the method further includes terminating the verification procedure and transmitting the terminating item indication to the second entity. 15. The method of claim 14 further comprising receiving at the first entity δ, and stopping the transmission when the indication is received. The method of claim 13, wherein the last-voucher in the voucher chain transmitted to the second entity includes a method of referring to a mean value of the last voucher in the voucher chain, wherein the voucher is The entity comprises a memory device and the first entity comprises a host device, the memory device being detachably connected to the host device. 18. The method of claim 17, further comprising, after receiving the last voucher in the voucher chain, the second entity transmitting in the order after receiving each of the strings: A request is made to the first entity for the next credential string. The method of item 18, wherein the step-by-step comprises: transmitting, by the first entity, each request of the second entity to the second entity to the second entity. 122367.doc 200820037: The method of Chang 2, wherein the second entity comprises a memory device and the first entity comprises a host device, the memory device being detachably connected to the host device. 21. The method of claim 13 wherein each of the credential strings comprises a certificate that the second real system verifies in a verification procedure, and wherein the pass (four) material delivery voucher chain To the k entity, for obstructing the entanglement of the second entity, until the entity has transmitted all the vouchers in the reliance chain, %, unless passed to The at least one of the credentials of the second entity fails in the verification procedure. 22, as in the set of claim j 3, the second entity contains a memory 卞 0 23. As in the method of claim 13, the mother of the τ β temple credential string contains a voucher, the second entity Included in each of the hidden bodies, the method further comprises receiving the 兮# at the second entity; the horse is collected in the memory, and the bean is stored in the memory , 兮 兮 八 — U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U 忒 忒24. The method of claim 23, further comprising a memory space in the memory device that is not configured to store a voucher. 25. A method for mutual authentication between a _first, ^ entity and a second entity, comprising: (a) receiving a buddy chain at the discord of the brother Approving the first entity to the second entity, the horse (four) "the first voucher chain contains a plurality of consecutive ones: the second two brothers - the voucher strings in the voucher chain individually contain at least ^ ^ first real system to The first sequence sequentially verifies the plurality of credential strings in the first 122367.doc 200820037 credential chain, wherein the credential strings in the first credential chain are continuously received in the first order at the second entity; (b) detecting, at the second entity, whether a complete first credential chain from the first entity has been received; (c) receiving a second credential chain at the first entity for use in the first The entity authenticates the second entity, the second credential chain includes a plurality of consecutive credential strings, and the credential strings in the second credential chain individually comprise at least one credential, the first real system continuously in a second order Verifying the credential strings in the second credential chain, wherein the The plurality of credential strings in the credential chain are continuously received in the first order; and (d) detecting, at the first entity, whether a complete first credential chain from the second entity has been received. The method of item 25, wherein the detecting in (b) or (d) detects whether at least one of the received documents is the last voucher of the first voucher chain or the second voucher chain 27. The method of claim 26, further comprising verifying the received credentials in a verification procedure after (a) or (c), and transmitting to the first entity or the second entity The at least one voucher terminates the verification process when the verification process fails. 28. The method of claim 26, wherein the first voucher chain or the last voucher in the second voucher chain contains a 29. The method of claim 25, wherein the first entity comprises a memory device and the second entity comprises a host device, the memory device being 122367. Doc 200820037 Removable connection to this The method of claim 29, further comprising: except after receiving the last credential string in the first slave chain or the second credential chain, the first entity and the first The second entity, after receiving each credential string in (4) or (4), 'transfers in the _th order or the second order--for the next-voucher request to another entity. The method of claim 30' further includes The first entity and the second entity respond to each request from the other entity, and transmit one of the credential strings to the other entity. 32·=Request method ^ The second entity includes a -memory device and (4)-physical-host device, the memory device being detachably connected to the host device. 33. The method of claim 32, wherein the (four) two entity comprises a memory 34. The method of claim 33, wherein the further white chain to the first method identifies the first voucher. a method for the body to recognize the first entity 35. The method of claim 25, further comprising storing the certificate string in the first entity or (four) § memory Wherein, the pi stored in the record, It in the It, the last in the second voucher chain, the voucher in addition to the voucher chain or the sequential (4) cue string received sequentially in (4) or (4) is written. 4 and 2 Sequence Credentials 36. As in the method of claim 35, it is further configured in the 4 § Remembrance to not exceed the memory space of one of the voucher strings. 37. A system for accessing data at a _th entity by a second entity, the system comprising the second entity, the second entity comprising a voucher chain = voucher, the voucher chain being adapted The second entity is sequentially transmitted to the second entity, wherein the last attribute of the voucher chain that is sequentially transmitted &quot;five contains an indication that it is the last voucher in the voucher chain. The system of claim 37, further comprising: a location at the first entity for storing the credentials after the credentials are received, wherein the storage device causes the first entity to Each voucher received at the end of the chain, except for the last-voucher in the chain, is overwritten by the next voucher in the voucher chain received at the first entity. 39. The system of claim 38, wherein the storage device is configured to store no more than a memory space of the foot-storage voucher for storing the voucher received at the first entity. 4. The system of claim 37, wherein the entity is encrypted by the entity: &quot; the second entity further comprises a key for decrypting the data, the credential chain being compared to the key system Really, the secret (4) has a "length" and is transmitted to the second entity, and the length of each credential in the clever does not exceed 4 times the length of the key. 41. The system of claim 37, wherein the entity in the basin comprises a non-volatile LV-reminis device, and the second syllabus includes a host device, which is detachable The mode is connected to the memory device. 42. A supply of data to a host micro-displayed memory system, comprising: a non-volatile memory capable of storing data; 122367.doc 200820037 丝丝拉1 m machine I system detachable Connected to the memory ^4 control system through an authentication program to control the host device: access to the data in the non-volatile memory skirt; :、中4主機裝置傳送包含複數個憑證串之一憑證鏈 至忒圮fe體系統,該等憑證串之每一包含至少一憑證, 该控制mx-順序連續地驗證該等憑證串,1中,该 等憑證串係以該順序被傳送,且該控制器導致每一憑: 串被儲存於該非揮發性記憶體之中,且導致儲存於該非 揮發性記憶體内之至少—憑證串被在該憑證串被寫入之 後自該主機裝置接收到的一憑證串所覆寫。 43·如請求項42之記憶體系統,該控制器於任何時間下配置 不起過足夠儲存每一憑證串之記憶體空間。 44.如請求項42之記憶體系統,其中’該控制器係偵测是否 由該主機裝置所接收之該等憑證之至少一者係該憑證鏈 之最後一憑證。 45.如請求項44之記憶體系統,其中,該憑證鏈内之該最後 一憑證含有一其係該憑證鏈内之該最後一憑證之指示 該控制器偵測該指示。 46·如請求項42之記憶體系統,其中,該記憶體系統包含一 記憶體卡。 122367.docThe medium 4 host device transmits a voucher chain including a plurality of credential strings to the system, each of the credential strings includes at least one credential, and the control mx-sequentially verifies the credential strings continuously, 1 The voucher strings are transmitted in the order, and the controller causes each of the strings to be stored in the non-volatile memory and causes at least the voucher string stored in the non-volatile memory to be The credential string is overwritten by a credential string received from the host device after being written. 43. The memory system of claim 42, wherein the controller does not have enough memory space to store each credential string at any time. 44. The memory system of claim 42, wherein the controller is to detect whether at least one of the credentials received by the host device is the last credential of the credential chain. 45. The memory system of claim 44, wherein the last voucher in the voucher chain includes an indication that the last voucher in the voucher chain is the controller detecting the indication. 46. The memory system of claim 42, wherein the memory system comprises a memory card. 122367.doc
TW096124594A 2006-07-07 2007-07-06 Content control system and method using certificate chains TW200820037A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US81950706P 2006-07-07 2006-07-07
US11/557,028 US8140843B2 (en) 2006-07-07 2006-11-06 Content control method using certificate chains
US11/557,010 US20080010449A1 (en) 2006-07-07 2006-11-06 Content Control System Using Certificate Chains

Publications (1)

Publication Number Publication Date
TW200820037A true TW200820037A (en) 2008-05-01

Family

ID=38981952

Family Applications (1)

Application Number Title Priority Date Filing Date
TW096124594A TW200820037A (en) 2006-07-07 2007-07-06 Content control system and method using certificate chains

Country Status (5)

Country Link
EP (1) EP2038803A2 (en)
JP (1) JP2009543208A (en)
KR (1) KR20090026357A (en)
TW (1) TW200820037A (en)
WO (1) WO2008013656A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103116470A (en) * 2011-11-16 2013-05-22 群联电子股份有限公司 Memorizer storage device, memorizer controller and data string transmission and identification method
TWI576719B (en) * 2015-03-20 2017-04-01 伊克斯卡萊柏智慧財產有限責任公司 Secure service for receiving sensitive information through nested iframes

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743409B2 (en) 2005-07-08 2010-06-22 Sandisk Corporation Methods used in a mass storage device with automated credentials loading
US8365279B2 (en) 2008-10-31 2013-01-29 Sandisk Technologies Inc. Storage device and method for dynamic content tracing
US20100241852A1 (en) * 2009-03-20 2010-09-23 Rotem Sela Methods for Producing Products with Certificates and Keys
US8429365B2 (en) * 2009-06-26 2013-04-23 Sandisk Technologies Inc. Memory device and method for embedding host-identification information into content
CN104023009B (en) * 2014-05-26 2017-08-22 国云科技股份有限公司 A kind of Web system license validation method
CN108768664B (en) * 2018-06-06 2020-11-03 腾讯科技(深圳)有限公司 Key management method, device, system, storage medium and computer equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6189097B1 (en) * 1997-03-24 2001-02-13 Preview Systems, Inc. Digital Certificate
US6513116B1 (en) * 1997-05-16 2003-01-28 Liberate Technologies Security information acquisition
FR2825209A1 (en) * 2001-05-23 2002-11-29 Thomson Licensing Sa DEVICES AND METHOD FOR SECURING AND IDENTIFYING MESSAGES
EP1361527A1 (en) * 2002-05-07 2003-11-12 Sony Ericsson Mobile Communications AB Method for loading an application in a device, device and smart card therefor
JP3880957B2 (en) * 2003-10-20 2007-02-14 日本電信電話株式会社 Root certificate distribution system, root certificate distribution method, computer executable root certificate distribution program, server device, and client device
EP1836640A2 (en) * 2004-12-21 2007-09-26 SanDisk Corporation Memory system with versatile content control
EP1836642A2 (en) * 2004-12-21 2007-09-26 SanDisk Corporation Control structure for versatile content control and method using structure

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103116470A (en) * 2011-11-16 2013-05-22 群联电子股份有限公司 Memorizer storage device, memorizer controller and data string transmission and identification method
CN103116470B (en) * 2011-11-16 2016-04-13 群联电子股份有限公司 Memorizer memory devices, Memory Controller and serial data transmission and recognition methods
TWI576719B (en) * 2015-03-20 2017-04-01 伊克斯卡萊柏智慧財產有限責任公司 Secure service for receiving sensitive information through nested iframes

Also Published As

Publication number Publication date
EP2038803A2 (en) 2009-03-25
KR20090026357A (en) 2009-03-12
JP2009543208A (en) 2009-12-03
WO2008013656A3 (en) 2008-05-08
WO2008013656A2 (en) 2008-01-31

Similar Documents

Publication Publication Date Title
US8245031B2 (en) Content control method using certificate revocation lists
US8140843B2 (en) Content control method using certificate chains
US8639939B2 (en) Control method using identity objects
US8613103B2 (en) Content control method using versatile control structure
US8266711B2 (en) Method for controlling information supplied from memory device
KR101213118B1 (en) Memory System with versatile content control
KR101238848B1 (en) Versatile Content Control With Partitioning
TW201136266A (en) Content control method using certificate revocation lists
US20080010449A1 (en) Content Control System Using Certificate Chains
US20080010452A1 (en) Content Control System Using Certificate Revocation Lists
US20080034440A1 (en) Content Control System Using Versatile Control Structure
US20080022395A1 (en) System for Controlling Information Supplied From Memory Device
US20080010458A1 (en) Control System Using Identity Objects
JP5180203B2 (en) System and method for controlling information supplied from a memory device
JP2008524758A5 (en)
TW200822670A (en) Content control system and method using versatile control structure
TW200820037A (en) Content control system and method using certificate chains
JP5178716B2 (en) Content management system and method using certificate revocation list
US10902093B2 (en) Digital rights management for anonymous digital content sharing
JP4972165B2 (en) Control system and method using identity objects