ZA200105908B - Electronic data storage and display apparatus. - Google Patents

Electronic data storage and display apparatus. Download PDF

Info

Publication number
ZA200105908B
ZA200105908B ZA200105908A ZA200105908A ZA200105908B ZA 200105908 B ZA200105908 B ZA 200105908B ZA 200105908 A ZA200105908 A ZA 200105908A ZA 200105908 A ZA200105908 A ZA 200105908A ZA 200105908 B ZA200105908 B ZA 200105908B
Authority
ZA
South Africa
Prior art keywords
data
data store
electronic
encryption key
store
Prior art date
Application number
ZA200105908A
Inventor
Jarman David Michael
Original Assignee
Jarman David Michael
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jarman David Michael filed Critical Jarman David Michael
Publication of ZA200105908B publication Critical patent/ZA200105908B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/109Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Digital Computer Display Output (AREA)

Description

& > -
X Electronic data storage and display apparatus
This invention relates to electronic data storage and display apparatus, and in particular to such apparatus for the storage and display of electronic data that has commercial value such as electronically formatted books.
With the advances in the fields of microchip and display screen technologies, and allied computing advances it is becoming increasingly economically viable to produce apparatus that is easily portable and can store, manipulate and display large quantities of electronic data. There is, however, often a reluctance on the part of the owners of that data to release it to members of the public because of the ease of replication of electronic data. For data with commercial value such replication deprives the parties involved with the genesis and distribution of the data of a suitable reward for the production or distribution of that data.
For example, if the data when rendered legible by suitable software is the text of a book, then if the data becomes available to the public not under the . control of a distributor, copyright owner or the like, then if electronic copies of that data may easily be i 25 made, the publisher of that data and possibly others will suffer economic damage, for example being able only to sell fewer copies of a book than would otherwise be the case.
One approach is to render the data "copy protected".
This can be effective in some environments, though there is a widespread belief that copy-protection systems simply pose a challenge to those who would "&ircumvent - them. However, copy-protection systems which rely on encryption and decryption of data provide some effectiveness, for example as described in WO 97/44736.
However, the system is cumbersome and not always user-
’ - a friendly. Systems which have been proposed for use in y this area include those described in EP-A-0665486, WO 3 95/08231 and W099/12087, though the last of these does not form part of the state of the art. All seek to enhance the security against copying by using cryptographic techniques and generally require the use of encryption/decryption keys which are transmitted, after an authenticated request has been received, e.g. over a suitable communications link which has been established for that purpose.
The present invention provides apparatus for the transmittal, reception, storage and display of data in an electronic format in which there is provided a casing that includes a data storage means, a data display means, and a data transmission/reception means including at least one output/input port,and wherein the data transmission/reception means includes means for decrypting received data and placing it in the data storage means, encrypting and transmitting data from the data storage means and means for storing at least one encryption key, and characterised in that one encryption key references addresses in a portion of Read Only i
Memory forming part of the apparatus, and the content of those addresses is used to encrypt/decrypt . transmitted/received data.
This approach, especially when used on a direct communications channel between user and information provider, rather than via a wide area network such as the internet, is advantageous as there is never any need to engage in a key request dialogue. Instead, an encryption/decryption key may be generated and used by reference to the addresses of resident code areas in ROM in the apparatus. This is explained in more detail below.
In use, for example when the user of the apparatus wishes to obtain an electronic version of a book, the user connects the apparatus of the present invention to an appropriate source of electronic data in the following manner: 1) the apparatus enters into electronic communication with the data source and sends an identification code tc the data source, ii) the data source confirms the identity of the apparatus and thereby determines what encryption key to use in communicating with the apparatus, iii) the user of the apparatus causes the apparatus to send a code to the data source identifying the data to be received by the apparatus, iv) the data source transmits the identified data in encrypted form to the apparatus which decrypts that data and places it in the data storage means, i Vv) the data source transmits a new encryption key to the apparatus, which key overwrites the previous : 25 encryption key, and vi) the communication between the apparatus and the data source is broken.
By having the apparatus and the data source interact in this fashion, the electronic data is encrypted when it is travelling between the owners or distributors of the data and the legitimate end user of the data. Because the encryption key between the data source and the apparatus is altered after each transaction, it will be very difficult for an illegitimate receiver of the data to decrypt that data. Even if that does prove possible,
the illegitimate receiver only then gains the encryption / key for one specific piece of apparatus the next time it i connects to the data source and not the data source as a whole.
In a particularly preferred embodiment of the present invention the apparatus stores two encryption keys, one of which is stored in either Electronically Erasable
Programable Read Only Memory or non-volatile Random
Access Memory, and the other of which is stored in Read
Only Memory. The encryption key in the Electronically
Erasable Programable Read Only Memory or non-volatile
Random Access Memory is the key that is rewritten when the apparatus interacts with a data store.
In a preferred embodiment of the present invention, the encryption key in the Electronically Erasable
Programmable Read Only Memory or non-volatile Random
Access Memory is 16 bytes in size. The portion of Read
Only Memory, the content of which is used to encrypt/decrypt transmitted/received data, is preferably 256 bytes in size.
The data storage means in the apparatus of the present invention is preferably non-volatile random access . memory. It may, however, alternatively be in the form of a magnetic disk, built into the casing and so constructed that attempts to remove the disc would result in the destruction of at least the data on the disc, or any other known data storage media which could be built into the casing.
The method of communication between the apparatus of the present invention and the data store is most preferably via the telephone network, and at least one input/output port in the casing is adapted to connect to that network most preferably via an electromagnetic radiation link.
¥ In alternative embodiments other methods of connection the data source are possible and at least one n input/output port in the casing is appropriately configured for that connection.
In a preferred embodiment of the present invention, the display means includes a display screen and computer hardware and software to enable presentation of the data in graphical and/or textual form. The computer hardware preferably includes user control means which will allow a user of the apparatus to move through the data in an appropriate fashion. The display screen of the present invention is preferably of sufficient size that the viewing area thereof is at least 110mm by 180mm. The screen is preferably of a type that has a low power consumption.
In an alternative embodiment of the present invention, the apparatus additionally includes known means for the generation of sound. The sound generation means can be controlled by the computer software that controls the display means, or by independent control means. In this } embodiment the reader of, for example, a book about ornithology may be played the sound of the bird which he . 25 is reading about.
It will be appreciated that the size of the data storage means in the apparatus of the present invention will be finite. As such, and to avoid the problem of either having to delete and loose a previously acquired set of data, or having to acquire a new apparatus, the apparatus of the present invention is configured so that it can export some or all of the data stored in the data storage means. To prevent duplicatable and readable copies of the data being exported, the apparatus is configured only to export the data in an encrypted form.
It is clearly desirable that the exported data can be \ imported back onto the apparatus of the present i invention, so that the data can be viewed again at a later date.
The data is preferably exported to and imported from a dedicated data store adapted to interact with the apparatus of the present invention. In the first preferred embodiment, the method of transfer of the data is as follows: i) the apparatus enters into electronic communication with the data store which sends an identification code to the apparatus, ii) the apparatus confirms the identity of the data store and thereby determines what data store encryption key to use in communicating with the data store, iii) the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form, ) iv) the receiver of the encrypted data decrypts that . data and stores it, v) the apparatus transmits a new data store encryption key to the data store, which key overwrites the previous data store encryption key, and vi) the communication between the apparatus and the data store is broken.
In a second preferred embodiment the method of transfer of the data is as follows:
i) the apparatus enters into electronic communication with the data store, } ii) the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form, iii) the receiver of the data stores the data, and iv) the communication between the apparatus and the data store is broken.
In this second embodiment the data store stores the data in encrypted form. Preferably there is, however, a little un-encrypted data attached to the encrypted data.
That un-encrypted data can, for example, give an indication of the contents of the data, and/or the apparatus that placed the data in the data store and consequently the apparatus that can decrypt the data.
This will allow more than one piece of apparatus of the present invention to use the data store. ) In either of the two above described embodiments, the data transfer between the apparatus and the data store } 25 can be either via electrical or optical cables or via electromagnetic radiation.
The apparatus of the present invention may be provided with its own power source and/or means for taking power from an external power source.
In one particularly preferred embodiment of the present invention, the apparatus is provided with a computer chip that has the specification, details and method of operation as follows:
SPECIFICATION
EEPROM: 16 bytes of key memory (addresses 0 - 15). 112 bytes of user memory (addresses 16 - 127).
POWER: SmA @SV when active 6mA @SV when writing to ceprom 10uA @5V in power saving mode.
CONVERSION RATE: approx. 30KPS.
MASK LOOKUP TABLE
Rom address 0=1255 starting with address 0 = 255 the rom table is filled by 1=1254 the following formula : 2=253 3=1252 rom table[ address } = 255 - address 4=125] 5=250 250=5 251=4 252=3 253=2 i 254=1 255=0
ENCRYPTION/DECRYPTION OPERATION
Version 1.0 of crypto uses a key length of 16 bytes.
First write the 16 byte key to eeprom addresses 0 - 1S.
Each byte of key is used to access an 8 bit mask from within a 256 byte lookup table.
Each data byte 1s encrypted/decrypted by exclusive oring it with the 8 bit mask.
As each byte of data is encrypted/decrypted the mask is rotated one bit position to the left.
After eight bit rotations a new mask is loaded using the next key in the sequence of sixteen.
The sequence of masks will be repeated gain when all sixteen have been used. 8 Ca.
SUBSTITUTE SHEET (RULE 26)
OPERATION MODES
EEPROM WRITE (mode 0) 1. Wait until BUSY line is a logic low. 2. ‘Write number 0 (binary 00000000) to PORTO. 3 Wait until BUSY line is a logic low. 4. Write eeprom address (0 - 127) to PORT]. 5. Wait until BUSY line is a logic low. 6. Write eeprom data to PORT2.
Steps 1 & 2 need only be done once to set eeprom write mode.
DECRYPT DATA (mode 1)
L Wait until BUSY line is a logic low. 2. Write number 1 (binary 00000001) to PORTO. 3 Wait until BUSY line is a logic low. 4, Write data for decryption to PORT2. ) 5. Wait until BUSY line is a logic low. 6. Read decrypted data from PORTS.
Steps | & 2 need only be done once to set data decrypt mode.
ENCRYPT DATA (mode 2)
I. Wait until BUSY line is a logic low. 2. Write number 2 (binary 00000010) to PORTO. 3 Wait until BUSY line is a logic low. 4 Write data for encyption to PORT2. 5. Wait until BUSY line is a logic low. 6. Read encrypted datz from PORT3,
Steps 1 & 2 need only be done once to set data encrypt mode. 9 -
SUBSTITUTE SHEET (RULE 26)
2 BR
EEPROM READ (mode 3) 1. Wait until BUSY line is a logic low. 2, Write number 3 (binary 00000011) to PORTO. 3 Wait until BUSY line is a logic low. 4 Write eeprom address (0 - 127) to PORT2. s. Wait until BUSY line is a logic low. 6. Read eeprom data from PORT3.
Steps 1 & 2 need only be done once to set eeprom read mode.
RESET COUNTERS (mode 4)
This will reset the rotate counter & key index to zero. 1. Wait until BUSY line is a logic low. 2. Write number 4 (binary 00000100) to PORTO.
POWER SAVING (mode 5)
This will put the crypto peb into sleep mode. . 1. Wait until BUSY line is a logic low. 2. Write number 5 (binary 00000101) to PORTO. 3 Weit until BUSY line is a logic zero before proceeding.
Waking up the crypto unit from power saving mode 1. Do a dummy read from PORTO or Write a new operation mode to PORTO. 2. Wait until BUSY line is a logic low before proceeding.
SUBSTITUTE SHEET (RULE 26)
¥
WAY IDC CONNECTOR PIN OUT & DESCRIPTION 1. GND Power supply 0V connection. : 2. +5/3.3 VDC Power supply positive connection. 3 \RESET Active low external chip reset. Leave disconnected if control of reset is not required. The chip takes approximately 80msS to reset after a low to high transition of the reset pin. 4. \RD Active low read control input.
S. \WR Active low write control input 6. \CS Active low chip select input. 7. AO Port address select input. 8. Al Port address select input. 9. D7 Bit 7 of bi-directional data bus. 10. D6 Bit 6 of bi-directional data bus. 11. DS Bit 5 of bi-directional data bus. 12. D4 Bit 4 of bi-directional data bus. 13. D3 Bit 3 of bi-directional data bus. 14. D2 Bit 2 of bi-directional data bus. 1S. D1 Bit 1 of bi-directional data bus. 16. Do Bit 0 of bi-directional data bus. 17. BUSY Active high busy output. 18. \BUSY Active low busy output. 19. RxD Serial data put (do not connect). 20. TxD Serial data output (do not connect). 11
SUBSTITUTE SHEET (RULE 26)

Claims (15)

  1. . Claims y 1 Apparatus for the transmittal, reception, storage and display of data in an electronic format in which there is provided a casing that includes a data storage means, a data display means, and a data transmission/reception means including at least one output/input port,and wherein the data transmission/reception means includes means for decrypting received data and placing it in the data storage means, encrypting and transmitting data from the data storage means and means for storing at least one encryption key, and characterised in that one encryption key references addresses in a portion of Read Only Memory forming part of the apparatus, and the content of those addresses is used to encrypt/decrypt transmitted/received data. .
  2. 2 Apparatus according to claim 1 in which at least one encryption/decryption key is stored in a portion of either Electronically Erasable Programable Read Only Memory or non volatile Random Access Memory, and may be rewritten by an external key issuing computer. -
  3. 3 Apparatus according to claim 2 in which at least one encryption key is 16 bytes in size.
  4. 4 Apparatus according to any one of claims 1 to 3 in which the Read Only Memory is at least 256 bytes in size.
  5. 5 Apparatus according to any one of claims 1 to 4 in which the data storage means is comprised of non volatile Random Access Memory.
    oy -
  6. 6 Apparatus according to any one of claims 1 to 5 in which an output/input port is adapted to connect . with a telephone sccket via an electromagnetic radiation link.
  7. 7 Apparatus according to any one of claims 1 to 6 in which the display means includes a display screen and computer hardware and software to enable presentation of the data in graphical and/or textual form,
  8. 8 Apparatus according to any one of claims 1 to 7 which is provided with a computer chip that has the specification, details and method of operation as set out on attached sheets marked Al, A2, A3, and
    Ad.
  9. 9 A method of using apparatus according to any one of claims 1 to 8 for the reception of electronic data from an external data source characterised in that: i) the apparatus enters into electronic ’ communication with the data source and sends an identification code to the data source, . 25 ii) the data source confirms the identity of the apparatus and thereby determines what encryption key to use in communicating with the apparatus, iii) the user of the apparatus causes the apparatus to send a code to the data source identifying the data to be received by the apparatus, iv) the data source transmits the identified data in encrypted form to the apparatus which decrypts that data and places it in the data storage means, Vv) the data source transmits a new encryption key to the apparatus, which key overwrites the previous encryption key, and vi) the communication between the apparatus and the data source is broken.
  10. 10 A method according to claim 9 in which the means of electronic communication between the apparatus and the data source is via the telephone network.
  11. 11 A method according to claim 9 in which the means of electronic communication between the apparatus and the data source is via the internet.
  12. 12 A method according to anyone of claims 9 to 11 in which the electronic data is electronically stored text and/or graphics.
  13. 13 A method of using apparatus according to any one of claims 1 to 8 for the transfer of electronic data ’ between the apparatus and an external data store characterised in that: . i) the apparatus enters into electronic communication with the data store which sends an identification code to the apparatus,
    ii) the apparatus confirms the identity of the data store and thereby determines what data store encryption key to use in communicating with the data store,
    iii) the user of the apparatus causes the apparatus to transfer preselected data between the - 1 a -
    “ne | | - apparatus and the data store in encrypted form, . iv) the receiver cf the encrypted data decrypts that data and stores it,
    Vv) the apparatus transmits a new data store encryption key to the data store, which key overwrites the previous data store encryption key, and vi} the communication between the apparatus and the data store is broken.
  14. 14 A method of using apparatus according to any one of claims 1 to 8 for the transfer of electronic data between the apparatus and an external data store characterised in that:
    i) the apparatus enters into electronic communication with the data store,
    ‘ ii) the user of the apparatus causes the apparatus to transfer preselected data between the
    } 25 apparatus and the data store in encrypted form,
    iii) the receiver of the data stores the data, and iv) the communication between the apparatus and the data store is broken.
  15. 15 A method according to claim 14 in which the electronic data is transmitted from the data store to the apparatus, and is saved in the apparatus in decrypted form.
    - 1 5 -
    “ - of 16 A method according to claim 14 in which the electronic data is transmitted from the apparatus . to the data store, and is saved in the data store in encrypted form, the encryption key being a permanent encryption key for that data held in the apparatus. 17 A method according to any one of claims 13 to 16 in which the data store will on interrogation by the apparatus, provide the apparatus with a list of the data stored within the data store. 18 A method according to any one of claims 13 to 17 in which the means of electronic communication between the apparatus and the data store is via electrical or optical cable. 19 A method according to any one of claims 13 to 17 in which the means of electronic communication between the apparatus and the data store is via electromagnetic radiation. 20 A method according to anyone of claims 13 to 19 in ) which the electronic data is electronically stored text and/or graphics. .
ZA200105908A 1998-12-18 2001-07-18 Electronic data storage and display apparatus. ZA200105908B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB9828093.6A GB9828093D0 (en) 1998-12-18 1998-12-18 Electronic data storage and display apparatus

Publications (1)

Publication Number Publication Date
ZA200105908B true ZA200105908B (en) 2002-02-21

Family

ID=10844621

Family Applications (1)

Application Number Title Priority Date Filing Date
ZA200105908A ZA200105908B (en) 1998-12-18 2001-07-18 Electronic data storage and display apparatus.

Country Status (6)

Country Link
EP (1) EP1159664A1 (en)
AU (1) AU1867700A (en)
CA (1) CA2355713A1 (en)
GB (2) GB9828093D0 (en)
WO (1) WO2000038035A1 (en)
ZA (1) ZA200105908B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR0116358A (en) 2000-12-22 2003-12-23 Nagravision Sa Anti-cloning Method
GB2373597B (en) * 2001-03-20 2005-02-23 Hewlett Packard Co Restricted data access
US9582685B2 (en) 2010-11-19 2017-02-28 Nagravision S.A. Method to detect cloned software

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2681165B1 (en) * 1991-09-05 1998-09-18 Gemplus Card Int METHOD FOR TRANSMITTING CONFIDENTIAL INFORMATION BETWEEN TWO CHIP CARDS.
US5956034A (en) * 1996-08-13 1999-09-21 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials

Also Published As

Publication number Publication date
EP1159664A1 (en) 2001-12-05
WO2000038035A1 (en) 2000-06-29
GB0117025D0 (en) 2001-09-05
CA2355713A1 (en) 2000-06-29
GB9828093D0 (en) 1999-02-17
AU1867700A (en) 2000-07-12
GB2363649A (en) 2002-01-02

Similar Documents

Publication Publication Date Title
AU2005223902B2 (en) Authentication between device and portable storage
CN100371847C (en) Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof
CN100514471C (en) Method and system of visiting encrypting content on mobile media by device
US7337332B2 (en) Transferring electronic content
EP0002580B1 (en) A process for the verification of cryptographic operational keys used in data communication networks
US4386234A (en) Cryptographic communication and file security using terminals
EP0002390B1 (en) Method for cryptographic file security in multiple domain data processing systems
JP4857123B2 (en) Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method
TW563319B (en) Method and device for controlling distribution and use of digital works
US20050210236A1 (en) Digital rights management structure, portable storage device, and contents management method using the portable storage device
WO2004109972A1 (en) User terminal for receiving license
EP1751758A1 (en) Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same
CA2405401A1 (en) Secure data transmission system and method
CN1981262A (en) Trusted license removal
AU2005248693A1 (en) Apparatus and method for operating plural applications between portable storage device and digital device
US20040117639A1 (en) Secure driver
JPH07123086A (en) Literary work communication control system using ic card
EP1146685B1 (en) Decryption device
CN100557716C (en) Semiconductor memory card and control method thereof
ZA200105908B (en) Electronic data storage and display apparatus.
EP1714204B1 (en) License information management apparatus and license information management method
JP2001344216A (en) Download system using memory card with recording limit information
JPH1020778A (en) Encoding device, decoding device and ic card
KR100407692B1 (en) Hard Disk Real Time Security System and Preservation Method of Hard Disk Real Time Security System
CN111639305B (en) Block chain-based content copyright protection method and system