TW398148B - Method for encrypting and embedding information in a video program - Google Patents

Method for encrypting and embedding information in a video program Download PDF

Info

Publication number
TW398148B
TW398148B TW83104753A TW83104753A TW398148B TW 398148 B TW398148 B TW 398148B TW 83104753 A TW83104753 A TW 83104753A TW 83104753 A TW83104753 A TW 83104753A TW 398148 B TW398148 B TW 398148B
Authority
TW
Taiwan
Prior art keywords
odd
month
clock
encrypted
key code
Prior art date
Application number
TW83104753A
Other languages
Chinese (zh)
Inventor
Roy J Mankovitz
Yu-Guang Wu
Original Assignee
British Virgin Island Searchin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/183,602 external-priority patent/US5581614A/en
Application filed by British Virgin Island Searchin filed Critical British Virgin Island Searchin
Application granted granted Critical
Publication of TW398148B publication Critical patent/TW398148B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

A method is provided for transmitting information having a header porting and a body portion, the method includes the steps of providing a clock having an output as a function of time, generating the first key based on the time from the clock and a part of the header portion, using the first key for encrypting the body portion to generate an encrypted body portion, combining the encrypted body portion and the header portion to form a data packet, combining a video program and the data packet to form a composite video signal, and transmitting the composite video signal. After encryption the encrypted body portion can be scrambled by using a scrambling key to swap the bits of the body portion. A method for receiving transmitted information having a header portion and an encrypted body portion comprises the steps of providing a clock having an output as a function of time, generating a first key based on the time from the clock and a part of the header portion, using the first key for decrypting the encrypted body portion to generate an decrypted body portion, combining the decrypted body portion and the header portion to from a data packet, and recording the data packet on a video cassette tape. If the body portion was scrambled after encryption, then before decryption, the body portion is descrambled by using a descrambling key.

Description

A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明() 本發明锋有関於一種在視訊節目中置入混頻及加密資 訊的方法,該視訊節目係經由無線傳输,或藉由電镰、衛 星、電話線傳送,或記錄在卡式錄影帶上者。 電視節目包括字幕及其他資訊插置其中,這些.資訊能 被插置於電視視頻訊號的垂直空白區間(vertical blanking interval, 以下簡作 VBI) 線中 ,有關 VBI 線,我們 將於稍後討論,在錄影機(VCR) 或一電視機中,一 VBI 解碼器傜用來擷取字幕以供顯示,而補聽力之不足,以 及擷取其他在VBI線中之資訊,其使得字幕會以文字伴隨 著影像,顯示在電視螢幕上。 其他資訊同樣可置入VBI線中,例如節目目錄即可置 於VBI線内,該節目目錄可以置於VBI線中,並經由無線 、電纜、衛星或電話線傳輸,或儲存在一卡式錄影帶的 VBI線中,與節目一同記錄在錄影帶上,該節目目錄即可 用來控制錄影機,在卡式錄影帶上選取節目,如上所述之 条統,可參考申請序號第08/066,666號,可置於VBI線 中之其他資訊包括:特定頻道節目索引(CSPG),節目相闋 '資訊(PRI),即時資訊(II),影像雜誌V(M)封包,以及 磁帶識別、節目號碼、絶對位址(TPA)封包,這些我們都 將會在稍後描述解釋。 因為上述資訊可提供使用者有價值的服務,我們必須 加以控制,使得只有經授權認可方能使用資訊,否則,將 無法收取服務的收費。 承如上述,在此項技g中,我們需要一種方法,將資 -----------裝-- (#·先聞讀f面之注意事K填寫本頁) 'tr 〇 線 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 83.3. 10,000 A7 B7 五、發明説明() 訊混頻及加密後,插置於視訊節目中,並將其傳輸或記錄 在卡式錄影帶上,同時,也需要一種能對視訊節目作解混 頻及解密處理的方法。 在本發明的一痼實施例中,提供一侮傳輸資訊.的方法 ,該資訊具有一開頭部分及一主體部分,該傳輸資訊方法 包括下列步驟:提供一時鐘,其輸出為時間的函數,並産 生一個以該時鐘所示時間及上述開頭部分為基準的第一鍵 碼,再使用該第一鍵碼對上述主體部分進行加密,産生一 加密主髏部分,接著將該加密主體部分及上述開頭部分混 合,構成一資料封包,然後將一視訊節目與該資料封包混 合,形成一混合視頻訊號,並傳輸該混合視頻訊號。 在本發明的另一實施例中,提供了一個將資訊記錄在 卡式錄影帶的方法,其中該資訊具有一開頭部分及一主震 部分,該記錄資訊方法包括下列步驟:提供一時鐘,其輸 出為時間的函數,並産生一橱以該時鐘所示時間及上述開 頭部分為基準的第一鍵碼,再使用該第一鍵碼對上述主體 部分進行加密,産生一加密主體部分,接·著將該加密主體 部分及上逑開頭部分插置於視訊節目中,並將視頻訊號記 錄在卡式錄影帶上。 在本發明一特定實施例中,更包括下列步驟:由資訊 的開頭部分産生一混頻密碼,利用該混頻密碼將上述加密 主體部分作混頻處理,然後將處理過後的混頻加密主體部 分,以及開頭部分,置入一視頻節目中,構成一混合視頻 訊號。 * 83. 3.10,000 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) A7 B7 經濟部中央標隼局員工消費合作社印製 五、發明説明() 在本發明另一特定實施例中,上逑混潁密碼僳為二位 元形式,其中每一位元為第一類型或為第二類型,其所提 供的方式更包括下列步驟:將混頻密碼每一位元送往加密 主體部分中,預定數目的宇元對,若指定的位元為第一類 型,則將宇元對的字元互換位置,而若指定的位元為第二 類型,則字元不交換,且重複此步驟處理加密主體部分所 有的字元對。 在本發明的特定實施例,其中在産生一傾以時鐘所示 時間及上逑開頭部分為基準的第一鍵碼的步驟中,包S— 個産生以時鐘之年份及月份為基準的第一鍵碼的步驟。 本發明的另一特定實施例,其中在對於主饅部分利用 該第一鍵碼進行加密,産生一加密主體部分的步驟中,包 括下列步驟:使用該第一鍵碼選擇一第一對應表,使用該 第一對應表,將主體部分的每一單位,對應出一痼第一加 密單位,然後將每一加密單位連結,構成一加密主體部分 0 在本發明之另一特定實施例中,主體部分的每一單位 長度為一個位元組。 本發明之另一特定實施例,其中使用該第一對應表, 將主體部分每一單位對應至一第一加密單位的步驟中,包 括下列步驟:使用該第一鍵碼選擇一第二對應表,且使用 該第二對應表,將每一値第一加密單位對應産生一第二加 密單位。 本發明另一特定實施例,其中依據時鐘年份及月份産 * --II |裝 — — (請先閲讀背面之注意事一^填寫本頁) 〇 -訂 :線· 本纸張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) -7- 83.3.10,000 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明() 生第一鍵碼的步驟中,包括在一痼第三對應表中,使用第 一鍵碼査閲第二鍵碼的步驟。 本發明另一特定實施例,其中依據時鐘年份及月份産 生第一鍵碼的步驟中,包括下列步驟:在該開頭部分提供 一奇數/偶數月份指示,如果該奇數/偶數月份指示為奇 數月,而時鐘的月份為偶數月,或者該奇數/偁數月份指 示為偶數月,而時鐘的月份為奇數月,則依據時鐘所示年 份及月份前一個月為基準,産生第一鍵碼;如果該奇數/ 偶數月份指不為奇數月,且時鐘的月份亦為奇數月,或者 該奇數/偶數月份指示為偶數月,且時鐘的月份亦為偶數 月,則依據時鐘所示年份及月份為基準,産生第一鍵碼。 本發明另一特定實施例,其中將視訊節目及資料封包 混合成為混合視頻訊號的步驟中,包括一個將資料封包置 入視訊節目之VBI線中的步驟。 本發明更另一特定實施例,其中將加密主體部分及開 頭部分置入視訊節目,形成一混合視頻訊號的步驟中,包 括一個將加密主體部分及開頭部分置入視訊節目之VBI線 中之步驟。 在本發明的另一賁施例中,提供一種接收被傳輸資訊 的方法,該資訊具有一開頭部分及一加密主體部分,該接 收方法包括下列步驟:提供一時鐘,其输出為時間的函數 ,並産生一個以該時.鐘所示時間及上述開頭部分為基準的 第一鍵碼,再使用該第一鍵碼對上述加密主體部分進行解 密,産生一解密主體部分,接箸將該解密主髏部分及上逑 ^^^1· ^^^1 ^^^1 HI m· m nn —^n n • V J (請先閲讀背面之注意事^界填寫本頁)A7 B7 Printed by the Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs 5. Description of the Invention () The invention relates to a method for placing mixing and encrypted information in a video program, which is transmitted wirelessly or through Electric sickle, satellite, telephone line transmission, or recording on a cassette tape. TV programs include subtitles and other information inserted into them. These information can be inserted into the vertical blanking interval (VBI) line of TV video signals. We will discuss the VBI line later. In a video recorder (VCR) or a television, a VBI decoder 傜 is used to capture subtitles for display, but the lack of hearing ability and other information in the VBI line, which makes the subtitles accompanied by text The image and display it on the TV screen. Other information can also be placed in the VBI line. For example, the program directory can be placed in the VBI line. The program list can be placed in the VBI line and transmitted via wireless, cable, satellite or telephone lines, or stored in a card video The VBI line of the tape is recorded on the video tape with the program. The program directory can be used to control the recorder and select the program on the cassette tape. For the system as described above, refer to application serial number 08 / 066,666. Other information that can be placed in the VBI line includes: program index (CSPG) of specific channel, program information (PRI), real-time information (II), video magazine V (M) packets, and tape identification, program number, Absolute address (TPA) packets, which we will explain later. Because the above information can provide users with valuable services, we must control it so that only authorized parties can use the information, otherwise the service charges will not be charged. As mentioned above, in this technique, we need a way to put the information ----------- install-(# · 先 闻 读 f 面 的 问题 K Fill out this page) 'tr 〇 The paper size of this paper applies the Chinese National Standard (CNS) A4 specification (210X297 mm) 83.3. 10,000 A7 B7 V. Description of the invention () After mixing and encryption, it is inserted into the video program and transmitted or recorded On video cassette tapes, at the same time, a method capable of demixing and decrypting video programs is also needed. In one embodiment of the present invention, a method for transmitting information is provided. The information has a beginning part and a main part. The method for transmitting information includes the following steps: providing a clock whose output is a function of time, and Generate a first key code based on the time shown in the clock and the above-mentioned beginning part, and then use the first key code to encrypt the above-mentioned body part to generate an encrypted main skull part, and then the encrypted body part and the above-mentioned beginning part Partial mixing forms a data packet, and then a video program is mixed with the data packet to form a mixed video signal, and the mixed video signal is transmitted. In another embodiment of the present invention, a method for recording information on a video cassette is provided. The information has a beginning portion and a main shock portion. The method for recording information includes the following steps: providing a clock, The output is a function of time, and generates a first key code based on the time indicated by the clock and the above-mentioned beginning part, and then uses the first key code to encrypt the above-mentioned body part, and generates an encrypted body part. Insert the encrypted main body part and the upper part of the upper part into the video program, and record the video signal on the video cassette. In a specific embodiment of the present invention, the method further includes the following steps: generating a mixing password from the beginning of the information, using the mixing password to perform the mixing processing on the encrypted main body, and then encrypting the processed mixed main body , And the beginning part, put into a video program to form a mixed video signal. * 83. 3.10,000 This paper size applies the Chinese National Standard (CNS) A4 specification (210X297 mm) A7 B7 Printed by the Consumer Cooperatives of the Central Bureau of Standards of the Ministry of Economic Affairs 5. Description of the invention () In another specific embodiment of the present invention The upper and lower mixed passwords are in the form of two bits, where each bit is the first type or the second type. The provided method further includes the following steps: sending each bit of the mixed password to encryption In the main part, a predetermined number of pairs of U-yuans, if the specified bit is the first type, swap the characters of the U-yuan pair, and if the specified bit is the second type, the characters are not exchanged, and Repeat this step for all character pairs in the encrypted body part. In a specific embodiment of the present invention, in the step of generating a first key code based on the time indicated by the clock and the beginning of the upper part of the clock, the packet S—generating the first key based on the year and month of the clock Steps for key codes. In another specific embodiment of the present invention, in the step of encrypting the main part using the first key code to generate an encrypted body part, the method includes the following steps: using the first key code to select a first correspondence table, Using the first correspondence table, each unit of the body part is mapped to a stack of first encryption units, and then each encryption unit is linked to form an encrypted body part. In another specific embodiment of the present invention, the body Each unit of the section is one byte in length. In another specific embodiment of the present invention, the step of using the first correspondence table to map each unit of the main body to a first encryption unit includes the following steps: using the first key code to select a second correspondence table And using the second correspondence table, each second encryption unit generates a second encryption unit. Another specific embodiment of the present invention, in which the production is based on the year and month of the clock * --II | packing-(Please read the note on the back first ^ fill this page) 〇-Order: line · This paper size applies to China Standard (CNS) A4 specification (210X297 mm) -7- 83.3.10,000 A7 B7 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention () The steps of generating the first key code include In the correspondence table, use the first key code to look up the second key code. In another specific embodiment of the present invention, the step of generating the first key code according to the year and month of the clock includes the following steps: providing an odd / even month indication in the opening part, and if the odd / even month indication is an odd month, The month of the clock is an even month, or the odd / even month is indicated as an even month, and the month of the clock is an odd month, the first key code is generated based on the year shown in the clock and the month before the month; if this Odd / even months are not odd months, and the month of the clock is also an odd month, or the odd / even month is indicated as an even month, and the month of the clock is also an even month. Based on the year and month shown on the clock, Generate the first key code. In another specific embodiment of the present invention, the step of mixing a video program and a data packet into a mixed video signal includes a step of placing a data packet into a VBI line of the video program. In another specific embodiment of the present invention, the step of placing the encrypted main part and the beginning part in a video program to form a mixed video signal includes a step of placing the encrypted main part and the beginning part in a VBI line of the video program. . In another embodiment of the present invention, a method for receiving transmitted information is provided. The information has a beginning part and an encrypted body part. The receiving method includes the following steps: providing a clock whose output is a function of time, And generate a first key code based on the time shown in the hour and the clock and the above-mentioned beginning part, and then use the first key code to decrypt the encrypted body part to generate a decrypted body part, and then the decrypted body Skull and upper part ^^^ 1 · ^^^ 1 ^^^ 1 HI m · m nn — ^ nn • VJ (Please read the notes on the back first and fill in this page)

'iT 〇 線 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) —8 一 83.3.10,000 五、發明説明( A7 B7 經濟部中央標準局貝工消費合作社印製 開頭部分混合,.構成一食料封包,然後將該資料封包記錄 在一卡式錄影帶上。 在本發明的另一實施例中,提供一種對記綠資訊解密 的方法,該資訊具有一開頭部分及一加密主體部分.,該解 密方法包括下列步驟:提供一時鐘,其輸出為時間的函數 ,並産生一値以該時鐘所示時間及上逑開頭部分為基準的 第一鍵碼,再使用該第一鍵碼對上述加密主體部分進行解 密,産生一解密主體部分。 在本發明一特定實施例中,更包括下列步驟:由開頭 部分産生一解混頻密碼,使用該解混頻密碼對加密主體部 分作解混頻處理。 在本發明另一特定實施例中,上述解混頻密碼係為二 位元形式,其中每一位元為第一類型或為第二類型,其所 提供的方式更包括下列步驟:將解混頻密碼每一位元送往 加密主體部分中,預定數目的字元對,若指定的位元為第 一類型,則將字元對的字元互換位置,而若指定的位元為 第二類型,則字元不交換,且重複此步驟處理加密主體部 分所有的字元對。 在本發明的特定實施例,其中在産生一锢以時鐘所示 時間及上逑開頭部分為基準的第一鍵碼的步驟中,包括一 個産生以時鐘之年份及月份為基準的第一鍵碼的步驟。 本發明的另一特定實施例,其中在對於主醴部分利用 該第一鍵碼進行解密,産生一解密主體部分的步驟中,包 括下列步驟J使用該第一鍵碼選擇二第一對應表,使用該 (請先聞讀背面之注意事I填寫本頁) 裝·'iT 〇 The size of this paper is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm)-8-83.3.10,000 V. Description of the invention (A7 B7 Printed at the beginning of the Central Bureau of Standards, Ministry of Economic Affairs, Shellfish Consumer Cooperatives, mixed printing. A food packet is formed, and then the data packet is recorded on a video cassette. In another embodiment of the present invention, a method for decrypting green information is provided. The information has a beginning part and an encrypted main part. . The decryption method includes the following steps: providing a clock whose output is a function of time, and generating a first key code based on the time indicated by the clock and the beginning of the upper key, and then using the first key code Decrypt the above-mentioned encrypted body part to generate a decrypted body part. In a specific embodiment of the present invention, the method further includes the following steps: generating a de-mixing password from the beginning part, and using the de-mixing password to decrypt the encrypted body part. Mixing processing. In another specific embodiment of the present invention, the above-mentioned demixing password is in a two-bit form, where each bit is a first type or In the second type, the method provided further includes the following steps: sending each bit of the demixing password to the encrypted body part, a predetermined number of character pairs, and if the specified bit is the first type, the word is The character pairs of the meta pairs are swapped, and if the designated bit is of the second type, the characters are not swapped, and this step is repeated to process all the character pairs of the encrypted body part. In a specific embodiment of the present invention, where A step of first key code based on the time indicated by the clock and the beginning part of the upper side includes a step of generating the first key code based on the year and month of the clock. Another specific embodiment of the present invention Wherein, in the step of decrypting the main part using the first key code to generate a decrypted body part, the following steps are included: J Use the first key code to select two first correspondence tables, and use this (please read the back first Notes I fill out this page)

、1T 〇 線 本纸張尺度逋用中國國家標準(CNS ) A4規格(210X297公釐) 83.3.10,000 A7 B7 經濟部中央標準局貝工消費合作社印製 五、發明説明() 第一對應表,將加密主體部分的每一單位,對鏖出一掴第 一解密單位,然後將毎一解密單位連結,構成一解密主體 部分。 在本發明之另一特定實施例中,加密主髏部分的每一 單位長度為一痼位元组。 本發明之另一特定實施例,其中使用該第一對輯表, 將加密主體部分每一單位對應至一第一解密單位的步驟中 ,包括下列步驟:使用該第一鍵碼選擇一第二對應表,且 使用該第二對應表,將每一掴第一解密單位對應産生一第 二解密單位。 本發明另一特定實施例,其中依據時鐘年份及月份産 生第一鍵碼的步驟中,包括在一値第三對應表中,使用第 一鍵碼査閲第二鍵碼的步驟。 本發明另一特定實施例,其中依據時鐘年份及月份産 生第一鍵碼的步驟中,包括下列步驟·.接收一個開頭部分 具有一奇數/偶數月份指示的資訊,如果該奇數/偶數月 份指示為奇數月,而時鐘的月份為偶數月,或者該奇數/ 偶數月份指示為偶數月,而時鐘的月份為奇數月,則依據 時鐘所示年份及月份前一個月為基準,産生第一鍵碼;如 果該奇數/偶數月份指示為奇數月,且時鐘的月扮亦為奇 數月,或者該奇數/偶數月份指示為偶數月,且時鐘的月 份亦為偶數月,則依據時鐘所示年份及月份為基準,産生 窠一鍵碼。 在本發明之更另一實施例中,所提供方法更包括將所 ----=-----^—装 =— (請先閲讀背面之注意事一^填寫本頁) 〇 訂 線 本紙張尺度適用中國國家標準(CNS ) A4規格(21〇><297公釐) •10- 83.3.10,000 五、發明説明() A7 B7 經濟部中央標準局員工消費合作社印製 接收之奇數/偶數月份指示資訊,記錄在卡式錄影帶上, 及將時鐘輸出記錄在卡式錄影帶上的步驟。 經預期能實行本發明最佳模式的待定實施例圔,圖示 如下: 第1A圖傜依照本發明原理,提供一能夠配合一目錄控 制器,在一卡式錄影帶上,箄取標示節目的索 引式錄影機方塊圖。 第1B圖傺依據本發明原理之發射器方塊圖。 第2圔傺一値交錯式電視掃描試映圖中電磁場、奎面 架構、及OI之圖示。 第3圖係為一交錯式電視試映掃描之時相圖,以及可 以插置於VBI線中之資訊種類。 第4圖係依本發明原理之錄影帶结構圖,圖示在控制 軌中存有VISS記號,在VBI線中的每一锢TPA 封包,均包括一磁帶識別碼、節目號碼、絶對 位址,以及在VBI線中之目錄。 第5A圖僳依本發明原理對於在TPA封包内的資訊,所 作的概念性圖示。 第5B圖憮依本發明原理對於在節目目錄内的資訊,所 作的概念性圖示。 第6圖像依本發明原理對於CSPG、PRI、Ii、V(H)封 包或目錄,儲存在VBI線中時 > 其開頭、主髏 及結束部分的概念性圖示。 第7圖傺依據本發明中,奇數/偶數位元與年月份的 (請先閎讀背面之注意事^泰填寫本頁) -裝· 打_ 〇 參 本紙張尺度適用中國國家襟準(CNS ) A4規格(210X297公釐) 83. 3. 10,000 經濟部中央標準局員工消費合作社印製 A7 _B7____五、發明説明() 睡像圜。 第8A圖俗依據本發明將加密資訊置入一視訊節目中傳 輸之方法流程圖。 第8B圖像依據本發明,將加密資訊置入一記錄在卡式 錄影帶上視訊節目之方法流程圏。 第9A圖係依據本發明,將置入一視訊節目中傅輸資訊 進行解密之方法流程圖。 第9B圖傺依據本發明,將置入一儲存於錄影帶上視訊 節目進行解密之方法流程圖。 第1Q圖偽依據本發明,將主體部分位元組對應成一加 密位元組之方法圖示。 第11圖葆依據本發明,將加密主體部分位元組對應成 —解密位元组之方法圔示。 請參閲圖示,第U圖係為一索引式錄影機糸統10之方 塊圖,包括一附有一卡式錄影帶40之錄影機(VCR) 1,一 影像顯示50,及一目錄控制器30,該VCR 1係為一傳統錄 影機裝置,其可使用任何一種錄影技術,例如BETA、VHS、 super VHS、8mm、VHS-C或任何其他受歡迎的科技,其中 VHS-C索引式磁帶特別有用,如美國專利申請序號第〇8/ 號所描逑,其能直接在一 VHS索引式錄影機上播 放,而有完全索引的功能,卡帶40是一個傳統的錄影帶, 包括-T磁帶42,舍裝在一匣式或卡式的外殼中,即使外殼 的尺寸及設計,隨著不同類型的錄影技術而有所不同,.但 記錄在磁帶上的基本資訊是相同的/這些有闊“!?.的技術 (請先閲讀背面之注意事G填寫本頁) 訂 〇 -線_ 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 83. 3.10,000 —12 — A7 B7 經濟部中央標準局貝工消費合作社印製 五、發明説明() 及蓮作,我們在習知技蓊中即已相當瞭解。 該VCR 1具有一按鈕控制面板3 ,其包括許多控制按 鈕:裝載(L0AD)3a、播放(PLAY)3b、停止(ST0P)3c、錄影 (EEC0RD)3d及取帶(EJECT)3e、其中該按鈕裝載3a傺為選 擇性的,在自動裝帶的機型上不使用;一 VCR控制運.輯線 路21接收自該按鈕控制面板3所傳送來的控制訊號,且送 出控制訊號至一馬達控制5、一影像邏輯線路7及一位置 邏輯及計數器線路3,同時送至目錄控制器30中之影像顯 示50及微處理控制器31,來控制VCR 1的所有動作;一時 鐘可設定時間,且譲VCR控制邏輯所讀取,該VCR控制邏 輯21能利用一徹處理器及一儲存程式的記億體,達成本發 明方法之各步驟。 該馬達控制5控制卡帶4G的裝載及取出,同時控制卡 式錄影帶40中,磁帶42在錄影、播放、尋找、快速順轉、 逆轉操作時之動作,該影像邏輯線路7,在由磁帶42讀出 或錄入視頻訊號時,控制影像謓/寫磁頭14的動作,當一 痼節目被錄影或播放時,磁帶42會通過絞盤13,該絞盤13 的速度傜由該馬逹控制5所決定,以於錄影、播放及尋找 的操作中,使磁帶保持一穩定線性速度,尋找速度大約是 播放速度的兩倍,在逆轉及快速順轉的動作中,磁帶的速 度傺由捲輪的速度所控制,該位置邏輯及計數器線路9, 藉由一卡帶捲動感測器22,監控磁帶位置的移動,且能産 生代表磁帶位置的訊號。 該目錄控制器30包括一微處理捶制器31、一隨機存取 .裝—I (請先閲讀背面之注意事填寫本頁) 訂 〇 線 本纸張尺度適用中國國家椟準(CNS ) A4規格(210X297公釐) 83. 3. !〇,〇〇〇 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明() 記億體(RAM) 33和一目錄輸入/輸出顯示及控制面板32, 較佳者該撖處理控制器31包括一積體電路橄處理器及一程 式儲存庫,例如一唯諛記億髏(ROM),用以儲存一控制程 式及一時鐘,其能産生一時脈訊號,以逹成計時功能及提 供畤間,可利用該目錄输入/輸出顯示及控制面板32,以 習知技藝的一種方式來設定時間,此外,該VCR 1可用時 鐘80來保持正確時間,該RAM 33傺為一傳統隨機存取半導 體記億,其直接作為微處理控制器31的介面,該RAH 33最 好是不須消耗功率即可保持資料的非揮發性記億體裝置 (N0N-V0LITILE),又,該RAM 33傺以電池作為備用電源, RAM 33的一部份標示為33b,偽用以儲存撤處理控制器31 的条統軟體,該RAM 33也用以儲存節目目錄33a。 該目錄輸入/輸出顯示及控制面板32包括一字母數字 鍵盤32a及特殊功能鍵,例如一尋找鍵32b ,用以下指令 在目錄33a中及磁帶42上尋找資料,一修改鍵32c用以修 正或刪除在RAH 33中的目錄資訊,及一輸入鍵32d ,用以 输人節目目錄資訊,除了提供特殊功能鍵外,也可藉著在 字母數字鍵盤32a上,輸入預設的傳統鍵序列,而啓動某 一特殊功能。 一顯示器32e僳為一傳統的液晶或其他顯示,以顯示 在鍵盤32a上輸入的資料,及顯示儲存在RAM 33中的目錄 或其他資訊,此外 > 如以下所將討論,能使用影像監测器 5〇a的螢幕顯示,儲存在RAH 33中的目錄資訊傜由該微處 理控制器31所處理。 ' (請先閲讀背面之注意事\ .裝-- π填寫本頁)、 1T 〇 The size of this paper is in accordance with Chinese National Standard (CNS) A4 (210X297 mm) 83.3.10,000 A7 B7 Printed by the Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention () First correspondence table, Each unit of the encrypted body part is paired with a first decryption unit, and then the first decrypted unit is connected to form a decrypted body part. In another specific embodiment of the present invention, each unit length of the encrypted main cross section is one byte. In another specific embodiment of the present invention, the step of using the first pair of lists to map each unit of the encrypted body part to a first decryption unit includes the following steps: using the first key code to select a second A correspondence table, and using the second correspondence table, each first decryption unit is correspondingly generated into a second decryption unit. In another specific embodiment of the present invention, the step of generating the first key code according to the year and month of the clock includes the step of referring to the second key code in the third correspondence table using the first key code. In another specific embodiment of the present invention, the step of generating the first key code according to the year and month of the clock includes the following steps: receiving information with an odd / even month indication at the beginning, if the odd / even month indication is Odd month, and the month of the clock is an even month, or the odd / even month is indicated as an even month, and the month of the clock is an odd month, the first key code is generated based on the year shown in the clock and the month before the month; If the odd / even month is indicated as an odd month and the month of the clock is also an odd month, or the odd / even month is indicated as an even month and the month of the clock is also an even month, then the year and month shown by the clock are Benchmark, generating a one-key code. In still another embodiment of the present invention, the provided method further includes: ---- = ----- ^ — 装 = — (please read the note on the back first ^ fill in this page) 〇 order line This paper size applies the Chinese National Standard (CNS) A4 specification (21〇 > < 297 mm) • 10- 83.3.10,000 V. Description of the invention () A7 B7 Odd number printed and received by the staff consumer cooperative of the Central Standards Bureau of the Ministry of Economic Affairs / Even month indication information, steps for recording on a cassette, and recording clock output on a cassette. A pending embodiment that is expected to implement the best mode of the present invention is shown in the following figure: Figure 1A: According to the principles of the present invention, a catalog controller can be provided to capture a label program on a video cassette tape. Indexed recorder block diagram. FIG. 1B is a block diagram of a transmitter according to the principles of the present invention. Illustrations of the electromagnetic field, Kui surface structure, and OI in the 2nd ~ 1st interlaced TV scan preview. Figure 3 is a phase diagram of an interlaced TV preview scan and the types of information that can be inserted into the VBI line. FIG. 4 is a structural diagram of a video tape according to the principle of the present invention, showing that a VISS mark is stored in a control track. Each TPA packet in the VBI line includes a tape identification code, a program number, and an absolute address. And directories in the VBI line. Figure 5A is a conceptual illustration of the information in a TPA packet in accordance with the principles of the present invention. Fig. 5B is a conceptual illustration of information in a program directory according to the principles of the present invention. The sixth image is a conceptual illustration of CSPG, PRI, Ii, V (H) packets or directories stored in the VBI line according to the principles of the present invention. Figure 7: According to the present invention, the odd / even digits and the year and month (please read the notes on the back ^ Tai fill in this page) -install · type_ 〇Refer to the paper standard for China National Standard (CNS ) A4 size (210X297 mm) 83. 3. 10,000 Printed by the Consumer Cooperatives of the Central Bureau of Standards of the Ministry of Economic Affairs A7 _B7____ V. Description of the invention () Sleeping image. FIG. 8A is a flowchart of a method for transmitting encrypted information into a video program according to the present invention. The eighth picture according to the present invention is a method flow of placing encrypted information into a video program recorded on a video cassette tape. Fig. 9A is a flowchart of a method for decrypting the information input into a video program according to the present invention. Fig. 9B is a flowchart of a method for decrypting a video program stored on a video tape according to the present invention. Figure 1Q is a diagram illustrating a method of mapping the main body bytes into an encrypted byte according to the present invention. FIG. 11 shows a method of mapping the bytes of the encrypted main body into-decrypting the bytes according to the present invention. Please refer to the figure. Figure U is a block diagram of an index video recorder system 10, including a video recorder (VCR) 1 with a cassette video cassette 40, an image display 50, and a directory controller. 30. The VCR 1 is a traditional video recorder device. It can use any video recording technology, such as BETA, VHS, super VHS, 8mm, VHS-C or any other popular technology. The VHS-C index tape is specially Useful, as described in U.S. Patent Application Serial No. 08 /, it can be played directly on a VHS index video recorder, and has a full index function. The cassette 40 is a traditional video tape, including -T tape 42 , Housed in a cassette or cassette case, even though the size and design of the case varies with different types of video technology, but the basic information recorded on the tape is the same !?. Technology (Please read the note on the back G to complete this page) Order 〇-line _ This paper size applies to China National Standard (CNS) A4 specification (210X297 mm) 83. 3.10,000 —12 — A7 B7 Printed by the Shellfish Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs Description of the invention () and lotus, we already know quite well in the know-how. The VCR 1 has a button control panel 3, which includes many control buttons: load (LOAD) 3a, play (3), stop ( ST0P) 3c, video (EEC0RD) 3d, and tape picking (EJECT) 3e, where the button loading 3a 选择性 is optional and is not used on models with automatic loading; a VCR control operation line 21 is received from the The control signal sent from the button control panel 3, and sends the control signal to a motor control 5, an image logic circuit 7 and a position logic and counter circuit 3, and at the same time to the image display 50 and micro processing in the directory controller 30 The controller 31 controls all actions of the VCR 1; a clock can set the time, and is read by the VCR control logic. The VCR control logic 21 can use a processor and a stored program to record billions of methods to achieve the invention method. The motor control 5 controls the loading and unloading of the cassette 4G, and at the same time controls the movement of the tape 42 in the cassette 40 during recording, playback, searching, fast forward, and reverse operations. The video logic circuit 7 When the video signal is read or recorded by the magnetic tape 42, the motion of the video / write head 14 is controlled. When a program is recorded or played, the magnetic tape 42 will pass the winch 13, and the speed of the winch 13 is determined by the horse. Controlled by 5 to keep the tape at a stable linear speed during recording, playback, and seek operations. The seek speed is approximately twice the playback speed. In the reverse and fast forward motions, the tape speed is controlled by the volume. Controlled by the speed of the wheel, the position logic and counter circuit 9 monitors the movement of the tape position by a cassette scroll sensor 22 and can generate a signal representative of the tape position. The directory controller 30 includes a microprocessor controller 31 and a random access device. I—Please read the notes on the back and fill in this page. Ordering: The paper size is applicable to China National Standards (CNS) A4 Specifications (210X297mm) 83. 3.! 〇, 〇〇〇〇7 A7 B7 Printed by the Consumers' Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention () Billion body (RAM) 33 and a catalog input / output display and control Panel 32, preferably, the processing controller 31 includes an integrated circuit olive processor and a program storage, such as a ROM memory, for storing a control program and a clock, which can generate The clock signal is used to complete the timing function and provide time. The directory input / output display and control panel 32 can be used to set the time in a manner known in the art. In addition, the VCR 1 can use the clock 80 to maintain the correct time. The RAM 33 傺 is a traditional random access semiconductor memory, which is directly used as the interface of the microcontroller 31. The RAH 33 is preferably a non-volatile memory device (N0N) that can hold data without consuming power. -V0LITILE), again, the RAM 33 A battery as a backup power supply, RAM 33 is designated as a part 33b, for storing the dummy bar withdrawal processing system software of the controller 31, the RAM 33 is also used for storing the program directory 33a. The directory input / output display and control panel 32 includes an alphanumeric keyboard 32a and special function keys, such as a search key 32b. Use the following instructions to search data in the directory 33a and on the magnetic tape 42. A modification key 32c is used to modify or delete The directory information in RAH 33 and an input key 32d are used to input the program directory information. In addition to providing special function keys, you can also start by entering a preset traditional key sequence on the alphanumeric keyboard 32a. A special function. A display 32e 僳 is a conventional liquid crystal or other display to display data entered on the keyboard 32a and to display directories or other information stored in the RAM 33. In addition > as will be discussed below, image monitoring can be used The screen of the device 50a displays that the directory information stored in the RAH 33 is processed by the microprocessor controller 31. '(Please read the notes on the back \. 装 装 --πFill out this page)

、tT 〇 線 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 83. 3.10,000 A7 B7 經濟部中央擦準局負工消費合作社印製 ’五、發明説明() 該VCR 1更包括一字元産生線路23,其縝合至該VCR 控制暹輯線路21及一字元産生唯讀記億饅(ROM) 25,在習 知技藝中,對於該字元産生器23已相當瞭解,代表性地説 ,該字元産生ROM 25儲存一資料表,代表許多字母及數字 字元的像素或位元樣式,例如羅馬字母及阿拉伯數字,經 由該VCR控制邏輯線路21及字元産生線路23發出指令,使 得在字元産生ROM 25中的資料被讀取,並置於一輸出訊號 上,送往影像監測器5Ga,由微處理控制器31所産生座標 所預定之顯示位置,結果即産生一在顯.示螢幕上可見的字 母或數字字元顯示,電視接收器中,該字元産生器用於頻 道的螢幕上顯示,為一相當熟知的技藝,該影像監测器50a 最好是36字元* 15列者。 第1B11傺依據本發明原理之發射器方塊圖,如我們將 於下詳述者,該訊息主體84,傺經加密及混頻單元85,進 行加密及混頻處理,加密及混頻傜以訊息開頭86中資訊之 函數進行處理,我們同樣亦於下討論,然後訊息開頭86及 結束碼88經混合器90,使與加密訊息主體混合,接著該混 合器90的輸出與一視訊節目82經混合器92混合,該混合器 92輸出即混合視頻訊號,可經由天線96傳輸,或經由電纜 輸出單元送至電銳,該混合視頻訊號亦可經由衛星或電話 線傳輸。 電視節目包括字幕,其插置於節目中 > 這種資訊能被 置入電視視頻訊號的垂直空白區間(VBI)線中(於下描述) ,在VCR 1或電視中有一 VBI解碼蒜60a ,其能自VBI線 (請先閲讀背面之注意事填寫本頁) •裝,、 TT 〇 The paper size is applicable to Chinese National Standard (CNS) A4 specification (210X297 mm) 83. 3.10,000 A7 B7 Printed by the Consumers ’Cooperative of the Central Bureau of Accreditation of the Ministry of Economic Affairs 5. Description of the invention () The VCR 1 It also includes a character generation line 23, which is coupled to the VCR control Siam line 21 and a character generation of read-only memory (ROM) 25. In the conventional art, the character generator 23 is equivalent. Understand that, representatively, the character generating ROM 25 stores a data table representing the pixel or bit patterns of many alphabetic and numeric characters, such as Roman letters and Arabic numerals, through the VCR control logic circuit 21 and the character generation The circuit 23 issues an instruction, so that the data in the character generation ROM 25 is read, placed on an output signal, and sent to the image monitor 5Ga. The predetermined display position is determined by the coordinates generated by the microprocessor controller 31. The result is Generates a display of alphabetic or numeric characters visible on the display screen. In a television receiver, the character generator is used to display the channel screen. It is a fairly well-known technology. The image monitor 50a is preferably 36 Characters * 15 columns. 1B11: Block diagram of a transmitter according to the principles of the present invention. As we will detail below, the message body 84 is encrypted and mixed by the encryption and mixing unit 85, and encrypted and mixed using the message. The function of the information in the beginning 86 is processed. We also discuss it below. Then the beginning 86 and end code 88 of the message are mixed with the encrypted message body, and then the output of the mixer 90 is mixed with a video program 82. The mixer 92 outputs the mixed video signal, which can be transmitted through the antenna 96 or sent to Dennis through the cable output unit. The mixed video signal can also be transmitted through the satellite or telephone line. TV programs include subtitles, which are inserted into the program> This kind of information can be placed in the vertical blank interval (VBI) line of the TV video signal (described below). There is a VBI decoding garlic 60a in VCR 1 or TV, It can be installed from the VBI line (please read the note on the back first and fill in this page).

<tT 〇 線· 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) -1 S- 83. 3.10,000 經濟部中央標準局員工消費合作社印製 A7 B7五、發明説明() 中擷取字幕,使得字幕能以文字方式顯示在影像監測器上 0 其他資訊同樣可置入VBI線中,例如節目目錄即可置 於VBI線内,該節目目錄可以置於VBI線中並傳输,或儲 存在一卡式錄影帶的VBI線中,與節目一同記錄在錄影帶 上,該節目目錄即可用來控制錄影機,在卡式錄影帶上選 取節目,如上所逑之条統,可參考上面曾提過的申請序號 第08/066,6 6 6號,可置於VBI線中之其他資訊包括:特 定頻道節目索引(CSPG),節目相關資訊(PRI),即時資訊 (II),V〇〇封包,以及TPA封包,我們將於下描述解釋。 例如,一節目標題即可置入VBI線中,配合一錄製在 VCR卡帶的節目一同傳输,該VBI解碼器就能擷取置於 VBI線中的節目標題,並儲存該節目標題及節目啓始位置 至目錄控制器30的RAH 33中,以協肋使用者將來從該VCR 卡帶中選取節目。 如第la圔所示,可以將一VBI解碼器6Qa之輸入,耦 合至一調諧器61的输出,在大多數的錄影機中均設有該調 諧器,用以調整頻率至適當頻道接收無線電波,該調諧器 61僳藉由一天線63或一電淇電視訊號源64接收電視訊號, 該解碼器、調諧器及兩者之間相互的動作,為習知技越, 在商業上使用的例子,一種VBI字幕解碼器ielecaption 4000轉接器可自維吉尼亞州的National Caption Institute 取得 ,而 Teletext 解碼器 , 可由加拿大渥 太華的 Horpak 公司取得,至於VBI解碼器CGD300(T可自ITT半導體公司 (請先閲讀背面之注意事D填寫本頁) 裝 tr 〇 線- 本纸張尺度適用中國國家.標準(CNS ) A4規格(210X297公釐) 83. 3.10,000 -16- A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明() 取得。 . —解碼器訊號線65僳由該解碼器耦合至該VCR控制通 輯線路21,該VCR控制邏輯線路21可在RAM 33内儲存程式 的控制之下,由微處理控制器31下逹指令,將解碼資料傳 送至目錄33a ,例如,假設VBI中資料包括一節目標題, 然後程式將使得VBI資訊以節目標題形式儲存在目錄33a 中,在使用者的控制之下,目錄的内容將顯示在影像監澍 器5Qa,使用者可利用鍵盤32a選取節目,如上面提到過 的,描述於申請序號第08/066,666號中。 第2圖係一锢交錯式電視掃描試映圖100中電磁場、 畫面架構、及VBI之圖示,電視訊號的第一電磁場102開 始於螢幕左上方角落,且掃描成線21,22,. .. 263,在螢幕 的下方,掃描在螢.幕上的光束,以一条列的線折回螢幕的 上方,這一糸列的線在圖上傺為垂直空白區間線106 ,在 折回的過程中,螢幕顯示為空白的,然而,由於訊號仍然 存在,額外的資訊可在該垂直空白區間内被傳送,在VBI 中至少有20條線,且可能有更多的VBI線,在該垂直空白 區間之後,第二電磁場H4在螢幕上作用,而在第一電磁 場102的掃描線之間插入線283,284. ...525,該第一、第 二電磁場以及垂直空白區間共同構成了棗面架構,第3圖 傺圔示VBI線1至20的之時柑110,如圖所示,每一個VBI 線占據了一部分時段,就像第3圖所示的19,每一個VBI 線,能夠容纳2-4個位元组的資訊,當一锢訊息被置於 .VBI線中時,通常訊息長度會超過f-4個位元組,且分布 (請先閲讀背面之注意事0填寫本頁) 裝·- 訂' 〇 線 本紙張尺度適用中國國家標準(CNS ) A4規格(21〇X297公釐) 83. 3.10,000 經濟部中央標準局貝工消費合作社印製 A7 . B7五、發明説明() 於多個電磁場及盡面中,包含於VBI線中的資訊可包括; 特定頻道節目索引(CSPG),節目相關資訊(PRI),即時資 訊(II),V(M)封包,TPA封包,或一値目錄,如第3圖中 組成内容所示。 第4圖係在一錄影帶上圖示一控制軌上所儲存的影像 索引尋找条統(簡作VISS)記號,依據本發明之原理,在 VBI線中的每一痼TPA封包都包括了一磁帶識別號碼、一 節目號碼及一絶對位址,且一目錄也儲存在VBI線中,在 第4圖中,VISS記號186、188及190俗放置於節目開頭的 控制軌166中,這痼動作在磁帶製造或由母帶拷貝時即已 完成,在一預錄的非空白磁帶中,該TPA封包176及目錄 178 ,傜預先分別儲存在磁帶的VBI線19及20上,在第4 圖中標示為167及168。 如第5A圖所示,每一個TPA封包215包括一磁帶識別 214、一節目號碼216及一絶對位址218 ,該磁帶識別偽 為一個目前所使用錄影帶的識別號碼,且在整捲錄影帶上 均為相同的號碼,有關於節目序號的節目號碼,係記錄在 磁帶上與TPA鄰接,例如第4圖中所示的TPA封包TP3A, 對應著節目號碼3,在TPA封包中絶對位址傜自磁帶的開 始,至特定封包在磁帶上記錄位置的時間或距離指示,因 為在整捲錄影帶上都設有TPA封包,所以錄影帶上絶對位 址一直改變,該TPA封包也可包含一年月份稱位220,其 作用將於下描述。 每一個目錄的條目是用來儲存記錄在錄影帶上的節目 (锖先閲讀背面之注意事〇填寫本頁 〇 -訂!I · -線_ 本紙張尺度適用中國國家梯準(CNS ) A4規格(210X297公釐) 83. 3.10,000 -1 8- 經濟部中央標準局員工消費合作社印製 A7 ___B7__ 五、發明説明() 相關資訊,例如,如第5 B圖所示,一値目錄可包含一些有 關節目的資訊:節目標題205、節目號碼206、啓始位址 208、結束位址210及錄影速度212,可再提供額外镧位 204以允許擴展的空間。 該TPA封包及目錄資訊可配合VISS記號一同使用,以 在錄影帶上直接選取節目,在錄影帶上的目錄可在目錄33a 中選用及儲存,並顯示給使用者,使用者即可選擇節目觀 賞,接著錄影機會使用錄影帶中之TPA封包内之資訊,以 及目錄内之資訊,選取節目,藉著將儲存在目綠内之各節 目啓始位址,與在TPA封包内的絶對位址進行比較,就能 決定錄影帶是要作順轉或逆轉,以接近選取節目開頭具有 VISS索引記號處,之後該節目即可由錄影機播放,在一預 緣磁帶上選取節目的方法,在申請備忘號碼25845/LWT, 歸檔日期12/15/93,該案中有更進一步的描逑。 如上述25845/LWT號案中所提及,TPA封包及VISS記 號,能被記錄在家用的錄影帶上,以協助使用者在錄影帶 上選取節目,在使用家用錄影帶的情況下,該目錄傺記億 在RAM 33中,而不是在VBI線中。 可在VBI線中傳輸的資訊類型包括:特定頻道節目索 引(CSPG),節目相關資訊(PRI),即時資訊(II),V(M)封 包,TPA封包,或一知目錄,如第3圖中組成内容114所 示〇 在VBI線中傳输資訊格式顯示在第6圔中,相同的格 式可應用於多種在VBI線中傳輸資訊:特定頻道節目索引 請先閲讀背面之注意事填寫本頁) •裝 訂 〇 線 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 83. 3.10,000 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明() (CSPG),節目相關資訊(PRI),即時資訊(II), V(M)封包 ,TPA封包及目錄,該傳输以一訊息開頭242開始,包括 一啓始碼24.8、一類型碼250及一訊息識別252,該類型 碼代表訊息的類型,而該訊息識別則用以識別各訊.息。 該訊息開頭242之後接著訊息主體244 ,其包括了訊 息的資訊内容,例如,CSPG是在特定頻道即將於預定時間 傳輸的許多節目之節目資訊,每一傾節目的資訊包括: .節目檫題 .節目的時間長度 .傳輸的曰期及時間 .電台名稱字母(例如KGET或KCAL)或電台名稱四個 字母縮寫 .頻道號碼 除了上述資訊之外,該特定頻頻道節目索引CSPG也包-括了壓縮碼數字,其代表頻道、時間及長度,此外節目的 簡述亦可包括於其中 節目相關資訊(PRI),其亦可被視為即時資訊(II), 係為在VBI.中被傳輸的資訊,主要關於一掴可由使用者下 達命令,而在節目同時或稍锋一痠時間接收的廣播節目, 例如,PRI資訊包括在棒球賽轉播中球員的攻守統計,在 烹飪節目中列出的食譜,以及在教育節目之後指派問題及 解答。 V(M)封包傺於V8I中傳輸,用以標示影像雜誌段落的 •開始,或標示節目的開始。 ' •裝"-- (請先閲讀背面之注意事填寫本頁) 訂---- 〇 線 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 83. 3.10,000 A7 B7 經濟部中央標準局貝工消費合作社印製 五、發明説明() 至於TPA封包及目錄以及他們用來選取錄影帶上節目 的用途,已於上文作了描逑。 接著訊息主體244的是訊息結束246 ,包含一停止碼 254及一總和檢査256。 現在傳输資訊的類型以及格式均已描述,教們在此將 討論資訊的加密及解密方法,將資訊加密的目的是保護以 防止資訊的未授權取得。 一般置於VBI中的訊息编碼,是依照時間及訊息,産 生一痼鍵碼,然後使用該鍵碼選擇一値或多锢對應表,將 訊息的部分映射成一個加密訊息,這種加密的方法是用於 傳輸的訊息,或是儲存在錄影帶VBI線中的資訊,在數位 磁帶中不需要使用VBI 因為數位磁帶中有一區域是用 來儲存這些資訊的,我們在此所描逑的加密及解密方法, 同樣可應用於記錄在數位磁帶上的資訊。 第8A圔傜依據本發明將加密資訊置入一視訊節目中傅 輸之方法流程圔,圖中所示方法可藉著發射器倒之微處理 器或電腦中的程式而逹成,一個被傳輸的訊息,如第8A圖 中組成内容240所示,相當於第S圖的組成内容240 ,如 圖示該訊息包括一啓始碼、類型及訊息識別構成了訊息的 開頭,訊息的主體接在訊息開頭,可能是CSPG、PRI、II 、V(H)封包或目錄,結束橱位跟在訊息主體之後,包括一 停止碼及一總和檢査,該訊息的主體部分,是訊息中需要 加密保護的部分。 第8B圖中所示為目錄204及ΤΡ/Γ封包215,其代表記 •裝— (請先聞讀背Φ之注意事填寫本頁) 訂 〇 線 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 83.3.10,000 經濟部中央標準局員工消費合作社印製 A7 _ B7 _五、發明説明() 錄在磁帶上的資訊。 首先,第8A圖傳输訊息主體的加密將被描述,然後在 第8B圖中加密資訊記錄於磁帶上所作的的任何修改亦將被 描述。 在步驟30S中,檢査該訊息識別的奇/偶位元以決定 位元是1或是0,如第6圖所示,該訊息識別包括一奇/ 偶位元,如果該奇/偶位元為0,則該月份為一奇數月, 而若該奇./偶位元為1,則該月份為一偶數月,奇/偶位 元將於第7圖中再作描述,如第?圔所示該奇/偶位元將 在兩痼月的期間内維持其值,例如,奇/偶位元可能在五 月及六月間為0,而在五月及六月間其奇/偶位元為0的 原因,偽為這兩摘月的期間開始於五月,而數字”5”係為 奇數,在第7圖中六月及七月間該奇/偶位元2S0為1, 在這情況之下,該奇/偶位元為1,因為開始月份六月的 代表數字”6”為偶數,所以該奇/偶位元的值,是以兩掴 月期間中,開始月份為奇數或偶數來決定。 要有一痼奇/偶位元的原因是,若傳輸的時間很接近 五月及六月的轉接時間,則發射器可能相信是五月份的傳 輸,然而,例如一個錄影機的接收器可能會依據其内部的 時鐘,而認為是六月份,若在這種情況之下,假如錄影機 時鐘指示為1993年S月,且該奇/偶位元為a ,則該錄影 機會知道發射器認定為5月份,因為該奇/偶位元已經被 設定為Q ,但是,如果奇/偶位元為1,則錄影機會知道 發射器是在6月份傳輸資訊的。 · 裝-- (請先閲讀背¾之注意事填寫本頁) 訂 〇 -線 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 83.3.10,000 經濟部中央標準局負工消費合作社印製 A7 __B7_ 五、發明説明() 所以在歩驟306中,第一步驟是檢査該奇/偶位元, 來決定其為〇或1,注意當傳输時,該奇/偁位元可能被 發射器設定為0或1 ,如果奇/偶位元被設定為0,也就 是在步驟步驟308中傳输月份為奇數,則傳输的下一步為 步驟3U ,另外一方面,假設步驟308中測試的结果傳输 月份為偶數,則傳输的下一步驟為314 ,在步驟316中, 根據傳輸時之年月份,以及訊息識別,産生一值鍵碼,而 在步驟314中,根據傳输時之年月份的前一锗月,以及訊 息識別,産生一健鍵碼,例如,假設該奇/偶位元被設定 為〇,表示奇數月傳輸,且假設傳输時間為1993年6月, 那麼將如步驟314所示,根據1393年5月産生鍵碼。 根據傳輸年月份産生鍵碼的方式有許多種,例如,可 由年份加上或減去月份,或者年份及月份可建績與訊息識 別相加,且由一餘數模組32加以計算處理。 一旦該鍵碼産生,則在步驟32Q中,該鍵碼用來在一 對學表中,査閲一第二鍵碼,然後在步驟322中,該第二 鍵碼被用來選擇一锢對應表,以於步驟324中,將訊息主 體内的各位元組加密,一旦加密完成,則在步驟3 26中, 該啓始碼、類型、訊息識別、加密主體、停止碼及總和檢 査將被串聯在一起,形成傳輸的加密訊息。 第1Q圔圖示將訊息主體的位元組加密的方式,例如, 第10圖中所示之元素404,假設主髏中有一位元組22 HEX (16進位表示法),利用該值22 HEX當作一位址,至一對 應表402中査閲一値代替位元組,茬這傾例子是53 HEX, (請先閲讀背面之注意事填寫本頁) -等 訂_ 線 本紙張尺度適用中國國家標準(CMS ) A4規格(210X297公釐) 83. 3.10,000 -23- A7 B7 經濟部中央標準局員工消費合作社印製 五'發明説明() 如第10圖中元素406所指,在一锢增加的加密步驟中,該 査閲值53 HEX可作為一位址,至一第二對應表408中,査 閲另一侮代替值,在這例子為第10圖中的元素410所指之 值7A HEX,主體中縻始的位元組有一個位元的檢査位元, 且在査閲對應表後,在步驟412中,增加了另一錮檢査位 元,並産生一個加密主體位元組414,請留意在對應表402 中,由00至IF HEX間之值,均映射至相同值,其同樣地適 用於對應表408的第一項目,藉著不改變對應表中低階項 目的映射值,使得該加密方法更難被破解斷定。 如第8B圔中元素204所示,傜為將加密資訊,例如目 錄,記錄在磁帶上的方法,與第8A醒中將訊息240主體244 编碼的方法是很相似的,第8B圓的方法,可用一徹處理器 或電腦中的程式逹成,在第8B函中的情形,一奇/偶位元 ,如第5A圔中元素219 —樣,作為磁帶識別欐位的一部分 儲存,在步驟3QS中,檢査該奇/偶位元決定其為0或1 ,如間上述,當加密傳輸時,該奇/偶位元可選擇為0或 1 ,如果奇/偶位元被設定為0 ,然後步驟308及310中 ,檢査目錄被記錄在磁帶中的月份及年份,決定月份為奇 數月或偶數月,若在步驟308中,月份被認定為奇數月, 則下一步為步驟318 ,而若在步驟308中認定月份為偶數 月,則傳輸的下一步驟為312 ,同樣地,若在步驟310中 ,月份被認定為奇數月,則的下一步為步驟312,而若步 驟.308中認定月份為偶數月,則傳輸的下一步驟為318 , 在步驟312中,根據記錄月份的前二個月,産生一個鍵碼, 請先閲讀背面之注意事〇填寫本頁 -裝=. .ΤΓ, -線 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 83. 3.10,000 -9Λ- A7 B7 經濟部中央標準局員工消费合作社印製 五、發明説明() 該鍵碼亦可為該磁帶識別的凾數,而在步驟318中,根據 記錄月份産生一痼鍵碼,該鍵碼亦可為磁帶識別的函數, 産生的鍵碼將在步騍320及322中選擇對慝表將目錄的位 元組加密,這可以使用第10圔所描述的方式完成,.之後, 在步驟328中,該加密目錄被寫入VBI線中,且記錄該加 密目錄的年月份,如第5A圖的元素220 ,也被寫入TPA封 包中,TPA封包215全部都能以相同的方式進行加密。 根據月份及磁帶識別産生的鍵碼,可用與步驟314及 316相同的方式産生。 當接收到一訊息,一定要作解密處理,第9A圖像依據 本發明,對於置入一視訊節目中傳輸的資訊進行解密之方 法流程圖,第9A圓的方法可經由錄影機中控制通輯線路21 中微處理器而實現達成,第9A圖中的元素328,相當於第 8A圔中的元素32 6 表示一個訊息的加密主體在步驟364 中,檢査包含於訊息326之訊息識別中的奇/偶位元,決 定奇/偶位元為0或1,若奇/偶位元為0 ,那麼在步驟 366中,接箸檢査錄影機的時鐘80,決定錄影機時鐘所示 月份為奇數月或偶數月,若時鐘所示月份為奇數月,則下 一步為步驟374 ,而若時鐘所示月份為偶數月,則下一步 .驟為372 ,若奇/偶位元為1,那麼在步驟368中,若時 鐘所示月份為奇數月,則下一步為步驟3 7 2,而若時鐘所 示月份為偶數月,則下一步驟為374,在步驟37 2中,根 據時鐘80所示月份的前一痼月,産生一値鍵碼,該鍵碼亦 可為該磁帶識別的函數,而在步驟叻4中,根據時鐘80所 (請先閣讀背面之注意事 填寫本頁) -裝· -訂 〇 線· 本紙張尺度適用中國國家標隼(CNS ) A4規格(210X297公釐) 83.3.10,000 A7 B7 經濟部t·央標準局員工消費合作社印裝 五、發明説明() 示月份産生一値鍵碼,該鍵碼同樣亦可為磁帶.識別的函數 ,根據月份及訊息識別産生鍵碼的方式,與上述步驟314 及3 16所示相仿,産生鍵碼之後,將在步驟378中利用一 對慝表査閲一第二鍵碼,然後在步驟380中,使用該第二 鍵碼選擇對應表對各位元組進行解密,在步驟382中,粒 密的對應表,是用來對每一個位元組分別進行解密e 第11圖係依據本發明,將加密主體部分位元组對應成 —解密位元組之方法圔示,如第11圖所示,該加密位元組 420僳當作對應表424的位址,例如,假設位元组420是 .7A HEX,那麼這將被當作一掴位址,而對應表424的輪出 為53 HEX,其在第11圖中以元素426代表,這個對應表424 的輸出將被用在對應表428中,査閲另一锢代替位元組, 在這個例子中,對應表428的輸出是22 HEX,然後在步驟 432中,將被加在對應表428的輸出,完成加密主體位元 組420至解密主體位元组424的對應。 在步驟384中,解密主體位元組會被記錄在錄影磁帶 上,在步驟386中,錄影機時鐘80的年月份值,以及訊息 識別中的奇/偶位元,亦將如第5 A圖所示,記錄在錄影帶 的TPA封包中。 如第9B圖的元素328所示,記錄在錄影帶上的加密目 錄,相當於第8B_元素328,其解密的方法,與第9A圖中 元素326加密主體的解密相似,第9B圖之方法同樣可以一 撤處理器達成,産生鍵碼的不同是因為以步驟376取代步 驟3 74,且步驟3 70取代3 72,在歩驟370中,根據元素 (請先閱讀背面之注意事 填寫本育) .裝 訂 〇 線 本紙張尺度逋用中國國家橾準(CNS ) A4規格(210X297公釐) 83.3.10,000 經濟部中央標準局員工消費合作社印製 A7 __B7__五、發明説明() 328的TPA封包所示月份的前一個月,産生一傾鍵碼,該 鍵碼亦可為該磁帶識別的函數,而在步驟376中,根據元 素328的TPA封包所示月份産生一值鍵碼,該鍵碼冏樣亦 可為磁帶識別的函數,産生鍵碼之後,將在步驟378中利 用該鍵碼再度査閲另一鍵碼,然後在步驟380中,選擇對 瞜表382對各位元組進行解密,其结果僳為一解密目錄388 ,我們現在將提供一値加密及解密的例子。 對於一镝用來傳输的訊息,假設該原姶訊息是f The red fox ran over the fence.』,假設傳输的年月份是 1993年8月,且假若該奇/偶位元設定為奇數,因為該奇 /偶位元為奇數,且傳输之年月份為1993年6月,所以對 於訊息加密的鍵碼將根據19 93年5月,在依照第8圖编碼 後,加密訊息將變成『funsieu31; InfEidpak;auefaue; iaie』,接著錄影機1會接收到這餾加密訊息,若錄影機 時鐘80指示的年月份是19 93年6月,然後錄影機自訊息識 別中讀取奇/偶位元,而認定其為奇數,則鍵碼將會根據 1 993年5月産生,解密訊息會是『The red fox rati over the fence.』,在第二値例子中,假設加密訊息記錄在磁 帶上,又假若錄影機時鐘80所示年月份為1 9 93年12月,若 磁帶上記錄於TPA封包的年月份為1 993年6月,又若在TP A封包中的奇/偶位元為奇數,那麼錄影機1對加密訊息 進行解密時,將會根據19 93年5月産生鍵碼,解密訊息將 會是『The red fox ran over the fence.』〇 在加密之後,該加密資料能夠使用一混頻密碼,將加 (請先閲讀背面之注--t事 Ό#-填寫本頁) .裝。 訂 〇 線· 本紙張尺度適用中國國家標準(CNS ) Λ4規格(210X297公釐) —~~ 83. 3.10,000 -9 7- A7 B7 五、發明説明() 密資料的各位元位置互換,進行混頻處理,該混頻密碼最 好是一個從有藺於在VBI中傅输,或記錄在磁帶VBI中資 料的數字選擇的一組預定數字,例如,在一預錄過的磁帶 中,磁帶識別號碼中,一組預設數目的位元用為密碼,例 如磁帶識別號碼中位元22-28,一橱七位元密碼即可使用 ,磁帶製造商利用這些位元將記錄在磁帶的資料作混頻處 理,在錄影機1中,該磁帶識別號碼214僳自VBI中謓取 ,且該組預定位元被用來對加密資料作解混頻處理,在第 二個例子中,類型資料250.中預定數目的位元,被當作傳 輸資訊的密碼,例如,類型資料250中4锢位元可作為密 碼,發射器使用母帶的製造商或發射器本身可使用這些位 元對資料作混頻,該索引式錄影機1由傳輸的VBI中讀取 類型資料,且擷取該組預定位元作為密碼,然後索引式錄 影機1會使用該密碼對傳輸資料作解混頻。 經濟部中央標準局貝工消費合作社印製 一個混頻及解混頻的例子,是將7傾位元送往資料中 各對的宇母數字字元,且依照該位元為Q或1 ,來決定是 否交換字元,例如,當數位1出現,該對字元互換位置, 而當數位0出現,該對字元不變,舉例來説,對於一掴7 位元序列 ”1011001”,片語『CHRISTIE PARKER HALE』被 混頻處理後,因該7位元序列的第一個位元是1,所以第 一字元對的” C”及” H”交換位置而成” HC”,因為第二値位 元是0,字元對”RI”不變,第三锢位元為1,”ST”變成 ”TS”,第四個位元為1,”IE”變成”EI”,以此類推,而且 每t痼宇元對後,樣式會重複,空白亦當作一痼字元,如 83. 3.10,000 ---------裝,— (請先閱讀背面之注意填寫本頁) 線 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) A7 B7 五、發明説明() 此一來,『CHRISTIE PARKER HALE』變成『HCRITSEI PAREK RHAELj ,藉箸送來同樣的7位元序'列”1011001” ,該字元串能被解混頻。 因為在加密後,該主體部分被混頻,因此在解密前, 首先必須對主髏部分作解混頻處理,在加密之前作混頻也 是可能的,上逑兩種组合均包括在本發明之範圍内。 如上所逑,我們已經描述許多置於視訊節目中傳輸或 記錄在錄影帶上資訊的加密及解密方法。 本發明所描述的實施例,僅為較佳且而用以作為發明 概念說明例證,而本發明之範圍並不受限於這些賁施例, 凡熟悉此項技藝人士,依據本發明之精神所作各種不同的 修正,均應包含在本發明的範醻中。 因此申請人霄試增附申請專利範圍,以期能涵蓋本發 明範圍内任何及全部類似的應用、修正及實施方式。 蠢 (請先閱讀背面之注意事Or填寫本頁 -裝,- 訂 〇 線- 經濟部中央標準局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) S3. 3.10,000 -?Q~< tT 〇 Line · This paper size applies to Chinese National Standard (CNS) A4 (210X297mm) -1 S- 83. 3.10,000 Printed by the Consumers Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs A7 B7 V. Invention Description () Capturing subtitles so that the subtitles can be displayed in text on the video monitor. 0 Other information can also be placed in the VBI line. For example, a program directory can be placed in the VBI line. The program directory can be placed in the VBI line and transmitted. Input, or stored in the VBI line of a cassette tape, and record it on the tape together with the program, the program directory can be used to control the recorder, select the program on the cassette tape, as described above, Please refer to the application serial number 08 / 066,6 6 6 mentioned above. Other information that can be placed in the VBI line includes: Program Index for Specific Channels (CSPG), Program Related Information (PRI), Real-Time Information (II) V00 packets, and TPA packets, we will explain in the following description. For example, a program title can be placed in a VBI line and transmitted with a program recorded on a VCR cassette, and the VBI decoder can retrieve the program title placed in the VBI line, and store the program title and program start The starting position is in the RAH 33 of the directory controller 30, so that the user can select a program from the VCR cassette in the future. As shown in Section 1a, the input of a VBI decoder 6Qa can be coupled to the output of a tuner 61. This tuner is provided in most video recorders to adjust the frequency to the appropriate channel to receive radio waves The tuner 61 僳 receives a television signal through an antenna 63 or an electric television signal source 64. The decoder, the tuner, and the mutual actions of the two are examples of commercial techniques and are used commercially. A VBI subtitle decoder ielecaption 4000 adapter is available from the National Caption Institute in Virginia, and a Teletext decoder is available from Horpak Corporation of Ottawa, Canada. As for the VBI decoder CGD300 (T is available from ITT Semiconductor Corporation ( Please read the note on the back first and fill in this page) Loading tr 〇 Line-This paper size is applicable to China. Standard (CNS) A4 size (210X297 mm) 83. 3.10,000 -16- A7 B7 Central Standard of the Ministry of Economic Affairs Printed by the Consumer Cooperative of the Bureau of the People's Republic of China. 5. Description of the invention () Obtained.-Decoder signal line 65 僳 is coupled to the VCR control line 21 by the decoder, and the VCR control logic line 21 can be stored in RAM 33 Under the control of the internal storage program, the microprocessor 31 issues a command to transmit the decoded data to the directory 33a. For example, suppose that the data in the VBI includes a program title, and then the program will cause the VBI information to be stored in the directory in the form of a program title. In 33a, under the control of the user, the contents of the directory will be displayed in the video monitor 5Qa. The user can use the keyboard 32a to select the program, as mentioned above, described in the application serial number 08 / 066,666. Figure 2 is a diagram of the electromagnetic field, picture structure, and VBI in the interlaced TV scan preview image 100. The first electromagnetic field 102 of the television signal starts at the upper left corner of the screen and is scanned into lines 21,22,... 263, at the bottom of the screen, scan the light beam on the screen. Fold back to the top of the screen with a line. This line in the picture is the vertical blank line 106. In the process of folding back, the screen Shown as blank, however, as the signal still exists, additional information can be transmitted in this vertical blank interval, with at least 20 lines in the VBI, and there may be more VBI lines in the vertical After the white interval, the second electromagnetic field H4 acts on the screen, and the lines 283, 284 ... 525 are inserted between the scanning lines of the first electromagnetic field 102. The first and second electromagnetic fields and the vertical blank interval together form the date surface structure Figure 3 shows the time when the VBI lines 1 to 20 are at 110. As shown in the figure, each VBI line occupies a part of the time period, just like 19 shown in Figure 3, each VBI line can accommodate 2 -4 bytes of information. When a message is placed in the .VBI line, the length of the message usually exceeds f-4 bytes and is distributed (please read the note on the back first and fill out this page) Assembling ·-ordering 〇 The size of this paper is applicable to the Chinese National Standard (CNS) A4 (21 × 297 mm) 83. 3.10,000 A7 printed by the Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs ) In multiple electromagnetic fields and all aspects, the information contained in the VBI line may include; specific channel program index (CSPG), program related information (PRI), real-time information (II), V (M) packets, TPA packets, Or a stack of directories, as shown in the composition of Figure 3. FIG. 4 is a video tape showing an image index stored on a control track to find a system (abbreviated VISS) mark. According to the principle of the present invention, each TPA packet in the VBI line includes a A tape identification number, a program number, and an absolute address, and a directory is also stored in the VBI line. In Figure 4, VISS marks 186, 188, and 190 are placed on the control track 166 at the beginning of the program. This action It is completed when the tape is manufactured or copied from the master tape. In a pre-recorded non-blank tape, the TPA package 176 and directory 178 are stored in advance on the VBI lines 19 and 20 of the tape, respectively. Marked as 167 and 168. As shown in FIG. 5A, each TPA packet 215 includes a tape identification 214, a program number 216, and an absolute address 218. The tape identification is pseudo-identified as an identification number of a currently used video tape, and the entire video tape is The above are the same number, and the program number related to the program number is recorded on the tape adjacent to the TPA. For example, the TPA packet TP3A shown in Figure 4 corresponds to the program number 3, and the absolute address in the TPA packet. The time or distance indication from the beginning of the tape to the recording position of a particular packet on the tape. Because there is a TPA packet on the entire video tape, the absolute address on the video tape has always changed. The TPA packet can also contain one year The month is named 220, and its role will be described below. The entries in each directory are used to store the programs recorded on the videotape (read the notes on the back first. ○ Fill out this page. ○ -Order! I ·-Line _ This paper size applies to China National Standards (CNS) A4 specifications. (210X297 mm) 83. 3.10,000 -1 8- Printed by the Consumer Cooperatives of the Central Bureau of Standards of the Ministry of Economic Affairs A7 ___B7__ V. Description of the invention () Relevant information, for example, as shown in Figure 5B, a catalog may contain Some information about the program: program title 205, program number 206, start address 208, end address 210, and recording speed 212, and additional lanthanum position 204 can be provided to allow expansion space. The TPA package and directory information can cooperate with The VISS mark is used together to directly select the program on the video tape. The directory on the video tape can be selected and stored in the directory 33a and displayed to the user. The user can select the program to watch and use the video tape in the video opportunity. The information in the TPA packet and the information in the directory, select the program, and compare the starting address of each program stored in the Meguro with the absolute address in the TPA packet. Decide whether the video tape should be reversed or reversed, close to the beginning of the selected program with the VISS index mark, then the program can be played by the video recorder, the method of selecting the program on a pre-recorded tape, apply for memo number 25845 / LWT, The filing date is 12/15/93, which is further described in this case. As mentioned in the above case No. 25845 / LWT, TPA packets and VISS marks can be recorded on home video tapes to assist users Select a program on a video tape. In the case of a home video tape, the directory is recorded in RAM 33, not in the VBI line. The types of information that can be transmitted in the VBI line include: Channel-Specific Program Index (CSPG ), Program-related information (PRI), real-time information (II), V (M) packets, TPA packets, or a directory, as shown in the composition 114 in Figure 3. The transmission information format is displayed in the VBI line. In the 6th, the same format can be used for a variety of transmission information in the VBI line: Please read the notes on the back of the specific channel program index and fill in this page) • Binding 〇 The size of the paper is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) 83. 3.10,000 A7 B7 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs V. Invention Description () (CSPG), Program Related Information (PRI), Real-Time Information (II), V (M) Packets , TPA packet and directory, the transmission starts with a message beginning 242, including a start code 24.8, a type code 250 and a message identification 252, the type code represents the type of message, and the message identification is used to identify each message. The message begins with 242 and is followed by a message body 244, which includes the information content of the message. For example, CSPG is the program information of many programs that will be transmitted at a predetermined time on a specific channel. The information of each program includes:. Program title. The length of the program. The date and time of the transmission. The four-letter abbreviation of the station name (such as KGET or KCAL) or the station name. Channel number In addition to the above information, the program index CSPG of the specific frequency channel also includes compression Code number, which represents the channel, time and length. In addition, a brief description of the program can also be included in the program related information (PRI), which can also be regarded as real-time information (II), which is the information transmitted in VBI. , Which is mainly about radio programs that can be ordered by users and received at the same time or at a slightly earlier time. For example, PRI information includes offensive and defensive statistics of players in the broadcast of baseball games, recipes listed in cooking programs, And assign questions and answers after educational programs. The V (M) packet is transmitted in V8I and is used to mark the beginning of a video magazine paragraph or the beginning of a program. '• Install "-(Please read the notes on the back to complete this page first) Order ---- 〇 The size of the paper is applicable to China National Standard (CNS) A4 (210X297 mm) 83. 3.10,000 A7 B7 Printed by the Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs. 5. Description of the Invention () As for TPA packets and catalogs and their use for selecting programs on videotape, they have been described above. Then the message body 244 is the message end 246, which includes a stop code 254 and a sum check 256. Now that the type and format of transmitted information have been described, the teachers will discuss the encryption and decryption methods of information here. The purpose of encrypting information is to protect it from unauthorized access. The message encoding generally placed in the VBI generates a key code according to time and information, and then uses the key code to select one or more key correspondence tables to map a part of the message into an encrypted message. The method is used for transmission of information or information stored in the VBI line of video tapes. VBI is not required in digital tapes because there is an area in digital tapes to store this information. The encryption we describe here And the decryption method can also be applied to the information recorded on the digital magnetic tape. Chapter 8A: The method flow of putting encrypted information into a video program according to the present invention. The method shown in the figure can be formed by a microprocessor or a program in a computer, and one is transmitted. The message shown in Figure 8A is equivalent to the content 240 in Figure S. As shown in the figure, the message includes a start code, type, and message identification to form the beginning of the message. The beginning of the message may be a CSPG, PRI, II, V (H) packet or directory. The end of the cabinet follows the body of the message, including a stop code and a checksum. The body of the message is encrypted and protected in the message. section. Figure 8B shows the catalogue 204 and the TP / Γ packet 215, which represent the record and equipment— (please read and read the note of Φ to fill out this page). 〇 The size of the paper applies to the Chinese National Standard (CNS) A4. Specifications (210X297mm) 83.3.10,000 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs A7 _ B7 _ V. Description of Invention () Information recorded on magnetic tape. First, the encryption of the transmission message body in Fig. 8A will be described, and then any modification made to the encryption information recorded in magnetic tape in Fig. 8B will also be described. In step 30S, the odd / even bit identified by the message is checked to determine whether the bit is 1 or 0. As shown in FIG. 6, the message identification includes an odd / even bit. If it is 0, the month is an odd month, and if the odd / even bit is 1, the month is an even month. The odd / even bit will be described in Figure 7 again, as shown in the? The odd / even bit shown in 圔 will maintain its value for two months. For example, the odd / even bit may be 0 between May and June, and its odd / even bit may be between May and June. The reason why the element is 0 is that the period of these two divisive months begins in May, and the number "5" is an odd number. In Figure 7 the odd / even bit 2S0 is 1 between June and July. Here, In this case, the odd / even bit is 1, because the representative number "6" of the beginning month of June is even, so the value of the odd / even bit is based on the odd month or the beginning month in the two-month period. Even numbers to decide. The reason for having a bit of odd / even bits is that if the transmission time is close to the transfer time in May and June, the transmitter may believe that the transmission is in May, however, for example, the receiver of a video recorder may Based on its internal clock, it is considered to be June. In this case, if the recorder clock indicates September 1993 and the odd / even bit is a, then the recorder knows that the transmitter is identified as In May, because the odd / even bit has been set to Q, but if the odd / even bit is 1, the recorder knows that the transmitter transmitted information in June. · Installation-(Please read the notes on the back page and fill in this page) Order 〇-line paper size applicable to China National Standard (CNS) A4 specification (210X297 mm) 83.3.10,000 Off-line Consumer Cooperatives, Central Standards Bureau, Ministry of Economic Affairs Print A7 __B7_ 5. Explanation of the invention () So in step 306, the first step is to check the odd / even bit to determine whether it is 0 or 1. Note that when transmitting, the odd / even bit may be The transmitter is set to 0 or 1. If the odd / even bit is set to 0, that is, the transmission month is odd in step 308, the next step of transmission is step 3U. On the other hand, assume step 308 The result of the test is that the transmission month is an even number, and the next step of transmission is 314. In step 316, a value key code is generated according to the year and month of transmission and the message identification, and in step 314, according to the transmission The previous month of the year and month when the time was lost, and the message identification, a key code was generated. For example, if the odd / even bit is set to 0, it means that the odd-numbered months are transmitted, and the transmission time is assumed to be June 1993 , Then as shown in step 314, according to May 1393 Keycode. There are many ways to generate the key code according to the transmission year and month. For example, the month can be added or subtracted from the year, or the year and month can be added to the message identification, and calculated by a remainder module 32. Once the key code is generated, in step 32Q, the key code is used to look up a second key code in a pair of learning tables, and then in step 322, the second key code is used to select a pair of correspondence tables. In step 324, the tuples in the message body are encrypted. Once the encryption is completed, in step 3-26, the start code, type, message identification, encrypted body, stop code, and sum check will be connected in series. Together, they form an encrypted message for transmission. Figure 1Q 圔 illustrates the way to encrypt the bytes of the message body. For example, element 404 shown in Figure 10, assuming that there is a byte 22 HEX (hexadecimal notation) in the main skeleton, use the value 22 HEX As a single address, go to a correspondence table 402 to look up a replacement byte. This example is 53 HEX, (please read the note on the back first and fill in this page)-etc. National Standard (CMS) A4 specification (210X297 mm) 83. 3.10,000 -23- A7 B7 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs of the People's Republic of China (5) Invention Description () As indicated by element 406 in Figure 10,锢 In the added encryption step, the lookup value of 53 HEX can be used as a single bit address, and a second correspondence table 408 is used to look up another substitute value. In this example, the value 7A indicated by element 410 in FIG. 10 HEX, the first byte in the body has a check bit, and after consulting the correspondence table, in step 412, another check bit is added and an encrypted subject byte 414 is generated, Please note that in the corresponding table 402, the values from 00 to IF HEX are all mapped to the same value. Plots suitable for a first item correspondence table 408, through the object without changing the low-order terms in the mapping table corresponding to the value, so that the judged encryption harder to crack. As shown by element 204 in 8B 圔, 傜 is a method of recording encrypted information, such as a directory, on a magnetic tape, which is very similar to the method of encoding message 240 body 244 in wake-up 8A, and the method of circle 8B It can be created by a processor or a program in the computer. In the case of Function 8B, an odd / even bit, such as element 219 in 5A, is stored as part of the tape identification bit. In step 3QS Check that the odd / even bit determines whether it is 0 or 1. As mentioned above, when encrypted transmission, the odd / even bit can be selected as 0 or 1. If the odd / even bit is set to 0, then In steps 308 and 310, check the month and year of the directory recorded on the tape, and determine whether the month is an odd or even month. If the month is considered to be an odd month in step 308, the next step is step 318, and if If the month is determined to be an even month in step 308, the next step of transmission is 312. Similarly, if the month is identified as an odd month in step 310, the next step is step 312, and if the month is identified in step .308 Is an even number of months, the next step of the transmission is 318, in step 3 In the 12th, a key code is generated according to the first two months of the recorded month. Please read the notes on the back first. Fill out this page-equipment =. .ΤΓ,-the size of the paper is applicable to the Chinese National Standard (CNS) A4 specifications ( (210X297 mm) 83. 3.10,000 -9Λ- A7 B7 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention () The key code can also be the number of identifications of the tape, and in step 318, according to A key code is generated for the recording month. This key code can also be a function of tape identification. The generated key code will be selected in steps 320 and 322 to encrypt the bytes of the table. This can be done using the 10th protocol. The described method is completed. After that, in step 328, the encrypted directory is written into the VBI line, and the year and month of the encrypted directory, such as element 220 in FIG. 5A, are also written into the TPA packet and the TPA packet. 215 can all be encrypted in the same way. The key code generated based on the month and tape identification can be generated in the same way as steps 314 and 316. When a message is received, it must be decrypted. The 9A image is a flowchart of the method for decrypting the information transmitted in a video program according to the present invention. The 9A circle method can be controlled by the video recorder. This is achieved by the microprocessor in line 21. Element 328 in Figure 9A is equivalent to element 32 6 in Figure 8A 圔, which represents the encrypted body of a message. In step 364, check the message identifier contained in the message identification of message 326. / Even bit, determine whether the odd / even bit is 0 or 1. If the odd / even bit is 0, then in step 366, check the clock 80 of the recorder, and determine that the month shown by the recorder clock is an odd month. Or even month, if the month shown by the clock is an odd month, the next step is step 374, and if the month shown by the clock is an even month, the next step is step 372. If the odd / even bit is 1, then in step In 368, if the month shown by the clock is an odd month, the next step is step 3 7 2; if the month shown by the clock is an even month, the next step is 374. In step 372, according to the month shown by the clock 80 The previous month, a key code is generated, and the key code is also Can be a function of the identification of the tape, and in step 4 according to the clock 80 (please read the notice on the back to fill out this page)-installed ·-order 0 line · This paper size applies Chinese national standard (CNS ) A4 specification (210X297 mm) 83.3.10,000 A7 B7 Printed by t. Central Standards Bureau of the Ministry of Economic Affairs, Employee Consumer Cooperatives. 5. Description of invention () A key code is generated for the month, and the key code can also be a magnetic tape. The function, according to the method of generating the key code according to the month and the message identification, is similar to that shown in steps 314 and 3 16 above. After the key code is generated, a pair of watch tables is used to check a second key code in step 378, and then in step 380 In step 382, the second key code selection correspondence table is used to decrypt each byte. In step 382, the granular dense correspondence table is used to decrypt each byte separately. Fig. 11 is in accordance with the present invention. Corresponds to the method of decrypting the bytes of the encrypted main body into a decryption byte. As shown in FIG. 11, the encrypted byte 420 is used as the address of the correspondence table 424. For example, suppose that the byte 420 is .7A HEX, then this will be treated as an address And the rotation of the correspondence table 424 is 53 HEX, which is represented by the element 426 in Figure 11. The output of this correspondence table 424 will be used in the correspondence table 428. Refer to another 锢 instead of a byte. In this example, The output of the correspondence table 428 is 22 HEX, and then in step 432, it is added to the output of the correspondence table 428 to complete the correspondence between the encrypted subject byte 420 to the decrypted subject byte 424. In step 384, the decrypted subject bytes will be recorded on the video tape. In step 386, the year and month values of the video camera clock 80 and the odd / even bits in the message identification will also be as shown in Figure 5A. As shown, recorded in a TPA packet on the videotape. As shown by element 328 in FIG. 9B, the encrypted directory recorded on the video tape is equivalent to 8B_element 328. The decryption method is similar to the decryption of the encrypted subject in element 326 in FIG. 9A, and the method in FIG. 9B The same can be achieved by removing the processor. The difference in the key code is because step 376 replaces step 3 74 and step 3 70 replaces 3 72. In step 370, according to the element (please read the notes on the back to fill in this education first) ). The size of bound paper is in Chinese standard (CNS) A4 format (210X297 mm) 83.3.10,000 Printed by A7 __B7__ of the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs. One month before the month shown, a tilt key code is generated, which can also be a function of the tape identification. In step 376, a value key code is generated according to the month shown in the TPA packet of element 328. The key code For example, it can also be a function of tape identification. After generating a key code, the key code will be used to check another key code in step 378, and then in step 380, the table 382 is selected to decrypt each tuple. The result is one Decrypt directory 388. We will now provide a sample of encryption and decryption. For a message to be transmitted, it is assumed that the original message is f The red fox ran over the fence. "It is assumed that the year and month of transmission is August 1993, and if the odd / even bit is set to an odd number Because the odd / even bits are odd and the year and month of transmission are June 1993, the key code for message encryption will be based on May 19, 1993. After encoding according to Figure 8, the encrypted message will be Becomes "funsieu31; InfEidpak; auefaue; iaie", then the recorder 1 will receive this encrypted message. If the year and month indicated by the recorder clock 80 is June 19, 1993, then the recorder reads the odd / Even bits are considered as odd, and the key code will be generated according to May 1 993. The decrypted message will be "The red fox rati over the fence." In the second example, it is assumed that the encrypted message is recorded in On the tape, if the year and month shown in the recorder clock 80 is December 1993, if the year and month recorded on the tape in the TPA packet is June 993, and if the odd / even bit in the TPA packet is Yuan is an odd number, then when recorder 1 decrypts the encrypted message, it will be based on 19 93 A key code is generated in May, and the decrypted message will be "The red fox ran over the fence." 〇 After encryption, the encrypted data can use a mixing password, which will be added (please read the note on the back-t matterΌ # -Fill this page). Order 〇 · This paper size applies Chinese National Standard (CNS) Λ4 specification (210X297 mm) — ~ 83. 3.10,000 -9 7- A7 B7 V. Description of the invention () The position of each element of the confidential data is exchanged for Mixing processing. The mixing password is preferably a predetermined set of numbers selected from the numbers that are good at inputting in the VBI or recorded in the tape VBI. For example, in a pre-recorded tape, the tape In the identification number, a preset number of bits is used as a password, for example, bits 22-28 in the tape identification number, a seven-digit password can be used. The tape manufacturer uses these bits to record the data recorded on the tape. For mixing processing, in VCR 1, the tape identification number 214 is taken from the VBI, and the set of predetermined bits is used to demix the encrypted data. In the second example, the type data A predetermined number of bits in 250. is used as a password for transmitting information. For example, 4 锢 bits in type 250 can be used as a password. The manufacturer of the transmitter uses the master tape or the transmitter itself can use these bits to pair the data. For mixing, the index recording 1 reads the VBI data type of the transmission and retrieve the set of predetermined bits as the password, and then indexed recorder video player 1 uses the transmitted password information for mixing solutions. An example of mixing and de-mixing is printed by the Central Standards Bureau Shellfish Consumer Cooperative of the Ministry of Economic Affairs. The 7-bit bit is sent to each pair of the mother and child digital characters in the data, and the bit is Q or 1 according to the bit. To decide whether to exchange characters, for example, when digit 1 appears, the pair of characters swap positions, and when digit 0 appears, the pair of characters does not change, for example, for a 7-bit sequence "1011001", After the phrase "CHRISTIE PARKER HALE" is mixed, since the first bit of the 7-bit sequence is 1, the "C" and "H" of the first character pair are swapped to form "HC" because The second bit is 0, the character pair "RI" is unchanged, the third bit is 1, "ST" becomes "TS", the fourth bit is 1, and "IE" becomes "EI". And so on, and every t 痼 yuyuan pairs, the style will repeat, the blank is also regarded as a character, such as 83. 3.10,000 --------- install,-(Please read the note on the back first (Fill in this page) The size of the paper is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) A7 B7 V. Description of the invention () In this way, "CHRISTIE PARKER "HALE" becomes "HCRITSEI PAREK RHAELj", and the same 7-bit sequence 'column "1011001" is sent, and the character string can be demixed. Because the main part is mixed after being encrypted, before the decryption, the main cross section must be de-mixed. It is also possible to perform mixing before the encryption. Both combinations of the above are included in the present invention. Within range. As noted above, we have described a number of methods for encrypting and decrypting information that is placed in a video program or transmitted on a videotape. The embodiments described in the present invention are only preferred and are used as illustrations of the concept of the invention, and the scope of the present invention is not limited to these embodiments. Those skilled in the art will make according to the spirit of the present invention. Various modifications should be included in the scope of the present invention. Therefore, the applicant has added the scope of patent application in order to cover any and all similar applications, amendments and implementations within the scope of the present invention. Stupid (please read the notes on the back or fill in the page first, install,-order 0 line-printed by the staff consumer cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs, this paper is printed in accordance with the Chinese National Standard (CNS) A4 specification (210X297 mm) S3. 3.10,000-? Q ~

Claims (1)

A8 58 C8 D8 树年11月〒 須讀委員明示π年U^H5'^提之 經濟部中央操準局男工消費合作社_製 修&本有無變更貧質内容是否准予修10 七、申請專利範圍 第83104753號申請案申請專利範圍修正本 8S.11.29. 1. 一種對記錄資訊加密的方法,該資訊具有一開頭部分 及一主髏部分,該加密方法包含有下列步驟: 自一時鐘讀取目前月份,該時鐘的輸出為時間的 函數; 若自該時鐘讀取的目前月份為一奇數月,則將在 該開頭部分之一奇數/偶數月份指示設定成奇數月’ 否則,若自該時鐘讀取的目前月份為一厲數月,則將 在該開頭部分之一奇數/偶數月份指示設定成厲數; 若該奇數/偶數月份指示為奇數且自該時鐘謓取 的目前月份為奇數或者,若該奇數/偶數月份指示為 偶數且自該時鐘讀取的目前月份為禺數則産生一以自 該時鐘謓取之目前月份為基準的第一鍵碼,苔則若該 奇數/偶數月份指示為奇數且自該時鐘讀取的目前月 份為偶數或者,若該奇數/偶數月份指示為偶數且自 該時鐘讀取的目前月份為奇數則産生一以苜該時鐘讀 取之目前月份的前一月份為基準的第一鍵碼; 使用該第一鍵碼對該主體部分進行加密俥産生一 加密的主髏部分;以及 將該加密主髏部分及該開頭部分插置於一視訊節 目中俥形成一混合視頻訊號。 2. 如申請專利範圍第1項所述之方法,其更包含之步驟 為傳輸該具有被插置的加密主髏部分及開頭部分。 3. 如申請專利範圍第1項所述之方法,其更包含之步驟 -30 - (請先閲讀背面之注意事項再填寫本頁) ---^訂 1— I -1 —<1·» f 'In nn tmfn (m n 0 本紙張尺度逋用中國國家標準(CNS ) A4規格(210χ297公釐) A8 58 C8 D8 树年11月〒 須讀委員明示π年U^H5'^提之 經濟部中央操準局男工消費合作社_製 修&本有無變更貧質内容是否准予修10 七、申請專利範圍 第83104753號申請案申請專利範圍修正本 8S.11.29. 1. 一種對記錄資訊加密的方法,該資訊具有一開頭部分 及一主髏部分,該加密方法包含有下列步驟: 自一時鐘讀取目前月份,該時鐘的輸出為時間的 函數; 若自該時鐘讀取的目前月份為一奇數月,則將在 該開頭部分之一奇數/偶數月份指示設定成奇數月’ 否則,若自該時鐘讀取的目前月份為一厲數月,則將 在該開頭部分之一奇數/偶數月份指示設定成厲數; 若該奇數/偶數月份指示為奇數且自該時鐘謓取 的目前月份為奇數或者,若該奇數/偶數月份指示為 偶數且自該時鐘讀取的目前月份為禺數則産生一以自 該時鐘謓取之目前月份為基準的第一鍵碼,苔則若該 奇數/偶數月份指示為奇數且自該時鐘讀取的目前月 份為偶數或者,若該奇數/偶數月份指示為偶數且自 該時鐘讀取的目前月份為奇數則産生一以苜該時鐘讀 取之目前月份的前一月份為基準的第一鍵碼; 使用該第一鍵碼對該主體部分進行加密俥産生一 加密的主髏部分;以及 將該加密主髏部分及該開頭部分插置於一視訊節 目中俥形成一混合視頻訊號。 2. 如申請專利範圍第1項所述之方法,其更包含之步驟 為傳輸該具有被插置的加密主髏部分及開頭部分。 3. 如申請專利範圍第1項所述之方法,其更包含之步驟 -30 - (請先閲讀背面之注意事項再填寫本頁) ---^訂 1— I -1 —<1·» f 'In nn tmfn (m n 0 本紙張尺度逋用中國國家標準(CNS ) A4規格(210χ297公釐) ABCD 經濟部中夬標準局男工消費合作社印製 六、申請專利範圍 為記錄該具有被插置的加密主體部分及開頭部分的混 合視頻訊號。 4.如申請專利範圍第i項所述之方法,其更包含之步驟 為使用該混頻密碼將該加密主體部分作混頻處理。 5 .如申請專利範圍第4項所述之方法,其中使用該混頻 密碼將該加密主髏部分作混頻處理的步驟包含有: 指定該混頻密碼之各位元至該加密主體部分内的 數値字元對; 若指定位元為第一類型,則交換該字元對,否則 ,若指定字元為第二類型,則不交換該字元對,‘以及 重複該加密主體部分之所有字元對的該等交換或 不交換步驟。 6. 如申請專利範圍第1項所述之方法,其中將該加密主 體部分及該開頭部分插置於一視訊節目中俥形成一混 合視頻訊號的步驟包含之步驟為對該加密主體部分及 開頭部分编碼成視頻訊號的垂直空白區間。 7. 如申請專利範圍第1項所述之方法,其中該使用該第 —鍵碼對該主體部分進行加密俾産生一加密的主Η部 分的步驟包含有: 使用該第一鍵碼選擇一對應表; 使用該第一對應表,將主體部分的每一單位,對 應出一値第一加密單位;及 將每一第一加密單位連結,構成一加密主體部分。 本紙張尺度適用中國國家標準(CNS )八4規格(21〇><297公釐) Γ—1 I 1 -1 in I I ·ϋ n --"In HI in n (請先閣讀背面之注意事項再填寫本頁) 六 、申請專利範圍 A8 B8 C8 D8 經濟部中央標準局貝工消費合作社印$» 8. 如申請專利範圍第7項所述之方法,其中使用該第一 對應表,將加密主體部分每一單位對應至一第一加密 單位的步驟包含有: 使用該第一鍵碼選擇一第二對應表;及 使用該第二對應表,將毎一値第一加密單位對應 産生一第二加密單位。 9. 如申請專利範圍第丨項所述之方法,其中該産生一第 —鍵碼的步驟包含有執行一査表的步驟。 10. —種對混合視頻訊號解密的方法,該混合視頻訊號具 有一插置的開頭部分及一加密主髏部分,該方法包含 的步驟有: 自一時鐘讀取一目前月份,該時鐘的輸出為時間 的函數; 自該主體部分抽出一奇數/偶數月份指示; 若該奇數/偶數月份指示為奇數且自該時鐘讀取 的目前月份為奇數或者 > 若該奇數/偶數月份指示為 偶數且自該時鐘讀取的目前月份為偶數則産生一以自 該時鐘讀取之目前月份為基準的第一鍵碼,否則若該 奇數/偶數月份指示為奇數且自該時鐘謓取的目前月 份為偶數或者,若該奇數/偶數月份指示為偶數且自 該時鐘讀取的目前月份為奇數則産生一以自該時鐘讀 取之目前月份的前一月份為基準的第一鍵碼; 使甩該第一鍵碼對該加密主體部分進行解密,産 生一解密主體部分。 -32 - 本紙張尺渡逋用中國國家標準(CNS ) A4規格(210X297公釐) (請先聞積背面之注意事項再填寫本頁) r A8 B8 C8 D8 穴、申請專利範圍 11.如申請專利範圍第1 〇項所述之方法,其更包含記錄該 解密主體部分及該開頭部分於一錄影磁帶上。 12 .如申請專利範圍第10項所述之方法,其更包含之步驟 為使用該混頻密碼對該加密主體部分作解混頻處理。 13. 如申請專利範圍第12項所述之方法,其中使用該混頻 密碼對該加密主體部分進行解混頻處理的步驟包含有 指定該混頻密碼之各位元至該加密主體部分内的 數値字元對; a 若指定位元為第一類型,則交換該字元對,否則 ’若指定字元為第二類型,則不交換該字元對;以及 重複該加密主體部分之所有字元對的該等交換或 不交換步驟。 14. 如申請專利範圍第10項所述之方法,其更包含對垂直 空白區間解碼俾對來自該混合視頻訊號之插置的開頭 部分及加密主髏部分解碼。 經濟部中夬標準局貝工消費合作社印袈 (請先閱讀背面之注意事項再填寫本頁) 15 .如申請專利範圍第1〇項所述之方法,其中使用該第一 鍵碼對該加密主獲部分進行解密俾産生一解密主髏部 分的步驟包含有: 使用該第一鍵碼選擇一對應表; 使用該第一對應表|將加密主髏部分的每一單位 ,對應出一個第一解密單位;及 將每一第一解密單位連結,構成一解密主體部分。 -33 - 本紙張適用中國國家標準(CNS ) A4規格(210X297公釐) A8 B8 C8 D8 申請專利範圍 ie·如申請專利範圍第15項所述之方法,其中該使用該第 一對應表,將加密主體部分的每一單位,對應出一個 _—解密單位的步驟包含有: 使用該第一鍵碼選擇一第二對應表;及 使用該第二對應表,將每一値第一解密單位對應 産生一第二解密單位。 H如申請專利範圍第10項所述之方法,其中該産生一第 一*鍵碼的步驟包含有執41* 一'查表的步驟。 18·$□申請專利範圍第10項所述之方法,其更包含接收來 自一傳輸的倍號之混合視頻訊號的步驟。 19.如申請專利範圍第10項所述之方法,其更包含接收來 自一記錄的信號之混合視頻訊號的步驟。 (請先聞讀背面之注$項再填寫本頁) --- 經濟部中央標準局員工消費合作社印裝 Λ fm am— In vi^n · 34 - 本紙張尺度適用t國國家標準(CNS ) M規格(210χ297公釐)A8 58 C8 D8 November of the year of the tree 〒 The members must read clearly π year U ^ H5 '^ Mentioned by the Central Bureau of the Ministry of Economic Affairs Men's Workers Consumer Cooperatives _ repair & whether there are changes to the poor content is allowed to repair 10 VII. Application Patent Range No. 83104753 Application Patent Range Amendment 8S.11.29. 1. A method for encrypting recorded information, the information has a beginning part and a main cross section, the encryption method includes the following steps: read from a clock Take the current month, the output of this clock is a function of time; if the current month read from this clock is an odd month, set one of the odd / even month indications in the beginning to an odd month '; otherwise, if from The current month read by the clock is a few months, then one of the odd / even month indications in the opening part is set to a strong number; if the odd / even month indication is odd and the current month taken from the clock is odd Alternatively, if the odd / even month indicates an even number and the current month read from the clock is a 禺 number, a first key code based on the current month taken from the clock is generated, and Moss if Odd / even months are indicated as odd and the current month read from the clock is even or, if the odd / even months are indicated as even and the current month read from the clock is odd, a clock read from the clock is generated. A first key code based on the previous month of the current month; using the first key code to encrypt the body part to generate an encrypted main skull part; and inserting the encrypted main skull part and the beginning part in a A mixed video signal is formed in the video program. 2. The method described in item 1 of the scope of patent application, further comprising the step of transmitting the encrypted main cross section and the beginning section with the interpolated encrypted main cross section. 3. The method described in item 1 of the scope of patent application, which further includes steps -30-(Please read the precautions on the back before filling this page) --- ^ Order 1— I -1 — < 1 · »F 'In nn tmfn (mn 0 Chinese paper standard (CNS) A4 size (210 x 297 mm) for this paper size) A8 58 C8 D8 November of the year of the tree Men ’s Workers ’Cooperatives of the Ministry of Internal Affairs and Communications of the Ministry of Commerce _ Manufacturing & Amendments Are there any changes to the poor content that are allowed to repair? 10 VII. Application for Patent Scope No. 83104753 Application for Patent Scope Amendment 8S.11.29. Method, the information has a beginning part and a main skull part, the encryption method includes the following steps: read the current month from a clock, the output of the clock is a function of time; if the current month read from the clock is An odd month, then set one of the odd / even month indications in the beginning to be an odd month '; otherwise, if the current month read from the clock is a few months, one of the odd / even will be in the beginning The month indication is set to a strong number; if An odd / even month is indicated as an odd number and the current month taken from the clock is odd or, if the odd / even month is indicated as an even number and the current month read from the clock is an odd number, one is generated to be taken from the clock The first key code based on the current month, Moss if the odd / even month is indicated as odd and the current month read from the clock is even or if the odd / even month is indicated as even and read from the clock If the current month is an odd number, a first key code is generated based on the previous month of the current month read by the alfalfa clock; using the first key code to encrypt the main part and generating an encrypted main cross section; And inserting the encrypted main skull part and the beginning part into a video program to form a mixed video signal. 2. The method described in item 1 of the scope of patent application, which further comprises the step of transmitting the inserted video The main part of the encryption and the beginning part of the encryption. 3. The method described in item 1 of the scope of patent application, which further includes steps -30-(Please read the precautions on the back before filling this page) --- ^ Order 1— I -1 — < 1 · »f 'In nn tmfn (mn 0 This paper is in Chinese National Standard (CNS) A4 size (210 × 297 mm). Printed by Industrial and Consumer Cooperatives 6. The scope of the patent application is to record the mixed video signal with the encrypted main body part and the beginning part inserted. 4. The method described in item i of the scope of patent application, which further includes the step of using The mixing password performs mixing processing on the encrypted main part. 5. The method as described in item 4 of the scope of patent application, wherein the step of using the mixing password to perform mixing processing on the encrypted main cross section includes: specifying Each bit of the mixed password to the numeric character pair in the encrypted body part; if the specified bit is the first type, the character pair is exchanged; otherwise, if the specified character is the second type, the character pair is not exchanged The character pair, 'and these exchange or non-exchange steps that repeat all the character pairs of the encrypted body part. 6. The method according to item 1 of the scope of patent application, wherein the step of inserting the encrypted main part and the beginning part into a video program to form a mixed video signal includes the steps of the encrypted main part and the beginning part. Partially encoded into the vertical blank space of the video signal. 7. The method according to item 1 of the scope of patent application, wherein the step of encrypting the main body portion using the first key code to generate an encrypted main body portion includes: using the first key code to select a corresponding A table; using the first correspondence table, each unit of the body part corresponds to a stack of first encryption units; and each first encryption unit is linked to form an encrypted body part. This paper size is in accordance with Chinese National Standard (CNS) 8-4 specification (21〇 > < 297mm) Γ-1 I 1 -1 in II · ϋ n-" In HI in n (Please read the back of the cabinet first) Please pay attention to this page before filling in this page.) 6. Scope of patent application A8 B8 C8 D8 Printed by the Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs $ »8. The method described in item 7 of the scope of patent application, where the first correspondence table is used The steps of corresponding each unit of the encrypted body part to a first encryption unit include: using the first key code to select a second correspondence table; and using the second correspondence table, corresponding to the first encryption unit Generate a second encryption unit. 9. The method according to item 丨 of the patent application scope, wherein the step of generating a first key code includes a step of performing a table lookup. 10. A method for decrypting a hybrid video signal, the hybrid video signal having an interpolated beginning portion and an encrypted main cross section, the method includes the steps of: reading a current month from a clock, and outputting the clock Is a function of time; draw an odd / even month indication from the main part; if the odd / even month indication is odd and the current month read from the clock is odd or > if the odd / even month indication is even and If the current month read from the clock is an even number, a first key code is generated based on the current month read from the clock. Otherwise, if the odd / even month indicates an odd number and the current month taken from the clock is Or even if the odd / even month indicates an even number and the current month read from the clock is an odd number, a first key code based on the previous month of the current month read from the clock is generated; The first key code decrypts the encrypted body part to generate a decrypted body part. -32-This paper uses Chinese National Standard (CNS) A4 size (210X297mm) for this ruler (please read the notes on the back of the product before filling out this page) r A8 B8 C8 D8 points, scope of patent application 11. If you apply The method described in item 10 of the patent scope further includes recording the decrypted main part and the beginning part on a video tape. 12. The method according to item 10 of the scope of patent application, further comprising the step of using the mixing password to demix the encrypted main body. 13. The method according to item 12 of the scope of patent application, wherein the step of demixing the encrypted main body portion using the mixing password includes specifying a number of bits of the mixing password to the number in the encrypted body portion.値 character pairs; a if the specified bit is of the first type, the character pair is exchanged, otherwise 'if the specified character is of the second type, the character pair is not exchanged; and all words in the encrypted body part are repeated These exchange or non-exchange steps of the meta-pair. 14. The method as described in item 10 of the scope of patent application, further comprising decoding the vertical blank interval, decoding the beginning portion of the intermixed video signal and the encrypted main cross section. Printed by the China Standards Bureau of the Ministry of Economic Affairs of the Shellfish Consumer Cooperative (please read the notes on the back before filling out this page) 15. The method described in item 10 of the scope of patent application, where the first key code is used to encrypt the The main part is decrypted, and the steps to generate a main skeleton part are decrypted: using the first key code to select a correspondence table; using the first correspondence table | each unit of the main skeleton part is encrypted to correspond to a first A decryption unit; and linking each first decryption unit to form a decryption body part. -33-This paper applies the Chinese National Standard (CNS) A4 specification (210X297 mm) A8 B8 C8 D8 Patent application scope ie · The method described in item 15 of the patent application scope, where the first correspondence table is used, Each unit of the encrypted body part corresponds to a _-decryption unit. The steps include: using the first key code to select a second correspondence table; and using the second correspondence table to correspond to each first decryption unit. Generate a second decryption unit. The method as described in item 10 of the scope of patent application, wherein the step of generating a first * key code includes a step of performing a 41 * one's look-up table. 18. The method described in item 10 of the patent application scope further includes the step of receiving a mixed video signal from a transmission multiple. 19. The method of claim 10, further comprising the step of receiving a mixed video signal from a recorded signal. (Please read the note $ on the back before filling this page) --- Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs Λ fm am— In vi ^ n · 34-This paper standard is applicable to National Standards of China (CNS) M size (210 × 297 mm)
TW83104753A 1994-01-18 1994-05-25 Method for encrypting and embedding information in a video program TW398148B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08/183,602 US5581614A (en) 1991-08-19 1994-01-18 Method for encrypting and embedding information in a video program

Publications (1)

Publication Number Publication Date
TW398148B true TW398148B (en) 2000-07-11

Family

ID=22673523

Family Applications (1)

Application Number Title Priority Date Filing Date
TW83104753A TW398148B (en) 1994-01-18 1994-05-25 Method for encrypting and embedding information in a video program

Country Status (1)

Country Link
TW (1) TW398148B (en)

Similar Documents

Publication Publication Date Title
US5581614A (en) Method for encrypting and embedding information in a video program
JP3812681B2 (en) Apparatus and method for downloading recorder programming data in a video signal
TW385618B (en) Data transmission device, reception device and transmission/ reception system
US5907656A (en) Apparatus and method for reproducing video signals with varying-magnitude AGC signals
JP4494530B2 (en) Packetized data format for digital data recording media.
JP4646151B2 (en) Method for decoding a packetized data stream representing a program
JP2708312B2 (en) Recording device and playback device
EP0610864B1 (en) A digital recording apparatus recording teletext signals without decoding
JP3297743B2 (en) Magnetic recording / reproducing device
EP0961504B1 (en) Method and apparatus for the recording of video and/or audio signals
ES2225281T3 (en) ADAPTABLE SYSTEM FOR INFORMATION PROCESSING FOR VIDEO IMAGES.
TW398148B (en) Method for encrypting and embedding information in a video program
US20050010959A1 (en) Digital broadcast receiving apparatus and control method therefor
JP3321959B2 (en) Teletext signal recording or recording / reproducing device, or magnetic recording or recording / reproducing device
JP3453862B2 (en) Recording medium cassette and recording / reproducing apparatus having recording medium cassette
KR100310789B1 (en) Still frame video in index
JP3786123B2 (en) Recording media cassette
JP2000069425A (en) Recording and reproducing device for digital information
AU773945B2 (en) Still frame video in index
CN1917615B (en) Screen display insert
JP3675470B2 (en) Recording media cassette
JPH11215446A (en) Display method for television program information and control method for recording equipment
JPH07303239A (en) Picture voice signal recording/reproducing device and picture voice signal recording device

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent