WO2021087710A1 - 数位资料记忆卡加密的构造及方法 - Google Patents

数位资料记忆卡加密的构造及方法 Download PDF

Info

Publication number
WO2021087710A1
WO2021087710A1 PCT/CN2019/115514 CN2019115514W WO2021087710A1 WO 2021087710 A1 WO2021087710 A1 WO 2021087710A1 CN 2019115514 W CN2019115514 W CN 2019115514W WO 2021087710 A1 WO2021087710 A1 WO 2021087710A1
Authority
WO
WIPO (PCT)
Prior art keywords
memory card
area
digital data
memory
encryption
Prior art date
Application number
PCT/CN2019/115514
Other languages
English (en)
French (fr)
Inventor
林晖
Original Assignee
林晖
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 林晖 filed Critical 林晖
Priority to PCT/CN2019/115514 priority Critical patent/WO2021087710A1/zh
Priority to US17/773,014 priority patent/US20220398202A1/en
Priority to CN201980101411.0A priority patent/CN114556308A/zh
Publication of WO2021087710A1 publication Critical patent/WO2021087710A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0679Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/20Employing a main memory using a specific memory technology
    • G06F2212/202Non-volatile memory
    • G06F2212/2022Flash memory

Definitions

  • the present invention relates to a structure and method for encrypting a digital data memory card, in particular to a protection management mechanism (DRM, Digital Rights Management) that loads the digital data that needs to obtain rights to access the memory card into the memory card and encrypts it.
  • DRM Digital Rights Management
  • the aforementioned carriers generally CDs, DVDs, and other optical discs are currently the mainstream in the market, but due to their repeated use technology, except for a few rewritable optical discs that can be repeatedly burned multiple times, they are repeatedly burned.
  • the type of recording has not formed the popularity of early tapes, and due to the large size, many playback equipment (such as MP3 players), etc., cannot be used simultaneously.
  • the digital data is retrieved from the aforementioned carrier and copied to a memory card such as a so-called SD card for use. Click, the current memory card is mainly used for the storage of digital file data (the purpose is the same as the disk, etc.).
  • SD Secured Digital Card
  • DRM Digital Rights Management
  • PC personal computer
  • PC personal computer
  • the corresponding security protection mechanism can be provided below, so that the digital data transmitted on the information can be prevented from being illegally copied and distributed by interested persons. Or by limiting the downloader's identity, number of times, limited time, limited number of copies, but there is no proper protection mechanism for the carrier itself (especially the memory card).
  • the present invention specifically proposes a structure and method for memory card encryption based on the prior art, and technical means to solve the previous problems.
  • the present invention relates to a structure and method for encryption of a digital data memory card, which removes the memory in a memory card by itself.
  • a reading control terminal Controller
  • a protection area Protection Area
  • it is also divided into a hard disk partition table area (Partition Table Area) and a file area (File Area), and uses an application program interface (API, Application Programming Interface), select any one of the areas before opening each area, write a protected storage device identification code (PSID), and when the file area (File Area) in the memory card contains the right object (Right Object) (required)
  • PSID protected storage device identification code
  • DRM protection management mechanism
  • the application program interface gives the read control terminal a key command completed through encryption and decryption logic, and the read control terminal performs the key command first Decrypt and send the result to the application program interface. Therefore, there are 4 areas in the memory card: read control terminal (Controller), protection area (Protection Area), hard disk partition table area (Partition Table Area), and file area (File Area).
  • the identification code (PSID) (Portable Storage ID) can be inserted into the memory card in the following ways:
  • PSID Portable Storage ID
  • PSID protected storage device identification code
  • API application programming interface
  • PSID protected storage device identification code
  • API application programming interface
  • PSD protected storage device identification code
  • PSID protected storage device identification code
  • the application program interface gives the read control terminal a key command completed through encryption and decryption logic, and the control terminal first performs the encryption and decryption logic.
  • the key command decrypts and sends the result to the application program interface.
  • FIG. 1 is a schematic diagram of the architecture of the memory card of the present invention.
  • Fig. 3 is a schematic diagram of pre-encryption and decryption between the reading control terminal and the application program interface of the present invention.
  • PSID Protected Storage Device Identification Number
  • PKI Public Key Facilities
  • API Application Programming Interface
  • the present invention relates to a digital data memory card encryption structure, including:
  • a memory card 1 the memory card 1 is provided with a memory body 11, and the memory body 11 is provided with a reading control terminal (Controller) 111 and a protection area (Protection Area) 112 which cooperate with the reader.
  • the storage device identification code (PSID) 115 and when the File Area 114 in the memory card 1 contains the Right Object 116 (digital data that needs to have rights to obtain), it is suitable for various readers
  • the protected storage device identification code (PSID) 115 can be used as an encryption mechanism for identification and reading to increase the security of the digital data protection management mechanism (DRM, Digital Rights Management) of the memory card 1.
  • DRM Digital Rights Management
  • the memory card 1 reading control terminal (Controller) 111 manufacturer should strictly keep secrets about the application programming interface (API), otherwise others can use the application programming interface (API) to obtain the application programming interface (API) in the present invention.
  • the protected storage device identification code (PSID) 115 in the memory 11 is, for example, a program and a protected storage device identification code (PSID) 115 set in the protection area (Protection Area) 112.
  • the present invention can set the memory card 1 as a PSD (Personal Storage Disc), and integrate the USB function with The memory card is integrated into one, so that users can transfer data through the computer's USB interface without using a card reader and transmission cable, and it can also avoid those who are willing to easily disassemble the memory card to obtain the internal memory, or even Cracked.
  • PSD Personal Storage Disc
  • the memory 11 used in the present invention may be a flash memory (Flash Memory), or an electrically erasable Programmable Read-Only Memory (EEPROM).
  • flash Memory Flash Memory
  • EEPROM electrically erasable Programmable Read-Only Memory
  • the encryption and decryption logic between the Controller 111 and the Application Programming Interface (API, Application Programming Interface) 118 is that the Public Key Infrastructure (PKI Public Key Infrastructure) 117 serves as the encryption system server Encryption and decryption logic between and decryption program. Its public key facility (PKI Public Key Infrastructure) is recognized as the most rigorous standard encryption and decryption logic.
  • PKI Public Key Infrastructure Public Key Infrastructure
  • PSID protected storage device identification code
  • the protected storage device identification code (PSID) 115 is to be placed in the partition table area (Partition Table Area) 113 of the hard disk, the user can generate this area after formatting using Windows or other OS.
  • PSID protected storage device identification code
  • the right object (Right Object) 116 needs to obtain a right to access the digital data.
  • the reading control terminal (Controller) 111 will Use the program stored in the firmware of the reading control terminal (Controller) 111 or the protection area (Protection Area) 112 to decrypt the right object (Right Object) 116 file and obtain it from the decrypted right object (Right Object) 116 file Obtain the corresponding protected storage device identification code (PSID) 115, and then combine it with the protected storage device identification code (PSID) 115 stored in the protection area (Protection Area) 112 (take the protected area as an example, but not limited to the protected area) For comparison, if the comparison is successful, the right object (Right Object) 116 file is provided to the playback device. If the comparison is successful, the right object (Right Object) 116 file is provided to the playback device. If the comparison is successful, the right object (Right Object) 116 file is provided to the playback device. If the comparison
  • a unique protected storage device identification code (PSID) 115 is built in the reading control terminal (Controller) 111 or protection area (Protection Area) 112, regardless of whether it is using a Read-only Unique Device ID or
  • the protected storage device identification number (PSID) 115 is generated by the Random Number Generator (Once-Time Programming), which cannot be copied by others, and the right object (Right Object) 116 is the same as the protected storage device identification code (PSID) 115.
  • the ID comparison of the storage device identification code (PSID) 115 can be performed by the reading control terminal (Controller) 111 or the decryption application program interface (API) 118 of the playback platform.
  • API application program interface
  • the application program interface 118 Before the application program interface 118 writes the protected storage device identification code (PSID) 115, the application program interface 118 gives the read control terminal 111 a key command completed through encryption and decryption logic, and the read control terminal 111 Decrypt the key command first, and send the result to the application program interface 118, that is, the data between the memory card reading control terminal (Controller) 111 and the decryption application program interface (API) 118 of the playback platform is encrypted Before the application programming interface (API) 118 wants to read or write the plaintext data of the protection area (Protection Area) 112), the application programming interface (API) 118 must first use the application programming interface (API) to read or write the data in the protected area (Protection Area) 112.
  • control terminal (Controller) 111 After the control terminal (Controller) 111 both parties have agreed to obtain the key encryption command, it is then transmitted to the reading control terminal (Controller) 111, and the reading control terminal (Controller) 111 first decrypts the command, interprets the command, Execute the command, and then send the result (command response or data) to the application program interface (API) 118 and the read control terminal (Controller) 111, after encrypting the command with the key obtained through agreement (API) 118, and the application programming interface (API) 118 then uses the key decryption result (command response or data) that both the application programming interface (API) and the reading control terminal (Controller) 111 have agreed to obtain, and so on.
  • API application program interface
  • API application programming interface
  • the reading control terminal (Controller) 111 when the reading control terminal (Controller) 111 accepts a reader instruction to read data, it will first perform a specific extension (such as but not limited to ROM), and when it is determined to be the protected area (Protection Area) After the extension formed by the variable of 112, if it is, then it will be EEPROM (Electrically Erasable Programmable Read-Only Memory) (or Flash memory). Memory)), such as but not limited to the encrypted protected storage device identification code (PSID) 115 stored in the Protection Area (112), and take out a certain bit of data under the extension, and then execute the Read the firmware of the memory card of the controller 111 or the internal code (CODE) existing in the protection area (112).
  • a specific extension such as but not limited to ROM
  • EEPROM Electrical Erasable Programmable Read-Only Memory
  • Memory such as but not limited to the encrypted protected storage device identification code (PSID) 115 stored in the Protection Area (112), and take out a certain bit of data
  • the present invention provides a digital data protection management mechanism for digital rights management (DRM). Except for the digital data of music, images and even video, it can achieve effective protection and guarantee the authorized access to the use of digital data, and Avoid being illegally accessed by a third party and avoid unnecessary loss of digital assets.
  • DRM digital rights management

Abstract

一种数位资料记忆卡加密的构造及方法,主体于一记忆卡内设置一记忆体,而该记忆体本身设置有一配合读取器的读取控制端(Controller)以及一保护区(Protection Area)外,另外分割为一硬盘分割表区(Partition Table Area)以及一档案区(File Area),并以应用程式介面(API,Application Programming Interface),于前开各区选择其任何一区,写入一受保护储存装置识别码(PSID,Portable Storage ID),且该应用程式介面写入该受保护储存装置识别码前,该应用程式介面给予该读取控制端一透过加解密逻辑完成的密钥指令,该读取控制端先行对该密钥指令进行解密,并将结果传送至该应用程式介面,以更提升其安全性。

Description

数位资料记忆卡加密的构造及方法 技术领域
本发明关于一种数位资料记忆卡加密的构造及方法,尤指一种将需要取得权利方可取用的数位资料加载记忆卡内,并将其加密的保护管理机制(DRM,Digital Rights Management)。
背景技术
由于电脑与数位技术的进步使然,许多创作、著作的内容(例如电影或音乐内容),其内容皆被转换成数位影音压缩档案,再将该档案烧录于CD、DVD等影音载体供一般消费者使用。该创作、著作的内容,除电影或音乐外,甚至广泛延伸至演讲、教学录影、舞台剧等等,皆可以将内容转换成数位影音压缩档案(以下合称为【数位资料】)。然而,由于压缩与复制技术的纯熟,前述的数位资料,无论电影或音乐内容,皆容易被形成各种文件格式,透过各种复制、烧录等技术予以重制,更由于网络推波助澜下,成为散布的媒介而提供更广泛的上传与下载,使得复制的内容,更无远弗届地被传递、扩散。从而,数位资料(尤其是音乐或电影)的制作心血以及著作内容,被科技所提供的环境轻易攻破,而毫无防备。也令许多著作人的创作意愿低落,对于重视知识产权的现今文明社会,不啻为一种极大的发展障碍,因此如何透过科技防护机制对于著作内容形成复制的障碍,以及内容的保护,为许多影音出版、发行业者,甚或演艺人员以及词曲创作人等高度重视,更符合我国科学技术基本法以及相关的科技法令的立法美意。再者,前述的载体,一般而言CD、DVD等光盘片目前为市场的主流,但由于其重复使用的技术,除少数可抹写式的光盘片可以多次重复烧录外,其重复烧录的型态并未形成如早期录音带的普及性,且由于体积较大的关系,使得目前许多播放器材(如MP3播放器)等,并未能同步使用。而是将该数位资料,由前述的载体撷取、复制至所谓的SD卡等记忆卡使用。按,目前记忆卡主要是用于数位档案资料的储存(目的同磁盘片等)。若能积极使其形成数位资料的载体,同时配合Secured Digital Card(SD)(安全数位记忆卡)的安全数位特性以及体积小的特性,当可以符合更进一步的形成较佳的数位资料载体,且具有携带性高、适用性广的安全防护机制。尤其目前市面 上所流通的SD记忆卡,除传输速度以及容量已经大幅提升,且技术成熟而导致产品价格可以被广泛接受。使得记忆卡形成较佳的数位资料载体的条件更为成熟。
虽然目前已经对于网络下载的音乐,藉由个人电脑(PC)播放器中含DRM机制(DRM,即所谓的数位版权管理【Digital Right Management】),可以提供使用者在适当提出对价(付费)情形下可以提供相对应的安全保护机制,使得在信息上传送的数位资料可免于被有心人士非法复制与散布。或者藉由限制下载者身份、次数、有限时间、有限份数内的复制,然而对于载体本身(尤其是记忆卡)并无一个适当的防护机制。
本发明人有鉴于于此,曾经发明并提出一“数位资料记忆卡加密的构造及方法”的申请,并获得中国台湾发明专利I507993号,虽可达预期功效,然时经多年,破解手法更为翻新,本发明人认为对于记忆卡本身的加密与解密,应采取更为严谨的步骤。
发明内容
有鉴于先前技术中对于记忆卡未能有一充分的加密以及防护,因此对于各种需要取得权利,方能取用的数位资料的知识产权以及隐私未能达到充分保护。因此,本发明特针对先前技术提出一记忆卡加密的构造及方法,解决先前问题的技术手段,本发明关于一种数位资料记忆卡加密的构造及方法,将一记忆卡内的记忆体除本身具有一读取控制端(Controller)以及一保护区(Protection Area)外,另分割为一硬盘分割表区(Partition Table Area)以及一档案区(File Area),并利用一应用程式介面(API,Application Programming Interface),于前开各区选择其任何一区,写入一受保护储存装置识别码(PSID),而当记忆卡内的档案区(File Area)载有权利物件(Right Object)(需要具有权利取得的数位资料)时,对于各种读取器读取时,可以利用该受保护储存装置识别码(PSID)为辨识读取的加密机制,增加记忆卡数位资料的保护管理机制(DRM,Digital Rights Management)的安全性。且该应用程式介面写入该受保护储存装置识别码前,该应用程式介面给予该读取控制端一透过加解密逻辑完成的密钥指令,该读取控制端先行对该密钥指令进行解密,并将结果传送至该应用程式介面。因此在记忆卡内共有4个区域:即读取控制端(Controller)、保护区(Protection Area)、硬盘分割表区(Partition Table Area)以及档案区(File Area), 而欲将受保护储存装置识别码(PSID)(Portable Storage ID)置入该记忆卡可以选择以下数种方式:
一、若要将受保护储存装置识别码(PSID)(Portable Storage ID)放入记忆卡记忆体内的读取控制端(Controller),即可使用一般记忆卡读取器(例如SD Reader)与针对记忆卡记忆体内的读取控制端(Controller)所发展的应用程式介面(API)即可,此种较为安全。
二、若要将受保护储存装置识别码(PSID)放入记忆卡的保护区(Protection Area),则可以用特殊治具进行记忆卡保护区(Protection Area)大小的切割,亦可使用一般SD Reader与针对记忆卡记忆体内的保护区(Protection Area)所发展的应用程式介面(API)。
三、若要将受保护储存装置识别码(PSID)放入硬盘分割表区(Partition Table Area),则使用者使用Windows或其他OS进行Format后即可产生此区。
四、若要将受保护储存装置识别码(PSID)放入档案区(File Area),则使用者使用Windows或其他OS进行Format后即可产生此区。
透过更进一步,于该应用程式介面写入该受保护储存装置识别码前,该应用程式介面给予该读取控制端一透过加解密逻辑完成的密钥指令,该控制端先行对该密钥指令进行解密,并将结果传送至该应用程式介面。如此一来,即不用惧怕黑客中途拦截与破解,为增加黑客中途拦截与破解的困难度与增加加密敏捷性。
附图说明
图1本发明的记忆卡架构示意图。
图2本发明的操作流程图。
图3本发明的读取控制端与应用程式介面间预先加解密示意图。
图号说明:
1:记忆卡
11:记忆体
111:读取控制端
112:保护区
113:硬盘分割表区
114:档案区
115:受保护储存装置识别码(PSID)
116:权利物件
117:公共钥匙设施(PKI)
118:应用程式介面(API)。
具体实施方式
以下透过图式说明本发明的内容、特点与实施例,从而对于本案有更进一步的了解。
请参阅图1所示,本发明关于一种数位资料记忆卡加密构造,包括:
一记忆卡1,该记忆卡1内部设置一记忆体11,而该记忆体11除本身设置有一配合读取器的读取控制端(Controller)111以及一保护区(Protection Area)112外,另分割为一硬盘分割表区(Partition Table Area)113以及一档案区(File Area)114,并以应用程式介面(API,Application Programming Interface)118,于前开各区选择任何一区写入一受保护储存装置识别码(PSID)115,而当该记忆卡1内的档案区(File Area)114载有权利物件(Right Object)116(需要具有权利取得的数位资料)时,对于各种读取器读取时,可以利用该受保护储存装置识别码(PSID)115为辨识读取的加密机制,增加该记忆卡1数位资料的保护管理机制(DRM,Digital Rights Management)的安全性。
配合图2所示,该记忆卡1读取控制端(Controller)111厂商对于应用程式介面(API)应严守秘密,否则其他人即可使用此应用程式介面(API)来得到本发明中置于该记忆体11内的受保护储存装置识别码(PSID)115,例如设于该保护区(Protection Area)112的程式与受保护储存装置识别码(PSID)115。
然而,为求更进一步确保该记忆卡1的受保护储存装置识别码(PSID)115,本发明可以将该记忆卡1设置为一种PSD(Personal Storage Disc),透过一体成型将USB功能与记忆卡整合为一体,让使用者可以不需要透过读卡机及传输线,便可经由电脑的USB接口传输资料,也可以免除有心人士利用轻易拆解记忆卡而取得该内部的记忆体,甚至破解。
本发明所使用的该记忆体11可以为一种快闪记忆体(Flash Memory),亦可以为一种电性可擦除式唯读记忆体EEPROM((Electrically Erasable Programmable  Read-Only Memory)。
一、若要将该受保护储存装置识别码(PSID)(Portable Storage ID)115放入该记忆卡1记忆体11内的读取控制端(Controller)111,即可使用一般记忆卡读取器(例如SD Reader)与针对记忆卡记忆体内的读取控制端(Controller)所发展的应用程式介面(API)即可读取或写入,此种较为安全。请参阅图3所示,该读取控制端(Controller)111与该应用程式介面(API,Application Programming Interface)118间的加解密逻辑为该公共钥匙设施(PKI Public Key Infrastructure)117作为加密系统服务器与解密程式间的加解密逻辑。其公共钥匙设施(PKI Public Key Infrastructure)为公认最严密标准的加解密逻辑。
二、若要将该受保护储存装置识别码(PSID)115放入该记忆卡1的保护区(Protection Area)112,则可以用特殊治具进行记忆卡保护区(Protection Area)112大小的切割,亦可使用一般SD Reader与针对记忆卡记忆体内的保护区(Protection Area)所发展的应用程式介面(API)即可读取或写入。
三、若要将该受保护储存装置识别码(PSID)115放入该硬盘分割表区(Partition Table Area)113,则使用者使用Windows或其他OS进行Format后即可产生此区。
四、若要将该受保护储存装置识别码(PSID)115放入该档案区(File Area)114,则使用者使用Windows或其他OS进行Format后即可产生此区。
无论该受保护储存装置识别码(PSID)115存在何区,该权利物件(Right Object)116皆需要取得权利,方能取用数位资料。当各种装置如个人电脑(PC)、手机或各种播放装置(合称为读取器)欲读取对应的权利物件(Right Object)116档案时,该读取控制端(Controller)111会使用存在该读取控制端(Controller)111的韧体或保护区(Protection Area)112的程式来进行该权利物件(Right Object)116档案解密并由解密的权利物件(Right Object)116档案中求得对应的受保护储存装置识别码(PSID)115,再与储存在该保护区(Protection Area)112(以保护区为例,但不限于保护区)的受保护储存装置识别码(PSID)115作比对,若比对成功方将该权利物件(Right Object)116档案提供予播放装置。若比对不成功则告知播放装置档案不可读取。
在该读取控制端(Controller)111或保护区(Protection Area)112内置唯一的受保护储存装置识别码(PSID)115,不管是使用唯读Read-only的独特装置(Unique Device)ID或是经随机数字产生器(Random Number Generator)且是一次程式 (Once-Time Programming)产生的受保护储存装置识别码(PSID)115,其他人无法复制,而该权利物件(Right Object)116与受保护储存装置识别码(PSID)115的ID比对,可由该读取控制端(Controller)111或播放平台的解密应用程式介面(API)118来进行,当该权利物件(Right Object)116与记忆卡的受保护储存装置识别码(PSID)115一致时方可进行解密与播放。
该应用程式介面118写入该受保护储存装置识别码(PSID)115前,该应用程式介面118给予该读取控制端111一透过加解密逻辑完成的密钥指令,该读取控制端111先行对该密钥指令进行解密,并将结果传送至该应用程式介面118,即该记忆卡读取控制端(Controller)111与播放平台的解密应用程式介面(API)118间的资料是加密的资料(即应用程式介面(API)118欲读取或写入保护区(Protection Area)112的明文资料)前,该应用程式介面(API)118需先以应用程式介面(API)与该读取控制端(Controller)111双方已协议取得的密钥加密命令后,再传送至该读取控制端(Controller)111内,而该读取控制端(Controller)111则先行解密命令、解译命令、执行命令,再将结果(命令回应或资料)先以该应用程式介面(API)118与该读取控制端(Controller)111双方已协议取得的密钥加密命令后,再传送至该应用程式介面(API)118,而该应用程式介面(API)118再以应用程式接口(API)与该读取控制端(Controller)111双方已协议取得的密钥解密结果(命令回应或资料),如此一来,即不用惧怕黑客中途拦截与破解,为增加黑客中途拦截与破解的困难度与增加加密敏捷性。
只有对应的记忆卡读取控制端(Controller)111与播放平台的解密应用程式介面(API)118(如图3)方能解密,以避免其他人经记忆卡读取器(SD Card Reader)的界面来拦截资料。
进一步说明图2的意义,当该读取控制端(Controller)111接受读取器指令而进行资料读取时,首先会进行特定副档名(例如但不限于ROM),当确定为该保护区(Protection Area)112的变量所形成的副档名之后,若是,则循由电性可擦除式唯读记忆体EEPROM(Electrically Erasable Programmable Read-Only Memory)(亦可为快闪记忆体(Flash Memory)),例如但不限于其保护区(Protection Area)(112)储存的加密受保护储存装置识别码(PSID)115,并且取出该副档名下某一位元资料,然后执行存在于该读取控制端(Controller)111的记忆卡韧体,或存在于该保护区(Protection Area)(112)内的内码(CODE)。然后判断取出的位元资料是否符合该受保护储存装置 识别码(PSID)115,若是,则执行原来读取器得以读取的路径与资料;若不是,则依不正常回报bus protocal(汇流排协议)。本发明对于数位版权管理机制(DRM,Digital Rights Management)提供一种数位资料的保护管理机制,除音乐、影像甚至视讯的数位资料,皆可以达到有效保护,保障数位资料使用的授权取用,以及不被第三者非法存取,避免不必要的数位资产损失。

Claims (10)

  1. 一种数位资料记忆卡加密的方法,于一记忆卡内设置一记忆体,而该记忆体本身设置有一配合读取器的读取控制端(Controller)以及一保护区(Protection Area)外,另外分割为一硬盘分割表区(Partition Table Area)以及一档案区(File Area),并以应用程式介面(API,Application Programming Interface),选择其一区,写入一受保护储存装置识别码(PSID,Portable Storage ID),而当记忆卡内的档案区(File Area)载有权利物件(Right Object)时,对于各种读取器读取时,可以利用该受保护储存装置识别码(PSID)为辨识读取的加密机制,增加记忆卡数位资料的保护管理机制(DRM,Digital Rights Management)的安全性,且该应用程式介面写入该受保护储存装置识别码(PSID)前,该应用程式介面给予该读取控制端透过加解密逻辑完成的密钥指令,该读取控制端先行对该密钥指令进行解密,并将结果传送至该应用程式介面。
  2. 如权利要求1所述的数位资料记忆卡加密的方法,其特征在于该记忆体为一种选自于快闪记忆体(FLASH)、电性可擦除式唯读记忆体EEPROM((Electrically Erasable Programmable Read-Only Memory)。
  3. 如权利要求1所述的数位资料记忆卡加密的方法,该应用程式介面(API)使用该读取控制端(Controller)置入该记忆体的保护区。
  4. 如权利要求1所述的数位资料记忆卡加密的方法,该应用程式介面(API)使用微软视窗操作系统(Windows)置入该硬盘分割表区。
  5. 如权利要求1所述的数位资料记忆卡加密的方法,该应用程式介面(API)使用微软视窗操作系统(Windows)置入该记忆体的档案区。
  6. 如权利要求1所述的数位资料记忆卡加密的方法,其特征在于该记忆卡为PSD(Personal Storage Disc)一体成型。
  7. 一种数位资料记忆卡加密的构造,该记忆卡包括一记忆体,而该记忆体设置:
    一读取控制端(Controller):
    一保护区(Protection Area):
    一硬盘分割表区(Partition Table Area),以及一档案区(File Area);以应用程式介面(API,Application Programming Interface),于前开各区选择其一,写入一受保护储存装置识别码(PSID,Portable Storage ID),且该应用程式介面写入该受保护储 存装置识别码前,该应用程式介面给予该读取控制端一透过加解密逻辑完成的密钥指令,该读取控制端先行对该密钥指令进行解密,并将结果传送至该应用程式介面。
  8. 如权利要求7所述的数位资料记忆卡加密的构造,其特征在于该记忆体为一种选自于快闪记忆体(FLASH)、电性可擦除式唯读记忆体EEPROM((Electrically Erasable Programmable Read-Only Memory)。
  9. 如权利要求7所述的数位资料记忆卡加密的构造,其特征在于该记忆卡为PSD(Personal Storage Disc)一体成型。
  10. 如权利要求7所述的数位资料记忆卡加密的构造,其特征在于该记忆卡的读取控制端(Controller)与该应用程式介面(API,Application Programming Interface)间的加解密逻辑为公共钥匙设施(PKI Public Key Infrastructure)作为加密系统服务器与解密程式间的加解密逻辑。
PCT/CN2019/115514 2019-11-05 2019-11-05 数位资料记忆卡加密的构造及方法 WO2021087710A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/CN2019/115514 WO2021087710A1 (zh) 2019-11-05 2019-11-05 数位资料记忆卡加密的构造及方法
US17/773,014 US20220398202A1 (en) 2019-11-05 2019-11-05 Structure and method for digital data memory card encryption
CN201980101411.0A CN114556308A (zh) 2019-11-05 2019-11-05 数位资料记忆卡加密的构造及方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/115514 WO2021087710A1 (zh) 2019-11-05 2019-11-05 数位资料记忆卡加密的构造及方法

Publications (1)

Publication Number Publication Date
WO2021087710A1 true WO2021087710A1 (zh) 2021-05-14

Family

ID=75848710

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/115514 WO2021087710A1 (zh) 2019-11-05 2019-11-05 数位资料记忆卡加密的构造及方法

Country Status (3)

Country Link
US (1) US20220398202A1 (zh)
CN (1) CN114556308A (zh)
WO (1) WO2021087710A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200828074A (en) * 2006-12-29 2008-07-01 Universal Scient Ind Co Ltd Security method, security system and pairing/encryption system
WO2009012613A1 (en) * 2007-07-20 2009-01-29 Hui Lin Construction and method for encrypting digital information memory card
WO2010043071A1 (zh) * 2008-10-16 2010-04-22 Lin Hui 记忆卡及其数位内容保护区建立或取消方法
CN102768716A (zh) * 2011-05-04 2012-11-07 杨建纲 记忆卡及其读取、数据加密、金钥产生及密码变更方法

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE441897T1 (de) * 1995-02-13 2009-09-15 Intertrust Tech Corp Systeme und verfahren zur verwaltung von gesicherten transaktionen und zum schutz von elektronischen rechten
US7478248B2 (en) * 2002-11-27 2009-01-13 M-Systems Flash Disk Pioneers, Ltd. Apparatus and method for securing data on a portable storage device
KR100516504B1 (ko) * 2003-09-30 2005-09-26 (주)잉카엔트웍스 네트워크를 통하여 개인 휴대 단말기와 데이터 동기화를수행하기 위한 방법 및 그 시스템
US20130179949A1 (en) * 2004-01-22 2013-07-11 Jpay, Inc. Secure exchange of digital content
US7707039B2 (en) * 2004-02-15 2010-04-27 Exbiblio B.V. Automatic modification of web pages
US7812860B2 (en) * 2004-04-01 2010-10-12 Exbiblio B.V. Handheld device for capturing text from both a document printed on paper and a document displayed on a dynamic display device
US9143638B2 (en) * 2004-04-01 2015-09-22 Google Inc. Data capture from rendered documents using handheld device
US9460346B2 (en) * 2004-04-19 2016-10-04 Google Inc. Handheld device for capturing text from both a document printed on paper and a document displayed on a dynamic display device
US7509530B2 (en) * 2005-01-19 2009-03-24 Sonic Solutions Method and system for use in restoring an active partition
US7743409B2 (en) * 2005-07-08 2010-06-22 Sandisk Corporation Methods used in a mass storage device with automated credentials loading
KR101379861B1 (ko) * 2006-10-20 2014-04-17 삼성전자주식회사 Drm 제공 장치, 시스템 및 그 방법
CN102902499B (zh) * 2012-08-22 2015-06-03 华为技术有限公司 存储设备的分区显示方法和装置
US11200569B1 (en) * 2018-02-12 2021-12-14 Winklevoss Ip, Llc System, method and program product for making payments using fiat-backed digital assets
US11475442B1 (en) * 2018-02-12 2022-10-18 Gemini Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens
US10373158B1 (en) * 2018-02-12 2019-08-06 Winklevoss Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens
US10540654B1 (en) * 2018-02-12 2020-01-21 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US11308487B1 (en) * 2018-02-12 2022-04-19 Gemini Ip, Llc System, method and program product for obtaining digital assets

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200828074A (en) * 2006-12-29 2008-07-01 Universal Scient Ind Co Ltd Security method, security system and pairing/encryption system
WO2009012613A1 (en) * 2007-07-20 2009-01-29 Hui Lin Construction and method for encrypting digital information memory card
WO2010043071A1 (zh) * 2008-10-16 2010-04-22 Lin Hui 记忆卡及其数位内容保护区建立或取消方法
CN102768716A (zh) * 2011-05-04 2012-11-07 杨建纲 记忆卡及其读取、数据加密、金钥产生及密码变更方法

Also Published As

Publication number Publication date
US20220398202A1 (en) 2022-12-15
CN114556308A (zh) 2022-05-27

Similar Documents

Publication Publication Date Title
CN1331125C (zh) 用于控制在可移动媒体上分发的数字内容的使用和复制的方法
US10592641B2 (en) Encryption method for digital data memory card and assembly for performing the same
US8393005B2 (en) Recording medium, and device and method for recording information on recording medium
US20090013195A1 (en) Data Storing Method, Data Playback Method, Data Recording Device, Data Playback Device, and Recording Medium
KR101954215B1 (ko) 비휘발성 저장 장치의 이용 방법 및 장치
US20070014403A1 (en) Controlling distribution of protected content
JP2006268851A (ja) データ記憶装置内のデータ転写
US8079071B2 (en) Methods for accessing content based on a session ticket
US20080112566A1 (en) Apparatuses for accessing content based on a session ticket
JP2005505853A (ja) ユーザデータを読出し又は書込みするための装置及び方法
KR101558914B1 (ko) 복제 방지시스템이 적용된 유에스비 오티지 메모리를 이용한 멀티미디어 원본 파일 생성방법 및 그 재생방법
WO2021087710A1 (zh) 数位资料记忆卡加密的构造及方法
TWI820242B (zh) 數位資料記憶卡加密之構造及方法
US20080112562A1 (en) Methods for linking content with license
KR102026634B1 (ko) 컨텐츠 재생 시스템의 인증 방법
TWI448134B (zh) A method for reading a portable data storage device for a playback platform
WO2007128162A1 (fr) Procédé de protection d'un contenu numérique par chiffrement et déchiffrement d'une carte mémoire
Staring et al. Protected data storage system for optical discs
KR20060018173A (ko) P2p네트워킹 환경 하에서의 디지털컨텐츠의 저작권 보호를 위한 가상 드라이브모듈
TW200903340A (en) Structure and method for encrypting digital data memory card
WO2009152639A1 (zh) 可供播放平台读取可移植性资料储存装置的方法
TW200809503A (en) Apparatus and method for digital content protection and universally play using hidden data area
TW200837600A (en) Methods and apparatuses for linking content with license

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19951278

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19951278

Country of ref document: EP

Kind code of ref document: A1