TW200825741A - Embedded information storage device and preload DRM method for the same - Google Patents

Embedded information storage device and preload DRM method for the same Download PDF

Info

Publication number
TW200825741A
TW200825741A TW95144835A TW95144835A TW200825741A TW 200825741 A TW200825741 A TW 200825741A TW 95144835 A TW95144835 A TW 95144835A TW 95144835 A TW95144835 A TW 95144835A TW 200825741 A TW200825741 A TW 200825741A
Authority
TW
Taiwan
Prior art keywords
encryption
storage device
digital content
embedded
information storage
Prior art date
Application number
TW95144835A
Other languages
Chinese (zh)
Other versions
TWI326825B (en
Inventor
Sung-Chien Lai
Original Assignee
Fineart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fineart Technology Co Ltd filed Critical Fineart Technology Co Ltd
Priority to TW95144835A priority Critical patent/TWI326825B/en
Publication of TW200825741A publication Critical patent/TW200825741A/en
Application granted granted Critical
Publication of TWI326825B publication Critical patent/TWI326825B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention discloses a device with preload DRM and associative method. The preload DRM is a customized production according to the demands of the customer. The present invention discloses a device with preload DEM comprising an encoding content, a protection interface that is pre-loaded within an information storage device.

Description

200825741 九、發明說明: 【發明所屬之技術領域】 入齡Π 2有關於Γ種嵌人式#訊儲存裝置及其預先載 力6的、理的方法’特別是有關於經過加密演算法後 加岔的内容,並且盆解宓兩女廿w1 而有其搭載之記憶卡,可透過其 附屬之檢視程式,將數位内、, 円谷開啟亚進行相關作業。 【先前技術】 3科技的快速發展,電腦的普及化,f料也朝著科 ㈣的紙本文書作業’至現今的資料電子 =貧料無須透過紙張來顯示記載。目前的電腦系統, 如被車人的Windows作章系絲 , 作案糸統、微軟的Office文書處理、麥 1 «作業系統、Linux作章系缔笙 體予處理資料。 ’均提供眾多的應用軟 ^998年快閃記憶體硬碟⑶牆―)發明問世之 被詩儲存資料,其具輕巧、攜帶方便、隨插即用 放、/體積料,但料提供A4f料儲存、音樂播 病把錄等多功能’亦同時滿足工作、生活、娛樂等 夕方面的需求。 衫電腦係為多人共用,將個人資料存放於共用電腦 僂雄/使其貧料暴露於外,且有被窺飼偷竊之可能性。 (Data Encryptlon 广,刪)’其係為美國早⑴料國家密碼標準, 工業界應用了 20多年,其鑰匙(key)長度為56bits。 貝枓加密標準(卿)係為目前全世界廣泛使用之加解密演 5 200825741 ‘法。然而近幾年來,資料力 解,徒得標準(DES)已陸續被破 胖便付以其為密碼演糞法嬙杰< 、斤忐機制的系統安全性堪虞。 用以統Γ意卡(如快閃記憶體硬碟或隨身碟)僅被 ,L: 1 料並未受到任何的加密保護,記憶卡 =供貝料*全保護機制,資料 的 險:若將資料加密保護,可在個人電腦pc上::取= 制貝料的便利性與空間使用 嗜,紐皆碎 性’亦可透過軟體的加密保 二^ 須透過該軟體執行,因此亦限制了資料的便 利性與空間使用性。 貝才十旳便 =此’其於上述習知之技術,目前記憶卡上資料安全 f生仍有許多的缺失,而急需要一山 、 H 〜要種斬新的技術解決方案, 疋以本發明提出當使用記 - 丰、仓—細— < 刀口益貝枓日守,需有記憶 卡進仃解岔,其資料始可讀取。 【發明内容】 性,=述發明背景中’習知技術之記憶卡上資料安全 可被任何人隨意使用,因該資料並無加密保護 二十思卡亦未有安全機制保護該資料,因而造成該資料 =皮痛竊取風險。基於上述需求,本發明揭露一種具有 •播功能之嵌人式資訊儲存t置及其預先載人數 官理的方法。 …月揭露之一種具有加解密功能之嵌入式資訊儲存 、^ ’包含.—防護界面安裝程式,用予將防護界面安裳 到資訊處理裝置,㈣護數位内容被任意的不當使用;二 /、有加解⑥、功能之控制晶片’配置於該後人式資訊儲存裝 6 200825741 置中,其具有加密演算法,提供數字位元組來加解密數位 内容;一唯一鍵值,由該控制晶片依加密演算法亂數產生, 用以加密數位内容,並為解密之鑰匙,其為單一且獨特; 一密文檔,客制化數位内容透過加密燒錄程式後,儲存於 該嵌入式資訊儲存裝置中,當執行讀取該密文樓時,必須 比對該具有加解密功能之控制晶片之密碼鑰匙,用以確認 擷取是否經授權。 本發明之主要目的在於提供數位内容加解密方法,該 ® 數位内容透過加密演算法進行加密(例如:高階加密標準 (AES,Advanced Encryption Standard )、DES、3DES、 Blowfish ),以AES高階加密標準為例,但不限定於AES 高階加密標準,其係為2000年10月美國政府機構NIST 評選出的新一代密碼標準,其鑰匙長度分別為128bits、 192bits、256bits,於本發明中所採取的為128bits或是 256bits的高階加密標準,並利用透明式加解密的格式,高 φ 階加密標準128bits密碼安全性為一般56bits資料加密標 準(Data Encryption Standard: DES)密碼之 10 的 20 次方 (1020)倍以上,以此高階加密演算法之檔案是難以解開 的。密文檔的解密鑰匙為該嵌入式資訊儲存裝置之控制晶 片所提供,確認擷取是否授權,若鑰匙正確並授權,便可 解密該密文檔,透過檢視程式即可讀取執行。 本發明之另一目的在於提供具有預先載入數位財產管 理之嵌入式資訊儲存裝置,可預先將數位内容載入至上述 該嵌入式資訊儲存裝置,嵌入式資訊儲存裝置可根據個別 7 200825741 需求將所需數位内容預先載入,數位内容須先經過加密後 在將其載入嵌入式資訊儲存裝置中。因此,嵌入式資訊儲 存裝置便無法被複製移作他用,且嵌入式資訊儲存裝置之 數位内容亦無法被他人或間諜程式窺伺竊取。嵌入式資訊 儲存裝置為數位内容解密之鑰匙(Key),若無嵌入式資訊儲 存裝置則便無法開啟該數位内容。且嵌入式資訊儲存裝置 检碼鑰匙係為單一的(unique),並不會有重複密碼現象,使 知數位内谷的安全性大大提高。 本發明之另一目的在於提供一防護界面用以防止數位 内容不當利用之方法,使用者必須透過該防護界面始可開 =數,内容並讀取,防護界面會向嵌入式資訊儲存裝置之 ,制晶片索取解密餘匙,其為當初作為數位内容加密的唯 鍵值,右無防護界面則該數位内容即無法解密與任何相 關動作’且讀取數位内容之相關檢視程式,亦無法對數位 内容進行相_作,包含:禁止複製、禁止貼上、禁止剪 :動:止存檔、禁止另存新檔、禁止列印、禁止螢幕列印 【實施方式】 細的—些實施例會詳細描述如下。然而,除了詳 ;”田返的,施例外,本發明可以廣泛地在其他的實施利中 ::以月之保護範圍並不受限於下述之實施例, 八係以後述的申請專利範圍為準。 本發明係為一種具有加解密功 置及其預先載人數位財產㈣的料二式貝5請存褒 蚵座g理的方法,係應用於一嵌入式 8 200825741 資訊儲存裝置上,將所雲I你 〜达〜 _而數位内容透過-加密燒錄程式加 戰至肷人式魏儲存裝置予以保護 數位内谷,且隱藏密文播之解密動作,透過防護界面所紀 錄之檢視程式,自動開啟解密後之數位内容。200825741 IX. Inventories: [Technical field of invention] Age-involved Π 2 There is a method of embedding the type of information storage device and its pre-loading force 6 'especially related to the encrypted algorithm岔 岔 , , , , , , 盆 盆 盆 盆 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓[Prior Art] 3 The rapid development of science and technology, the popularization of computers, and the materials are also directed toward the work of the paper (4) to the current data electronic = poor materials do not need to be recorded through paper. The current computer system, such as the Windows of the car, is the chapter of the silk, the crime of the crime, the Microsoft Office document processing, the Mai 1 «Operating system, the Linux chapter is the system to deal with the data. 'All provide a wide range of applications soft ^ 998 flash memory hard disk (3) wall --) The invention of the poetry storage materials, it is light, easy to carry, plug and play, / volume material, but provide A4f material Storage, music, disease recording and other multi-functional 'also meet the needs of work, life, entertainment and other aspects of the evening. The shirt computer is shared by many people, and the personal data is stored in the shared computer. The male/lower exposure is exposed, and there is the possibility of being stolen. (Data Encryptlon is wide, deleted)' It is the national password standard of the United States (1). It has been used in industry for more than 20 years, and its key length is 56bits. The Bessie Encryption Standard (Qing) is currently widely used in the world for encryption and decryption. However, in recent years, the information has been solved, and the standard (DES) has been gradually broken, and the system security of the mechanism of the sputum is used. Used to unify cards (such as flash memory hard drives or flash drives) only, L: 1 material is not protected by any encryption, memory card = for bedding * full protection mechanism, data risk: if Data encryption protection, can be on the personal computer pc:: take = the convenience of the bedding material and the use of space, the new is broken - can also be encrypted by the software encryption ^ must be executed through the software, thus limiting the data Convenience and space usability. Beicai Shiyanzhe = this 'the technology of the above-mentioned, the current data security on the memory card is still a lot of missing, and urgently need a mountain, H ~ to plant a new technical solution, 疋 proposed by the present invention When using the record - Feng, warehouse - fine - < knife mouth Yi Bei 枓 day guard, you need to have a memory card to solve the problem, its data can be read. SUMMARY OF THE INVENTION Sexuality, in the context of the invention, the security of the data on the memory card of the prior art can be used freely by anyone, because the data is not encrypted and protected, and there is no security mechanism to protect the data, thus causing This information = the risk of skin pain stealing. Based on the above needs, the present invention discloses an embedded information storage device with a broadcast function and a method for pre-loading the number of people. ...exposure-embedded embedded information storage with encryption and decryption function, ^ 'include.-Protection interface installation program, used to protect the protection interface to the information processing device, (4) the digital content is improperly used; 2/ There is a solution 6, the function of the control chip 'configured in the post-person information storage device 6 200825741, which has a encryption algorithm, providing digital bytes to encrypt and decrypt digital content; a unique key value, by the control chip Generated according to the encryption algorithm, used to encrypt the digital content, and is the key to the decryption, which is a single and unique; a secret document, the customized digital content is stored in the embedded information storage device through the encryption programming program. In the execution of reading the ciphertext building, the cryptographic key of the control chip with the encryption and decryption function must be used to confirm whether the retrieval is authorized. The main purpose of the present invention is to provide a digital content encryption and decryption method, wherein the digital content is encrypted by an encryption algorithm (for example, Advanced Encryption Standard (AES), DES, 3DES, Blowfish), and the AES high-order encryption standard is For example, but not limited to the AES high-order encryption standard, which is a new-generation cryptographic standard selected by the US government agency NIST in October 2000. The key lengths are 128 bits, 192 bits, and 256 bits, respectively. 128 bits are used in the present invention. Or 256bits high-order encryption standard, and use the transparent encryption and decryption format, high φ-level encryption standard 128bits password security for the general 56bits data encryption standard (Data Encryption Standard: DES) password 10 of the 20th power (1020) times Above, the file of this high-order encryption algorithm is difficult to solve. The decryption key of the secret document is provided by the control chip of the embedded information storage device to confirm whether the retrieval is authorized. If the key is correct and authorized, the secret document can be decrypted and read and executed through the viewing program. Another object of the present invention is to provide an embedded information storage device with pre-loaded digital property management, which can load digital content into the embedded information storage device in advance, and the embedded information storage device can be based on individual 7 200825741 requirements. The required digital content is preloaded and the digital content must be encrypted before being loaded into the embedded information storage device. As a result, the embedded information storage device cannot be copied for other purposes, and the digital content of the embedded information storage device cannot be stolen by others or spyware. The embedded information storage device is the key for decrypting digital content. If there is no embedded information storage device, the digital content cannot be opened. And the embedded information storage device has a unique key, and there is no repeated password phenomenon, which greatly improves the security of the digital valley. Another object of the present invention is to provide a protection interface for preventing improper use of digital content. The user must open the number, content and read through the protection interface, and the protection interface will be directed to the embedded information storage device. The chip acquires the decryption key, which is the unique key value that was originally encrypted as the digital content. If the right unprotected interface is used, the digital content cannot be decrypted and any related action' and the digital viewing device is not related to the digital content. Perform phase-to-action, including: prohibit copying, prohibiting paste, prohibiting cut: move: stop archiving, prohibit saving new file, prohibit printing, prohibit screen printing [implementation] Detailed - some embodiments will be described in detail below. However, in addition to the details; the exception of the field, the invention can be widely used in other implementations: the scope of protection of the month is not limited to the following examples, the application scope of the eight series will be described later. The present invention is a method for storing and decrypting a pre-loaded property and a pre-loaded property (4), which is applied to an embedded 8 200825741 information storage device. I will use the cloud-based I to reach ~ _ and the digital content through the - encryption programming program to the deaf-type Wei storage device to protect the digital valley, and hide the ciphertext broadcast decryption action, through the protection interface recorded viewing program , automatically open the decrypted digital content.

請:考圖示,其中所顯示僅僅是為了說明 =利,物以限制本發明。第一圖所示為本發明二 將:,功能之嵌入式資訊儲存裝置之示意圖。首 加解密功能的嵌入式資訊储存裝置ι〇ι安裝於 貝=理裝置102之上後’便可開始進行下述之步驟。麥 Ί貝訊儲存裝置1G1具有—控制晶片㈣_,其 於貝机處理裝i 102用以產生加解密之 口 L眞。控制晶片⑽採取加密演算法建^ 而唯-鍵值⑽為加㈣算絲數產生且單^ '加二 取的過程中,使用者開啟相關檢視程式1〇4讀取數位:! 301(請表考篦- / μ唄取數位内容 “44二圖)時’須受到防護界面1〇 界面103會向护制曰ΰ ! &quot;隻防4 鍵…唯一鍵值1〇6’唯有唯- 數位内容加.*可透過防護界面103讀取 令川1,然而,其他應用程式1〇9盔 ::執行,亦無法開啟或讀取密文檔二 == “明文;其他應用程式1〇9為資訊處理装置 相關應用程式,其並非開啟密文檔 热 程式104因受到防嗜旯&amp; 相關辁式,檢視 105做杯“ 4 防護’因而無法對密文幹 :做任何相關的健存備份動作,因此 = 數位内容301έγ4, 尤用’ T為任-數位資料(例如電子書、MP3、奶 9 200825741 等)。資訊處理襄置102可為桌上型電腦、手提電腦、個人 ,(綱、行動電話、掌上型資訊處二 生產者在燒錄密文擋1〇5於嵌入式資 亦將防護界面安裝程式1G7—併燒錄於 $ ⑽式則為將防護界面103安裝於資訊處 以便使用者開啟或讀取所需數位内容3〇ι,且 ^安震程式U)7可為自_行安裝亦可為使料安裝 之,不限定其安裝方式。 &lt; :參照第二圖示,於此實施例中,本發明係應用於一 視r =⑻,上述防護界® 1G3包含:一記錄與偵側檢 =式類別模組加,模組2G1用以記錄開啟數位内容3〇1 參 目,才欢視知4 104 ’當使用者透過檢視程&lt; ι〇4讀取數 立内谷301 a守,模組2〇1便啟動偵測是否為數位内容 目關之檢視程式。若結果為數位内容3G1之檢視程式1〇4, 者便可透過;^視知式1〇4開啟讀取數位内容加;反 ^ ’撿視程式所開啟之數位内容為亂碼密文播,無法讀取; /貞測唯-鍵值模組2〇2’用以判斷谈入式資訊儲存裝置 01之控制晶片1〇8所產生的數字位元組是否為原本加密 ,鑰匙,防護界面103索取唯一鍵值1〇6以解密密文檔 使其為可讀取之明文;一禁止檢視程式複製、貼上、 ^下存檔、另存新檔、列印、螢幕列印等功能模組203, 莫=203用以防護數位内容被不當使用而採取之相關禁止 :檢視私式104唯有讀取之—功能;一偵測數位内容 放功限杈組204,模組204偵測判斷數位内容3〇1之有 200825741 效曰期與資訊處 唯有在有效期限内始;讀:::==效二, 位内容可讀取次數模'组2。5,模匕5 ㈣容3〇1之次數是否在數位内容- 數ΐϋ圍内,當使用去士矣 圍時Lhh 數逾越可讀取次數範 讀取^數範圍内始可讀取數位内容。唯有在可 預弈ίΓΓ第三圖示’其係為產生密文槽之示意圖,首先 取所需之數位内容301,並 ==之有效期限與可讀取次數範圍,透職 -鍵# 1Μ子衣101之控制晶片108以演算法產生一唯 程式302使鍵值106係、為一數字位元組,加密燒錄 文檔1〇5。 -鍵值1〇6加密數位内容301以產生一密 、請^照第四圖示,其係為產生加密内容之加密燒錄程 式之圖’首先,於貢訊處理裝置⑽中開啟加密燒錄 程搬,接著,透過加密燒錄程式3〇2上之【增加】按鈕 _新曰所而數位内容3〇1 ’其顯示於加密燒錄程式3〇2 k單4中若要刪除不需要之内容可選取數位内容3〇1 ,透過加密燒錄程式3〇2之【刪除】按鈕4〇2,將之刪除, 最後確疋所需之貧料内容後,可由加密燒錄程式搬之【產 生】知:紐403產生加德、過之密文播(Content.exe) 105,並 將雄、文檔105燒錄至嵌入式資訊儲存裝置1〇1中。加密燒 錄程式302會向控制晶片1〇8索取一唯一鍵值(Unique 200825741Please refer to the illustrations, which are shown for illustrative purposes only. The first figure shows a schematic diagram of the embedded information storage device of the present invention. After the first information decryption function embedded information storage device ι〇ι is mounted on the device 102, the following steps can be started. The Ί 讯 储存 储存 储存 储存 储存 具有 具有 储存 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞The control chip (10) adopts an encryption algorithm to build a ^ and only the key value (10) is added (4) the number of calculations is generated and the single ^ 'plus two is taken, the user opens the relevant viewing program 1〇4 to read the digits:! 301 (Please refer to the table - / μ to capture the digital content "44 two maps" when you must be protected by the interface 1 〇 interface 103 will be guarded! &quot; only 4 keys... unique key value 1 〇 6 'only There is only - digital content plus .* can read the command 1 through the protection interface 103, however, other applications 1 〇 9 helmet:: execution, can not open or read the secret document 2 == "plain text; other applications 1 〇9 is an information processing device related application, which does not open the confidential document hot program 104 because it is protected against embarrassing & related ,, view 105 to make a cup "4 protection" and thus can not do ciphertext: do any related health Backup action, therefore = digital content 301 έ γ4, especially 'T is any-digit data (such as e-book, MP3, milk 9 200825741, etc.). Information processing device 102 can be a desktop computer, laptop, personal, (class The mobile phone and the handheld information department 2 producers are burning the ciphertext block 1〇5 and the embedded device will also install the protection interface 1G7—and burn it in the $(10) type to install the protection interface 103 to the information office. The user opens or reads the required digital content 3〇ι, and ^安The program U) 7 may be installed from the line or the material, and the installation manner is not limited. <RTIgt; </ RTI> Referring to the second diagram, in the embodiment, the invention is applied to a view r = (8), The above-mentioned protection industry® 1G3 includes: a recording and detection side type module, and the module 2G1 is used to record the digital content of the digital content 3〇1, and then the user knows 4 104 'when the user passes the inspection process&lt; Ι〇4 reads the number of 立立谷 301 a 守, module 2〇1 will start to detect whether it is a digital content viewing program. If the result is digital content 3G1 viewing program 1 〇 4, you can pass; ^ 知 式 〇 〇 开启 开启 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取Determining whether the digital byte generated by the control chip 1〇8 of the walk-in information storage device 01 is originally encrypted, and the key, the protection interface 103 requests the unique key value 1〇6 to decrypt the confidential document to make it readable. A function module 20 that prohibits the copying, pasting, archiving, saving new files, printing, screen printing, etc. 3, Mo = 203 to prevent the digital content from being improperly used to prevent: the private 104 is only read - function; a digital content is limited to the group 204, the module 204 detects the judgment digit Content 3〇1 has 200825741 effect period and information office only start within the validity period; read:::==effect two, bit content can read the number of modules 'group 2. 5, module 5 (four) capacity 3〇 Whether the number of 1 is in the digital content - within the number range, when using the taxi, the Lhh number can be read as many times as the number of readings can be read within the range of the number of readings. Only in the foreseeable ΓΓ ΓΓ ΓΓ ΓΓ ΓΓ 其 ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' The control chip 108 of the sub-machine 101 generates a program 302 by algorithm to make the key value 106 a digital byte and encrypts the document 1〇5. - The key value 1 〇 6 encrypts the digital content 301 to generate a secret, please take the fourth illustration, which is a diagram of the encrypted programming program for generating the encrypted content. First, the encryption processing is started in the tribute processing device (10). Cheng, then, through the [Add] button on the encryption program 3〇2, the digital content 3〇1 ' is displayed in the encryption program 3〇2 k single 4 to delete unnecessary The content can be selected from the digital content 3〇1, and the [Delete] button 4〇2 of the encryption programming program 3〇2 is deleted, and finally the required poor content is confirmed, and then the encrypted programming program can be moved. 】 Know: New 403 generates Gard, the ciphertext (Content.exe) 105, and burns the male and the document 105 to the embedded information storage device 101. The encryption program 302 will request a unique key value from the control chip 1〇8 (Unique 200825741)

Key)1〇6’再利用唯一舰1〇6將所需數位内|3〇ι以透明 式加解密格式進行加密,產生—密文檔1()5。在另一實施 射,可以預先設定防護界面安裝程式1()7,設定且= 開啟數位内㈣!之相關檢視程4 i 〇 4之類別與偵測判別 數位内容301之讀取有效期限以及其可讀取次數範圍。此 外,密文檔1〇5肖防護界面安裝程式1〇7 —併燒錄至嵌入 式資訊儲存裝置101中,每次僅執行一次燒錄並記錄燒錄 次數,而唯一鍵值106便儲存於控制晶片1〇8中,用以 密密文檔105之输匙。 、請參照第五圖示,其係為本發明具加解密功能之嵌入 ^資訊儲存裝置之預絲人數位財產管理的方法之數位内 容儲存流程圖。首先,於資訊處理裝置1〇2開啟加密燒錄 程式介面302(㈣501),料,選取所需預先载入之數位 内容(步驟502),然後,點選加密燒錄程式介面3〇2之 【增加】按鈕401,將數位内容3〇1新增至加密燒錄程式 霉介面302之選單404中(步驟5〇3);若要刪除不需要之數位 内容3〇1,則於選單中點選數位内容3〇卜並點選加密燒錄 程式介面302之【刪除】按鈕4〇2,將其刪除(步驟5〇4), f到步驟502,持續_並重複上述之•,並結束該重 複流程。然後,設定數位内容301之有效期限與可讀取次 數範圍(步驟505),接著’點選加密燒錄程式介面3〇2之【產 生】按鈕403,並透過嵌入式資訊儲存裝置1〇1之控制晶 片108之加密演算法提供單一唯一鍵值1〇6,進行加密動 作(步驟506),接著,雜數位内容3〇1以唯一鍵值加^為 12 200825741 -密文檔H)5(步驟507)’最後將密文檔1〇5與防護界面安 裝程式W7 —併燒錄至嵌入式資訊儲存裝置ι〇ι,且將唯 一鍵值106儲存記錄於控制晶片1〇8中(步驟5〇8)。 請參照第六圖示,其係為本發明具加解密功能之嵌入 式資訊儲存裝置之預先載人數位財產管理的方法之數位内 容讀取流程圖,首先,安裝散人式資訊儲存裝置⑼Key) 1〇6' re-uses the unique ship 1〇6 to encrypt the required digits in the transparent encryption/decryption format to generate the secret document 1()5. In another implementation, you can preset the protection interface installation program 1 () 7, set and = turn on the digits (four)! Related Category 4 i 〇 4 Category and Detection Discrimination The reading expiration date of the digital content 301 and the range of its readable times. In addition, the secret document is installed in the embedded information storage device 101, and the number of burns is recorded only once, and the unique key value 106 is stored in the control. In the wafer 1-8, the key for the dense document 105. Please refer to the fifth figure, which is a digital content storage flow chart of the method for pre-wired person property management of the embedded information storage device with the encryption and decryption function. First, the information processing device 1〇2 opens the encryption programming interface 302 ((4) 501), selects the pre-loaded digital content (step 502), and then clicks the encryption programming interface 3〇2. Add] button 401, add the digital content 3〇1 to the menu 404 of the encryption programming program 302 (step 5〇3); to delete the unnecessary digital content 3〇1, click in the menu The digital content is 3 并 并 and click the [Delete] button 4 〇 2 of the encryption programming interface 302, delete it (step 5 〇 4), f to step 502, continue _ and repeat the above, and end the repetition Process. Then, the expiration date and the number of readable times of the digital content 301 are set (step 505), and then the [generate] button 403 of the encryption programming interface 3 〇 2 is selected and transmitted through the embedded information storage device 1 〇 1 The encryption algorithm of the control chip 108 provides a single unique key value of 1 〇 6 for performing an encryption operation (step 506), and then, the hexadecimal content 3 〇 1 is incremented by a unique key value to 12 200825741 - confidential document H) 5 (step 507) ' Finally, the secret document 1〇5 and the protection interface installation program W7 are burned to the embedded information storage device ι〇ι, and the unique key value 106 is stored and recorded in the control chip 1〇8 (step 5〇8) . Please refer to the sixth figure, which is a digital content reading flowchart of the method for pre-loading property management of the embedded information storage device with encryption and decryption function. First, the installation of the scattered information storage device (9)

訊處理裝HG2中(步驟6G1),安裝完成之後,防護界面安 裝程式m將防護界面103安裝於資訊處理裝置1〇2(步驟 602) ’且防護界面103隱藏於該資訊處理裝置⑽中並不 被任何應用程賴巾止(㈣6G3),接著,防護界面將密文 :二〇5解密於資訊處理裝置1〇2中(步驟6〇4),控制晶片提 =原加密時之唯-鍵值⑽於防護界自⑼以解密(步驟 5),偵測唯-鍵值餘匙是否正確(步驟_),若唯一鍵值 106不正確則無法·該密文檔1()5且數位内容如 7步驟術);若唯—鍵值⑽正確,則解開該密文槽1〇5 為原數位内容301且複製數位内容3〇1力資訊處理裝置 1〇2中(步驟6G8),隱藏解密過程,使时無感覺地開啟數 = 驟609)。然後’防護界面ι〇3便會偵測檢視 ^ 7 K (步驟61〇),若不正確,則檢視程式 104盔法 項取數位内容301,若讀敌目丨丨☆ * 為亂碼(步驟611),反之,檢 ^式104正確’則透過防護界面H)3開啟檢視程式1〇4 ===容3G1(步驟612),且防護界面⑽禁止檢視程 式1〇4後衣、貼上、剪下、存播、另存新樓、列印、螢幕 列印等複製功能(步驟613),接著,防護界面叫貞測數位 200825741 内合是否超過有效期限或超過可讀取次數範圍(步驟 614)^若已超過數位内容3〇1預設之有效期限或超過預設 之可靖取次數範圍,則使用者便無法開啟數位内容%〗(步 :)’反之,則回到步驟612,持續偵測並重複上述之 饥私,亚結束重複流程。接著,偵測該檢視程式104是否 關閉中止(步,驟616),若尚未關閉中止檢視程式1〇4則回到 v驟612 ’持續偵測並重複上述之流程,並結束重複流程; 馨反之便將防遵界面i 〇3關閉且刪除位於資訊處理裝置1Μ 之數位=容301(步驟617),最候,偵測嵌入式資訊儲存裝 ,ιοί是否仍安裝於資訊處理装置102上(步驟618》若仍 女裝於貧訊處理装置102上則回到步驟612,持續偵測並 =複上述之,並結束重複流程;反之,若拔除嵌入式 資訊儲存裝置101,則關閉防護界面103且刪除位於資訊 處理裝置102之數位内容301(步驟619),結束整個流程。 以上所述僅為本發明之較佳實施例而已,並非用以限 龜定本發明之申請專利範圍,凡其它未脫離本發明所揭示之 精神下所完成之等效改變或修飾,均應包含在下述之專利 申請範圍内。 【圖式簡單說明】 本發明可以藉由某些較佳實施例,以及下述 之說明書與所附圖示之詳細描述來了解,然而並 非為限制其專利申請範圍,應理解者為本發明中 所有之較佳實施例僅為例示之用,其中:χ 第一圖係為本發明具有加解密功能之嵌入 14 200825741 式資訊儲存裝置之示意圖; 第二圖係為本發明具有加解密功能之嵌入 式資訊儲存裝置之防護界面之示意圖; 第三圖係為本發明具有加解密功能之嵌入 式資訊儲存裝置之產生密文檔之示意圖; 第四圖係為本發明具有加解密功能之嵌入 式資訊儲存裝置之加密燒錄程式之示意圖;、 第五圖係為本發明具有加解密功能之嵌入 * 式資訊儲存裝置之預先載入數位財產管理的方 法之數位内容儲存流程圖: 第六圖係為本發明具有加解密功能之嵌入 式資訊儲存裝置之預先載入數位財產管理的方 法之數位内容讀取流程圖。 【主要元件符號說明】 1 0 1 嵌入式資訊儲存裝置 Φ 102 資訊處理裝置 1 〇 3 防護界面 1 0 4 檢視程式 1 0 5 密文檔 1 06 唯一鍵值 1 0 7 防護界面安裝程式 1 0 8 控制晶片 1 0 9 其他應用程式 201 偵測檢視程式類別模組 15 200825741 202 偵測唯一鍵值模組 203 禁止檢視程式複製、貼上、剪下、列印、 存檔、另存新檔、螢幕列印等模組 204 偵测數位内容有效期限模組 205 偵測數位内容可讀取次數模組 301 數位内容 302 加密燒錄程式 401 【增加】按鈕 _ 402【刪除】按鈕 403 【產生】按鈕 404 選單 501、502、503、504、505、506、507 步驟 601、602、603、604、605、606、607、608 步驟 609、610、611、612、613、614、615、616 步驟 617、618、619 步驟In the processing device HG2 (step 6G1), after the installation is completed, the protection interface installation program m installs the protection interface 103 to the information processing device 1〇2 (step 602)' and the protection interface 103 is hidden in the information processing device (10). By any application, it is (4) 6G3, and then the protection interface decrypts the ciphertext: 2〇5 into the information processing device 1〇2 (step 6〇4), and controls the chip to raise the unique key value of the original encryption. (10) In the protection industry, (9) to decrypt (step 5), to detect whether the key-key value is correct (step _), if the unique key value 106 is incorrect, the secret document 1 () 5 and the digital content such as 7 If the key-value (10) is correct, the ciphertext slot 1〇5 is unlocked as the original digit content 301 and the digit content is copied into the information processing device 1〇2 (step 6G8), and the decryption process is hidden. , so that the number of times when there is no feeling = step 609). Then, the 'protection interface ι〇3 will detect the view ^ 7 K (step 61〇). If it is not correct, the view program 104 helmet method takes the digital content 301, if the enemy target 丨丨 * is garbled (step 611) ), on the other hand, if the check 104 is correct, the inspection program 1〇4 ===容3G1 is opened through the protection interface H)3 (step 612), and the protection interface (10) prohibits the viewing program 1〇4, the clothes, the stickers, the scissors Copy function such as downloading, saving, saving new building, printing, screen printing, etc. (step 613), and then, the protection interface is called whether the number of digits in the 200825741 exceeds the expiration date or exceeds the number of readable times (step 614)^ If the expiration date of the digital content of 3〇1 has been exceeded or the preset expiration number range is exceeded, the user cannot open the digital content %〗 (step:). Otherwise, return to step 612 to continue detecting. And repeat the above-mentioned hunger, and end the process. Then, it is detected whether the viewing program 104 is closed (step, step 616). If the abort viewing program 1〇4 has not been closed, then return to step 612 ′ to continuously detect and repeat the above process, and end the repeating process; The anti-compliance interface i 〇 3 is closed and the digits of the information processing device 1 = 301 are deleted (step 617), and at the latest, the embedded information storage device is detected, and ιοί is still installed on the information processing device 102 (step 618). If the woman is still on the poor processing device 102, then return to step 612, continue to detect and repeat the above, and end the repetitive process; otherwise, if the embedded information storage device 101 is removed, the protection interface 103 is closed and deleted. The digital content 301 of the information processing device 102 (step 619) ends the entire process. The above is only the preferred embodiment of the present invention, and is not intended to limit the scope of the patent application of the present invention. Equivalent changes or modifications made in the spirit of the disclosure should be included in the scope of the following patent application. [Simplified description of the drawings] The present invention may be implemented by some preferred embodiments. And the following description of the specification and the accompanying drawings are to be understood by the description of the claims The figure is a schematic diagram of the embedded information of the 200825741 type information storage device with the encryption and decryption function of the present invention; the second figure is a schematic diagram of the protection interface of the embedded information storage device with the encryption and decryption function of the present invention; A schematic diagram of a secret document generated by an embedded information storage device with encryption and decryption function; the fourth diagram is a schematic diagram of an encryption programming program of an embedded information storage device with encryption and decryption function; and the fifth figure is the invention Digital content storage flow chart of pre-loaded digital property management method with embedded and encrypted information storage device with encryption and decryption function: The sixth figure is a pre-loaded digital property of the embedded information storage device with encryption and decryption function of the present invention Digital content reading flowchart of the management method. [Main component symbol description] 1 0 1 Embedded information Storage device Φ 102 Information processing device 1 〇3 Protection interface 1 0 4 View program 1 0 5 Confidential document 1 06 Unique key value 1 0 7 Protection interface installer 1 0 8 Control chip 1 0 9 Other applications 201 Detection viewer The category module 15 200825741 202 detects the unique key value module 203 prohibits the viewing program from copying, pasting, cutting, printing, archiving, saving new files, screen printing, etc. 204 detecting the digital content expiration date module 205 Detect Digital Content Readable Times Module 301 Digital Content 302 Encryption Programming Program 401 [Add] button _ 402 [Delete] button 403 [Generate] button 404 Menu 501, 502, 503, 504, 505, 506, 507 Steps 601, 602, 603, 604, 605, 606, 607, 608 Steps 609, 610, 611, 612, 613, 614, 615, 616 Steps 617, 618, 619 Steps

1616

Claims (1)

200825741200825741 申請專利範圍: 一種具有加解密功能之嵌入 一且古 式貝戒儲存裝置,包含: 存H + 日日片,配置於該嵌入式資訊儲 廿衣置中,以加密演管、本 只 叩 内容; i、唯一鍵值用以加解密數位 ;二蔓界面安裝程式,儲存於該嵌入式資訊儲存裝置 一/乂防護该數位内容被不當使肖;以及Patent application scope: An embedded and ancient shell-shaped storage device with encryption and decryption function, comprising: storing H + Japanese-day film, arranged in the embedded information storage clothing, to encrypt the performance, the only content; i, the unique key value is used to encrypt and decrypt the digits; the second vine interface installation program is stored in the embedded information storage device, and the digital content is protected from being improperly displayed; 當執j數位内t,儲存於職人式資訊儲存裝置中, 密功:::°亥加在之數位内容時,必須比對該具有加解 ^此之控制晶片之唯-鍵值,用以確認擷取是否經授 ί申請專利範圍第1項之具有加解密功能之喪入式 :二:存f置’其中該加密演算法可為AES(高階加 4 準)、Blowfish、DES、3DES 或其組合。 ”請專利範圍第1項之具有加解密功能之嵌入式 貢訊儲存裝置,其中該唯—鍵值,由該具有加解密 功能之控制晶片所產生,且儲存記錄於該控制晶片 中〇 ^申明專利fe圍第1項之具有加解密功能之嵌入式 貝巩儲存裝置,其中該嵌入式資訊儲存裝置可為移 動式儲存體、積體電路卡、智慧卡(SMART CARD) 17 200825741 或其組合 5. ,申請專利範圍第i項之具有加解密功能之嵌入式資 /儲存衣置’其中該具有加解密功能之控制晶以 行加密演算法,產生唯一鍵值。 執 6 利範圍第1項之具有加解密功能之嵌入式資 :子衣置,其中該唯一鍵值為加密與解密之 位7〇組。 丁 f 丁 如申,專利範圍第1肩且 訊儲存裂置,:二 解密功能之嵌入式資 龄 /、中Μ防4界面安裝程式至少包含一設定 效期限n t之相關程式之功能與一偵測數位内容有 能。1 1此,以及一偵測數位内容可讀取次數之功 _ 8·二1二範圍第1項之具有加解密功能之嵌入式資 凌置’其中該唯-鍵值耦接—防護界面。 9· 第7項之具有加解密功能之嵌入式資 存衣置,其中該防護界面健存於資訊處理裝置中。 1〇·如申請專利範圍第9項之呈古 w * 、 /、有加解密功能之嵌入式資 存衣置,其中該資訊處理裳置包括桌上型電腦、手 18 200825741 提電腦、個人數位助理(PDA)、行動電話、掌上型資訊 處理裝置。 11·如申請專利範圍第7項之具有加解密功能之嵌入式資 訊儲存裝置,其中該防護界面,包含·· 一第一功能模組,用以偵測開啟數位内容之檢視程式是 否正確: 第一功能模組,用以偵測唯一鍵值是否正確; =—功把模組,用以偵測數位内容之有效期限; 第四功旎权組,用以偵測數位内容之可讀取次數 圍;以及 -第-控制模組,用以禁止複製、貼上、剪下、存檔、 另存新檔、列印、螢幕列印; _ 12.:種預先載入數位財產管理的方法,係 :訊健存裝置上,該方法之步驟包含: 甘入入式 安放肷入式貧訊儲存裝置於資訊處理裝置中: :=!燒:程式介面,選取所需之數位内容;以及 :片過:亥:入式資訊儲存裝置之具有加解密功能之控制 以保取唯—鍵值,執行加密程序將該數位内容力六 乂保護該數位内容,絲由 加达、 將::文播且燒錄於該歲入式資訊儲存裝置,: 亥唯一鍵值儲存記錄於該控制晶片中。 亚 19 200825741 3·如申μ專利範圍第^項 的方法,Mu 彳狀縣載人數位財產管理 ,、中该數位内容由一應用程式產生。 員所述之預先載入數位財產管理 碼係採用加密演算法所產生之唯 14.如申請專利範圍第u 的方法,其中該加密密 —鍵值〇When the j-digit is stored in the employee-type information storage device, the secret:::°Higa in the digital content must be compared to the unique-key value of the control chip with the added Confirm whether the acquisition has been granted or not. The encryption and decryption function of the first application of the scope of patent application: 2: save f set 'where the encryption algorithm can be AES (high-order plus 4), Blowfish, DES, 3DES or Its combination. "The embedded tribute storage device with the encryption and decryption function of the first item of the patent scope, wherein the unique key value is generated by the control chip having the encryption and decryption function, and is stored and recorded in the control chip. The embedded Beacon storage device with the encryption and decryption function of the first item of the patent, wherein the embedded information storage device can be a mobile storage device, an integrated circuit card, a smart card (SMART CARD) 17 200825741 or a combination thereof 5 The embedded asset/storage clothing with the encryption and decryption function of the i-th patent scope is applied to the control chip with the encryption and decryption function to generate a unique key value. Embedded resource with encryption and decryption function: sub-clothing, wherein the unique key value is the 7-inch group of encryption and decryption. Ding f Ding Rushen, patent range 1st shoulder and message storage split: embedded with 2 decryption function The aging/, Μ 4 4 interface installation program includes at least one function of setting the validity period nt and the function of detecting the digital content. 1 1 and a detecting digital content The number of times that can be read _ 8 · 2 1 2 range The first item has the encryption and decryption function of the embedded resource set 'where the only key-value coupling - protection interface. 9 · Item 7 has encryption and decryption function The embedded asset storage device, wherein the protection interface is stored in the information processing device. 1〇·If the patent application scope is the ninth item, the ancient w*, /, the embedded storage device with encryption and decryption function, Among them, the information processing skirt includes a desktop computer, a hand 18 200825741 computer, a personal digital assistant (PDA), a mobile phone, a palm-shaped information processing device. 11 · The encryption and decryption function is embedded in the seventh application patent scope. The information storage device, wherein the protection interface comprises: a first function module for detecting whether the viewing program for turning on the digital content is correct: the first function module is configured to detect whether the unique key value is correct; a function module for detecting the expiration date of the digital content; a fourth function group for detecting the readable count of the digital content; and a - control module for prohibiting copying and pasting Top, cut Archive, save new files, print, screen print; _ 12.: Pre-loaded digital property management method, on the information storage device, the steps of the method include: Ganjin input placement into the poor The information storage device is in the information processing device: :=! Burning: the program interface, selecting the desired digital content; and: the film over: Hai: the input information storage device has the encryption and decryption function control to protect the unique key value The encryption program is executed to protect the digital content by the digital content, and is broadcasted by the Garda, the:: text and burned in the revenue information storage device, and the unique key value storage is recorded in the control chip.亚 19 200825741 3· As for the method of the patent scope of the application, Mu Muxian County carries the property management of the number of persons, and the digital content is generated by an application. The pre-loaded digital property management code described by the employee is generated by a cryptographic algorithm. 14. The method of claim u, wherein the cryptographic key value 〇 15+二mr11項所述之預先載入數位財產管理 /、中该加密燒錄程式介面至少包含: 一增加功能模組’用以增選所需之數位内容· 2除功能模組’用以刪除不必要之數位内容,·及 片一其係透過該具有加解密功能之控制晶 產生-=值’將所選取之該數位内容加密, _ 16· —種具預先載入數位財產 步驟: 嘗理的方法,該方法包含下列 置於一資訊處理裝置中: 置之具有加解密功能之控制 女裝一嵌入式資訊儲存裝 透過該嵌入式資訊儲存裝 晶片,索取唯一鍵值; &quot;ί貞測该唯一鍵值是否正確; 右上述偵測之判斷為真,解開該密文檔; 透過防護#面開啟檢視程式讀取該數位内容 偵測該檢視程式是否結束; 20 200825741 若上述偵測之判斷為真,刪除 位內容與關閉防護界面; π處理衣置上之數 偵測该嵌入式資訊儲壯曰 裝置中;以及 衣疋否仍安裝在該資訊處理 若上述偵测之判斷 數位内容鱼^ 否,則刪除位於資訊處理裝置上之 數位内谷與關閉防護界面並結束檢視程式。 17·如申請專利範圍 法± _乐15項之預先載入數位財產管理的方 ’’ 檢視程式包括讀取功能以讀取該數位内容。The pre-loaded digital property management system described in 15+2 mr11 includes at least: an additional function module 'to add the required digital content · 2 except the function module' Deleting unnecessary digital content, and the first one encrypts the selected digital content through the control crystal generation -= value of the encryption and decryption function, _ 16 · - preloading digital property steps: The method comprises the following steps: being placed in an information processing device: a control device having an encryption and decryption function; an embedded information storage device is used to obtain a unique key value through the embedded information storage device; &quot; Detect whether the unique key value is correct; the judgment of the right detection is true, and the secret document is unlocked; and the digital content is read through the protection #面面View program to detect whether the viewing program ends; 20 200825741 Judging as true, deleting the bit content and closing the protection interface; π processing the number of clothes on the device to detect the embedded information storage device; and whether the clothing is still installed in the information If the above detection processing of determining whether the digital content fish ^, is located within the deletion of information on the digital processing means and valleys and a closed end of the protective interface to view the program. 17. If the patent application scope law ± _ Le 15 pre-loaded digital property management party ’’ viewer includes a read function to read the digital content.
TW95144835A 2006-12-01 2006-12-01 Embedded information storage device and preload drm method for the same TWI326825B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95144835A TWI326825B (en) 2006-12-01 2006-12-01 Embedded information storage device and preload drm method for the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95144835A TWI326825B (en) 2006-12-01 2006-12-01 Embedded information storage device and preload drm method for the same

Publications (2)

Publication Number Publication Date
TW200825741A true TW200825741A (en) 2008-06-16
TWI326825B TWI326825B (en) 2010-07-01

Family

ID=44772082

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95144835A TWI326825B (en) 2006-12-01 2006-12-01 Embedded information storage device and preload drm method for the same

Country Status (1)

Country Link
TW (1) TWI326825B (en)

Also Published As

Publication number Publication date
TWI326825B (en) 2010-07-01

Similar Documents

Publication Publication Date Title
TWI363978B (en) System and method for biometrically secured, transparent encryption and decryption
US20090222500A1 (en) Information storage device and method capable of hiding confidential files
US8412926B1 (en) Using file metadata for data obfuscation
US20080235521A1 (en) Method and encryption tool for securing electronic data storage devices
Lee et al. Secure Data Deletion for USB Flash Memory.
KR101033511B1 (en) Method for protecting private information and computer readable recording medium therefor
US8972747B2 (en) Managing information in a document serialization
US20070153580A1 (en) Memory arrangement, memory device, method for shifting data from a first memory device to a second memory device, and computer program element
JP2008134821A (en) Electronic file processing program and information processor
US9076007B2 (en) Portable data support with watermark function
JP2006172351A (en) Method and system for content expiration date management by use of removable medium
CN113806785B (en) Method and system for carrying out security protection on electronic document
TW200825741A (en) Embedded information storage device and preload DRM method for the same
CN101901320A (en) Data leakage prevention method for electronic book reader
JP2004023122A (en) Encryption system utilizing ic card
JP4600021B2 (en) Encrypted data access control method
JP2007188307A (en) Data file monitor apparatus
TW576996B (en) Method for encrypting secured data with virtual space
TWI328181B (en) The protection interface of preload drm and method for the same
Halcrow Demands, solutions, and improvements for Linux filesystem security
TWI263432B (en) Data security method for storage apparatus and storage media and electronic device
Sirgiannis et al. Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures
Kościelny et al. PGP systems and TrueCrypt
JP2011108151A (en) Security adaptor for external storage
CN101324865A (en) Embedded type information memory device and method for preloading digital assets management