TW406249B - Copy protection by ticket encryption - Google Patents

Copy protection by ticket encryption Download PDF

Info

Publication number
TW406249B
TW406249B TW088113007A TW88113007A TW406249B TW 406249 B TW406249 B TW 406249B TW 088113007 A TW088113007 A TW 088113007A TW 88113007 A TW88113007 A TW 88113007A TW 406249 B TW406249 B TW 406249B
Authority
TW
Taiwan
Prior art keywords
ticket
ticket card
receiver
key
patent application
Prior art date
Application number
TW088113007A
Other languages
Chinese (zh)
Inventor
Michael A Epstein
Original Assignee
Koninkl Philips Electronics Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninkl Philips Electronics Nv filed Critical Koninkl Philips Electronics Nv
Application granted granted Critical
Publication of TW406249B publication Critical patent/TW406249B/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • G11B20/00898Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm based on a hash function
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00224Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a remote server
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00557Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein further management data is encrypted, e.g. sector headers, TOC or the lead-in or lead-out areas
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00753Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00811Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein said number is encoded as a cryptographic token or ticket
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91328Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy management signal, e.g. a copy generation management signal [CGMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91335Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark

Abstract

An encryption scheme is provided between a device that communicates material content and the intended receiver of this content. The encryption is applied to a ticket that conveys copy and display rights. To allow for the portability of devices, the encryption scheme in a preferred embodiment is dynamic. At any point in time, the channel between the providing device and the receiving device is configured for the exclusive use of these two devices; thereafter, the channel may be configured for the exclusive use of another set of devices. To prevent the use of non-conforming devices within the system, conforming devices contain verifiable certificates of authenticity, and channels are established when each device on the channel verifies the other device's authenticity.

Description

406249 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(1 ) 本發明關於娛樂系統領域,及特指版權資訊之複製防止。 數位記錄具有特有特性以複製具有如同原有者相同品質 的記錄資訊。因此,需要一有效複製防止系統以保護數位 記錄的智產權資訊。一複製防止的低成本方法已在1997年 7月菲利普電子響應以要求資料隱藏副群組複製防止技術 工作群组的珍-寶蘭納等之作品中討論,此已在此結合予 以參考。該蘭納設計操作係經由附著一"票卡"至記錄資訊 ;該票卡包含一能證實的"計數"在播放和記錄程序的每一 步驟減少,及減少計數上困難。一種計數上困難是需要一 相對於所需投入時間而獲致之增益較爲過多時間以完成。 該蘭納系統使用一散列法功能以提供從一種子値提供一散 列値,在該一方法下其有計數上困難在該散列値下決定該 種子値。 圖1展示該蘭納票卡系統,播放器11〇及記錄器12〇的多 種實例則被使用以説明使則目同或另—播放器nG及記錄 器 no 與不同輸入 101、102、lu、112、122、132。__記錄 保獲,如-DVD碟# ’可被编碼成"無法複製"1〇1或"單次 複製"102。資訊内容C也包含一如實質標示p的散列値之嵌 入浮水印w。當在-紙浮水印,該浮水印W是-被嵌入―己 錄資訊的浮水印,纟該方式下其不干擾資訊的陳述 能在無負面影響資訊品質下從资訊移ϋ實質標示” -編碼以嵌入由碟片播放機剛取之碟片媒體的資訊: ,及也不能在無負面影響資訊品質下從資訊移4。 複製碟片101可以或不可包含—毋+ ’'、电 4 。該單次複製磲片 本紙張尺度適用中國國家標準(CNS)aH^T(210 χ 297公/ ** --------米衣·-------訂·-------- f 、 (請先閱讀背面之注意事項再本頁) . - * 406249 A7 Β7 五、發明說明(2 ) 102包含一爲實質標示p的四倍散列之嵌入浮水印w,及一 票卡T則是一實質標示p的單次散列値。 (請先閱讀背面之注急事項再,,,ντ本頁> 經由製造商間之同意’一適應的播放器uo播放一包含 飲入浮水印w若僅爲若的記錄;該嵌入浮水印w是一三倍 散列的票卡T ;或該彼入浮水印w是一單散列票卡T。所 有其他嵌入浮水印W、票卡T及實質標示p的結合將被認爲 是一非法複製,且該適應播放器no將無法播放該非法複 製°右記錄被認爲是非法,該適應播放器U〇提供爲輸出 一涊資訊C,及其嵌入浮水印w,及一是單次散列輸入票 卡的轉換票卡τ ’。如示’該適應播放器11〇提供爲從無法 複製碟片101的一輸出U1,因爲該嵌入浮水印w是等於單 /人散列實質標不P,及從單次複製碟片1〇2提供一輸出丨12 ,因爲该嵌入浮水印w是等於三次散列票卡τ。 經由製造商間 < 同意,一適應記錄器120複製一包含嵌 入沣水印W及票卡τ的記錄,若且唯若該嵌入浮水印w是 一兩/人散列票卡T。孩無法複製輸出丨丨丨不具有一係兩次散 列示卡T 1的嵌入洋水印W,及因此不能由適應記錄器12〇 經濟部智慧財產局員工消費合作社印製 記錄。該單次複製輸出丨12包含—爲實質標示p四次散列的 嵌入浮水印W,及轉換票卡τ,是實質標示p的二次散列, 及因此般入浮水印w是轉換票卡τ,的二次散列。因爲嵌入 浮水印W是輸入轉換票卡τ,的''二次散列,該適應記綠器 120複製該單次複製資訊〗12的—複製丨2^該適應記綠器 120附著一個一次散列輸入票卡τ,爲—新票卡τ „在該複製 122上。因爲孩輸入票卡τ ·是實質標示ρ的二次散列,及新 -5- 本纸張尺度適用中國國家標準(CNS)A4 ^ΓΓ210 x 297 經濟部智慧財產局員工消費合作社印製 406249 Α7 __ Β7 五、發明說明(3 ) 票卡T"是實質標示p的三次散列。該是附著票卡的一次散 列的嵌入浮水印W之組合則界定一"無法再複製"記錄。 請注意在蘭納設計,並無"單次複製,,碟片1〇2能複製的 數目限制。即是,原始單次複製碟片102的播放將一直產 生一包含資訊C的輸出,及其嵌入浮水印W,及一爲輸入 票卡T單次散列的轉換票卡τ,❹因爲原始票卡τ是實質標 示P的單次散列’及該轉換票卡τ I是實質標示p的二次散 列’遠欣入浮水印W則一直是轉換票卡Τ '的二次散列,及 因此可記錄。該單次複製碟片102大量生產則僅可經由平 行操作1己錄120的數目、每一播放器11〇的輸出120之接收來 致動。請注意此大量生產可以使用與蘭納票卡設計一致的 記錄器120來執行。 如上述,一適應播放器110播放一包含嵌入浮水印w若 僅唯若的記錄:該嵌入浮水印W是一實質標示Ρ的單次散 列;該嵌入浮水印W是輸入票卡的三次散列;或該嵌入浮 水印W是輸入票卡的單次散列。因爲該來自無法再複製的 複製122的輸入票卡Τ ”是實質標示ρ的三次散列,及該嵌入 浮水印W是實質標示Ρ的四次散列,該嵌入浮水印w是票 卡Τ "的單次散列,及因此一非法播放複製。該適應播放器 110播放該非法無法再複製的複製122及產生一包含資訊内 容C、其嵌入浮水印W、及一係輸入票卡Τ 的散列之轉換 票卡Τ1"的輸出132。該輸出132的轉換票卡Τ",是實質標示ρ 的四次散列。 該適應播放器120,如上述,複製一包含嵌入浮水印w -6- 本紙張尺度適用中國國家標準(CNS)A〇見格(21CU 297公.f ) I I I I丨I !丨I -裝!11 — 1訂----I !丨線 1 (請先閱讀背面之注意事項再.ft本頁) · . - . 406249 A7406249 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the Invention (1) The present invention relates to the field of entertainment systems and specifically refers to the prevention of copying of copyright information. Digital records have unique characteristics to reproduce record information with the same quality as the original. Therefore, an effective copy prevention system is needed to protect digitally recorded intellectual property information. A low-cost method of copy prevention was discussed in the work of Jane Paulaner, etc. of the Philip Electronic Response to Request Data Hiding Subgroup Copy Prevention Technique in July 1997, which is incorporated herein by reference. The Lanna design operation is by attaching a "ticket" to the recorded information; the ticket contains a verifiable " counting " at each step of the playback and recording process, and it is difficult to reduce the counting. One kind of counting difficulty is that it takes a lot of time to complete the gain obtained relative to the required investment time. The Lanna system uses a hash function to provide a hash frame from a child frame, under which it is difficult to count, and the seed frame is determined under the hash frame. Figure 1 shows the Lanna ticket card system. Various examples of player 11 and recorder 12 are used to illustrate the same or different-player nG and recorder no with different inputs 101, 102, lu, 112, 122, 132. __Records are secured, such as -DVD ## can be encoded as " unable to copy " 101 or " single copy " 102. The information content C also contains an embedded watermark w, such as a hash 实质, which substantially indicates p. When the -paper watermark, the watermark W is-the embedded watermark of the recorded information. In this way, the statement that does not interfere with the information can be transferred from the information to the physical mark without negatively affecting the quality of the information. "- Encode to embed the information of the disc media just taken by the disc player:, and also cannot move from the information without negatively affecting the quality of the information. 4. The copied disc 101 may or may not be included-no + '', electricity 4. The paper size of this single copy of cymbals applies to the Chinese National Standard (CNS) aH ^ T (210 χ 297 males / ** -------- Miyi · -------- Order · --- ----- f, (please read the precautions on the back, then this page).-* 406249 A7 B7 V. Description of the invention (2) 102 contains an embedded watermark w, which is a four-fold hash of p, And a ticket card T is a one-time hash of p. (Please read the urgent notice on the back, and, ντ page > with the consent of the manufacturer 'a suitable player uo play A record containing the drinking watermark w if only; the embedded watermark w is a ticket card T that is one or three times hash; or the other watermark w is a single hash ticket card T. all The combination of other embedded watermarks W, ticket cards T and the physical mark p will be considered an illegal copy, and the adaptive player will not be able to play the illegal copy. The right record is considered illegal, and the adaptive player U 〇Provide to output a message C, and its embedded watermark w, and a conversion ticket τ 'which is a single-hash input ticket. As shown, the adaptive player 11 is provided as a disc 101 that cannot be copied. Output U1, because the embedded watermark w is equal to the single / person hash substantially P, and it provides an output from a single copy of the disc 102, because the embedded watermark w is equal to three hashes. Ticket card τ. With the consent of the manufacturer, an adaptation recorder 120 reproduces a record containing the embedded watermark W and the ticket card τ if and only if the embedded watermark w is one or two per person. The child cannot copy the output 丨 丨 丨 does not have a series of two embedded hash cards T 1 embedded watermark W, and therefore cannot be recorded by the Consumer Records Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs of the Adaptor Recorder 120. Copy output 丨 12 contains—for the four times hash of p The watermark W and the conversion ticket τ are the secondary hash of p, and therefore the watermark w is the secondary hash of the conversion ticket τ. Because the embedded watermark W is the input conversion ticket τ, the second hash, the adaptive recorder 120 copies the single copy of the information 12-Copy 丨 2 ^ The adaptive recorder 120 is attached with a one-time hash input ticket τ, for a new ticket Card τ „on the copy 122. Because the child enters the ticket card τ · is a secondary hash of the physical sign ρ, and the new -5- This paper size applies the Chinese National Standard (CNS) A4 ^ ΓΓ210 x 297 Ministry of Economy wisdom Printed by the employee's consumer cooperative of the property bureau 406249 Α7 __ Β7 V. Description of the invention (3) The ticket card T " is a three-hash of the substance p. The combination of the embedded watermark which is a hash of the attached ticket card defines a " cannot be duplicated " record. Please note that in Lanna's design, there is no " single copy, and the number of discs 102 can be copied is limited. That is, the playback of the original single copy disc 102 will always produce an output containing information C, and its embedded watermark W, and a converted ticket τ that is a single hash of the input ticket T, because the original ticket Card τ is a single hash of substantially marked P 'and the conversion ticket τ I is a secondary hash of substantially marked p' Yuanxin enters the watermark W, which has always been a secondary hash of the conversion ticket T ', and So recordable. The mass production of the single copy disc 102 can only be activated by the number of parallel operations 1 and 120, and the reception of the output 120 of each player 110. Please note that this mass production can be performed using a recorder 120 consistent with the Lanna ticket card design. As described above, an adaptive player 110 plays a record containing an embedded watermark w if only: the embedded watermark W is a single hash that substantially identifies P; the embedded watermark W is a three-time hash of the input ticket Or the embedded watermark W is a single hash of the input ticket. Because the input ticket T from the copy 122 that can no longer be copied is the three-time hash of the physical mark ρ, and the embedded watermark W is the four-time hash of the physical mark P, the embedded watermark w is the ticket T " A single hash, and therefore an illegally played copy. The adaptive player 110 plays the illegally unreproducible copy 122 and generates an information content C, its embedded watermark W, and a series of input ticket cards T The output 132 of the converted ticket T1 of the hash. The converted ticket T of the output 132 is a four-time hash of the physical mark ρ. The adaptive player 120, as described above, reproduces an embedded watermark w -6 -This paper size is in accordance with Chinese National Standard (CNS) A〇 See grid (21CU 297 male.f) IIII 丨 I! 丨 I-installed! 11 — 1 order ---- I! 丨 line 1 (Please read the first (Notes again.ft this page) ·.-. 406249 A7

請 先. 閱 讀 背 面· 之 注 意 事Please read first. Notes on the back

I I I k 本 ·I I I k

頁IPage I

I 406249I 406249

五、 發明說明(5 ) 輸出⑴將包括資訊内容C、_等於實質標示p的二次散列 的嵌入浮水印W、和也等於實質標示p的二次散列的票卡 。在該-播放例,㈣質標示p可以是一關於該廣播的任 意碼,或其可關於-廣播的屬性,如—廣播内模組訊號。 該標示之根源是有點隨意’除了其不應是”公然有效";即 是’其不應簡單地決定。替代方法可以使用以供給適切的 票卡値。該服務提供者可以提供—爲實質標示p的單次散 列的票卡’及孩有條件存取解密器21〇可被組構成以供給 單次散列給輸入票卡値,如傳統—致播放器11〇所執行。 替代地,該服務提供者可直接提供該二次散列票卡,及該 狀態存取解密器僅通過該輸入票卡如輸出票卡。如上述, 该一致記錄器120將僅在嵌入浮水印w等於二次散列輸入票 卡T時複製浮水印資訊。在此無法複製例,該嵌人浮水印 W等於知入票卡T,及因此該一致記錄器丨2〇將不會複製此 典法複製資訊211。因爲嵌入浮水印w等於票卡,—致顯示 裝置220,換言之,將顯示無法複製資訊211。 若,如在圖3,該轉換是—單次複製廣播2〇2,該解密輸 出212將包括資訊内容c,一等於四次散列實質標示p嵌入 浮水印w,及一等於二次散列實質標示p的票卡τ。因爲該 嵌入浮水印w等於二次散列輸入票卡τ,_致記錄器12〇將 產生解密輸出212的一授權影本i22,及一致顯示裝置12〇將 提供解始、輸出212的一顯示。該記錄器! 2〇的影本222包括資 訊内容C,其嵌入浮水印w,及一等於單次散列輸入票卡 T的轉換票卡T ’。因爲輸入票卡τ是一個二次散列實質標 私纸張尺度適用中麵家標準(CNS)/y規格(210 X 297公爱 I--II ! i I —--—1---^ (請先閱讀背面之注意事頊再/"本頁) - · - 經濟部智慧財產局員工消費合作社印製 A7 406249 五、發明說明(6 ) πΡ,轉換票卡τ’等於三次散列實質標示ρ。 請}王意上述討論的票卡碟片設計,多個一致記錄器120 可.,且t以接收解舍器2丨〇的輸出及產生—對應多個影本 。也請注意資訊212的一個非一致"盲"影本可被製成及結 果提供被提供圭所有—致記錄器12〇 一無限制數目影本 。一"百"影本則實質是一位元對位元影本,而無資訊轉換 如其被複製般。在一先前票卡碟片設計,該碟片媒體本身 上實質標示Ρ的出現預先排除使用盲影本,因爲實質標示ρ 將無法與該被羊复製的t訊傳輸,卜致$置將錢一具有 歆入浮水印的衫本,其疋與單次散列或四次散列的實質標 示P不同的。在該播放例,無論如何,若該實質標示卩被通 訊’其將是播放資訊的部份’及因此將在一盲影本期間與 該資訊被傳送。 當該影本222被提供至一播放器11〇,該播放器將吻合嵌 入浮水印W至一單次散列票卡τ,,及將提供一包含資訊内 容C,嵌入浮水印W,及一爲輸入票卡丁,的單次散列之轉 換票卡T "或等效的實質標示P的四次散列之輸出2 3 2。 —個一致記錄器120將無法複製輸出232,因爲該嵌入浮 水印W不是一個彡次散列輸入票卡τ"。肖一致顯示裝置將 顯示輸出230,因爲嵌入浮水印…等於輸入票卡τ"。請注 意一個非一致播放器可具有由二個適應播放器裝置22〇播 放的資訊内容C的授權及非授權影本及僅提供一等於嵌入 浮水印W的票卡Τ ··。 本發明的一目的是防止非授權影本的播放在一個一致顯 ---------------裝--------訂---------線 (請先閱讀背面之注意事項再,,¾本頁) - · . 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 Μ _____________-9- 本紙張尺度 中國國家標準(CNS)A4規格(210 χΊ97公笼 A7 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 _______ - 10- 本紙張雜⑽χ 297-^ 五、發明說明(7 ) 示裝置。本發明的另一目的 曰的係防止非授權資訊在一個適應 記錄裝置上。本發明的又―目的則是防止資訊的非授權影 本在非-致記錄裝置上,或執行該非授權影本除非是爲了 一致適應顯示或記錄裝置。 七該等㈣和其他將經由提供-解密設計在通訊該資訊内 合和此内谷的償試接受m該解密被提供在傳輸票卡和 顯示權利間。爲容許裝,晋· ^ 了攜帶性,較佳具體例的解密設 計爲動態。在任何時間野;,π β < π . 吁间.沾,鉍供裝置和接收裝置間的通道 被組構成獨特使用該兩種裝置· 吁 J從衣直,其後,琢通道可以組態 另組裝置之獨特使用。& „ A , ^ 叫邗使开〗為防止使用非一致裝置在該系統内 ,適應裝置包含可確認之眞實性,及通道僅當通道上每一 裝置確認另外裝置的眞實性時被建立。 本發明將更加詳細地説明,經由範例,及參考附圖其中: 圖1展7F先前技藝票卡處理設計用以控制一實質媒體上 秦產權的複製之範例的一方塊圖; 圖2和3展示先前技藝票卡處理設計用以控制一經由—播 放通运通訊的實質媒體上智產權的複製之應用; 圖4展7F —根據本發明的票卡處理設計用以控制—實質 媒體上智產權的顯示之範例的—範例方塊圖; 圖5展示根據本發明的票卡處理設計用以控制一實質媒 體上智產權的複製之範例的一趸例方塊圖; 圖6展示一根據本發明的票卡處理設計用以控制—實質 媒體上智產權的顯示之範例的一範例流程圖。 圖4展示根據本發明的票卡處理設計的一範例方塊圖以 · ----裝--------訂---------線 (請先閱讀背面之注意事項再:鳥本頁) - · ‘ - f f A7 406249 B7 五、發明說明(8 ) 控制智產權資訊的複製。圖4所示是一狀態存取模組300及 一顯示裝置400。該狀態存取模組接收一可或不可解密及 其可或不可複製保護的廣播301。圖4使用的該廣播{}展示 可或不可呈現在特別廣播301的項目。一廣播解密器350是 一傳統廣播解密器以解密若爲加密的廣播301,否則,其 無修正地通過,以使得廣播解密器的輸出351包含資訊内 容C,其嵌入浮水印W,若有,及關聯的票卡T,若有。 —票卡檢測器340使票卡T341,若呈現,與輸出351分離 以產生一資訊内容C及其嵌入浮水印W,若有,訊號342, 及通訊票卡T341至一票卡加密器330。根據本發明,票卡加 密器330使用一鍵K321加密票卡T以產生一僅可由顯示裝置 400解密的加密票卡EK(T)331,如下所將討論者。資訊内容 C及其嵌入浮水印W,若有,訊號342,及加密票卡 EK(T)331,若有,則通訊至顯示裝置400如一通訊訊號401。 顯示裝置400包括一票卡檢測器440以處理通訊訊號401以 產生一資訊内容C及其嵌入浮水印W,若有,訊號442,及 票卡T431,若有。若,如圖4所示,該狀態存取模组300是 根據本發明的一適應的裝置,該選粹票卡431將等於加密 票卡EK(T)331。若通訊訊號401非來自一致狀態存取模組300 ,選粹票卡43 1將不等於加密票卡EK(T)331。該票卡解密器 430解密依键K'421爲基礎的選粹票卡43 1,以使得组成的票 卡Τ441耦合原始票卡Τ431若僅爲若解密鍵Κ'421對應加密鍵 Κ321。一鍵對應另一若键解密一另一所產生的加密。在一 對稱键系統,該鍵Κ321及Κ'421彼此相等。在一非對稱键系 -11 - 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ---------------裝·-------訂---------線 (請t閱讀背面之注意事項再,^本頁) - . 經濟部智慧財產局員工消費合作社印製 406249 A7 經濟部智慧財產局員工消費合作社印製 B7 五、發明說明(9 ) 統,鍵K321及Κ,421各別爲一私/公加密鍵對的私及公鍵。 一顯示控制器460控制資訊内容c及其嵌入浮水印冒的 顯示,若有,訊號442,以嵌入浮水印w和解密票卡以41間 關係爲主。根據本發明,資訊内容c將被顯示若僅爲若符 合下列三種狀況: 籲其無嵌入浮水印; *嵌入浮水印W等於解密票卡T441 ;或 •嵌入浮水印w等於二次散列解密票卡丁441。 第一狀況對應無法複製或顯示保護的資訊内容C。第二 狀況對應先前技藝票卡設計的永無法複製212及無法再複 製232狀態,如圖2和3所示。如上述,先前技藝票卡設計 的嵌入浮水印w,若有,將等於永無法複製212及無法再複 製232内原始票卡Τ341,及將等於單次複製狀態222内二次 散列原始票卡Τ341。因爲,當顯示裝置具有一對應鍵Κ321 於狀%存取模組300的鍵Κ'421,解密票卡丁441將僅等於原 始票卡Τ341 ’保護的資訊内容c將僅被顯示於狀態存取模 組300和顯示裝置400具有對應鍵Κ321和Κ,421。因此,若製 成通訊訊號401的一盲影本’其將僅被顯示在包含對應键 Κ321的鍵Κ’421之顯示裝置4〇〇。 圖5展示根據本發明的一對應記錄器5〇〇。除了替代複製 控制器500以顯示控制器460外,記錄器500則相似於顯示裝 置400。複製控製器56〇容許資訊内容c的一影本製成若僅 爲若符合下列兩種狀況之一: 無嵌入浮水印;或 -12- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) 裝--------訂---------線 (請先閱讀背面之注意事項再:烏本頁) ^ A7 ______B7 五、發明説明(1〇) •嵌入浮水印W等於二次散列解密票卡T441。 第一狀況對應無法顯示或顯示保護的資訊内容C。第二 狀況對應先前技藝票卡設計的單次複製222狀態,如圖3所 示。因爲解密票卡T441將僅等於原始票卡T341於顯示裝置 具有一鍵K,42l對應鍵Κ321於狀態存取模组300,具有一嵌 入浮水印W等於二次散列原始票卡Τ34丨的單次複製資訊内 容C將僅在狀態存取模组3〇〇和記錄器5〇〇具有對應鍵Κ321 及Κ’421。因此,若通訊訊號4〇1的一盲影本被製成,其將 僅可複製在包含對應鍵Κ321的键Κ,421之記錄器500。雖然 多影本可經由相同記錄器500從通訊訊號4〇1的一言影本製 成’根據本發明排除多種影本的同步複製,由是減少可在 保護資訊的每次單一產品所實現之經濟效益。 多樣技術則可用以產生對應加密鍵Κ321、Κ'421。(對每 例而言,接收器4〇〇,500將被使用以參照顯示裝置4〇〇或記 錄器500。)在該最簡單例,每一接收器4〇〇,5〇〇具有—關 方;接收器400、500的一辨識器之私键’及該狀態存取模組 300具有一對應每一辨識器之公键。該公鍵形成鍵Κ32ι及私 鍵形成鍵Κ,421。在此具體例,該票卡加密33〇及解密器43〇 是一非對稱加密器/解密器對。相同辨識器及公/私鍵對可 被指定至多種接收器400,500 ;指定一獨特公/私鍵對至每 一接收器400 ’ 500容許一各別厶鍵被廢除在該例智產權的 破壞被發現。 替代地,圖4展示外在的鍵產生器32〇及42〇以產生鍵 Κ321和Κ'421。鍵產生器320及420的一範例對包括—,,Diffie_ 本^張尺度適用巾11@家標準(CNS ) A4規格(210X2〗?!^; ) ~ ------ i m > ---:------I;—— (請先閱讀背面之注意事項再填,4寅) 線 經濟部智慧財產局員工消費合作社印製 A7 B7 經濟部智慧財產局員工消費合作社印製 406249 五、發明說明(11)V. Description of the Invention (5) The output ⑴ will include information content C, an embedded watermark W equal to the secondary hash of the substantial label p, and a ticket card also equal to the secondary hash of the substantial label p. In the -play example, the quality label p may be an arbitrary code about the broadcast, or it may be about the attributes of the broadcast, such as the module signal in the broadcast. The root of the labeling is a bit arbitrary 'except that it should not be "blatantly valid"; that is, it should not be simply decided. Alternative methods can be used to supply appropriate ticket cards. The service provider can provide-for the substance The single-hashing ticket labeled 'p' and the child's conditional access decryption device 21 can be configured to supply a single-hash to the input ticket card, as traditionally performed by the player 11o. Alternatively The service provider can directly provide the secondary hash ticket, and the state access decryptor only passes the input ticket such as the output ticket. As mentioned above, the consistency recorder 120 will only embed the watermark w equal to The watermark information is copied when the ticket card T is input twice. This example cannot be copied. The embedded watermark W is equal to the ticket card T. Therefore, the consistent recorder will not copy this code. Information 211. Because the embedded watermark w is equal to the ticket card,-to the display device 220, in other words, the information 211 cannot be copied. If, as in Figure 3, the conversion is-a single copy of the broadcast 202, the decrypted output 212 Will include information content c, first class The watermark w is embedded in the four-time hash substantially indicating p, and a ticket τ equal to the second-hash substantially indicating p. Because the embedded watermark w is equal to the two-hash input ticket τ, _ to the recorder 12 An authorized copy i22 of the decrypted output 212 will be generated, and the consistent display device 120 will provide a display of the decoded and output 212. The recorder! The copy 222 of 20 includes the information content C, which is embedded with a watermark w, and a It is equal to the single-hash input ticket T. The conversion ticket T '. Because the input ticket τ is a second-hash physical standard private paper standard applicable to the Chinese Standard (CNS) / y specification (210 X 297 public love I--II! I I ----- 1 --- ^ (Please read the note on the back 顼 / " this page)-·-Printed by A7 406249, Consumer Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs Explanation (6) πP, the conversion ticket τ ′ is equal to the three-hashing physical designation ρ. Please} Wang Yi The ticket card disc design discussed above, multiple consistent recorders 120 are available, and t is to receive the unwinder 2 丨〇 Output and production—corresponds to multiple copies. Please also note a non-consistent " blind " copy of information 212 Produced and provided the results are provided to the recorder-an unlimited number of copies of the recorder. A "hundred" copy is essentially a one-bit to one-bit copy, and no information is converted as it is copied. A previous disc card disc design, the appearance of the physical marking P on the disc media itself precludes the use of blind copies, because the physical marking ρ will not be able to be transmitted with the t-copy copied by the sheep, so The shirt with the watermark in it is different from the single-hash or four-hash physical indication P. In this playback example, in any case, if the physical indication is not communicated, it will be the department that plays the information. Copies' and therefore will be transmitted with that information during a blind copy. When the photocopy 222 is provided to a player 110, the player will fit the embedded watermark W to a single-hash ticket card τ, and will provide an information content C, embedded watermark W, and a Enter the ticket card, the single-hash conversion ticket T " or the equivalent four-hash output of the physical label P 2 3 2. An unanimous recorder 120 will not be able to copy the output 232 because the embedded watermark W is not a one-time hash input ticket τ ". The Xiao consistent display device will display output 230 because the embedded watermark ... is equal to the input ticket τ ". Please note that a non-uniform player may have authorized and unauthorized copies of the information content C played by two compliant player devices 22 and only provide a ticket card equal to the embedded watermark W.... An object of the present invention is to prevent the playback of unauthorized copies in a consistent display. (Please read the precautions on the back, ¾ this page)-·. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs _____________- 9- This paper is a Chinese national standard (CNS) A4 specification (210 χΊ97 public cage A7) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs _______-10- This paper is miscellaneous χ 297- ^ V. Description of the Invention (7) Device. Another purpose of the present invention is to prevent unauthorized information from being stored in an adaptive recording device. The purpose of the present invention is to prevent unauthorized copies of information on non-recording devices, or to execute the unauthorized copies unless they are adapted to the display or recording device in a consistent manner. Designed in the communication of this information and the trial acceptance of this inner valley, the decryption is provided between the transmission ticket and the display right. In order to allow installation, the portability is improved, and the decryption of the preferred embodiment is designed to be dynamic. Wild at any time; π β < π. Yuma. Zhan, the channels between the bismuth supply device and the receiving device are combined to form a unique use of these two devices. Yu J from the clothes straight, and later, the channel can be configured for the unique use of another group of devices. & „A, ^ Calling 邗 使 开】 To prevent the use of non-consistent devices in the system, adaptive devices contain identifiable authenticity, and channels are established only when each device on the channel confirms the authenticity of another device. The invention will be explained in more detail, by way of example, and with reference to the accompanying drawings: FIG. 1 shows a block diagram of an example of a 7F prior art ticket processing design to control the reproduction of Qin property rights on a substantial media; FIGS. 2 and 3 show the previous Figure 4F 7F — An example of a ticket processing design according to the present invention that controls the display of intellectual property rights on the physical media. -Example block diagram; Figure 5 shows an example block diagram of an example of a ticket processing design designed to control the copying of intellectual property rights on a physical media according to the present invention; Figure 6 shows a block diagram based on this An example flowchart of an example of the design of a ticket processing designed to control the display of intellectual property rights on the physical media is shown in Figure 4. Figure 4 shows an example block diagram of a ticket processing design according to the present invention. ----- Order --------- line (please read the precautions on the back then: bird page)-· '-ff A7 406249 B7 V. Description of Invention (8) Control of Intellectual Property Information Copying. Figure 4 shows a state access module 300 and a display device 400. The state access module receives a broadcast 301 which can or cannot be decrypted and which can or cannot be copied. This broadcast {} used in FIG. 4 shows items that may or may not be presented on the special broadcast 301. A broadcast decryptor 350 is a traditional broadcast decryptor to decrypt the encrypted broadcast 301, otherwise, it passes without correction so that the output 351 of the broadcast decryptor contains the information content C, which is embedded with a watermark W, if any, And associated ticket card T, if any. The ticket card detector 340 separates the ticket card T341, if present, from the output 351 to generate an information content C and its embedded watermark W, if any, a signal 342, and a communication ticket card T341 to a ticket card encryptor 330. According to the present invention, the ticket encryptor 330 encrypts the ticket T with a key K321 to generate an encrypted ticket EK (T) 331 that can only be decrypted by the display device 400, as will be discussed below. Information content C and its embedded watermark W, if there is, signal 342, and encrypted ticket card EK (T) 331, if there is, it communicates to the display device 400 such as a communication signal 401. The display device 400 includes a ticket card detector 440 to process the communication signal 401 to generate an information content C and its embedded watermark W, if any, a signal 442, and a ticket T431, if any. If, as shown in FIG. 4, the state access module 300 is an adapted device according to the present invention, the selected ticket 431 will be equal to the encrypted ticket EK (T) 331. If the communication signal 401 does not come from the consistent state access module 300, the selected ticket 431 will not be equal to the encrypted ticket EK (T) 331. The ticket decrypter 430 decrypts the selected ticket 43 1 based on the key K'421 so that the composed ticket T441 is coupled to the original ticket T431 if the decryption key K'421 corresponds to the encryption key K321. One key corresponds to another if the key decrypts the encryption generated by another. In a symmetrical key system, the keys K321 and K'421 are equal to each other. In an asymmetric bond system -11-This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) --Order --------- line (Please read the notes on the back again, ^ this page)-. Printed by the Employees 'Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 406249 A7 Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs System B7 5. Invention description (9) system, keys K321 and K, 421 are each a private / public encryption key private and public key pair. A display controller 460 controls the display of the information content c and its embedded watermark. If there is, the signal 442 is mainly based on the 41 relationship between the embedded watermark w and the decryption ticket. According to the present invention, the information content c will be displayed only if it meets the following three conditions: ● It has no embedded watermark; * embedded watermark W equals decryption ticket T441; or • embedded watermark w equals two-hash decryption ticket Cardin 441. The first situation corresponds to the inability to copy or display the protected information content C. The second situation corresponds to the state of 212 and 232 that can never be copied in the previous art ticket design, as shown in Figures 2 and 3. As mentioned above, the embedded watermark w of the previous craft ticket design, if any, will be equal to the original ticket card T341 that can never be copied 212 and 232, and the original ticket card will be hashed twice in the single copy state 222. Τ341. Because, when the display device has a key K321 corresponding to the key K'421 of the access module 300, the decrypted ticket card 441 will only be equal to the original ticket card T341 'protected information content c will only be displayed in the state access The module 300 and the display device 400 have corresponding keys K321 and K, 421. Therefore, if a blind copy of the communication signal 401 is made, it will be displayed only on the display device 400 including the key K'421 corresponding to the key K321. FIG. 5 shows a corresponding recorder 500 according to the present invention. The recorder 500 is similar to the display device 400, except that the copy controller 500 is replaced by the display controller 460. The copy controller 56〇 allows a copy of the information content c to be made only if it meets one of the following two conditions: no embedded watermark; or -12- this paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 public love) installed -------- order --------- line (please read the precautions on the back then: black page) ^ A7 ______B7 V. Description of the invention (1〇) • The embedded watermark W is equal to the secondary hash decryption ticket T441. The first situation corresponds to the information content C that cannot be displayed or displayed. The second state corresponds to the single copy 222 state of the previous craft ticket design, as shown in FIG. 3. Because the decrypted ticket T441 will only be equal to the original ticket T341 with a key K on the display device, and 42l corresponding to the key K321 on the state access module 300, with a single embedded watermark W equal to the second hash of the original ticket T34 丨The second copy of the information content C will have corresponding keys K321 and K'421 only in the state access module 300 and the recorder 500. Therefore, if a blind copy of the communication signal 401 is made, it can only be copied to the recorder 500 containing the keys K, 421 corresponding to the keys K321. Although multiple copies can be made from a single copy of the communication signal 401 via the same recorder 500 'according to the present invention, the simultaneous copying of multiple copies is eliminated, by reducing the economic benefits that can be achieved in each single product that protects information. Various technologies can be used to generate corresponding encryption keys K321, K'421. (For each example, receiver 400,500 will be used to refer to display device 400 or recorder 500.) In this simplest example, each receiver 400,500 has -off The private key of an identifier of the receivers 400 and 500 and the state access module 300 have a public key corresponding to each identifier. The public key forms the key K32m and the private key forms the key K, 421. In this specific example, the ticket encryption 33 and the decryptor 43 are an asymmetric encrypter / decryptor pair. The same identifier and public / private key pair can be assigned to multiple receivers 400, 500; assigning a unique public / private key pair to each receiver 400 '500 allows a separate key to be abolished in this case Destruction was found. Alternatively, FIG. 4 shows the external key generators 32 and 42 to generate the keys K321 and K'421. An example pair of the key generators 320 and 420 includes — ,, Diffie_ This standard is applicable to the standard 11 @ 家 standard (CNS) A4 specification (210X2〗?! ^;) ~ ------ im >- -: ------ I; —— (Please read the notes on the back before filling, 4 Yin) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 406249 V. Description of Invention (11)

Heilman"鍵交換運茸法目丨|,lL上 异天則,此在該技藝是相當普通的。在 該 Diffie-Heilman設計,每—处▲丄 ,eB ^ ’ 鍵產生器320及420各別地選擇 一隨機大整數X,y,及公六 y 人換鍵參數325包括一大質數η, 及一數目g是一原始取模函數η。 鍵產生器3 20通訊X = Λ g取梗函數η至鍵產生器420,及, 鍵產生器420通訊x = gy取模函數11至鍵產生器32〇。 鍵產生器32〇計算Κ = γχ取模函數11,及 鍵產生器420計算Κ,= π取模函數11。 在此万式,Κ和κ ’等於gxy及取模函數η。因爲χ及y被保 持爲私,鍵K,K,的決定在計算上較爲困難。在此具體例 ,票卡加密器330及票卡解密器43〇是一對稱加密器/解密器 對,每一使用相同鍵値ρ及取模函數n以加密及解密該票 卡Τ 〇 4注意兩個接收器400 ’ 500將不以傳統存取模組3〇〇產生 相同鍵値’除非L們皆選擇相同隨機値y。在本發明的依 車父佳具體例’接收器400,500將被產生以使得在相同時間 產生相同随機數値的可能性大幅降低。因此,當與先前技 藝票卡系統比較’將一致記錄器500與通訊訊號4〇1平行置 放時將不容許彼此複製在單次狀態222的資訊。相似地, 如上述,產生通訊訊號401的一盲影本將僅容許_具有適 切鍵K,的一致記錄器500以產生''多種每次一複製。 附加安全可經由替代安全設計的結合提供。例如,圖4 和5展示辨識器310,410以鍵產生器320,420的對應對之可 選擇使用。該辨識器310在從票卡檢測器接收到—啓動 本.紙張尺度適用中國國家標準(CNiS)A4規格(210 X 297公釐 / --------------茛--------訂---------線-----------1. - (請先閱讀背面之注意事項再^5^本頁) -14- 406249 A7 __—_B7 五、發明說明(12) 346時,經由從一辨識器410要求一確認411以啓始辨識程序 。該確認411是一能證實的數位確認,在該技藝是相當普 通的’其是由接收器及包含該特別接收器的一辨識的製造 商所提供的。該辨識器3 10確認該鑒定,使用傳統數位辨 認技術,及通訊該辨認結果311至鍵產生器320。在此方式 ,該接收器400,500可在接收到每一票卡資訊3〇1時重確認 。非一致接收器,或已確認破壞的特別接收器4〇〇,500, 可因此從接收票卡資訊防止。 請注意適切鍵K321至對應鍵K,421的決定或產生在接收到 票卡資訊3 01可週期地,隨機地,或如上述地發生。在一 較佳具體例,該鍵決定或產生也發生在有條件存取模組 300和接收器400,500間通訊路徑則爲新建立。在此方式, 該有條件存取模組300可被重指定,或結合,至一不同接 收器400,500,如有需求。也請注意較佳具體例的有條件 存取模组300包括一對鍵產生器320,及對應票卡加密器33〇 ,每一關聯一通道。該通道的輸出被提供,例如,至一顯 示裝置400,相同時其他通道的輸出4〇1被提供至一記錄器 5 〇 〇,以使得保護資訊的一確認影本可製成,同時確認觀 視發生。在此具體例,每一通道的輸出4〇 1具有—不同加 密票卡,依附著至每一輸出401的接收器400 , 5〇〇而定。爲 冗整起見,圖6展示根據本發明一致有條件存取模組3〇〇及 接收器400, 500的一流程圖。在61〇,廣播資訊在有條件存 取模組300被接收到。若廣播資訊包含加密資訊62〇,其於 625被解密;若其包含一票卡63〇,票卡被加密於635,使用 __ -15- 1本纸張尺度適用中固國家標準(CNS)A4規格(210 X 297公釐) " ---- ' n n I - n n I I I n n n -- 一 0, * n n n I I n I (請先閱讀背面之注意事項再〆备本頁) , 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 406249_b7_ 五、發明說明(13) 一對應接收器400,500内票卡的鍵,如上述。該解密資訊 及加密票卡被傳送至640處的接收器400,500。在接收時, 接收器400,500決定是否該資訊包含一票卡。若在650該接 收資訊具有一票卡,其被解密,在655使用關聯接收器400 ,500的键。若接收器400,500是一記錄器500於660處,該 680處測試被施以決定是否資訊爲可複製。若無嵌入浮水 印W於資訊上,或若嵌入浮水印W符合二次散列解密票卡 ,該資訊内容及嵌入浮水印W,若有,是複製的685,沿著 一散列解密票卡T,持續先前技藝票卡設計。否則,複製 步驟685被旁通。若在660,該接收器400,500是一顯示裝 置400,該670處測試被施予。若無嵌入浮水印W在資訊内 ,或若嵌入浮水印W符合解密票卡或一三次散列解密票卡 ,該資訊内容C被顯示675。否則,該顯示步驟675被旁通 。在複製,顯示或旁通後,該程序持續,在690,等待下 一廣播資訊在610的接收。 前述僅展示本發明得原理,其因此該等習知本技藝者將 可發展不同配置,雖然前述並無説明或展示,使具體化本 發明的原理及因此在其精神和範碡内。例如,上述在有條 件存取模組的票卡加密設計可被結合入期它裝置,如傳統 播放器110,一非傳統存取模组,或所有其他裝置以從一 源接收票卡資訊及提供其至一接收器400,500。相似地, 先前技藝票卡設計的詳細被呈現以爲展示目的。其他票卡 設計也可被使用,僅需要一改變至特別票卡設計675,685 '以對應該等設計。 -16- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------裝--------訂---------線 (請先閱讀背面之注意事項再本頁) - , · - _406249 五、發明說明( 請注意該等圖的特別功能及結構將僅為說明目的 替代配置亦為可行。例%’票卡加密器330可被定位在廣 播301的提供器處’以使得資訊如以適合為接收器解密的 加密之一票卡被接受在廣播密器350處。在此具體例’該 有條件存取模組3〇〇將包括裝置用以通訊—接收器4〇〇,5〇〇 的辨識至廣播301的提供器處。在相似方式,部份或所有 有條件存取模组300的說明组件可被包括在接收器4〇〇,500 或其他裝置内。該等和期它系統組態及最理想話選擇將對 習知本技藝者觀視本發明將是明顯地,及被包括在下列申 請專利範圍的範圍内。 I I I f I J-— I I I I I I * I I I I I I I ^ > — — — — — — 1— (請先閱讀背面之注意事項再本頁) - 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210x 297公釐)Heilman " Key exchange operation method ||, on lL, it is quite common in this technique. In this Diffie-Heilman design, each of the ▲ 丄, eB ^ 'key generators 320 and 420 respectively selects a random large integer X, y, and the public six y key-changing parameter 325 includes a large prime number η, and A number g is an original modulus function η. The key generator 3 20 communicates X = Δg to take the function η to the key generator 420, and the key generator 420 communicates x = gy to take the modulus function 11 to the key generator 32. The key generator 32 0 calculates K = γχ modulus function 11 and the key generator 420 calculates K, = π modulus function 11. In this equation, K and κ 'are equal to gxy and the modulus function η. Because χ and y are kept private, the decision of the keys K, K, is computationally difficult. In this specific example, the ticket encryption device 330 and the ticket decryption device 43 are a pair of symmetric encryption / decryption devices, each of which uses the same key 及 ρ and the modulus function n to encrypt and decrypt the ticket Τ 〇 4 Note The two receivers 400'500 will not generate the same key with the conventional access module 300, unless they both choose the same random key. In the embodiment of the present invention, the receivers 400, 500 will be generated so that the possibility of generating the same random number 値 at the same time is greatly reduced. Therefore, when compared with the prior art ticket card system ', placing the coincidence recorder 500 in parallel with the communication signal 401 will not allow the information in the single state 222 to be copied to each other. Similarly, as described above, generating a blind copy of the communication signal 401 will only allow the coherent recorder 500 with the appropriate key K to generate `` multiple copies at a time. Additional security can be provided through a combination of alternative security designs. For example, Figures 4 and 5 show that the identifiers 310, 410 can be selectively used with corresponding pairs of the key generators 320, 420. The identifier 310 is received from the ticket card detector-the starter. The paper size applies the Chinese National Standard (CNiS) A4 specification (210 X 297 mm / -------------- buttercup- ------- Order --------- Line ----------- 1.-(Please read the precautions on the back before ^ 5 ^ this page) -14- 406249 A7 ____B7 V. Description of the invention (12) At 346, the identification process is started by requesting a confirmation 411 from a recognizer 410. The confirmation 411 is a verifiable digital confirmation, which is quite common in the art. ' It is provided by the receiver and an identified manufacturer that includes the special receiver. The identifier 310 confirms the identification, uses traditional digital identification technology, and communicates the identification result 311 to the key generator 320. Here In this way, the receiver 400, 500 can reconfirm when receiving each ticket information 301. Non-uniform receivers, or special receivers 400,500 that have been confirmed to be damaged, can therefore receive ticket information from Prevent. Please note that the decision of the appropriate key K321 to the corresponding key K, 421 or generated upon receipt of the ticket information 3 01 can occur periodically, randomly, or as described above. In a system, the key decision or generation also occurs between the conditional access module 300 and the receiver 400, 500. The communication path is newly established. In this way, the conditional access module 300 can be re-designated, or combined To a different receiver 400, 500, if required. Please also note that the conditional access module 300 of the preferred embodiment includes a pair of key generator 320 and a corresponding ticket card encryptor 33, each associated with one Channel. The output of this channel is provided, for example, to a display device 400. At the same time, the output of other channels 401 is provided to a recorder 500, so that a confirmation copy of the protection information can be made and confirmed at the same time. Observation takes place. In this specific example, the output 401 of each channel has a different encryption ticket, depending on the receiver 400, 500 attached to each output 401. For the sake of redundancy, Figure 6 A flowchart showing the consistent conditional access module 300 and the receivers 400, 500 according to the present invention. At 61, broadcast information is received at the conditional access module 300. If the broadcast information includes encrypted information 62 〇, which was decrypted at 625; if it contains a vote Card 63〇, ticket card is encrypted in 635, use __ -15-1 1 This paper size applies to China Solid National Standard (CNS) A4 specification (210 X 297 mm) " ---- 'nn I-nn III nnn-one 0, * nnn II n I (Please read the precautions on the back before preparing this page), printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs, printed by the employee's cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs, printed by 406249_b7_ Description of the invention (13) A key corresponding to the ticket card in the receiver 400, 500, as described above. The decrypted information and the encrypted ticket are transmitted to the receivers 400, 500 at 640. Upon receiving, the receivers 400, 500 decide whether the message contains a ticket card. If the received message has a ticket card at 650, which is decrypted, the keys of the associated receiver 400, 500 are used at 655. If the receiver 400, 500 is a recorder 500 at 660, the test at 680 is applied to determine whether the information is reproducible. If there is no embedded watermark W on the information, or if the embedded watermark W meets the second hash decryption ticket, the information content and embedded watermark W, if any, are duplicated 685, and the ticket is decrypted along a hash. T, continue the previous craft ticket design. Otherwise, the copying step 685 is bypassed. If at 660, the receiver 400, 500 is a display device 400, and the 670 test is administered. If there is no embedded watermark W in the information, or if the embedded watermark W matches the decryption ticket card or one or three hash decryption ticket cards, the information content C is displayed 675. Otherwise, the display step 675 is bypassed. After copying, displaying or bypassing, the process continues, at 690, waiting for the next broadcast message to be received at 610. The foregoing merely illustrates the principles of the present invention, and thus those skilled in the art will be able to develop different configurations, although the foregoing has not illustrated or shown, so as to embody the principles of the present invention and therefore within its spirit and scope. For example, the above-mentioned ticket card encryption design in the conditional access module can be incorporated into other devices, such as traditional player 110, a non-traditional access module, or all other devices to receive ticket information from a source and It is provided to a receiver 400,500. Similarly, details of previous craft ticket design are presented for display purposes. Other ticket card designs can also be used, only a change to a special ticket card design 675,685 'is required to correspond to these designs. -16- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) -------------- installation -------- order ---- ----- line (please read the precautions on the back before this page)-, ·-_406249 V. Description of the invention (please note that the special functions and structures of these figures will be used for illustration purposes only. Alternative configurations are also possible. Examples % 'Ticket Encryptor 330 can be located at the provider of broadcast 301' so that information such as one of the encrypted tickets suitable for decryption by the receiver is accepted at the broadcast secret 350. In this specific example, 'there should be The conditional access module 300 will include the device used to communicate-the receiver 400,500 identifies to the provider of the broadcast 301. In a similar manner, some or all of the conditional access modules 300's Illustrative components can be included in the receiver 400,500 or other devices. These and other system configurations and ideal choices will be apparent to those skilled in the art who view the invention, and are included Within the scope of the following patent applications: III f I J-— IIIIII * IIIIIII ^ > — — — — — — 1— (Please read first Note on the back page)-Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs This paper is sized for China National Standard (CNS) A4 (210x 297 mm)

Claims (1)

經濟部智慧財產局員工消費合作社印製 406249 B8 D8 六、申請專利範圍 1 · 一種裝置(300),包含: 一票卡檢測器(340)以一來源之嵌入浮水印(W)摘綠一 票卡(341)及一資訊内容(342), 一票卡加密器(330)以加密依資訊内容(342)的接收器 而定之一键(321)為基礎之票卡(341),以提供一以嵌入 浮水印(W)通訊該資訊内容(342)之加密票卡(331)至一 接收裝置(400,500)。 2 ·如申請專利範圍第1項之裝置(300),另包括 一廣播解密器(430)以解密一廣播傳輸(301)以依嵌入 式浮水印(W)形成該票卡(341)的來源及資訊内容(342)。 3 .如申請專利範圍第1項之裝置(300),另包括 一键產生器(320)產生依接收器而定的鍵(321)。 4 .如申請專利範圍第3項之裝置(300),另包括 該鍵產生器(320)包括一 Diffie- Heilman鍵交換系統。 5 .如申請專利範圍第1項之裝置(300),另包括 一確認器(3 10)以確認接收裝置(400,500)如一企圖接 收器。 6 —種接收器,(400,500 )包含: 一票卡檢測器(340)以從一包括加密票卡(43 1)及一資 訊内容(442)接收的通訊(401)以一嵌入式浮水印(W)摘 錄一加密票卡(431), 一票卡(430)以解密加密票卡(43 1)以形成一解密票卡 (441),及 -18- 本紙垠尺度適用中國國家標準(CNS ) A4規格(210X297公釐) ----------1------ΪΤ------0 (請先閱讀背面之注意事項再私I本頁) - · ' . A8 406249 ?8s D8 六、申請專利範圍 (請先閱讀背面之注意事項再、,,罵本頁) 一控制器(460,560)以決定至少依嵌入式浮水印(W)為 基礎的一顯示容許及一複製容許及該解密票卡(441)。 7 .如申請專利範圍第6項之接收器(400,500),另包括 一键產生器(420)產生一键(421)以提供至票卡解密器 (430)以解密該加密的票卡(431)以形成解密的票卡(441)。 8 .如申請專利範圍第7項之接收器(400,500),其中 該鍵產生器(420)包括一 Diffie- Heilman鍵交換系統。 9 .如申請專利範園第6項之接收器(400,500),另包括 一確認器(410)以提供一確認(411)至一裝置(3〇0)以提 供接收的通訊(401)以協助加密票卡(43 1)的產生。 10. 如申請專利範圍第6項之接收器(400,500),另包括 控制器(460,560)依至少一散列解密票卡(441)之一基 礎決定顯示容許及複製容許至少之一。 11. 如申請專利範圍第6項之接收器(400,500),另包括至 少顯示(400)和一複製器(500)之一。 12. —種通訊一著作權資訊的方法,包含: 經濟部智慧財產局員工消費合作社印製 加密(635) —關聯著作權資訊的票卡(341)以形成一依 接收器為基礎的加密票卡(33 1),及 以著作權資訊通訊(640)加密票卡至一接收裝置(400, 500)以協助依是否接收裝置(400,500)是該接收器為基 礎的一強化著作權。 13. 如申請專利範圍第12項之方法,另包括 產生依使用在加密(635)該票卡(341)的接收器而定之 -19 - 本纸張尺度適用中國國家梯準(CNS ) A4現格(210X297公釐) 406249 ab!cd 經濟部智慧財產局員工消費合作社印製 六、申請專利範圍 一鍵(321)。 M.如申請專利範圍第Π項之方法,其中 產生键(321)的步騾包括 致效一 Diffie- Heilman键交換系統。 15. 如申請專利範圍第12項之方法,另包括 確認該接收裝置(400,500 )為企圖之接收器。 16. —種強制保護著作權資訊的方法,包含: 解密(655) —加密票卡(431)以形成一解密票卡(441), 決定(670,680)依一解密票卡(441)及一嵌入在著作權 資訊内的浮水印而定的至少顯示容許及複製容許之一。 17. 如申請專利範圍第16項之方法,另包括 產生一用以解密該加密票卡(431)的鍵(421)。 18. 如申請專利範圍第17項之方法,另包括 產生键(421)的步驟包括 致效一 Diffie- Heilman键交換系統。 19. 如申請專利範圍第16項之方法,另包括 用以依至少一散列解密票卡(441)而決定(670,680)至 少顯示容許及複製容許之一步驟。 -20- 本纸張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) -----------^------、1T------0 * (請先閱讀背面之注意事項再i,為本頁) , - _Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs's Consumer Cooperatives 406249 B8 D8 6. Scope of Patent Application 1 · A device (300) including: a ticket card detector (340) with a source embedded watermark (W) and a green ticket Card (341) and an information content (342), a ticket card encryptor (330) encrypts a ticket card (341) based on a key (321) depending on the receiver of the information content (342) to provide a The encrypted ticket (331) of the information content (342) is communicated to a receiving device (400, 500) by embedding a watermark (W). 2 · If the device (300) of the first patent application scope, further includes a broadcast decryptor (430) to decrypt a broadcast transmission (301) to form the source of the ticket card (341) based on the embedded watermark (W) And information content (342). 3. The device (300) according to the scope of the patent application, further including a key generator (320) to generate a key (321) depending on the receiver. 4. The device (300) according to item 3 of the patent application scope, further comprising the key generator (320) including a Diffie-Heilman key exchange system. 5. If the device (300) of item 1 of the patent application scope includes a confirmer (3 10) to confirm the receiving device (400, 500) as an attempted receiver. 6—A receiver, (400, 500) includes: a ticket card detector (340) to receive communications (401) from an encrypted ticket card (43 1) and an information content (442) with an embedded floating The watermark (W) extracts an encrypted ticket card (431), a ticket card (430) to decrypt the encrypted ticket card (43 1) to form a decrypted ticket card (441), and -18- This paper's standard applies to Chinese national standards ( CNS) A4 specification (210X297 mm) ---------- 1 ------ ΪΤ ------ 0 (Please read the precautions on the back before I private page)-· '. A8 406249? 8s D8 VI. Scope of patent application (please read the precautions on the back, and then, scold this page) A controller (460, 560) is based on at least the embedded watermark (W) A display permission and a copy permission and the decryption ticket (441). 7. If the receiver (400, 500) of item 6 of the patent application scope, further includes a key generator (420) to generate a key (421) to provide to the ticket decryptor (430) to decrypt the encrypted ticket (431) to form a decrypted ticket (441). 8. The receiver (400, 500) as claimed in claim 7 in which the key generator (420) includes a Diffie-Heilman key exchange system. 9. If the receiver (400,500) of item 6 of the patent application park, further includes a confirmer (410) to provide a confirmation (411) to a device (30000) to provide the received communication (401) To assist in the generation of encrypted ticket cards (43 1). 10. If the receiver (400,500) of item 6 of the patent application scope, further including the controller (460,560), based on at least one of the hash decryption ticket cards (441), the decision is made to display at least one of permission and copy permission . 11. If the receiver (400,500) of the patent application No. 6 is included, it also includes at least one of the display (400) and a replicator (500). 12. — A method of communicating copyright information, including: Encryption printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs (635) — Ticket card (341) associated with copyright information to form a receiver-based encrypted ticket card ( 33 1), and the copyright information communication (640) encrypts the ticket card to a receiving device (400, 500) to assist in strengthening the copyright based on whether the receiving device (400, 500) is the receiver. 13. If the method of the scope of application for the patent No. 12 includes the generation of -19 depending on the receiver used to encrypt (635) the ticket card (341)-This paper size is applicable to China National Standards (CNS) A4 Grid (210X297 mm) 406249 ab! Cd Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 6. One-click application for patent coverage (321). M. The method according to the scope of patent application, wherein the steps of generating the key (321) include effecting a Diffie-Heilman key exchange system. 15. If the method of claim 12 is applied, the method further includes confirming that the receiving device (400, 500) is the intended receiver. 16. — A method for compulsory protection of copyright information, including: Decryption (655) — Encryption ticket card (431) to form a decryption ticket card (441), decide (670, 680) to decrypt the ticket card (441) and one At least one of the display permission and the copy permission depends on the watermark embedded in the copyright information. 17. The method of claim 16 in the scope of patent application, further comprising generating a key (421) for decrypting the encrypted ticket card (431). 18. The method of claim 17 in the scope of patent application, further comprising the step of generating a key (421), including effecting a Diffie-Heilman key exchange system. 19. The method of claim 16 in the scope of patent application, further comprising a step of determining (670,680) at least one display permission and copy permission based on at least one hash decryption ticket (441). -20- This paper size applies to Chinese National Standard (CNS) A4 specification (210X297 mm) ----------- ^ ------, 1T ------ 0 * ( Please read the notes on the back before i, this page),-_
TW088113007A 1998-07-14 1999-07-30 Copy protection by ticket encryption TW406249B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US9272798P 1998-07-14 1998-07-14
US33362899A 1999-06-15 1999-06-15

Publications (1)

Publication Number Publication Date
TW406249B true TW406249B (en) 2000-09-21

Family

ID=26785979

Family Applications (1)

Application Number Title Priority Date Filing Date
TW088113007A TW406249B (en) 1998-07-14 1999-07-30 Copy protection by ticket encryption

Country Status (5)

Country Link
EP (1) EP1145243A3 (en)
KR (1) KR20010023967A (en)
CN (1) CN1333975A (en)
TW (1) TW406249B (en)
WO (1) WO2000004549A2 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8171520B2 (en) 2000-03-02 2012-05-01 Tivo Inc. Method of sharing personal media using a digital recorder
US7908635B2 (en) 2000-03-02 2011-03-15 Tivo Inc. System and method for internet access to a personal television service
US8261315B2 (en) 2000-03-02 2012-09-04 Tivo Inc. Multicasting multimedia content distribution system
US8812850B2 (en) 2000-03-02 2014-08-19 Tivo Inc. Secure multimedia transfer system
US20020166056A1 (en) * 2001-05-04 2002-11-07 Johnson William C. Hopscotch ticketing
CN100356789C (en) * 2004-09-01 2007-12-19 华为技术有限公司 Method and device for protecting broadband audio-video broadcasting content
CN100364332C (en) * 2004-09-01 2008-01-23 华为技术有限公司 Method for protecting broadband video-audio broadcasting content
US9967534B1 (en) 2004-11-19 2018-05-08 Tivo Solutions Inc. Digital video recorder video editing system
JP4140624B2 (en) * 2005-09-16 2008-08-27 ソニー株式会社 Information processing apparatus, information recording medium manufacturing apparatus, information recording medium and method, and computer program
CN101052068B (en) 2006-04-03 2011-04-06 华为技术有限公司 Device and method for providing wet current
CN101558645B (en) * 2006-12-11 2012-05-23 汤姆森特许公司 Text-based anti-piracy system and method for digital cinema

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5574787A (en) * 1994-07-25 1996-11-12 Ryan; John O. Apparatus and method for comprehensive copy protection for video platforms and unprotected source material
KR0136458B1 (en) * 1994-12-08 1998-05-15 구자홍 Copy protection apparatus of digital magnetic recording and reproducing system
CA2179223C (en) * 1995-06-23 2009-01-06 Manfred Von Willich Method and apparatus for controlling the operation of a signal decoder in a broadcasting system
CN1160955C (en) * 1995-10-09 2004-08-04 松下电器产业株式会社 Data transmitter, data transmitting method, data receiver, information processor, and information recording medium
WO1997043853A1 (en) * 1996-05-15 1997-11-20 Macrovision Corporation Method and apparatus for copy protection of copyrighted material on various recording media
EP0906700B1 (en) * 1997-01-27 2002-09-11 Koninklijke Philips Electronics N.V. Method and system for transferring content information and supplemental information relating thereto
JP3794646B2 (en) * 1997-08-26 2006-07-05 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ System for transferring content information and supplementary information related to it

Also Published As

Publication number Publication date
EP1145243A3 (en) 2004-11-03
CN1333975A (en) 2002-01-30
WO2000004549A2 (en) 2000-01-27
KR20010023967A (en) 2001-03-26
EP1145243A2 (en) 2001-10-17
WO2000004549A3 (en) 2001-06-07

Similar Documents

Publication Publication Date Title
US8601590B2 (en) Content distribution system
US7310731B2 (en) Contents processing system
KR101574618B1 (en) Recordingreproducing system recording medium device and recordingreproducing device
TW412909B (en) Mechanism of matching between a receiver and a security module
JP4857123B2 (en) Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method
JP3542088B2 (en) Data content utilization system
US6868404B1 (en) Digital data recording device, digital data memory device, and digital data utilizing device for converting management information which contains restrictive information using a different key in each management information send/receive session
JP5154830B2 (en) Content distribution system
US9305148B2 (en) Economically secure digital mass media systems
JP2000341263A (en) Information processing device and its method
KR20010112428A (en) Method of and apparatus for providing secure communication of digital data between devices
JPH0944993A (en) Information recording method and device therefor, function recording method and device therefor and information reproducing method and device therefor
TW406249B (en) Copy protection by ticket encryption
JP2003195759A (en) Ciphered data generation method, recorder, recording medium, deciphering method, recording medium player, transmitter and receiver
JP2007124717A (en) System for preventing illegal copying of digital content
JP2005102055A (en) Encryptor and decoder
JP2000122539A (en) Book protection system
JP3556891B2 (en) Digital data unauthorized use prevention system and playback device
JP4713745B2 (en) Authentication communication apparatus and authentication communication system
JP2000022680A (en) Digital contents distribution method and recording medium reproducibly recording contents
JP2001325387A (en) Data generating device, data management system, data generating method, and data managing method
JP2000324096A (en) Contents protection system
JPH11250571A (en) Information distributing device, terminal device and information distributing system
JP2000196582A (en) Method for recording, utilizing and information for preventing illegal use by employing storage media identifier
JP2004312717A (en) Data protection management apparatus and data protection management method

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees