WO2005091551A1 - Authentication between device and portable storage - Google Patents

Authentication between device and portable storage Download PDF

Info

Publication number
WO2005091551A1
WO2005091551A1 PCT/KR2005/000522 KR2005000522W WO2005091551A1 WO 2005091551 A1 WO2005091551 A1 WO 2005091551A1 KR 2005000522 W KR2005000522 W KR 2005000522W WO 2005091551 A1 WO2005091551 A1 WO 2005091551A1
Authority
WO
WIPO (PCT)
Prior art keywords
random number
key
portable storage
encrypted
sequence counter
Prior art date
Application number
PCT/KR2005/000522
Other languages
French (fr)
Inventor
Byung-Rae Lee
Tae-Sung Kim
Joong-Chul Yoon
Kyung-Im Jung
Original Assignee
Samsung Electronics Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020040039382A external-priority patent/KR101282972B1/en
Application filed by Samsung Electronics Co., Ltd. filed Critical Samsung Electronics Co., Ltd.
Priority to EP05726868A priority Critical patent/EP1733504A4/en
Priority to JP2007504870A priority patent/JP4709987B2/en
Priority to CA2560570A priority patent/CA2560570C/en
Priority to AU2005223902A priority patent/AU2005223902B2/en
Priority to MXPA06010776A priority patent/MXPA06010776A/en
Priority to NZ549543A priority patent/NZ549543A/en
Publication of WO2005091551A1 publication Critical patent/WO2005091551A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Definitions

  • the present invention relates to digital rights management (DRM) technology, and more particularly, to a technique for authentication between a device and a portable storage for DRM.
  • DRM digital rights management
  • DRM digital rights management
  • DRM digital rights management
  • a DRM system includes users 110 and 150 wanting to access content protected by DRM, a contents issuer 120 issuing content protected through DRM, a rights issuer 130 issuing a rights object containing a right to access the content, and a certification authority 140 issuing a certificate.
  • the user 110 can obtain desired content from the contents issuer 120 in an encrypted format protected by DRM.
  • the user 110 can obtain a license to play the encrypted content from a rights object received from the rights issuer 130. Then, the user 110 can play the encrypted content. Since encrypted contents can be circulated or distributed freely, the user 110 can freely transmit the encrypted content to the user 150.
  • the user 150 needs the rights object to play the encrypted content.
  • the rights object can be obtained from the rights issuer 130.
  • the certification authority 140 issues a certificate indicating that the contents issuer 120 is authentic and the users 110 and 150 are proper users.
  • the certificate may be embedded into devices used by the users 110 and 150 when the devices are manufactured and may be reissued by the certification authority 140 after a predetermined duration has expired. Disclosure of Invention Technical Problem
  • DRM protects the profits of those producing or providing digital contents and thus may be helpful in promoting the growth of the digital content industry.
  • a rights object or encrypted content can be transferred between the users 110 and 150 using mobile devices.
  • Rights objects and encrypted contents can be easily moved between devices when a portable storage is used. In this situation, authentication is needed as a precondition for enabling safe data transmission between a device and a portable storage intermediating between devices.
  • the present invention provides a method for safe authentication between a device and a portable storage.
  • the present invention also provides a device and a portable storage for secure authentication.
  • a method for authentication between a device and a portable storage which is performed by the device.
  • the method includes transmitting a first key to the portable storage, receiving a third key and a first encrypted random number obtained by encrypting a first random number using the first key from the portable storage and decrypting the first encrypted random number using a second key related with the first key, generating a second encrypted random number by encrypting a second random number using the third key and transmitting the second encrypted random number to the portable storage, and generating a session key using the first random number and the second random number.
  • a method for authentication between a device and a portable storage which is performed by the portable storage, the method comprising receiving a first key, obtaining a first encrypted random number by encrypting a first random number using a first key and transmitting the first encrypted random number and a third key, receiving a second encrypted random number obtained by encrypting a second random number using the third key from the device and decrypting the second encrypted random number using a fourth key, and generating a session key using the first random number and the second random number.
  • a method for safe data transmission between a device and a portable storage comprising setting an initial value of a send sequence counter, embedding a value of the send sequence counter in an application protocol data unit (APDU) to be transmitted to the portable storage while increasing the send sequence counter by 1 from the initial value after embedding the value of the send sequence counter in the APDU, and receiving the APDU at the portable storage and determining whether the value of the send sequence counter embedded in the received APDU is correct.
  • APDU application protocol data unit
  • a method for safe data transmission between a device and a portable storage comprising setting an initial value of a send sequence counter, embedding a value of the send sequence counter in an application protocol data unit (APDU) to be transmitted to the device while increasing the send sequence counter by 1 from the initial value after embedding the value of the send sequence counter in the APDU, and receiving the APDU at the device and determining whether the value of the send sequence counter embedded in the received APDU is correct.
  • APDU application protocol data unit
  • a portable storage comprising an interface unit for connecting with a device, a public-key encryption module which encrypts a first random number using a first key obtained from a device certificate received from the device connected through the interface unit and obtains a second random number by decrypting an encrypted second random number received from the device through the interface unit using a fourth key, and a session key generation module which generates a session key using the first random number and the second random number.
  • a device comprising an interface unit for connecting with a portable storage, a public-key encryption module which obtains a first random number by decrypting an encrypted first random number received from the portable storage through the interface unit using a second key and encrypts a second random number using a third key obtained from a portable storage certificate received from the portable storage connected through the interface unit, and a session key generation module which generates a session key using the first random number and the second random number.
  • FIG. 1 is a conceptual diagram of conventional digital rights management (DRM);
  • FIG. 2 is a schematic diagram illustrating the conception of a digital right in an embodiment of the present invention.
  • FIG. 3 is a diagram illustrating an authentication procedure according to an embodiment of the present invention.
  • FIG. 4 is a diagram illustrating a DRM procedure in which a send sequence counter is used in an embodiment of the present invention
  • FIG. 5 is a functional block diagram of a secure multimedia card according to an embodiment of the present invention.
  • FIG. 6 is a functional block diagram of a device according to an embodiment of the present invention. Mode for Invention
  • Public-key cryptography is referred to as an asymmetric cipher in which a key used for encryption is different from a key used for decryption.
  • a public-key algorithm is open to the public, but it is impossible or difficult to decrypt original content with only a cryptographic algorithm, an encryption key, and ciphered text.
  • Examples of a public- key cryptographic system include Diffie-Hellman cryptosystems, RSA cryptosystems, ElGamal cryptosystems, and elliptic curve cryptosystems.
  • Public-key cryptography is about 100-1000 times slower than symmetric-key cryptography. Consequently, public- key cryptography is usually used for key exchange and digital signature, and not for encryption of content.
  • Symmetric-key cryptography is a symmetric cipher referred to as secret-key cryptography using the same key for encryption and decryption.
  • a data encryption standard (DES) is a well-known symmetric cipher.
  • AES advanced encryption standard
  • a certification authority certifies users of a public key with respect to a public-key cipher.
  • a certificate is a message containing a public key and a person's identity information which are signed by the certification authority using a private key. Accordingly, the integrity of the certificate can be easily considered by applying the public key of the certification authority to the certificate, and therefore, attackers are prevented from modulating a user's public key.
  • a digital signature is generated to indicate that a document has been written by a genuine signer.
  • a digital signature examples include an RSA digital signature, an ElGamal digital signature, a DSA digital signature, and a Schnorr digital signature.
  • a sender encrypts a message with his/her private key and sends the encrypted message to a recipient.
  • the recipient decrypts the encrypted message. In this case, it is proved that the message has been encrypted by the sender.
  • a random number is a sequence of numbers or characters with random properties. Since it costs a lot to generate a complete random number, a pseudo-random number may be used.
  • a portable storage device used in the present invention includes a non-volatile memory such as a flash memory which data can be written to, read from, and deleted from and which can be connected to a device.
  • a non-volatile memory such as a flash memory which data can be written to, read from, and deleted from and which can be connected to a device.
  • portable storage device examples include smart media, memory sticks, compact flash (CF) cards, xD cards, and multimedia cards.
  • CF compact flash
  • xD cards compact flash
  • multimedia cards multimedia cards.
  • MMC secure multimedia card
  • FIG. 2 is a schematic diagram illustrating the conception of a digital right in an embodiment of the present invention.
  • a user 210 can obtain encrypted content from a contents issuer 220.
  • the encrypted content is content protected through digital rights management (DRM).
  • DRM digital rights management
  • a rights object contains a definition of a right to the content and constraints to the right, and may contain a right to the rights object itself.
  • An example of the right to the content may be a playback.
  • Examples of the constraints may be the number of playbacks, a playback time, and a playback duration.
  • An example of the right to the rights object may be a move or a copy. In other words, a rights object containing a right to move may be moved to another device or a secure multimedia card.
  • a rights object containing a right to copy may be copied to another device or a secure multimedia card.
  • the original rights object before the move is deactivated (i.e., the rights object itself is deleted or a right contained in the rights object is deleted).
  • the original rights object may be used in an activated state even after the copy.
  • the user 210 may request a rights object from a rights issuer 230 to obtain a right to play.
  • the user 210 receives the rights object together with a rights object response from the rights issuer 230, the user 210 can play the encrypted content using the rights object.
  • the user 210 may transfer the rights object to a user 250 having a corresponding encrypted object via a portable storage.
  • the portable storage may be a secure multimedia card 260 having a DRM function. In this case, the user 210 performs mutual authentication with the secure multimedia card 260 and then moves the rights object to the secure multimedia card 260.
  • the user 210 requests a right to play from the secure multimedia card 260 and receives the right to play from the secure multimedia card 260.
  • the user 210 can play the encrypted content using the right to play.
  • the secure multimedia card 260 allows the rights object to be moved to the user 250 and allows the user 250 to play the encrypted content.
  • FIGS. 3 and 4 The operation between the device of the user 210 and the secure multimedia card 260 will be described with reference to FIGS. 3 and 4.
  • authentication between a device and a secure multimedia card is needed to enable the device to use the secure multimedia card.
  • An authentication procedure will be described in detail with reference to FIG. 3.
  • a subscript ⁇ ' of an object indicates that the object is possessed or generated by a host (i.e., a device) and a subscript 'S' of an object indicates that the object is possessed or generated by a secure multimedia card.
  • FIG. 3 is a diagram illustrating an authentication procedure according to an embodiment of the present invention.
  • a device 310 and a secure multimedia card 320 authenticate each other's genuineness and exchange random numbers for generation of a session key.
  • the session key can be generated using these random numbers obtained through the authentication.
  • descriptions above arrowed lines relate to a command requesting another device to perform a certain operation and descriptions below the arrow-headed lines relate to a parameter involved with the command or data transported in correspondence to the command.
  • the device 310 issues all commands for the authentication and the secure multimedia card 320 performs operations corresponding to the command. For example, a command such as an authentication response may be sent from the device 310 to the secure multimedia card 320.
  • the secure multimedia card 320 sends its ID , a certificate , and an s s encrypted random number to the device 310 in response to the authentication response.
  • both the device 310 and the secure multimedia card 320 may issue commands.
  • the secure multimedia card 320 may send the authentication response together with the ID , the certificate , and the encrypted random number to the device 310. Detailed descriptions of the authentication procedure will be set forth below.
  • each of the device 310 and the secure multimedia card 320 uses a pair of related keys when exchanging significant information such as random numbers.
  • each of the device 310 and the secure multimedia card 320 has a key pair comprised of two related keys.
  • the device 310 has a first key and a second key.
  • Information encrypted using the first key can be decrypted using the second key and information encrypted using the second key can be decrypted using the first key.
  • One of the two keys may be made public to and widely distributed to other devices and secure multimedia cards.
  • the first key may be used as a public key that other devices can read and the second key may be used as a private key that is kept secret not to be ready by the other devices.
  • the secure multimedia card 320 has a third key that is made public to be read by other devices and a fourth key that is kept secret not to be read by the other devices.
  • the device 310 sends an authentication request to the secure multimedia card 320.
  • the device 310 sends a device public key to the secure multimedia card 320.
  • the device public key is sent through a device certificate issued to the device 310 by a certification authority.
  • the device certificate contains the device public key and is signed with a digital signature of the certification authority.
  • the secure multimedia card 320 can authenticate the device 310 and obtain the device public key .
  • a device ID may be sent together with the device certificate .
  • the secure multimedia card 320 determines whether the device certificate H is expired and verifies whether the device certificate H is valid using a certificate revocation list (CRL). If the device certificate is expired or is registered in the CRL, the secure multimedia card 320 may reject mutual authentication with the device 310. In this case, the secure multimedia card 320 reports the rejection to the device 310 and then the device 310 stops a DRM procedure. Meanwhile, when the device certificate has expired or has been discarded, the device 310 may commence a procedure for obtaining the device certificate . If the certificate is not registered in the CRL, the secure multimedia card 320 obtains the device public key using the device certificate . Here, the DRM procedure is continued.
  • CRL certificate revocation list
  • the secure multimedia card 320 generates a random number .
  • the random number is encrypted using the device public key .
  • an authentication response procedure is performed by sending an authentication response command from the device 310 to the secure multimedia card 320 or from the secure multimedia card 320 to the device 310.
  • the secure multimedia card 320 sends the secure multimedia card public key and an encrypted random number to the device 310.
  • a secure multimedia card certificate may be sent instead of the secure multimedia card public key .
  • the secure multimedia card 320 may send the secure multimedia card certificate , the encrypted random number , and information regarding a time at which the CRL of the secure multimedia card 320 issues (referred to as 'secure multimedia card CRL issuing time information') to the device 310.
  • the device 310 and the secure multimedia card 320 can share a most updated CRL.
  • the secure multimedia card CRL issuing time information is sent before the CRL is sent to reduce overhead occurring during the authentication procedure.
  • the secure multimedia card CRL issuing time information it may be encrypted and transmitted together with, or separately from, the random number .
  • a secure multimedia card ID may also be transmitted.
  • the device 310 receives the secure multimedia card certificate and the encrypted random number , authenticates the secure multimedia card 320 by verifying the secure multimedia card certificate , obtains the secure multimedia card public key , and obtains the random number by decrypting the encrypted random number S using a device private key H .
  • the secure multimedia card certificate S is verified by determining whether it is expired and whether it is registered in the CRL.
  • the device 310 generates a random number .
  • the device 310 encrypts the random number using the secure multimedia card public key .
  • an authentication end request is transmitted from the device 310 to the secure multimedia card 320 in operation S330 where the device 310 sends the encrypted random number to the secure multimedia card 320.
  • the device 310 may send information regarding a time at which the CRL of the device 310 issues (referred to as 'device CRL issuing time information') to the secure multimedia card 320 together with the encrypted random number .
  • the device CRL issuing time information may be encrypted and transmitted together with or separately from the random number .
  • the secure multimedia card 320 receives and decrypts the encrypted random number using the secure multimedia card private key .
  • each of the device 310 and the secure multimedia card 320 generate a session key using its own random number and the other's random number.
  • both the device 310 and the secure multimedia card 320 generate their own random number and use their own and the other's random numbers, randomness is greatly increased and secure authentication is possible. In other words, even if one of the device 310 and the secure multimedia card 320 has weak randomness, the other of them provides supplemental randomness.
  • the device 310 and the secure multimedia card 320 can mutually authenticate each other and share the session key.
  • an authentication end response is transmitted from the secure multimedia card 320 to the device 310 to verify whether the session keys respectively generated by the device 310 and the secure multimedia card 320 are identical with each other.
  • one of the device 310 and the secure multimedia card 320 encrypts information known to the other one using its session key and transmits the encrypted information to the other one, which decrypts the encrypted information using its session key, thereby verifying whether each other's session keys are identical.
  • the secure multimedia card 320 encrypts the random number generated by the device 310 using its session key and transmits the encrypted random number to the device 310. Then, in operation S352, the device 310 receives and decrypts the encrypted random number using its session key and determines whether t he random number is restored to verify whether the session key is generated properly. In another embodiment of the present invention, a predetermined period of time after transmitting the authentication end request in operation S330, the device 310 encrypts the random number generated by the secure multimedia card 320 using the session key generated by the device 310 and transmits the encrypted random number to the secure multimedia card 320.
  • the secure multimedia card 320 decrypts the encrypted random number using its session key, such that, whether the session key is generated properly can be verified. In an embodiment of the present invention, if the session key is not properly generated, the authentication is performed all over again. In another embodiment of the present invention, if the session key is not properly generated, the DRM procedure between the device 310 and the secure multimedia card 320 is terminated.
  • a random number may be generated using a random number generation module (not shown) or may be selected from a plurality of numbers that have been generated and stored in a device or a secure multimedia card in advance and combinations thereof.
  • a random number may be a sequence of numbers or a sequence of characters.
  • a random number may be a number, a combination of numbers, or a sequence of characters, which are generated using the random number generation module.
  • a random number may be a number or a sequence of characters, which is selected from numbers or sequences of characters that are stored in advance, or may be a combination of a plurality of selected numbers or a plurality of selected sequences of characters.
  • two random numbers are used during authentication between the device 310 and the secure multimedia card 320, thereby enabling safer DRM to be accomplished.
  • a session key due to the verification of a session key, it can be determined whether the authentication has been performed properly.
  • a safe DRM operation between the device 310 and the secure multimedia card 320 can be guaranteed by using a session key generated during the authentication.
  • a verification procedure may be further provided after the authentication, which will be described with reference to FIG. 4.
  • FIG. 4 is a diagram illustrating a DRM procedure in which a send sequence counter is used in an embodiment of the present invention.
  • a send sequence counter may be used.
  • the send sequence counter is included in an application protocol data unit (APDU) and increases whenever the APDU is transmitted. For example, if one or more of the APDUs are intercepted, the send sequence counter included in the APDU has discontinuity. In addition, if an unauthorized user inserts an APDU, the send sequence counter also has discontinuity.
  • An APDU is a unit used to transmit data such as an instruction, a rights object, or content and has a predetermined size. If the size of the data to be transmitted is smaller than the predetermined size of an APDU, the data is transmitted using a single APDU.
  • the send sequence counter is initially set to a number, that is, a combination of a random number and a random number .
  • the send sequence counter may be initially set to a combination of the last one byte of the random number and the last one byte of the H random number .
  • the send J s sequence counter is initially set to '0101010111111110.
  • H S randomness can be increased compared to when the send sequence counter is initially set to '0000000000000000,' and therefore, the DRM procedure can be performed more securely.
  • the device 410 issues a DRM command to the secure multimedia card 420
  • the current value of the send sequence counter is included in an APDU (S430). If ten APDUs are transmitted for the DRM command, the send sequence counter increases by one from the initial value '0101010111111110' whenever each of the APDUs is transmitted.
  • the secure multimedia card 420 checks the value of the send sequence counter in each received APDU and determines whether an inauthentic APDU is inserted during transmission or an authentic APDU is intercepted by an unauthorized user (S432).
  • a value of the send sequence counter included in a first APDU for the DRM command may be the initial value to which the send sequence counter is initially set to. For example, when ten APDUs are transmitted for the DRM command, the send sequence counter may be increased by one from the initial value '0101010111111110' whenever each APDU is transmitted. In another embodiment of the present invention, the value of the send sequence counter included in the first APDU for the DRM command may be set based on a latest value of the send sequence counter.
  • the device 410 checks the value of the send sequence counter in each received APDU and determines whether an inauthentic APDU is inserted during transmission or an authentic APDU is intercepted (S442).
  • Sequentially increasing the send sequence counter is just an example.
  • the send sequence counter may be decreased sequentially or increased or decreased by a value other than one, without departing from the spirit and scope of the present invention.
  • FIG. 5 is a functional block diagram of a secure multimedia card 500 according to an embodiment of the present invention.
  • a module means, but is not limited to, a software or hardware component, such as a Field Programmable Gate Array (FPGA) or Application Specific Integrated Circuit (ASIC), which performs certain tasks.
  • a module may advantageously be configured to reside on an addressable storage medium and configured to execute on one or more processors.
  • a module may include, by way of example, components, such as software components, object- oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
  • the functionality provided for in the components and modules may be combined into fewer components and modules or further separated into additional components and modules.
  • the components and modules may be implemented such that they execute one or more computers in a communication system.
  • the secure multimedia card 500 needs a security function, a function of storing content or a rights object, a function of exchanging data with a device, and a DRM function.
  • the secure multimedia card 500 includes an RSA module 540, a session key generation module 550, and an advanced encryption standard (AES) module 560 for the security function, a content/ rights object storage module 530 with a storage function, an interface unit 510 allowing data exchange with the device, and a control unit 520 controlling each module to perform the DRM procedure.
  • the secure multimedia card 500 includes a send sequence counter storage module 570 to detect unauthorized insertion or deletion of an APDU during transmission in the DRM procedure.
  • the interface unit 510 allows the secure multimedia card 500 to be connected with the device.
  • the interface unit 510 of the secure MMC 500 may be electrically connected with an interface unit of the device.
  • the electrical connection is just an example, and the connection may indicate a state in which the secure MMC 500 can communicate with the device through a wireless medium without a physical contact.
  • the interface unit 510 allows the secure MMC 500 to be connected with a device.
  • a value of a send sequence counter of the secure MMC 500 is included in an APDU transferred between the secure MMC 500 and the device via the interface unit 510 to manage malicious attacks.
  • the RSA module 540 performs public-key encryption. More particularly, the RSA module 540 performs RSA encryption according to a request from the control unit 520. In embodiments of the present invention, during mutual authentication, the RSA encryption is used for key (random number) exchange or digital signature. However, the RSA encryption is just an example, and other public-key encryption may be used.
  • the session key generation module 550 generates a random number to be transmitted to the device and generates a session key using the generated random number and a random number received from the device. Meanwhile, instead of generating the random number in the session key generation module 550, the random number may be selected from a plurality of random numbers provided in advance, as described above.
  • the AES module 560 performs symmetric -key encryption using the generated session key. More particularly, the AES module 560 uses AES encryption to encrypt a content encryption key from a rights object (RO) with the session key and to encrypt other important information during communication with the device.
  • the AES encryption is just an example, and other symmetric-key encryption such as DES encryption may be used.
  • the content/rights object storage module 530 stores encrypted contents and rights objects.
  • the secure MMC 500 encrypts an RO according to the AES encryption using a unique key that cannot be read by other devices, and decrypts the RO using the unique key to allow the RO to be moved or copied to another device.
  • the encrypting of an RO using the unique key according to the symmetric-key encryption is just an example.
  • an RO may be encrypted using a private key of the secure MMC 500 and may be decrypted using a public key of the secure MMC 500 when necessary.
  • FIG. 6 is a functional block diagram of a device 600 according to an embodiment of the present invention.
  • the device 600 needs a security function, a function of storing content or a rights object, a function of exchanging data with another device, a data transmit/receive function allowing communication with a contents issuer or a rights issuer, and a DRM function.
  • the device 600 includes an RSA module 640, a session key generation module 650, and an AES module 660 for the security function, a content/rights object storage module 630 with a storage function, a multimedia card (MMC) interface unit 610 allowing data exchange with a secure multimedia card, and a control unit 620 controlling each module to perform the DRM procedure.
  • MMC multimedia card
  • the device 600 includes a transceiver module 690 for the data transmit/receive function and a display module 670 displaying reproduced content.
  • the device 600 includes a send sequence counter storage module 680 storing a value of a send sequence counter, which is used to detect unauthorized insertion or deletion of an APDU during transmission in the DRM procedure.
  • the transceiver module 690 allows the device 600 to communicate with a contents issuer or a rights issuer.
  • the device 600 can acquire a rights object or encrypted content from an outside source through the transceiver module 690.
  • the MMC interface unit 610 allows the device 600 to be connected with a secure MMC.
  • the interface unit 610 of the device 600 may be electrically connected with an interface unit of the secure MMC.
  • the electrical connection is just an example, and the connection may indicate a state in which the device 600 can communicate with the secure MMC through a wireless medium without a contact.
  • a value of a send sequence counter of the device 600 is included in an APDU transferred between the device 600 and the secure MMC via the MMC interface unit 610 to manage malicious attacks.
  • the RSA module 640 performs public-key encryption. More particularly, the RSA module 640 performs RSA encryption according to a request from the control unit 620. In embodiments of the present invention, during mutual authentication, the RSA encryption is used for key (random number) exchange or digital signature. However, the RSA encryption is just an example, and other public-key encryption may be used.
  • the session key generation module 650 generates a random number to be transmitted to the secure MMC and generates a session key using the generated random number and a random number received from the secure MMC.
  • the random number generated by the session key generation module 650 is encrypted by the RSA module 640 and then transmitted to the secure MMC through the MMC interface unit 610. Meanwhile, instead of generating the random number in the session key generation module 650, the random number may be selected from a plurality of random numbers provided in advance, as described above.
  • the AES module 660 performs symmetric -key encryption using the generated session key. More particularly, the AES module 660 uses AES encryption to encrypt a content encryption key from a rights object (RO) with the session key and to encrypt other important information during communication with the secure MMC.
  • the AES encryption is just an example, and other symmetric-key encryption such as DES encryption may be used.
  • the content/rights object storage module 630 stores encrypted contents and rights objects.
  • the device 600 encrypts an RO according to the AES encryption using a unique key that cannot be read by another device or the secure MMC, and decrypts the RO using the unique key to allow the RO to be moved or copied to the device.
  • the encrypting of an RO using the unique key according to the symmetric-key encryption is just an example.
  • an RO may be encrypted using a private key of the device 600 and may be decrypted using a public key of the device 600 when necessary.
  • the display module 670 visually displays playback of content whose rights object permits playback.
  • the display module 670 may be implemented, for example, by a liquid crystal display (LCD) device such as a thin-film transistor (TFT) LCD device or an organic electroluminescent (EL) display device.
  • LCD liquid crystal display
  • TFT thin-film transistor
  • EL organic electroluminescent

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

For digital rights management (DRM), a method for performing authentication between a device and a portable storage, which is performed by the device, includes transmitting a first key to the portable storage, receiving a third key and a first encrypted random number obtained by encrypting a first random number using the first key from the portable storage and decrypting the first encrypted random number using a second key related with the first key, generating a second encrypted random number by encrypting a second random number using the third key and transmitting the second encrypted random number to the portable storage, and generating a session key using the first random number and the second random number. The technique guarantees secure authentication between the device and the portable storage for DRM.

Description

Description AUTHENTICATION BETWEEN DEVICE AND PORTABLE STORAGE Technical Field
[1] The present invention relates to digital rights management (DRM) technology, and more particularly, to a technique for authentication between a device and a portable storage for DRM. Background Art
[2] Recently, digital rights management (DRM) has been actively researched and developed. Commercial services using DRM are increasingly being used. DRM needs to be used because of the following various characteristics of digital content. That is to say, unlike analog data, digital content can be copied without loss and can be easily reused, processed, and distributed, and only a small amount of cost is needed to copy and distribute the digital content. However, a large amount of cost, labor, and time are needed to produce the digital content. Thus, when the digital content is copied and distributed without permission, a producer of the digital content may lose his/her profit, and his/her enthusiasm for creation may be discouraged. As a result, development of digital content business may be hampered.
[3] There were several efforts to protect digital content. Conventionally, digital content protection has concentrated on preventing unauthorized access to digital content, such that only those people who have paid are allowed to access the digital content.
[4] Thus, people who paid to access the digital content are allowed to access the unencrypted digital content, while people who did not pay are not allowed to access the digital content. In this case, when a person who paid intentionally distributes the digital content to other people, however, these other people can use the digital content without paying. To solve this problem, DRM was introduced. In DRM, any one is allowed to freely access encoded digital content, but a license referred to as a rights object is needed to decode and execute the digital content. Accordingly, the digital content can be more effectively protected by using DRM.
[5] The concept of digital rights management (DRM) will be described with reference to FIG. 1. DRM relates to management of contents (hereafter, referred to as encrypted contents) protected using a method such as encryption or scrambling, and rights objects allowing access to the encrypted contents.
[6] Referring to FIG. 1, a DRM system includes users 110 and 150 wanting to access content protected by DRM, a contents issuer 120 issuing content protected through DRM, a rights issuer 130 issuing a rights object containing a right to access the content, and a certification authority 140 issuing a certificate.
[7] In operation, the user 110 can obtain desired content from the contents issuer 120 in an encrypted format protected by DRM. The user 110 can obtain a license to play the encrypted content from a rights object received from the rights issuer 130. Then, the user 110 can play the encrypted content. Since encrypted contents can be circulated or distributed freely, the user 110 can freely transmit the encrypted content to the user 150. The user 150 needs the rights object to play the encrypted content. The rights object can be obtained from the rights issuer 130. Meanwhile, the certification authority 140 issues a certificate indicating that the contents issuer 120 is authentic and the users 110 and 150 are proper users. The certificate may be embedded into devices used by the users 110 and 150 when the devices are manufactured and may be reissued by the certification authority 140 after a predetermined duration has expired. Disclosure of Invention Technical Problem
[8] As described above, DRM protects the profits of those producing or providing digital contents and thus may be helpful in promoting the growth of the digital content industry. However, there is inconvenience practically although a rights object or encrypted content can be transferred between the users 110 and 150 using mobile devices. Rights objects and encrypted contents can be easily moved between devices when a portable storage is used. In this situation, authentication is needed as a precondition for enabling safe data transmission between a device and a portable storage intermediating between devices. Technical Solution
[9] The present invention provides a method for safe authentication between a device and a portable storage.
[10] The present invention also provides a device and a portable storage for secure authentication.
[11] The above stated objects as well as other objects, features and advantages, of the present invention will become clear to those skilled in the art upon review of the following description, the attached drawings and appended claims.
[12] According to an aspect of the present invention, there is provided a method for authentication between a device and a portable storage, which is performed by the device. The method includes transmitting a first key to the portable storage, receiving a third key and a first encrypted random number obtained by encrypting a first random number using the first key from the portable storage and decrypting the first encrypted random number using a second key related with the first key, generating a second encrypted random number by encrypting a second random number using the third key and transmitting the second encrypted random number to the portable storage, and generating a session key using the first random number and the second random number.
[13] According to another aspect of the present invention, there is provided a method for authentication between a device and a portable storage, which is performed by the portable storage, the method comprising receiving a first key, obtaining a first encrypted random number by encrypting a first random number using a first key and transmitting the first encrypted random number and a third key, receiving a second encrypted random number obtained by encrypting a second random number using the third key from the device and decrypting the second encrypted random number using a fourth key, and generating a session key using the first random number and the second random number.
[14] According to still another aspect of the present invention, there is provided a method for safe data transmission between a device and a portable storage, the method comprising setting an initial value of a send sequence counter, embedding a value of the send sequence counter in an application protocol data unit (APDU) to be transmitted to the portable storage while increasing the send sequence counter by 1 from the initial value after embedding the value of the send sequence counter in the APDU, and receiving the APDU at the portable storage and determining whether the value of the send sequence counter embedded in the received APDU is correct.
[15] According to yet another aspect of the present invention, there is provided a method for safe data transmission between a device and a portable storage, the method comprising setting an initial value of a send sequence counter, embedding a value of the send sequence counter in an application protocol data unit (APDU) to be transmitted to the device while increasing the send sequence counter by 1 from the initial value after embedding the value of the send sequence counter in the APDU, and receiving the APDU at the device and determining whether the value of the send sequence counter embedded in the received APDU is correct.
[16] According to a further aspect of the present invention, there is provided a portable storage comprising an interface unit for connecting with a device, a public-key encryption module which encrypts a first random number using a first key obtained from a device certificate received from the device connected through the interface unit and obtains a second random number by decrypting an encrypted second random number received from the device through the interface unit using a fourth key, and a session key generation module which generates a session key using the first random number and the second random number.
[17] According to another aspect of the present invention, there is provided a device comprising an interface unit for connecting with a portable storage, a public-key encryption module which obtains a first random number by decrypting an encrypted first random number received from the portable storage through the interface unit using a second key and encrypts a second random number using a third key obtained from a portable storage certificate received from the portable storage connected through the interface unit, and a session key generation module which generates a session key using the first random number and the second random number. Description of Drawings
[18] The above and other features and advantages of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings in which:
[19] FIG. 1 is a conceptual diagram of conventional digital rights management (DRM);
[20] FIG. 2 is a schematic diagram illustrating the conception of a digital right in an embodiment of the present invention;
[21] FIG. 3 is a diagram illustrating an authentication procedure according to an embodiment of the present invention;
[22] FIG. 4 is a diagram illustrating a DRM procedure in which a send sequence counter is used in an embodiment of the present invention;
[23] FIG. 5 is a functional block diagram of a secure multimedia card according to an embodiment of the present invention; and
[24] FIG. 6 is a functional block diagram of a device according to an embodiment of the present invention. Mode for Invention
[25] Hereinafter, embodiments of the present invention will be described in detail with reference to the attached drawings.
[26] Before the detailed description is set forth, terms used in this specification will be described briefly. The following description of terms is to be construed for a better understanding of the specification and terms that are not explicitly defined herein are not intended to limit the broad aspects of the invention.
[27] - Public- Key Cryptography
[28] Public-key cryptography is referred to as an asymmetric cipher in which a key used for encryption is different from a key used for decryption. A public-key algorithm is open to the public, but it is impossible or difficult to decrypt original content with only a cryptographic algorithm, an encryption key, and ciphered text. Examples of a public- key cryptographic system include Diffie-Hellman cryptosystems, RSA cryptosystems, ElGamal cryptosystems, and elliptic curve cryptosystems. Public-key cryptography is about 100-1000 times slower than symmetric-key cryptography. Consequently, public- key cryptography is usually used for key exchange and digital signature, and not for encryption of content.
[29] - Symmetric-Key Cryptography
[30] Symmetric-key cryptography is a symmetric cipher referred to as secret-key cryptography using the same key for encryption and decryption. A data encryption standard (DES) is a well-known symmetric cipher. Recently, applications using an advanced encryption standard (AES) have increased.
[31] - Certificate
[32] A certification authority certifies users of a public key with respect to a public-key cipher. A certificate is a message containing a public key and a person's identity information which are signed by the certification authority using a private key. Accordingly, the integrity of the certificate can be easily considered by applying the public key of the certification authority to the certificate, and therefore, attackers are prevented from modulating a user's public key.
[33] - Digital Signature
[34] A digital signature is generated to indicate that a document has been written by a genuine signer. Examples of a digital signature are an RSA digital signature, an ElGamal digital signature, a DSA digital signature, and a Schnorr digital signature. When the RSA digital signature is used, a sender encrypts a message with his/her private key and sends the encrypted message to a recipient. The recipient decrypts the encrypted message. In this case, it is proved that the message has been encrypted by the sender.
[35] - Random Number
[36] A random number is a sequence of numbers or characters with random properties. Since it costs a lot to generate a complete random number, a pseudo-random number may be used.
[37] - Portable Storage Device
[38] A portable storage device used in the present invention includes a non-volatile memory such as a flash memory which data can be written to, read from, and deleted from and which can be connected to a device. Examples of such portable storage device are smart media, memory sticks, compact flash (CF) cards, xD cards, and multimedia cards. Hereinafter, a secure multimedia card (MMC) will be explained as a portable storage device.
[39] FIG. 2 is a schematic diagram illustrating the conception of a digital right in an embodiment of the present invention.
[40] A user 210 can obtain encrypted content from a contents issuer 220. The encrypted content is content protected through digital rights management (DRM). To play the encrypted content, a rights object for the encrypted content is needed. A rights object contains a definition of a right to the content and constraints to the right, and may contain a right to the rights object itself. An example of the right to the content may be a playback. Examples of the constraints may be the number of playbacks, a playback time, and a playback duration. An example of the right to the rights object may be a move or a copy. In other words, a rights object containing a right to move may be moved to another device or a secure multimedia card. A rights object containing a right to copy may be copied to another device or a secure multimedia card. When the rights object is moved, the original rights object before the move is deactivated (i.e., the rights object itself is deleted or a right contained in the rights object is deleted). However, when the rights object is copied, the original rights object may be used in an activated state even after the copy.
[41] After obtaining the encrypted content, the user 210 may request a rights object from a rights issuer 230 to obtain a right to play. When the user 210 receives the rights object together with a rights object response from the rights issuer 230, the user 210 can play the encrypted content using the rights object. Meanwhile, the user 210 may transfer the rights object to a user 250 having a corresponding encrypted object via a portable storage. The portable storage may be a secure multimedia card 260 having a DRM function. In this case, the user 210 performs mutual authentication with the secure multimedia card 260 and then moves the rights object to the secure multimedia card 260. To play the encrypted content, the user 210 requests a right to play from the secure multimedia card 260 and receives the right to play from the secure multimedia card 260. The user 210 can play the encrypted content using the right to play. Meanwhile, after performing mutual authentication with the user 250, the secure multimedia card 260 allows the rights object to be moved to the user 250 and allows the user 250 to play the encrypted content. The operation between the device of the user 210 and the secure multimedia card 260 will be described with reference to FIGS. 3 and 4. In embodiments of the present invention, authentication between a device and a secure multimedia card is needed to enable the device to use the secure multimedia card. An authentication procedure will be described in detail with reference to FIG. 3. Here, a subscript Η' of an object indicates that the object is possessed or generated by a host (i.e., a device) and a subscript 'S' of an object indicates that the object is possessed or generated by a secure multimedia card.
[42] FIG. 3 is a diagram illustrating an authentication procedure according to an embodiment of the present invention. In the authentication procedure, a device 310 and a secure multimedia card 320 authenticate each other's genuineness and exchange random numbers for generation of a session key. The session key can be generated using these random numbers obtained through the authentication. In FIG. 3, descriptions above arrowed lines relate to a command requesting another device to perform a certain operation and descriptions below the arrow-headed lines relate to a parameter involved with the command or data transported in correspondence to the command. In an embodiment of the present invention, the device 310 issues all commands for the authentication and the secure multimedia card 320 performs operations corresponding to the command. For example, a command such as an authentication response may be sent from the device 310 to the secure multimedia card 320. Then, the secure multimedia card 320 sends its ID , a certificate , and an s s encrypted random number to the device 310 in response to the authentication response. In another embodiment of the present invention, both the device 310 and the secure multimedia card 320 may issue commands. For example, the secure multimedia card 320 may send the authentication response together with the ID , the certificate , and the encrypted random number to the device 310. Detailed descriptions of the authentication procedure will be set forth below.
[43] The device 310 and the secure multimedia card 320 use a pair of related keys when exchanging significant information such as random numbers. In detail, each of the device 310 and the secure multimedia card 320 has a key pair comprised of two related keys. The device 310 has a first key and a second key. Information encrypted using the first key can be decrypted using the second key and information encrypted using the second key can be decrypted using the first key. One of the two keys may be made public to and widely distributed to other devices and secure multimedia cards. For example, the first key may be used as a public key that other devices can read and the second key may be used as a private key that is kept secret not to be ready by the other devices. Similarly, the secure multimedia card 320 has a third key that is made public to be read by other devices and a fourth key that is kept secret not to be read by the other devices.
[44] In operation S310, the device 310 sends an authentication request to the secure multimedia card 320. When requesting authentication, the device 310 sends a device public key to the secure multimedia card 320. In operation S310, the device public key is sent through a device certificate issued to the device 310 by a certification authority. The device certificate contains the device public key and is signed with a digital signature of the certification authority. Based on the device certificate , the secure multimedia card 320 can authenticate the device 310 and obtain the device public key . A device ID may be sent together with the device certificate .
[45] In operation S312, the secure multimedia card 320 determines whether the device certificate H is expired and verifies whether the device certificate H is valid using a certificate revocation list (CRL). If the device certificate is expired or is registered in the CRL, the secure multimedia card 320 may reject mutual authentication with the device 310. In this case, the secure multimedia card 320 reports the rejection to the device 310 and then the device 310 stops a DRM procedure. Meanwhile, when the device certificate has expired or has been discarded, the device 310 may commence a procedure for obtaining the device certificate . If the certificate is not registered in the CRL, the secure multimedia card 320 obtains the device public key using the device certificate . Here, the DRM procedure is continued. [46] In operation S314, the secure multimedia card 320 generates a random number . In operation S316, the random number is encrypted using the device public key . In S H operation S320, an authentication response procedure is performed by sending an authentication response command from the device 310 to the secure multimedia card 320 or from the secure multimedia card 320 to the device 310. During the authentication response procedure, the secure multimedia card 320 sends the secure multimedia card public key and an encrypted random number to the device 310. In an embodiment of the present invention, instead of the secure multimedia card public key , a secure multimedia card certificate may be sent. In another embodiment of the present invention, the secure multimedia card 320 may send the secure multimedia card certificate , the encrypted random number , and information regarding a time at which the CRL of the secure multimedia card 320 issues (referred to as 'secure multimedia card CRL issuing time information') to the device 310. In this case, the device 310 and the secure multimedia card 320 can share a most updated CRL. Meanwhile, since the CRL is not frequently updated generally, the secure multimedia card CRL issuing time information is sent before the CRL is sent to reduce overhead occurring during the authentication procedure. When the secure multimedia card CRL issuing time information is sent, it may be encrypted and transmitted together with, or separately from, the random number . A secure multimedia card ID may also be transmitted. [47] In operation S322, the device 310 receives the secure multimedia card certificate and the encrypted random number , authenticates the secure multimedia card 320 by verifying the secure multimedia card certificate , obtains the secure multimedia card public key , and obtains the random number by decrypting the encrypted random number S using a device private key H . The secure multimedia card certificate S is verified by determining whether it is expired and whether it is registered in the CRL. Next, in operation S324, the device 310 generates a random number . In operation S326, the device 310 encrypts the random number using the secure multimedia card public key . H S Thereafter, an authentication end request is transmitted from the device 310 to the secure multimedia card 320 in operation S330 where the device 310 sends the encrypted random number to the secure multimedia card 320. In an embodiment of H the present invention, the device 310 may send information regarding a time at which the CRL of the device 310 issues (referred to as 'device CRL issuing time information') to the secure multimedia card 320 together with the encrypted random number . Here, the device CRL issuing time information may be encrypted and transmitted together with or separately from the random number . [48] In operation S332, the secure multimedia card 320 receives and decrypts the encrypted random number using the secure multimedia card private key . In H S operations S340 and S342, each of the device 310 and the secure multimedia card 320 generate a session key using its own random number and the other's random number. Here, since both the device 310 and the secure multimedia card 320 generate their own random number and use their own and the other's random numbers, randomness is greatly increased and secure authentication is possible. In other words, even if one of the device 310 and the secure multimedia card 320 has weak randomness, the other of them provides supplemental randomness.
[49] Through the above-described operations, the device 310 and the secure multimedia card 320 can mutually authenticate each other and share the session key. In operation S350, an authentication end response is transmitted from the secure multimedia card 320 to the device 310 to verify whether the session keys respectively generated by the device 310 and the secure multimedia card 320 are identical with each other. In other words, one of the device 310 and the secure multimedia card 320 encrypts information known to the other one using its session key and transmits the encrypted information to the other one, which decrypts the encrypted information using its session key, thereby verifying whether each other's session keys are identical. In an embodiment of the present invention, the secure multimedia card 320 encrypts the random number generated by the device 310 using its session key and transmits the encrypted random number to the device 310. Then, in operation S352, the device 310 receives and decrypts the encrypted random number using its session key and determines whether t he random number is restored to verify whether the session key is generated properly. In another embodiment of the present invention, a predetermined period of time after transmitting the authentication end request in operation S330, the device 310 encrypts the random number generated by the secure multimedia card 320 using the session key generated by the device 310 and transmits the encrypted random number to the secure multimedia card 320. Then, the secure multimedia card 320 decrypts the encrypted random number using its session key, such that, whether the session key is generated properly can be verified. In an embodiment of the present invention, if the session key is not properly generated, the authentication is performed all over again. In another embodiment of the present invention, if the session key is not properly generated, the DRM procedure between the device 310 and the secure multimedia card 320 is terminated.
[50] In an embodiment of the present invention, a random number may be generated using a random number generation module (not shown) or may be selected from a plurality of numbers that have been generated and stored in a device or a secure multimedia card in advance and combinations thereof. A random number may be a sequence of numbers or a sequence of characters. Accordingly, in embodiments of the present invention, a random number may be a number, a combination of numbers, or a sequence of characters, which are generated using the random number generation module. Alternatively, a random number may be a number or a sequence of characters, which is selected from numbers or sequences of characters that are stored in advance, or may be a combination of a plurality of selected numbers or a plurality of selected sequences of characters.
[51] In an embodiment of the present invention, two random numbers are used during authentication between the device 310 and the secure multimedia card 320, thereby enabling safer DRM to be accomplished. In addition, due to the verification of a session key, it can be determined whether the authentication has been performed properly. In an embodiment of the present invention, a safe DRM operation between the device 310 and the secure multimedia card 320 can be guaranteed by using a session key generated during the authentication. Alternatively, for a much safer DRM operation, a verification procedure may be further provided after the authentication, which will be described with reference to FIG. 4.
[52] FIG. 4 is a diagram illustrating a DRM procedure in which a send sequence counter is used in an embodiment of the present invention.
[53] Diverse operations may be performed between a device 410 and a secure multimedia card 420. Operations such as a move, a copy, and a deletion of a rights object are involved with a DRM procedure for the rights object and a playback operation is involved with a DRM procedure for the content. Authentication between the device 410 and the secure multimedia card 420 is the premise of these DRM procedures. In other words, to perform a DRM procedure, authentication must be performed between the device 410 and the secure multimedia card 420 (S400). As a result of the authentication, the device 410 and the secure multimedia card 420 generate identical session keys, respectively (S410 and S412). After the device 410 and the secure multimedia card 420 share the session key, DRM procedures can be performed. To accomplish DRM with excellent security, a send sequence counter may be used. The send sequence counter is included in an application protocol data unit (APDU) and increases whenever the APDU is transmitted. For example, if one or more of the APDUs are intercepted, the send sequence counter included in the APDU has discontinuity. In addition, if an unauthorized user inserts an APDU, the send sequence counter also has discontinuity. An APDU is a unit used to transmit data such as an instruction, a rights object, or content and has a predetermined size. If the size of the data to be transmitted is smaller than the predetermined size of an APDU, the data is transmitted using a single APDU. If the size of the data to be transmitted is larger than that of the APDU, a plurality of APDUs are used to transmit the data. A DRM procedure using a send sequence counter will be described with reference to FIG. 4 below. [54] After the authentication (S400), the device 410 and the secure multimedia card 420 initialize their send sequence counters for a DRM procedure (S420 and S422). In an embodiment of the present invention, the send sequence counter is initially set to a number, that is, a combination of a random number and a random number . For H S example, when the send sequence counter is two bytes in size, it may be initially set to a combination of the last one byte of the random number and the last one byte of the H random number . For example, if the last one byte of the random number is S H 'OlOlOlOr and the last one byte of the random number is '11111110,' the send J s sequence counter is initially set to '0101010111111110.' When an initial value of the send sequence counter is obtained using the random number and the random number , H S randomness can be increased compared to when the send sequence counter is initially set to '0000000000000000,' and therefore, the DRM procedure can be performed more securely.
[55] When the device 410 issues a DRM command to the secure multimedia card 420, the current value of the send sequence counter is included in an APDU (S430). If ten APDUs are transmitted for the DRM command, the send sequence counter increases by one from the initial value '0101010111111110' whenever each of the APDUs is transmitted. The secure multimedia card 420 checks the value of the send sequence counter in each received APDU and determines whether an inauthentic APDU is inserted during transmission or an authentic APDU is intercepted by an unauthorized user (S432).
[56] When the secure multimedia card 420 issues a DRM command to the device 410, the current value of the send sequence counter is included in an APDU (S440). In an embodiment of the present invention, a value of the send sequence counter included in a first APDU for the DRM command may be the initial value to which the send sequence counter is initially set to. For example, when ten APDUs are transmitted for the DRM command, the send sequence counter may be increased by one from the initial value '0101010111111110' whenever each APDU is transmitted. In another embodiment of the present invention, the value of the send sequence counter included in the first APDU for the DRM command may be set based on a latest value of the send sequence counter. For example, when the latest value of the send sequence counter is '1000000000000000,' a value of the send sequence counter included in the first APDU for the DRM command becomes '1000000000000001.' The device 410 checks the value of the send sequence counter in each received APDU and determines whether an inauthentic APDU is inserted during transmission or an authentic APDU is intercepted (S442).
[57] Sequentially increasing the send sequence counter is just an example. The send sequence counter may be decreased sequentially or increased or decreased by a value other than one, without departing from the spirit and scope of the present invention.
[58] FIG. 5 is a functional block diagram of a secure multimedia card 500 according to an embodiment of the present invention.
[59] In the illustrative embodiment, the term 'module,' as used herein, means, but is not limited to, a software or hardware component, such as a Field Programmable Gate Array (FPGA) or Application Specific Integrated Circuit (ASIC), which performs certain tasks. A module may advantageously be configured to reside on an addressable storage medium and configured to execute on one or more processors. Thus, a module may include, by way of example, components, such as software components, object- oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables. The functionality provided for in the components and modules may be combined into fewer components and modules or further separated into additional components and modules. In addition, the components and modules may be implemented such that they execute one or more computers in a communication system.
[60] To implement a DRM procedure, the secure multimedia card 500 needs a security function, a function of storing content or a rights object, a function of exchanging data with a device, and a DRM function. To perform these functions, the secure multimedia card 500 includes an RSA module 540, a session key generation module 550, and an advanced encryption standard (AES) module 560 for the security function, a content/ rights object storage module 530 with a storage function, an interface unit 510 allowing data exchange with the device, and a control unit 520 controlling each module to perform the DRM procedure. In addition, the secure multimedia card 500 includes a send sequence counter storage module 570 to detect unauthorized insertion or deletion of an APDU during transmission in the DRM procedure.
[61] The interface unit 510 allows the secure multimedia card 500 to be connected with the device. When the secure MMC 500 is connected with the device, the interface unit 510 of the secure MMC 500 may be electrically connected with an interface unit of the device. However, the electrical connection is just an example, and the connection may indicate a state in which the secure MMC 500 can communicate with the device through a wireless medium without a physical contact. The interface unit 510 allows the secure MMC 500 to be connected with a device. A value of a send sequence counter of the secure MMC 500 is included in an APDU transferred between the secure MMC 500 and the device via the interface unit 510 to manage malicious attacks.
[62] The RSA module 540 performs public-key encryption. More particularly, the RSA module 540 performs RSA encryption according to a request from the control unit 520. In embodiments of the present invention, during mutual authentication, the RSA encryption is used for key (random number) exchange or digital signature. However, the RSA encryption is just an example, and other public-key encryption may be used.
[63] The session key generation module 550 generates a random number to be transmitted to the device and generates a session key using the generated random number and a random number received from the device. Meanwhile, instead of generating the random number in the session key generation module 550, the random number may be selected from a plurality of random numbers provided in advance, as described above.
[64] The AES module 560 performs symmetric -key encryption using the generated session key. More particularly, the AES module 560 uses AES encryption to encrypt a content encryption key from a rights object (RO) with the session key and to encrypt other important information during communication with the device. The AES encryption is just an example, and other symmetric-key encryption such as DES encryption may be used.
[65] The content/rights object storage module 530 stores encrypted contents and rights objects. The secure MMC 500 encrypts an RO according to the AES encryption using a unique key that cannot be read by other devices, and decrypts the RO using the unique key to allow the RO to be moved or copied to another device. The encrypting of an RO using the unique key according to the symmetric-key encryption is just an example. Alternatively, an RO may be encrypted using a private key of the secure MMC 500 and may be decrypted using a public key of the secure MMC 500 when necessary.
[66] FIG. 6 is a functional block diagram of a device 600 according to an embodiment of the present invention.
[67] To implement a DRM procedure, the device 600 needs a security function, a function of storing content or a rights object, a function of exchanging data with another device, a data transmit/receive function allowing communication with a contents issuer or a rights issuer, and a DRM function. To perform these functions, the device 600 includes an RSA module 640, a session key generation module 650, and an AES module 660 for the security function, a content/rights object storage module 630 with a storage function, a multimedia card (MMC) interface unit 610 allowing data exchange with a secure multimedia card, and a control unit 620 controlling each module to perform the DRM procedure. In addition, the device 600 includes a transceiver module 690 for the data transmit/receive function and a display module 670 displaying reproduced content. In addition, the device 600 includes a send sequence counter storage module 680 storing a value of a send sequence counter, which is used to detect unauthorized insertion or deletion of an APDU during transmission in the DRM procedure.
[68] The transceiver module 690 allows the device 600 to communicate with a contents issuer or a rights issuer. The device 600 can acquire a rights object or encrypted content from an outside source through the transceiver module 690.
[69] The MMC interface unit 610 allows the device 600 to be connected with a secure MMC. When the device 600 is connected with the secure MMC, the interface unit 610 of the device 600 may be electrically connected with an interface unit of the secure MMC. However, the electrical connection is just an example, and the connection may indicate a state in which the device 600 can communicate with the secure MMC through a wireless medium without a contact. A value of a send sequence counter of the device 600 is included in an APDU transferred between the device 600 and the secure MMC via the MMC interface unit 610 to manage malicious attacks.
[70] The RSA module 640 performs public-key encryption. More particularly, the RSA module 640 performs RSA encryption according to a request from the control unit 620. In embodiments of the present invention, during mutual authentication, the RSA encryption is used for key (random number) exchange or digital signature. However, the RSA encryption is just an example, and other public-key encryption may be used.
[71] The session key generation module 650 generates a random number to be transmitted to the secure MMC and generates a session key using the generated random number and a random number received from the secure MMC. The random number generated by the session key generation module 650 is encrypted by the RSA module 640 and then transmitted to the secure MMC through the MMC interface unit 610. Meanwhile, instead of generating the random number in the session key generation module 650, the random number may be selected from a plurality of random numbers provided in advance, as described above.
[72] The AES module 660 performs symmetric -key encryption using the generated session key. More particularly, the AES module 660 uses AES encryption to encrypt a content encryption key from a rights object (RO) with the session key and to encrypt other important information during communication with the secure MMC. The AES encryption is just an example, and other symmetric-key encryption such as DES encryption may be used.
[73] The content/rights object storage module 630 stores encrypted contents and rights objects. The device 600 encrypts an RO according to the AES encryption using a unique key that cannot be read by another device or the secure MMC, and decrypts the RO using the unique key to allow the RO to be moved or copied to the device. The encrypting of an RO using the unique key according to the symmetric-key encryption is just an example. Alternatively, an RO may be encrypted using a private key of the device 600 and may be decrypted using a public key of the device 600 when necessary.
[74] The display module 670 visually displays playback of content whose rights object permits playback. The display module 670 may be implemented, for example, by a liquid crystal display (LCD) device such as a thin-film transistor (TFT) LCD device or an organic electroluminescent (EL) display device. Industrial Applicability
[75] According to the present invention, authentication between a device and a portable storage, which is the fundamental premise of DRM, can be performed securely. In addition, safe data transmission can be accomplished by means of a send sequence counter.
[76] In concluding the detailed description, those skilled in the art will appreciate that many variations and modifications can be made to the disclosed exemplary embodiments without substantially departing from the principles of the present invention. Therefore, the disclosed embodiments of the invention are used in a generic and descriptive sense only and not for purposes of limitation.

Claims

Claims
[1] A method for performing authentication between a device and a portable storage, which is performed by the device, comprising: transmitting a first key from the device to the portable storage; receiving a third key and a first encrypted random number, obtained by encrypting a first random number using the first key, from the portable storage and decrypting the first encrypted random number using a second key related with the first key; generating a second encrypted random number by encrypting a second random number using the third key and transmitting the second encrypted random number from the device to the portable storage; and generating a session key using the first random number and the second random number.
[2] The method of claim 1, wherein the first key and the second key are a related device public key and device private key, respectively, and the third key is a portable storage public key.
[3] The method of claim 1, wherein the first key is transmitted through a device certificate to the portable storage, and the third key is received from the portable storage through a portable storage certificate.
[4] The method of claim 1, wherein the first random number is generated by the portable storage, and the second random number is generated by the device.
[5] The method of claim 1, further comprising: receiving information regarding a time at which a certificate revocation list (CRL) of the portable storage is issued, from the portable storage, together with the first encrypted random number and the third key; and transmitting information regarding a time at which a CRL of the device is issued to the portable storage together with the second encrypted random number.
[6] The method of claim 1, further comprising: receiving information indicating a session key generated by the portable storage; and verifying whether the session key generated by the device is identical with the session key generated by the portable storage.
[7] A method for performing authentication between a device and a portable storage, which is performed by the portable storage, comprising: receiving a first key from the device; obtaining a first encrypted random number by encrypting a first random number using the first key and transmitting the first encrypted random number and a third key to the device; receiving a second encrypted random number, obtained by encrypting a second random number using the third key, from the device and decrypting the second encrypted random number using a fourth key; and generating a session key using the first random number and the second random number.
[8] The method of claim 7, wherein the first key is a device public key, and the third and fourth keys are a related portable storage public key and portable storage private key, respectively.
[9] The method of claim 7, wherein the third key is transmitted to the device through a portable storage certificate, and the first key is received from the device through a device certificate.
[10] The method of claim 7, wherein the first random number is generated by the portable storage, and the second random number is generated by the device.
[11] The method of claim 7 , further comprising : transmitting information regarding a time at which a certificate revocation list (CRL) of the portable storage is issued, to the device, together with the first encrypted random number; and receiving information regarding a time at which a CRL of the device is issued, at the portable storage, together with the second encrypted random number and the first key.
[12] The method of claim 7, further comprising transmitting information indicating the session key generated by the portable storage to the device to enable the device to verify whether a session key generated by the device is identical with the session generated by the portable storage.
[13] A method of safely transmitting data between a device and a portable storage comprising: setting a value of a send sequence counter of the device to an initial value; embedding the value of the send sequence counter in an application protocol data unit (APDU) to be transmitted to the portable storage while increasing the value of the send sequence counter sequentially after the value of the send sequence counter is embedded in the APDU; and receiving the APDU at the portable storage and determining whether the value of the send sequence counter embedded in the received APDU is correct.
[14] The method of claim 13, wherein the initial value is generated using a random number of the portable storage and a random number of the device, and wherein the random numbers are exchanged during mutual authentication between the portable storage and the device.
[15] A method of safely transmitting data between a device and a portable storage comprising: setting a value of a send sequence counter of the portable storage to an initial value; embedding the value of the send sequence counter in an application protocol data unit (APDU) to be transmitted to the device while increasing the value of the send sequence counter sequentially after the value of the send sequence counter is embedded in the APDU; and receiving the APDU at the device and determining whether the value of the send sequence counter embedded in the received APDU is correct.
[16] The method of claim 15, wherein the initial value is generated using a random number of the portable storage and a random number of the device, and wherein the random numbers are exchanged during mutual authentication between the portable storage and the device.
[17] A portable storage comprising: an interface unit which establishes a connection with a device; a public-key encryption module which encrypts a first random number using a first key received from the device connected through the interface unit and obtains a second random number by decrypting an encrypted second random number received from the device through the interface unit using a fourth key; and a session key generation module which generates a session key using the first random number and the second random number.
[18] The portable storage of claim 17, wherein the first key is transmitted through a device certificate sent from the device to the portable storage.
[19] The portable storage of claim 17, wherein the first random number is generated by the session key generation module.
[20] The portable storage of claim 17, further comprising a send sequence counter storage module which stores one or more values of a send sequence counter sequentially embedded in application protocol data units (APDUs), respectively, of data transmitted between the portable storage and the device to enable detection of at least one of an unauthorized insertion and deletion of APDUs during the transmission.
[21] A device comprising: an interface unit which establishes a connection with a portable storage; a public-key encryption module which obtains a first random number by decrypting an encrypted first random number received from the portable storage connected through the interface unit using a second key and encrypts a second random number using a third key received from the portable storage connected through the interface unit; and a session key generation module which generates a session key using the first random number and the second random number. [22] The device of claim 21, wherein the third key is transmitted to the device through a portable storage certificate sent from the portable storage. [23] The device of claim 21, wherein the second random number is generated by the session key generation module. [24] The device of claim 21, further comprising a send sequence counter storage module which stores one or more values of a send sequence counter sequentially embedded in application protocol data units (APDUs), respectively, of data transmitted between the device and the portable storage to enable detection of at least one of an unauthorized insertion and deletion of APDUs during the transmission. [25] A recording medium having a computer readable program recorded thereon, the program for executing the method of claim 1. [26] A recording medium having a computer readable program recorded thereon, the program for executing the method of claim 7. [27] A recording medium having a computer readable program recorded thereon, the program for executing the method of claim 13. [28] A recording medium having a computer readable program recorded thereon, the program for executing the method of claim 15.
PCT/KR2005/000522 2004-03-22 2005-02-25 Authentication between device and portable storage WO2005091551A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
EP05726868A EP1733504A4 (en) 2004-03-22 2005-02-25 Authentication between device and portable storage
JP2007504870A JP4709987B2 (en) 2004-03-22 2005-02-25 Data transmission method, portable storage device and device
CA2560570A CA2560570C (en) 2004-03-22 2005-02-25 Authentication between device and portable storage
AU2005223902A AU2005223902B2 (en) 2004-03-22 2005-02-25 Authentication between device and portable storage
MXPA06010776A MXPA06010776A (en) 2004-03-22 2005-02-25 Authentication between device and portable storage.
NZ549543A NZ549543A (en) 2004-03-22 2005-02-25 Authentication between device and portable storage for digital rights management ( DRM )

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
KR20040019446 2004-03-22
KR10-2004-0019446 2004-03-22
KR10-2004-0039382 2004-05-31
KR1020040039382A KR101282972B1 (en) 2004-03-22 2004-05-31 Authentication between a device and a portable storage
US57575704P 2004-06-01 2004-06-01
US60/575,757 2004-06-01

Publications (1)

Publication Number Publication Date
WO2005091551A1 true WO2005091551A1 (en) 2005-09-29

Family

ID=34987746

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2005/000522 WO2005091551A1 (en) 2004-03-22 2005-02-25 Authentication between device and portable storage

Country Status (7)

Country Link
US (1) US8209535B2 (en)
EP (1) EP1733504A4 (en)
AU (1) AU2005223902B2 (en)
CA (1) CA2560570C (en)
MX (1) MXPA06010776A (en)
NZ (2) NZ549543A (en)
WO (1) WO2005091551A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007049918A1 (en) * 2005-10-25 2007-05-03 Lg Electronics Inc. Authentication method between digital rights management agents
WO2007055539A1 (en) * 2005-11-11 2007-05-18 Lg Electronics Inc. Method and apparatus for managing digital rights of secure removable media
WO2008045773A2 (en) * 2006-10-10 2008-04-17 Qualcomm Incorporated Method and apparatus for mutual authentication
WO2008144524A1 (en) * 2007-05-18 2008-11-27 Verimatrix, Inc. System and method for defining programmable processing steps applied when protecting the data
JP2011521553A (en) * 2008-05-14 2011-07-21 ネーデルランツ オルガニサティー フォール トゥーゲパストナトゥールヴェテンシャッペリーク オンデルズーク テーエンオー Method and system for verifying shared secrets
KR101076529B1 (en) 2008-07-30 2011-10-24 엘지전자 주식회사 Method and apparatus for managing digital rights of secure removable media

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7293227B2 (en) * 2003-07-18 2007-11-06 Microsoft Corporation Associating image files with media content
KR100662336B1 (en) * 2004-06-21 2007-01-02 엘지전자 주식회사 Method for down-loading contents, and system for the same
JP4734872B2 (en) * 2004-09-07 2011-07-27 パナソニック株式会社 Content distribution management apparatus and content distribution management method
US7647346B2 (en) * 2005-03-29 2010-01-12 Microsoft Corporation Automatic rules-based device synchronization
US7720221B2 (en) * 2005-05-20 2010-05-18 Certicom Corp. Privacy-enhanced e-passport authentication protocol
US7681238B2 (en) * 2005-08-11 2010-03-16 Microsoft Corporation Remotely accessing protected files via streaming
US8407146B2 (en) * 2005-10-28 2013-03-26 Microsoft Corporation Secure storage
KR20070053032A (en) * 2005-11-18 2007-05-23 엘지전자 주식회사 Method and system for digital rights management among apparatuses
JP2007202001A (en) * 2006-01-30 2007-08-09 Kyocera Corp Mobile communication apparatus and its control method
KR100703811B1 (en) 2006-02-28 2007-04-09 삼성전자주식회사 Portable storage device and method for managing data of the portable storage device
JP4946121B2 (en) * 2006-03-24 2012-06-06 パナソニック株式会社 Authentication relay device, authentication relay system, and authentication relay method
KR100925731B1 (en) * 2006-04-05 2009-11-10 엘지전자 주식회사 Method and device for transferring rights object in drm
US20070244856A1 (en) * 2006-04-14 2007-10-18 Microsoft Corporation Media Search Scope Expansion
US8495380B2 (en) * 2006-06-06 2013-07-23 Red Hat, Inc. Methods and systems for server-side key generation
US7792756B2 (en) * 2006-06-27 2010-09-07 Microsoft Corporation Subscription management in a media sharing service
KR101366277B1 (en) * 2006-09-07 2014-02-20 엘지전자 주식회사 Method and terminal for verifying membership in order to move rights object in domain
US7882356B2 (en) * 2006-10-13 2011-02-01 Microsoft Corporation UPnP authentication and authorization
JP2008269088A (en) * 2007-04-17 2008-11-06 Toshiba Corp Program information providing system, program information providing method, and storage medium used for it
US20080288542A1 (en) * 2007-04-26 2008-11-20 Buttars David B Media distribution kiosk
KR101434402B1 (en) * 2007-06-09 2014-08-27 삼성전자주식회사 Method and apparatus for obtaining right objects of contents in a mobile terminal
KR101200572B1 (en) * 2007-07-09 2012-11-13 삼성전자주식회사 Method for authenticating and reproducing contents using public broadcast encryption and apparatus thereof
WO2009086669A1 (en) * 2007-12-29 2009-07-16 Thomson Licensing System and method for data transmission
KR100981419B1 (en) * 2008-01-31 2010-09-10 주식회사 팬택 Method of joining in a user domain, and method of exchanging information therein
CN101685425A (en) * 2008-09-28 2010-03-31 联想(北京)有限公司 Mobile storage device and method of encrypting same
KR20100108970A (en) * 2009-03-31 2010-10-08 삼성전자주식회사 Method and apparatus for protecting of drm contents
KR101167938B1 (en) * 2009-09-22 2012-08-03 엘지전자 주식회사 Method for using rights to contents
US9224359B2 (en) 2011-09-26 2015-12-29 Google Technology Holdings LLC In-band peripheral authentication
CH706584B1 (en) * 2012-06-01 2017-06-15 Quantec Sa Portable back up / restore device.
US10496982B2 (en) 2016-02-03 2019-12-03 Accenture Global Solutions Limited Secure contactless card emulation
KR101838511B1 (en) * 2016-05-17 2018-03-14 현대자동차주식회사 Method of providing security for controller using encryption and appratus for implementing the same
EP3282638A1 (en) * 2016-08-11 2018-02-14 Gemalto Sa A method for provisioning a first communication device by using a second communication device
JP6288219B1 (en) 2016-11-18 2018-03-07 Kddi株式会社 Communications system
US11653204B2 (en) * 2020-01-21 2023-05-16 Samsung Electronics Co., Ltd. Sideband authentication of storage device
CN113312651B (en) * 2021-06-24 2024-04-30 中国农业银行股份有限公司 Interactive authentication method, device, equipment and computer readable storage medium
CN113645614A (en) * 2021-07-26 2021-11-12 珠海格力电器股份有限公司 Data transmission method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0994475A1 (en) * 1998-10-16 2000-04-19 Matsushita Electric Industrial Co., Ltd. Digital content protection system
EP1061514A2 (en) * 1999-06-16 2000-12-20 Kabushiki Kaisha Toshiba Mutual authentication method, recording apparatus, reproducing apparatus, and recording medium
EP1164747A1 (en) * 2000-01-14 2001-12-19 Matsushita Electric Industrial Co., Ltd. Authentication communication device and authentication communication system
EP1185021A1 (en) * 2000-04-06 2002-03-06 Sony Corporation Information processing system and method
JP2002344438A (en) 2001-05-14 2002-11-29 Nippon Telegr & Teleph Corp <Ntt> Key sharing system, key sharing device and program thereof
WO2003038571A1 (en) * 2001-10-30 2003-05-08 Matsushita Electric Industrial Co., Ltd. Method, system, device and computer program for mutual authentication and content protection

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL110891A (en) 1993-09-14 1999-03-12 Spyrus System and method for data access control
US5677953A (en) 1993-09-14 1997-10-14 Spyrus, Inc. System and method for access control for portable data storage media
US5371794A (en) * 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
JPH07131453A (en) 1993-11-05 1995-05-19 Hitachi Ltd Cryptographic key delivery method
US5949877A (en) * 1997-01-30 1999-09-07 Intel Corporation Content protection for transmission systems
JP4268817B2 (en) 1997-03-26 2009-05-27 ソニー株式会社 Authentication method
WO2001076136A1 (en) * 2000-03-30 2001-10-11 Sanyo Electric Co., Ltd. Content data storage
CN100527141C (en) 2000-06-02 2009-08-12 松下电器产业株式会社 Recording and playback apparatus and method
JP2002028019A (en) 2000-07-17 2002-01-29 Masashin:Kk Receiving pocket and suitcase, bag and pouches having this receiving pocket
US7373507B2 (en) * 2000-08-10 2008-05-13 Plethora Technology, Inc. System and method for establishing secure communication
JP3709795B2 (en) 2001-02-05 2005-10-26 日本電気株式会社 Computer system and method for communication between modules in the computer system
JP2002271316A (en) * 2001-03-13 2002-09-20 Sanyo Electric Co Ltd Reproducing equipment
FR2823928B1 (en) * 2001-04-19 2003-08-22 Canal Plus Technologies METHOD FOR SECURE COMMUNICATION BETWEEN TWO DEVICES
JP2002344921A (en) 2001-05-21 2002-11-29 Fujitsu Ltd Contents receiver
JP2003122643A (en) 2001-07-09 2003-04-25 Matsushita Electric Ind Co Ltd Contents reading device
JP4326189B2 (en) * 2002-06-10 2009-09-02 健 坂村 Autonomous IC card and communication system
EP1526677A4 (en) * 2002-06-19 2006-12-20 Secured Communications Inc Inter-authentication method and device
JP2004312197A (en) * 2003-04-03 2004-11-04 Matsushita Electric Ind Co Ltd Communication apparatus, certificate issuing apparatus, and communication system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0994475A1 (en) * 1998-10-16 2000-04-19 Matsushita Electric Industrial Co., Ltd. Digital content protection system
EP1061514A2 (en) * 1999-06-16 2000-12-20 Kabushiki Kaisha Toshiba Mutual authentication method, recording apparatus, reproducing apparatus, and recording medium
EP1164747A1 (en) * 2000-01-14 2001-12-19 Matsushita Electric Industrial Co., Ltd. Authentication communication device and authentication communication system
EP1185021A1 (en) * 2000-04-06 2002-03-06 Sony Corporation Information processing system and method
JP2002344438A (en) 2001-05-14 2002-11-29 Nippon Telegr & Teleph Corp <Ntt> Key sharing system, key sharing device and program thereof
WO2003038571A1 (en) * 2001-10-30 2003-05-08 Matsushita Electric Industrial Co., Ltd. Method, system, device and computer program for mutual authentication and content protection

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007049918A1 (en) * 2005-10-25 2007-05-03 Lg Electronics Inc. Authentication method between digital rights management agents
US8256009B2 (en) 2005-11-11 2012-08-28 Lg Electronics Inc. Method and apparatus for managing digital rights of secure removable media
WO2007055539A1 (en) * 2005-11-11 2007-05-18 Lg Electronics Inc. Method and apparatus for managing digital rights of secure removable media
US8683610B2 (en) 2005-11-11 2014-03-25 Lg Electronics Inc. Method and apparatus for managing digital rights of secure removable media
KR101284779B1 (en) * 2006-10-10 2013-08-23 퀄컴 인코포레이티드 Method and apparatus for mutual authentication
WO2008045773A3 (en) * 2006-10-10 2008-06-12 Qualcomm Inc Method and apparatus for mutual authentication
WO2008045773A2 (en) * 2006-10-10 2008-04-17 Qualcomm Incorporated Method and apparatus for mutual authentication
US8892887B2 (en) 2006-10-10 2014-11-18 Qualcomm Incorporated Method and apparatus for mutual authentication
US9112860B2 (en) 2006-10-10 2015-08-18 Qualcomm Incorporated Method and apparatus for mutual authentication
NO342744B1 (en) * 2006-10-10 2018-08-06 Qualcomm Inc Mutual authentication
WO2008144524A1 (en) * 2007-05-18 2008-11-27 Verimatrix, Inc. System and method for defining programmable processing steps applied when protecting the data
US8478980B2 (en) 2007-05-18 2013-07-02 Verimatix, Inc. System and method for defining programmable processing steps applied when protecting the data
US9268949B2 (en) 2007-05-18 2016-02-23 Verimatrix, Inc. System and method for defining programmable processing steps applied when protecting the data
JP2011521553A (en) * 2008-05-14 2011-07-21 ネーデルランツ オルガニサティー フォール トゥーゲパストナトゥールヴェテンシャッペリーク オンデルズーク テーエンオー Method and system for verifying shared secrets
KR101076529B1 (en) 2008-07-30 2011-10-24 엘지전자 주식회사 Method and apparatus for managing digital rights of secure removable media

Also Published As

Publication number Publication date
CA2560570A1 (en) 2005-09-29
US20050210279A1 (en) 2005-09-22
AU2005223902B2 (en) 2008-04-03
MXPA06010776A (en) 2006-12-15
EP1733504A4 (en) 2011-05-25
EP1733504A1 (en) 2006-12-20
NZ549543A (en) 2008-06-30
AU2005223902A1 (en) 2005-09-29
CA2560570C (en) 2011-09-13
US8209535B2 (en) 2012-06-26
NZ567846A (en) 2008-06-30

Similar Documents

Publication Publication Date Title
AU2005223902B2 (en) Authentication between device and portable storage
US8955158B2 (en) Method and apparatus for transmitting rights object information between device and portable storage
JP4709987B2 (en) Data transmission method, portable storage device and device
US7779479B2 (en) Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same
KR101100385B1 (en) Method and apparatus for digital rights management by using certificate revocation list
US8181266B2 (en) Method for moving a rights object between devices and a method and device for using a content object based on the moving method and device
US20050210241A1 (en) Method and apparatus for digital rights management using certificate revocation list
WO2005093596A1 (en) Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same
KR20110084144A (en) Method and apparatus for sending right object information between device and portable storage

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 549543

Country of ref document: NZ

WWE Wipo information: entry into national phase

Ref document number: 2005223902

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 1061/MUMNP/2006

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2560570

Country of ref document: CA

WWE Wipo information: entry into national phase

Country of ref document: MX

Ref document number: PA/a/2006/010776

ENP Entry into the national phase

Ref document number: 2005223902

Country of ref document: AU

Date of ref document: 20050225

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2007504870

Country of ref document: JP

WWP Wipo information: published in national office

Ref document number: 2005223902

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 200580009261.9

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Ref document number: DE

REEP Request for entry into the european phase

Ref document number: 2005726868

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2005726868

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2005726868

Country of ref document: EP