TWI336584B - Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method - Google Patents

Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method Download PDF

Info

Publication number
TWI336584B
TWI336584B TW93115469A TW93115469A TWI336584B TW I336584 B TWI336584 B TW I336584B TW 93115469 A TW93115469 A TW 93115469A TW 93115469 A TW93115469 A TW 93115469A TW I336584 B TWI336584 B TW I336584B
Authority
TW
Taiwan
Prior art keywords
key
device key
decoding
password
memory
Prior art date
Application number
TW93115469A
Other languages
Chinese (zh)
Other versions
TW200539643A (en
Inventor
Baiko Sai
Original Assignee
Rohm Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rohm Co Ltd filed Critical Rohm Co Ltd
Priority to TW93115469A priority Critical patent/TWI336584B/en
Publication of TW200539643A publication Critical patent/TW200539643A/en
Application granted granted Critical
Publication of TWI336584B publication Critical patent/TWI336584B/en

Links

Landscapes

  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Description

1336584 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種認證數位密碼處理裝置用之裝置鍵 保護方法,可利用該方法之加密碼裝置與解碼裝置以及影 像發送裝置與影像接收裝置。 【先前技術】 在對 LCDCLiquid Crystal Display :液晶顯示器)監 視盗或CRT(Cathode-Ray Tube :陰極射線管)監視器進行 視頻訊號之數位傳輸的方式之一中,有DVI(Digital Visual Interface:數位視覺介面)規格。當對lCD監視器 或CRT監視器進行視頻訊號之類比傳輸時,會有容易因波 肜失真等而產生顯示畫面之晝質劣化的問題,但是在 規格中,由於係利用數位編碼方式來傳輸視頻訊號,所以 沒有傳輪失真,而可顯示高品質之晝面。又,DVI規格亦 開始應用於將數位廣播或有線廣播之視訊轉換盒(set t〇p box)連接在數位電視,或將DVD(Digital Vide〇 Disk :數 位影音光碟)等之數位播放機連接在LCD監視器上,以顯示 敫位影像的情況。 DVI規格中,由於其可利用高品質之影像内容 (contents) ’所以為了所提供之影像内容不致被不正當播 玫’或被違法拷貝’有提案一種HDCP (High_bandwidthBACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a device key protection method for authenticating a digital cryptographic processing device, a cryptographic device and a decoding device, and an image transmitting device and a video receiving device. [Prior Art] In the LCDCLiquid Crystal Display: One of the ways to monitor the digital transmission of video signals by Certified or CRT (Cathode-Ray Tube) monitors, there is DVI (Digital Visual Interface). Interface) specifications. When analog video transmission is performed on an lCD monitor or a CRT monitor, there is a problem that the quality of the display screen is easily deteriorated due to the distortion or the like, but in the specification, the video is transmitted by the digital encoding method. Signal, so there is no transmission distortion, but can display high quality. In addition, the DVI specification has also been applied to connect a digital telecommunication broadcast box (set t〇p box) to a digital TV, or to connect a digital player such as a DVD (Digital Vide 〇 Disk). On the LCD monitor, the situation of the digital image is displayed. In the DVI specification, HDCP (High_bandwidth) is proposed because it can utilize high-quality video content so that the video content provided is not improperly broadcasted or illegally copied.

Digital Content Pr〇tecti〇n System :高頻寬數位内容保 護系統)規格作為内容保護方法。HDCp規格,在DVI規格 之影像訊號的傳輸系統中,係一種用以安全傳輸須受著作 5 335899 1336584 權保護之影像内容的·規格,其係就發送裝置與接收裝置間 之認證、認證用鍵之共有、及所傳輸之影像訊號的加密碼 等規格加以規定。 在HDCP規格等之認證中,係利用藉公開鍵密碼來個別 認證通訊對方之裝置用的裝置鍵。當在發送裝置與接收裝 置之間成功認證時,發送裝置使用裝置鍵將影像訊號予以 加密碼並發送,而接收裝置則使用裝置鍵將所接收之影像 訊號予以解碼。例如,參考文獻中有揭示一種使用HDCp 規格等之§忍證方式的數位影像傳輸裝置。 參考文獻:日本專利特開2002-314970號公報(全文, 第1至3圖) 個別認證影像訊號之處理裝置用的裝置鍵,係在該裝 置出貨時被寫入至 EEPR0M(ElectricaUy ErasableDigital Content Pr〇tecti〇n System: High-bandwidth digital content protection system) specifications as a content protection method. The HDCp specification is a specification for securely transmitting video content protected by the copyright of 5 335 899 1336584 in the transmission system of the DVI video signal. It is the authentication and authentication key between the transmitting device and the receiving device. The common and the specifications of the transmitted video signal plus the password are specified. In the authentication of the HDCP standard or the like, the device key for the device of the communication partner is individually authenticated by the public key code. When the authentication is successfully performed between the transmitting device and the receiving device, the transmitting device encrypts and transmits the video signal using the device key, and the receiving device decodes the received video signal using the device key. For example, a digital image transmission device using the § forcible mode of the HDCp specification or the like is disclosed in the reference. Reference: Japanese Laid-Open Patent Publication No. 2002-314970 (full text, Figs. 1 to 3) A device key for a device for individually authenticating an image signal is written to EEPR0M (Electrica Uy Erasable) when the device is shipped.

Programmable Read-only Memory :可電氣抹除可程式化唯 讀記憶體)等之外部記憶體内,或被寫入可自外部寫入、讀 出之内部記憶體内來提供。裴置鍵係被原樣寫入該外部記 憶體或内部記憶體内,由於不作任何保護,所以容易對外 部記憶體或内部記憶體進行存取而完全拷貝(dead c〇py) 裝置鍵,或觀測自外部記憶體流至本體裝 上之訊號而盜取裝置鍵之資料。由於無法事先=:因 惡意而取得裝置鍵,所以恐有影像内容遭不正#利用、著 作權遭侵害之虞。 又,由於DVD播放機、視訊轉換盒、數位電視接收機 等消費性製品用的裝置鍵多數係按照出貨台數而發行,所 315899 6 1336584 以即使其中一部分被完全拷貝利用,亦無法立即知道遭不、 正當利用之情形,且難以在事後發現裝置鍵遭完全拷貝、 或追蹤遭完全拷貝之取得路徑。又,即使知道裝置鍵遭不 正當利用,因為要變更裝置鍵之密碼與解碼之架構’故難 以再構建系統。 【發明内容】 β本發明係有鑒於該種狀況而開發完成者,其目的在於 提供一種可安全保護認證影像訊號或聲音訊號等數位訊號 之處理裝置的裳置鍵之方法,可利用該方法之加密碼裝置 與解碼裝置以及影像訊號發送裝置與影像訊號接收裝置。 ^本發明之一態樣係關於一種裝置鍵保護方法。該方法 係在所輸入之數位訊號的處理裝置内部,設置將個別認證 該裝置用之裝置鍵予以解碼的裝置鍵保護電路,在該裝置 之出貨階段將上述裝置鍵加密碼,並寫入至可自該裝置讀 取之記憶體内。該記憶體亦可設在裝置之外部或裝設在裝 置之内部,作為可改寫之EEPROM或快閃記憶體。在該裝置 之内4又没置系統再構建電路,用以在對上述裝置鍵保護 電路有不正當之存取時,將上述裝置鍵保護電路中之上述 裝置鍵的解碼方式再構建。數位喊可為影像訊號或聲音 =號’亦可為該等之組合。處理裝置可為數位訊號之發送 裝置、接收裝置之任一種。 本發明之另-態樣係關於一種數位訊號之加密瑪裝 、該裝置包含· s己憶體’將個別認證該裝置用之裝置鍵 予以加密碼並保存;裝置鍵保護電路,自上述記憶體讀取 315899 7 1336584 經加密碼後之上述裝·置鍵’並予以解碼;以及加密碼部, 使用經解碼之上述裝置鍵’將所輸入之數位訊號予以加密 碼。裝置鍵保護電路與加密碼部可安裝在該裝置之内部作 為LSI電路’且裝置鍵之解碼可在LSI電路進行内部處理, 並構成無法自外部觀測。上述記憶體雖亦可設在⑶電路 基板上,但是自記憶體至裝置鍵保護電路之資料的傳輸路 徑,可由例如串列匯流排等之外部匯流排所構成,而可觀 測傳至匯流排之訊號。 本發明之再另一態樣係關於一種數位訊號之解碼裝 _ 置。該裝置包含:記憶體,將個別認證該裝置用之裝置鍵. 予以加密碼並保存;裝置鍵保護電路,自上述記憶體讀取. 經加密碼後之上述裝置鍵,並予以解碼;以及解碼部,使 用經解碼之上述裝置鍵,將所輸入之數位訊號之密碼予以 解碼。 上述加岔碼裝置及上述解碼裝置,亦可更包含使用預 定秘岔鍵與相對於上述裝置鍵之公開鍵來產生工作鍵的系 統再構建電路,上述裝置鍵保護電路亦可使用上述系統再· 構建電路所產生之上述工作鍵將上述裝置鍵予以解碼。在 此,在裝置鍵保護電路遭受攻擊時,亦可藉由變更上述秘 密鍵,來將上述裝置鍵保護電路中之上述裝置鍵的解碼方' 式号構建。 本發明之其他另一態樣係關於一種影像發送裝置。該 裝置包含:加密碼處理塊’將所輸入之影像訊號加密竭; 以及影像發送處理塊,將經加密碼後之上述影像訊號進行 315899 8 1336584 、扁馬處理並予以發送;上述力口密碼處理塊包含:記憶體, 將利用公開鍵密喝進行認證用的裝置鍵予以加密碼並保、 存;系統再構建電路,使用預定秘密鍵與上述裝置鍵之公‘ 開鍵來產生工作鍵;裝置鍵保護電路,自上述記憶體讀取 經加密碼後之上述裝置鍵,並使用上述卫作鍵予以解石馬; 以及加密碼部,使驗解碼之上述裝置鍵,將上述影像 號予以加密碼。 本發明之又另一態樣係關於一種影像接收裝置。該裴 置包含:影像接收處理塊,接收經編碼之影像訊號並進行_ 解碼處理;以及解碼處理塊,將經解碼處理後之上述影像 訊號的密碼予以解碼;上述解碼處理塊包含:記憶體了將· 利用公開鍵密碼進行認證用的裝置鍵予以加密碼並保存; 系統再構建電路’使用預定之秘密鍵與上述裝置鍵之公開 鍵來產生工作鍵;裝置鍵保護電路’自上述記憶體讀取經 加密碼後之上述裝置鍵,並使用上述工作鍵予以解碼;以 及解碼部’使用經解碼之上述裝置鍵,將上述影像訊號之 岔碼予以解碼。 · 相另外’將以上構成要素之任意組合、本發明之技術思 4在方法、裝置、系統、記錄媒體、電腦程式、半導體裝 置等之間轉換者,亦屬於本發明之有效態樣。 此外,本發明之上述要旨摘述並不包括全部必要特 點,故本發明亦可為該等描述特徵之次組合。 【實施方式】 σ 錄根據較佳具體例說明本發明,但其僅視作發明之例 315899 9 !336584 示,而非本發明之範圍限制。在具體例中所描述者並未包 括全部特徵及其組合。 (第1實施形態) 第1圖係第1實施形態之内容訊號之傳輸系統的構成 圖。加密碼裝置1 〇〇係接受包含影像訊號及聲音訊號之内 容訊號的輸入,HDCP密碼部1〇按照HDCP規格將所輸入之 内谷訊號予以加密碼,並介以DVI端子傳輸至dv I電繞4 0 上。解碼裝置200係接收介以dvI端子傳輸至dvI電纜4〇 而來之經加密碼後的内容訊號,HDCp解碼部2〇按照HDCp 規格將所接收之内容訊號的密碼予以解碼,並輸出經解碼 之内容訊號。所輸出之内容訊號可利用顯示器、揚聲器等 來播放。 HDCP規格中,在發送内容訊號之訊源(s〇urce)裝置 (亦稱發送機)與接收内容訊號之吸收裝置(亦稱為接收機) 之間以公開鍵密碼方式互相認證之後,將内容訊號予以加 密碼並傳輸。在此,加密碼裝置1〇〇相當於訊源裝置,解 碼裝置200相當於吸收裝置,為了認證與加密碼,在加密 碼裝置100與解碼裝置200之間共有各自的公開鍵。在各 自之裝置中所藏匿的秘密鍵被稱為裝置鍵。對應裝置鍵之 公開鍵(以下’簡稱為裝置公開鍵)被稱為Ksv(Key Selection Vector:鍵選擇向量)。加密碼裝置1〇〇與解碼 裴置200係使用一對裝置鍵與裝置公開鍵而互相認證,當 成功認證時’加密碼裝置100就利用裝置鍵來將發送至解 碼裝置200之内容訊號予以加密碼,而解碼裝置2〇〇則利 315899 1336584Programmable Read-only Memory can be externally stored in an external memory such as a programmable read-only memory or written in an internal memory that can be written and read from the outside. The device key is written to the external memory or the internal memory as it is, and since it is not protected, it is easy to access the external memory or the internal memory and completely copy the device key or observe The information of the device key is stolen from the external memory flowing to the signal mounted on the body. Since it is impossible to obtain the device key in advance because of maliciousness, there is a fear that the video content is misused and the copyright is violated. Moreover, since most of the device keys for consumer products such as DVD players, video converter boxes, and digital television receivers are issued according to the number of shipments, 315899 6 1336584 cannot be immediately known even if some of them are completely copied and utilized. In the case of improper use, it is difficult to find out after the fact that the device key is completely copied, or the path of the full copy is tracked. Moreover, even if it is known that the device key is improperly used, it is difficult to reconstruct the system because the password and decoding architecture of the device key are changed. SUMMARY OF THE INVENTION The present invention has been developed in view of such a situation, and an object thereof is to provide a method for securely protecting a wear button of a processing device for authenticating a digital signal such as an image signal or an audio signal, which can be utilized. A cryptographic device and a decoding device, and an image signal transmitting device and an image signal receiving device. One aspect of the present invention relates to a device key protection method. The method is characterized in that a device key protection circuit for decoding a device key for authenticating the device is provided inside the processing device of the input digital signal, and the device key is password-added and written to the device at the shipping stage of the device. It can be read from the memory in the device. The memory can also be external to the device or mounted inside the device as a rewritable EEPROM or flash memory. Within the device 4, no further system is constructed to reconfigure the decoding of the device keys in the device key protection circuit when the device key protection circuit is improperly accessed. The digital call can be an image signal or a sound = number ' can also be a combination of these. The processing device can be any one of a digital signal transmitting device and a receiving device. Another aspect of the present invention relates to a digital signal encryption device, the device comprising: s ** 体 体 将 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 个别 ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; After reading the 315899 7 1336584, the above-mentioned loading and setting key ' is decoded and added; and the encryption part is used to encrypt the input digital signal by using the decoded device key '. The device key protection circuit and the encryption unit can be installed inside the device as an LSI circuit' and the decoding of the device key can be internally processed in the LSI circuit, and the configuration cannot be observed from the outside. The above memory may be provided on the (3) circuit substrate, but the transmission path of the data from the memory to the device key protection circuit may be formed by an external bus bar such as a serial bus bar, and can be observed and transmitted to the bus bar. Signal. Still another aspect of the present invention is directed to a decoding device for a digital signal. The device comprises: a memory, a device key for individually authenticating the device. The password is added and saved; the device key protection circuit reads from the memory. The device key after the password is added and decoded; and decoding And using the decoded device key to decode the password of the input digital signal. The weighting device and the decoding device may further include a system reconstruction circuit that uses a predetermined secret key and a public key with respect to the device key to generate a work key, and the device key protection circuit may also use the above system. The above work keys generated by the construction circuit decode the above device keys. Here, when the device key protection circuit is attacked, the decoding mode of the device key in the device key protection circuit can be constructed by changing the secret key. Still another aspect of the present invention relates to an image transmitting apparatus. The device comprises: a cryptographic processing block to encrypt the input image signal; and an image sending processing block, wherein the multiplexed image signal is processed and sent by the 315899 8 1336584; The block includes: a memory, a device key for authentication using a public key to be password-added and saved and stored; the system reconstructs the circuit, and uses a predetermined secret key and a public 'open key of the device key to generate a work key; The key protection circuit reads the device key after the password is encrypted from the memory, and uses the above-mentioned servant key to solve the stone; and the cryptographic part, so that the device key of the decoding is decoded, and the image number is encrypted. . Still another aspect of the present invention relates to an image receiving apparatus. The device includes: an image receiving processing block that receives the encoded image signal and performs _ decoding processing; and a decoding processing block that decodes the decoded password of the image signal; the decoding processing block includes: a memory The device key for authentication using the public key cipher is encrypted and saved; the system rebuild circuit 'uses the predetermined secret key and the public key of the device key to generate a work key; the device key protection circuit 'reads from the above memory The device key after the encryption is taken, and decoded by using the above work key; and the decoding unit 'decodes the weight of the video signal by using the decoded device key. It is also an effective aspect of the present invention to convert any combination of the above constituent elements and the technical idea 4 of the present invention between methods, apparatuses, systems, recording media, computer programs, semiconductor devices and the like. In addition, the above summary of the present invention does not include all necessary features, and the present invention may be a sub-combination of the described features. [Embodiment] The present invention will be described with reference to a preferred embodiment, but it is only considered as an example of the invention 315899 9 !336584, which is not limited by the scope of the invention. The description in the specific examples does not include all features and combinations thereof. (First Embodiment) Fig. 1 is a configuration diagram of a transmission system of a content signal in the first embodiment. The encryption device 1 accepts the input of the content signal including the image signal and the audio signal, and the HDCP password unit 1 encrypts the input valley signal according to the HDCP specification, and transmits it to the dv I coil through the DVI terminal. 4 0 on. The decoding device 200 receives the encrypted content signal transmitted by the dvI terminal to the dvI cable 4, and the HDCp decoding unit 2 decodes the received content signal password according to the HDCp specification, and outputs the decoded code. Content signal. The outputted content signal can be played back using a display, a speaker, or the like. In the HDCP specification, after the mutual authentication is performed by a public key cipher between the s〇urce device (also referred to as a transmitter) that transmits the content signal and the absorbing device (also referred to as a receiver) that receives the content signal, the content is The signal is encrypted and transmitted. Here, the encryption device 1 corresponds to the source device, and the decoding device 200 corresponds to the absorption device. In order to authenticate and add the password, the public key is shared between the encryption device 100 and the decoding device 200. The secret key hidden in each device is called a device key. The public key of the corresponding device key (hereinafter referred to as the device public key) is referred to as Ksv (Key Selection Vector). The cryptographic device 1 and the decoding device 200 authenticate each other using a pair of device keys and device public keys. When successful authentication, the cryptographic device 100 uses the device keys to add the content signals sent to the decoding device 200. Password, and the decoding device 2 〇〇 利 315899 1336584

用裝置鍵來將自加穷·义民壯屯1Λ Λ lA 在馬裴置100接收之經加密碼後的内容 訊號予以解碼。 為了自不正當存取或完全拷貝中保護為裝置之認證與 内容訊號之加密碼所利用的裝置鍵,而裝置鍵加密碼處理 軟體30利用預定之秘密鍵將裝置鍵予以加密碼,並寫入加 密碼裝置1 00之記憶體丨6内。 加也碼裝置100之裝置鍵保護電路12係自記憶體16 讀取經加密碼後之裝置鍵,並將經加密碼後之裝置鍵予以 解裝置鍵倾轉12係將輯·之裝諸供至HDcp 加密碼部1G ’ HDCP加密碼部丨〇則使用該經解碼後之裝置 鍵^將所輸人之内容訊號予以加密碼並輸b由於流二自 m 16至裝置鍵保護電路12之資料傳輸路徑上的裝置 鍵之^料被加密碼,所以即使遭不正t取得亦無法使用。 經加密碼後之裝置鍵由於可利用加密碼裝置⑽内部之裝 置鍵保濩電路12來解碼,且利用内部匯流排供至肋加 密碼部1G ’所以只要不將電路進行還原卫程,就無法取得 經解碼之裝置鍵的資料。 系統再構建電路14,係在因全數檢索、還原工程等不 正當之存取而使裝置鍵保護電路12遭受攻擊的情況,再構 建裝置鍵保護電路12中之裝置鍵的解碼方式。所謂不正當 之存取,係指例如盜取自裝置鍵保護電路12輸出之經解碼 後之裝置鍵的資才斗,並收集經加密碼後之裝置鍵與經解碼 後之裝置鍵的對應模式,再解析解碼之機制的行為了在發 生對該種裝置鍵攻擊之情況,裝置鍵加密碼化處理軟體^ 315899 1336584 藉由變更裝置鍵 電路14而再構建參置鍵並對應此而利用系統再構建 更新裝置鍵之解碼機希^而7;V2中之解碼方式’即可 HDCP加密碼部1G、^ 裝置鍵之不正當利用。 電路umsi^及u再構建 .y 的方式设在一個基板上,圮情俨 係例如以EEPROM的方戎a,# # 1 。己隐體16 利用Mm/ 板上’在電路基板出貨時 ?裝置鍵加掛碼處理軟體3〇而 入EEPROM内。又,在發生石不a如3俊之裝置鍵寫 用裝置鍵加密碼處理存取的情況,使用者利 予以加密碼,並;;m而;^新的密碼方式將裝置鍵1 ㈣μ“ 上之經加密碼後的裝置鍵。Use the device key to decode the content of the self-added, Yimin, and the Λ1A received passwords received by the horse. In order to protect the device key used for the authentication of the device and the encryption of the content signal from the improper access or the full copy, the device key plus password processing software 30 encrypts and writes the device key by using a predetermined secret key. Add the password device 100 to the memory 丨6. The device key protection circuit 12 of the adding code device 100 reads the device key after the password is encrypted from the memory 16, and the device key after the password is added to the device key to tilt the 12 system to install the series. To HDcp plus password part 1G 'HDCP plus password part, use the decoded device key ^ to encrypt the content signal of the input person and input b data due to stream 2 from m 16 to device key protection circuit 12 The device key on the transmission path is encrypted, so it cannot be used even if it is not obtained. The device key after the password is added can be decoded by the device key protection circuit 12 inside the encryption device (10), and is supplied to the rib encryption unit 1G by the internal bus bar. Therefore, as long as the circuit is not restored, it cannot be used. Obtain the data of the decoded device key. The system reconstruction circuit 14 reconstructs the device key in the device key protection circuit 12 in the event that the device key protection circuit 12 is attacked by improper access such as full retrieval or restoration engineering. The so-called improper access refers to, for example, stealing the decoded device key outputted from the device key protection circuit 12, and collecting the corresponding mode of the encrypted device key and the decoded device key. Then, the behavior of the decoding and decoding mechanism is performed. In the case where the key attack of the device occurs, the device key plus the cryptographic processing software ^ 315899 1336584 reconfigures the reference key by changing the device key circuit 14 and uses the system accordingly. The decoding device of the update device key is constructed and the decoding mode of V2 is 'immediately utilized by the HDCP encryption unit 1G and ^ device keys. The circuit umsi^ and u re-construct the .y mode on a substrate, for example, in the EEPROM block a, # # 1 . The hidden body 16 is used in the EEPROM by the Mm/board when the circuit board is shipped, the device key is added with the code processing software. In addition, in the case where the stone is not a, such as 3 Jun, the device key is written by the device key plus the password processing access, the user adds the password, and; m;; the new password mode sets the device key 1 (four) μ The device key after the password is added.

糸、·先再構建電路14係對瘅此而桩A 的八八^ s ^ τ應此而接又基板上之CPU等控制部 的叩令’變更裝置鍵保護電路12之解碼方式。 统再置200之記憶體26、襄置鍵保護電路12及系 統再構建電路24之構成與動作,分別與 之記憶體16、裝置鍵保鳟雷玖19 s么 ^衣直i川 ” °蔓電路12及糸統再構建電路14之 鍵裝置鍵保護電路22係將經解碼後之裝置 鍵供至HDCP解碼部2〇,ηπγρ站π & Λ 丨W而HDCP解碼部20則使用該經解 ‘,,,裝置鍵將經加密難之内容訊料轉碼並輸出。 第2圖係裝置鍵加密碼處理軟體3〇之構成的說明圖。 裝置鍵加密碼處理軟體3〇上,輸入有作為秘密鍵之一對 裝置=4 2與裝置公開鍵4 4。工作鍵產生部3 4係使用預定 t秘⑽κο'初期值vo及裝置公開鍵44來產生工作鍵 wko’並供至秘密鍵加密碼部32。秘密鍵加密碼部32係使 用工作鍵wko將裝置鍵42予以加密碼,並寫入經加密碼後 315899 12 1336584 ㈣至記憶體16、26内。 上亦寫入對應裝置鍵42之八_ —在。己隐體16、26 K0時,由於會產^ A幵1鍵。在此,當變更秘密鍵 42之密瑪^不同之工作鍵刚,所以可變更裝置鍵 圖係,裝置!。。之構成的說明 中雖已顯不加搶碼裝置1〇〇之概 回 細地說明功能性的槿& 旦疋在此更詳 路12與系統再構建電路14的構成,可如第保二電 有秘密鍵解碼器⑴與工作鍵產生電路⑽。3圖所不地政 44 生電路12°,係自記憶體16讀取裝置公開鍵 盘’冋時續出預定之秘密鍵κ〇與初期值”。該秘密鍵κ〇 值VG係與在第2圖之裝置鍵加密碼處理軟體3〇中 所利用者相同。工作鍵產生電路12〇係使用秘密鍵別、初 期值V0及裝置公開鍵44來產生工作鍵则,並供至秘密 鍵解碼器iio。秘密鍵解碼器110,係自記憶體16讀取經 加密碼後之裝置鍵46’並使用工作鍵WK〇來解碼。利用秘 密鍵解碼器110所解碼之裝置鍵係供至HDCp密碼核心 130。 HDCP密碼核心130,係基於HDCp規格之密碼處理電 路,其具有認證通訊對方之裝置,並進行鍵之共有的功能, 及使用所共有之鍵而將内容訊號予以加密碼的功能。HDCp 密碼核心130 ’係使用由秘密鍵解碼器21〇所解碼的裝置 鍵,將所輸入之内容訊號予以加密碼並輸出。 當變更輸入至工作鍵產生電路120之秘密鍵κ〇時,由 315899 13 ⑴6584 =生不同之工作.鍵刚’所以可變更經加 =::不碼模/。在發_ 寻之不正μ為的情況,就變更在第2圖之裝置鍵 Hi處理軟體30中所使用的秘密鍵κ〇並更新密碼模 式,同時對應此而同樣地變更輸入至工作鍵產生電路】、 秘雄鍵KG。藉此’可再構建秘密鍵解媽器⑴之解碼方 式’而可防止經加密碼後之裝置鍵46的不正#解碼/ ί 第4圖係解碼裝置2〇〇之構成的說明圖。進行自 ,26讀取一對經加密碼後之裝置鍵仏與裝置公開鍵4丫: 輕經加密碼後之裝置鍵46予以解碼之處理的秘密鍵解 碼益210與工作鍵產生電路22〇,係與第3圖之秘密鍵 碼器11〇與工作鍵產生電路12〇相同。HDCp解碼核心“ο, 係基於HDCP規格之解碼處理電路,其具有認證通訊對方之 f置,並進行鍵之共有的功能’及使用所共有之鍵而將内 =訊號予以解碼的功能。HDCp解碼核心、23(),係使用由秘 密鍵解碼器210所解碼的裝置鍵’將經加密碼後之内容訊 號予以解碼並輸出。即使在解碼裝置2〇〇中,亦與加密碼 裝^ 1〇〇相同,可藉由變更輸入至工作鍵產生電路22〇: 秘饴鍵K0,而再構建秘密鍵解碼器21〇之解碼方式。 (第2實施形態) 第2實施形態係將第1實施形態之加密碼裝置1〇〇及 解碼裝置200適用於DVI規格之影像訊號的傳輸系統中的 形態。DVI規格之傳輸系統,係由介以傳輸路徑而連接之 第5圖的影像發送裝置300與第6圖之影像接收裝置4〇〇 315899 所構成。 發^發送裝置_、影像接收裝置彻係分別可以DVI ^ ' 、DVI接收機LSI的方式加以實現,作為其一例, :發送裝置300被利用作為個人電腦之視頻輸出部,影 接收裳置400被利用作為LCD等之顯示裝置的視頻輸入 L視頻輸出部與視頻輸人部,介以_電纜來連接而可 ::像成號之數位傳輸。作為其他例,亦可利用影像發 ' 300作為視訊轉換盒之視頻輪出部,利用影像接收 、置400作為連接視訊轉換盒之數位電視接收機的視頻輸 入部。更作為其他例’亦可利用影像發送裝置300作為_ 播放機之視頻輸出部,利用影像接收I置働作為與_ 播放機相連接之LCD顯示器的視頻輸入部。 第5圖係第2實施形態之影像發送裝置3〇〇的構成 圖L衫像發送裝置300包含:視頻控制器35〇,其接受影 像資訊之輸入並輸出數位之影像訊號;HDCp密碼器3丨〇, 其按照HDCP規格將影像訊號予以加密碼;以及Dn發送機 3^20 ’其按照DVI規格來發送經加密碼後之影像訊號。HDCp 密碼器310之構成與動作,與第3圖中所說明之H])cp密碼 核心130相同,其利用裝置鍵將影像訊號予以加密碼後供 至DVI發送機320。 DVI發送機320之TMDS編碼器犯2,係將經加密碼後 之R、G、B之3種類的彩色訊號與同步訊號之4頻道按照 TMDS(Transition Minimized Differential Signaling: 轉換最小化差分訊號)方式來編碼並依使用2條訊號線之 315899 1336584 差動驅動來傳輸。DVI介面324係將經編碼之訊號串列化 並介以DVI端子送出至傳輸路徑上。如此影像發送裝置300 經由DVI電纜將經加密碼後之影像訊號發送至影像接收裝 置 400。 EEPROM 330係相當於第3圖之記憶體16,第3圖中所 說明之經加密碼後的一對裝置鍵46與裝置公開鍵44在影 _ 像發送裝置300出貨時被寫入EEPROM 330内。又在EEPROM · 330上,亦寫入第3圖之工作鍵WK0產生用之秘密鍵K0與 初期值V 0。 籲 組態設定器(conf igurat〇r)332係具有相當於第3圖 · 之工作鍵產生電路120的功能’其從EEPROM 330讀取秘密· 鍵K0、初期值V0及裝置公開鍵44,並儲存在内部暫存器 336内’使用該等之資料產生工作鍵WK〇,將所產生之工作 鍵WK0記憶在内部暫存器336内。 秘密鍵解碼器334係相當於第3圖中所說明之秘密鍵 解碼器110 ’其可自EEPR〇M 33〇讀取經加密碼後之裝置鍵鲁 46 ’並自内部暫存器336讀取由組態設定器332所產生之 工作鍵WK0。秘密鍵解碼器334係利用工作鍵WK0來將經 加雄、碼後之裝置鍵46予以解碼,並將經解碼後之裝置鍵供 至HDCP密碼器310。以自秘密鍵解碼器334至HDCp密碼 裔31〇之虛線所示的路徑,係LSI内部匯流排,即使有未 被加密碼之裝置鍵的資料流入亦不用擔心會遭攻擊。Then, the circuit 14 is constructed first, and the eight-eighth s ^ τ of the pile A is connected to the control unit of the CPU or the like on the substrate, and the decoding method of the device key protection circuit 12 is changed. The memory 26, the key protection circuit 12 and the system reconstruction circuit 24 are respectively configured and operated, respectively, and the memory 16 and the device key are protected by the Thunder 19 s ^^衣直一川" The key device key protection circuit 22 of the circuit 12 and the system reconstruction circuit 14 supplies the decoded device key to the HDCP decoding unit 2, the ηπγρ station π & Λ 丨W, and the HDCP decoding unit 20 uses the solution. ',,, the device key transcodes the encrypted content message and outputs it. Fig. 2 is an explanatory diagram of the configuration of the device key plus password processing software 3〇. The device key plus password processing software 3〇, input has One of the secret keys is the device=4 2 and the device public key 4 4. The work key generating unit 34 generates the work key wko' using the predetermined t secret (10) κο' initial value vo and the device public key 44 and supplies the password to the secret key. The 32. The secret key plus password unit 32 encrypts the device key 42 using the work key wko, and writes the password 315899 12 1336584 (4) to the memory 16, 26. The corresponding device key 42 is also written. Eight _ - in the case of the hidden body 16, 26 K0, due to the production of ^ A 幵 1 key. Here When the secret key of the secret key 42 is changed, the different work keys are just changed, so that the device key map system and the device can be changed, although the description of the composition is not shown. The functional 槿 &; 疋 疋 疋 疋 更 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12°, from the memory 16 reading device, when the keyboard is opened, the predetermined secret key κ〇 and initial value are continued. The secret key κ 值 value VG is the same as that used in the device key cryptographic processing software 3 of Fig. 2. The work key generation circuit 12 uses the secret key, the initial value V0, and the device public key 44 to generate a work key, and supplies it to the secret key decoder iio. The secret key decoder 110 reads the cryptographic device key 46' from the memory 16 and decodes it using the work key WK. The device keys decoded by the secret key decoder 110 are supplied to the HDCp cipher core 130. The HDCP cipher core 130 is a cryptographic processing circuit based on the HDCp standard, and has a function of authenticating a communication partner, performing a function common to the keys, and a function of encrypting the content signals by using the shared keys. The HDCp cipher core 130' uses the device key decoded by the secret key decoder 21 to encrypt and output the input content signal. When the secret key κ 输入 input to the work key generation circuit 120 is changed, 315899 13 (1) 6584 = different work. The key is just 'can be changed by adding =:: no code mod /. When the _ 之 μ μ 为 is changed, the secret key κ 使用 used in the device key Hi processing software 30 of FIG. 2 is changed and the password mode is updated, and the input to the work key generation circuit is similarly changed accordingly. 】, secret key KG. By this, the decoding method of the secret key unlocking device (1) can be reconstructed, and the description of the configuration of the erroneous device key 46 and the Δ4 decoding device 2 can be prevented. Performing, 26 reading a pair of password-added device keys and device public key 4丫: the secret key decoding benefit 210 and the work key generating circuit 22 are processed by the device key 46 after the password is added. It is the same as the secret key coder 11 of FIG. 3 and the work key generation circuit 12A. The HDCp decoding core "o is a decoding processing circuit based on the HDCP specification, which has the function of authenticating the communication partner's f and performing the key sharing function" and the function of decoding the inner=signal using the shared key. HDCp decoding The core, 23(), decodes and outputs the encrypted content signal using the device key 'decoded by the secret key decoder 210. Even in the decoding device 2, the password is installed. In the same manner, the decoding method of the secret key decoder 21A can be reconstructed by changing the input to the work key generation circuit 22: the secret key K0. (Second embodiment) The second embodiment is a first embodiment. The cryptographic device 1 and the decoding device 200 are applied to a DVI-standard video signal transmission system. The DVI-compliant transmission system is a video transmission device 300 and a sixth image connected via a transmission path. The image receiving device 4 315 899 is configured. The transmitting device _ and the video receiving device can be implemented by DVI ^ ' and DVI receiver LSI, respectively. As an example, the transmitting device 300 By using the video output unit as a personal computer, the video reception slot 400 is used as a video input L video output unit and a video input unit of a display device such as an LCD, and is connected by a _cable: As another example, it is also possible to use the image transmission '300 as the video wheeling portion of the video conversion box, and use the image receiving and setting 400 as the video input unit of the digital television receiver connected to the video conversion box. The video transmitting device 300 can be used as the video output unit of the _ player, and the video receiving device can be used as the video input unit of the LCD display connected to the _ player. Fig. 5 is a video transmitting device of the second embodiment.构成 图 L L 衫 发送 发送 发送 发送 发送 发送 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 视频 HD HD HD HD HD HD HD HD HD HD HD HD The Dn transmitter 3^20' transmits the encrypted video signal according to the DVI specification. The composition and operation of the HDCp cipher 310, and the H]) cp illustrated in FIG. The code core 130 is the same, and the video signal is encrypted by the device key and sent to the DVI transmitter 320. The TMDS encoder of the DVI transmitter 320 commits 2, and the 3 types of R, G, and B are added after the password is added. The 4 channels of the color signal and the sync signal are coded according to the TMDS (Transition Minimized Differential Signaling) method and transmitted by the differential drive using the 315899 1336584 of the two signal lines. The DVI interface 324 is the coded signal. Serialized and sent to the transmission path via the DVI terminal. Thus, the image transmitting apparatus 300 transmits the encrypted image signal to the image receiving apparatus 400 via the DVI cable. The EEPROM 330 is equivalent to the memory 16 of Fig. 3. The pair of device keys 46 and the device public key 44 described in Fig. 3 are written to the EEPROM 330 when the image transmitting apparatus 300 is shipped. Inside. Further, on the EEPROM 330, the secret key K0 for generating the work key WK0 of Fig. 3 and the initial value V 0 are also written. The configuration configurator (conf igurat〇r) 332 has a function corresponding to the operation key generation circuit 120 of FIG. 3, which reads the secret key K0, the initial value V0, and the device public key 44 from the EEPROM 330, and Stored in the internal register 336 'use the data to generate the work key WK 〇, and the generated work key WK0 is stored in the internal register 336. The secret key decoder 334 is equivalent to the secret key decoder 110 described in FIG. 3, which can read the cryptographic device key 鲁 46 ' from the EEPR 〇 M 33 并 and read from the internal register 336 The work key WK0 generated by the configuration setter 332. The secret key decoder 334 uses the work key WK0 to decode the Kasong, coded device key 46 and supplies the decoded device key to the HDCP cipher 310. The path indicated by the dotted line from the secret key decoder 334 to the HDCp cryptography is the internal bus of the LSI, and there is no fear of being attacked even if the data of the unencrypted device key flows in.

第6圖係第2實施形態之影像接收裝置400的構成 圖。影像接收裝置4〇〇包含:DVI接收機420,按照DVI 315899 1336584 規格而接收經加密碼·後之影像訊號;HDCP解碼器410,按 照HDCP規格將所接收之影像訊號予以解碼;以及顯示控制 器450,用以將經解碼後之影像訊號供至顯示裝置而進行 訊號處理。 DVI接收機420之DVI介面424,係自影像發送裝置 300接收經加密碼後之影像訊號。資料播放及同步化處理 部423,係播放影像訊號之資料,並同步化而供至TMDS解 碼器422。TMDS解碼器422,係按照TMDS方式將經編碼之 影像訊號予以解碼,並分離R、G、B之3種類的彩色訊號 與同步訊號,而供至HDCP解碼器410。HDCP解碼器410 之構成與動作,係與第4圖中所說明之HDCP解碼核心320 相同,利用裝置鍵將影像訊號之密碼予以解碼並供至顯示 控制器450。 EEPROM 430、組態設定器432、秘密鍵解碼器434及 内部暫存器436,係進行與第5圖之影像發送裝置300中 之EEPROM 330、組態設定器332、秘密鍵解碼器334及内 部暫存器336相同的處理,可安全供給自秘密鍵解碼器434 解碼至HDCP解碼器410之裝置鍵。 如以上所述,依據本實施形態,保存於記憶體内之裝 置鍵可事先利用軟體來加密碼,且在使用時介由外部匯流 排而讀入本體裝置内。經加密碼後之裝置鍵,由於無法與 其他裝置組合以進行不正當使用,所以即使自記憶體完全 拷貝裝置鍵,或觀測外部匯流排訊號而取得裝置鍵之資 料,亦不會洩漏鍵資訊。又,自記憶體讀取之裝置鍵由於 17 315899 1336584 可在本體裝置内部解讀,所以只要不將裝置内部進行還原 工程’就無法取得經解碼後之裝置鍵的資料。如此,由於 可強化裝置鍵之保護,所以可提高系統之安全性。 又,即使裝置内部之裝置鍵保護電路的結構遭攻擊 時,由於藉由變更裝置鍵保護軟體、裝置鍵保護電路之構 成及裝置鍵保護電路中所用之秘密鍵即可輕易地再構建系 統。又,在遭受攻擊時,可依裝置之初期設定,使裝置鍵 保護電路失能(disable)。如此,亦可對不正當之 柔性處理,提高系統之便利性。 進仃 以上,係以實施形態為基礎而說明本發明。實施形態 係為例不性,該等之各構成要素或各處理過程之組合亦可 能有各種的變化例,又對熟習該項技術者而言亦可理解該 種變化例仍涵蓋在本發明之範圍内。 作為該種的變化例,在第2實施形態中雖已說明符合 DVI規格之影像收發裝置的裝置鍵保護方法,但是亦可^ 用於 HDMI(High Definition Multimedia lnterface: ^ 解析度多媒體介面)規格。HDMI規格係一種以⑽丨為基礎 而一面保持下階互換並一面對家電追加豐富功能之下一代 數位音頻/視覺介面規格,除了視頻訊號以外,亦可傳輸高 品質之聲音訊號’或可為了遙控等而傳輸控制訊號。由於 提供有適於麵規格之HDCP規格,所以在按照刪規格 ,收發裝置中亦可適用與第2實施形態同樣的袭置鍵之保 護方法。 ’、 雖然本發明已經典型具體例充分描述,但是對於熟習 315899 18 1336584 該項技術者而言應可明白’只要不脫離本發明附後申請專 利範圍所定義之範圍,本發明仍可作各種的變更及替換。 【圖式簡單說明】 第1圖係第1實施形態之内容訊號之傳輸系統的構成 圖。 第2圖第1圖之裝置鍵加密碼處理軟體之構成的說明 圖〇 第3圖係第1圖之加密碼裝置之構成的說明圖。Fig. 6 is a view showing the configuration of a video receiving device 400 according to the second embodiment. The image receiving device 4A includes: a DVI receiver 420 that receives the encrypted image signal according to the specification of DVI 315899 1336584; an HDCP decoder 410 that decodes the received image signal according to the HDCP specification; and a display controller 450, for supplying the decoded image signal to the display device for signal processing. The DVI interface 424 of the DVI receiver 420 receives the encrypted image signal from the image transmitting device 300. The data playback and synchronization processing unit 423 plays back the data of the video signal and synchronizes it to the TMDS decoder 422. The TMDS decoder 422 decodes the encoded video signal according to the TMDS method, and separates the three types of color signals and synchronization signals of R, G, and B, and supplies them to the HDCP decoder 410. The HDCP decoder 410 is constructed and operated in the same manner as the HDCP decoding core 320 illustrated in Fig. 4, and the password of the video signal is decoded by the device key and supplied to the display controller 450. The EEPROM 430, the configuration setter 432, the secret key decoder 434, and the internal register 436 perform the EEPROM 330, the configuration setter 332, the secret key decoder 334, and the internal portion of the image transmitting apparatus 300 of FIG. The same processing of the register 336 can be safely supplied to the device key decoded from the secret key decoder 434 to the HDCP decoder 410. As described above, according to the present embodiment, the device keys stored in the memory can be password-added in advance by the software, and can be read into the body device via the external bus bar during use. The device key after the password is added, because it cannot be combined with other devices for improper use, the key information will not be leaked even if the device key is completely copied from the memory or the external bus signal is observed to obtain the device key. Moreover, since the device key read from the memory can be interpreted inside the main body device, the data of the decoded device key cannot be obtained unless the device is internally restored. In this way, the security of the system can be improved because the protection of the device keys can be enhanced. Further, even if the structure of the device key protection circuit inside the device is attacked, the system can be easily reconstructed by changing the device key protection software, the device key protection circuit configuration, and the secret key used in the device key protection circuit. Moreover, in the event of an attack, the device key protection circuit can be disabled depending on the initial setting of the device. In this way, it is also possible to deal with improper flexibility and improve the convenience of the system. Further, the present invention will be described based on the embodiments. The embodiments are exemplified, and various combinations of the components or processes may be variously modified. It will also be understood by those skilled in the art that such variations are still encompassed by the present invention. Within the scope. As a variation of the above, in the second embodiment, the device key protection method of the video transmission device conforming to the DVI standard has been described, but the HDMI (High Definition Multimedia Interface) specification can be used. The HDMI specification is a next-generation digital audio/visual interface specification based on (10)丨 while maintaining the next level of interchangeability and adding rich functions to home appliances. In addition to video signals, it can also transmit high-quality audio signals. The control signal is transmitted by remote control or the like. Since the HDCP standard suitable for the surface specification is provided, the protection method of the attack key similar to that of the second embodiment can be applied to the transmission/reception apparatus according to the deletion specification. 'Although the present invention has been fully described in the context of a typical embodiment, it will be apparent to those skilled in the art that the present invention can be used in various ways as long as it does not depart from the scope defined by the scope of the appended claims. Change and replace. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a view showing the configuration of a transmission system of a content signal of the first embodiment. Description of the configuration of the device key plus cryptographic processing software in Fig. 1 and Fig. 1 is a diagram showing the configuration of the cryptographic device of Fig. 1.

第4圖係第1圖之解碼裝置之構成的說明圖。 第5圖係第2實施形態之影像發送裝置的構成圖。 第6圖係第2實施形態之影像接收裝置的構成圖。 【主要元件符號說明】 hdcp密碼部 14、24系統再構建電路 20 HDCP解碼部 12、22裝置鍵保護電路 16、26 記憶體 30 32 40 44 46 100 120、 200 300 裝置鍵加密碼處理軟體 秘密鍵密碼部 DVI電境 裝置公開鍵(公開鍵) 經加密嗎後之裝置鍵 加密碼裝置 220工作鍵產生電路 解石馬農置 影像發送裝置 34 工作鍵產生部 42 裝置鍵(秘密鍵) 110、210秘密鍵解碼器 130 HDCP密碼核心 230 HDCP解碼核心 310 HDCP密碼器Fig. 4 is an explanatory diagram showing the configuration of the decoding device of Fig. 1. Fig. 5 is a configuration diagram of a video transmitting apparatus according to a second embodiment. Fig. 6 is a configuration diagram of a video receiving device according to a second embodiment. [Description of main component symbols] hdcp cipher section 14, 24 system reconstruction circuit 20 HDCP decoding section 12, 22 device key protection circuit 16, 26 memory 30 32 40 44 46 100 120, 200 300 device key plus cryptographic processing software secret key Key part DVI electric device public key (public key) After encrypting the device key cryptographic device 220 work key generating circuit calculus horse farm image transmitting device 34 work key generating portion 42 device key (secret key) 110, 210 Secret key decoder 130 HDCP cipher core 230 HDCP decoding core 310 HDCP cipher

315899 19 1336584 320 DVI發送機 322 TMDS編碼器 324 > 424 DVI介面 330 、 430 EEPROM 332 、 432 組悲設定益 334 > 434 秘密鍵解碼器 336 、 436 内部暫存器 400 影像接收裝置 410 HDCP解碼器 420 DVI接收機 422 TMDS解碼器 423 資料播放及同步化處理部 450 顯示控制器 20 315899315899 19 1336584 320 DVI Transmitter 322 TMDS Encoder 324 > 424 DVI Interface 330 , 430 EEPROM 332 , 432 Set Sadness 334 > 434 Secret Key Decoder 336 , 436 Internal Register 400 Image Receiving Device 410 HDCP Decoding 420 DVI receiver 422 TMDS decoder 423 data playback and synchronization processing unit 450 display controller 20 315899

Claims (1)

1336584 十、申請專利範圍·: 1. 一種裝置鍵保護方法’係在所輸入之數位訊號的處理裝 置内部,没置將個別認證該裝置用之裝置鍵予以解碼的 裝置鍵保護電路’在該裝置之出貨階段將上述裝置鍵加 密碼,並寫入至可自該裝置讀取之記憶體内。 3. 2. 如申請專利範圍第丨項之裝置鍵保護方法,其中,在該 裝置之内。卩復a又置系統再構建電路,用以在對上述裝置 鍵保護電路有不正當之存取時,將上職置鍵保護電路 中之上述裝置鍵的解碣方式再構建。 一種加密碼裝置,係數位訊號之加密碼裝置,包含: 記憶體,將個別認證該裝置用之裝置鍵予以加密碼 並保存; 褒置鍵保護電路’自上述記憶體讀取經加密碼後之 上述裝置鍵,並予以解碼;以及 數位t =部,使用經解碼之上述裝置鍵,將所輸入之 數位號予以加密碼。 申明專心圍第3項之加密碼裝置, 用預定秘密鍵與相對於上更匕3使 作鍵的系統再構建電路,上述/置鍵鍵 述系統再構建電路所產生1鍵保4電路係使用上 予以解碼。所產生之上述工作鍵將上述裝置鍵 5·如申請專利範圍第4項之加密碼裘置, 上述秘密鍵,來將 '、 错由交更 將上述裝置鍵保護電路中之μ、七壯班 的解碼方式再構建。 Τ之上速裝置鍵 315899 21 1336584 6· —種解碼裝置,係數位訊號之解碼裝置,包含·· 記憶體,將個別認證該裝置用之裝置鍵予以加密碼 並保存; 裝置鍵保護電路,自上述記憶體讀取經加密碼後之 上述裝置鍵,並予以解碼;以及 解碼部,使用經解碼之上述裝置鍵,將所輸入之數· 位訊號之密碼予以解碼。 7. 如申請專利範圍第6項之解碼裝置,其中,更包含使用 預定秘密鍵與相對於上述裝置鍵之公開鍵來產生工作籲 鍵的系統再構建電路,上述裝置鍵保護電路係使用上述. 系統再構建電路所產生之上述工作鍵將上述裝置鍵予· 以解碼。 8. 如申請專利範圍第7項之解碼裝置,其中,藉由變更上 述秘松鍵’來將上述裝置鍵保護電路中之上述裝置鍵的 解碼方式再構建。 9. 一種影像發送裝置,包含: 加毪碼處理塊,將所輸入之影像訊號加密碼;以及 办像發送處理塊,將經加密碼後之上述影像訊號進 行編媽處理並予以發送; 上述加密碼處理塊包含: 。己憶體,將利用公開鍵密碼進行認證用的裝置鍵予 以加密碼並保存; 系統再構建電路,使用預定秘密鍵與上述裝置鍵之 公開鍵來產生工作鍵; 315899 22 1336584 裝置鍵保護電路,自上述記憶體讀取經加密碼後之 上述裝置鍵,並使用上述工作鍵予以解碼;以及 加密碼部,使用經解碼之上述裝置鍵,將上述影像 訊號予以加密碼。 10. —種影像接收裝置,包含: 影像接收處理塊,接收經編碼之影像訊號並進行解 碼處理;以及 解碼處理塊,將經解碼處理後之上述影像訊號的密 碼予以解碼; 上述解碼處理塊包含: 記憶體,將進行公開鍵密碼之認證用的裝置鍵予以 加密碼並保存; 系統再構建電路,使用預定秘密鍵與上述裝置鍵之 公開鍵來產生工作鍵; 裝置鍵保護電路,自上述記憶體讀取經加密碼後之 上述裝置鍵,並使用上述工作鍵予以解碼;以及 解碼部,使用經解碼之上述裝置鍵,將上述影像訊 號之密碼予以解碼。 23 3158991336584 X. Patent application scope: 1. A device key protection method is used in a processing device for inputting a digital signal, and a device key protection circuit for individually decoding a device key for the device is not disposed. In the shipping phase, the device key is password-added and written into the memory that can be read from the device. 3. 2. The method of protecting the device key according to the scope of the patent application, wherein the device is within the device. The system further constructs a circuit for reconfiguring the above-mentioned device key in the upper-level key protection circuit when the device protection circuit is improperly accessed. A cryptographic device, a cryptographic device for a coefficient bit signal, comprising: a memory, which encrypts and saves a device key for individually authenticating the device; and the 键 key protection circuit reads the password after the password is read from the memory The device key is decoded and decoded; and the digit t=port is used to encrypt the entered digit number using the decoded device key. Declaring the cryptographic device of the third item, using the predetermined secret key and the system for making the key with respect to the upper switch 3, the above-mentioned / key-key system re-constructs the circuit to generate the 1-key 4 circuit system. Decoded on. The above-mentioned work key is generated by the above device key 5, such as the encryption code of the fourth item of the patent application scope, and the above-mentioned secret key, to make the wrong key, and the above-mentioned device key protection circuit in the μ, seven Zhuangban The decoding method is rebuilt. ΤUpper speed device key 315899 21 1336584 6·- Kind of decoding device, coefficient bit signal decoding device, including · memory, encrypts and saves the device key for individually authenticating the device; device key protection circuit, self The memory reads the encrypted device key and decodes the device key, and the decoding unit decodes the input number and bit signal password using the decoded device key. 7. The decoding device of claim 6, further comprising a system reconstruction circuit for generating a job call key using a predetermined secret key and a public key relative to the device key, wherein the device key protection circuit uses the above. The above-mentioned work keys generated by the system reconstruction circuit convert the above device keys to decode. 8. The decoding apparatus according to claim 7, wherein the decoding method of the device key in the device key protection circuit is reconstructed by changing the above-described secret key. 9. An image transmitting device, comprising: a weighting code processing block for adding a password to the input image signal; and an image processing processing block, wherein the image signal after the password is added is processed and sent; The cryptographic processing block contains: . In the memory, the device key for authentication using the public key cipher is encrypted and saved; the system rebuilds the circuit, and uses the predetermined secret key and the public key of the device key to generate a work key; 315899 22 1336584 device key protection circuit, The device key after the password is read from the memory and decoded by using the work key; and the encryption unit uses the decoded device key to encrypt the video signal. 10. An image receiving apparatus, comprising: a video receiving processing block that receives a coded video signal and performs decoding processing; and a decoding processing block that decodes a decoded password of the image signal; the decoding processing block includes : The memory, the device key for authenticating the public key password is encrypted and saved; the system reconstructs the circuit, and uses the predetermined secret key and the public key of the device key to generate a work key; the device key protection circuit, from the above memory The device reads the encrypted device key and decodes it by using the work key; and the decoding unit decodes the password of the video signal by using the decoded device key. 23 315899
TW93115469A 2004-05-31 2004-05-31 Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method TWI336584B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW93115469A TWI336584B (en) 2004-05-31 2004-05-31 Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW93115469A TWI336584B (en) 2004-05-31 2004-05-31 Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method

Publications (2)

Publication Number Publication Date
TW200539643A TW200539643A (en) 2005-12-01
TWI336584B true TWI336584B (en) 2011-01-21

Family

ID=45075085

Family Applications (1)

Application Number Title Priority Date Filing Date
TW93115469A TWI336584B (en) 2004-05-31 2004-05-31 Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method

Country Status (1)

Country Link
TW (1) TWI336584B (en)

Also Published As

Publication number Publication date
TW200539643A (en) 2005-12-01

Similar Documents

Publication Publication Date Title
JP4375995B2 (en) Device key protection method, encryption device and decryption device that can use the method, video transmission device, and video reception device
KR100921586B1 (en) Method and apparatus for content protection in a personal digital network environment
US8385544B2 (en) Packet based high definition high-bandwidth digital content protection
EP1846863B1 (en) Hardware multimedia endpoint and personal computer
KR100473536B1 (en) An encryption apparatus for ensuring security in communication between devices and communication system
US7502470B2 (en) Method and apparatus for content protection within an open architecture system
US7913094B2 (en) Information reproducing apparatus and secure module
JP4561893B2 (en) Data transmitting apparatus, data receiving apparatus, data transmitting method and data receiving method
JP2006523049A (en) Unique identifier for each chip for digital audio / video data encryption / decryption in personal video recorder
US20060045478A1 (en) Method and apparatus for transmitting and receiving protected contents at home
JP3575951B2 (en) Device authentication method and device, and authentication system
JPH11306673A (en) Data recording device, data processing system using the same, and copy protecting method and recording medium
JP2000100069A (en) Copy protecting method, data processor applying the method and recording medium
TWI336584B (en) Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method
KR20100135505A (en) Method for contents encryption, method for contents decryption and electronic device using the same
CN1710955A (en) Apparatus key protection method, enciphering and deciphering apparatus and video transmitting receiving apparatus
JPH11306092A (en) Data processor and copy protect system applied to the processor
JP2005094096A (en) Receiver, transmission system, and transmission method
KR20050119416A (en) Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method
KR100809297B1 (en) Apparatus and method for storing and playing of contents in Expandable Home Theater network environment
JP2002222119A (en) Information processing device
EP1887489A2 (en) Hardware multimedia endpoint and personal computer
JP4616561B2 (en) Content restoration device

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees