TW295656B - - Google Patents

Download PDF

Info

Publication number
TW295656B
TW295656B TW85101396A TW85101396A TW295656B TW 295656 B TW295656 B TW 295656B TW 85101396 A TW85101396 A TW 85101396A TW 85101396 A TW85101396 A TW 85101396A TW 295656 B TW295656 B TW 295656B
Authority
TW
Taiwan
Prior art keywords
signal
data
copy
patent application
item
Prior art date
Application number
TW85101396A
Other languages
Chinese (zh)
Original Assignee
Macrovision Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/267,635 external-priority patent/US5513260A/en
Application filed by Macrovision Corp filed Critical Macrovision Corp
Application granted granted Critical
Publication of TW295656B publication Critical patent/TW295656B/zh

Links

Landscapes

  • Signal Processing For Digital Recording And Reproducing (AREA)

Description

A7 B7 五、發明説明( 光碟(CD)被公認為是儲存數位資料之極佳媒體。其高 儲存密度,低製造成本Μ及對不正當處理之相當免疫力是 其它媒體所難及的。CD在作為高傳真音訊載體方面的成功 亦可能在多媒體領域得到相同成果,在多媒體領域中技術 被用在遵照諸如CD-ROM,CD-Video,CD-1等多種標準儲存 數位音訊,視訊及文數資料等多種目的之更廣泛工作。 目前,CD ROM軟體著作權所有者尚不需對類似錄影帶 及錄音帶媒體之猖獗剽竊情形(未授權盗販)採取對策。 這主要是因為製作與複製CD的投資成本較大,對刹竊者構 成足夠之財務障礙。不過,現在市面上已有售價約二千元 給專業使用者使用之光碟記錄機可完美複製已錄好之CD且 極可能在數年後,消費者負擔得起的錄放機將普及。如此 這將會在軟體生產商與消費者之間造成嚴重分技,因此軟 體生產商需Μ至少50元出售其產品獲利,而消費者由空白 光碟Η製作完美拷貝之成本預計很快就會在10至20元之範 圍。此問題可能會比影罌錄影帶業之剿竊更為嚴重,因為 只有少數人願意重看同一部電影而多媒體產品卻希望能重 複使用,因此未來之趨勢將是擁有而非租借。 經濟部中央標準局員工消費合作杜印製 ^1- —^ϋ ^Ί^—t n^— —in— ml ftm ^ nn I (請先閲讀背面之注意事項再填寫本頁) 本發明所解決之基本問題是確保消費者僅能播放合法 製造之CD來享用軟體之製作產品。 一種對付剿竊問題之方法是在CD記錄機中加入依照製 造商間之一般協議之特別防拷貝電路,該協議類似發展用 於數位錄音帶(DAT)媒體之串列拷貝管理条統(SCMS)。在 此条統,CD記錄機將從數位資料中尋找一特別防拷貝指令 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 4 經濟部中央標隼局員工消費合作社印製 A7 B7 五、發明説明(2 ) 並在找到後停止記錄。不過,此種条統僅提供極有限的保 護。即使在首次提出用於DAT媒體之SCMS条統時,即已完 全瞭解到它對那些知道資料格式並能且隨後製作不昂貴之 ”黑盒”(電子電路)移去防拷指令藉以使記錄機無限製 作拷貝Η之專業或甚至業餘剌竊者而言幾乎是不具保護作 用的。 本申請人相信依賴資料潦中加入防拷指令之防拷条統 可被與CD記錄機中所加入用於尋找該些指令之電路相同複 雜度與成本之黑盒擊敗。因此,這種条統之效果有限。黑 盒將連接於一 CD播放機與一 CD記錄機之間並將尋找資料流 中之特別防拷指令並移去或修改這呰指今。因此,若採用 此類防拷条統,不難想像不昂貴之黑盒將會激增。 此種防拷方法的另一困難是需確使所有CD記錄機製造 商將所需之偵測電路加入其產品中。有些製造商可能不會 這麼做,或許是出於增加其市場佔有率之預期。市場上這 些未遵守之機器所佔比率即使很小亦會危及此類防拷条統 之生存。 由於上述理由,用於光碟媒體之防拷系統需提供軟體 權所有者之一高階保護,不僅要能免疫於黑盒且要不受少 數拒絕遵從榡準之硬體製造商的影饗。 依據本發明,一條件播放糸統對多種媒體(譬如光碟 媒體)已錄好之材料提供著作權保護。由於將於後文說明 之本發明可應用於多種不同媒體且對於本技藝普通程序熟 知者而言可很容易將本發明之原則適用於其它媒體,故下 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) ^n* 1^111 ml* mu ^^^^1 aj^n- n^i— (請先閱讀背面之注意事項再填寫本頁) 5 經濟部中央標準局員工消費合作社印製 A7 B7 五、發明説明(3 ) 文僅將說明本發明在光碟媒體方面的應用。 本發明可克服上逑糸統之缺點。條件播放糸統並不企 圖阻止CD記錄機複製防拷CD之資料。而是提供一種方法讓 CD播放機可決定是否一特別CD為合法原版或不法拷貝。若 為合法,則播放機正常播放CD。若不合法,則播放機停止 工作並顯示一適當之著作權警告訊息。 在製造母碟Η時,將一認證簽名印在碟片上使CD播放 機無法在正常光學讀取時讀到,但可由其它裝置輕易偵測 。認證簽名之特性使其可正確從母碟Η轉移至由其所製成 之所碟片上。不過,若使用CD記錄機製作非法拷貝 生產碟,拷貝Η可包含正確複製之被拷Η上之程式資 料,但認證簽名則未被轉移至拷片。遵照此防拷檫準之所 有CD播放機將包含一搜尋認證簽名之子条統。若未發現簽 名,CD播放機將不會播放該碟Η。 對於光碟應用方面,最好是Μ徑向位置調變寫頭將認 證簽名印在母碟片上,徑向位置調變寫頭是以與寫頭之正 常位置有約為數十奈米(nra〉之峰對峰距離製作母碟片。然 後此認證簽名可為利用CD播放機内已有之徑向追蹤伺服条 統,在僅增加播放機最小複雜度之CD播放機讀取,下文將 作說明。 在~所有CD播放機中,光學讀頭為一羼播放機正常功能 之複雜之錯誤偵測糸統維持在軌道上。譬如,若讀頭稍偏 移至軌道任一邊,或由於一偏心轉軸使軌道在讀頭下移動 時,則會偵測到錯誤並在放大後施加至徑向傳動器以校正 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) , _ 6 — (請先閲讀背面之注意事項再填寫本頁) ,衣. 經濟部中央樣準局員工消費合作杜印製 A7 B7 五、發明説明(4 ) 讀頭至軌道中心。由於光學謓頭亦須追蹤一定義認證簽名 之有意感應之徑向位置調變,因此,此錯誤電壓包含一對 應此調變之信號成份Μ及對應橢圓錯誤與類似錯誤之其它 信號。因此,藉由適當處理此錯誤電壓可偵測認證簽名。 此位置調變信號可Μ是一簡單的正弦頻率使一個整數 數目之週期在碟片每一旋轉期間被印上碟片,或一完整週 期在碟片轉動整數數目轉次期間被印上碟片。在任一情況 ,均能簡化從許多其它追蹤錯誤信號中取出認證簽名。一 相關類形之異常掃描在Mori moto (列入本文參考 > 之美國專 : 利5, 中有說明,它說明一不穩定之正常追蹤信號 使追蹤在一平均頻率Μ正弦路徑緩慢移動。 很明顯地由於認證簽名未被轉移至碟片,故此防拷糸 統不會被任何連接於一 CD播放機之信號_出與一 CD記錄機 之信號輪入間之外部黑盒破解。 若一些製造商選擇不將認證糸統建入其CD播放機中時 亦不會危及本糸統,因海盗版碟片製作者須橒示其產品僅 能在市面上有限之未遵守規定CD播放機中播放。實際上海 盗版碟片製作者將廣告其非法產品因而會招至控訴。 現說明三種形式之此類條件播放糸統。此三種條件播 放糸統之一共同處是使用上述印在合法製造之CD或其它媒 體上之特別認證簽名,此認證簽名不羼於記錄”程式”信 號的一部份,因此不會被轉移至非法拷貝片上。A7 B7 V. Description of Invention (CD is recognized as an excellent medium for storing digital data. Its high storage density, low manufacturing cost, and considerable immunity to improper handling are difficult for other media. CD The success as a high-definition audio carrier may also achieve the same results in the multimedia field. In the multimedia field, the technology is used to store digital audio, video and text data in accordance with various standards such as CD-ROM, CD-Video, CD-1, etc. More extensive work for various purposes such as data. At present, CD ROM software copyright owners do not need to take countermeasures against rampant plagiarism (unauthorized piracy) of similar video and audio media. This is mainly due to the investment in making and copying CDs The cost is relatively high, which constitutes a sufficient financial barrier for the thief. However, there are already disc recorders on the market that sell for about 2,000 yuan for professional users. They can perfectly copy the recorded CD and are likely to be in a few years. In the future, consumers will be able to afford affordable recorders. This will cause a serious divide between software manufacturers and consumers, so software manufacturers need to Μ sells its products for at least 50 yuan to make a profit, and the cost for consumers to make perfect copies from blank discs Η is expected to be in the range of 10 to 20 yuan soon. This problem may be more than the piracy of the video pop industry Seriously, because only a few people are willing to watch the same movie and the multimedia products want to be reused, so the future trend will be to own rather than rent. Employee consumption cooperation of the Central Bureau of Standards of the Ministry of Economic Affairs Du Print ^ 1- — ^ ϋ ^ Ί ^ —tn ^ — —in— ml ftm ^ nn I (please read the precautions on the back before filling out this page) The basic problem solved by the present invention is to ensure that consumers can only play legally made CDs to enjoy the production of the software Products. One way to deal with the piracy problem is to add a special copy protection circuit to the CD recorder in accordance with the general agreement between manufacturers, which is similar to the development of serial copy management system (SCMS) for digital audio tape (DAT) media ). In this system, the CD recorder will look for a special copy-protection instruction from the digital data. The paper standard is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) 4 Central Ministry of Economic Affairs Falcon Bureau employee consumer cooperatives printed A7 B7 V. Description of invention (2) and stopped recording after finding it. However, this kind of system only provides extremely limited protection. Even when the SCMS system for DAT media was first proposed, That is, it is fully known to professional or even amateur thieves who know the format of the data and can then make inexpensive "black boxes" (electronic circuits) to remove the copy protection instructions so that the recorder can make unlimited copies of Η The applicant believes that the copy protection system that relies on the addition of copy protection instructions in the data library can be defeated by a black box with the same complexity and cost as the circuit used to find these instructions in the CD recorder Therefore, the effect of this rule is limited. The black box will be connected between a CD player and a CD recorder and will look for special copy protection commands in the data stream and remove or modify this instruction. Therefore, if such a copy protection system is adopted, it is not difficult to imagine that inexpensive black boxes will proliferate. Another difficulty with this copy protection method is to ensure that all CD recorder manufacturers add the required detection circuits to their products. Some manufacturers may not do this, perhaps in anticipation of increasing their market share. The small proportion of these non-compliant machines on the market can jeopardize the survival of such copy protection systems. For the above reasons, the copy protection system used for optical disc media needs to provide high-level protection from one of the software rights owners. It must not only be immune to black boxes but also be protected from the hardware manufacturers who refuse to comply with the standards. According to the present invention, a conditional playback system provides copyright protection for materials that have been recorded on various media (such as optical disc media). Since the invention to be described later can be applied to a variety of different media, and those familiar with ordinary skills in the art can easily apply the principles of the invention to other media, the following paper standards apply to the Chinese National Standard (CNS) A4 specification (210X297 mm) ^ n * 1 ^ 111 ml * mu ^^^^ 1 aj ^ n- n ^ i— (please read the notes on the back before filling this page) 5 Employee consumption of the Central Standards Bureau of the Ministry of Economic Affairs Printed by the cooperative A7 B7 V. Description of the invention (3) The article will only explain the application of the present invention to the optical disc media. The invention can overcome the shortcomings of the upper Edo system. The conditional playback system does not attempt to prevent the CD recorder from copying the data of the copy-protected CD. Instead, it provides a way for the CD player to decide whether a particular CD is a legal original or illegal copy. If it is legal, the player plays the CD normally. If it is not legal, the player stops working and displays an appropriate copyright warning message. When manufacturing the master disc H, an authentication signature is printed on the disc so that the CD player cannot read it during normal optical reading, but it can be easily detected by other devices. The characteristics of the authentication signature enable it to be transferred from the master disc H to the disc made by it. However, if an illegal copy production disc is made with a CD recorder, the copy Η may contain the correctly copied program data on the copied Η, but the authentication signature has not been transferred to the copy. All CD players that comply with this copy-protection standard will include a sub-system of searching for certified signatures. If no signature is found, the CD player will not play the disc. For optical disc applications, it is best that the radial position modulation write head prints the authentication signature on the master disc. The radial position modulation write head is approximately tens of nanometers (nra) from the normal position of the write head. 〉 The peak-to-peak distance of the master disc. Then this certified signature can be read by the CD player that only increases the minimum complexity of the player by using the radial tracking servo system already in the CD player, which will be explained below In all CD players, the optical read head is a complex function of the normal function of the player. The error detection system is maintained on the track. For example, if the read head is slightly shifted to either side of the track, or due to an eccentric shaft When the track is moved under the reading head, an error will be detected and applied to the radial actuator after magnification to correct this paper. The standard of China is (CNS) A4 specification (210X297mm), _ 6 — (please first Read the precautions on the back and then fill out this page). Clothing. Duplicate printing of the A7 B7 by the consumer cooperation of the Central Prototype Bureau of the Ministry of Economic Affairs. 5. Description of the invention (4) Reading head to the center of the track. Since the optical head must also track a definition certification Signed intentionally The corresponding radial position is modulated. Therefore, the error voltage includes a signal component M corresponding to the modulation and other signals corresponding to elliptical errors and similar errors. Therefore, the authentication signature can be detected by properly handling the error voltage. The position modulation signal may be a simple sinusoidal frequency such that an integer number of cycles is printed on the disc during each rotation of the disc, or a complete cycle is printed on the disc during the rotation of the integer number of disc rotations. In either case, it can be simplified to extract the authentication signature from many other tracking error signals. A related type of anomaly scan is described in Mori moto (incorporated in this article reference> U.S. Patent: Lee 5,). The stable normal tracking signal causes the tracking to move slowly at an average frequency M sinusoidal path. Obviously, because the authentication signature has not been transferred to the disc, the copy protection system will not be affected by any signal connected to a CD player. The external black box of a CD recorder's signal rotation is cracked. If some manufacturers choose not to build the certification system into their CD player, it will not endanger the system, because Pirate disc producers must show that their products can only be played on limited non-compliant CD players in the market. In fact, pirate disc producers will advertise their illegal products and will therefore be prosecuted. Now three types of forms are described. This kind of conditional playback system. One of the three conditional playback systems is the common use of the above-mentioned special authentication signature printed on legally manufactured CDs or other media. This authentication signature is not used to record part of the "program" signal , So it will not be transferred to illegal copies.

第一種條件播放条統需要所有遵守特別檷準(譬如CD-R0M)之CD播放機須對每一欲播放之CDH尋找認證簽名。CD 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁) 衣· if 7The first conditional playback system requires all CD players that comply with special standards (such as CD-ROM) to find an authentication signature for each CDH to be played. CD The size of this paper is in accordance with Chinese National Standard (CNS) A4 (210X297mm) (Please read the precautions on the back before filling out this page) Clothing · if 7

經濟部中央標準局員工消費合作社印II A7 B7 五、發明説明(5 ) 播放機之控制条統在找不到認證簽名時須停止播放。如前 所述,由於非法拷貝CD片沒有認證簽名,故此類拷貝片將 是無用的,因此對於含有正確之程式複製資訊之非法拷貝 片仍可實現有效防拷。 第一種条統之缺點是所有打算在此種特別CD播放機中 播放之合法CD須加入認證簽名。因此此条統僅可適用於封 閉条統,其中一条統控制器可使所有CD受到防拷。不過, 從商業觀點則希望以程式為單位提供防拷與收費。下文將 說明之第二及第三種條件播放条統則具有此種能力。 在第二種播放糸統,欲防拷之CD將包含一特別指令告 訴所有的CD播放機尋找認證簽名並在未發現認證簽名 止播放該CD。譬如此指令可被記錄在CD之初始化區 通常用於保留非程式之資訊區段。此指令將被所有遵守規/ 則之CD播放機中之特別子条統所起動。因此,僅有原版之 防拷CD可被播放一非法拷貝CD將被拒絕。不需防拷之CD程 式將省略此指令,因此對於這些程式不論原版CD或拷貝版 均可正常播放。故可透過使用或不使用此”尋找認證簽名 且僅在發現時播放”之指令提供以程式為單位之防拷。 不過,雖然第二種條件播放糸統允許Μ程式為單位提 供防拷特性,但基本上仍可能被連接於CD播放機與CD記錄 機間之信號線上的特別黑盒所破解。這些黑盒將自CD 播放機之資料流中搜尋”尋找指令並移去或 指 令使非法拷貝CD不會觸發CD播放機中之認證程序。 一稱爲可程式條件播放糸統(PCPS)之第三種條件播放 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) (請先閲讀背面之注意事項再填寫本頁) 装. -訂 經濟部中央標準局員工消費合作社印製 Α7 Β7 五、發明説明(6 ) 条統可克服上述二糸統之缺點並提供一種Μ程式爲單元來 啟動同時對黑盒攻擊具有高抵抗能力之防拷条統。 下文將說明一使用對稱及不對加密技術組合以得到防 拷目檫之可程式條件播放条統之實施例。 第1圖係一加入本發明一些要素之母碟製作程序之硬 體方塊圖;Μ及 第2圖係一加入本發明另一些要素之光碟播放裝置之 方塊圖。 本發明係有關一用於防拷多種程式散布媒體(諸如光 碟媒體)之方法與裝置。本發明可應用在所有的碟片媒體 且對於普通熟知本技藝者而言可將這些原理沿用至諸如磁 帶之其它媒體上。本發明提供軟體權擁有者一高階保護, 可免疫於黑盒攻擊且不會受到少數拒絕遵照橒準之硬體製 造商之影饗。 如前所述,希望能Μ程式為單元提供著作權擁有者防 拷能力並Μ程式為單元收費或Μ碟片爲單元收費。此在使 用對稱及不對稱(亦稱為公输)資料加密組合Μ允許CD播 放機處理防拷或非防拷碟Η使黑盒破解防拷變得極為困難 或極昂貴並費時之可程式條件播放条統中可被實現。 對傳統加密方法之摘要說明將有肋於深入瞭解本發明 。最普通之資料加密形式稱為對稱加密,它在加密與解密 資料時使用相同之鑰。為防止Μ嘗試錯誤方式猜測該鍮, 此鑰最好是一經常改變之隨機產生之極大數目。譬如此鑰 可Μ 是 349,247,839,636,290,351,673之數目。此數目( 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) -I---1—--4 装----1 n (請先閱讀背面之注意事項再填寫本頁) 9 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明(7 ) 鑰)通常將保密Μ確保条统完整。需對此綸保密是對稱加 密糸統之主要缺點。常用之DES演算法是對稱加密条统之 一例子,其中使用一個56位元之鑰加密安排成64位元區段 之數位字組。56個二進位位元相當於17個十進位數位。 不對稱加密糸統使用二個不同之鍮,稱為Ρ及Q。輪 Ρ用於加密而另一鑰Q用於解密。不對稱系統之一重要優 點是若只知道用於解密之鑰Q並不足Μ對訊息加密。目前 ,一種最常用於不對稱加密之安全演算法是由RSA Data 56(:111"丨1?公司(?154)使用1146 51等人之美國專利4,405,829 之技術所設計。此条統之安全是根基在從Q (若已知)計 算P極度困難。此計算包含分解可包含多至500數位之極 大數目。輸P及Q的數位愈多,分解程序所需的時間愈長 。實際上,鑰大小的選擇是為在產品生命期間減少分解可 能性至可接受的程度.,,且在認可之預期增加Y之計算能力内 PCPS第一實施例包含第1圖所示之母碟製作裝置之一 部份以及第2圖所示之CD播放機之另一部份。 PCPS母碟製作設備包含一接受來自傳統源之”乾淨” (未加密)數位資料流之防拷記錄裝置10,一輸入端21, 輪入至對稱加密器22及一操作員控制之雙極單擲控制開鼷 24之一極Sla之OFF位置。藉由適當設定開關24,操作員可 控制所製作由信號線21輪入之程式之CD是否防拷。對稱加 密器22亦接收來自鑰源33在信號線23上之第一鑰信號,鑰 K ° --I ---II--^,表| I - - J— n ^ (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS〉A4規格(210X297公釐) 10 -1 η 經濟部中央標準局員工消費合作社印製 A7 __ B7 五、發明説明(8 ) 對稱加密器22之輸出是信號線21上之乾淨數位資料流 之加密版本。後文將說明22所使用之加密演算法種類及鍮 K之特性。欲瞭解本發明,知道加密器22依據鍮K所決定 之某公式修改信號線21上之乾淨資料即已足夠。對稱加密 器22之輸出端連接至開關Sla之第三輸入。Sla之輸出連接 至靥一公输条統一部份之不對稱加密器25之輪入。 為確保此可程式條件播放糸統之安全性,須嚴加保密 公鑰對P,Q之加密鑰P。為此目的,鍮P最好是儲存於 输源27之非揮發性記憶體中。此揮發記憶體可在一受到保 護之實際包體内,當未授權嘗試譲取鍮P時會使此記憶體 被清除並關閉糸統。可實現此項能力之實際安全条統爲本 技藝所熟知,故不在此赘述。 在信號線28上來自不對稱加密器2 5之不對稱加密資料 連接至一傳統母碟製作裝置之資料輪入部份。 一認證簽名產f^.29產生一認證信號31,其特性與目 的前已說明。信號接至防拷控制開關24之第二極Sib 之一_入。Sib之另一端未被施加信號且通常接地。操作 員控制之開關Sib僅在選擇防拷模式時將認證信由 Ύ ,ν·. 信號線32連接至徑向傳動器。 ' 第2圖顯示使用在CD播放機内之防拷裝置40。在信號 線41上來自CD之被適當解碼與錯誤校正之程式資料輸入至 為前述公鍮對P,Q之第二输Q所驅動之不對稱解密器42 。鍮源43提供鑰Q至信號線44上。在倍號線45上之不對稱 解密資料連接至開關55之一輸入Μ及對稱解密器46之輸入 本紙張尺度適用中國國家標準(CNS ) A4規格(21〇X 297公釐) I I - t— - PI - - 4^1 I I I τ—-訂 (請先閲讀背面之注意事項再填寫本頁) 11 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明(9 ) 。對稱解密器46在信號線48上之來自鍮源49之相同鑰K之 控制下執行與第1圖中之對稱加密器22相反的動作。 在信號線56上之對稱解密器46之輸出連接至開關55之 一第二輸入。信號線54上之開關55之輸出連接至CD播放機 之其它傳統之資料處理部份。及K被永久儲存在CD播 放機中之便利僅讀記憶體中且不需特別的安全預防措施。 ¥後文所述,知道這些輪值對企圖破解此防拷糸統之準刹 ^ :濩助 <在信號上來自CD播放機之徑向追蹤伺服放大器之 錯誤信號被輸入至認證信號偵測器52。如前所述,此信號 將有一對應認證簽名之成份。偵測器52會在信號線53上產 生一對應其輪入之認證簽名存在與否之二進位輪出。譬如 ,若認證簽名存在則此輪出爲邐輯1,若不存在則為邏輯 0 〇 選擇邏輯準位使開關在無認證簽名時選擇來自信號線 47之一次解密輸入,Μ及在偵測到認證簽名時選擇來自信 號線56之二次解密輪入。 現藉由檢査在不同環境下之反應可瞭解此可程式條件 播放糸統之工作情形。 當播放原版之防拷或非防拷光碟時,認證簽名之存在 與不存在會使開關S正確選擇一次解密資料或二次解密資 料。因此開關S之輪出將會是適當之解密資料。故所有原 版碟片將正常播放。 當播放非防拷之拷貝光碟時,認證簽名之不存在亦會 本紙張尺度適用中國國家標準(CNS ) A4規格(210X 297公釐) ^^1 In 111 m m 7^i (請先閱讀背面之注意事項再填寫本頁) 12 經濟部中央標準局員工消費合作社印製 A7 B7 五、發明説明(10 ) 使開關s正確選擇一次解密資料,因此允許此種光碟被正 常播放。 不過,當播放一防拷碟片之非法複製光碟時,認證簽 名之不存在會使開關s不正確地選擇一次解密資料。在信 號線54上之部份解密資料將阻止碟片的正常播放。 PCPS之安全性使刹竊者在製作防拷碟片之可播放複製 Η時變得非常困難。 欲製作防拷碟Η之可播放複製片,即被解此系統,剿 竊者須做到下列二者之一: 1. 當認證簽名不存在時,將記錄在所有防拷碟片上之 二次加密程式資料轉換為CD播放機所需之一次加密格式。 若要做轉換,剽竊者須得到使用在母碟製作程序中之機密 鏑P,如前所述,它可被秘密保護在一位於母碟製作廠中 之密閉設陷單元中。剽竊者可很容易地取得CD播放機内二 次加密之光碟資料。他亦可以鍮K及Q取得CD播放機内之 部份解密及完全解密(乾淨)之程式資料。不過,不對稱 加密法之特質使割竊者仍無法得到足夠資訊導出產生所要 之一次加密程式資料所需之機密输P。因此,此種複合加 密糸統允許選擇性的保護程式且免疫於黑盒的攻擊。 2. 在複製非法光碟時加入一可用之認證簽名至非法碟 片,使遵照規定之CD播放機將正常播放這些碟片。這是可 能的,但要如此做,剽竊者需大幅修改CD記錄機使其可設 計徑向位置調變之軌道。此種修改將遠超出消費者及軟體 經銷商之能力。不過,堅持說財力雄厚之剿竊作業無法找 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) ---<--.J---^ 〆衣---------訂 (請先閲讀背面之注意事項再填寫本頁) 13 經濟部中央標準局員工消費合作社印製 Α7 Β7 五、發明説明(11) 到破解方法則又不切實際。有多種方法使剌竊者在”偽造 ”一認證簽名時更為困難,但這些均多少將視市場現有之 CD記錄機中之徑向何服糸統(若有)之實際能力而定。簪 如,簽名可Μ是一脈衝函數形式(非一簡單之正弦),使 市售之CD記錄機中之徑向伺服無法追蹤簽名。當然,若允 許此虛構之剿竊者有無限之財力資源,則他可購買一專業 母碟製作条統並做所需之修改。 不過在實際上,此条統及方法在消除消費者,經銷商 及具有技術知識之專業層次之剿竊方面的能力應是極有價 值的。 若在本應用中之對稱加密與解密使用RSA Date Security 公司(RSA)所發展之公鑰演算法,則可使用極簡單之對稱 加密與解密演算法而不必包含安全性。詳言之,此”演算 法”可僅變換資料區段中之任一位元值或互換任何二位元 值。因此可避免一般所瞭解之正式鑰控制加密與解密条統 而用簡單之互補邏輯蓮算。因此在製作程序與CD播放機中 所使用之翰K就不需要了。 實現本發明之進一步簡化是對一小部份之程式資料而 非所有資料流做多種加密與解密程序。這是有利的,因為 它會降低不對稱解密子糸統需處理之速率(位元/秒), 故可使用較不昂貴之處理器。 另一用於認證一光碟之同樣有效方法是以離開製作之 碟Η中心特定徑向距離連接一或多個特定資料區段。 當母碟Η被停止時,寫頭可自中心Μ介於額定速度與 本紙張尺度適用中國國家標準(CNS ) Α4規格(210Χ297公釐〉 ----<--.J----1-装------訂 (請先閲讀背面之注意事項再填寫本頁) 14 經濟部中央標準局員工消費合作社印製 Α7 Β7 i、發明説明(12) 些撤超過額定速度間之隨機變化速率移動。寫頭之起始位 置亦可被移至距額定起始位置一隨機距離。因此,特別資 料區段與碟片中心之距離Μ及特別資料區段彼此間之距離 將是這些隨機變數之函數。這些隨機變數之值將被安排成 隨不同程式而變化。 一或多個資料區段與碟Η中心之距離、現為一不對稱加 密糸統之私鑰加密且加密資料被記錄在碟片上作為糸統資 料之一部份。當CD記錄機複製此種碟Η時,這些資料區段 與複製CD之中心距離與原始碟片之距離不同,這是因為市 售之CD記錄機之寫頭是Μ固定速度徑向驅動。 每一匹配之CD播放機將具有一校準之徑向伺服条統, 使讀頭與碟片中心之距離作為播放機内之一數位字組。當 CD被播放時》使用儲存在CD播放機中之一記憶體上的输對 P > Q中之公鍮Q解密該加密之徑向距離資料。這些解密 之資料將暫時存在隨機存取記憶體中。 當CD繼續播放時,前述資料區段之實際距離與應該之 距離的解密資料比較。若所計算之距離差大於容許錯誤時 則視爲因CD為非法複製Η所造成。CD播放機將停止播放且 可能顯示一著作權訊息。 另一實施例使用測量讀頭在不同資料區段位置之徑向 速度替代使用特定資料區段與碟片中心Μ及特定資料區段 彼此間之距離作爲碟Η認證之指示。此法之優點是不需準 確知道讓頭與碟片中心間之距離。它依賴讀頭在不同位置 之徑向速度之相對測量值,且很容易可自追蹤控制条統得 本紙張尺度適用中國國家標準(CNS ) Λ4規格(210Χ297公釐) ----S--.J----f 装------訂 (請先閱讀背面之注意事項再填寫本頁) 15 Α7 Β7 五、發明説明(13) 到此值。 雖然上述實施例說明一用於光碟格式之可程式條件播 放条統*但其原理亦可應用於磁帶格式。對於這類應用, 認證簽名32可加入磁帶之控制軌中。 雖然Μ較佳實施例說明本發明,但熟知本技藝者將瞭 解只要不偏離本發明之精神可對本發明做不同改變。申請 專利範圍一節中之各項說明及其類似精神定義本發明之範 圍0 ---<---I--γ 装------訂 (請先閲讀背面之注意事項再填寫本頁) 經濟部中央標準局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公釐) 16 經濟部中央標準局員工消費合作社印製 A7 B7 五、發明説明() 元件檫號對照 10.. ..防拷貝記錄裝置 41. ...信號線 21 · · ..輸入端 42. ...非對稱解密器 22. · ..對稱加密器 43. ...公输Q 23.. ..信號線 44. ...信號線 24. _ ..雙極單擲控制開關 45. ...信號線 2 5.. ..非對稱加密器 46. ...對稱解密器 26.. ..信號線 47. ...信號線 27.. ..機密輪 48. ...信號線 28.. ..信號線 49. •,· _ Κ 29. ..認證簽名產生器 51 _ ...信號線 31.. ..信號線 52. ...認證信號偵測器 32.. ..信號線 53. ...信號線 33. ,.輸Κ 54. ...信號線 40. ..防拷貝裝置 55. ...開關 (請先間讀背面之注意事項再填寫本頁) 裝.Printed by the Staff Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs II A7 B7 V. Description of the invention (5) The control rules of the player must stop playing when the certification signature is not found. As mentioned earlier, because illegally copied CDs do not have a certified signature, such copies will be useless, so illegal copies that contain the correct program copy information can still be effectively protected against copying. The disadvantage of the first rule is that all legal CDs that are intended to be played in this special CD player must be signed with an authentication signature. Therefore, this system can only be applied to the closed system, and one of the system controllers can protect all CDs from copy protection. However, from a commercial point of view, it is desirable to provide copy protection and charges in units of programs. The second and third conditional playback rules described below have this capability. In the second playback system, the CD to be copy-protected will contain a special instruction telling all CD players to find a certified signature and stop playing the CD if no certified signature is found. For example, the command can be recorded in the initialization area of the CD. It is usually used to reserve the non-program information section. This command will be activated by special sub-systems in all CD players that comply with the rules / rules. Therefore, only the original copy-protected CD can be played. An illegally copied CD will be rejected. CD programs that do not require copy protection will omit this command, so these programs can be played normally regardless of the original CD or copy version. Therefore, it is possible to provide copy protection in units of programs by using or not using the "find signatures and only play when found" command. However, although the second conditional playback system allows the M program to provide copy protection for the unit, it may still be cracked by a special black box connected to the signal line between the CD player and the CD recorder. These black boxes will be searched from the data stream of the CD player for "finding instructions and removing or instructing that illegal copying of the CD will not trigger the authentication process in the CD player. One is called the Programmable Conditional Playing System (PCPS). Three conditions for playing this paper scale are applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (please read the precautions on the back before filling out this page). Packed.-Printed by the Employees Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs Α7 Β7 5. Description of invention (6) The system can overcome the shortcomings of the above-mentioned two systems and provide an M program as a unit to activate the copy protection system with high resistance to black box attacks. The following will explain the use of symmetry and Encryption technology is not combined to obtain an embodiment of the program-proof condition for copy-protected copying. Figure 1 is a hardware block diagram of a master disc creation process that incorporates some elements of the invention; M and Figure 2 are added A block diagram of an optical disc playback device with other elements of the present invention. The present invention relates to a method and device for copy-protecting multiple program distribution media (such as optical disc media). The present invention can be applied All disc media and those of ordinary skill in the art can apply these principles to other media such as magnetic tape. The present invention provides a high-level protection for software rights owners, which is immune to black box attacks and will not be rejected by a few Follow the shadow of the hardware manufacturer. As mentioned above, I hope that the M program can provide the copyright owner with the copy protection capability of the unit and the M program charges the unit or the M disc charges the unit. This is symmetrical and not Symmetric (also known as public transmission) data encryption combination M allows CD players to handle copy-protected or non-copy-protected discs. This makes black box cracking and copy-protection extremely difficult or expensive and time-consuming. A brief description of the traditional encryption method will help you understand the invention in depth. The most common form of data encryption is called symmetric encryption, which uses the same key when encrypting and decrypting data. To prevent Μ from trying the wrong way to guess the 鍮, This key is preferably a randomly generated maximum number that changes frequently. For example, the key can be the number of 349,247,839,636,290,351,673. This number (this paper The Zhang scale applies to the Chinese National Standard (CNS) A4 specification (210X297mm) -I --- 1 ---- 4 pack ---- 1 n (please read the precautions on the back before filling this page) 9 A7 B7 Economy Printed by the Ministry of Standards and Staff of the Ministry of Consumer Cooperatives 5. Description of invention (7) Key) usually keeps confidentiality M to ensure the integrity of the system. The need to keep this confidential is the main disadvantage of symmetric encryption systems. The commonly used DES algorithm is symmetric encryption An example of a system, in which a 56-bit key is used to encrypt a digital block arranged in 64-bit segments. 56 binary bits are equivalent to 17 decimal bits. Asymmetric encryption system uses two different Rong, called P and Q. Round P is used for encryption and another key Q is used for decryption. One important advantage of an asymmetric system is that if only the key Q used for decryption is known, it is not enough to encrypt the message. At present, one of the most commonly used security algorithms for asymmetric encryption is designed by RSA Data 56 (: 111 " 丨 1? Company (? 154) using the technology of U.S. Patent 4,405,829 of 1146 51 and others. The security of this system is The foundation is extremely difficult to calculate P from Q (if known). This calculation includes the decomposition of a maximum number of up to 500 digits. The more digits you input P and Q, the longer the time required for the decomposition process. In fact, the key The choice of size is to reduce the possibility of decomposition to an acceptable level during the life of the product., And within the approved expected increase in the computing power of Y. The first embodiment of PCPS includes one of the master disc production devices shown in Figure 1 Part and another part of the CD player shown in Figure 2. The PCPS master production equipment includes a copy-protection recording device 10 that accepts a "clean" (unencrypted) digital data stream from a traditional source, and an input terminal 21. Turn in to the OFF position of one pole Sla of the symmetric encryptor 22 and an operator-controlled bipolar single-throw control switch 24. By appropriately setting the switch 24, the operator can control the rounding of the signal line 21 Whether the CD of the program is copy-protected. It is said that the encryptor 22 also receives the first key signal from the key source 33 on the signal line 23, the key K ° --I --- II-^, table | I--J-- n ^ (please read the back (Notes and then fill out this page) This paper scale is applicable to the Chinese national standard (CNS> A4 specification (210X297 mm) 10 -1 η Printed by the Ministry of Economic Affairs Central Standards Bureau Employee Consumer Cooperative A7 __ B7 V. Description of invention (8) Symmetric encryption The output of the encoder 22 is an encrypted version of the clean digital data stream on the signal line 21. The types of encryption algorithms used by 22 and the characteristics of K are described later. To understand the present invention, it is known that the encryption 22 is determined by K It is enough for a certain formula to modify the clean data on the signal line 21. The output of the symmetrical encryptor 22 is connected to the third input of the switch Sla. The output of the Sla is connected to the asymmetrical encryptor 25 of the unified part of the Tsai bus Round-robin. In order to ensure the security of this programmable conditional playback system, the secret public key pair P and Q plus the key P must be strictly secured. For this purpose, it is best to store the non-volatile memory in the input source 27 In the body. This volatile memory can be in a protected actual body Internally, when an unauthorized attempt is made to fetch P, the memory will be cleared and the system will be closed. The actual security rules that can achieve this capability are well known in the art, so they will not be repeated here. The asymmetric encryption data of the asymmetric encryption device 25 is connected to the data ingress part of a traditional master production device. An authentication signature product f ^ .29 generates an authentication signal 31 whose characteristics and purpose have been explained before. To one of the second poles of the copy-protection control switch 24, Sib. No signal is applied to the other end of the Sib and is usually grounded. The switch Sib controlled by the operator only passes the authentication letter from Ύ, ν · when the copy-protection mode is selected. The signal line 32 is connected to the radial actuator. 'Figure 2 shows the copy protection device 40 used in the CD player. The appropriately decoded and error-corrected program data from the CD on the signal line 41 is input to the asymmetric decryptor 42 driven by the second input Q of the aforementioned male pair P, Q. The source 43 provides the key Q to the signal line 44. The asymmetric decryption data on the double line 45 is connected to the input M of one of the switches 55 and the input of the symmetric decryptor 46. The paper size is applicable to the Chinese National Standard (CNS) A4 specification (21〇X 297 mm) II-t— -PI--4 ^ 1 III τ—-order (please read the notes on the back before filling in this page) 11 A7 B7 Printed by the Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economy V. Invention Instructions (9). The symmetric decryptor 46 performs the reverse operation of the symmetric encryptor 22 in Fig. 1 under the control of the same key K from the source 49 on the signal line 48. The output of the symmetric decryptor 46 on the signal line 56 is connected to a second input of the switch 55. The output of the switch 55 on the signal line 54 is connected to other conventional data processing parts of the CD player. And K is permanently stored in the CD player. It is convenient to read only the memory and no special safety precautions are required. ¥ As mentioned later, knowing these rotation pairs is attempting to crack the quasi-brake of this copy-protection system ^: 濩 助 < error signal from the radial tracking servo amplifier of the CD player is input to the authentication signal detector 52. As mentioned earlier, this signal will have a component corresponding to the authentication signature. The detector 52 will generate a binary round-out on the signal line 53 corresponding to the presence or absence of the round-by authentication certificate. For example, if the authentication signature is present, the round is set to 1; if it is not present, it is logic 0. Selecting the logic level causes the switch to select a decryption input from the signal line 47 when there is no authentication signature. When the signature is authenticated, the second decryption round from the signal line 56 is selected. Now we can understand the working condition of the programmable condition playback system by checking the response in different environments. When playing the original copy-protected or non-copy-protected disc, the presence or absence of the authentication signature will cause the switch S to correctly select primary decryption data or secondary decryption data. Therefore, the round of switch S will be the appropriate decryption data. Therefore, all original discs will be played normally. When playing a non-copy-protected copy disc, the absence of the certification signature will also apply the Chinese national standard (CNS) A4 specification (210X 297mm) to this paper standard ^^ 1 In 111 mm 7 ^ i (please read the back (Notes need to fill out this page) 12 A7 B7 printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs 5. Description of the invention (10) Enable the switch s to correctly select the decrypted data once, thus allowing such discs to be played normally. However, when an illegally copied disc with a copy-protected disc is played, the absence of the authentication signature will cause the switch s to incorrectly select the decrypted data once. Part of the decrypted data on the signal line 54 will prevent normal playback of the disc. The security of PCPS makes it very difficult for thieves to make playable copies of copy-protected discs. To make a playable copy of a copy-protected disc Η, that is, to be released from this system, the thief must do one of the following: 1. When the authentication signature does not exist, it will be recorded on all copy-protected discs. The secondary encryption program data is converted into the primary encryption format required by the CD player. To do the conversion, the plagiarist must obtain the confidential dysprosium P used in the mastering process. As mentioned earlier, it can be secretly protected in a closed trap unit located in the mastering factory. The plagiarist can easily obtain the secondary encrypted disc data in the CD player. He can also use K and Q to obtain partially decrypted and completely decrypted (clean) program data in the CD player. However, the characteristics of the asymmetric encryption method prevent the hacker from obtaining enough information to export the confidential input required to generate the desired encrypted program data. Therefore, this compound encryption system allows selective protection programs and immunity to black box attacks. 2. When copying illegal discs, add an available certification signature to the illegal discs, so that the CD player that complies with the regulations will play these discs normally. This is possible, but to do so, the plagiarist needs to significantly modify the CD recorder so that it can design the orbit of the radial position modulation. Such modifications will go far beyond the capabilities of consumers and software distributors. However, insist that the thieves with strong financial resources can not find this paper standard applicable to the Chinese National Standard (CNS) A4 specifications (210 X 297 mm) --- <-. J --- ^ 〆 衣 ---- ----- Order (please read the precautions on the back before filling in this page) 13 Α7 Β7 printed by the Employee Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs V. Description of the invention (11) The method of cracking is impractical. There are many ways to make it more difficult for thieves to "fake" a certified signature, but how much of these will depend on the actual capabilities of the radial (if any) of the existing CD recorders on the market. For example, the signature can be in the form of a pulse function (not a simple sine), which prevents the radial servo in a commercially available CD recorder from tracking the signature. Of course, if this fictitious thief is allowed unlimited financial resources, he can purchase a professional mastering system and make the necessary modifications. In practice, however, the ability of this system and method to eliminate theft from consumers, dealers, and professionals with technical knowledge should be extremely valuable. If the public key algorithm developed by RSA Date Security (RSA) is used for symmetric encryption and decryption in this application, very simple symmetric encryption and decryption algorithms can be used without including security. In detail, this “algorithm” can only transform any one-bit value in the data section or exchange any two-bit value. Therefore, it is possible to avoid the commonly known formal key control encryption and decryption rules and use simple complementary logic calculations. Therefore, the Han K used in the production program and CD player is unnecessary. A further simplification for implementing the present invention is to perform multiple encryption and decryption procedures on a small part of the program data but not all data streams. This is advantageous because it reduces the rate (bits / second) that the asymmetric decryption subsystem needs to process, so a less expensive processor can be used. Another equally effective method for authenticating an optical disc is to connect one or more specific data segments at a specific radial distance from the center of the disc H being produced. When the master disc Η is stopped, the writing head can be from the center Μ between the rated speed and the paper size applicable to the Chinese National Standard (CNS) Α4 specifications (210Χ297mm> ---- <-. J ---- 1-installed --- ordered (please read the precautions on the back before filling in this page) 14 Printed Α7 Β7 i, the employee cooperative of the Central Standards Bureau of the Ministry of Economic Affairs i. Invention description (12) Some of the withdrawals exceed the rated speed Random change rate movement. The starting position of the write head can also be moved to a random distance from the rated starting position. Therefore, the distance M between the special data section and the center of the disc and the distance between the special data sections will be these A function of random variables. The values of these random variables will be arranged to vary with different programs. The distance between one or more data segments and the center of the disk Η is now a private key of an asymmetric encryption system and the encrypted data is encrypted Recorded on the disc as part of the system data. When the CD recorder copies this disc Η, the distance between the center of these data segments and the copied CD is different from the original disc, this is because the commercially available CD The writing head of the recorder is a radial drive of M fixed speed. Each matched CD player will have a calibrated radial servo system, so that the distance between the read head and the center of the disc is used as a digital block in the player. When the CD is played, use the information stored in the CD player An input pair on the memory P > public Q in Q decrypts the encrypted radial distance data. The decrypted data will be temporarily stored in the random access memory. When the CD continues to play, the data section The actual distance is compared with the decrypted data of the corresponding distance. If the calculated distance difference is greater than the allowable error, it is considered to be caused by the illegal copy of the CD. The CD player will stop playing and may display a copyright message. Another embodiment Use the measurement of the radial velocity of the reading head at different data sector positions instead of using the distance between the specific data sector and the disc center M and the specific data sector as the indication of the disc H certification. The advantage of this method is that it does not need to be accurately known The distance between the head and the center of the disc. It depends on the relative measurement value of the radial velocity of the read head at different positions, and it can be easily tracked and controlled to obtain this paper standard for China. Standard (CNS) Λ4 specification (210Χ297mm) ---- S-. J ---- f outfit ------ order (please read the precautions on the back before filling this page) 15 Α7 Β7 5 , Invention description (13) up to this value. Although the above embodiment illustrates a programmable conditional playback system for disc format *, the principle can also be applied to the tape format. For such applications, the authentication signature 32 can be added to the tape In the control track. Although the preferred embodiment of the present invention illustrates the present invention, those skilled in the art will understand that the present invention can be changed differently as long as it does not deviate from the spirit of the present invention. The scope of the invention 0 --- < --- I--γ outfit ------ order (please read the precautions on the back before filling out this page) The paper standard printed by the Staff Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs Applicable to China National Standards (CNS) Α4 specifications (210X297 mm) 16 A7 B7 printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs V. Description of invention () Component slogan control 10 ... copy protection recording device 41 .. .Signal line 21 · · .. Input 42. ... Asymmetric decrypter 22. · .. Symmetric Encryptor 43.... Public Signal Q 23. .. Signal Line 44. ... Signal Line 24. _ .. Bipolar Single Throw Control Switch 45. ... Signal Line 2 5. .. Asymmetric Encryptor 46 ... Symmetric Decryptor 26 ... Signal Line 47 ... Signal Line 27 ... Secret Wheel 48 ... Signal Line 28 ... Signal Line 49. • _ Κ 29. .. certification signature generator 51 _ ... signal line 31. ... signal line 52. ... certified signal detector 32 .... signal line 53. .. .Signal cable 33., input K 54 .... signal cable 40 .. copy protection device 55 .... switch (please read the precautions on the back before filling this page).

,1T 本紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公釐) 17, 1T This paper scale is applicable to China National Standard (CNS) Α4 specification (210X297mm) 17

Claims (1)

r A8 B8 C8 D8 π、申請專利範圍 第85101396號申請案申請專利範圍修正本 85.11.14. 1. 一種提供程式散布媒體防拷貝之方法,包含以下步驟 加入一認證簽名至媒體以便防拷貝; 傳送程式資料通過一第一加密器; 傳送來自該第一加密器之該第一加密程式資料通 過一第二加密器; 將來自第二加密器之資料記錄在一媒體上; 在一媒體播放機偵測認證簽名; 傳送來自該媒體之解碼資料通過一第一解密器; 傳送來自該第一解密器之該第一解密資料通過一 第二解密器; 當偵測到一認證信號時選擇該第二解密器之一輸 出,以及當未偵測到一認證信號時選擇該第一解密器 之一輸出。 2. 依據申諳專利範圍第1項所述之方法,其中該第一加 密器與該第二解密器為互補部件。 3 .依據申請專利範圍第1項所述之方法,其中該第二加 密器與該第一解密器是一非對稱或公鍮加密条統中之 互補部件。 4. 依據申請專利範圍第2項所述之方法,其中該第一加 密器是一用以變換或互換資料區段中之一或多脑位元 值之元件而該第二解密器則執行互補邏輯蓮算: 5. —種在記錄媒體之母片製作過程中提供防拷目.之方法 -13 - 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) --------^裝----.---^ 訂丨^-----; ★ (請先閲讀背面之注意事項再填寫本頁) 經濟部申央標準局貝工消费合作社印製 經濟部中央榇準局貝工消费合作社印装 A8 B8 C8 D8 六、申請專利範圍 ,包含以下步驟: 輸入一資料流; 産生一第一鍮信號; 連接該第一鍮信號至一對稱加密器; 連接該資料流至該對稱加密器; 加密該資料流; 連接該對稱加密器至一選擇器; 連接該資料流至該選擇器; 産生一第二鏑信號; 連接該第二输信號至一非對稱加密器; 選擇連接該資料流或對稱加密資料至該非對稱加 密器; 選擇非對稱加密資料; 連接非對稱加密資料至一母片製作装置之資料處 理部份; 産生一認證簽名信號;以及 當對稱加密資料連接該非對稱加密器時,連接該 認證簽名信號至一母片製作装置之時基控制機制以依 據該認證簽名信號修改該時基控制機制。 6 .依據申請專利範圍第5項所述之方法,其中該記錄媒 體是一光碟片。 7.依據申請專利範圍第5項所述之方法,其中該記錄媒 體是一 CD ROM碟片。 8 .依據申請專利範圍第5項所述之方法,其中該記錄媒 -19 - 本紙張尺度逋用中國國家標準(CNS ) A4規格(210X297公釐) I . Ϊ ,n I n J 旅 (請先閲讀背面之注意事項再填寫本頁) 經濟部中央橾準局貝工消费合作社印製 2 j5〇4)G a8 B8 C8 D8_ 六、申請專利範圍 體是一磁帶。 9 .依據申請專利範圍第5項所述之方法,其中該第一输 信號是一隨機鑰。 10 .依據申請專利範圍第5項所述之方法,其中該第二鏡 信號是一機密瑜。 11. 依據申請專利範圍第5項所述之方法,其中該資料流 未加密。 12. —種提供錄放裝置中之可包含先前加密資料之先前記 錄媒體在錄放過程中之防拷貝方法•其包含以下步驟 自該事先記錄之媒體提供已加密之資料; 産生一第一輪信號; 連接該第一输信號至一非對稱解密器; 非對稱解密來自該事先記錄之媒體的資料,産生 一第一解密資料流; 從一 _資料庫中找出一第二输信號; 産生一第二输倍號; 連接該第二鏑信號至一對稱解密器; 連接該第一解密資料流至該對稱解密器; 對稱解密該第一解密資料流,因此産生一第二解 密資料流; 提供一可能包含一認證信號之间服信號; 偵测該認證信號是否存在; 若偵測到認證信號,則産生一防拷貝信號; -20 - 本紙張尺度適用中國國家橾準(CNS ) A4说格(210X297公釐〉 --------=1 .裝----.--訂-----Γ,猓 (請先聞讀背面之注$項再填寫本頁) 經濟部中央標準局員工消費合作社印製 A8 B8 C8 D8 々、申請專利範圍 若防拷貝信號不存在,則選擇該第一解密資料流 9 若防拷貝信號存在,則選擇該第二解密資料流; 輸出所選擇之資料至該錄放装置之資料處理部份 Ο 13. 依據申請專利範圍第12項所述之方法,其中該事先記 錄之媒體是一 CD ROM碟片。 14. 依據申請專利範圍第12項所述之方法,其中該事先記 錄之媒體是一音訊CD片。 15 . —種用以在一記錄媒體上錄製母片之防拷貝記錄裝置 ,包含: 一用以接收數位資料流之輸入端; 一對稱加密器; 一提供一第一鐘信號之第一隨機鑰産生器,該第 一输信號連接至該對稱加密器; 一操作員控制之開關,用以決定將該數位資料流 或該對稱加密器之輸出連接至一非對稱加密器; 一提供一第二镝信號之第二鑰産生器,該第二鑰 信號被連接至該非對稱加密器; 該非對稱加密器被連接至一母片錄製裝置之資料 處理部份; 若該操作員控制之開關在OFF位置時,該數位資 料流會波該非對稱加密器非對稱加密; 一認證信號産生器,産生一指示錄製之母Η將波 -21 - 本紙張尺度適用中國國家標準(CNS ) Α4规格(210X297公釐) ^ ·裝 訂 1--'線 (請先閲讀背面之注意事項再填寫本頁) 經濟部中央標隼局另工消費合作社印製 AS B8 C8 D8 六、申請專利範圍 防拷貝之認證簽名信號,該認證簽名信號被連接至一 時基信號条统;以及 其中當該操作員控制之開關在训位置時•該認證 簽名信號被連接至該母片錄製裝置之該時基信號糸統 0 16. 依據申請專利範靨第15項所述之裝置|其中該記錄媒 髏是一數位錄音帶。 17. 依據申請專利範圍第15項所述之裝置,其中該記錄媒 體是一 CD ROM碟片。. 18. 依據申請專利範圍第15項所述之裝置,其中該記錄媒 體是一音訊CD片。 19. 依據申請專利範圍第15項所述之裝置,其中該時基信 號条統是一徑向傳動器糸統且在母片錄製期間該認證 簽名信號調變該徑向傳動器条統之一徑向位置。 20. 依據申請專利範圍第19項所述之裝置,其中該徑向傳 動器条統之調變包含自錄製之光碟片中心以介於一額 定速度與些微超出該額定速度間之隨機變化速率移動 〇 21. —種用以在一記錄媒體上錄製防拷貝資料之裝置,包 含: 用以連接數位資料流至一對稱加密器之裝置; 用以産生一第一镝信號之裝置; 使用該第一鑰信號對稱加密該數位資料流之裝置 9 -22 - 本紙張尺度適用中國國家揉準(CNS ) A4規格(210X297公釐) I . ^ 111 訂 11 I 11 ^ 深 (請先閲讀背面之注意事項再填寫本頁) ABCD 2〇5di>6 六、申請專利範圍 用以連接資料至一非對稱加密器之装置; 用以選擇該數位資料流或對稱加密資料之裝置; 用以産生一第二鑰信號之裝置; 使用第二输信號非對稱加密所選擇之資料的裝置 1 用以連接非對稱解密資料至一母片錄製裝置之資 料處理部份; 用以産生一指示該數位資料流將被防拷貝之認證 簽名信號之裝置; 用以選擇防拷貝模式或非防拷貝模式之装置;以 及 依據該認證簽名信號影響該記錄媒體之一時基条 統之裝置。 22. 依據申請專利範圍第21項所述之裝置|其中該第一鑰 信號是一隨機输。 23. 依據申請專利範圍第21項所述之裝置,其中該第二输 信號是一機密鑰。 24. —種用於錄放裝置之防拷貝裝置,包含: 用以連接一解碼資料信號至一非對稱解密器之裝 置; 用以産生一第一鑰信號之装置; 使用該第一鍮信號非對稱解密該解碼資料信號之 装置; 用以産生一第二摘信號之裝置; -23 - 本紙張尺度適用t國國家梂準(CNS ) Α4規格(210Χ297公釐) ---------ΐ 1裝------訂-----^ 線 (請先閲讀背面之注意事項再填寫本頁) 經濟部中央標準局負工消费合作社印衮 A8 B8 C8 D8 A 、申請專利範圍 用以連接一非對稱解密資料信號至一對稱解密器 之裝置; 使用該第二鑰對稱解密該非對稱解密資料之装置 ♦ 用以選擇來自該非對稱解密器之非對稱解密資料 或來自該對稱解密器之對稱解密資料之装置; 用以偵測一指示該乾淨資料信號將被防拷貝之認 證信號之裝置;以及 用以選擇肪拷貝摸式或非防挎貝模式以指示該解 嗎資料信號是否為防拷貝或非防拷貝。 ---------- — (請先閲讀背面之注意事項再填寫本頁) TJ 經濟部中央標準局員工消費合作社印裝 -24 - 本紙張尺度適用中國國家梯準(CNS ) A4规格(210X297公釐)r A8 B8 C8 D8 π, application for patent scope No. 85101396 Application for amendment to the patent scope 85.11.14. 1. A method for providing program distribution media copy protection, including the following steps to add a certified signature to the media for copy protection; transmission Program data passes through a first encryptor; transmits the first encrypted program data from the first encryptor through a second encryptor; records data from the second encryptor on a medium; detects on a media player Test the authentication signature; send the decoded data from the media through a first decryptor; send the first decrypted data from the first decryptor through a second decryptor; select the second when an authentication signal is detected One of the output of the decryptor, and the output of one of the first decryptor is selected when an authentication signal is not detected. 2. According to the method described in Item 1 of the patent scope, the first encryptor and the second decryptor are complementary components. 3. The method according to item 1 of the patent application scope, wherein the second encryptor and the first decryptor are complementary components in an asymmetric or public encryption system. 4. The method according to item 2 of the patent application scope, wherein the first encryptor is an element for transforming or exchanging one or more brain bit values in the data section and the second decryptor performs complementation Logical calculation: 5. A method to provide copy protection in the production process of the master film of the recording medium. 13-This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) ------ -^ 装 ----.--- ^ Order 丨 ^ -----; ★ (Please read the precautions on the back before filling out this page) Ministry of Economic Affairs Shenyang Standards Bureau Beigong Consumer Cooperative Printed by the Ministry of Economy A8 B8 C8 D8 printed by the Beigong Consumer Cooperative of the Central Bureau of Customs. 6. The scope of patent application includes the following steps: input a data stream; generate a first signal; connect the first signal to a symmetric encryptor; connect the Data stream to the symmetric encryptor; encrypt the data stream; connect the symmetric encryptor to a selector; connect the data stream to the selector; generate a second dysprosium signal; connect the second input signal to an asymmetric encryption Device; choose to connect the data stream or add symmetrically Data to the asymmetric encryption device; select asymmetric encryption data; connect the asymmetric encryption data to the data processing part of a master production device; generate an authentication signature signal; and when the symmetric encryption data connects to the asymmetric encryption device, connect the The authentication signature signal is sent to the time base control mechanism of a master production device to modify the time base control mechanism according to the authentication signature signal. 6. The method according to item 5 of the patent application scope, wherein the recording medium is an optical disc. 7. The method according to item 5 of the patent application scope, wherein the recording medium is a CD ROM disc. 8. According to the method described in item 5 of the patent application scope, in which the recording medium -19-the size of this paper uses the Chinese National Standard (CNS) A4 specification (210X297 mm) I. Ϊ, n I n J Journey (please Read the precautions on the back first and then fill out this page) Printed by the Ministry of Economic Affairs, Central Bureau of Industry and Commerce Beigong Consumer Cooperatives 2 j5〇4) Ga8 B8 C8 D8_ 6. The scope of patent application is a magnetic tape. 9. The method according to item 5 of the patent application scope, wherein the first input signal is a random key. 10. The method according to item 5 of the patent application scope, wherein the second mirror signal is a confidential signal. 11. According to the method described in item 5 of the patent application scope, the data stream is not encrypted. 12. —A copy-protection method for a previously recorded medium in a recording and playback device that can contain previously encrypted data during recording and playback • It includes the following steps to provide encrypted data from the pre-recorded medium; generate a first-round signal; Connect the first input signal to an asymmetric decryptor; asymmetrically decrypt the data from the pre-recorded media to generate a first decrypted data stream; find a second input signal from a database; generate a first Two input double numbers; connect the second dysprosium signal to a symmetric decryptor; connect the first decrypted data stream to the symmetric decryptor; symmetrically decrypt the first decrypted data stream, thus generating a second decrypted data stream; provide a May include a service signal between authentication signals; detect the presence of the authentication signal; if an authentication signal is detected, generate a copy-protection signal; -20-This paper standard is applicable to China National Standards (CNS) A4 210X297mm> -------- = 1. Installed ----.-- Ordered ----- Γ, 猓 (please read the $ item on the back and then fill in this page) Central Ministry of Economic Affairs Standards Bureau staff consumption Printed by Zuosha A8 B8 C8 D8 々 If the copy protection signal does not exist, select the first decrypted data stream 9 If the copy protection signal exists, then select the second decrypted data stream; output the selected data to Data processing part of the recording and playback device Ο 13. According to the method described in item 12 of the patent application scope, wherein the pre-recorded medium is a CD ROM disc. 14. According to the method described in item 12 of the patent application scope, The pre-recorded medium is an audio CD. 15. A copy-protection recording device for recording masters on a recording medium, including: an input for receiving digital data streams; a symmetric encryptor; A first random key generator providing a first clock signal, the first input signal is connected to the symmetric encryptor; an operator-controlled switch to determine the connection of the digital data stream or the output of the symmetric encryptor To an asymmetric encryptor; a second key generator providing a second dysprosium signal, the second key signal being connected to the asymmetric encryptor; the asymmetric encryptor Connected to the data processing part of a master recording device; if the operator-controlled switch is in the OFF position, the digital data stream will be asymmetrically encrypted by the asymmetric encryption device; an authentication signal generator generates an instruction to record Mother Η 将 波 -21-This paper scale is applicable to the Chinese National Standard (CNS) Α4 specification (210X297 mm) ^ · Binding 1-- 'line (please read the precautions on the back before filling this page) Ministry of Economic Affairs Central Standard Falcon The bureau co-operative consumer cooperative printed AS B8 C8 D8 VI. Patent application scope copy-proof certification signature signal, which is connected to a time-based signal system; and where the operator-controlled switch is in the training position • The authentication signature signal is connected to the time-based signal system of the master recording device 0 16. According to the device described in item 15 of the patent application | where the recording medium is a digital audio tape. 17. The device according to item 15 of the patent application scope, wherein the recording medium is a CD ROM disc. 18. The device according to item 15 of the patent application scope, wherein the recording medium is an audio CD. 19. The device according to item 15 of the patent application scope, wherein the time base signal system is a radial actuator system and the certification signature signal modulates one of the radial actuator systems during master recording Radial position. 20. The device according to item 19 of the patent application scope, wherein the modulation of the radial actuator system includes the movement of the center of the self-recorded optical disc at a random rate of change between a rated speed and slightly beyond the rated speed 〇21. —A device for recording copy-protected data on a recording medium, including: a device for connecting a digital data stream to a symmetric encryptor; a device for generating a first dysprosium signal; using the first Key signal symmetrically encrypts the device of the digital data stream 9 -22-This paper standard is applicable to China National Standard (CNS) A4 specification (210X297mm) I. ^ 111 Order 11 I 11 ^ Deep (please read the notes on the back first (Fill in this page again) ABCD 2〇5di > 6 6. Patent application device for connecting data to an asymmetric encryption device; device for selecting the digital data stream or symmetric encryption data; for generating a second key Signal device; device 1 that uses the second input signal to asymmetrically encrypt selected data to connect the asymmetric decryption data to the data processing portion of a master recording device; A device for generating an authentication signature signal indicating that the digital data stream is to be copy-protected; a device for selecting a copy-protection mode or a non-copy-protection mode; and affecting a time-based system of the recording medium based on the certification signature signal Device. 22. The device according to item 21 of the patent application scope | wherein the first key signal is a random input. 23. The device according to item 21 of the patent application scope, wherein the second output signal is a machine key. 24. An anti-copy device for recording and playback devices, including: a device for connecting a decoded data signal to an asymmetric decryptor; a device for generating a first key signal; using the first asymmetric signal asymmetry Device for decrypting the decoded data signal; device for generating a second signal extraction; -23-This paper standard is applicable to National Standards (CNS) Α4 specifications (210Χ297 mm) of the country t --------- Ι 1 installed ------ order ----- ^ line (please read the precautions on the back before filling in this page) A8 B8 C8 D8 A printed by the Central Standard Bureau of the Ministry of Economic Affairs, Consumer Cooperative Cooperative, patent application scope A device for connecting an asymmetric decrypted data signal to a symmetric decryptor; a device for symmetrically decrypting the asymmetric decrypted data using the second key ♦ A device for selecting asymmetric decrypted data from the asymmetric decryptor or from the symmetric decryptor A device for symmetric decryption of data; a device for detecting an authentication signal indicating that the clean data signal is to be protected from copying; and a device for selecting a fat copy mode or a non-anti-shoulder mode to indicate the solution data Whether the signal is copy-protected or non-copy-protected. ---------- — (Please read the precautions on the back before filling out this page) TJ Ministry of Economic Affairs Central Standards Bureau Employee Consumer Cooperative Printed -24-This paper standard is applicable to China National Standards (CNS) A4 Specification (210X297mm)
TW85101396A 1994-06-29 1996-02-05 TW295656B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/267,635 US5513260A (en) 1994-06-29 1994-06-29 Method and apparatus for copy protection for various recording media
US832495A 1995-06-27 1995-06-27

Publications (1)

Publication Number Publication Date
TW295656B true TW295656B (en) 1997-01-11

Family

ID=51565283

Family Applications (1)

Application Number Title Priority Date Filing Date
TW85101396A TW295656B (en) 1994-06-29 1996-02-05

Country Status (1)

Country Link
TW (1) TW295656B (en)

Similar Documents

Publication Publication Date Title
JP4023818B2 (en) Method and apparatus for copy protection for various recording media
AU700013B2 (en) Method and apparatus for copy protection for various recording media using a video finger print
JP5362675B2 (en) Key distribution by memory device
EP1843343B1 (en) Method and device for controlling distribution and use of digital works
US6957343B2 (en) Validating keying material by using a validation area of read-only media to prevent playback of unauthorized copies of content stored on the media
US7500101B2 (en) Recording/reproduction device, data processing device, and recording/reproduction system
JP5739925B2 (en) Record carrier
WO1997043853A1 (en) Method and apparatus for copy protection of copyrighted material on various recording media
JP4314713B2 (en) Data recording method and apparatus, data reproducing method and apparatus, and data recording and reproducing system
TWI229320B (en) Apparatus and method for reproducing user data
JP5217541B2 (en) Copy protection method, content reproduction apparatus, and IC chip
JP2005190514A (en) Digital recording medium and reproducing device
JP3735591B2 (en) Signal processing apparatus, signal processing method, and storage medium
TW295656B (en)
JP2000003559A (en) Data reproducing method, data reproducing device, data coding method, data recording method, data recording device, authenticating method, and semiconductor chip
JPH08339629A (en) Illegal copy preventing apparatus, recorder, reproducer and recording medium
KR20020073810A (en) Storage Medium for protecting its contents, and method and apparatus for recording and reproducing thereon
KR100556731B1 (en) Encryption recording/playing apparatus and method for disk
WO2004107339A1 (en) Information recording medium, information processing device and method
JP2001101791A (en) Optical information recording medium and optical information recording and reproducing device
KR20060017762A (en) Method and apparatus for the protection of permanent storage media

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees
MK4A Expiration of patent term of an invention patent