CN1327586A - Recovery of a master key from recorded published material - Google Patents

Recovery of a master key from recorded published material Download PDF

Info

Publication number
CN1327586A
CN1327586A CN00801828A CN00801828A CN1327586A CN 1327586 A CN1327586 A CN 1327586A CN 00801828 A CN00801828 A CN 00801828A CN 00801828 A CN00801828 A CN 00801828A CN 1327586 A CN1327586 A CN 1327586A
Authority
CN
China
Prior art keywords
key
encrypted
master key
public
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN00801828A
Other languages
Chinese (zh)
Inventor
M·A·埃普斯坦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of CN1327586A publication Critical patent/CN1327586A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Storage Device Security (AREA)
  • Television Signal Processing For Recording (AREA)

Abstract

An encryption of a master key is included with each recording of encrypted published material that requires the master key for decryption and subsequent processing. The master key is encrypted using a public key associated with a trusted authority, typically encoded on a smartcard that is associated with each authorized user. Should the smartcard be lost, or the decryption device become inoperative, one of the recordings containing the encrypted master key is sent to the trusted authority for a retrieval of the master key. The trusted authority uses the private key corresponding to the public key that was used to encrypt the master key to determine the master key. In a preferred embodiment, the trusted authority is the vendor of the smartcard or other encryption/decryption device, and provides a replacement smartcard or device containing the retrieved master key, typically for a fee, for subsequent use by the user to decrypt other recorded material in the user's collection.

Description

Recover master key from the open source information that is recorded
The present invention relates to a kind of consumer appliances, specifically, the present invention relates to recovery with the open source information of encrypted form record.
Digital recording has unique characteristic, and promptly the duplicate of information material and source book have equal in quality.To the demand of protecting duplicate effectively for being vital by the protection of the information material of digital recording.Worked out or proposed multiple protection scheme with encrypted form recorded information data.Other protection scheme also is studied out or proposes, and promptly record is used for the encrypted key that reads or reproduce of control information data.In these protection schemes, " smart card " is used to encrypted information is decrypted.Smart card comprises master key, and described master key is used to information material is encrypted or deciphered, or is used for the key of the reproduction of another control information data is encrypted or deciphered.Another kind of scheme is that master key is comprised in record or the fetch equipment, or is comprised in the Information Access module that is used for the information material deciphering.Usually select smart card or Information Access module for use, so that allow to use substituting or fetch equipment of another kind of scheme or record.
After a period of time, the user will gather the collection of record, comprise the smart card of master key by use, can visit the information material that described collection comprises.Under this encrypted environment, in case lose smart card or the inefficacy of Information Access module, the record that the user is collected is in fact useless.The information that other is encrypted, computer file system for example is in case lose smart card or master key, also sensitive for damages.A kind of general method that alleviates influence relevant with losing smart card and trouble is the registration of preserving smart card and associated master key.Yet this system requirements user has the means of differentiating specific smart card after losing smart card, or requires above-mentioned registration to comprise the identifier of each smart card of each user.This system is difficult to management, occurs easily unfortunately, promptly because the wrong registration or the identifier of user error cause completely losing user's collection.
Aspect law enforcement or national security, " digital phase-locking case " skill is suggested, and the Public key by using the clientage comprises the password of the master key of each encrypted file to the encryption of master key, and the urgent approach of the encrypted file of visit is provided.U.S. Pat 5,557,346 and 5,557,765 and International Patent Application WO 99/04530 and WO98/47260 introduced these skills, and in the present invention combined.Disclosed skill has hindered different safety practices in these patent documentations, and described measure stops the encrypted information of unauthorized access and protects the individual's of establishment information secret.
An object of the present invention is to provide a kind of method and apparatus that is used to write down encrypted open source information, be convenient to recover master key, described master key is used to disclosed data is decrypted.Another object of the present invention provides a kind of method, and this method provides a kind of decryption device that substitutes that comprises master key, and described master key is applicable to encrypted information is decrypted.
Achieve this end together and other purpose by the password of master key and each record are included in, described record comprises that the requirement master key is decrypted and with the encrypted open source information of aftertreatment.Use the Public key relevant that master key is encrypted with the clientage.In case smart card is lost or decryption device can not be operated, comprise that any one record is fed to the clientage in the record of encrypted master key, be used to retrieve master key.The clientage uses the private cipher key corresponding with Public key to determine master key, and described Public key is used to master key is encrypted.In a preferred exemplary, the clientage is the dealer of smart card or other encryption/decryption device.After the charge, provide a replacement smart card or an equipment that comprises the master key that is retrieved, the user is used continuously, be decrypted with other data that is recorded in the user is collected.
Hereinafter in conjunction with the drawings, utilize example that the present invention is carried out detailed introduction.
Fig. 1 schematically illustrates the system that is used to write down encrypted open source information according to the invention;
Fig. 2 schematically illustrates the flow process that is used to write down the system of encrypted open source information according to the invention;
Fig. 3 has shown the flow process that is used to retrieve master key according to the invention.
In institute's drawings attached, the identical similar or identical feature or function of Reference numeral representative.
Fig. 1 schematically illustrates for example system 100 of audio-frequency information, audio-visual information, virtual reality information, multimedia messages and similar information of encrypted open source information that is used to write down according to the invention.For this purpose, term " open source information " means by a side and writes down and be assigned to the normally public's information material of the opposing party.The encryption of information that Here it is can not keep the secret of its information material, but keeps the right of duplicating and checking to open source information.
A kind of encryption device 110 data 101 of receiving information, and encrypted information material offered recording unit 130, be used to be recorded in medium 140.As everyone knows, information material 101 often comes from an information source with encrypted form, and for example the broadcasting of charge is in due order deciphered by this locality then.For the ease of understanding, decryption step does not show in Fig. 1, needn't further introduce in this article yet.
According to encryption device 110 employed certain criteria or agreements, decryption device 110 uses master key M121 that information material is encrypted, and produces a password E M(CM) 112, or use a session key K that information material is encrypted, produce a password E K(CM) 114.Master key M121 is constant to all encryptions of particular system 100, and master key M121 is provided by the smart card as access device 120 for example shown in Figure 1 usually.Another kind of situation is, access device 120 can be embedded within the independent access module, for example a set top box or other equipment.As everyone knows, for the classification of concrete information material or every kind of information material, session key K can change, and can comprise for example a ticket or other project, is used to differentiate to the demonstration of information material or duplicates right.With reference to denomination of invention is " by the copy protection of ticket password "; application number is 09/333; 628; the applying date is on June 15th, 1999, and acting on behalf of the people is Michael, and proxy number is PHA23; 457 (attorney docket PHA 23; 457) United States Patent (USP), it has introduced the skill that is used to duplicate and show the protection of copyrighted data, and above-mentioned skill is in the present invention combined.Session key K is produced by this locality usually, for example uses the key change between an encryption device 110 and the corresponding decryption device 160.With reference to denomination of invention is " by the key change of a portable remote control equipment ", application number is _, the applying date is _, acting on behalf of the people is Michael, proxy number is the United States Patent (USP) of PHA_ (disclosing 700621), it has proposed to be used for the method and system at the exchanged between equipment password key that is authorized to, and is also in the present invention combined.
According to the present invention, provide the main close access device 120 of M121 of wanting that a Public key P122 also is provided, described Public key P122 and a clientage for example dealer of access device 120 are relevant.Public key is the right part of public and private key, and the right private cipher key of public and private key is stored in the clientage there as secret.Use the project of the right public-key encryption of public and private key only can be deciphered by the right private cipher key of public and private key.Encryption device 110 uses Public key P122 that master key M121 is encrypted, and with encrypted master key E P(M) 111 be notified to recording unit 130, be used for and encrypted information material E M(CM) 112 or E K(CM) 112 be recorded in together on the medium 140.If use session key K that encrypted information is encoded, encryption device 110 also uses master key M that the speech channel key K is encrypted, and provides a session key E who encrypts to recording unit 130 M(K) 113, be used to be recorded in medium 140.In many cases, be difficult to session key K is stored on the smart card, simultaneously provide a kind of smart card that comprises master key M121 by use to retrieve the measure of session key K based on the record of the password of the session key of master key M121.It is pointed out that by enciphered message data CM101 or key K, use the information E of master key M121 decrypt encrypted K(CM) 114, and these passwords 111,112 or 111,113,114 are stored on the medium 100.By decoding or decoding series based on master key M121, information material CM101 can be resumed.
In order to reproduce the encrypted information material that is stored on the medium 140, a fetch equipment 150 is notified to decryption device 160 from medium 140 with encrypted data 111,112 or 111,113,114.Medium 140 can be the recording medium of any kind, comprises tape, disk, laser disk, CD, DVD etc.Readout equipment 150 is one to be used to read the relevant device of the data on the medium.If medium 140 is hard disk drives, for example readout equipment 150 can be to read the computer system that is stored in the file on the hard disk drive.If requirement, decryption device 160 can be accepted master key from access device 120.If use session key K that information material CM101 is encrypted, produce E K(CM) 114, decryption device 160 uses session key K, does not need the duplicate 101 ' of master key M121 decryption information data CM101.On the other hand, if decryption device 160 does not directly use session key K, or use master key M121 that information material CM101 is encrypted, and producing EM (CM) 112, decryption device 160 receives the duplicate 101 ' that master key M121 also provides information material CM101 subsequently from access device 120.The duplicate 101 ' of information material CM101 is provided for a common readout equipment 170, shows the user with suitable form.For example, if information material CM101 is an audio recording, readout equipment 170 provides the audio representation of information material CM101.Equally, if information material CM101 is the multiple stimulation relevant with reality environment, readout equipment 170 provides and the corresponding suitable expression of the stimulation of every kind of record.
Fig. 2 schematically illustrates the flow process that is used to write down encrypted information material according to the invention, and this process can be undertaken by encryption device shown in Figure 1 110.For the ease of understanding, session key K use and by using master key M that the encryption of speech channel key K is not shown in Fig. 2; According to introduction, adding this option is clearly for a person skilled in the art.Flow process begins from receiving information material CM 210.Thereby encryption device 100 is accepted master key M and Public key P from access device shown in Figure 1 120 usually exactly 220, and 230, encryption device 110 uses Public key P encryption main key M, 240, writes down encrypted master key E P(M).250, use master key M that information material is encrypted, 260, encrypted information material E M(CM) by same record.According to the present invention, encrypted master key E P(M) and encrypted information material E M(CM) preferably be stored in the identical medium 140.
According to as can be known above-mentioned, the knowledge of master key M makes all data that are recorded according to the invention decrypted.
Fig. 3 has shown the flow process that is used to retrieve master key M according to the invention, and example shown in Figure 3 occurs between supplier area and the user area.310, the supplier provides a master key M and a Public key P to the user, and master key M and Public key P are provided with the smart card form usually, is convenient to encrypt by 350 pairs of protected backup datas of a compliance with system.Another kind of scheme is that master key can be created on the smart card randomly, and the supplier does not also know.As mentioned above, some standards are suggested, and appealing to use to each user is that unique master key M encrypts protected backup data, to stop the protected backup data CM of uncontrolled reproduction.According to these standards, a compliance with system 350 realizes and carries out the encryption and the protection of duplicate.By the compliance with system 350 that comprises encryption, deciphering, record, reading capability, the user can create the collection 360 of the encrypted information material CM that meets proper standard, by the master key M that is provided is provided, can decipher and read encrypted information material CM.
If the user has lost master key M or smart card makes mistake, the supplier provides a master key M who substitutes by step shown in Figure 3 to the user.The user selects an independent encrypted record 361 and gives the supplier it from collecting 360.Substitute and send original encrypted record 361, the duplicate of record 361 can be transferred, and supposes that duplicate comprises the master key E that has encrypted P(M) the duplicate that is not modified.The supplier uses the master key E of corresponding private cipher key p to encrypting 320 P(M) be decrypted,,, give the smart card that user one substitutes usually as the answer of collecting service fee at 330 duplicate that master key M and Public key K be provided.Use this mode, by paying relevant service fee, the user can visit and read the user continuously and collect each record in 360.
Fig. 4 has shown the chart that is used to provide an alternative access device 120 ' according to the invention.Fetch equipment 410 provides encrypted master key E from the user's shown in Figure 3 encrypted record 361 of collection 360 visits to decryption device 420 P(M).Decryption device 420 uses private cipher key p to encrypted master key E P(M) be decrypted, so that master key M to be provided.One programming device is with decrypted master key M, put into the access device 120 ' that duplicates with the corresponding Public key P of private cipher key p401, and the described access device that duplicates 120 ' is returned to the user with encrypted record 361 usually.
The above-mentioned main principle of the present invention that illustrated; should be noted that; though this paper does not describe clearly or shows that those skilled in the art can carry out different improvement to this, example of the present invention and principle are in claims of the present invention scope required for protection.For example can add control in process shown in Figure 3, be limited with the quantity of the master key M that guarantees to be replicated.For example the simple record of the number of times that is provided of master key M can be held, and master key M more duplicates and can be excluded.Another kind of scheme is, supposes that the duplicate of each master key can have an expenses standard that increases or use some other programs, and making being transmitted in a large number that master key M is not authorized to is impossible or very invalid economically.
In present specification, the concrete 26S Proteasome Structure and Function of numeral is shown and is used for illustration purpose.Other 26S Proteasome Structure and Function equipment is feasible.For example access device 120 can be a kind of programming device, in case be activated, can download master key M.Therefore, based on encrypted master key E to the download TRANSFER OF AUTHORIZATION P(M), the operation of above-mentioned replacement access device 120 can comprise the duplicate of downloading master key M.By reading present specification, for a person skilled in the art, these and other system architecture are very clearly with excellent feature, all in the protection domain of claims of the present invention.

Claims (20)

1. a method that is used to write down open source information (101) comprises: open source information (101) is encrypted (210), produce encrypted information (112,114), rely on the information (112 after master key (121) promotes to encrypt, 114) deciphering, master key (121) is encrypted (230), produce an encrypted master key (111), rely on private cipher key (p) to promote the deciphering of master key (121), go up encrypted master key (111) of record (240) and encrypted information (112,114) at recording medium (140).
2. method according to claim 1 is characterized in that the encryption (210) of open source information (101) being comprised:
Use one first key (K) that open source information (101) is encrypted, produce encrypted information (114),
(K) encrypts to first key, produces encrypted first key (113), relies on master key (121), promotes the deciphering of first key (K), and described method comprises: encrypted first key (113) is recorded on the recording medium (140).
3. method according to claim 1 is characterized in that: the encryption (230) of master key (121) is based on a Public key (P), and this Public key (P) is corresponding to a private cipher key (p), and is right as a public and private key.
4. method according to claim 1 is characterized in that: described open source information comprises: audio data, video data, audiovisuals and virtual reality data.
5. method according to claim 1 is characterized in that: described recording medium is a kind of among tape, disk, laser disk, CD, the DVD at least.
6. one kind provides an access device (120 ') that substitutes to promote encrypted information (112, the method of deciphering 114) comprises: accept a record (361) from the user, it comprises the password based on the master key of a Public key (P) (121), use a private cipher key (p), password (111) to master key (121) is decrypted, produce the duplicate of master key (121), this private cipher key (p) is corresponding with Public key (P), right as a public and private key, upward the duplicate of master key (121) is encoded at the access device (120 ') that substitutes, provide (330) to give the user access device (120 ') that substitutes.
7. method according to claim 6 is characterized in that: also comprise: the original access device (120) that will comprise master key (121) offers the user.
8. method according to claim 6 is characterized in that: also comprise: keep the record of each duplicate of master key (121), according to record, provide (330) to give the user access device (120 ') that substitutes.
9. method according to claim 6 is characterized in that: also comprise: the expense of the access device of estimating to provide alternative (120 ').
10. method according to claim 9 is characterized in that: also comprise: keep the record of each duplicate of master key (121), and according to record, the expense of the access device (120 ') that decision is used to provide alternative.
11. method according to claim 10 is characterized in that determining that expense comprises: determine the frequency of each duplicate of master key (121), determine the mutual relationship of expense and frequency.
12. method according to claim 6 is characterized in that: described record is included on a kind of among tape, disk, laser disk, CD, the DVD at least.
13. a system comprises:
One encryption device (110) is configured to: open source information (101) is encrypted, information (112,114) after the encryption that generation dependence master key (121) is decrypted is encrypted master key (121), produce the encrypted master key (111) that relies on private cipher key (p) to be decrypted
Be configured to a recording unit (130): go up encrypted master key (111) of record and encrypted information material (112,114) at recording medium (140).
14. system according to claim 13 is characterized in that: described recording medium is a kind of among tape, disk, laser disk, CD, the DVD at least.
15. system according to claim 13 is characterized in that: encryption device (110) is configured to based on a Public key (P) master key (121) be encrypted, and this Public key (P) is corresponding to a private cipher key (p), and is right as a public and private key.
16. system according to claim 13, it is characterized in that: encryption device (110) is configured to open source information is encrypted, therefore, by first key (K) open source information (101) is encrypted, produce encrypted information material (114), by master key (121) first key (K) is encrypted, produced encrypted first key (113), recording unit (130) is configured to write down encrypted first key (113).
17. a system that is used to provide an access device (120 ') that substitutes comprises:
One fetch equipment (410), it provides encrypted master key (111) from record (361), described record (361) comprises based on the encrypted master key (111) of the right Public key (P) of public and private key and encrypted information material (112,114), according to the encrypted corresponding master key of master key (111) (121), described encrypted information material (112,114) can be decrypted, one decryption device (420), it is from encrypted master key (111) the deciphering master key (121) based on private cipher key (p), described private cipher key (p) is corresponding to the right Public key of public and private key (P), one programming device (430), it goes up record master key (121) at alternative access device (120 ').
18. system according to claim 17 is characterized in that: described programming device (430) also is recorded in Public key (P) on the alternative access device (120 ').
19. one is included in the record (361) on the medium, comprise: based on the password (111) of the master key (121) of the right Public key of public and private key (P), its deciphering depends on the right private cipher key of public and private key (p), the password of open source information (101), and its deciphering depends on master key (121).
20. a record according to claim 17 is characterized in that: described medium comprises a kind of among tape, disk, laser disk, CD, the DVD at least.
CN00801828A 1999-09-03 2000-08-16 Recovery of a master key from recorded published material Pending CN1327586A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US38982599A 1999-09-03 1999-09-03
US09/389,825 1999-09-03

Publications (1)

Publication Number Publication Date
CN1327586A true CN1327586A (en) 2001-12-19

Family

ID=23539874

Family Applications (1)

Application Number Title Priority Date Filing Date
CN00801828A Pending CN1327586A (en) 1999-09-03 2000-08-16 Recovery of a master key from recorded published material

Country Status (5)

Country Link
EP (1) EP1145242A3 (en)
JP (1) JP2003509881A (en)
KR (1) KR100748867B1 (en)
CN (1) CN1327586A (en)
WO (1) WO2001018807A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101944992B (en) * 2003-05-23 2012-03-21 纳格拉影像股份有限公司 Device and method for encrypting and decrypting a block of data

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020049483A (en) * 2000-12-19 2002-06-26 조충환 Carcass member of bias tire
JP2002245427A (en) * 2001-02-20 2002-08-30 Toshiba Corp Ic card, ic card terminal device and method for duplicating ic card
FI114362B (en) * 2001-12-12 2004-09-30 Setec Oy A method for enabling a device secret key on another device
JP3978046B2 (en) * 2002-02-25 2007-09-19 日本電信電話株式会社 File access control method, program, and storage medium
US7861082B2 (en) 2002-05-24 2010-12-28 Pinder Howard G Validating client-receivers
JP2007515723A (en) * 2003-12-22 2007-06-14 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Software execution protection using active entities
EP1700182B1 (en) * 2003-12-30 2009-06-17 Wibu-Systems AG Authorization code recovering method
GB0400663D0 (en) * 2004-01-13 2004-02-11 Koninkl Philips Electronics Nv Secure data handling system, method and related apparatus
JP2005327235A (en) 2004-04-13 2005-11-24 Hitachi Ltd Method for encryption backup and method for decryption restoration
WO2006003632A2 (en) * 2004-07-02 2006-01-12 Philips Intellectual Property & Standards Gmbh Security unit and method for protecting data
CN102868518A (en) * 2004-08-12 2013-01-09 Cmla有限公司 Permutation data transform to enhance security
US9277295B2 (en) 2006-06-16 2016-03-01 Cisco Technology, Inc. Securing media content using interchangeable encryption key
US9137480B2 (en) 2006-06-30 2015-09-15 Cisco Technology, Inc. Secure escrow and recovery of media device content keys

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5237610A (en) * 1990-02-01 1993-08-17 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
DE69634850T2 (en) * 1995-10-09 2006-05-18 Matsushita Electric Industrial Co., Ltd., Kadoma INFORMATION RECEIVING CARRIER, INFORMATION REPRODUCER AND INFORMATION REPRODUCTION PROCESS
US5857021A (en) * 1995-11-07 1999-01-05 Fujitsu Ltd. Security system for protecting information stored in portable storage media
AU8757398A (en) * 1997-07-15 1999-02-10 V-One Corporation File encryption with key recovery
EP0936812A1 (en) * 1998-02-13 1999-08-18 CANAL+ Société Anonyme Method and apparatus for recording of encrypted digital data
US7162452B1 (en) * 1999-03-25 2007-01-09 Epstein Michael A Key distribution via a memory device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101944992B (en) * 2003-05-23 2012-03-21 纳格拉影像股份有限公司 Device and method for encrypting and decrypting a block of data

Also Published As

Publication number Publication date
EP1145242A2 (en) 2001-10-17
WO2001018807A3 (en) 2001-10-04
EP1145242A3 (en) 2001-12-05
KR100748867B1 (en) 2007-08-13
JP2003509881A (en) 2003-03-11
WO2001018807A2 (en) 2001-03-15
KR20010083940A (en) 2001-09-03

Similar Documents

Publication Publication Date Title
EP1061515B1 (en) Memory card, memory card utilizing device, and corresponding method and program for converting management information which contains restrictive information using a different key in each management information send and receive session
CN1327358C (en) System and method for protecting a title key for recordable media content
US6367019B1 (en) Copy security for portable music players
KR100434634B1 (en) Production protection system dealing with contents that are digital production
CN100367247C (en) Method for managing copy protection information of recordingmedium
CN103635911B (en) For the protection of the memory device of content and main process equipment and method thereof
JP4857123B2 (en) Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method
US20090210724A1 (en) Content management method and content management apparatus
JP2002215465A5 (en)
KR970002629A (en) Data recording apparatus and method, data reproducing apparatus and method, and recording medium
JP4753473B2 (en) Key distribution by memory device
CN1327586A (en) Recovery of a master key from recorded published material
JP4314713B2 (en) Data recording method and apparatus, data reproducing method and apparatus, and data recording and reproducing system
JP3682840B2 (en) Content information recording method and content information recording apparatus
CN100364002C (en) Apparatus and method for reading or writing user data
JP2000305853A (en) Method for recording contents information and contents information processor
JP3556891B2 (en) Digital data unauthorized use prevention system and playback device
KR20090076606A (en) Method for recording content on a disc, method for providing a title key, apparatus for recording content on the disc, and content providing server
JP3788572B2 (en) Rental content distribution system and method
KR100695665B1 (en) Apparatus and method for accessing material using an entity locked secure registry
JP4168358B2 (en) Content information restoration method and content information restoration device
US20040098601A1 (en) Secure local copy protection
CN1777946B (en) Information processing device and method
JP2000341265A (en) Method for data recording and readout, recording device, readout device, and writing device
CN101057246B (en) Data reproducing method and data processing device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
C20 Patent right or utility model deemed to be abandoned or is abandoned