A7 B7 五、發明説明( 光碟(CD)被公認為是儲存數位資料之極佳媒體。其高 儲存密度,低製造成本Μ及對不正當處理之相當免疫力是 其它媒體所難及的。CD在作為高傳真音訊載體方面的成功 亦可能在多媒體領域得到相同成果,在多媒體領域中技術 被用在遵照諸如CD-ROM,CD-Video,CD-1等多種標準儲存 數位音訊,視訊及文數資料等多種目的之更廣泛工作。 目前,CD ROM軟體著作權所有者尚不需對類似錄影帶 及錄音帶媒體之猖獗剽竊情形(未授權盗販)採取對策。 這主要是因為製作與複製CD的投資成本較大,對刹竊者構 成足夠之財務障礙。不過,現在市面上已有售價約二千元 給專業使用者使用之光碟記錄機可完美複製已錄好之CD且 極可能在數年後,消費者負擔得起的錄放機將普及。如此 這將會在軟體生產商與消費者之間造成嚴重分技,因此軟 體生產商需Μ至少50元出售其產品獲利,而消費者由空白 光碟Η製作完美拷貝之成本預計很快就會在10至20元之範 圍。此問題可能會比影罌錄影帶業之剿竊更為嚴重,因為 只有少數人願意重看同一部電影而多媒體產品卻希望能重 複使用,因此未來之趨勢將是擁有而非租借。 經濟部中央標準局員工消費合作杜印製 ^1- —^ϋ ^Ί^—t n^— —in— ml ftm ^ nn I (請先閲讀背面之注意事項再填寫本頁) 本發明所解決之基本問題是確保消費者僅能播放合法 製造之CD來享用軟體之製作產品。 一種對付剿竊問題之方法是在CD記錄機中加入依照製 造商間之一般協議之特別防拷貝電路,該協議類似發展用 於數位錄音帶(DAT)媒體之串列拷貝管理条統(SCMS)。在 此条統,CD記錄機將從數位資料中尋找一特別防拷貝指令 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 4 經濟部中央標隼局員工消費合作社印製 A7 B7 五、發明説明(2 ) 並在找到後停止記錄。不過,此種条統僅提供極有限的保 護。即使在首次提出用於DAT媒體之SCMS条統時,即已完 全瞭解到它對那些知道資料格式並能且隨後製作不昂貴之 ”黑盒”(電子電路)移去防拷指令藉以使記錄機無限製 作拷貝Η之專業或甚至業餘剌竊者而言幾乎是不具保護作 用的。 本申請人相信依賴資料潦中加入防拷指令之防拷条統 可被與CD記錄機中所加入用於尋找該些指令之電路相同複 雜度與成本之黑盒擊敗。因此,這種条統之效果有限。黑 盒將連接於一 CD播放機與一 CD記錄機之間並將尋找資料流 中之特別防拷指令並移去或修改這呰指今。因此,若採用 此類防拷条統,不難想像不昂貴之黑盒將會激增。 此種防拷方法的另一困難是需確使所有CD記錄機製造 商將所需之偵測電路加入其產品中。有些製造商可能不會 這麼做,或許是出於增加其市場佔有率之預期。市場上這 些未遵守之機器所佔比率即使很小亦會危及此類防拷条統 之生存。 由於上述理由,用於光碟媒體之防拷系統需提供軟體 權所有者之一高階保護,不僅要能免疫於黑盒且要不受少 數拒絕遵從榡準之硬體製造商的影饗。 依據本發明,一條件播放糸統對多種媒體(譬如光碟 媒體)已錄好之材料提供著作權保護。由於將於後文說明 之本發明可應用於多種不同媒體且對於本技藝普通程序熟 知者而言可很容易將本發明之原則適用於其它媒體,故下 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) ^n* 1^111 ml* mu ^^^^1 aj^n- n^i— (請先閱讀背面之注意事項再填寫本頁) 5 經濟部中央標準局員工消費合作社印製 A7 B7 五、發明説明(3 ) 文僅將說明本發明在光碟媒體方面的應用。 本發明可克服上逑糸統之缺點。條件播放糸統並不企 圖阻止CD記錄機複製防拷CD之資料。而是提供一種方法讓 CD播放機可決定是否一特別CD為合法原版或不法拷貝。若 為合法,則播放機正常播放CD。若不合法,則播放機停止 工作並顯示一適當之著作權警告訊息。 在製造母碟Η時,將一認證簽名印在碟片上使CD播放 機無法在正常光學讀取時讀到,但可由其它裝置輕易偵測 。認證簽名之特性使其可正確從母碟Η轉移至由其所製成 之所碟片上。不過,若使用CD記錄機製作非法拷貝 生產碟,拷貝Η可包含正確複製之被拷Η上之程式資 料,但認證簽名則未被轉移至拷片。遵照此防拷檫準之所 有CD播放機將包含一搜尋認證簽名之子条統。若未發現簽 名,CD播放機將不會播放該碟Η。 對於光碟應用方面,最好是Μ徑向位置調變寫頭將認 證簽名印在母碟片上,徑向位置調變寫頭是以與寫頭之正 常位置有約為數十奈米(nra〉之峰對峰距離製作母碟片。然 後此認證簽名可為利用CD播放機内已有之徑向追蹤伺服条 統,在僅增加播放機最小複雜度之CD播放機讀取,下文將 作說明。 在~所有CD播放機中,光學讀頭為一羼播放機正常功能 之複雜之錯誤偵測糸統維持在軌道上。譬如,若讀頭稍偏 移至軌道任一邊,或由於一偏心轉軸使軌道在讀頭下移動 時,則會偵測到錯誤並在放大後施加至徑向傳動器以校正 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) , _ 6 — (請先閲讀背面之注意事項再填寫本頁) ,衣. 經濟部中央樣準局員工消費合作杜印製 A7 B7 五、發明説明(4 ) 讀頭至軌道中心。由於光學謓頭亦須追蹤一定義認證簽名 之有意感應之徑向位置調變,因此,此錯誤電壓包含一對 應此調變之信號成份Μ及對應橢圓錯誤與類似錯誤之其它 信號。因此,藉由適當處理此錯誤電壓可偵測認證簽名。 此位置調變信號可Μ是一簡單的正弦頻率使一個整數 數目之週期在碟片每一旋轉期間被印上碟片,或一完整週 期在碟片轉動整數數目轉次期間被印上碟片。在任一情況 ,均能簡化從許多其它追蹤錯誤信號中取出認證簽名。一 相關類形之異常掃描在Mori moto (列入本文參考 > 之美國專 : 利5, 中有說明,它說明一不穩定之正常追蹤信號 使追蹤在一平均頻率Μ正弦路徑緩慢移動。 很明顯地由於認證簽名未被轉移至碟片,故此防拷糸 統不會被任何連接於一 CD播放機之信號_出與一 CD記錄機 之信號輪入間之外部黑盒破解。 若一些製造商選擇不將認證糸統建入其CD播放機中時 亦不會危及本糸統,因海盗版碟片製作者須橒示其產品僅 能在市面上有限之未遵守規定CD播放機中播放。實際上海 盗版碟片製作者將廣告其非法產品因而會招至控訴。 現說明三種形式之此類條件播放糸統。此三種條件播 放糸統之一共同處是使用上述印在合法製造之CD或其它媒 體上之特別認證簽名,此認證簽名不羼於記錄”程式”信 號的一部份,因此不會被轉移至非法拷貝片上。A7 B7 V. Description of Invention (CD is recognized as an excellent medium for storing digital data. Its high storage density, low manufacturing cost, and considerable immunity to improper handling are difficult for other media. CD The success as a high-definition audio carrier may also achieve the same results in the multimedia field. In the multimedia field, the technology is used to store digital audio, video and text data in accordance with various standards such as CD-ROM, CD-Video, CD-1, etc. More extensive work for various purposes such as data. At present, CD ROM software copyright owners do not need to take countermeasures against rampant plagiarism (unauthorized piracy) of similar video and audio media. This is mainly due to the investment in making and copying CDs The cost is relatively high, which constitutes a sufficient financial barrier for the thief. However, there are already disc recorders on the market that sell for about 2,000 yuan for professional users. They can perfectly copy the recorded CD and are likely to be in a few years. In the future, consumers will be able to afford affordable recorders. This will cause a serious divide between software manufacturers and consumers, so software manufacturers need to Μ sells its products for at least 50 yuan to make a profit, and the cost for consumers to make perfect copies from blank discs Η is expected to be in the range of 10 to 20 yuan soon. This problem may be more than the piracy of the video pop industry Seriously, because only a few people are willing to watch the same movie and the multimedia products want to be reused, so the future trend will be to own rather than rent. Employee consumption cooperation of the Central Bureau of Standards of the Ministry of Economic Affairs Du Print ^ 1- — ^ ϋ ^ Ί ^ —tn ^ — —in— ml ftm ^ nn I (please read the precautions on the back before filling out this page) The basic problem solved by the present invention is to ensure that consumers can only play legally made CDs to enjoy the production of the software Products. One way to deal with the piracy problem is to add a special copy protection circuit to the CD recorder in accordance with the general agreement between manufacturers, which is similar to the development of serial copy management system (SCMS) for digital audio tape (DAT) media ). In this system, the CD recorder will look for a special copy-protection instruction from the digital data. The paper standard is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) 4 Central Ministry of Economic Affairs Falcon Bureau employee consumer cooperatives printed A7 B7 V. Description of invention (2) and stopped recording after finding it. However, this kind of system only provides extremely limited protection. Even when the SCMS system for DAT media was first proposed, That is, it is fully known to professional or even amateur thieves who know the format of the data and can then make inexpensive "black boxes" (electronic circuits) to remove the copy protection instructions so that the recorder can make unlimited copies of Η The applicant believes that the copy protection system that relies on the addition of copy protection instructions in the data library can be defeated by a black box with the same complexity and cost as the circuit used to find these instructions in the CD recorder Therefore, the effect of this rule is limited. The black box will be connected between a CD player and a CD recorder and will look for special copy protection commands in the data stream and remove or modify this instruction. Therefore, if such a copy protection system is adopted, it is not difficult to imagine that inexpensive black boxes will proliferate. Another difficulty with this copy protection method is to ensure that all CD recorder manufacturers add the required detection circuits to their products. Some manufacturers may not do this, perhaps in anticipation of increasing their market share. The small proportion of these non-compliant machines on the market can jeopardize the survival of such copy protection systems. For the above reasons, the copy protection system used for optical disc media needs to provide high-level protection from one of the software rights owners. It must not only be immune to black boxes but also be protected from the hardware manufacturers who refuse to comply with the standards. According to the present invention, a conditional playback system provides copyright protection for materials that have been recorded on various media (such as optical disc media). Since the invention to be described later can be applied to a variety of different media, and those familiar with ordinary skills in the art can easily apply the principles of the invention to other media, the following paper standards apply to the Chinese National Standard (CNS) A4 specification (210X297 mm) ^ n * 1 ^ 111 ml * mu ^^^^ 1 aj ^ n- n ^ i— (please read the notes on the back before filling this page) 5 Employee consumption of the Central Standards Bureau of the Ministry of Economic Affairs Printed by the cooperative A7 B7 V. Description of the invention (3) The article will only explain the application of the present invention to the optical disc media. The invention can overcome the shortcomings of the upper Edo system. The conditional playback system does not attempt to prevent the CD recorder from copying the data of the copy-protected CD. Instead, it provides a way for the CD player to decide whether a particular CD is a legal original or illegal copy. If it is legal, the player plays the CD normally. If it is not legal, the player stops working and displays an appropriate copyright warning message. When manufacturing the master disc H, an authentication signature is printed on the disc so that the CD player cannot read it during normal optical reading, but it can be easily detected by other devices. The characteristics of the authentication signature enable it to be transferred from the master disc H to the disc made by it. However, if an illegal copy production disc is made with a CD recorder, the copy Η may contain the correctly copied program data on the copied Η, but the authentication signature has not been transferred to the copy. All CD players that comply with this copy-protection standard will include a sub-system of searching for certified signatures. If no signature is found, the CD player will not play the disc. For optical disc applications, it is best that the radial position modulation write head prints the authentication signature on the master disc. The radial position modulation write head is approximately tens of nanometers (nra) from the normal position of the write head. 〉 The peak-to-peak distance of the master disc. Then this certified signature can be read by the CD player that only increases the minimum complexity of the player by using the radial tracking servo system already in the CD player, which will be explained below In all CD players, the optical read head is a complex function of the normal function of the player. The error detection system is maintained on the track. For example, if the read head is slightly shifted to either side of the track, or due to an eccentric shaft When the track is moved under the reading head, an error will be detected and applied to the radial actuator after magnification to correct this paper. The standard of China is (CNS) A4 specification (210X297mm), _ 6 — (please first Read the precautions on the back and then fill out this page). Clothing. Duplicate printing of the A7 B7 by the consumer cooperation of the Central Prototype Bureau of the Ministry of Economic Affairs. 5. Description of the invention (4) Reading head to the center of the track. Since the optical head must also track a definition certification Signed intentionally The corresponding radial position is modulated. Therefore, the error voltage includes a signal component M corresponding to the modulation and other signals corresponding to elliptical errors and similar errors. Therefore, the authentication signature can be detected by properly handling the error voltage. The position modulation signal may be a simple sinusoidal frequency such that an integer number of cycles is printed on the disc during each rotation of the disc, or a complete cycle is printed on the disc during the rotation of the integer number of disc rotations. In either case, it can be simplified to extract the authentication signature from many other tracking error signals. A related type of anomaly scan is described in Mori moto (incorporated in this article reference> U.S. Patent: Lee 5,). The stable normal tracking signal causes the tracking to move slowly at an average frequency M sinusoidal path. Obviously, because the authentication signature has not been transferred to the disc, the copy protection system will not be affected by any signal connected to a CD player. The external black box of a CD recorder's signal rotation is cracked. If some manufacturers choose not to build the certification system into their CD player, it will not endanger the system, because Pirate disc producers must show that their products can only be played on limited non-compliant CD players in the market. In fact, pirate disc producers will advertise their illegal products and will therefore be prosecuted. Now three types of forms are described. This kind of conditional playback system. One of the three conditional playback systems is the common use of the above-mentioned special authentication signature printed on legally manufactured CDs or other media. This authentication signature is not used to record part of the "program" signal , So it will not be transferred to illegal copies.
第一種條件播放条統需要所有遵守特別檷準(譬如CD-R0M)之CD播放機須對每一欲播放之CDH尋找認證簽名。CD 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁) 衣· if 7The first conditional playback system requires all CD players that comply with special standards (such as CD-ROM) to find an authentication signature for each CDH to be played. CD The size of this paper is in accordance with Chinese National Standard (CNS) A4 (210X297mm) (Please read the precautions on the back before filling out this page) Clothing · if 7
經濟部中央標準局員工消費合作社印II A7 B7 五、發明説明(5 ) 播放機之控制条統在找不到認證簽名時須停止播放。如前 所述,由於非法拷貝CD片沒有認證簽名,故此類拷貝片將 是無用的,因此對於含有正確之程式複製資訊之非法拷貝 片仍可實現有效防拷。 第一種条統之缺點是所有打算在此種特別CD播放機中 播放之合法CD須加入認證簽名。因此此条統僅可適用於封 閉条統,其中一条統控制器可使所有CD受到防拷。不過, 從商業觀點則希望以程式為單位提供防拷與收費。下文將 說明之第二及第三種條件播放条統則具有此種能力。 在第二種播放糸統,欲防拷之CD將包含一特別指令告 訴所有的CD播放機尋找認證簽名並在未發現認證簽名 止播放該CD。譬如此指令可被記錄在CD之初始化區 通常用於保留非程式之資訊區段。此指令將被所有遵守規/ 則之CD播放機中之特別子条統所起動。因此,僅有原版之 防拷CD可被播放一非法拷貝CD將被拒絕。不需防拷之CD程 式將省略此指令,因此對於這些程式不論原版CD或拷貝版 均可正常播放。故可透過使用或不使用此”尋找認證簽名 且僅在發現時播放”之指令提供以程式為單位之防拷。 不過,雖然第二種條件播放糸統允許Μ程式為單位提 供防拷特性,但基本上仍可能被連接於CD播放機與CD記錄 機間之信號線上的特別黑盒所破解。這些黑盒將自CD 播放機之資料流中搜尋”尋找指令並移去或 指 令使非法拷貝CD不會觸發CD播放機中之認證程序。 一稱爲可程式條件播放糸統(PCPS)之第三種條件播放 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) (請先閲讀背面之注意事項再填寫本頁) 装. -訂 經濟部中央標準局員工消費合作社印製 Α7 Β7 五、發明説明(6 ) 条統可克服上述二糸統之缺點並提供一種Μ程式爲單元來 啟動同時對黑盒攻擊具有高抵抗能力之防拷条統。 下文將說明一使用對稱及不對加密技術組合以得到防 拷目檫之可程式條件播放条統之實施例。 第1圖係一加入本發明一些要素之母碟製作程序之硬 體方塊圖;Μ及 第2圖係一加入本發明另一些要素之光碟播放裝置之 方塊圖。 本發明係有關一用於防拷多種程式散布媒體(諸如光 碟媒體)之方法與裝置。本發明可應用在所有的碟片媒體 且對於普通熟知本技藝者而言可將這些原理沿用至諸如磁 帶之其它媒體上。本發明提供軟體權擁有者一高階保護, 可免疫於黑盒攻擊且不會受到少數拒絕遵照橒準之硬體製 造商之影饗。 如前所述,希望能Μ程式為單元提供著作權擁有者防 拷能力並Μ程式為單元收費或Μ碟片爲單元收費。此在使 用對稱及不對稱(亦稱為公输)資料加密組合Μ允許CD播 放機處理防拷或非防拷碟Η使黑盒破解防拷變得極為困難 或極昂貴並費時之可程式條件播放条統中可被實現。 對傳統加密方法之摘要說明將有肋於深入瞭解本發明 。最普通之資料加密形式稱為對稱加密,它在加密與解密 資料時使用相同之鑰。為防止Μ嘗試錯誤方式猜測該鍮, 此鑰最好是一經常改變之隨機產生之極大數目。譬如此鑰 可Μ 是 349,247,839,636,290,351,673之數目。此數目( 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) -I---1—--4 装----1 n (請先閱讀背面之注意事項再填寫本頁) 9 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明(7 ) 鑰)通常將保密Μ確保条统完整。需對此綸保密是對稱加 密糸統之主要缺點。常用之DES演算法是對稱加密条统之 一例子,其中使用一個56位元之鑰加密安排成64位元區段 之數位字組。56個二進位位元相當於17個十進位數位。 不對稱加密糸統使用二個不同之鍮,稱為Ρ及Q。輪 Ρ用於加密而另一鑰Q用於解密。不對稱系統之一重要優 點是若只知道用於解密之鑰Q並不足Μ對訊息加密。目前 ,一種最常用於不對稱加密之安全演算法是由RSA Data 56(:111"丨1?公司(?154)使用1146 51等人之美國專利4,405,829 之技術所設計。此条統之安全是根基在從Q (若已知)計 算P極度困難。此計算包含分解可包含多至500數位之極 大數目。輸P及Q的數位愈多,分解程序所需的時間愈長 。實際上,鑰大小的選擇是為在產品生命期間減少分解可 能性至可接受的程度.,,且在認可之預期增加Y之計算能力内 PCPS第一實施例包含第1圖所示之母碟製作裝置之一 部份以及第2圖所示之CD播放機之另一部份。 PCPS母碟製作設備包含一接受來自傳統源之”乾淨” (未加密)數位資料流之防拷記錄裝置10,一輸入端21, 輪入至對稱加密器22及一操作員控制之雙極單擲控制開鼷 24之一極Sla之OFF位置。藉由適當設定開關24,操作員可 控制所製作由信號線21輪入之程式之CD是否防拷。對稱加 密器22亦接收來自鑰源33在信號線23上之第一鑰信號,鑰 K ° --I ---II--^,表| I - - J— n ^ (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS〉A4規格(210X297公釐) 10 -1 η 經濟部中央標準局員工消費合作社印製 A7 __ B7 五、發明説明(8 ) 對稱加密器22之輸出是信號線21上之乾淨數位資料流 之加密版本。後文將說明22所使用之加密演算法種類及鍮 K之特性。欲瞭解本發明,知道加密器22依據鍮K所決定 之某公式修改信號線21上之乾淨資料即已足夠。對稱加密 器22之輸出端連接至開關Sla之第三輸入。Sla之輸出連接 至靥一公输条統一部份之不對稱加密器25之輪入。 為確保此可程式條件播放糸統之安全性,須嚴加保密 公鑰對P,Q之加密鑰P。為此目的,鍮P最好是儲存於 输源27之非揮發性記憶體中。此揮發記憶體可在一受到保 護之實際包體内,當未授權嘗試譲取鍮P時會使此記憶體 被清除並關閉糸統。可實現此項能力之實際安全条統爲本 技藝所熟知,故不在此赘述。 在信號線28上來自不對稱加密器2 5之不對稱加密資料 連接至一傳統母碟製作裝置之資料輪入部份。 一認證簽名產f^.29產生一認證信號31,其特性與目 的前已說明。信號接至防拷控制開關24之第二極Sib 之一_入。Sib之另一端未被施加信號且通常接地。操作 員控制之開關Sib僅在選擇防拷模式時將認證信由 Ύ ,ν·. 信號線32連接至徑向傳動器。 ' 第2圖顯示使用在CD播放機内之防拷裝置40。在信號 線41上來自CD之被適當解碼與錯誤校正之程式資料輸入至 為前述公鍮對P,Q之第二输Q所驅動之不對稱解密器42 。鍮源43提供鑰Q至信號線44上。在倍號線45上之不對稱 解密資料連接至開關55之一輸入Μ及對稱解密器46之輸入 本紙張尺度適用中國國家標準(CNS ) A4規格(21〇X 297公釐) I I - t— - PI - - 4^1 I I I τ—-訂 (請先閲讀背面之注意事項再填寫本頁) 11 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明(9 ) 。對稱解密器46在信號線48上之來自鍮源49之相同鑰K之 控制下執行與第1圖中之對稱加密器22相反的動作。 在信號線56上之對稱解密器46之輸出連接至開關55之 一第二輸入。信號線54上之開關55之輸出連接至CD播放機 之其它傳統之資料處理部份。及K被永久儲存在CD播 放機中之便利僅讀記憶體中且不需特別的安全預防措施。 ¥後文所述,知道這些輪值對企圖破解此防拷糸統之準刹 ^ :濩助 <在信號上來自CD播放機之徑向追蹤伺服放大器之 錯誤信號被輸入至認證信號偵測器52。如前所述,此信號 將有一對應認證簽名之成份。偵測器52會在信號線53上產 生一對應其輪入之認證簽名存在與否之二進位輪出。譬如 ,若認證簽名存在則此輪出爲邐輯1,若不存在則為邏輯 0 〇 選擇邏輯準位使開關在無認證簽名時選擇來自信號線 47之一次解密輸入,Μ及在偵測到認證簽名時選擇來自信 號線56之二次解密輪入。 現藉由檢査在不同環境下之反應可瞭解此可程式條件 播放糸統之工作情形。 當播放原版之防拷或非防拷光碟時,認證簽名之存在 與不存在會使開關S正確選擇一次解密資料或二次解密資 料。因此開關S之輪出將會是適當之解密資料。故所有原 版碟片將正常播放。 當播放非防拷之拷貝光碟時,認證簽名之不存在亦會 本紙張尺度適用中國國家標準(CNS ) A4規格(210X 297公釐) ^^1 In 111 m m 7^i (請先閱讀背面之注意事項再填寫本頁) 12 經濟部中央標準局員工消費合作社印製 A7 B7 五、發明説明(10 ) 使開關s正確選擇一次解密資料,因此允許此種光碟被正 常播放。 不過,當播放一防拷碟片之非法複製光碟時,認證簽 名之不存在會使開關s不正確地選擇一次解密資料。在信 號線54上之部份解密資料將阻止碟片的正常播放。 PCPS之安全性使刹竊者在製作防拷碟片之可播放複製 Η時變得非常困難。 欲製作防拷碟Η之可播放複製片,即被解此系統,剿 竊者須做到下列二者之一: 1. 當認證簽名不存在時,將記錄在所有防拷碟片上之 二次加密程式資料轉換為CD播放機所需之一次加密格式。 若要做轉換,剽竊者須得到使用在母碟製作程序中之機密 鏑P,如前所述,它可被秘密保護在一位於母碟製作廠中 之密閉設陷單元中。剽竊者可很容易地取得CD播放機内二 次加密之光碟資料。他亦可以鍮K及Q取得CD播放機内之 部份解密及完全解密(乾淨)之程式資料。不過,不對稱 加密法之特質使割竊者仍無法得到足夠資訊導出產生所要 之一次加密程式資料所需之機密输P。因此,此種複合加 密糸統允許選擇性的保護程式且免疫於黑盒的攻擊。 2. 在複製非法光碟時加入一可用之認證簽名至非法碟 片,使遵照規定之CD播放機將正常播放這些碟片。這是可 能的,但要如此做,剽竊者需大幅修改CD記錄機使其可設 計徑向位置調變之軌道。此種修改將遠超出消費者及軟體 經銷商之能力。不過,堅持說財力雄厚之剿竊作業無法找 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) ---<--.J---^ 〆衣---------訂 (請先閲讀背面之注意事項再填寫本頁) 13 經濟部中央標準局員工消費合作社印製 Α7 Β7 五、發明説明(11) 到破解方法則又不切實際。有多種方法使剌竊者在”偽造 ”一認證簽名時更為困難,但這些均多少將視市場現有之 CD記錄機中之徑向何服糸統(若有)之實際能力而定。簪 如,簽名可Μ是一脈衝函數形式(非一簡單之正弦),使 市售之CD記錄機中之徑向伺服無法追蹤簽名。當然,若允 許此虛構之剿竊者有無限之財力資源,則他可購買一專業 母碟製作条統並做所需之修改。 不過在實際上,此条統及方法在消除消費者,經銷商 及具有技術知識之專業層次之剿竊方面的能力應是極有價 值的。 若在本應用中之對稱加密與解密使用RSA Date Security 公司(RSA)所發展之公鑰演算法,則可使用極簡單之對稱 加密與解密演算法而不必包含安全性。詳言之,此”演算 法”可僅變換資料區段中之任一位元值或互換任何二位元 值。因此可避免一般所瞭解之正式鑰控制加密與解密条統 而用簡單之互補邏輯蓮算。因此在製作程序與CD播放機中 所使用之翰K就不需要了。 實現本發明之進一步簡化是對一小部份之程式資料而 非所有資料流做多種加密與解密程序。這是有利的,因為 它會降低不對稱解密子糸統需處理之速率(位元/秒), 故可使用較不昂貴之處理器。 另一用於認證一光碟之同樣有效方法是以離開製作之 碟Η中心特定徑向距離連接一或多個特定資料區段。 當母碟Η被停止時,寫頭可自中心Μ介於額定速度與 本紙張尺度適用中國國家標準(CNS ) Α4規格(210Χ297公釐〉 ----<--.J----1-装------訂 (請先閲讀背面之注意事項再填寫本頁) 14 經濟部中央標準局員工消費合作社印製 Α7 Β7 i、發明説明(12) 些撤超過額定速度間之隨機變化速率移動。寫頭之起始位 置亦可被移至距額定起始位置一隨機距離。因此,特別資 料區段與碟片中心之距離Μ及特別資料區段彼此間之距離 將是這些隨機變數之函數。這些隨機變數之值將被安排成 隨不同程式而變化。 一或多個資料區段與碟Η中心之距離、現為一不對稱加 密糸統之私鑰加密且加密資料被記錄在碟片上作為糸統資 料之一部份。當CD記錄機複製此種碟Η時,這些資料區段 與複製CD之中心距離與原始碟片之距離不同,這是因為市 售之CD記錄機之寫頭是Μ固定速度徑向驅動。 每一匹配之CD播放機將具有一校準之徑向伺服条統, 使讀頭與碟片中心之距離作為播放機内之一數位字組。當 CD被播放時》使用儲存在CD播放機中之一記憶體上的输對 P > Q中之公鍮Q解密該加密之徑向距離資料。這些解密 之資料將暫時存在隨機存取記憶體中。 當CD繼續播放時,前述資料區段之實際距離與應該之 距離的解密資料比較。若所計算之距離差大於容許錯誤時 則視爲因CD為非法複製Η所造成。CD播放機將停止播放且 可能顯示一著作權訊息。 另一實施例使用測量讀頭在不同資料區段位置之徑向 速度替代使用特定資料區段與碟片中心Μ及特定資料區段 彼此間之距離作爲碟Η認證之指示。此法之優點是不需準 確知道讓頭與碟片中心間之距離。它依賴讀頭在不同位置 之徑向速度之相對測量值,且很容易可自追蹤控制条統得 本紙張尺度適用中國國家標準(CNS ) Λ4規格(210Χ297公釐) ----S--.J----f 装------訂 (請先閱讀背面之注意事項再填寫本頁) 15 Α7 Β7 五、發明説明(13) 到此值。 雖然上述實施例說明一用於光碟格式之可程式條件播 放条統*但其原理亦可應用於磁帶格式。對於這類應用, 認證簽名32可加入磁帶之控制軌中。 雖然Μ較佳實施例說明本發明,但熟知本技藝者將瞭 解只要不偏離本發明之精神可對本發明做不同改變。申請 專利範圍一節中之各項說明及其類似精神定義本發明之範 圍0 ---<---I--γ 装------訂 (請先閲讀背面之注意事項再填寫本頁) 經濟部中央標準局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公釐) 16 經濟部中央標準局員工消費合作社印製 A7 B7 五、發明説明() 元件檫號對照 10.. ..防拷貝記錄裝置 41. ...信號線 21 · · ..輸入端 42. ...非對稱解密器 22. · ..對稱加密器 43. ...公输Q 23.. ..信號線 44. ...信號線 24. _ ..雙極單擲控制開關 45. ...信號線 2 5.. ..非對稱加密器 46. ...對稱解密器 26.. ..信號線 47. ...信號線 27.. ..機密輪 48. ...信號線 28.. ..信號線 49. •,· _ Κ 29. ..認證簽名產生器 51 _ ...信號線 31.. ..信號線 52. ...認證信號偵測器 32.. ..信號線 53. ...信號線 33. ,.輸Κ 54. ...信號線 40. ..防拷貝裝置 55. ...開關 (請先間讀背面之注意事項再填寫本頁) 裝.Printed by the Staff Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs II A7 B7 V. Description of the invention (5) The control rules of the player must stop playing when the certification signature is not found. As mentioned earlier, because illegally copied CDs do not have a certified signature, such copies will be useless, so illegal copies that contain the correct program copy information can still be effectively protected against copying. The disadvantage of the first rule is that all legal CDs that are intended to be played in this special CD player must be signed with an authentication signature. Therefore, this system can only be applied to the closed system, and one of the system controllers can protect all CDs from copy protection. However, from a commercial point of view, it is desirable to provide copy protection and charges in units of programs. The second and third conditional playback rules described below have this capability. In the second playback system, the CD to be copy-protected will contain a special instruction telling all CD players to find a certified signature and stop playing the CD if no certified signature is found. For example, the command can be recorded in the initialization area of the CD. It is usually used to reserve the non-program information section. This command will be activated by special sub-systems in all CD players that comply with the rules / rules. Therefore, only the original copy-protected CD can be played. An illegally copied CD will be rejected. CD programs that do not require copy protection will omit this command, so these programs can be played normally regardless of the original CD or copy version. Therefore, it is possible to provide copy protection in units of programs by using or not using the "find signatures and only play when found" command. However, although the second conditional playback system allows the M program to provide copy protection for the unit, it may still be cracked by a special black box connected to the signal line between the CD player and the CD recorder. These black boxes will be searched from the data stream of the CD player for "finding instructions and removing or instructing that illegal copying of the CD will not trigger the authentication process in the CD player. One is called the Programmable Conditional Playing System (PCPS). Three conditions for playing this paper scale are applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (please read the precautions on the back before filling out this page). Packed.-Printed by the Employees Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs Α7 Β7 5. Description of invention (6) The system can overcome the shortcomings of the above-mentioned two systems and provide an M program as a unit to activate the copy protection system with high resistance to black box attacks. The following will explain the use of symmetry and Encryption technology is not combined to obtain an embodiment of the program-proof condition for copy-protected copying. Figure 1 is a hardware block diagram of a master disc creation process that incorporates some elements of the invention; M and Figure 2 are added A block diagram of an optical disc playback device with other elements of the present invention. The present invention relates to a method and device for copy-protecting multiple program distribution media (such as optical disc media). The present invention can be applied All disc media and those of ordinary skill in the art can apply these principles to other media such as magnetic tape. The present invention provides a high-level protection for software rights owners, which is immune to black box attacks and will not be rejected by a few Follow the shadow of the hardware manufacturer. As mentioned above, I hope that the M program can provide the copyright owner with the copy protection capability of the unit and the M program charges the unit or the M disc charges the unit. This is symmetrical and not Symmetric (also known as public transmission) data encryption combination M allows CD players to handle copy-protected or non-copy-protected discs. This makes black box cracking and copy-protection extremely difficult or expensive and time-consuming. A brief description of the traditional encryption method will help you understand the invention in depth. The most common form of data encryption is called symmetric encryption, which uses the same key when encrypting and decrypting data. To prevent Μ from trying the wrong way to guess the 鍮, This key is preferably a randomly generated maximum number that changes frequently. For example, the key can be the number of 349,247,839,636,290,351,673. This number (this paper The Zhang scale applies to the Chinese National Standard (CNS) A4 specification (210X297mm) -I --- 1 ---- 4 pack ---- 1 n (please read the precautions on the back before filling this page) 9 A7 B7 Economy Printed by the Ministry of Standards and Staff of the Ministry of Consumer Cooperatives 5. Description of invention (7) Key) usually keeps confidentiality M to ensure the integrity of the system. The need to keep this confidential is the main disadvantage of symmetric encryption systems. The commonly used DES algorithm is symmetric encryption An example of a system, in which a 56-bit key is used to encrypt a digital block arranged in 64-bit segments. 56 binary bits are equivalent to 17 decimal bits. Asymmetric encryption system uses two different Rong, called P and Q. Round P is used for encryption and another key Q is used for decryption. One important advantage of an asymmetric system is that if only the key Q used for decryption is known, it is not enough to encrypt the message. At present, one of the most commonly used security algorithms for asymmetric encryption is designed by RSA Data 56 (: 111 " 丨 1? Company (? 154) using the technology of U.S. Patent 4,405,829 of 1146 51 and others. The security of this system is The foundation is extremely difficult to calculate P from Q (if known). This calculation includes the decomposition of a maximum number of up to 500 digits. The more digits you input P and Q, the longer the time required for the decomposition process. In fact, the key The choice of size is to reduce the possibility of decomposition to an acceptable level during the life of the product., And within the approved expected increase in the computing power of Y. The first embodiment of PCPS includes one of the master disc production devices shown in Figure 1 Part and another part of the CD player shown in Figure 2. The PCPS master production equipment includes a copy-protection recording device 10 that accepts a "clean" (unencrypted) digital data stream from a traditional source, and an input terminal 21. Turn in to the OFF position of one pole Sla of the symmetric encryptor 22 and an operator-controlled bipolar single-throw control switch 24. By appropriately setting the switch 24, the operator can control the rounding of the signal line 21 Whether the CD of the program is copy-protected. It is said that the encryptor 22 also receives the first key signal from the key source 33 on the signal line 23, the key K ° --I --- II-^, table | I--J-- n ^ (please read the back (Notes and then fill out this page) This paper scale is applicable to the Chinese national standard (CNS> A4 specification (210X297 mm) 10 -1 η Printed by the Ministry of Economic Affairs Central Standards Bureau Employee Consumer Cooperative A7 __ B7 V. Description of invention (8) Symmetric encryption The output of the encoder 22 is an encrypted version of the clean digital data stream on the signal line 21. The types of encryption algorithms used by 22 and the characteristics of K are described later. To understand the present invention, it is known that the encryption 22 is determined by K It is enough for a certain formula to modify the clean data on the signal line 21. The output of the symmetrical encryptor 22 is connected to the third input of the switch Sla. The output of the Sla is connected to the asymmetrical encryptor 25 of the unified part of the Tsai bus Round-robin. In order to ensure the security of this programmable conditional playback system, the secret public key pair P and Q plus the key P must be strictly secured. For this purpose, it is best to store the non-volatile memory in the input source 27 In the body. This volatile memory can be in a protected actual body Internally, when an unauthorized attempt is made to fetch P, the memory will be cleared and the system will be closed. The actual security rules that can achieve this capability are well known in the art, so they will not be repeated here. The asymmetric encryption data of the asymmetric encryption device 25 is connected to the data ingress part of a traditional master production device. An authentication signature product f ^ .29 generates an authentication signal 31 whose characteristics and purpose have been explained before. To one of the second poles of the copy-protection control switch 24, Sib. No signal is applied to the other end of the Sib and is usually grounded. The switch Sib controlled by the operator only passes the authentication letter from Ύ, ν · when the copy-protection mode is selected. The signal line 32 is connected to the radial actuator. 'Figure 2 shows the copy protection device 40 used in the CD player. The appropriately decoded and error-corrected program data from the CD on the signal line 41 is input to the asymmetric decryptor 42 driven by the second input Q of the aforementioned male pair P, Q. The source 43 provides the key Q to the signal line 44. The asymmetric decryption data on the double line 45 is connected to the input M of one of the switches 55 and the input of the symmetric decryptor 46. The paper size is applicable to the Chinese National Standard (CNS) A4 specification (21〇X 297 mm) II-t— -PI--4 ^ 1 III τ—-order (please read the notes on the back before filling in this page) 11 A7 B7 Printed by the Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economy V. Invention Instructions (9). The symmetric decryptor 46 performs the reverse operation of the symmetric encryptor 22 in Fig. 1 under the control of the same key K from the source 49 on the signal line 48. The output of the symmetric decryptor 46 on the signal line 56 is connected to a second input of the switch 55. The output of the switch 55 on the signal line 54 is connected to other conventional data processing parts of the CD player. And K is permanently stored in the CD player. It is convenient to read only the memory and no special safety precautions are required. ¥ As mentioned later, knowing these rotation pairs is attempting to crack the quasi-brake of this copy-protection system ^: 濩 助 < error signal from the radial tracking servo amplifier of the CD player is input to the authentication signal detector 52. As mentioned earlier, this signal will have a component corresponding to the authentication signature. The detector 52 will generate a binary round-out on the signal line 53 corresponding to the presence or absence of the round-by authentication certificate. For example, if the authentication signature is present, the round is set to 1; if it is not present, it is logic 0. Selecting the logic level causes the switch to select a decryption input from the signal line 47 when there is no authentication signature. When the signature is authenticated, the second decryption round from the signal line 56 is selected. Now we can understand the working condition of the programmable condition playback system by checking the response in different environments. When playing the original copy-protected or non-copy-protected disc, the presence or absence of the authentication signature will cause the switch S to correctly select primary decryption data or secondary decryption data. Therefore, the round of switch S will be the appropriate decryption data. Therefore, all original discs will be played normally. When playing a non-copy-protected copy disc, the absence of the certification signature will also apply the Chinese national standard (CNS) A4 specification (210X 297mm) to this paper standard ^^ 1 In 111 mm 7 ^ i (please read the back (Notes need to fill out this page) 12 A7 B7 printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs 5. Description of the invention (10) Enable the switch s to correctly select the decrypted data once, thus allowing such discs to be played normally. However, when an illegally copied disc with a copy-protected disc is played, the absence of the authentication signature will cause the switch s to incorrectly select the decrypted data once. Part of the decrypted data on the signal line 54 will prevent normal playback of the disc. The security of PCPS makes it very difficult for thieves to make playable copies of copy-protected discs. To make a playable copy of a copy-protected disc Η, that is, to be released from this system, the thief must do one of the following: 1. When the authentication signature does not exist, it will be recorded on all copy-protected discs. The secondary encryption program data is converted into the primary encryption format required by the CD player. To do the conversion, the plagiarist must obtain the confidential dysprosium P used in the mastering process. As mentioned earlier, it can be secretly protected in a closed trap unit located in the mastering factory. The plagiarist can easily obtain the secondary encrypted disc data in the CD player. He can also use K and Q to obtain partially decrypted and completely decrypted (clean) program data in the CD player. However, the characteristics of the asymmetric encryption method prevent the hacker from obtaining enough information to export the confidential input required to generate the desired encrypted program data. Therefore, this compound encryption system allows selective protection programs and immunity to black box attacks. 2. When copying illegal discs, add an available certification signature to the illegal discs, so that the CD player that complies with the regulations will play these discs normally. This is possible, but to do so, the plagiarist needs to significantly modify the CD recorder so that it can design the orbit of the radial position modulation. Such modifications will go far beyond the capabilities of consumers and software distributors. However, insist that the thieves with strong financial resources can not find this paper standard applicable to the Chinese National Standard (CNS) A4 specifications (210 X 297 mm) --- <-. J --- ^ 〆 衣 ---- ----- Order (please read the precautions on the back before filling in this page) 13 Α7 Β7 printed by the Employee Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs V. Description of the invention (11) The method of cracking is impractical. There are many ways to make it more difficult for thieves to "fake" a certified signature, but how much of these will depend on the actual capabilities of the radial (if any) of the existing CD recorders on the market. For example, the signature can be in the form of a pulse function (not a simple sine), which prevents the radial servo in a commercially available CD recorder from tracking the signature. Of course, if this fictitious thief is allowed unlimited financial resources, he can purchase a professional mastering system and make the necessary modifications. In practice, however, the ability of this system and method to eliminate theft from consumers, dealers, and professionals with technical knowledge should be extremely valuable. If the public key algorithm developed by RSA Date Security (RSA) is used for symmetric encryption and decryption in this application, very simple symmetric encryption and decryption algorithms can be used without including security. In detail, this “algorithm” can only transform any one-bit value in the data section or exchange any two-bit value. Therefore, it is possible to avoid the commonly known formal key control encryption and decryption rules and use simple complementary logic calculations. Therefore, the Han K used in the production program and CD player is unnecessary. A further simplification for implementing the present invention is to perform multiple encryption and decryption procedures on a small part of the program data but not all data streams. This is advantageous because it reduces the rate (bits / second) that the asymmetric decryption subsystem needs to process, so a less expensive processor can be used. Another equally effective method for authenticating an optical disc is to connect one or more specific data segments at a specific radial distance from the center of the disc H being produced. When the master disc Η is stopped, the writing head can be from the center Μ between the rated speed and the paper size applicable to the Chinese National Standard (CNS) Α4 specifications (210Χ297mm> ---- <-. J ---- 1-installed --- ordered (please read the precautions on the back before filling in this page) 14 Printed Α7 Β7 i, the employee cooperative of the Central Standards Bureau of the Ministry of Economic Affairs i. Invention description (12) Some of the withdrawals exceed the rated speed Random change rate movement. The starting position of the write head can also be moved to a random distance from the rated starting position. Therefore, the distance M between the special data section and the center of the disc and the distance between the special data sections will be these A function of random variables. The values of these random variables will be arranged to vary with different programs. The distance between one or more data segments and the center of the disk Η is now a private key of an asymmetric encryption system and the encrypted data is encrypted Recorded on the disc as part of the system data. When the CD recorder copies this disc Η, the distance between the center of these data segments and the copied CD is different from the original disc, this is because the commercially available CD The writing head of the recorder is a radial drive of M fixed speed. Each matched CD player will have a calibrated radial servo system, so that the distance between the read head and the center of the disc is used as a digital block in the player. When the CD is played, use the information stored in the CD player An input pair on the memory P > public Q in Q decrypts the encrypted radial distance data. The decrypted data will be temporarily stored in the random access memory. When the CD continues to play, the data section The actual distance is compared with the decrypted data of the corresponding distance. If the calculated distance difference is greater than the allowable error, it is considered to be caused by the illegal copy of the CD. The CD player will stop playing and may display a copyright message. Another embodiment Use the measurement of the radial velocity of the reading head at different data sector positions instead of using the distance between the specific data sector and the disc center M and the specific data sector as the indication of the disc H certification. The advantage of this method is that it does not need to be accurately known The distance between the head and the center of the disc. It depends on the relative measurement value of the radial velocity of the read head at different positions, and it can be easily tracked and controlled to obtain this paper standard for China. Standard (CNS) Λ4 specification (210Χ297mm) ---- S-. J ---- f outfit ------ order (please read the precautions on the back before filling this page) 15 Α7 Β7 5 , Invention description (13) up to this value. Although the above embodiment illustrates a programmable conditional playback system for disc format *, the principle can also be applied to the tape format. For such applications, the authentication signature 32 can be added to the tape In the control track. Although the preferred embodiment of the present invention illustrates the present invention, those skilled in the art will understand that the present invention can be changed differently as long as it does not deviate from the spirit of the present invention. The scope of the invention 0 --- < --- I--γ outfit ------ order (please read the precautions on the back before filling out this page) The paper standard printed by the Staff Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs Applicable to China National Standards (CNS) Α4 specifications (210X297 mm) 16 A7 B7 printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs V. Description of invention () Component slogan control 10 ... copy protection recording device 41 .. .Signal line 21 · · .. Input 42. ... Asymmetric decrypter 22. · .. Symmetric Encryptor 43.... Public Signal Q 23. .. Signal Line 44. ... Signal Line 24. _ .. Bipolar Single Throw Control Switch 45. ... Signal Line 2 5. .. Asymmetric Encryptor 46 ... Symmetric Decryptor 26 ... Signal Line 47 ... Signal Line 27 ... Secret Wheel 48 ... Signal Line 28 ... Signal Line 49. • _ Κ 29. .. certification signature generator 51 _ ... signal line 31. ... signal line 52. ... certified signal detector 32 .... signal line 53. .. .Signal cable 33., input K 54 .... signal cable 40 .. copy protection device 55 .... switch (please read the precautions on the back before filling this page).
,1T 本紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公釐) 17, 1T This paper scale is applicable to China National Standard (CNS) Α4 specification (210X297mm) 17