WO2009152639A1 - 可供播放平台读取可移植性资料储存装置的方法 - Google Patents
可供播放平台读取可移植性资料储存装置的方法 Download PDFInfo
- Publication number
- WO2009152639A1 WO2009152639A1 PCT/CN2008/001171 CN2008001171W WO2009152639A1 WO 2009152639 A1 WO2009152639 A1 WO 2009152639A1 CN 2008001171 W CN2008001171 W CN 2008001171W WO 2009152639 A1 WO2009152639 A1 WO 2009152639A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- platform
- storage device
- data storage
- read
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Definitions
- the present invention relates to a method for a playback platform to read a portable data storage device, and more particularly to a method for protecting digital data. Background technique
- digital data Due to advances in computer and digital technology, many of the content of creations, works, such as movies or music content, are converted into digital video compression files, which are then burned on CDs, DVDs, etc. Consumer use.
- the aforementioned digital data regardless of movie or music content, can be easily formed into various file formats, reproduced through various reproduction and burning technologies, and more, thanks to the network.
- the production of digital materials (especially music or movies) and the content of the work are easily broken by the environment provided by the technology, and there is no defense. It also makes many writers' low willingness to create. It is a great obstacle to the development of today's civilized society that values intellectual property rights.
- the above-mentioned carriers in general, CDs, DVDs and the like are currently the mainstream in the market, but due to their repeated use technology, except for a small number of rewritable optical discs which can be repeatedly fired repeatedly, the repeated burning is repeated.
- the type of recording did not form the popularity of early tapes, and due to the large size, many current playback devices (such as MP3 players) were not used simultaneously. Instead, the digital data is captured and copied from the aforementioned carrier to a memory card such as a so-called SD card.
- the current memory card is mainly used for the storage of digital file data (purpose with disk, etc.). If it can actively form a carrier of digital data, and with the secure digital characteristics of Secured Digital Card (SD) (Secure Digital Memory Card) and small size, it can be further adapted. A better digital data carrier is formed, and the security protection mechanism with high portability and wide applicability is provided.
- SD Secured Digital Card
- the SD memory card currently on the market in addition to the transmission speed and capacity has been greatly improved, and the technology is mature and the product price can be widely accepted.
- the conditions for making a memory card a better digital data carrier are more mature.
- the DRM mechanism DRM, the so-called Digital Right Management
- PC personal computer
- the corresponding security protection mechanism can be provided, so that the digital data transmitted on the information can be freely copied and distributed by the person concerned. Or by restricting the identity of the downloader, the number of times, the limited time, and the copying within a limited number of copies, there is no appropriate protection mechanism for the carrier itself (especially the memory card).
- the inventors have devised a method for the playback platform to read the portable data storage device, including: (1) setting a platform application on the playback platform, and setting the portable data storage device a first read command file and a second command file; (2) generating a composite link file between the series of garbled characters and the encrypted digital data, and writing the composite link file to the first read command file, so that the The digital data must be read by the second read command file, and the platform application can determine that the series of data conforms to the protocol defined by the two parties, and the platform application decrypts the related data by using the encryption key generated by the composite link file. After that, the identity identification or the digital data can be obtained, and the right protection can be performed for the digital data.
- FIG. 1 is a specific flow chart of the present invention. detailed description
- the portable data storage device can make various digital contents under various platforms, and the playback platform can be a computer with a window operating system (Windows PC), Linux.
- the first read command file (Command Window file) of the portable data storage device is opened.
- the platform application Under the playback platform, the platform application generates a series of garbled characters and necessary materials according to the agreement with the portable data storage device (such as the command format and the encryption obtained by the rights object, or the general object of the non-right object).
- the encryption operation of the first lock the above-mentioned series of garbled characters and necessary data are written into the first read instruction file (Command Window file) of the portable data storage device to form a composite link. files.
- the platform application performs write temporary clearing or / and closes the first read instruction file (Command Window file) in the file close mode. In order to ensure that the composite link file is transmitted to the first read command file (Command Window file) of the portable data storage device via the portable 'Reader Device' of the data storage device.
- the portable data storage device determines that the composite link file conforms to the agreement defined by both parties, if not, only the original write action of the file system is performed. If it is met, in addition to the original write operation of the file system, the corresponding action is performed, such as taking out the data in the portable data storage device, and then writing the second read command file (Command Window file) after encryption.
- the portable data storage device performs corresponding actions according to the protocol, such as extracting the encrypted data obtained by the rights object from the composite link file, and decrypting and comparing the identity previously stored in the portable data storage device ( After the ID), the comparison result is written (the encryption can be performed before writing).
- the second read instruction file (Command Window file) is specified in the portable data storage device.
- the platform application opens the second read instruction file (Command Window file) of the portable data storage device in a file open manner.
- the platform application reads the composite link file (a series of files) from the second read command file (Command Window file) of the portable data storage device in a file reading manner. ). And determine whether it meets the agreement defined by both parties. If it does not match, it is displayed as an error message. If it is, proceed to (7).
- the platform application determines that the series of data conforms to the agreement defined by the two parties, the platform application decrypts the related data by using the encryption key generated by the last write of the first read instruction file (Command Window file). After that, you can get the true identity recognition (ID) comparison results.
- the encryption key generated by the last write of the first read instruction file (Command Window file). After that, you can get the true identity recognition (ID) comparison results.
- the platform application performs an action of closing the second read command file (Command Window file).
- the invention acts as a first-lock encryption by generating a series of garbled characters and necessary materials (such as a command format and encrypted data obtained by a rights object or a general object of a non-right object), and the digital data must be transmitted through
- the second read command file is read, and the platform application can determine that the serial data conforms to the protocol defined by the two parties, and the platform application decrypts the related data by using the encryption key generated by the composite link file.
- the identity identification H identification or the digital data is used as the encryption action of the second lock, thus forming a right protection against the digital data. It is possible to provide a user with a copyrighted right in a portable data storage device (carrier) with appropriate consideration (paying), which is a fairly secure protection mechanism. Even if the object is not generally copyrighted, the security of the privacy right can be obtained, so that the digital data transmitted on the information can be protected from being illegally copied and distributed by the interested person.
- the present invention is indeed in line with industrial utilization, and has not been seen in publications or publicly used before being used for electricity, nor is it known to the public, and has non-obvious knowledge and conforms to patentable requirements. Application.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Description
可供播放平台读取可移植性资料储存装置的方法 技术领域
本发明涉及一种可供播放平台读取可移植性资料储存装置的方法, 尤 指一种对于数字资料进行防护的措施。 背景技术
由于计算机与数字技术的进步使然, 许多创作、 著作的内容, (例如电 影或音乐内容), 其内容皆被转换成数字影音压缩档案, 再将该档案烧录于 CD、 DVD等影音载体供一般消费者使用。 该创作、 著作的内容, 除电影或 音乐外, 甚至广泛延伸至演讲、 教学录像、 舞台剧等等, 皆可以将内容转 换成数字影音压缩档案 (以下合称为 【数字资料】)。
然而, 由于压缩与复制技术的纯熟, 前述的数字资料, 无论电影或音 乐内容, 皆容易被形成各种档案格式, 透过各种复制、 烧录等技术予以重 制, 更由于网络推波助澜下, 成为散布的媒介而提供更广面的上传与下载, 使得复制的内容, 更无远弗届地被传递、 扩散。 从而, 数字资料 (尤其是 音乐或电影) 的制作心血以及著作内容, 被科技所提供的环境轻易攻破, 而毫无防备。 也令许多著作人的创作意愿低落, 对于重视智能财产权的现 今文明社会, 不啻为一种极大的发展障碍, 因此如何透过科技防护机制对 于著作内容形成复制的障碍, 以及内容的保护, 为许多影音出版、 发行业 者, 甚或演艺人员以及词曲创作人等高度重视, 更符合我国科学技术基本 法以及相关的科技法令的立法美意。
再者, 前述的载体, 一般而言 CD、 DVD等光盘片目前为市场的主流, 但由于其重复使用的技术, 除少数可抹写式的光盘片可以多次重复烧录外, 其重复烧录的型态并未形成如早期录音带的普及性, 且由于体积较大的关 系, 使得目前许多播放器材 (如 MP3 ) 播放器等, 并未能同步使用。 而是 将该数字资料, 由前述的载体, 撷取、 复制至所谓的 SD卡等记忆卡使用。
按, 目前记忆卡主要是用于数字档案资料的储存 (目的同磁盘片等)。 若能积极使其形成数字资料的载体, 同时配合 Secured Digital Card (SD) (安 全数字记忆卡)的安全数字特性以及体积小的特性, 当可以符合更进一步的
形成较佳的数字资料载体, 且具有携带性高、 适用性广的安全防护机制。 尤其目前市面上所流通的 SD记忆卡, 除传输速度以及容量已经大幅提升, 且技术成熟而导致产品价格可以被广泛接受。 使得记忆卡形成较佳的数字 资料载体的条件更为成熟。
虽然目前已经对于网络下载的音乐, 藉由个人计算机 (PC) 播放器中 含 DRM机制(DRM, 即所谓的数字版权管理【Digital Right Management]), 可以提供使用者在适当提出对价 (付费) 情形下可以提供相对应的安全保 护机制, 使得在信息上传送的数字资料可免于被有心人士非法复制与散布。 或者藉由限制下载者身份、 次数、 有限时间、 有限份数内的复制, 然而对 于载体本身 (尤其是记忆卡) 并无一个适当的防护机制。 发明内容
有鉴于先前问题, 本发明人设计有一种可供播放平台读取可移植性资 料储存装置的方法: 包括 (1 )、 在播放平台设一平台应用程序, 且于可移 植性资料储存装置内部设一第一读取指令文件与一第二指令文件; (2)、 将 一连串乱码与加密的数字资料产生一复合连结档, 并将该复合连结档写入 该第一读取指令文件, 使得该数字数据必须透过该第二读取指令文件读取, 且可以由平台应用程序判别此一连串资料符合双方定义的协议, 则平台应 用程序利用该复合连结档所产生的加密钥匙, 将相关资料解密后, 即可得 到身分识别 n Identification)或该数字资料, 而形成对于数字资料可以进行 二道的权利防护。 附图说明
图 1为本发明的具体流程图。 具体实施方式
以下藉由图式的辅助, 说明本发明的内容、 以及实施例, 俾使贵审査 人员对于本发明有更进一步的了解。
本发明提供的可移植性资料储存装置皆可让各种的数字内容在各种平 台下,该播放平台下可以为具有窗口操作系统的计算机 (Windows PC)、Linux
交互式多媒体信息站 (Linux Kiosk) > 具有 J2ME (Java 2 Platform, Micro Edition)程序的行动电话机机、 具有窗口操作系统的行动电话机、 具有 Symbain系统的行动电话机、 MP3播放器、个人媒体播放器(Personal Media Player, PMP)、 家庭立体音响 ('Home Stereo)、 汽车立体音响 (Car Stereo)与 LCD平面电视等播放平台。 利用该等播放平台, 使用档案开启、 档案写入 与档案读取方式比对此 ID是否正确。 其具体作业流程请参阅图 1所示, 包 括:
( 1 )、 在播放平台设一平台应用程序, 且于可移植性资料储存装置内 部设一第一读取指令文件与一第二指令文件; 并且在播放平台下, 平台应 用程序以档案开启方式开启可移植性资料储存装置的该第一读取指令文件 (Command Window档案)。
(2 )、 在播放平台下, 平台应用程序根据与可移植性资料储存装置双 方的协议, 产生一连串乱码与必要的资料 (如命令格式与由权利对象, 或 者非权利对象的一般对象取得的加密资料等) 作为第一道锁的加密动作, 并将上述一连串乱码与必要的资料以档案写入至可移植性资料储存装置的 该第一读取指令文件 (Command Window档案), 成为一复合连结档。
(3 )、 在上述的各种平台下, 平台应用程序进行写入暂存清空或 /且以 档案关闭方式关闭该第一读取指令文件 (Command Window档案)。以保证此 一复合连结文件一定要经可移植性 '资料储存装置的读取装置 (Reader Device) 传送至可移植性资料储存装置的该第一读取指令文件 (Command Window档 案)。
(4 )、 若可移植性资料储存装置判别此一复合连结档符合双方定义的 协议, 如果不符合, 只做档案系统原来的写入动作。 如果符合, 除做档案 系统原来的写入动作外, 另进行对应的动作, 如取出在可移植性资料储存 装置的资料, 加密后再写入第二读取指令文件 (Command Window档案)。例 如可移植性资料储存装置会依协议进行对应的动作, 如由此一复合连结文 件中取出权利对象取得的加密资料, 并先行解密并比对原先储存在可移植 性资料储存装置的身分识别 (ID)后,再将比对结果写入(写入前可先行加密) 在可移植性资料储存装置另一个指定的该第二读取指令文件 (Command Window档案)。
( 5 )、 在上述的各种平台下, 平台应用程序以档案开启方式开启可移 植性资料储存装置的该第二读取指令文件 (Command Window档案)。
(6 )、 在上述的各种平台下, 平台应用程序以档案读取方式由可移植 性资料储存装置的该第二读取指令文件 (Command Window档案)中读取该 复合连结文件 (一连串资料)。并且判别是否符合双方定义的协议。如果不符 合, 则为错误讯息显示。 如果符合, 则进行 (7) 的动作。
( 7 )、 若平台应用程序判别此一连串资料符合双方定义的协议时, 则 平台应用程序利用上一次写入该第一读取指令文件 (Command Window档案) 所产生的加密钥匙, 将相关资料解密后, 即可得到真正的身分识别 (ID)比对 结果。
( 8)、 平台应用程序进行关闭该第二读取指令文件 (Command Window 档案)的动作。
本发明透过产生一连串乱码与必要的资料(如命令格式与由权利对象, 或者非权利对象的一般对象取得的加密资料等)作为第一道锁的加密动作, 又使得该数字资料必须透过该第二读取指令文件读取, 且可以由平台应用 程序判别此一连串资料符合双方定义的协议, 则平台应用程序利用该复合 连结档所产生的加密钥匙, 将相关资料解密后, 即可得到身分识别 H Identification)或该数字资料作为第二道锁的加密动作, 因此而形成对于 数字资料可以进行二道的权利防护。 可以提供使用者在适当提出对价 (付 费)方可取得可移植性资料储存装置 (载体)内的具有著作权等权利的数字资 料, 为一种相当安全的保护机制。 即使一般非关著作权的对象, 也可以获 得隐私权的安全防护, 使得在信息上传送的数字资料可免于被有心人士非 法复制与散布。
综上所述, 本发明确实符合产业利用性, 且未于电请前见于刊物或公 开使用, 亦未为公众所知悉, 且具有非显而易知性, 符合可专利的要件, 于是依法提出专利申请。
惟上述所陈, 为本发明产业上一较佳实施例, 举凡依本^:明申请专利 范围所作的均等变化, 皆属本案诉求标的的范畴。
Claims
1、一种可供播放平台读取可移植性资料储存装置的方法,其特征在于, 包括:
( 1 ) 在播放平台设一平台应用程序, 且于可移植性资料储存装置内部 设一第一读取指令文件与一第二指令文件;
(2) 将一连串乱码与加密的数字资料产生一复合连结档, 并将该复合 连结档写入该第一读取指令文件, 使得该数字数据必须透过该第二读取指 令文件读取, 且可以由平台应用程序判别此一连串资料符合双方定义的协 议, 则平台应用程序利用该复合连结档所产生的加密钥匙, 将相关资料解 密后, 即可得到身分识别 ID或该数字资料, 而形成对于数字资料可以进行 二道的权利防护。
2、 如权利要求 1所述的可供播放平台读取可移植性资料储存装置的方 法, 其特征在于该产生一连串乱码与加密的数字权利资料产生一复合连结 档, 依据播放平台的平台应用程序与可移植性资料储存装置双方的协议。
3、 如权利要求 1所述的可供播放平台读取可移植性资料储存装置的方 法, 该播放平台下选自具有窗口操作系统的计算机、 Linux交互式多媒体信 息站、 具有 J2ME程序的行动电话机机、 具有窗口操作系统的行动电话机、 具有 Symbain系统的行动电话机、 MP3播放器、 个人媒体播放器、 家庭立体 音响、 汽车立体音响与 LCD平面电视群组的播放平台。
4、 如权利要求 1所述的可供播放平台读取可移植性资料储存装置的方 法, 其特征在于该数字资料包括一命令格式与加密钥匙。
5、 如权利要求 1所述的可供播放平台读取可移植性资料储存装置的方 法, 其特征在于该第一读取指令文件为窗口操作系统的指令文件。
6、 如权利要求 1所述的可供播放平台读取可移植性资料储存装置的方 法, 其特征在于该数字资料为一种具有权利属性的数字资料。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200880129584.5A CN102047232B (zh) | 2008-06-17 | 2008-06-17 | 可供播放平台读取可移植性资料储存装置的方法 |
PCT/CN2008/001171 WO2009152639A1 (zh) | 2008-06-17 | 2008-06-17 | 可供播放平台读取可移植性资料储存装置的方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2008/001171 WO2009152639A1 (zh) | 2008-06-17 | 2008-06-17 | 可供播放平台读取可移植性资料储存装置的方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009152639A1 true WO2009152639A1 (zh) | 2009-12-23 |
Family
ID=41433636
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2008/001171 WO2009152639A1 (zh) | 2008-06-17 | 2008-06-17 | 可供播放平台读取可移植性资料储存装置的方法 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102047232B (zh) |
WO (1) | WO2009152639A1 (zh) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1420443A (zh) * | 1996-10-29 | 2003-05-28 | 松下电器产业株式会社 | 许可用户按条件使用发行应用程序包的应用程序包和系统 |
CN1592876A (zh) * | 2001-10-18 | 2005-03-09 | 国际商业机器公司 | 内容分发应用中数字权利管理的方法和系统 |
CN1610889A (zh) * | 2002-09-11 | 2005-04-27 | 索尼株式会社 | 信息记录媒体、信息处理装置、信息处理方法和计算机程序 |
-
2008
- 2008-06-17 CN CN200880129584.5A patent/CN102047232B/zh active Active
- 2008-06-17 WO PCT/CN2008/001171 patent/WO2009152639A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1420443A (zh) * | 1996-10-29 | 2003-05-28 | 松下电器产业株式会社 | 许可用户按条件使用发行应用程序包的应用程序包和系统 |
CN1592876A (zh) * | 2001-10-18 | 2005-03-09 | 国际商业机器公司 | 内容分发应用中数字权利管理的方法和系统 |
CN1610889A (zh) * | 2002-09-11 | 2005-04-27 | 索尼株式会社 | 信息记录媒体、信息处理装置、信息处理方法和计算机程序 |
Also Published As
Publication number | Publication date |
---|---|
CN102047232B (zh) | 2016-09-14 |
CN102047232A (zh) | 2011-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4039489B2 (ja) | マルチメディアコンテンツの情報保護方法及びシステム | |
TW563319B (en) | Method and device for controlling distribution and use of digital works | |
Jonker et al. | Digital rights management in consumer electronics products | |
WO2009012613A1 (en) | Construction and method for encrypting digital information memory card | |
JP2005533416A5 (zh) | ||
WO2004051483A1 (ja) | ライセンス移動装置及びプログラム | |
JP2008015622A (ja) | 著作権保護記憶媒体、情報記録装置及び情報記録方法、並びに情報再生装置及び情報再生方法 | |
JP2002358241A (ja) | コンテンツのコピー管理方法、記録再生装置及び再生装置 | |
CN109743601B (zh) | 基于区块链平台的数字视频隐私保护和版权追究方法 | |
JP4482970B2 (ja) | Dvdレコーダ、dvdレコーダの記録再生方法、およびプログラム記録媒体 | |
JP2007013347A5 (zh) | ||
Andreaux et al. | Copy protection system for digital home networks | |
JP4592398B2 (ja) | 情報記録再生方法及び装置、情報記録媒体 | |
JP2002358242A (ja) | コンテンツのコピー管理方法及び記録再生装置 | |
US8180050B2 (en) | System and method for self-decaying digital media files and for validated playback of same | |
TWI448134B (zh) | A method for reading a portable data storage device for a playback platform | |
WO2009152639A1 (zh) | 可供播放平台读取可移植性资料储存装置的方法 | |
WO2007128162A1 (fr) | Procédé de protection d'un contenu numérique par chiffrement et déchiffrement d'une carte mémoire | |
Smith | Digital rights management & protecting the digital media value chain | |
TWI820242B (zh) | 數位資料記憶卡加密之構造及方法 | |
WO2021087710A1 (zh) | 数位资料记忆卡加密的构造及方法 | |
JP2005522754A (ja) | ユーザデータをレンダリングするための装置及び方法 | |
TWI430645B (zh) | Using the authorization card to obtain digital content downloaded on the storage media side of the method and system | |
WO2001073567A1 (en) | Secure compact disc technology | |
JP2006155371A (ja) | ディジタル情報複製管理装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200880129584.5 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08772964 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08772964 Country of ref document: EP Kind code of ref document: A1 |