CN1558585A - Network and recordable medium encryption and decryption method - Google Patents

Network and recordable medium encryption and decryption method Download PDF

Info

Publication number
CN1558585A
CN1558585A CNA2004100390314A CN200410039031A CN1558585A CN 1558585 A CN1558585 A CN 1558585A CN A2004100390314 A CNA2004100390314 A CN A2004100390314A CN 200410039031 A CN200410039031 A CN 200410039031A CN 1558585 A CN1558585 A CN 1558585A
Authority
CN
China
Prior art keywords
player
user
program
identification code
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2004100390314A
Other languages
Chinese (zh)
Inventor
波 吴
吴波
张维祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2004100390314A priority Critical patent/CN1558585A/en
Publication of CN1558585A publication Critical patent/CN1558585A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a network and recordable medium enciphering and deciphering method which comprises, (1) content source data encryption, (2) creation of encryption player identification code P-ID and playing of enciphered transmission data by the player, (3) the user sending request information, (4) the network server authorization, (5) player deciphering.

Description

Network and recordable medium encryption decryption method
Technical field
The invention belongs to the Network Transmission field, digital video audio frequency that specially refers to Network Transmission, download, record, broadcast etc. can be recorded the encrypting and decrypting method of medium.
Background technology
Along with medium technique progress such as the development of broadband networks and digital video audio frequency; medium such as the digital video audio frequency that transmits on the net, downloads, writes down, plays are more prevalent; for protecting network transmission, download, the contact range of the intellectual property of record, the medium such as digital video audio frequency play, must implement effectively to encrypt and authorize reliably deciphering to it.At present domestic medium such as broadband networks transmission digital video audio frequency also do not find to use encrypting and decrypting also in the starting stage, only from the angle of charge, have used the encrypting and decrypting processing aspect pay TV.But the encrypting and decrypting of pay TV is unidirectional, and promptly enciphered message and key transmit simultaneously, and all is identical to the encryption method of each all programs that send of a channel.In case key is lost or is stolen like this, very easily cause the key diffusion, be used for stealing by illegal person and separate encrypted content, cause direct economic loss to the copyright holder.The development of medium such as external broadband networks transmission digital video audio frequency is very fast, and for the programme content that copyright protection is arranged, the operation server mostly adopts encryption and decryption to handle.But employed method is: decruption key and enciphered data are to transmit simultaneously, promptly are unidirectional methods, and the fail safe of this method and confidentiality are all not high enough.
The present invention is exactly a kind of method of the medium such as digital video audio frequency of Network Transmission, download, record, broadcast being carried out two-way encrypting and decrypting.Its basic principle and way are:
Each is needed the programme content of copyright protection, " content source data " stage before its compressed encoding is handled back and Network Transmission is carried out encryption, and each program has a cryptographic algorithm, has nothing in common with each other each other, makes each programme content that unique key " C-K " be arranged; Each programme content is composed of unique identifier " C-ID " simultaneously; C-K only leaves in the server of Virtual network operator, presses the C-ID addressing.Here be called " content source data " and be meant that the video of process compressed encoding is or/and information medium data such as audio frequency; If programme content is an analog signal, must become pulse-code modulation through mould/number conversion, promptly the PCM digitized signal is processed into the compressed encoding digital signal with the PCM digital signal through efficient condensing encoder again, becomes program " content source data ".
User's players itself all has a unique identification code P-ID, it can be the production sequence number of unique IC parts of player, or the player sequence number that embeds with systems soft ware when producing of player, or produce and deposit in the random number of flash memories when starting shooting for the first time at random, or through the sequence number of webserver registration by player.
Ciphered program " content source data " includes encrypted content identification code C-ID, after through Network Transmission, by user's download, record, if the user will play the ciphered program content of download, record, must send " user's request " to the operation server, after permission and authorizing " the play content key " of this player, could play.
" user's request " is that user's encryption player produces by the fixedly algorithm of encrypting in the player according to the encrypted content identification code C-ID that the identification code P-ID and the user of player itself will see, it comprises P-ID and C-ID information.
" play content key " is the identification code C-ID that is extracted this player identification code P-ID and ciphered program content by operation server's the webserver according to " user's request "; And in the webserver, find out " content key " C-K according to the identification code C-ID of ciphered program content; Produce " play content key " PC-K that only is applicable to this player and this programme content, i.e. content key of Jia Miing according to C-K and user's players identification code P-ID by fixing algorithm again.Like this, the player that only has this P-ID, inner embedding regulation decipherment algorithm just can decrypt content key C-K, and then decrypts encrypted content, can not be other player identification and deciphering.
The user sends out request and runs the server to subscriber authorisation to the operation server, can pass through internet supertext connection protocol http, Email, mobile phone, phone or other communication mode.This is a kind of two-way encipher-decipher method, has higher level security.
Summary of the invention
The technical issues that need to address of the present invention are, at in the prior art to network with can record medium and have only unidirectional encrypting and decrypting method, their fail safe, confidentiality are all not high enough, in order to overcome these weak points, the present invention proposes a kind of safe enough, secret two-way encipher-decipher method, in order to realize this goal of the invention, realize by the following technical solutions, medium such as the digital video audio frequency of a kind of Network Transmission, download, record, broadcast carry out encrypting and decrypting method, operate according to following steps:
(1) " content source data " encrypt; Implement cryptographic algorithm, make each program that unique ciphering key-K be arranged, C-K only leaves in network operator's the server; Each programme content is composed of unique identifier C-ID simultaneously, and network operator's server is pressed C-ID addressing C-K;
(2) encrypt the generation of player identification code P-ID and the initial communication of player plays " encrypted transmission data ";
(3) user sends solicited message; " the bulletin user profile " that the user provides according to player, internet http, Email, mobile phone, phone or other mailing address by Virtual network operator send " user request information " and user's communications address to the webserver.
(4) webserver mandate; Obtain C-ID and P-ID according to " user request information ", take out the ciphering key-K of this program again according to C-ID; Again P-ID and C-K cryptographic algorithm are more in accordance with regulations produced the key PC-K that is applicable to this player and this program, it is a string number, is called " encryption key "; The webserver is sent out to the user according to user's user internet http, Email, mobile phone, phone or other mailing address that request provided " decryption information ";
(5) player deciphering; Player is according to receiving " decryption information " and this player identification code P-ID, by the decipherment algorithm of player internal fixation " encryption key " PC-K is performed calculations, confirm that back C-K could decipher the encrypted content data of broadcast.
Before Network Transmission,, implement cryptographic algorithm to the media datas of handling through compressed encoding such as digital video audio frequency that are referred to as " content source data "; And press programme content, and each program has a cryptographic algorithm, and cryptographic algorithm each other has nothing in common with each other, and makes each program that unique ciphering key-K be arranged, and C-K only leaves in network operator's the server; Each programme content is composed of unique identifier C-ID simultaneously, and network operator's server is pressed C-ID addressing C-K.Wherein comprise step again:
A. " content source data " are implemented cryptographic algorithm, concrete cryptographic algorithm can be varied, can simply also can be complicated, get final product by general encryption principle." content source data " after the enforcement cryptographic algorithm are referred to as " encrypted content data ".
B. in " encrypted content data ", add unencrypted " exclusive data " (or title/catalogue data, file header data), become and to give " the encrypted transmission data " that network transmits.
" exclusive data " do not encrypt, and it comprises that " program title " of this programme content reaches " notice information " data.Brief summary or some selected parts camera lens that also can comprise this programme content in " program title "." notice information " data comprise " bulletin user profile 1,2,3 " and " announce player information "." bulletin user profile 1 " comprises and inform user's " this program is encrypted ", and whether the inquiry user " is watched this program "; " bulletin user profile 2 " informs the user network far person's of battalion internet http, Email, mobile phone, phone or other mailing address information; " bulletin user profile 3 " is " user request information ", carries out the string number that the regulation algorithm produces by the identification code P-ID of player basis itself and the encrypted content identification code C-ID that extracts from " exclusive data ".When this ciphered program order is watched in user's request of sending, show " bulletin user profile 2,3 ", and the prompting user sends out the string number of " telex network solicited message " for the network operation server by the address of bulletin.If the user selects not see that this ciphered program, player automatically perform " stopping " or other compulsory exercise.
" bulletin player information " comprises informing whether player this program is encrypted and ciphered program context identifier C-ID, and whether encrypt with user's different choice under the various responses action of player.Can detect the C-ID that whether deposits non-0 value in " exclusive data " by player knows.C-ID=0 is unencrypted, and encrypt C-ID ≠ 0th, and the error detecting code of also available other special definition detects.When non-encrypted, player is carried out user's all operations.During encryption, the player action that puts rules into practice: show " bulletin user profile 1 "; Player carries out the string number that the regulation algorithm produces according to the encrypted content identification code C-ID of identification code P-ID of itself and extraction from " exclusive data " simultaneously; When this ciphered program order is watched in user's request of sending, show " bulletin user profile 2,3 ", and the prompting user sends out the string number of " user request information " for the network operation server by the address of bulletin.If the user selects not see that this ciphered program, player automatically perform " stopping " or other compulsory exercise.
C. deposit " encrypted transmission data ", C-ID, programme content decruption key C-K in the webserver.
Dividing in the initial communication process for generation of encrypting player identification code P-ID and player plays " encrypted transmission data " has:
● each is encrypted player itself and all is provided with a unique identification code P-ID, it can be the production sequence number of unique IC parts, or player production sequence number, or produce and deposited in the random number of flash memories when starting shooting for the first time by player, or the sequence number of registering through the webserver.
● encrypt player itself and embed controlled decryption hardware and software.
● through the programme content of Network Transmission/download/record, when being play by the user, whether player will at first be read " exclusive data " (or title/catalogue data, file header data), extract, detect in " exclusive data " whether deposit the C-ID of non-0 value, encrypt thereby discern this program.Because " file header data " do not encrypt, the user can see " program title " and brief summary or some selected parts camera lens of the programme content that comprises.For non-encrypted programme content, player is carried out user's all operations, and the user can directly play; For the ciphered program content, player will be isolated " notice information " data from " exclusive data ", and from " notice information " extracting data and demonstration " bulletin user profile 1 ", simultaneously regulation algorithm and action are selected, carried out to player according to encryption, C-ID, player identification code P-ID, user: the at first computing that C-ID and P-ID are stipulated, its operation values carries out byte with C-ID or P-ID again or the bit position intersects, generate bulletin user " user request information ", i.e. string number; And when the user selects to watch this program, showing " bulletin user profile 2,3 ", the prompting user sends out the string number of " user request information " for the network operation server by the mailing address of bulletin.If the user selects not see that this ciphered program, player automatically perform " stopping " or other compulsory exercise.
Send solicited message for the user; " the bulletin user profile 2,3 " that the user provides according to player, internet http, Email, mobile phone, phone or other mailing address by Virtual network operator send " user request information " and user's communications address to the webserver.
For webserver mandate; The webserver is according to " user request information " that receive, and decipherment algorithm according to the rules extracts this program context identifier C-ID and player identification code P-ID automatically, and checks and confirm its fail safe and validity; Take out the ciphering key-K of this program then according to C-ID; Again P-ID and C-K cryptographic algorithm are more in accordance with regulations produced the key PC-K that is applicable to this player and this program, it is a string number, is called " encryption key "; User internet http, Email, mobile phone, phone or other mailing address that the webserver is provided according to " user request information ", send out to the user " decryption information ", decryption information comprises encryption key PC-K and operation information, and the prompting user imports the string number of " encryption key " with the knob of remote controller or player.
Decipher for player.After the user is subjected to the string number of " encryption key ", it is imported this player with the knob of remote controller or player.The player basis receives " decryption information " and this player identification code P-ID, decipherment algorithm by the player internal fixation performs calculations to " encryption key " PC-K, obtain this PC-K player identification code P-ID that allows and the content key C-K that allows to play, and then check fail safe and the validity of P-ID and C-K; Confirm that back C-K could be to the encrypted content data deciphering of playing.
The invention has the beneficial effects as follows, by this encrypting and decrypting method, can make internet http Email, mobile phone, phone or other communication modes, send out request by the user to the operation server, and by runing the server to subscriber authorisation, carry out two-way encryption and decryption, realize higher fail safe, confidentiality.
Description of drawings
Fig. 1 is for realizing the step and the process schematic diagram of this encrypting and decrypting method.
Fig. 2 is the series circulation shift register.
Embodiment
With reference to Fig. 1, represent the step and the process of this method.Among the figure, square 1 is the audio frequency and video condensing encoders, and it becomes program with the analog audio-video conversion of signals " the content source data ", also can directly receive the PCM program source signal of the pulse-code modulation of outside input.Square 2 is encryption and Network Transmission transmitting terminal server, it receives the program from the audio frequency and video condensing encoder " the content source data ", also can directly receive program from other audio frequency and video condensing encoder " the content source data ", here, to program " the content source data " carry out encryption and Network Transmission and send.Square 3 is that the Network Transmission receiving terminal is downloaded, server is broadcast in storage, as network computer; Square 4 is optical disc storage of connecting the receiving terminal Download Server/broadcast equipment, as CD-R/RW, DVD-R/RW and VCD/DVD player etc.; Square 5 is a display.Receiving terminal Download Server, optical disc storage, playback equipment etc. when playing the ciphered program of downloading, writing down, read at first, show " user's notice information 1 " that the user can make the selection of whether watching ciphered program as required.If the user selects to see ciphered program, player also will " be announced user profile 2,3 ", internet http, Email, mobile phone, phone or other mailing address and " user request information " of promptly informing the network operator; Internet http, Email, mobile phone, phone or other mailing address of the Virtual network operator that provided is provided the user again, sends out " user request information " to the webserver.Square 6 is the equipment that the user communicates by letter with Virtual network operator, as computer, mobile phone, phone or other communication equipment.Square 7 is communication equipments of Virtual network operator and customer contact.The network transmitting terminal server of square 2 is received the user " solicited message " after, the webserver is algorithm according to the rules just, extracts this program context identifier C-ID and player identification code P-ID automatically from this information, and checks and confirm its fail safe and validity; And then take out the ciphering key-K of this program according to C-ID, and P-ID and C-K cryptographic algorithm more in accordance with regulations produced be applicable to this player and this program " encryption key " PC-K; User internet http, Email, mobile phone, phone or other mailing address that the webserver is provided according to " user believes solicited message " are again sent out to the user " decryption information ".The user imports decryption information the player of square 3,4, player is according to the P-ID of this machine and receive " decryption information ", by the decipherment algorithm of player internal fixation to " encryption key " PC-K performs calculations, obtain this PC-K player identification code P-ID that allows and the content key C-K that allows to play, and then check fail safe and the validity of P-ID and C-K; Confirm that back C-K could be to the encrypted content data deciphering of playing.
Specific embodiment
A programme content that needs encrypted transmission is as film " hero ", it is the PCM video/audio signal that is provided by Digital Video Tape Recorder, then at first is transformed into program " content source data " through MPEG4 or other condensing encoders.Should " content source data " be sent to the network server of making a start, encrypt and send processing.Program " content source data " can be the program stream PS packet that is packaged into 2324 bytes or 2048 byte longs, also can be that MPEG flows ES substantially.If MPEG flows ES substantially, in making a start server, network earlier its packing is dressed up the program stream PS packet of 2324 bytes or 2048 byte longs.Each program stream data is wrapped in its beginning add synchronous code and identification code ID.ID can be the timing code of minute, second, frame, also can be the serial number of bag.And then in turn the data of packet are carried out cryptographic calculation by the serial number of packet ID and handle.That is to say, synchronous and ID are not carried out cryptographic calculation.Concrete cryptographic calculation processing method is diversified, and present embodiment adopts scrambler to upset the method for program source data.
If i byte of program " content source data " bag is Di, the scrambler of this byte is Si, and the byte after the scrambling is D i', then have: D i'=D i+ S iTo the packet i=0 of 2324 byte longs, 1,2 ... .2323, to the packet i=0 of 2048 byte longs, 1,2 ... .2047.
Scrambler S iCan produce with software, also can produce with series circulation shift register as shown in Figure 2.This scrambler can be produced and be write as generator polynomial: S (x)=X 15+ X 10+ 1 this formula is represented: the register r among Fig. 2 15With register r 10Output carry out XOR, output as register r 0Input.It can two byte binary numbers { { 8401H} represents, as the part of key for 10000100 00000001} or hexadecimal number.
When each packet of program stream began first byte arrival, shift register will preset initial value.This initial value is by oneself agreement, and it also is the part of key.Initial value I=0502H.r0~the r7 of present embodiment agreement preset initial value be data byte D0 around sign indicating number S0.The every displacement of circulating register later on just on r0~r7, obtain for 8 times next data byte Di around sign indicating number Si, finish up to the scrambler scrambling of last byte of packet.Begin at next packet, repeat aforesaid preset initial value and cyclic process again.Decruption key K=I+S like this.
This formula is defined as 4 byte numbers, and high-order 2 bytes are for presetting initial value I, and low level 2 bytes are scrambler generator polynomial S (x) expression numerical value.The K=I+S of present embodiment (x)=05028401H.
For different programme contents different cryptographic algorithm is arranged, different scrambler generator polynomial S (x) or the different initial value I that presets are just arranged.
The byte number that also will compile identification code C-ID.C-ID to the programme content of encrypting is by encrypting people's definition.Present embodiment is defined as 4 bytes, " hero " C-ID be 00000082H, promptly No. 130.
Encryption server is with programme content " hero " C-ID=00000082H and key K=05028401H. all leave in the cipher key store of encryption server.
Encryption server is finished programme content " hero " data perturbation after, also to add the non-exclusive data that adds upset in other position of these Data Starts and ending or definition.Exclusive data comprises " notice information " data and program " the content selected parts " fragment data etc., and discerned by the ID of definition.
" notice information " data comprise programme content identification code C-ID (00000082H), operation server's mailing address, control information etc.And distinguished by the ID and the byte location of definition so as to transmit on the net, downloads, write down, extraction when playing.
Present embodiment regulation C-ID=0's is non-encrypted content, C-ID ≠ 0 be encrypted content.
When the ciphered program content that is added with exclusive data is passed through Network Transmission, download, record, broadcast, player is at first read exclusive data, and, check its value by agreement extraction programme content identification code C-ID, on monitor, show simultaneously " user's notice information 1 ".To the ciphered program content, player is the identification code P-ID of taking-up own also, and P-ID and C-ID are pressed fixedly algorithm generation " user request information ".Make when watching this ciphered program to select according to notice information 1 the user, player further shows " user's notice information 2,3 " on monitor, and how the prompting user sends to the network operator " user request information ".As prompting " with mobile phone or phone or Email to mobile phone: XXXXXXXXXXXX phone: XXXXXXXX Email: [email protected] sends out user request information: XXXXXX " " user request information: XXXXXX " be that a series of numerals or the numeral that are presented on the monitor add English alphabet.
In the present embodiment, player identification code P-ID is unique mpeg decode chip sequence number, totally 4 bytes.Highest order byte representation days, high 4 bits are represented year, and low 4 bits are represented the moon; Low level 3 bytes 24 bits are represented the sequence number of chip sequence number or player.The mpeg decode chip sequence number of player or the sequence number of player can embed when the player system program is installed.
The P-ID=31001901H of present embodiment player represents that this player is No. 64001 product of producing in January, 2003.
Present embodiment ciphered program content film " hero " C-ID=00000082H.
The fixedly algorithm that the present embodiment player produces " user request information " Q is
Q=Op+{C-IDP-ID}$C-ID
This expression way is represented:
Op: byte-oriented operand, the mode of operation of expression $;
C-ID P-ID: carry out XOR between expression C-ID and the P-ID;
{ C-ID P-ID}$C-ID: XOR value and C-ID value between expression C-ID and the P-ID are carried out byte or bit cross arrangement by Op; Or the XOR value between C-ID and the P-ID and C-ID value by the C-ID4 byte after preceding carrying out cross arrangement and becoming 8 bytes, upset by fixed form again.Why so complicated " user request information " Q is encrypted, purpose does not allow the fixed user that do not obey the rule know P-ID easily.
The byte of Op can the tabulation mode be arranged the encryption method that its 256 kinds of cross arrangements or cross arrangement add fixedly upset mode.Concrete which kind of method that adopts produces Op by random number.
In the present embodiment, suppose the random number Op=01 of generation, XOR value and C-ID value in the agreement table between 01 expression C-ID and the P-ID are lined up 8 bytes by the C-ID4 byte preceding, do not carry out fixed form and upset.
Because the P-ID=31001901H of present embodiment player, ciphered program content film " hero " C-ID=00000082H.
So " user request information " Q is: 010000008231001983H.
After the network operator sends out and receives " user request information ", with its fan-in network encryption server.Server is isolated operation code Op=01 by agreement, can obtain the decipherment algorithm of Q thus, takes out C-ID=00000082H, calculates P-ID=31001983 00000082=31001901H.
Encryption server takes out this program key C-K=05028401H according to C-ID, and with C-K and P-ID by the cipher mode that Op=00 the arranged operation that produces at random: P-ID and C-K carry out XOR, P-ID and C-ID carry out XOR, again by P-ID and C-K XOR value preceding, P-ID and C-ID XOR value after arrange, obtain PC-K, be shown below.
PC-K=Op+(P-IDC-K)$(P-IDC-ID)=0034029D0031001983H。
The refined net network operator presses telex network mode and the address that " user request information " provided, and sends out to the user and gets PC-K.
The user receives PC-K and is entered into player, and player is isolated:
Op=00;
P-IDC-K=34029D00;
P-IDC-ID=31001983;
P-ID in the formula and C-ID are called and authorize P-ID and C-ID, for difference mutually, the P-ID of player are expressed as p-id, and the C-ID of the program play is expressed as c-id; Authorize the P-ID and the p-id of C-ID and player and the c-id of broadcast program to check, as inconsistent, player is just refused decryption oprerations, and as unanimity, just the PC-K decipherment algorithm by its agreement solves C-K:
C-K=(P-IDC-K)p-id=05028401H
The decrypt circuit or the decryption software of ciphered program data are set by C-K.
The descrambling circuit of present embodiment can be 16 grades of serial type circulating registers shown in Figure 2, and high 2 bit bytes of this C-K are the initial preset value of shift register, and low 2 bit bytes are the nodulo-2 addition circuit connecting mode controlling value of circulating register.The ciphered program data can obtain deciphering through this descrambling circuit.

Claims (6)

1. network and recordable medium encryption decryption method is characterized in that, operate according to following steps:
(1) " content source data " encrypt; (2) generation and the player plays " encrypted transmission data " of encryption player identification code P-ID; (3) user sends solicited message; (4) webserver mandate; (5) player deciphering;
2. encrypting and decrypting method according to claim 1 is characterized in that, the media datas such as digital video audio frequency of described " content source data " are implemented cryptographic algorithm; Make each program that unique ciphering key-K be arranged, C-K only leaves in network operator's the server; Each programme content is composed of unique identifier C-ID simultaneously, and network operator's server is pressed C-ID addressing C-K.
3. encrypting and decrypting method according to claim 1, it is characterized in that dividing in the initial communication process of the generation of described encryption player identification code P-ID and player plays " encrypted transmission data " has: each is encrypted player itself and all is provided with a unique identification code P-ID; Encrypt player itself and embed controlled decryption hardware and software; Whether through the programme content of Network Transmission, download, record, when being play by the user, player will at first be read " exclusive data ", extract, detect in " exclusive data " whether deposit the C-ID of non-0 value, encrypt thereby discern this program.
4. encrypting and decrypting method according to claim 1 is characterized in that described user sends solicited message; " the bulletin user profile " that the user provides according to player, internet http, Email, mobile phone, phone or other mailing address by Virtual network operator send " user request information " and user's communications address to the webserver.
5. encrypting and decrypting method according to claim 1 is characterized in that, described webserver mandate; The webserver is according to " user request information " that receive, and decipherment algorithm according to the rules extracts this program context identifier C-ID and player identification code P-ID automatically, and checks and confirm its fail safe and validity; Take out the ciphering key-K of this program then according to C-ID; Again P-ID and C-K cryptographic algorithm are more in accordance with regulations produced the key PC-K that is applicable to this player and this program.
6. encrypting and decrypting method according to claim 1, it is characterized in that, described player deciphering, after the user receives the string number of " encryption key ", knob with remote controller or player is imported this player with it, the player basis receives " decryption information " and this player identification code P-ID, decipherment algorithm by the player internal fixation performs calculations to " encryption key " PC-K, obtain this PC-K player identification code P-ID that allows and the content key C-K that allows to play, and then check fail safe and the validity of P-ID and C-K; Confirm that back C-K could be to the encrypted content data deciphering of playing.
CNA2004100390314A 2004-01-21 2004-01-21 Network and recordable medium encryption and decryption method Pending CN1558585A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2004100390314A CN1558585A (en) 2004-01-21 2004-01-21 Network and recordable medium encryption and decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2004100390314A CN1558585A (en) 2004-01-21 2004-01-21 Network and recordable medium encryption and decryption method

Publications (1)

Publication Number Publication Date
CN1558585A true CN1558585A (en) 2004-12-29

Family

ID=34352255

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2004100390314A Pending CN1558585A (en) 2004-01-21 2004-01-21 Network and recordable medium encryption and decryption method

Country Status (1)

Country Link
CN (1) CN1558585A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201912A (en) * 2010-03-23 2011-09-28 中国电子科技集团公司第三十六研究所 Blind recognition method for self-synchronization scrambling code generation polynomial
CN103491383A (en) * 2013-09-06 2014-01-01 天脉聚源(北京)传媒科技有限公司 Method and device for obtaining video
CN108028001A (en) * 2015-08-19 2018-05-11 声付有限责任公司 System and method for the formula interaction of audio signal intermediary

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201912A (en) * 2010-03-23 2011-09-28 中国电子科技集团公司第三十六研究所 Blind recognition method for self-synchronization scrambling code generation polynomial
CN103491383A (en) * 2013-09-06 2014-01-01 天脉聚源(北京)传媒科技有限公司 Method and device for obtaining video
CN108028001A (en) * 2015-08-19 2018-05-11 声付有限责任公司 System and method for the formula interaction of audio signal intermediary
US10692068B2 (en) 2015-08-19 2020-06-23 Soundpays Inc. System and method for audio signal mediated interactions

Similar Documents

Publication Publication Date Title
CN101719910B (en) Terminal equipment for realizing content protection and transmission method thereof
CN1200534C (en) Data communications
CN1258898C (en) Method for managing symmetrical secret key in communication network, and device for carrying out such method
CN1168304C (en) Global copy protection system for digital home networks
CN101129068B (en) Method for an iterative cryptographic block
CN1146185C (en) Protecting information in system
CN1228978C (en) Video request system and method for requesting vedio program by request short message
WO2002071752A1 (en) Content distribution/protecing method and apparatus
CN103873895B (en) A kind of DVB/IPTV bimodulus interactive service protects system
TW200840361A (en) Method of descrambling a scrambled content data object
CN101040526A (en) Digital rights management of a digital device
JP2002330126A5 (en)
CN101350918B (en) Method for protecting copyright of video content
CN101977190A (en) Digital content encryption transmission method and server side
CN102279908A (en) Method and system for protecting digital contents
CN1381966A (en) Copyright protection system and method
RU2605923C2 (en) Secure transmission method and apparatus for transport stream
CN1863303A (en) Content management
CN103237010A (en) Server side for providing digital content in encryption mode
TWI523534B (en) Method for transmitting and receiving a multimedia content
CN1343934A (en) Device and method for information output and recording, information output recording system and medium thereof
CN101018317A (en) A virtual intelligent card security authentication method and system
CN103237011B (en) Digital content encryption transmission method and server end
CN101567782A (en) OMA DRM stream media rights management system based on multilayer encryption system
CN101009549B (en) Decoding device for the digital copyright management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication