IAC060140.TW 21694twf.doc/n 九、發明說明: 【發明所屬之技術領域】 ^發明係關於-種數位資料的加密解密方法,特別是關 解密的=持通喊置所下載之數位影音資料進行加密與 【先前技術】 隨著行動軌時代的來臨,祕世 =㈣除了提供—個更為便捷的溝通管道之外, :以:由,通訊襄置隨時隨地發送電子郵件、_ 、、甚至疋下載網路資源。透過無線通訊網路,不僅替 現代人創造出更為豐富有趣的生 取得與相互技資訊的便利性。门咖升了人們 基=手持,訊農置具有相當良好的可攜性與移動 仃動上網儼然成為—軸流與趨勢。也正因如此, 2利用無線通訊網路取得各式#訊的機會也跟著大幅 t升:為了避免伴隨著利用手持通城置下載網路資 f ’進而可能引發非法複製、使用、或是傳遞資料等種 相關問題’如何保護網路上流傳的數位資料也逐 漸成為電信業者所著重的議題之一。 針對數位資料容易被·及散佈的特性,最近更發 展用以保護數位資料的數位版權管理(Digita! RightsIAC060140.TW 21694twf.doc/n IX. Description of the invention: [Technical field to which the invention pertains] ^The invention relates to the method of encrypting and decrypting digital data, especially the digital audio and video data downloaded by the decryption Encryption and [previous technology] With the advent of the era of action, the secret world = (four) in addition to providing a more convenient communication channel: by:, communication, send e-mail, _, and even 随时 anytime, anywhere Download network resources. Through the wireless communication network, it not only creates more interesting and interesting information about the acquisition and mutual information for modern people. The door café has risen to people. The base = hand-held, the information on the farm has a very good portability and mobile swaying the Internet has become an axial flow and trend. For this reason, 2 the opportunity to use the wireless communication network to obtain various types of news is also greatly increased: in order to avoid the use of handheld Internet access to download network resources, which may lead to illegal copying, use, or transfer of data. Other related issues 'How to protect the digital data circulating on the Internet has gradually become one of the topics that telecom operators are focusing on. Digital copyright management to protect digital data has recently been developed for the convenience and spread of digital data (Digita! Rights
Manageme^ DRM)技術。數位版權管理技術簡單來說, =位貞料進彳了加密動作,域其流通的管 二只允,有權限的使用者開啟使用。也就是說,受 $位版權s理機觸賴的触資料,無論是在播放 1330033 IAC060140.TW 21694twf.doc/n 或是在傳送上都會料1的_。如此—來不僅可以 維護著作權’同時也能避免上述資科被盜用的情況。 然而,目前由電信業者所提供的一些且有荦止轉寄 (forward減)機獅触料_,仍舊可以在儲存至個 人電腦設備之後,利用播放軟體來進行播放。這是因為 某些數位㈣官理麟在料錄位 動作時,僅只會在數位影音資料的標頭槽加上額;^ 並填入-串文字’而沒有對數位影音㈣的内容本身進 躲何加韻作。因此,個人電耻_放軟體在讀取 ^類^的數位影音資料時’只要忽略標頭檔中額外加入 立Hi ’直接找尋數位影音資料内容的開頭便可恣 思進仃播放。在無法避免未經授權的使用與播放,以及 =意㈣或傳位影音資料的情況下,將使得數位資 料之版權問題再次面臨挑戰。 ' 【發明内容】 有鑑於此’本發明的目的就是在提供 加密方法,根據手持通訊裝置的識別資訊,同二3 =數位影音資料的標頭檔以及内容部份進行加密,因此 可以避免未經授權的裝置盜用此數位影音資料。 法再—目的Μ供一種數位影音資料解密方 ^ 料資料的標頭檔判斷手持通訊裝置的使用 權限’並在❹權限較後以逐個㈣g =放數位影音㈣,節省解密數位影音:#料所需要= 基於上述及其他目的’本發明提出一種數位影音資料 IAC060140.TW 21694twf.doc/n 加密方法,適於加密由手持通訊裝置所下载之數位影音 貧料。其中,數位影音資料包括了標頭檔及多個資料區 塊,^方法包括下列步驟:首先’記錄手持通訊裝置之 識別貢訊於數位影音資料之標頭财^接著職據手持 通訊裝置之識別資訊及㈣麵產生金鑰,然後再依序 下載數位影音資料之資料區塊,而以此金鱗每個 區塊進行加密。 —再從另-觀點來看,本發明提出—種數位影音資料解 密方法,適於解密儲存於手持通絲置之巾的數位影音 資料。其巾’此數位影音資料包括標頭檔及多個資料^ 塊。本方法包括下列步驟:首先係讀取數位影音資料之 標頭槽^並騎此標頭财的朗資訊是否與手持通訊 裝置相符。若識別資訊相符’則根據識別資訊及私密金 鑰產生金鑰,並依序讀取數位影音資料之資料區塊, 以此金鑰解密各個資料區塊。 个货^保以手持通訊裝置的識別資訊,來對下载的 數位影音資料進行加密動作,目此能避免數位影音 被?到士他漿置上任意使用。同時在對此數位影音資料 進行解密時,村支援即時解密及播放, 播放所需要的等待時間。 解在及 為讓本發明之上述及其他目的、特徵和優點能更明 顯易懂’下文特舉本發明之較佳實施例,並配合所 式’作詳細說明如下。 【實施方式】 為了保護數位影音資料之數位版權,在下载數位影音 1330033 IAC060140.TW 21694twf.doc/n 貧料的同時,若能根據下載裝置本身 1 下載的數位影音資料進行加密動作;^’十目别所 僅能在此褒置嫩,即能夠麵數位二==料 而達到數位版權二 ㈣音資料加密===,種數 瞭,以下特舉實施例作為本發明内容更為明 m ^ 確霄能夠據以實施的範例。 方J、i f Γ明較佳實施咖會示之數位影音密 方法,以下係由手之數心音資料加密 數位费立資裝置下载數位影音資料,並對此 厂貝#進订加讼動作來做為詳細說明 頭檀:1數=料=母個數位影音資料中’包括了-個標 後,】I手持通訊裝置開始下载數位影音資料 立lit 置會財赖識職訊,記錄在數位影 ;:==啸110)。而此識別資訊例如包括能辨; MobilTp 的行動通關際朗碼(Im— 裝置的裝qr=Wen卿’細^亦或是能代表手持通訊 在本實_巾係以錢加龍術賴位影音 :加:動作’故如步驟12〇所示,以例如手持通訊 際識別碼或是裝置型號為基礎,並辅:私 在步驟記錄在標頭針的是手持通訊裝“行^ 1330033 IAC060140.TW 21694twf.doc/n 訊國際識別碼,那麼在步驟12() t便可轉據此行動通 訊國際識別碼或是裳置型號,以及私密金錄來產生金 鑰。然而’若在步驟11〇 _,記錄於標頭檔尹的是 訊裝置的裝置魏,那麼在步驟⑽巾便會根據裳置 號及私密金鑰來產生金鑰。兩者的差财於 標頭财的是手持通崎置之行動通關際識別碼^ 除了原先下載數位影音資料的手持通訊聚置之外,任何 其他裝置皆無法對加密後的數位影音資料進行解密;而 當記錄在標頭檔中的是手持通訊裝置的裝置型號^,所 有和下載此數位影音資料具有相同裝置型號的手持通訊 ,置,皆可以對此數位影音資料進行解密動作。值得二 提的是,在本實施例中私密金鑰僅有實作本發明之數位 〜曰資料加岔方法的程式設計人員才知道其内容,故可 加強加密效果。 接著,以資料區塊為單位下載此數位影音資料,暫 存至手持通訊裝置的緩衝記憶體中(步驟13〇)。並對每個 鲁 暫存於手持通訊裝置之緩衝記憶體中的資料區塊,利用 由步驟120所產生之金鑰’對其進行加密動作(步驟14〇)。 最後在步驟150判斷此影音資料是否還有資料區塊 尚未下載完全。若還有資料區塊尚未下載,那麼便回到 步驟130,繼續下載下一個資料區塊,並進行加密動作, 直到此數位影音資料全部的資料區塊皆下載完成為止。 在本實施例中’手持通訊裝置例如可以透過無線通訊網 路連接至電信主機(例如電信業者提供下載服務的主機系 、、·先)並依據例如無線應用通δίΐ協定(Wireless Application 9 IAC060140.TW 21694twf.doc/n P她C0卜WAP)從電信主機開始下載數位影音資料。除 外,手持通訊裝置例如還可以透過網際網路連接至網路 服器,並從網路伺服器開始下載數位影音資料。°Ί 在另-實施例中,在下載每個資料區塊並對其進行加 動作之後’還能將加密後的資料區塊儲存至例如手持通 置内建的記憶體’亦或是外接的記憶卡中,以保存此數位ς 音資料。 〜 由上述實施例不難發現,在下載數位影音資料時,利用 手持通訊裝置的識別資訊來對數位影音資料進行加密,將倉t ,免其他财置任意開啟、複製,或使用加密後的數位影= =貝料。當使用者想要開啟儲存在手持通訊裝置内加密過的 數位影音資料時,手持通訊裝置會判斷本身是否具有開 =此數位影音資料的使用權限,並對加密後的數位影音 資料進行相對應的解密動作。以下則另舉一實施例說; 本發明之解密數位影音資料的詳細步驟。 圖2為本發明較佳實施例所繪示之數位影音資料解密 方法之流程圖,本實施例係接續先前個實施例,在將數位影 料加密之後,若使用者欲以手持通訊裝置播放此數位= 音貧料時,亦必須使用相同的識別資訊,將此數位影音資料 解密後才能播放。其中,數位影音資料例如可以是音樂檔案 或影像檔案’且包括了標頭檔以及數個資料區塊。 、 請參閱圖2,在開始讀取數位影音資料時,第一步係將 此數位影音資料的標頭檔讀取出來(步驟210)。其中,在 此數位影音資料的標頭檔中已記錄當初下載此數位影音 資料之手持通訊裝置的識別資訊。 IAC060140.TW 21694twf.d〇c/i 接著,手持通訊裝置會藉由檢查此數位影音資料之標 頭標中記錄的識㈣訊是否與本身的相符,來辨別是否 具有播放此數位影音資料的權限(步驟220)。在本實施例 中,手持通訊裝置的識射關如包括手魏訊裝置的行動 ,關際朗碼,或是手持通崎置的裝置型號。也就 是說,若是手持通訊裝置的行動通賴際識別碼,虚記 錄在數位f彡音㈣之標頭射的行動通簡際識別碼不 付;亦或是此手持通訊裝置的裝置型號’與記錄在數位 影音資料之標頭檔中的裝置型號不—致,都表示儲存此 數位影音資料的手㈣贿置料具有使用數 料的權限。 貝 反之’在步驟220中若手持通崎置的朗資訊與數位 影音貧料的標頭檔相符合,那麼手持通訊裝置 音資料之資料區塊(步驟230),並根據手持通訊 別貢訊以及私密金鑰來產生金鑰,而用以對每個資 塊進行解密動作(步驟240)。 、 °° 一值得一提的是,上述之金鑰會對應記錄於數位麥立 =料之標頭檔中的内容。詳細地說,若儲存此數位^二 資料的手持通訊裝置本身之行動通訊國際識別碼, 錄在數位影音資料之標頭檔中的行動通訊國際識別 同’那麼在進行解密動作時便會根據行動㉟訊國際識7 碼,或是手持通訊裝置的裝置型號,並輔以私密金鑰來 產生金鑰以解密資料區塊。若儲存此數位影音資料 持通訊裝置之裝置型號,與記錄在數位影音^料之椤= 檔内的裝置型號相同時,解密動作將會利用根據裝^ 1330033 IAC060140.TW 2l694twf.doc/n 號及私密金騎共M生的錢,來對#倾塊進行解 密。在本實施射,與特通訊裝置的削資訊共同產 之金,私密麵,例如雜齡程式財且 私式設計人貝知其内容,故可避免f料區塊被輕易 解掛。 取後在圖2之步驟攻中,若依舊存在尚未讀取及 成❹料區塊’則回到步驟230,繼續進行讀取資 料區塊以及對其進行解密的動作。 在另·^例巾’在手持通訊裝置每讀取完―個資料區 ί搜並對此資料區塊進行解密之後,還能將解密後的資料區 至手持=裝置的播放器,以即時播放解密完成的資 嫉品科㈤料整她位料資㈣解紋錢才進行 播放。 值得=提的是’在手持通訊裝置確認此數位影音資料 的標頭财合本身的朗魏時,手持通訊裝置還可以利用 卜線模組:藍芽模組、或傳輸線等傳輸介面,將儲 子,、的數位影音資料傳送到外部設備(例如個人電 腦)’以進行資料備份。 在上述實施例中’手持通訊裝置例如包括手機、個人 、及智慧型手機等具有下載及播放數位影 曰Μ^之功此的通訊裝置,在此並不限制其範圍。 綜上所述,本發明之數位影音資料加 具有下列優點: 1.利用手持通喊置本身的酬f訊作為加密 的依據’請止其絲置任意的❹或複製㈣過後的 12 1330033 IAC060140.TW 21694twf.doc/n 數位影音資料。 2.以資料區塊為單位,來進行數位影音資料的解 作,故能在每個貢料區塊解密之後即時播放之 山 3.允許具有制權限的顿軌裝置對加密後數位 影音資料進行備份’據以避免因顿軌裝置 存單元損毀而造成遺失數位影音資料的損失。Manageme^ DRM) technology. In digital terms, the copyright management technology simply means that the encryption operation is carried out, and the domain of the domain is allowed to pass. In other words, the touch data that is touched by the copyright of the $bit, whether it is playing 1330033 IAC060140.TW 21694twf.doc/n or _ on the transmission. In this way, not only can the copyright be maintained, but also the situation in which the above-mentioned capital is stolen can be avoided. However, some of the lions that are currently being offered by telecom operators can still be played using the playback software after being stored in a personal computer device. This is because some digital (4) Guan Lilin only adds the amount in the header slot of the digital video material when the recording position is moved; ^ and fills in the - string text ' without the content of the digital video (4) itself. He Jia Yun Zuo. Therefore, when the personal electric shame _ software is reading the digital audio and video data of the ^ class ^, as long as you ignore the additional addition of the Hi Hi' in the header file, you can directly search for the content of the digital audio and video content. In the case of unavoidable use and playback, and the use of audiovisual material, the copyright issue of digital data will once again be challenged. [Invention] In view of the above, the object of the present invention is to provide an encryption method, according to the identification information of the handheld communication device, and the header file and the content portion of the second and third digits of the audio and video data are encrypted, thereby avoiding the Authorized devices steal this digital video material. The law is again - the purpose is to provide a digital audio and video data decryption method, the header file of the data is used to determine the use rights of the handheld communication device' and after the privilege is later, one by one (four) g = put the digital video (four), saving the decrypted digital video: #料Needed = based on the above and other purposes' The present invention proposes a digital audio and video material IAC060140.TW 21694twf.doc/n encryption method suitable for encrypting digital audio and video poor materials downloaded by a handheld communication device. Among them, the digital audio and video data includes a header file and a plurality of data blocks, and the method includes the following steps: first, 'recording the identification of the handheld communication device, and the identification of the digital audio and video data, and the identification of the handheld communication device. The information and (4) face generate the key, and then download the data block of the digital audio and video data in sequence, and encrypt each block of the golden scale. - From another point of view, the present invention proposes a digital audio and video data decryption method suitable for decrypting digital audio and video data stored in a hand-held towel. The digital audio and video material of the towel includes a header file and a plurality of data blocks. The method comprises the steps of: first reading the header slot of the digital audio and video data and riding the header information of the header to match the handheld communication device. If the identification information matches, the key is generated according to the identification information and the private key, and the data block of the digital audio and video data is sequentially read, and each data block is decrypted by using the key. The goods are protected by the identification information of the handheld communication device to encrypt the downloaded digital audio and video data, thereby avoiding the digital audio and video being avoided. Use it freely on the Shita slurry. At the same time, when decrypting this digital audio and video data, the village supports instant decryption and playback, and the waiting time required for playback. The above and other objects, features and advantages of the present invention will become more apparent <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; [Embodiment] In order to protect the digital copyright of digital audio and video data, while downloading digital audio and video 1330033 IAC060140.TW 21694twf.doc/n, the encryption operation can be performed according to the digital audio and video data downloaded by the download device itself; ^' The target can only be set up here, that is, the number of digits can be doubled == material and the number of copyrights (four) sound data encryption ===, the number of species, the following specific examples are more obvious as the content of the present invention. Be sure to follow the example of implementation. Fang J, if Γ明 is better to implement the digital video and audio secret method of the coffee show. The following is the download of digital audio and video data by the number of heart sound data encryption digital fee device, and the factory In order to explain in detail the head Tan: 1 number = material = mother digital video data in 'included - after the standard," I handheld communication device began to download digital audio and video data to lit up the financial information, recorded in the digital video; :== Xiao 110). And this identification information includes, for example, the identification; MobilTp's action clearance code (Im - device installed qr = Wenqing 'fine ^ or can represent handheld communication in the real _ towel with money plus dragon technology : Add: action 'as shown in step 12 ,, based on, for example, the hand-held communication ID or the device model, and supplemented: the private step recorded in the header is the handheld communication device "Line ^ 1330033 IAC060140.TW 21694twf.doc/n International identification code, then in step 12 () t can be transferred to the mobile communication international identification code or the model, and the private record to generate the key. However, if in step 11 〇 _ Recorded in the header file Yin is the device of the device, then in step (10) the towel will generate the key according to the dress number and the private key. The difference between the two is the hand-held Fujisaki The action identification code ^ In addition to the handheld communication device that originally downloaded the digital audio and video data, no other device can decrypt the encrypted digital audio and video data; and when recorded in the header file is the handheld communication device Device model ^, all and download The digital audio and video data has the same device type handheld communication, and can decrypt the digital audio and video data. It is worth mentioning that in this embodiment, the private key only implements the digital information of the present invention. The programmer of the twisting method knows the content, so the encryption effect can be enhanced. Then, the digital audio and video data is downloaded in units of data blocks and temporarily stored in the buffer memory of the handheld communication device (step 13). For each data block temporarily stored in the buffer memory of the handheld communication device, the encryption operation is performed by using the key generated by step 120 (step 14〇). Finally, in step 150, it is determined whether the video data is There is also a data block that has not been completely downloaded. If there is still a data block that has not yet been downloaded, then go back to step 130, continue to download the next data block, and perform the encryption action until all the data blocks of the digital audio and video data are downloaded. In this embodiment, the 'handheld communication device can be connected to the telecommunication host via a wireless communication network, for example (for example, the telecommunication provider provides The host system of the service, first) and download the digital audio and video data from the telecommunication host according to, for example, the wireless application protocol (Wireless Application 9 IAC060140.TW 21694twf.doc/n P her C0 WAP). Except for the handheld communication device For example, it is also possible to connect to a web server through the Internet and download digital audio and video data from the web server. ° In another embodiment, after downloading each data block and adding it to it' The encrypted data block can also be stored, for example, in a built-in built-in memory or an external memory card to store the digital audio data. ~ It is not difficult to find out in the above embodiment that the digital number is downloaded. In the case of audio and video data, the identification information of the handheld communication device is used to encrypt the digital audio and video data, and the warehouse can be opened, copied, or encrypted, or the encrypted digital image is used. When the user wants to open the digital audio and video data stored in the handheld communication device, the handheld communication device determines whether it has the right to use the digital video data, and corresponding to the encrypted digital audio and video data. Decrypt the action. In the following, another embodiment will be described; the detailed steps of decrypting digital audio and video data of the present invention. 2 is a flow chart of a method for decrypting digital audio and video data according to a preferred embodiment of the present invention. This embodiment is continued from the previous embodiment. After encrypting the digital video material, if the user wants to play the mobile communication device. When the digit = sound is poor, the same identification information must be used to decrypt the digital audio and video data before playing. The digital audio and video material may be, for example, a music file or an image file' and includes a header file and a plurality of data blocks. Referring to FIG. 2, when the digital audio and video material is started to be read, the first step is to read the header file of the digital audio and video material (step 210). The identification information of the handheld communication device that originally downloaded the digital audio and video data is recorded in the header file of the digital audio and video material. IAC060140.TW 21694twf.d〇c/i Next, the handheld communication device will determine whether or not there is permission to play the digital audio and video material by checking whether the identification (4) recorded in the header of the digital audio and video data matches its own. (Step 220). In this embodiment, the identification of the handheld communication device is such as the action of the hand-held device, the key code, or the device model of the handheld. That is to say, if the mobile communication device's mobile communication identification code, the virtual record is not paid in the action of the digital f sound (four) header; or the device type of the handheld communication device' The model of the device recorded in the header file of the digital audio and video data does not mean that the hand storing the digital audio and video material (4) has the right to use the materials. In the step 220, if the hand-held information of the hand-held communication device is matched with the header file of the digital audio-visual material, the data block of the communication device audio data is transmitted (step 230), and according to the handheld communication, The private key generates a key for decrypting each of the blocks (step 240). , ° ° It is worth mentioning that the above-mentioned key will correspond to the content recorded in the header file of the digital data. In detail, if the mobile communication international identification code of the handheld communication device itself storing the digital data is recorded, the international identification of the mobile communication recorded in the header file of the digital audio and video data is then [based on the action of decrypting The international model 7 code, or the device model of the handheld communication device, is supplemented with a private key to generate a key to decrypt the data block. If the device model of the digital audio and video data sharing device is stored, and the device model recorded in the video file of the digital video device is the same, the decryption action will be performed according to the number of the device 1330033 IAC060140.TW 2l694twf.doc/n and Private gold rides a total of M students' money to decrypt the #倒块. In this implementation, the information produced by the special communication device is combined with the information, and the private surface, such as the mixed-age program and the private designer, knows its contents, so that the f-block can be easily unloaded. After the attack in the step of Fig. 2, if there is still a block that has not been read and formed, then the process returns to step 230, and the operation of reading the data block and decrypting it is continued. In the other case, after the user has read the data area and decrypted the data block, the decrypted data area can be zoned to the player of the handheld device for instant playback. The declassified asset department (5) is expected to complete the material in her position (4). It is worthwhile to mention that 'when the handheld communication device confirms the header of the digital audio and video material, the handheld communication device can also use the transmission module: the Bluetooth module, or the transmission line, etc. The digital audio and video data of the sub, and is transferred to an external device (such as a personal computer) for data backup. In the above embodiments, the portable communication device includes, for example, a mobile phone, a personal computer, and a smart phone, and the communication device having the function of downloading and playing back a digital video, and the scope thereof is not limited herein. In summary, the digital audio and video data of the present invention has the following advantages: 1. Using the hand-held voice to set its own compensation as the basis for encryption 'Please stop the wire to set any ❹ or copy (4) after 12 1330033 IAC060140. TW 21694twf.doc/n Digital audio and video material. 2. The data block is used as the unit to perform the decoding of digital audio and video data, so it can be played immediately after decryption of each tribute block. 3. Allow the track device with the authority to perform the encrypted digital video data. Backed up to avoid loss of lost digital audio and video data caused by damage to the storage unit of the track device.
雖然本發明已啸佳實關㈣如上,㈣ 以限定本發明’任何熟習此技藝者,在不脫離本發明之 精神和範圍内’當可作些許之更動與潤飾,因此:發明 之保護範圍當視後附之申請專利範圍所界定者為準。X 【圖式簡單說明】 圖1為本發明較佳實施例所繪示之數位影音資料加 方法之流程圖。 圖2為本發明較佳實施例所繪示之數位影音資料解密 方法之流程圖。Although the present invention has been described in the above, (4) to limit the present invention, any person skilled in the art can make some changes and refinements without departing from the spirit and scope of the present invention. This is subject to the definition of the scope of the patent application. X [Simple Description of the Drawings] FIG. 1 is a flow chart of a method for adding digital audio and video data according to a preferred embodiment of the present invention. 2 is a flow chart of a method for decrypting digital audio and video data according to a preferred embodiment of the present invention.
以能節省解 密與播放所需要的時間 【主要元件符號說明】 110〜150 :本發明較佳實施例所述之數位影音資料加 密方法之各步驟 、 210〜250 :本發明較佳實施例所述之數位影音資料解 密方法之各步驟 13The time required for the encryption and playback can be saved. [Main component symbol description] 110 to 150: steps of the digital video data encryption method according to the preferred embodiment of the present invention, 210 to 250: the preferred embodiment of the present invention Step 13 of the method for decrypting digital audio and video data