[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

TW432852B - Information access control system and method - Google Patents

Information access control system and method Download PDF

Info

Publication number
TW432852B
TW432852B TW88102581A TW88102581A TW432852B TW 432852 B TW432852 B TW 432852B TW 88102581 A TW88102581 A TW 88102581A TW 88102581 A TW88102581 A TW 88102581A TW 432852 B TW432852 B TW 432852B
Authority
TW
Taiwan
Prior art keywords
information
patent application
message
reproducible
scope
Prior art date
Application number
TW88102581A
Other languages
Chinese (zh)
Inventor
David M Goldschlag
David W Kravitz
Original Assignee
Digital Video Express Lp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Video Express Lp filed Critical Digital Video Express Lp
Application granted granted Critical
Publication of TW432852B publication Critical patent/TW432852B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

An information access control system and method which prevents un-authorized access from accessing the information. The apparatus includes a set top box which receives the information from a broadcast stream or recorded medium, or other source and a backend module. The set top box is paired with a conditional access module such that they have a shared secret key which is used to send communications to each other. A pirate attempting un-authorized access does not have the shared secret key and thus can not receive the communications. The apparatus and method further require that the set top box and the conditional access module follow one of a plurality of protocols in communicating with each other. A pirate attempting un-authorized access will not able to follow the protocols.

Description

經濟部中央標準局員工消費合作杜印製 432852,. A7 ______ B7 五、發明説明(1 ) 發明範疇 本發明有關於一種可防止未授權存取資訊之資訊存取系 統及方法,本發明尤其有關於一種使用可再生元件以授權 存取資訊之裝置及方法。本發明又尤其有關於一種可控制 後端模組與裝置間互動之方法及裝置,以產生並處理資 訊。 發明背景 在許多應用中防止未授權存取資訊是一重要問題。本發 明大致有關於並提供此問題之解答。在一些商業應用中, 資訊例如包含寶貴的聲音或視覺資訊,着被那些人以未授 權得到該資訊則會減少資訊提供者的獲利,該提供者一般 供資訊给各種付費的聽眾及/或觀眾。雖然以下説明中有 時使用聲音/視覺内容作爲要提供的資訊例子,但本發明並 不限於此,而是能均等應用在任何來源(如聲音及/或視覺 資料)的任一種資訊或内容資料,或是它種資料或可執行 樓。未授權存取者是資訊盜取者,其藉由誘導他人去盜取 資訊因而對於資訊提供者造成嚴重威脅。尤其是,盜取者 一般會以低於合法資訊提供者的價格銷售盜取得來的資 訊’因爲盜取者使用合法提供者的基本結構而存取資訊, 因此不必投資資源以產生及散布資訊。當盜取者能拷貝並 大量生產低價元件時這問題更嚴重,這造成許多使用者在 沒得到合法資訊提供者的授權下即能存取資訊。結果,資 訊提供者只得利用更昂貴且複雜的設計來防止未授權存取 資訊内容,以防止盜取。 - I--装------訂------^ f靖先聞讀背面之注意事^再填寫本頁) 4 3 28 5 2 «! A7 _^__B7 五、發明説明(2 ) 一種控制資訊存取的方法需要使用具有智慧卡作爲安全 模组的IRD (積體接收裝置)’此方法是由以色列Reh〇v〇t市 Weizmann科學院的Fiat及Schamir二人,在一篇名稱「如灯 自己證明:識別與簽字問題及其詳解」的文章所提出,其 使用信用中心以便將個人資訊及存取相關的秘密値编碼在 智慧卡中。智慧卡提供其身份给驗證器(IRD),其又必須知 道用以將資訊放入智慧卡的秘密値。雖然Fiat&Schamir的 設計很難僞造該卡的個人資訊,但是當(以及若是)盜取者 已破解用以證明身份的智慧卡時,它並未防止僞造卡的大 量教播°也可參考授予3(^3111丨]:的美國專利4,748,688號。 另一種方法揭露於授予Cohen等人的美國專利5,481,609 號’其在系統中使用智慧卡以控制存取傳播傳送。Cohen在 IRD中使用驗證器功能以驗證一智慧卡秘密學習動作及黑 名單動作的眞實性,以防止先前偵測到的非法卡又可存 取。惟如黑名單動作中出現者所示,Cohen所提議的系統能 與任何不在黑名單上的智慧卡交談,因此易於受到尚未成 爲黑名單的一盜取卡(或許多盜取卡)的侵入《此外, Cohen提議的驗證過程是由傳播源所觸發。因此一盜取者 僅能將驗證指令從傳播串中去除,因此防止整個驗證過 程。使用傳播源以觸發驗證過程所導致的另一實際問題是 結構上的,因此原來應該是區域性的決定(何時及是否要挑 戰智慧卡)變成系統層次的決定。最後,Cohen中的驗證過 程未和智慧卡與驗證器間的異動關連。因此盜取者可使用 一合法卡以通過驗證,即驗證其有權存取傳播内容,並接 本紙張尺度it财關家標準(CNS ) Α術^ ( 2]()><297公 請 先 閲 讀· 背 © 之. 注 項-再 % ί裝 頁 訂 經濟部中央橾準局員工消費合作社印裝 -5- 4 328 5 2 ·1五、發明説明(3 A7 B7 經濟部中央標隼局員工消費合作杜印裝 著使用絲卡以避免被發現有人存取,即避免記綠該存取 貫際上是由合法持卡者所爲。這種絲在本文巾作爲一種 稱爲管道攻擊的攻擊鑌型。 另一保全方法是由授予Diehl等人的美國專利5,461 675號 所揭露,其提議將連續資料封包間的資料相關連,因此可 偵測出何時已去除一封包。尤其是,DieM提議當避見時即 通知合法智慧卡。‘准’盜取卡可不理這種資訊因此能以盜 取方式存取資訊。 在由授予Johnson等人的美國專利5,778 〇68號所提議的另 方法中,判疋一處理裝置及一使用者裝置(其包含儲存裝 置)是否授權互相操作。johns〇n的方法在此例中藉由向提 供者裝置(該裝置在此例中一般對應於後端模组),以判定 一使用者裝置(該裝置一般對應於視訊解碼器)是否有效。 惟’此方法不能判定提供者裝置是否有效,即提供者裝置 是否授權以使用者裝置或是提供者裝置操作。因此盜取者 可成功地的作逆向工程並且修正提供者裝置以破解 Johnson中的安全協定,更重要的是,會大量產生盜取的 提供者裝置以散布給使用者使用。 在授予小Peterson的美國專利中提議另一種方法, Peterson經由智慧卡而授權存取,以傳送關關鍵詞資訊到處 理器以允許播放裝置從記錄媒體中複製資訊。peters〇n提議 的系統使用授權中心中持有的大眾關鍵詞及卡持有的秘密 關鍵詞。惟’在卡與處理器之間沒有配對的操作,因此在 卡與處理器之間沒有共用的秘密關鍵詞。因此若盜取者成 請 先 聞 讀· 背 © i 2 裝 訂 線 1- 0 " 本紙張尺度適用中國國家標準(CNS ) A4規格(2丨OX297公釐)Duty printing of employee cooperation of the Central Standards Bureau of the Ministry of Economic Affairs 432852, A7 ______ B7 V. Description of the invention (1) The invention relates to an information access system and method for preventing unauthorized access to information. An apparatus and method for using regenerable components to authorize access to information. The present invention is particularly related to a method and device for controlling interaction between a back-end module and a device to generate and process information. BACKGROUND OF THE INVENTION Preventing unauthorized access to information is an important issue in many applications. The present invention is generally about and providing an answer to this question. In some commercial applications, information, such as containing valuable audio or visual information, is intended to reduce the profit of the information provider by unauthorized access to that information, which is generally provided to various paying listeners and / or Audience. Although the following description sometimes uses sound / visual content as an example of the information to be provided, the present invention is not limited to this, but can be equally applied to any kind of information or content data from any source (such as sound and / or visual materials) , Or other kinds of information or executable building. An unauthorized accessor is an information stealer, which poses a serious threat to the information provider by inducing others to steal information. In particular, thieves generally sell stolen information at a lower price than legitimate information providers. Because the thieves use the basic structure of legitimate providers to access information, there is no need to invest resources to generate and disseminate information. This problem is exacerbated when stealers can copy and mass-produce low-cost components, which results in many users being able to access information without the authorization of a legitimate information provider. As a result, information providers have to use more expensive and complex designs to prevent unauthorized access to information content to prevent theft. -I--install ------ order ------ ^ f Jing first read the notes on the back ^ then fill out this page) 4 3 28 5 2 «! A7 _ ^ __ B7 V. Description of the invention ( 2) A method for controlling access to information requires the use of an IRD (Integrated Receiving Device) with a smart card as a security module. This method was performed by Fiat and Schamir of the Weizmann Academy of Sciences in Reh〇v〇t, Israel. The article titled "As the Light Proofs Itself: Identification and Signing Issues and Their Detailed Explanations" is proposed in the article, which uses a credit center to encode personal information and access-related secrets in a smart card. The smart card provides its identity to the authenticator (IRD), which in turn must know the secrets used to put information into the smart card. Although Fiat & Schamir's design is difficult to counterfeit the personal information of the card, when (and if so) the stealer has cracked the smart card used to prove the identity, it does not prevent the teaching of a large number of counterfeit cards. 3 (^ 3111 丨): U.S. Patent No. 4,748,688. Another method is disclosed in U.S. Patent No. 5,481,609 issued to Cohen et al., Which uses a smart card in the system to control access propagation transmission. Cohen uses a verifier function in the IRD To verify the authenticity of a smart card's secret learning action and blacklist action, to prevent previously detected illegal cards from being accessible again. However, as shown by those appearing in the blacklist action, Cohen's proposed system can work with anyone who is not present. The smart cards on the blacklist are talking, so they are vulnerable to a stolen card (or many stolen cards) that has not yet become blacklisted. In addition, the authentication process proposed by Cohen is triggered by a source of propagation. Ability to remove verification instructions from the propagation string, thus preventing the entire verification process. Another practical problem caused by using propagation sources to trigger the verification process is structural Therefore, it should be a regional decision (when and whether to challenge the smart card) into a system-level decision. Finally, the verification process in Cohen is not related to the change between the smart card and the validator. Therefore, the stealer can use a legal The card is verified, that is, it has the right to access the disseminated content, and it is connected to this paper standard It Financial Standards (CNS) Α Shu ^ (2) () > < 297 Please read · Back ©. Note item-Re% 装 Binding printed by the consumer consumption cooperative of the Central Economic and Technical Bureau of the Ministry of Economic Affairs -5- 4 328 5 2 · 1 5. Description of the invention (3 A7 B7 Employee consumption cooperation of the Central Economic and Technical Bureau of the Ministry of Economic Affairs printed by Du Duan Use a silk card to avoid being accessed by someone, that is, to avoid remembering that the access is always performed by a legitimate cardholder. This silk is used in this paper as an attack type called a pipe attack. Another security The method is disclosed in U.S. Patent No. 5,461,675, issued to Diehl et al., Which proposes correlating data between consecutive data packets so that it can detect when a packet has been removed. In particular, DieM proposes to notify when avoidance occurs Legal smart card. ' 'Stolen cards can ignore this type of information and thus be able to access the information in a stolen way. In another method proposed by US Patent No. 5,778,068 issued to Johnson et al., A processing device and a user device are judged ( It contains the storage device) whether it is authorized to interoperate. The method of JohnsOn in this example is to determine a user device (the device by referring to the provider device (the device generally corresponds to the back-end module in this example)) It generally corresponds to the video decoder), but 'this method cannot determine whether the provider device is valid, that is, whether the provider device is authorized to operate with the user device or the provider device. Therefore, the stealer can successfully reverse engineer and modify the provider device to break the security protocol in Johnson. More importantly, the stolen provider device will be generated in large numbers for distribution to the user. Another method is proposed in the U.S. patent granted to Peterson Jr., Peterson authorizes access via a smart card to transmit keyword information to the processor to allow the playback device to copy information from the recording medium. The system proposed by peters〇n uses public keywords held in the authorization center and secret keywords held by the card. However, there is no pairing operation between the card and the processor, so there is no secret key shared between the card and the processor. So if the thief becomes a success, please read and read it. © i 2 Binding Line 1- 0 " This paper size applies the Chinese National Standard (CNS) A4 specification (2 丨 OX297 mm)

432852JS A7 B7 五、發明説明U ) 功的破解加密機構,則可大量產生及廣泛散布盜取的卡, 而傷害資訊提供者。 ’ 在授予Clark的美國專利5,448,045中提議另一方法,其使 用智慧卡以便在電腦上產生安全啓動應用程式,藉由使用 智慧卡即可驗證電腦將要執行的可執行檔。智慧卡及電腦 共用由管理由安置的秘密,因此智慧卡及電腦可執行—授 權操作。惟’ 一旦攻擊者破解密碼,則盜取的智慧卡本身 即能通過授權。此外,因爲電腦不知道卡的挑戰,所以該 驗證是可再生的。因此無效卡可_以繼續使用。 最後在授予Audebert的美國專利5,802^176中提議另—方 法,即使用可再生使用的卡在電腦上控制存取一特殊功 能。這是異動式系统,其中卡與電腦協調存取而且每次存 取時都改變關鍵詞。惟’這種方法僅限於要在電腦上存取 的特殊功能,而不適用於一種系統,其處理許多不同的不 可預測功能/程式如在資訊散布系統中,即一種系統其中各 不同程式(電影,歌曲,文章,可執行檔等)都是不同功 能。 因此需要一種拒絕盜取卡(PCR)方法及系統,以保護有價 値的資訊,一種強力的方法及系統以適應一特殊資訊提供 者的需要,並克服上述缺點。 發明總結及目的 本發明之目的是防止未授權存取資訊提供者散布的資 訊° 本發明之又一目的是防止盜取者能使許多人從資訊提供 本紙張尺度適用中國國家標準{ CNS ) A4規格(210X29?公釐) 裳-- - .» {請先閲讀背面之注意事^再填寫本頁} -訂. 經濟部中失標準局負工消费合作社印製 4 328 5 2 A7 B7 五、發明説明(5 經濟部中央標準局負工消費合作社印裝 者得到未授權的資訊存取。 本發明之又一目的是允許資訊提供者根據資訊提供者的 個別需求,而彈性選擇複數個盜取卡拒絕方法之任一種人 併0 本發明之又一目的是僅經由授權接收裝置及授權安全裝 置如條件存取模组(CAM)而提供資訊。 本發明之又一目的是僅經由授權之非再生裝置及可再生 裝置而提供資訊。 本發明之又一目的是使非再生裝置拒絕一盜取可再生裝 置,以便不能存取安全資詛。 ' 本發明之又一目的是提供一種方法及裝置以要求一接收 裝置及一安全裝置如CAM,經由一共用秘密而通訊以供使 用者存取資訊。 本發明之目的是提供一種方法及裝置以要求一安全裝置 如條件存取模组與一接收裝置配對,並僅經由配對之接收 與安全裝置而提供資訊。 在本發明之概念中,一目的是防止資訊接收裝置有效地 與不配對的CAM通訊。 在本發明之另一概念中,又一目的是提供一種方法及装 置,其中安全裝置能驗證一接收裝置正在存取媒體之眞實 性。 在本發明之另一概念中,—目的是提供一種方法及裝置 以有效防止盜取者干擾接收裝置與安全裝置間的通訊,方 法是要求根據一特定協定而執行通訊。 -8 - 本紙張尺度適财關家辟(CNS ) Α4祕(21GX297公釐 請 先 聞 S* 背 之· 項- 再 填 裝 頁 訂 A7 B7 五、發明説明(6 ) 在本發明之又一概念中,一目的是提供一種方法及裝 置,其中要求一接收裝置及一安全裝置商議一共用秘密俾 互相通訊。 —爲了達成上述及其他係的並且根據本發明之目的(如本文 實施及廣泛説明者),一種用以實施本發明的裝置可防止未 授權存取資訊,包含-可再生裝置以授權非再生裝置處理 資訊非再生裝置藉由一共用秘密而與可再生裝置配對, 以使各非再生裝置及可再生裝置互相通訊。可再生裝置使 用共用秘密並根據一預設協定氙與非再生裝置通訊。 較佳地,將資訊加密而非再生裝置包含—輸出以輸出資 说至可再生裝置,而可再生裝置包含一解密邏輯以解密資 訊,及一輸出以輸出解密資訊至非再生裝置。 通常資訊會包含一特定程式(即資料或可延伸者)a因此 最好是至少一非再生裝置及可再生裝置包含—存取視窗邏 輯’以產生該特定程式的預設期間之存取時間視窗,而時 間视窗限制存取特定程式之時間。 也是較佳地’非再生裝置包含一控制邏輯以產生一詢問 訊息’及一證明邏輯使用該共用秘密以證明包含在詢問訊 息中的資訊,及包含在回應訊息中的資訊,以產生一非再 生裝置證明訊息。可再生裝置最好包含一證明邏輯,使用 共用秘密以證明包含在詢問訊息中的資訊,及回應訊息中 的資訊’以產生一可再生裝置證明訊息。可再生裝置最好 也包含一控制邏輯,可操作以產生回應訊息,並且以回應 訊息提供給非再生裝置。非再生裝置控制邏輯最好更可操 -9- 本紙張尺度適用中國國家標準(CNS ) A4it格(210X297公釐) -----_---Μ—^— (請先閲^·背面之注土$%再填寫本頁) 訂 旅 經濟部中央標準局員工消費合作杜印製 ί1328 52 .五、發明説明( B7 A7 經濟部中央標準局負工消費合作社印製 作’俾使可再生裝置證明訊息與非再生裝置證明訊息匹 配’並且若可再生裝置證明訊息匹配非再生裝置證明訊 息,則以特定程式提供給可再生裝置。 較佳地,提供回應訊息至非再生裝置後,可再生裝置即 登錄存取資訊。 較佳地,將用以產生一隨意値之恢復產生器與非再生裝 置結合。 通常會將資訊加密,而非再生裝置最好包含一超解密邏 輯以超解农該超加密資訊’及一-解密邏輯以解密資訊。 較佳地’非再生裝置包含一媒體證明邏輯以證明一媒 體,其上則承載要存取的資訊,而可再生裝置也包含一媒 體證明邏輯以證明媒體。 在另一概念中,本發明包含一種在系統中防止未授權存 取資訊之方法,該系統包含一非再生裝置具有—控制邏輯 及具有一控制邏輯之可再生裝置。該方法包含以下步驟: 將一非再生裝置與一可再生裝置配對; 根據從一該非再生裝置及該可再生裝置選擇之訊息,選 擇性證明非再生裝置與可再生裝置間交換之訊息,及傳送 —證明訊息; 在另一非再生裝置及可再生裝置中驗證證明訊息;並接 著 授權存取資訊。 較佳地,配對步驟更包含: 產生非再生裝置之I D値; •10 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐} 請 先 閲 % · 背之, 注_ 意' 事 項-再 貴 裝 訂 ,.泉 43 28 52 . A7 B7 五、發明説明(8 ) 經濟部中央標準局員工消費合作社印装 產生可再生裝置之ID値; 根據非再生裝置之ID値及可再生裝置之ID値而產生至少 一證書;及 傳送該至少一證書至至少一非再生裝置及可再生裝置。 非再生裝置最好包含一來源裝置,如與視訊解碼器共同 結合者〇非再生裝置也包含一沉裝置,通常該裝置要消耗 資訊。 系統也包含一後端系統,而配對步騍最好更包含: 產生非再生裝置之ID値; _ 根據非再生裝置之I D値而判定後端系统中非再生裝置之 秘密資訊;以及 傳送秘密資訊至可再生裝置。 較佳地,各非再生裝置及可再生裝置包含一證明邏輯, 而選擇性證明訊息之步驟更包含: 傳送來自非再生裝置之詢問訊息至可再生裝置; 使用一共用秘密以證明包含在詢問訊息中的資訊及回應 訊息中的資訊’因此產生一可再生裝置證明訊息,由可再 生裝置產生回應訊息; 使用共用秘密以證明包含在詢問訊息中的資訊及包含在 回應訊息中的資訊,因此產生一非再生裝置證明訊息; 驗證可再生裝置證明訊息是否匹配非再生裝置證明訊息。 在另一概念中,本發明提供一種在系統中防止未授權存 取資訊之方法,該系統包含—非再生裝置具有一控制邏輯 -11 本紙張尺度適用中國國家標準(CNS ) A4規格(2I0X297公董) 432852· - 五、發明説明(9 ) 及具有一控制邏輯之可再生裝1。該方法包含: 傳送來自可再生裝置之媒體詢問訊息至非再生裝置; 證明包含在媒體詢問訊息中的資訊及包含在媒體回應訊 息中的資訊,其在非再生裝置中產生,因此產生一非再生 裝置媒體證明訊息; 傳送媒體回應訊息及非再生裂置媒體證明訊息至可再生 裝置: 在可再生裝置中證明包含在媒體回應訊息中的資訊及包 含在媒體詢問訊息中的資訊,因此產生可再生裝置媒體證 明訊息;以及 , 以可再生裝置中之可再生裝置媒體證明訊息驗證非再生 裝置媒體證明訊息。 較佳地’可再生裝置包含一計數器以產生一可再生裝置 計數値,其包含在媒體詢問訊息中,而該方法更包含: 在非再生裝置中,將可再生裝置計數値加一;以及 在可再生裝置中’將可再生裝置計數値加一以完成驗證 步驟。 經濟部中央標準局貝工消費合作社印策 較佳地,可再生裝置包含一隨機數產生器用以產生—可 再生裝置隨機數,其包含在該媒體詢問訊息中,而該方法 更包含: 在非再生裝置中將可再生裝置隨機數値加一;以及 若完成驗證步驟,則在可再生裝置中將可再生裝置隨機 數値加一。 在又一概念中,本發明提供一種在系統中防止未授權存 _____________ * 12 - 本紙張尺度適用中國國家標準(CNS > A4· (21GX297公瘦) 經濟部中央標準局員工消費合作社印製 4 3 2852 . a? __________B7_五、發明説明(1〇 ) 取資訊之.方法’該系統包含一非再生裝置及一可再生裝 置。該方法包含: (a) 將一種子商議請求從非再生裝置傳送到可再生裝置; (b) 將一挑戰及狀態詢問從可再生裝置傳送到非再生装 置; (c) 判定非再生裝置及可再生裝置是否在密碼同步中;以 及 (d) 若非再生裝置及可再生裝置都不在密碼同步中,則返 回步驟(a)。 _ 較佳地,該方法更包含以下步驟·· (e) 判定非再生裝置及可再生裝置是否在封包同步中;以 及 (f) 當非再生裝置及可再生裝置都在对包同步之中時,即 以各別编號之封包提供資訊至可再生裝1。 較佳地,提供資訊至一預設存取視窗中之可再生裝置, 而提供資訊步騍更包含由預設存取視窗中之可再生裝置驗 證部分資訊及接收該資訊。 在以下説明中,將部分地敍述本發明的額外目的,優點 及新穎特徵,而熟於此技術者在審查以下説明書時也會部 分地了解,或是由本發明的實例而學習得知β藉由後附申 請專利範圍中特別指出的工具及結合,即可實施並得到本 發明的目的及優點。 附圖簡單説明 作爲本説明書一部分的附圖在説明本發明的數個實施 -13- 本紙張尺度適用中國國家標準(CNS ) Α4規格(210X29?公釐) 4 3 28 5 2.1 4 3 28 5 2.1 經濟部中央橾準局貞工消費合作社印装 A7 ------一 一 B7 五、發明説明(”) ~ ~ ~ 例’配合該説明即可解釋本發明的原理β 圖1是本發明實施例的方塊圖。 圖2的/虎程圖説明根據本發明的單向配對操作實施例,這 是在來源與證明條件存取模組(cam)之間。 圖3的流程圖說明來源與CAM間的單向配對操作的另一實 施例α 圖4的流程圖説明CAM與證明沉之間的單向配對操作實施 例ΰ 圖5的流程圖説明來源與具有疽接共用秘密値的cA]v[之間 的雙向配對操作實施例。 圖6的流程圖説明來源與具有直接共用秘密値的cam之間 的雙向配對操作實施例。 圖7的圖形説明來源與具有直接共用秘密値的CAM之間的 雙向配對操作實施例。 圖8的圖形説明CAM與具有直接共用秘密値的沉之間的雙 向配對操作實施例。 圖9的圖形説明CAM與具有直接共用秘密値的沉之間的雙 向配對操作的另一實施例。 圖10是根據本發明的標題式盜取卡拒絕(PCR)架構的第一 實施例的方塊圖=> 圖11的流程圖説明根據本發明的標題式PCR協定的操 作。 圖12的流程圖説明具視窗詢問操作的標題式PCR協定的 另一實施例。 本紙張尺度適用中國國家標準(CNS ) A4规格< 2丨〇 X 297公釐) ----^--丨‘---^------1T------.4. (請先閲tt·背面之•注意事赉再填寫本頁} _ -14-___ 經漓部中央標準局員工消费合作社印製 4 3 28 52 ,1 a? __ B7_ 五、發明説明(12 ) 圖13的圖形説明本發明的另—實施例,其具有一計量標 題式PCR架構。 圖14的流程圖説明根據本發明的計量標題式PCr協定的 操作。 圓15的流程圖説明根據本發明具信用請求的計量標題式 PCR協定的操作。 圖16的方塊圖説明本發明的另一實施例,具有在來源中 含非揮發性記憶體(NVM)的計量標題式盜取卡拒絕(pCR)架 構。 _ 圖17的方塊圖説明本發明的另一實施例,具有合併的超 加密/再加密及標題〇 圖18的流程圖説明超加密及再加密Pcr協定的操作α 圖19的方塊圖説明本發明的另一實施例,具有合併的超 加密/再加密PCR架構。 圖20的流程圖説明合併超加密/再加密Pcr協定的操作。 圖21的方塊圖説明本發明的另一實施例,具有一證明媒 體來源架構。 圖22的流程圖説明根據本發明的證明媒體來源協定的操 作。 圖23的流程圖説明根據本發明的證明媒體來源協定的另 一操作。 圖24的方塊圖説明本發明的另一實施例,具有合併的超 加密/再加密標題式PCR及媒體證明架構。 圖2 5的流程圖説明根據本發明的合併超加密/再加密標題 ____-15- 本紙張尺度適用中國國家標準(CNS >Α4現格(210X297公釐) -------^---抽衣------ΪΤ------.4- m m - f請先聞讀背面之ii.·意事吩再填寫本頁} 4 328 52 . A7 B7 經濟部中央樣準局貝工消費合作.杜印製 -16 五、發明説明(13 ) 式PCR及媒體證明協定的操作。 圖26的方塊圖説明本發明的另—實施例,具有m (BBRAM)PCR,在-視訊解碼器(STB)上具有—nvm,以及 在CAM架構上具有以電池爲動力的備用ram。 圖27的流程圖説明資料式pCR協定的操作,其在⑽上具 有一 NVM以及在CAM上具有—BBRAM q 在各圖巾以相同數丰表不相同或類似元件,結構及操 作由附圖及以下説明中熟於此技術者可明白各圖中相同 數字所表示的元件,結構及操伥之間的差異。 發明詳細説明 現在詳細參考本發明的目前較佳實施例,並且在附圖中 説明其範例。 圖1是t施例的簡化方塊圖,以説明根據本發明的典型 盜取卡拒絕(PCR)系統。在圖1中…條件存取模組(CAM) 彻經由視訊解碼器刚(其包含來源及沉则)而從後端 系統700有條件的授權存取資訊。來源細幾乎從任何系統 或來源接收資訊,例如資料流,傳播流,或可讀取儲存媒 體如可讀及/或可綠式光碟,磁碟或料。可讀及/或可錄 式光碟的例子包含(但不限於此)cd4dvd光碟,其包含數 位聲音及視覺資訊如電影及,或其他資料與可執行楼。在此 使用的名詞資訊廣泛的指内容資料,如聲音及/或視覺資 料.,以及來自任何來源的它種資料及可執行檀。類似的, 資訊中的特定程式或標題可包含内容資料如誰及,或視覺, 資料,以及來自任何服務的它種資料及可執 本紙張尺度適 -ί裝-- 1婧先閱请背面之皮意事^真填寫本買) 订 4 3 28 5 2 .1 五、發明説明(14 ) A7 B7 經濟部中央標準局員工消費合作杜印裝 來源200包含熟於此技術者熟知的習用電路以接收一資料 流,傳播流,及/或習用電路以便從可讀及/或可錄式光 碟,磁碟或磁帶揭取資訊,這是使用熟於此技術者熟知的 任一種技術,其範例可參考授予Cohen等人的美國專利 5,48 1,609號,及授予Akiyama等人的美國專利5,440,631號=> 可操作沉300以便將資枓流轉成視覺及/或聽覺可接受的 形式,以便使用已知的各種視覺及/或聲音顯示裝置來顯 示,或是執行一可執行檔或是處理資料。以電影爲例,沉 300包含熟於此技術者知道的習用電路,以便將資訊轉成視 覺及聲音資訊,以顯示在視覺及/或聲音顯示系統中。至於 其他應用如存取可執行檔,則沉3 00例如可以是(或裝設成) 一般目的計算裝置。雖然來源200及沉300在圖1是以分開的 裝置顯示,但是其也可合併成一裝置。而且雖然圖1所示 的來源200及沉300是視訊解碼器(STB) 100的一部分,但是 其中之一或二者都可以和STB分開。 CAM 400最好包含具有解密及較佳登錄功能的價廉模 组。CAM 400可以將資訊内容(電影,歌曲,文章,可執行 檔等)解密,或是CAM 400可以將一關鍵詞解密以允許視訊 解碼器100中的裝置(其最好包含來源200或沉300)將資訊内 容解密。或者,CAM 400可授權來源200及沉300存取資 訊。例如CAM 400包含一组接腳402,其可插入裝在視訊解 碼器]00上的插座102中。在本發明的説明中,將CAM 400 視爲可再生安全裝置的例子。雖然圖1所示的CAM 400在視 訊解碼器100之外,但是它也可包含在視訊解碼器100之 -17- 本紙張尺度適用中國國家標準(CNS ) Α4規格(210 X :297公釐) --------^---装------1T------,果 *« (請先閱讀背面之ίΐ·意事吩再填寫本頁) 經濟部中央標準扃員工消費合作社印製 4 3 28 5 2 .J A7 __B7 五、發明説明(15 ) 中’以要求打開視訊解碼器1〇0以去除CAM 400。最好在資 訊提供者的授權下執行CAM 400的再生,並且在個別需求 的基礎上執行以取代損壞的CAM或是盜取CAM,或是周期 性的執行以進_步避免Cam 400的盜取。因此根據本發明 的PCR系統設計成’利於允許客户爲了因應C A Μ失故的合 法目的而替代CAMs,並允許爲了安全及/或強化或改良操 作的理由而發出及插入替代的CAMs。 CAM 400包含微處理器4〇4或類似者以使其能執行解密及 登錄(如出帳,存取授權的存取記綠及其他異動資訊的管 理)’而且在一些實施例中,也可執行再加密。Cam 400最 好使用區域非揮發記憶體4〇6及(上線或離線)服務的某一合 併以連接到遠地節點以可靠地執行登錄。在一些例子中, CAM 400必須從區域記憶體4〇6或遠地檔案儲存區擷取這種 資訊’以供非再生播放裝置即梘訊解碼器100使用。這種讀 取及/或寫入的頻率可判定使用區域非再生記憶體與遠地檔 案儲存區(經由數據機或其他裝置而存取)之效率比較。如 上所述’ CAM 400利用區域儲存元件406其位於CAM 400上 或是相關的儲存元件中。例如位於視訊解碼器1〇〇之中,儲 存元件202或302最好分別是來源200或沉300的一部分,或 疋裳在其本身的另一板或模組上。 後端700 (包含一條件存取系統)向資訊使用者宣告可存 取資訊,或是以其他方式處理登錄。後端7〇〇可直接提供 (也可不提供)資訊如電影给視訊解碼器100。例如資訊使用 者可以從一區域來源(如DVD)而得到電影,其僅可於登錄 --—----- --· 18 - 本紙張尺度適财關家標準(CNS ) A4im ( 210X297公釐) (靖先閲讀背面<.注意事哫再填寫本頁) .裳_ 订 4 3 28 52. at B7 經濟部中央標準局貝工消費合作社印製 五、發明説明(16) 存取後才能存取。此一系統揭露在共同讓渡的美國專利 5,822,291號,其在此供參考。 假設來源内容的至少某一部分受到加密保護,則藉由使 用CAM 400可合法使用的秘密即可達成對應的解密程序, 該CAM 400依照後端700而操作。CAM 400最好是可再生裝 置,受到資訊提供者或是保證機關的控制,其中之一或二 者都可以是後端700的一部分》例如保證機關可以是與後端 700無關的實體,其證明用於CAM 400上的關鍵詞。或者, 保證機關是與後端700相同的實_體,或裝設在後端700中。 保證機關操作的例子可以在CCITT推薦X.509 (1989)找到。 視訊解碼器100最好是非再生裝置,可由資訊提供者的客 户擁有或租介取得。 因爲盜取者能以比合法資訊提供者銷售的資訊價格低的 成本銷售具競爭力(盜取)的產品,因此需要一種使得非再 生產品(即視訊解碼器100)能拒絕盜取的可再生產品(即 CAM 400)。尤其是,當後端系統700使用時盜取卡拒絕 (PCR)最有效,因此盜取者必須使CAM 400的功能降低,因 此學習CAM 400的萬用秘密,而且使資訊接收裝置如視訊 解碼器100的功能降低,或許這是藉由改變合法傳播接收器 或合法播放裝置而達成。若盜取者不願(或是不能)使個別 CAMs的功能降低以學習個人秘密或修改功能,如在個別 CAMs上的播放登綠,接著存取系統仍維持安全。換言之, 若2個可能的限制方法越容易,而且從經濟角度而言是不 允許的,則PCR最有效。此外,甚使一盜取者想建立不一 -19- ----^--.1---嚴------1T------.^ * (請先閲讀背面之.注意事哥再填寫本頁) 本紙張尺度適用中國國家標準(CNS > A4規格(210X2?7公釐) 經濟部中央標準局員工消費合作社印製 ^328 5 2.1 A7 B7五、發明説明(17 ) 致的視訊解碼器裝置,仍可維持安全,這是假設其不能大 規模的如此作,不僅因爲這些裝置的建立,散布,及支援 過於筇貴,而且因爲即使是合法視訊解碼器裝置其利潤也 很低。因此一理性且受經濟因素驅使的盜取者會偏愛建立 盜取的CAMs而不是盜取的播放裝置。因此對於資訊提供者 的實際威脅是來自盜取的CAMs。 以明示的PCR爲例,視訊解碼器100會拒絕來自CAMs的通 訊,因其未授權通訊。明示的PCR能使裝置偵測出繞過 CAM 400提供的安全檢查的企圖_,及拒絕來自盜取CAMs的 通訊及未授權。 ' 以隱含的PCR爲例,若嘗試繞過CAM 400,則裝置不能以 來源材料的未中斷及未破壞爲由而得到可接受的服務等 級,因爲有效通訊中的破壞或中斷之故。 爲了成爲有效的盜取卡拒絕模組,一 PCR系統應該有效 回拒各種攻擊,亦即一有效PCR系統最好應該能根據合法 視訊解碼器裝置及盜取CAM,合法視訊解碼器具有合法 CAM的盜取CAM (管道攻擊),及盜取視訊解碼器裝置與合 法CAM的使用而作反擊。這些方案的敘述與視訊解碼器裝 置是否能本身證明無關。例如若一視訊解碼器裝置的盜取 版本本身證明能使用一合法CAM以自由存取資訊,則安全 性會降低。此外,在管道攻擊中,使用一合法CAM以使合 法裝置能產生内容位元,同時使用盜取CAM以解密這些内 容位元。另一攻擊會在流上竊取合法的視訊解碼器產品, 或是可以使CAM返回視訊解碼器的流上。 (請先閲讀背面之注意事項再填寫本頁) -20- 参紙張尺度適用中國國家標準(CNS ) Λ4規格(210X 297公釐) m852 . A7 B7 五、發明説明(18 ) 經濟部中央標準局貝工消費合作社印製 根據本發明的概念,最好藉由強力裝置配對協定之使用 而強化PCR效率及播放媒體源證明。也可使用介面保護協 定。如以下所述,個別化可支援這些協定的安全屬性。熟 於此技術者將了解,根據本發明的PCR系統包含配對協 定,PCR協定,介面保護協定,及反盜取技術等的任何組 合。因此爲了使安全標準化,可使用多層協定的任何组 合。例如可使用的這種多層協定之一是來源及證明CAM操 作的單向配對,其具有標題式PCR協定。尤其是,組合的 選擇是依資訊提供者的事業目標而定。與習知相比這是極 大的改良,因爲許多習知裝置依賴安全的系統架構,並不 提供符合事業計畫所需的架構選擇彈性。 以下所述的配對協定及PCR協定可反擊分開使用的盜取 視訊解碼器或盜取CAM’以及管道攻擊和竊取式攻擊。盜 取的偵測’其特徵爲视訊解碼器100產生資訊的部分重播, 是在本發明的範園中。此外,視訊解碼器10〇,CAM 400及 提供資訊的媒體等的即時證明,可防止使用者存取目前授 權媒體上的資訊。 各CAM 400最好個別化而且與一特殊視訊解碼器ι〇〇配 對。個別化是指以下事實,即各CAM (或是諸CAMs的較小 子集)包含一秘密’其很難藉由其他CAMs的秘密知識而導 出。該很明顯的,條件存取提供者與盜取相比,實質上很 谷易將一CA1V[個別化以便從CAM得到這些個別化秘密。各 CAM 400最好也包含萬用關鍵詞或一串關鍵詞,以用於條 件存取資訊β 21 - 本紙張尺度適用中國國家標準(CNS ) Α4規格(210 X 297公着) --------;---餐------1T------^ • I ♦ (請先聞讀背面之)注$务再填寫本頁) A7 B7 ί 328 52 : 五、發明説明(19 ) 萬用概念是指以下事實’即迅速的傳播散布機構會嚴格 限制内容的版本數目,其在任一時間傳播或是可供利用。 配對 配對的要求可防止盜取(其成功地將一合法Cam作逆向工 程)大量製造衍生的CAM,這些是使用其他使用者的來源裝 置。明確而言,意欲使一衍生CAM不能成功地與來源裝置 配對(除了授權原始CAM可以配對的以外)^後端系統7〇〇發 出一配對指令’以結合一來源2〇〇與一下游CAM 400。類似 的,可發出一配對指令以結合一 CAM 400與一下游沉300。 配對是單向的,而2個實體之·中只有一顧(如下游實體)是 一證明實體(即一實體接著能證明至其他實體的通訊如同從 該處發出)’可由其他(未證明)實體來驗證。這種配對可替 代或是額外的允許加密通訊指向證明實體。藉由向—實體 顯示一證明公用關鍵詞即可建立一單向配對,其使得因此 能有效授權該實體成功的與一實體通訊以擁有對應的隱密 關键詞。依此顯示證明的公用關键詞,以便明確地證明公 用關鍵詞與實體的結合(其授權藉由該公用關鍵詞而通 訊)。 一種建立雙向配對的方法是藉由建立2個單向配對。 配對的目的疋允許2個實趙建立一共用秘密値。藉由使用 證明的公用關鍵詞及證明實體的對應隱密關鍵詞即可達成 此目標。若根據單一單向配對而建立共用秘密値,則未證 明的實體會交出一公用關鍵詞給其擁有的對應隱密關鍵 詞。可以在裝置上產生此關鍵詞對,現是在裝置製造過程 -22- 本紙張尺度適用中國國家橾準(CNS ) A4規格(210X297公釐) (請先聞讀背面之ii·意事項再填寫本頁) 裝 線 經濟部中央標隼局員工消费合作社印装 經濟部中央標準局員工消资合作社印製 3 28 52 .1 A7 -—__B7 _ 五、發明説明(2〇 ) 相關的期間建立。 爲了建立共用秘密値,2個實體可使用函數f如美國專利 4,200,770號所敎示的,其中f (ΡυΒΚΕγ實體i,pRWKEY實 體2)= i (PUBKEY實體2,PRIVKEY實體1)。在該例中, 各實體如實體1及實體2藉由應用該函數f在其他實體的公 用關鍵詞及其本身的隱密關键詞而導出共用秘密値。或者 在加密演譯法中使用證明的公用關鍵詞以建立—共用秘密 値(可參考美國專利4,405,829號或是公用關鍵詞加密系統及 根據離散對數的簽字設計;T· E1 Gamal,密碼學精義 (1985)),其中可直接由執行加密的實體中選擇該共用秘密 値。或者雙向配對會直接導致建立—共用秘密値。 爲了保留期望的配對效用,後端700或一些其他信任當局 可決定或驗證額定的不同證明標題與共同公用關鍵詞結合 的程度。 一實體可以在授權與一特殊實體通訊之前或之後自己決 定其角色,其限制明顯不同實體的數目,而它會與該等實 體通訊。 配對解除/未授權·· 根據本發明的概念,可發出數位符號表及/或特定目標未 授權訊息以有效去除來自系統的侵入者。可以在—已知來 源200,沉300或CAM 400裝置中,將特定目標訊息加密及/ 或唯一地證明。在一被動未授權形式中,例如藉由檢查適 當配置裝置可使用區域日期資訊的終止曰期,而看出配對 的終止。如以下詳細所述,若適合可用證書來表示配對的 _ -23- 本紙張尺度適用中國國家標準(CNs) A4規格(21〇 X 297公釐) --------;---装------.玎----—*乘 0 - . (請先閲讀背面之‘注意事35-再填寫本頁) η 3 28 5 2.^ Α7 Β7 -------- 五、發明説明(21 ) 終止 系统支援延遲的結合’其中配對的至少—概念是不能立 即驗證的。可暫時使用配對’而由適合當局稍後確認或拒 絕(即解除或未授權)該配對。 以下説明中的一些配對協定實施例利用數位證書,其將 相關資訊與單一實體連接,如實體證明(資訊)操作所示, 或是藉由連接不同實體的相關資訊而交又證明,如交叉證 明(資訊)操作所示β這些操作的結果分別是實體證書及交 叉證書。 _ 使用隱密簽字關鍵詞的知識而產生證書,以便相關的公 用驗證關鍵詞出現在驗證實體擁有的可接受關鍵詞串之 中。關鍵詞利用證書即可本身建立成一串,要了解以下協 定中的證書包含本文上的簽字,以及本大本身(若需要)。 在一些例子中,部分本文可由驗證者分開的知道,或是分 開的傳送給驗證者。證書也包含那一公用簽字驗證關鍵詞 應該用以驗證證書的指示。藉由條件存取系統後端700即可 產生交又證書。藉由條件存取系統後端7〇〇或是由後端信任 的當局執行此功能,即可產生實體證書。 在以下圖中所示協定的使用中,一ID與一未證明實體有 關。在配對操作期間可隨機或是僞随機產生j 。 要證明的實體的公用關鍵詞(若條件存取系統後端700需 要)則可藉由使用實體I D而由後端700加以定址,或者可了 解與後端700通訊(最好很安全)以作爲配對操作的一部分。 要證明的實體的隱密關鍵詞在一些情況下與實體通訊(最好 -24- 本紙張尺度適用中國國家榇準(CNS ) A4規格(2丨0><四7公釐 ----:---:---裝------ΪΤ------^ -- (請先閲讀背面之>i意事赉再填寫本頁) 經濟部中央標準局貞工消费合作社印策 經濟部t央標準局身X消費合作社印¾ 五、發明説明(22 ) 很安全)以作爲配對操作的一部分。後者的技術允許後端 7 0 0動態分配共用的公用關鍵到値給指定的實體群3 配對中的2個實體之一可根據接收自其他實體或是來自後 端700的資訊而拒絕配對。 執行以下配對協定操作的典型架構如圖17所示。圖2至圖 9藉由顯示來源2〇〇 ’ CAM 400及後端7〇〇的平行處理,及其 各個互動而説明協定的操作。熟於此技術者將了解,圖中 的知r足疋典型的,在不達反本發明的精神或範圍下可改變 一些步驟的前後順序。圖中的平行線包園—流程箭號,例 如分別在來源200,CAM 400 ,及後端7〇〇之間(參考圖2的步 驟S205 ’步驟S213,步驟S207,步驟S2I5及步驟S210),其 欲説明一同步操作,其中接收裝置必須在處理之前接收訊 息(如流程箭號所示)。 符號説明:在副程式的引數間顯示時,逗點表示資料流 的串併。名詞訊息本身是各個子訊息的串併,而符號㊉表 示相同長度的位元流的位元式互斥或。 來源及證明CAM之單向配對 現在參考圖2,3以説明來源2〇〇及證明CAM 4〇〇的單向配 對協定。在各個協定圖中,爲了易於了解而以類似的參考 數冬表示各協定申的類似步驟,惟該了解這些步碟的實際 實施,實際上是可以相同或是不同的。 如圖2所tf ’來源200傳送一來源id到CAM 400 (S201)。 收到來源ID (S204)以後,CAM 4〇〇即傳送一 CAM 及來源 I D到後端700 (S205)。收到來源z D後,後端7〇〇即產生—交 -25- 本紙張尺度通用中國國家梯準(CNS ) 請 閲 讀· 背 之. 注― I- 裝 訂432852JS A7 B7 V. Description of the invention U) The function of cracking the encryption mechanism can generate and widely distribute stolen cards and harm the information providers. In US Patent No. 5,448,045 to Clark, another method is proposed that uses a smart card to generate a secure boot application on a computer, and by using the smart card, the executable file to be executed by the computer can be verified. Smart cards and computers share secrets that are managed and placed by management, so smart cards and computers can perform—authorize operations. However, once the attacker breaks the password, the stolen smart card itself can pass the authorization. In addition, because the computer does not know the challenge of the card, the verification is renewable. Therefore, invalid cards can continue to be used. Finally, in U.S. Patent No. 5,802 ^ 176 issued to Audebert, another method was proposed in which a reusable card was used to control access to a special function on a computer. This is a transaction system in which the card is coordinated with the computer and the keywords are changed each time it is accessed. However, this method is limited to special functions to be accessed on the computer, and is not applicable to a system that deals with many different unpredictable functions / programs. For example, in information dissemination systems, that is, a system in which different programs (movies , Songs, articles, executable files, etc.) are all different functions. Therefore, there is a need for a method and system for rejecting stolen cards (PCR) to protect valuable information, a powerful method and system to meet the needs of a particular information provider, and to overcome the above disadvantages. Summary and purpose of the invention The purpose of the present invention is to prevent unauthorized access to information distributed by information providers. Another object of the present invention is to prevent stealers from enabling many people to provide Chinese papers with information from the information provided on this paper standard {CNS) A4 Specifications (210X29? Mm) Sang ---. »{Please read the notes on the back ^ before filling out this page} -Order. Printed by the Consumers' Cooperatives of the Bureau of Standards of the Ministry of Economic Affairs 4 328 5 2 A7 B7 V. Description of the Invention (5) The printers of the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs get unauthorized access to information. Another object of the present invention is to allow information providers to flexibly choose multiple thefts according to the individual needs of the information providers. Anyone of the methods of card rejection is still another object of the present invention is to provide information only through an authorized receiving device and an authorized security device such as a conditional access module (CAM). Another object of the present invention is to provide information only through an authorized non- Reproducible devices and reproducible devices provide information. Another object of the present invention is to make non-reproducible devices reject a stolen regenerative device so that security information cannot be accessed. The purpose is to provide a method and device for requesting a receiving device and a security device such as CAM for users to access information via a shared secret. The object of the present invention is to provide a method and device for requesting a security device such as conditions The access module is paired with a receiving device and provides information only through the paired receiving and security device. In the concept of the present invention, an object is to prevent the information receiving device from effectively communicating with an unpaired CAM. In the present invention, In another concept, another object is to provide a method and device, in which a security device can verify the authenticity of a medium being accessed by a receiving device. In another concept of the present invention, an object is to provide a method and device to effectively To prevent thieves from interfering with the communication between the receiving device and the security device, the method is required to perform communication according to a specific protocol. -8-This paper size is suitable for financial affairs (CNS) Α4 secret (21GX297 mm, please first listen to S * Back of the item · Refill booklet A7 B7 V. Description of the invention (6) In another concept of the present invention, an object is to provide a method Method and device, which requires a receiving device and a security device to negotiate a shared secret and communicate with each other.-In order to achieve the above and other departments and in accordance with the purpose of the present invention (as implemented and broadly described herein), a method for implementing the present Invented device prevents unauthorized access to information, including-Reproducible devices to authorize non-reproducible devices to process information. Non-reproducible devices are paired with regenerable devices through a shared secret to enable non-reproducible devices and regenerable devices to communicate with each other. The reproducible device uses a shared secret and communicates with the non-reproducible device according to a preset protocol Xenon. Preferably, the information is encrypted rather than the regenerative device is included-the output is output to the regenerable device, and the regenerative device includes a decryption The logic decrypts the information and an output outputs the decrypted information to the non-reproducing device. Usually the information will contain a specific program (ie data or extensible) a so it is better to have at least one non-reproducible device and regenerable device contains-access window logic 'to generate an access time window for the preset period of the specific program , And the time window restricts access to specific programs. It is also preferable that the 'non-regenerative device includes a control logic to generate an inquiry message' and a proof logic to use the shared secret to prove the information contained in the inquiry message and the information contained in the response message to generate a non-regeneration Device certification message. The reproducible device preferably contains a proof logic, using a shared secret to prove the information contained in the inquiry message, and responding to the information in the message 'to generate a reproducible device certification message. The regenerative device preferably also includes a control logic operable to generate a response message and provide the non-reproducible device with the response message. The control logic of the non-recycling device is better to be more operable-9- This paper size is applicable to the Chinese National Standard (CNS) A4it grid (210X297 mm) -----_--- Μ — ^ — (Please read ^ · back first Please note that you need to fill in this page, and then fill out this page.) Printed by the Central Bureau of Standards of the Ministry of Economic Affairs, consumer cooperation, printed 1328 52. V. Description of the invention The proof message matches the non-reproducible device certification message 'and if the reproducible device certification message matches the non-reproducible device certification message, it is provided to the regenerable device in a specific program. Preferably, after the response message is provided to the non-reproducible device, the regenerable device That is to log in to access the information. Preferably, a recovery generator used to generate a random loop is combined with a non-regenerative device. Usually, the information is encrypted, and the non-regenerative device preferably includes a super decryption logic to supervise the super. Encrypted information 'and one-decryption logic to decrypt the information. Preferably, the' non-reproducible device contains a media certification logic to prove a medium, on which the information to be accessed is carried, and the reproducible device also Contains a media attestation logic to prove the media. In another concept, the invention includes a method for preventing unauthorized access to information in a system that includes a non-regenerative device with control logic and reproducible control logic. The method includes the following steps: pairing a non-regenerative device with a regenerable device; selectively certifying information exchanged between the non-regenerative device and the regenerable device based on information selected from the non-regenerative device and the regenerable device, And transmitting—certifying information; verifying the certification information in another non-recyclable device and regenerable device; and then authorizing access to the information. Preferably, the pairing step further includes: generating the ID of the non-recycling device; • 10 paper sizes Applicable to China National Standard (CNS) A4 specification (210X297mm) Please read% · Back, Note _ Notice 'Matters-No matter how expensive the binding is, Quan 43 28 52. A7 B7 V. Description of Invention (8) Central Ministry of Economic Affairs Standard Bureau employee consumer cooperatives print and generate IDs for renewable devices; generated based on IDs of non-renewable devices and IDs of renewable devices At least one certificate; and transmitting the at least one certificate to at least one non-reproducible device and a regenerable device. The non-reproducible device preferably includes a source device, such as a combination with a video decoder. The non-reproduced device also includes a sink device, usually The device consumes information. The system also includes a back-end system, and the pairing step preferably further includes: generating the ID of the non-regenerating device; _ judging the secret of the non-regenerating device in the back-end system based on the ID of the non-regenerating device Information; and transmitting secret information to the regenerable device. Preferably, each non-reproducible device and regenerable device includes a proof logic, and the step of selectively proving the message further includes: transmitting an inquiry message from the non-regenerable device to the regenerable device. ; Use a shared secret to prove the information contained in the inquiry message and the information in the response message 'hence a reproducible device certification message and the regenerative device generates a response message; use a shared secret to prove the information contained in the inquiry message And the information contained in the response message, thereby generating a non-reproducible device certification message; Verify that the reproducible device certification message matches the non-reproducible device certification message. In another concept, the present invention provides a method for preventing unauthorized access to information in a system. The system includes a non-recycling device with a control logic. The paper size is applicable to the Chinese National Standard (CNS) A4 specification (2I0X297). Dong) 432852 ·-V. Description of the invention (9) and renewable equipment with a control logic1. The method includes: transmitting a media query message from a reproducible device to a non-reproducible device; certifying that the information contained in the media query message and the information contained in the media response message are generated in the non-reproduced device, thereby generating a non-reproduced device Device media certification message; send media response message and non-reproduced split media certification message to reproducible device: prove the information contained in the media response message and the information contained in the media inquiry message in the reproducible device, thus generating renewable Device media certification information; and verifying the non-reproducible device media certification message with the reproducible device media certification message in the reproducible device. Preferably, the 'reproducible device includes a counter to generate a regenerable device count, which is included in the media inquiry message, and the method further includes: in a non-reproducible device, incrementing the regenerable device count by one; and In the regenerative device, the regenerative device count is incremented by one to complete the verification step. It is preferred that the reproducible device includes a random number generator for generating the reproducible device random number, which is included in the media inquiry message, and the method further includes: In the regenerative device, the regenerative device random number is incremented by one; and if the verification step is completed, the regenerable device random number is incremented in the regenerative device by one. In yet another concept, the present invention provides a system to prevent unauthorized deposits in the system. _____________ * 12-This paper size applies to Chinese National Standards (CNS > A4 · (21GX297)) Printed by the Employees' Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 4 3 2852. a? __________B7_ V. Description of the invention (10) Method for obtaining information 'The system includes a non-regenerating device and a renewable device. The method includes: (a) a sub-negotiation request from a non-regenerating device The device is transmitted to the regenerable device; (b) a challenge and status query is transmitted from the regenerative device to the non-reproducible device; (c) determining whether the non-reproducible device and the regenerable device are in password synchronization; and (d) if the non-reproducible device is If neither the regenerative device is in the password synchronization, return to step (a). _ Preferably, the method further includes the following steps. (E) Determine whether the non-reproducible device and the regenerable device are in packet synchronization; and (f ) When both the non-regenerative device and the regenerative device are in the process of synchronizing the packets, the information is provided to the reproducible device in the individually numbered packets. Preferably, the information is provided to a preset access view The regenerative device in the information providing step further includes verifying part of the information by the regenerable device in the default access window and receiving the information. In the following description, the additional purpose, advantages and novelty of the present invention will be partially described. Characteristics, and those skilled in this technology will also partially understand when reviewing the following description, or learn from the examples of the present invention that β can be implemented and combined with the tools and combinations specifically indicated in the scope of the attached patent application. The purpose and advantages of the present invention are obtained. Brief description of the drawings The drawings, which are part of this specification, illustrate several implementations of the present invention. 13- The paper size is applicable to the Chinese National Standard (CNS) A4 specification (210X29? Mm) 4 3 28 5 2.1 4 3 28 5 2.1 Printed A7 by Zhengong Consumer Cooperative of the Central Bureau of Quasi-Ministry of Economic Affairs ------ One-B7 V. Description of Invention (") ~ ~ ~ Example 'Cooperate with this description to explain this Principle of the invention β Fig. 1 is a block diagram of an embodiment of the present invention. Fig. 2 / Tiger diagram illustrates an embodiment of a one-way pairing operation according to the present invention, which is between the source and the certification conditional access module (cam) . image 3 The flow chart illustrates another embodiment of the one-way pairing operation between the source and the CAM. [Fig. 4] The flow chart illustrates the one-way pairing operation between the CAM and the proof. Example of a two-way pairing operation between cA] v [of a shared secret key. FIG. 6 is a flowchart illustrating an example of a two-way pairing operation between a source and a cam with a directly shared secret key. An embodiment of a two-way pairing operation between CAMs sharing a shared secret volume. Figure 8 illustrates a diagram of an embodiment of a two-way pairing operation between a CAM and a sink having a directly shared secret volume. Figure 9 is a diagram illustrating another embodiment of a two-way pairing operation between a CAM and a sink having a direct shared secret key. Fig. 10 is a block diagram of a first embodiment of a title-based stolen card rejection (PCR) architecture according to the present invention = > Fig. 11 is a flowchart illustrating the operation of the title-based PCR protocol according to the present invention. Fig. 12 is a flowchart illustrating another embodiment of a titled PCR protocol with a window inquiry operation. This paper size applies to China National Standard (CNS) A4 < 2 丨 〇X 297mm) ---- ^-丨 '--- ^ ------ 1T ------. 4. (Please read tt · Back of the Note赉 Refill this page} _ -14 -___ Printed by the Consumers' Cooperative of the Central Bureau of Standards of the Ministry of Education 4 3 28 52, 1 a? __ B7_ V. Description of the Invention (12) Figure 13 illustrates another implementation of the present invention For example, it has a metered title PCR architecture. The flowchart of FIG. 14 illustrates the operation of the metered header PCr protocol according to the present invention. The circle 15 flowchart illustrates the operation of the metered header PCR protocol with a credit request according to the present invention. Fig. 16 is a block diagram illustrating another embodiment of the present invention having a metered title type stolen card rejection (pCR) architecture with non-volatile memory (NVM) in the source. _ Fig. 17 is a block diagram illustrating the present invention. In another embodiment, a combined super-encryption / re-encryption and header are shown. FIG. 18 is a flowchart illustrating the operation of the super-encryption and re-encryption Pcr protocol. FIG. 19 is a block diagram illustrating another embodiment of the present invention. Encryption / re-encryption PCR architecture. The flowchart of FIG. 20 illustrates the operation of merging super-encryption / re-encryption PCR protocols. Block of FIG. 21 The figure illustrates another embodiment of the present invention having a proven media source architecture. The flowchart of FIG. 22 illustrates the operation of the proven media source agreement according to the present invention. The flowchart of FIG. 23 illustrates another aspect of the proven media source agreement according to the present invention. One operation. FIG. 24 is a block diagram illustrating another embodiment of the present invention, with a combined super-encryption / re-encryption header PCR and media certification architecture. FIG. 25 is a flowchart illustrating combined super-encryption / re-encryption according to the present invention. Title ____- 15- This paper size applies to Chinese National Standards (CNS > A4 now (210X297 mm)) ------- ^ --- Sliding -------- ΪΤ ----- -.4- mm-f Please read the ii on the back of the page and then fill in this page} 4 328 52. A7 B7 Shellfish consumer cooperation with the Central Bureau of Standards, Ministry of Economic Affairs. (13) The operation of the PCR and media certification protocol. Figure 26 is a block diagram illustrating another embodiment of the present invention, which has m (BBRAM) PCR, -nvm on -Video Decoder (STB), and CAM architecture There is a battery powered backup ram. Figure 27 is a flowchart illustrating the operation of the data pCR protocol, which There is an NVM on the cymbal and -BBRAM on the CAM. The same figure is used to indicate the same or similar elements in each figure. The structure and operation are understood from the drawings and the following description. Those skilled in the art can understand that the same in each figure The differences between the elements, structures and operations indicated by the numbers. Detailed Description of the Invention Reference will now be made in detail to the presently preferred embodiments of the present invention, and examples thereof will be described in the accompanying drawings. FIG. 1 is a simplified block diagram of an embodiment to illustrate a typical stolen card rejection (PCR) system according to the present invention. In FIG. 1 ... The conditional access module (CAM) conditionally authorizes access to information from the back-end system 700 through the video decoder (which includes the source and Shen Ze). Sources receive information from almost any system or source, such as data streams, broadcast streams, or readable storage media such as readable and / or green CD-ROMs, disks, or media. Examples of readable and / or recordable discs include (but are not limited to) cd4dvd discs, which contain digital sound and visual information such as movies and other information and executables. The term information used herein refers broadly to content data, such as sound and / or visual materials, as well as other sources and executable materials from any source. Similarly, a specific program or title in the information may contain content data such as who and how, or visual, data, as well as other data from any service, and the paper size is suitable-1 installed, please read on the back Intentional matters ^ really fill in this purchase) Order 4 3 28 5 2 .1 V. Description of the invention (14) A7 B7 Employees of the Central Standards Bureau, Ministry of Economic Affairs, consumer cooperation Du printed equipment source 200 contains custom circuits familiar to those skilled in the art to Receiving a data stream, a propagation stream, and / or custom circuits to retrieve information from a readable and / or recordable optical disc, magnetic disk or magnetic tape. This is done using any of the techniques familiar to those skilled in the art, examples of which may be Reference is made to U.S. Patent No. 5,48,609 issued to Cohen et al., And U.S. Patent No. 5,440,631 issued to Akiyama et al. = ≫ Operate Shen 300 to transfer assets into a visual and / or auditory acceptable form for use of Various known visual and / or sound display devices are used to display, or execute an executable file or process data. Taking a movie as an example, Shen 300 contains conventional circuits known to those skilled in the art to convert information into visual and sound information for display in visual and / or sound display systems. As for other applications, such as accessing executable files, the Shen 300 may be (or installed as) a general purpose computing device, for example. Although the source 200 and the Shen 300 are shown in FIG. 1 as separate devices, they may be combined into one device. And although the source 200 and the Shen 300 shown in FIG. 1 are part of the video decoder (STB) 100, either or both of them can be separated from the STB. The CAM 400 preferably includes an inexpensive module with decryption and better login capabilities. CAM 400 can decrypt information content (movies, songs, articles, executable files, etc.), or CAM 400 can decrypt a keyword to allow the device in video decoder 100 (it preferably contains source 200 or Shen 300) Decrypt information content. Alternatively, CAM 400 can authorize Source 200 and Shen 300 to access information. For example, the CAM 400 includes a set of pins 402 that can be inserted into a socket 102 mounted on a video decoder 100. In the description of the present invention, CAM 400 is considered as an example of a renewable safety device. Although the CAM 400 shown in FIG. 1 is outside the video decoder 100, it can also be included in the video decoder 100-17. This paper size applies the Chinese National Standard (CNS) A4 specification (210 X: 297 mm) -------- ^ --- install ------ 1T ------, fruit * «(Please read the ΐ ΐ ΐShi Fei on the back before filling this page) Central Standards of the Ministry of Economic Affairs扃 Printed by the employee consumer cooperative 4 3 28 5 2 .J A7 __B7 V. In the description of the invention (15) 'to require the video decoder 100 to be turned on to remove the CAM 400. It is best to perform the regeneration of the CAM 400 under the authorization of the information provider, and perform it on the basis of individual needs to replace the damaged CAM or steal the CAM, or perform it periodically to further prevent the stealing of the Cam 400 . Therefore, the PCR system according to the present invention is designed to be ' favorable to allow customers to replace CAMs for legal purposes in response to CAM failure, and to allow replacement and insertion of CAMs for reasons of safety and / or enhancement or improvement of operations. CAM 400 includes a microprocessor 400 or similar to enable it to perform decryption and registration (such as billing, management of access authorization records and other transaction information management) 'and, in some embodiments, may also Perform re-encryption. The Cam 400 preferably uses a certain combination of regional non-volatile memory 406 and (online or offline) services to connect to remote nodes to perform logins reliably. In some examples, the CAM 400 must retrieve this information ' from a local memory 406 or a remote file storage area for use by a non-reproducible playback device, i.e. the audio decoder 100. This frequency of reads and / or writes determines the efficiency of the non-reproducible memory used in the area compared to the remote file storage area (accessed via a modem or other device). As mentioned above, the 'CAM 400 utilizes the area storage element 406 which is located on the CAM 400 or in a related storage element. For example, it is located in the video decoder 100, and the storage element 202 or 302 is preferably a part of the source 200 or the Shen 300, respectively, or it is on another board or module of its own. The backend 700 (including a conditional access system) announces to the information user that information can be accessed, or otherwise handles registration. The backend 700 can directly provide (or not provide) information such as movies to the video decoder 100. For example, information users can obtain movies from a regional source (such as a DVD), which can only be registered at -------------- 18-This paper size is suitable for financial standards (CNS) A4im (210X297) Li) (Jing Xian read the back <. Note: Please fill in this page again.) .Shang_ order 4 3 28 52. at B7 Printed by the Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention (16) Only access after access. This system is disclosed in commonly assigned US Patent No. 5,822,291, which is incorporated herein by reference. Assuming that at least a part of the source content is protected by encryption, a corresponding decryption procedure can be achieved by using a secret that can be used legally by CAM 400, which operates in accordance with backend 700. CAM 400 is preferably a regenerative device, which is controlled by the information provider or the guarantee authority, one or both of which may be part of the backend 700. For example, the guarantee authority may be an entity unrelated to the backend 700. Keywords used on CAM 400. Alternatively, the guarantee authority is the same entity as the back end 700, or is installed in the back end 700. Examples of assurance agency operations can be found in CCITT recommendation X.509 (1989). The video decoder 100 is preferably a non-reproducible device that can be owned or rented by the customer of the information provider. Because stealers can sell competitive (stolen) products at a lower cost than information sold by legitimate information providers, there is a need for a renewable that enables non-reproducible products (ie, video decoder 100) to reject theft. Product (ie CAM 400). Especially, the stolen card rejection (PCR) is most effective when the back-end system 700 is used, so the stealer must reduce the function of the CAM 400, so learn the universal secret of the CAM 400, and make the information receiving device such as a video decoder The reduced functionality of 100 may be achieved by changing the legal broadcast receiver or legal playback device. If the thief is unwilling (or unable) to reduce the function of individual CAMs to learn personal secrets or modify functions, such as playing green on individual CAMs, then the access system remains secure. In other words, PCR is most effective if the 2 possible restriction methods are easier and not economically acceptable. In addition, even a thief wants to establish a different -19- ---- ^-. 1 --- strict ------ 1T ------. ^ * (Please read the Note: Please fill in this page again.) This paper size applies to Chinese national standards (CNS > A4 size (210X2? 7mm). Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs. ^ 328 5 2.1 A7 B7 17) The same video decoder device can still maintain security. This is assuming that it cannot do so on a large scale, not only because the establishment, distribution, and support of these devices are too expensive, but also because even legal video decoder devices Profits are also low. Therefore, a rational and economically driven stealer would prefer to build stolen CAMs rather than stolen playback devices. Therefore, the actual threat to the information provider comes from the stolen CAMs. To be explicit As an example of PCR, video decoder 100 will refuse communication from CAMs due to unauthorized communication. Explicit PCR enables the device to detect attempts to bypass the security check provided by CAM 400, and to reject communication from stealing CAMs And unauthorized. 'Taking the implicit PCR as an example, if you try to bypass CAM 400, the device cannot obtain an acceptable service level based on the uninterrupted and unbroken source material, because of the disruption or interruption in effective communication. In order to be an effective card stealing rejection module, a PCR system should Effectively reject various attacks, that is, an effective PCR system should be able to steal CAMs (pipe attacks) based on legal video decoder devices and stolen CAMs, legal video decoders and stolen video decoder devices. Fight against the use of legal CAM. The description of these solutions has nothing to do with whether the video decoder device can prove itself. For example, if a stolen version of a video decoder device itself proves that a legal CAM can be used to freely access information, it is safe In addition, in a pipeline attack, a legitimate CAM is used to enable a legitimate device to generate content bits, while a stolen CAM is used to decrypt these content bits. Another attack is to steal a legitimate video decoder on the stream Product, or can make CAM return to the video decoder stream. (Please read the precautions on the back before filling this page) -20- Standards are applicable to Chinese National Standards (CNS) Λ4 specifications (210X 297 mm) m852. A7 B7 V. Description of the invention (18) Printed by the Bayer Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs. The use of pairing protocols enhances PCR efficiency and media source certification. Interface protection protocols can also be used. As described below, individualization can support the security attributes of these protocols. Those skilled in the art will understand the PCR system according to the present invention Contains any combination of pairing agreement, PCR agreement, interface protection agreement, and anti-theft technology. Therefore, to standardize security, any combination of multilayer agreements can be used. One such multilayer protocol that can be used, for example, is a one-way pairing of proven and proven CAM operations, with a titled PCR protocol. In particular, the choice of portfolio depends on the business goals of the information provider. This is a significant improvement over conventional systems, as many conventional devices rely on a secure system architecture and do not provide the flexibility of architecture choices required by business plans. The pairing and PCR protocols described below can counter the theft of video decoders or CAM's, as well as pipeline attacks and theft attacks, which are used separately. The detection of stealing is characterized by a partial replay of information generated by video decoder 100, which is in the field of the invention. In addition, real-time certification of video decoder 100, CAM 400, and media providing information can prevent users from accessing information on currently authorized media. Each CAM 400 is preferably individualized and matched with a special video decoder ιOO. Individualization refers to the fact that each CAM (or a smaller subset of CAMs) contains a secret, which is difficult to derive from the secret knowledge of other CAMs. It is obvious that compared to theft, the conditional access provider is essentially a CA1V [individualized in order to obtain these individualized secrets from the CAM. Each CAM 400 preferably also contains a universal keyword or a string of keywords for conditional access to information β 21-This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 publication) ---- ----; --- Meal ------ 1T ------ ^ • I ♦ (please read it on the back first) Note $ service and then fill out this page) A7 B7 ί 328 52 : V. Description of the invention (19) The universal concept refers to the fact that the rapid dissemination and distribution agency will strictly limit the number of versions of the content, which can be disseminated or available at any time. Pairing The requirement of pairing prevents theft (which successfully reverse engineered a legitimate Cam) from mass-producing CAMs, which are source devices that use other users. Specifically, it is intended to prevent a derived CAM from successfully pairing with the source device (except for authorizing that the original CAM can be paired) ^ The back-end system 700 issues a pairing instruction 'to combine a source 200 with a downstream CAM 400 . Similarly, a pairing instruction can be issued to combine a CAM 400 and a downstream sink 300. The pairing is one-way, and only one of the two entities (such as a downstream entity) is a certifying entity (that is, an entity can then prove that communication to other entities is as if sent from there). To verify. This pairing can be used instead or in addition to allow encrypted communication to be directed to the attesting entity. A one-way pairing can be established by showing a proof common keyword to the entity, which thus effectively authorizes the entity to successfully communicate with an entity to have a corresponding secret keyword. The public key word of the certificate is displayed in order to clearly prove the combination of the public key word and the entity (its authorization is communicated by the public key word). One way to establish a two-way pair is by establishing two one-way pairs. The purpose of the pairing is to allow 2 real Zhaos to establish a shared secret 値. This can be achieved by using the public key word of the proof and the corresponding secret key word of the proof entity. If a shared secret key is established based on a single one-way pairing, the unidentified entity will hand over a common keyword to the corresponding secret key word it owns. This keyword pair can be generated on the device. Now it is in the device manufacturing process. 22- This paper size is applicable to China National Standard (CNS) A4 specification (210X297 mm). (This page) Printed by the Consumer Standards Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs. Printed by the Consumer Standards Cooperative of the Central Standards Bureau of the Ministry of Economics. 3 28 52 .1 A7-— __B7 _ V. Description of the invention (2) The relevant period is established. To establish a shared secret, two entities can use the function f as shown in US Patent No. 4,200,770, where f (ρυΒΚΕγ entity i, pRWKEY entity 2) = i (PUBKEY entity 2, PRIVKEY entity 1). In this example, entities such as entity 1 and entity 2 derive the shared secret 値 by applying the function f to the public keywords of other entities and their own secret keywords. Or use the public key word of the certificate to establish the shared secret in the cryptographic method (refer to US Patent No. 4,405,829 or the public key word encryption system and signature design based on discrete logarithms; T. E1 Gamal, Cryptographic Essence ( 1985)), where the shared secret can be selected directly from the entity performing the encryption. Or two-way pairing will directly lead to the establishment of a shared secret 値. In order to retain the desired pairing utility, the backend 700 or some other trusted authority may determine or verify the degree to which the different certified title of the rating is combined with a common public keyword. An entity can decide its own role before or after authorizing communication with a particular entity, which limits the number of significantly different entities that it will communicate with. Unpairing / Unauthorized ... According to the concept of the present invention, a digital symbol table and / or specific target unauthorized message can be issued to effectively remove intruders from the system. Specific target messages can be encrypted and / or uniquely authenticated in a known source 200, Shen 300 or CAM 400 device. In a passive unauthorized form, the termination of the pairing can be seen, for example, by checking the termination date of the zone information which is properly configured by the device. As described in detail below, if it is suitable to use a certificate to indicate pairing _ 23- This paper size applies to China National Standards (CNs) A4 (21〇X 297 mm) --------; --- Install ------. 玎 ----— * multiply 0-. (Please read the 'Notes 35- on the back side before filling out this page) η 3 28 5 2. ^ Α7 Β7 ------ -V. Description of the invention (21) The combination of the delayed system support delay 'where the pairing is at least-the concept cannot be verified immediately. The pairing can be used temporarily and later confirmed or rejected (ie, released or unauthorized) by the appropriate authority. Some of the embodiments of the pairing agreement in the following description use digital certificates, which connect related information with a single entity, as shown in the entity certification (information) operation, or prove by connecting related information of different entities, such as cross certification (Information) Operations shown β The results of these operations are entity certificates and cross-certificates, respectively. _ Generate certificates using knowledge of secretly signed keywords so that the relevant public verification keywords appear in the acceptable keyword string owned by the verification entity. Keywords can be built into a string by using certificates. It should be understood that the certificates in the following agreement include the signature on this article and the university itself (if required). In some examples, part of the text can be known separately by the verifier or transmitted to the verifier separately. The certificate also contains instructions for which public signature verification keywords should be used to verify the certificate. The conditional access system back-end 700 can generate a transfer certificate. An entity certificate can be generated by the conditional access system backend 700 or by an authority trusted by the backend. In the use of the agreement shown in the figure below, an ID is associated with an unproven entity. J can be generated randomly or pseudo-randomly during the pairing operation. The public key of the entity to be proven (if required by the conditional access system backend 700) can be addressed by the backend 700 by using the entity ID, or the communication with the backend 700 (preferably secure) can be understood as Part of the pairing operation. The secret keywords of the entity to be proven communicate with the entity in some cases (preferably -24- this paper size applies to China National Standards (CNS) A4 specifications (2 丨 0 > < Four 7mm ----: ---: --- install -------- ΪΤ ------ ^-(please read the > i intentions on the back before filling in this Page) The Central Standards Bureau of the Ministry of Economic Affairs, Jeonggong Consumer Cooperatives, India ’s Ministry of Economic Affairs, the Central Standards Bureau, and X Consumer Cooperatives ’Seals (5) Invention Description (22) is safe) as part of the pairing operation. The latter technology allows the backend 700 to dynamically allocate a shared common key to a given entity group 3. One of the two entities in the pairing may reject the pairing based on information received from other entities or from the backend 700. A typical architecture for performing the following pairing agreement operations is shown in Figure 17. Figures 2 to 9 illustrate the operation of the agreement by showing the parallel processing of the source 2000 'CAM 400 and the backend 700, and its various interactions. Those skilled in the art will understand that the information in the figure is sufficient, and the order of some steps may be changed without going beyond the spirit or scope of the present invention. Parallel line packet garden in the figure—the flow arrows, for example, are between source 200, CAM 400, and backend 700 (refer to step S205 ', step S213, step S207, step S2I5, and step S210 in FIG. 2), It is intended to describe a synchronous operation in which the receiving device must receive the message before processing (as shown by the flow arrow). Symbol description: When displayed between the arguments of the subroutine, the comma indicates the serialization of the data stream. The noun message itself is a concatenation of the sub-messages, and the symbol ㊉ represents a bit-wise exclusive OR of a bit stream of the same length. One-way Pairing of Source and Proof CAM Reference is now made to Figures 2 and 3 to illustrate the one-way pairing agreement of Source 200 and Prove CAM 400. In each agreement chart, for ease of understanding, similar steps in each agreement are indicated with similar reference numbers, but it should be understood that the actual implementation of these steps can actually be the same or different. As shown in Fig. 2, tf 'source 200 transmits a source id to CAM 400 (S201). After receiving the source ID (S204), the CAM 400 transmits a CAM and the source ID to the backend 700 (S205). After receiving the source z D, the back end 700 will be generated-delivery -25- This paper size is common to the Chinese National Standard (CNS) Please read and memorize it. Note-I- Binding

A 4 3 28 5 2 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明(23 ) 叉證書並將它傳送到CAM 400(S211,S212,S213),即後端 700產生值交又證明値(CAM一ID, Source—ID)。CAM 400接著 傳送交叉證書到來源200 (S202)。CAM 400判定CAM 400上 是否有區域實體證書(S208)。即在値實體證書(CAm_ID, CAM_Pub)中CAM-Pub是CAM的公用關鍵詞。若判定爲是, 則CAM 400傳送CAM 400的區域實體證書到來源2〇〇,而 CAM 400則與來源200配對(S210,S203)。若判定爲非,則 CAM 400從後端700接收一區域實體證書,若後端700具有 CAM 400的區域實體證書(S209_,S215,S214)。CAM 400將 接收自後端700的區域實體證書傳送到來源200,而 CAM 400則與來源 200配對(S210,S203)。 或者,上述證書取交叉證明(實體證書(CAMJD, CAM Pub), Source_ID))的値,或是交叉證明(CAM_Pub, Source_ID)的値。 在驗證證書的過程中,來源200尤其會使用其特定來源 ID而檢查計算出的交叉證書。 在本實施例中,在與此協定無關之下假設CAM 400擁有 隱密關鍵詞CAM_Priv。若必要,則由CAM 400傳送(一旦) 實體證書到來源200 (S210),不論後端700是否能存取此證 書,並接著將它傳送到CAM 400。當CAM 400檢查一區域實 體證書時,它會檢查其實體證書的版本目前是否有效。若 不有效,則它能使用從後端100接收的實體證書的版本(若 有)。 在如圖3所示的另一實施例中,來源200傳送一來源I D到 26- 本紙張尺度適用中國國家榡準(CNS ) A4规格(210X297公釐) -----_--^---^------ΐτ------Φ (請先閱^背面、^-注意事項再填寫本頁) 432852 .1 A7 B7 五、發明説明(24 ) CAM 400 (S301),收到來源 ID 後(S303),CAM 400即傳送一 CAM ID及來源ID到後端700 (S304,S308)。後端700產生一 CAM隱密關鍵詞,CAM_Priv,及CAM公用關鍵詞, CAM_Pub,並產生一交叉證書,即後端產生一値交叉證書 (CAM_Pub,Scmrce_ID)(S309,S310)。接著後端 700經由一安 全傳送而傳送CAM隱密關鍵詞,CAM_Pdv到CAM 400 (S3H,S305)。後端700也傳送交叉證書到CAM400,其接 著傳送交叉證書到來源200 (S312,S306,S307,S302)。 CAM 400現在與來源200配對。_ 在圖3的實施例中,在與此協定無關之下假設CAM隱密關 鍵詞,CAM_Priv不在CAM 400中。再假設存在一安全通道 以機密的從後端700傳送CAM隱密關鍵詞,CAM_Priv到 CAM 400。 CAM與證明沉之單向配對 現在參考圖4及圖5以説明CAM 400與證明沉300的單向配 對協定。 在圖4中,沉300傳送一沉ID到CAM 400 (S401)。收到沉 ID 後(S404),CAM 400傳送一 CAM ID及沉 ID 到後端 700 (S405,S410)。沉300判定判定是否有區域實體證書 (S402)。若判定爲是,則沉300傳送沉300的區域實體證書到 CAM 400 (S403 ,S406),即値實體證書(Sink_ID, Sink_Pub),而Sink_Pub是沉的公用關鍵詞。若判定爲非, 則協定結束。CAM 400接著傳送沉300的區域實體證書到後 端700 (S407,S411)。後端7〇〇判定其是否持有沉300的區域 -27- 本紙張尺度適用中國國家標率(CNS ) A4规格(210X297公釐) ----^---^---^------1T------^ » 4 (請先閱讀背面之注$赞再填寫本頁) 經濟部中央標準爲貝工消費合作社印製 4 32S52J' Λ: _ B7 五、發明說明(25 ) 實體證書,而且若有,則判定後端700持有的區域實體證書 是否替代沉300 (S412,S413)持有的區域實體證書。若步驟 S412及S413中的判定爲是,則後端700將後端700 (S414, S408)持有的沉300的區域實體證書傳送给CAM 400。揍著, 後端700產生一交又證書(S415),即後端產生値交又證書 (Sink_ID,CAM_ID)。後端700接著傳送交又證書到CAM 400 (S416,S409),而使CAM 400與沉300配對。 若CAM 400在步驟S406從沉300接收實體證書,則實體證 書資訊包含版本,或终止日期,或發出曰期等。此外在步 驟S414,僅傳送實體證書或沉公用關鍵訶Sink_Pub。若傳 送Sink_Pub,則應該最好安全的傳送到CAM 400,以避免未 偵測的取代。此外,若是在後端700持有一實體證書(對應 於特定的SinkJD),則它(根據實體證書資訊)而取代從沉 300被CAM 400接收的版本,此實體證書爲値實體證書 (Sink_ID,Sink Pub),則包含在步祿S414的傳送中。若後端 700未收到實體證書資訊,則區域實體證書(若有)會傳送到 CAM 400。 或者,上述證書是値交叉證明(實體證書(Sink_ID, Sink Pub),CAMjD),或是交又證明(Sink_Pub,CAM_ID)。 在驗證證書的過程中,CAM 400尤其會使用其特定 CAMJD而檢查計算出的交又證書。CAM 400使用從沉300 及/或後端700接收的實體證書(若有)的最新者。 在如圖5所示的另一實施例中,沉300傳送一沉I D到 CAM 400 (S51),收到沉 ID 後(S502),CAM 400 即傳送一 -28- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公爱> IJI — IJ--— 11—----- • * (請先閱讀背面_之注意Ϋ·項再填寫本頁) )tSJ· 經濟部智慧財產局員工消費合作社印製 4 3 23 52.1 A7 B7 經濟部中央橾準局貝工消费合作社印製 五、發明説明(26 ) CAM ID及沉I D到後端700 (S503,S506)。後端700使用沉I D 以查詢沉300的公用關鍵詞Sink_Pub (S507)。後端700接著傳 送 Sink_Pub到 CAM 400,而 CAM 400則與沉 300配對(S508, S504)。 具直接共用秘密値之來源與CAM雙向配對 在此及以下雙向協定中,從後端700傳送共用秘密値到 CAM 400,以作爲配對操作的重要部分《這應該最好經由 後端700與CAM 400之間的安全通訊裝置而達成。若是與配 對協定無關的另一實體尚未擁有,則此秘密應該最好經由 CAM 400而從後端700通訊到另一實體,依此以便在 CAM 400與另一實體間的通道上保密。例如這可藉由一加 密程序而達成,其中另一實體知道對應的解密程序。我們 分別以値(Source_Secret)SOURCE及値(Sink_Secret)s眺:來表示秘 密的安全版本。來源200或沉300不論配對協定都不知道其 秘密,因爲這可由後端700動態的判定。例如若認爲授權至 少2個CAM與單一來源(或沉)通訊是有利的,則可使用此 方法以強迫維持不同的密碼身份。 在圖6中,來源200傳送一來源I D到CAM 400,其傳送來 源 ID及CAM ID到後端 700 (S601,S602,S603,S605)。後端 7 0 0使用來源I D以查詢一來源秘密Source_Secret (S606), 其經由安全傳送而送到CAM 400 (S607,S604)。雖然圖6中 未示,若來源200不知道Source_Secret,則後端700會傳送値 (Source_Secret)St)Urce到 CAM 400。在任一情況下,CAM 400都 會與來源200配對。 -29- ---------择衣-- (請先閲#-背面<-注意事唷再填寫本頁) 訂 線 本紙張/^度適用中國國家標準(〇阳)八4说格(210父297公釐) 經濟部中央樣隼局貞工消资合作社印製 ^3^852. A7 __B7__五、發明説明(27 ) 在圖7所示的另一實施例中,來源200傳送一來源I D到 CAM 400,其傳送來源ID及CAM ID到後端700 (S701, S703,S704 ’ S708)。後端 700產生一來源秘密 s〇urce_Secret (S709),並經由一安全傳送(S710,S705)而傳送値 Source_Secret到CAM 400 。後端700接著產生値 (Source__Secret)source (S7〗1)。在此實施例中假設來源事先不知 來源秘密。接著後端700傳送(Source_Secret)S()un;e到 CAM 400,其傳送它到來源 200 (S712,S706,S707,S702)。 因此CAM 400變成與來源200配對。 具直接共用秘密値之CAM與沉雙向配對、 現在參考圖8,9以説明具直接共用秘密値之CAM 400與 沉300雙向配對。 在圖8中,來源200傳送一沉I D到CAM 400,其傳送沉I D 及 CAM ID到後端 700 (S801,S802,S803,S805)。後端 700使 用沉I D以查詢一沉秘密Sink_Secret (S806),其經由一安全 傳送而送到CAM 400 (S807,S804)。雖然圖8中未示,若沉 300不知道 Sink_Secret,則後端 700傳送値(Sink_Secret)Sint到 CAM 400,在任一情況下CAM 400都會與沉300配對。 在圖9所示的另—實施例中,沉300傳送一沉ID到 CAM 400,其傳送沉 I d 及 CAM ID到後端 7〇〇 (S901,S903, S904 ’ S908)。後端 700產生一沉秘密 Sink_Secret (S909),並 經由一安全傳送(S910,S905)而傳送Sink_Secret到 CAM 400。後端 7〇〇接著產生値(sink_Secret)Sink (S9U)。在此 實施例中假設來源事先不知道來源秘密。接著,後端700傳 · ^ ; 裝 111T-^--- _* (請先閲讀背面之•注意事咬再填寫本頁) _—_____-30- 本舐張尺度適用中國國家樣準(CNS ) A4規格(210X297公釐) 4328 52 . A7 B7 五、發明説明(28 ) 送値(sink_secret)Sin々jCAM 4〇0 ,其傳送它到沉 3〇〇 (s9i2, 5906 4907,^02^因此CAM 400變成與沉3〇〇配對。 單向雜湊函數(雜湊) 單向雜湊函數是指一函數其擷取可能的隨意長度輸入(例 如長度是位元),並將輸人映射成某—固定預設長度的輸 出’其中將輸出表示成雜凑字或雜凑値。函數的單向概念 是指其相對於反轉的計算困難的意欲安全特性。F丨ps “Ο] 中定義的函數SHA-1是雜湊函數常見的例子,也可參考作 者Seim G,Akl所著的「壓縮編碼之安全性」;發明背景説 明中的密碼精義(I983年的密碼論壇)。 關鍵詞導出函數(KDF) 一共用秘密値雖然建立在2個實體之間,可藉由重覆應用 一關鍵詞導出函數而擴展。關鍵詞導出函數規定共用秘密 値的長度。若該過程如Diffle_Heiiman用以產生原始的即第 一共用秘密値,則導致長度値與關鍵詞導出函數規定的不 同’ 2個體都可以從第—値獨立的導出該規定長度的第二 共用秘密値。藉由配對可將共用秘密値加以證明。 KDF的輸入特別包含共用秘密値。另一輸入(以KDF變數 表示)則是一計數器,其在KDF的應用或隨機或僞隨機値之 間遞增,其最好在後續KDF應用時不要重覆使用。輸出是 一雜湊字其視爲一關鍵詞,或可能是不同長度的多個關鍵 詞。關鍵詞可接著用在批次加密演譯法如資料加密標準 中。關鍵詞也可當成副程式的輸入使用如以下定義的證明 及加密。KDF的輸入共用秘密値在一些情況下維持常數, -31 - 本紙張尺度適用中國國家標準(CNS ) A4規格(2IOX297公釐) ^ ;---扣本— (請先閲讀背面之ίΐ·意事咏再填寫本頁) 訂 Λ 經濟部中央標準局員工消費合作社印製 經濟部中央標车局員工消贽合作社印製 4328 52. at ___ B7 五、發明説明(29 ) 或者’藉由例如周期性的以新値(由2個實體之一產生)取代 它而將輸入的共用秘密値本身恢復,這最好使用隨機或僞 随機數產生方法。藉由使用以下定義的證明及加密副程式 即可將新輸入的共用秘密値從原來實體傳送到另一實體, 其中關鍵詞,其當成證明及加密副程式的輸入使用,是使 用具目前輸入共用秘密値的KDF來產生。在以下副程式定 義中,可不使用共用秘密値,因此不必明白出現在副程式 引數表中。 KDF (KDF變數)= Hash (KDF變數」共用秘密値,KDF變數) 指令證明函數(證明) , 可使用證明以證明隨意長度的指令。其函數與HMAC類 似,可參考訊息證明之關鍵詞雜湊函數,作者]Vi Bellare等 人’密碼精義(1996年的密碼論壇),其使用巢狀雜湊運 算。 證明(KDF變數,訊息)=Hash96 (訊息,關鍵詞)㊉關鍵 詞, 其中Hash96表示雜湊字Hash (訊息,關鍵詞)的96個最大有 效位元,而關鍵詞及關鍵詞的結果是因爲以輸入KDF變數 執行KDF而得到。例如若是將函數SHA-1當成KDF中的Hash 使用,則導出的關鍵詞可以是前64位元,而關鍵詞是96位 元長。明確而言,關鍵詞等於KDF的64個最小有效位元 (KDF變數),而關鍵詞等於KDF的96個最大有效位元(KDF 變數)。 因爲訊息不能從證明函數的結果計算出,所以例如可使 -32- 本紙張尺度適用中國國家標準(CNS M4規格(210X297公釐) ----:---:---— (請先閱讀背面之注货再填寫本頁)A 4 3 28 5 2 A7 B7 The Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs prints the V. Invention Statement (23) and sends it to the CAM 400 (S211, S212, S213). Proof 値 (CAM-ID, Source-ID). The CAM 400 then transmits the cross-certificate to the source 200 (S202). The CAM 400 determines whether there is a regional entity certificate on the CAM 400 (S208). That is, in the entity certificate (CAm_ID, CAM_Pub), CAM-Pub is a common keyword of CAM. If the determination is yes, the CAM 400 transmits the regional entity certificate of the CAM 400 to the source 200, and the CAM 400 is paired with the source 200 (S210, S203). If the determination is negative, the CAM 400 receives a regional entity certificate from the backend 700, and if the backend 700 has a regional entity certificate of the CAM 400 (S209_, S215, S214). The CAM 400 transmits the regional entity certificate received from the backend 700 to the source 200, and the CAM 400 is paired with the source 200 (S210, S203). Alternatively, the above certificate is taken from the cross certificate (entity certificate (CAMJD, CAM Pub), Source_ID)) or the cross certificate (CAM_Pub, Source_ID). In the process of verifying the certificate, the source 200 in particular checks its calculated cross-certificate using its specific source ID. In this embodiment, it is assumed that the CAM 400 has the secret key CAM_Priv regardless of this agreement. If necessary, the CAM 400 transmits (once) the entity certificate to the source 200 (S210), regardless of whether the backend 700 can access the certificate, and then transmits it to the CAM 400. When CAM 400 checks a regional entity certificate, it checks if the version of its entity certificate is currently valid. If it is not valid, it can use the version (if any) of the entity certificate received from the backend 100. In another embodiment as shown in FIG. 3, the source 200 sends a source ID to 26- This paper size applies to China National Standard (CNS) A4 specification (210X297 mm) -----_-- ^- -^ ------ ΐτ ------ Φ (please read the back of ^, ^ -notes before filling in this page) 432852.1 A7 B7 V. Description of the invention (24) CAM 400 (S301) After receiving the source ID (S303), the CAM 400 transmits a CAM ID and the source ID to the backend 700 (S304, S308). The backend 700 generates a CAM hidden keyword, CAM_Priv, and a CAM common keyword, CAM_Pub, and generates a cross-certificate, that is, a back-end generates a cross-certificate (CAM_Pub, Scmrce_ID) (S309, S310). The backend 700 then transmits the CAM hidden keywords, CAM_Pdv to CAM 400 via a secure transmission (S3H, S305). The backend 700 also transmits the cross-certificate to the CAM 400, which in turn transmits the cross-certificate to the source 200 (S312, S306, S307, S302). CAM 400 is now paired with Source 200. _ In the embodiment of FIG. 3, it is assumed that the CAM secret keyword, CAM_Priv, is not in CAM 400 without regard to this agreement. Assume that there is a secure channel to secretly transmit the CAM secret key, CAM_Priv to CAM 400 from the backend 700. One-way Pairing of CAM and Proofer Shen Referring now to Figures 4 and 5, a one-way pairing agreement between CAM 400 and Proofer Shen 300 will be described. In FIG. 4, the Shen 300 transmits a Shen ID to the CAM 400 (S401). After receiving the Shen ID (S404), the CAM 400 transmits a CAM ID and a Shen ID to the backend 700 (S405, S410). Shen 300 determines whether there is a regional entity certificate (S402). If the determination is yes, Shen 300 transmits Shen 300's regional entity certificate to CAM 400 (S403, S406), that is, the entity certificate (Sink_ID, Sink_Pub), and Sink_Pub is Shen's public keyword. If the determination is negative, the agreement ends. CAM 400 then transmits the regional entity certificate of Shen 300 to backend 700 (S407, S411). The back end 700 judges whether it holds Shen 300's area-27- This paper size applies to China's National Standard (CNS) A4 specification (210X297 mm) ---- ^ --- ^ --- ^- ---- 1T ------ ^ »4 (Please read the note on the back of the page and like this page before filling out this page) The central standard of the Ministry of Economic Affairs printed for the Beigong Consumer Cooperative 4 32S52J 'Λ: _ B7 V. Description of the invention (25) An entity certificate, and if there is, determine whether the regional entity certificate held by the backend 700 replaces the regional entity certificate held by Shen 300 (S412, S413). If the determination in steps S412 and S413 is YES, the backend 700 transmits the regional entity certificate of Shen 300 held by the backend 700 (S414, S408) to the CAM 400. By the way, the backend 700 generates a crossover certificate (S415), that is, the backend generates a crossover certificate (Sink_ID, CAM_ID). The backend 700 then transmits the certificate to the CAM 400 (S416, S409), so that the CAM 400 and the Shen 300 are paired. If the CAM 400 receives the physical certificate from the Shen 300 in step S406, the physical certificate information includes the version, or the termination date, or the date of issue. In addition, in step S414, only the entity certificate or the sink public key Sink_Pub is transmitted. If Sink_Pub is transmitted, it should preferably be safely transmitted to CAM 400 to avoid undetected replacement. In addition, if an entity certificate (corresponding to a specific SinkJD) is held in the backend 700, it replaces the version received from CAM 400 from Shen 300 (based on the entity certificate information). Sink Pub), which is included in the transmission of Bulu S414. If the backend 700 does not receive the entity certificate information, the regional entity certificate (if any) is transmitted to the CAM 400. Alternatively, the above certificate is a cross-certificate (entity certificate (Sink_ID, Sink Pub), CAMjD), or a cross-certification (Sink_Pub, CAM_ID). In the process of verifying the certificate, CAM 400 especially uses its specific CAMJD to check the calculated delivery certificate. CAM 400 uses the latest entity certificate (if any) received from Shen 300 and / or backend 700. In another embodiment as shown in FIG. 5, Shen 300 transmits a Shen ID to CAM 400 (S51). After receiving the Shen ID (S502), CAM 400 transmits a -28. This paper size applies Chinese national standards (CNS) A4 Specifications (210 X 297 Public Love > IJI — IJ --— 11 —----- • * (Please read the _ Cautions on the reverse side before entering this page)) tSJ · Ministry of Economy Wisdom Printed by the Consumer Affairs Cooperative of the Property Bureau 4 3 23 52.1 A7 B7 Printed by the Shellfish Consumer Cooperative of the Central Government Bureau of the Ministry of Economic Affairs 5. Description of the invention (26) CAM ID and Shen ID to the back end 700 (S503, S506). The backend 700 uses Shen ID to query the common keyword Sink_Pub of Shen 300 (S507). The backend 700 then sends Sink_Pub to CAM 400, and CAM 400 is paired with Shen 300 (S508, S504). The source with the direct shared secret card is paired with the CAM bidirectionally. In this and the following two-way agreements, the shared secret card is transmitted from the backend 700 to the CAM 400 as an important part of the pairing operation. Reached between secure communication devices. If it is not already owned by another entity that is not related to the matching agreement, this secret should preferably be communicated from the backend 700 to the other entity via the CAM 400, so as to keep it secret on the channel between the CAM 400 and the other entity. This can be achieved, for example, by an encryption procedure in which another entity knows the corresponding decryption procedure. We use 値 (Source_Secret) SOURCE and 値 (Sink_Secret) s: to show the secret security version. The source 200 or Shen 300 does not know its secret regardless of the pairing agreement, because this can be dynamically determined by the backend 700. For example, if it is considered advantageous to authorize at least 2 CAMs to communicate with a single source (or sink), this method can be used to force the maintenance of different cryptographic identities. In FIG. 6, the source 200 transmits a source ID to the CAM 400, which transmits a source ID and a CAM ID to the back end 700 (S601, S602, S603, S605). Backend 700 uses source ID to query a source secret Source_Secret (S606), which is sent to CAM 400 via secure transmission (S607, S604). Although not shown in FIG. 6, if the source 200 does not know Source_Secret, the backend 700 will send (Source_Secret) St. Urce to the CAM 400. In either case, the CAM 400 is paired with the source 200. -29- --------- Choose clothes-(Please read # -Back < -Cautions before filling out this page) Binding paper / ^ degrees apply Chinese National Standard (〇 阳) 4 Grid (210 father 297 mm) Printed by Zhengong Consumer Cooperative, Central Samples Bureau of the Ministry of Economic Affairs ^ 3 ^ 852. A7 __B7__ V. Description of the invention (27) In another embodiment shown in FIG. 7, The source 200 transmits a source ID to the CAM 400, which transmits the source ID and the CAM ID to the back end 700 (S701, S703, S704'S708). The backend 700 generates a source secret source_Secret (S709), and transmits 値 Source_Secret to the CAM 400 via a secure transmission (S710, S705). The backend 700 then generates a (Source__Secret) source (S7) 1). In this embodiment, it is assumed that the source is unknown beforehand and the source is secret. The backend 700 then transmits (Source_Secret) S () un; e to the CAM 400, which transmits it to the source 200 (S712, S706, S707, S702). Therefore CAM 400 becomes paired with source 200. The CAM with the direct shared secret card is paired with Shen in both directions. Referring now to FIGS. 8 and 9, the CAM 400 with the directly shared secret key is paired with Shen 300 in two directions. In FIG. 8, the source 200 transmits a sink ID to the CAM 400, which transmits the sink ID and the CAM ID to the back end 700 (S801, S802, S803, S805). The backend 700 uses Shen ID to query a Shen secret Sink_Secret (S806), which is sent to the CAM 400 via a secure transmission (S807, S804). Although not shown in FIG. 8, if Shen 300 does not know Sink_Secret, the backend 700 transmits Sink_Secret Sint to CAM 400. In either case, CAM 400 will be paired with Shen 300. In another embodiment shown in FIG. 9, the Shen 300 transmits a Shen ID to the CAM 400, which transmits the Shen ID and the CAM ID to the back end 700 (S901, S903, S904'S908). The backend 700 generates a sink secret Sink_Secret (S909), and transmits Sink_Secret to the CAM 400 via a secure transmission (S910, S905). The back end 700 then generates a sink_Secret Sink (S9U). It is assumed in this embodiment that the source does not know the source secret in advance. Next, the back end 700 pass. ^; Install 111T-^ --- _ * (Please read the note on the back first, and then fill out this page) _—_____- 30- This standard is applicable to Chinese national standards (CNS ) A4 specification (210X297mm) 4328 52. A7 B7 V. Description of the invention (28) Send 値 (sink_secret) Sin々jCAM 4〇0, which sends it to Shen 300 (s9i2, 5906 4907, ^ 02 ^ Therefore CAM 400 becomes paired with Shen 300. One-way hash function (hash) A one-way hash function is a function that takes possible arbitrary length inputs (for example, length is bits) and maps the input to some-fixed The output of the preset length 'where the output is represented as a hash word or hash 値. The one-way concept of a function refers to its intended safety feature that is difficult to calculate with respect to reversal. F 丨 ps Function defined in SHA -1 is a common example of a hash function. You can also refer to "Security of Compression Coding" by author Seim G, Akl; the meaning of cryptography in the background description of the invention (I983 Password Forum). Keyword Derivation Function (KDF) A shared secret, although established between two entities, can be repeated by A keyword derivation function is extended. The keyword derivation function specifies the length of the shared secret 値. If this process is used by Diffle_Heiiman to generate the original, first shared secret 値, the length 値 is different from that specified by the keyword derivation function '2 Individuals can independently derive the second shared secret 値 of the specified length from the first 値. The shared secret 値 can be proved by pairing. The input of the KDF specifically includes the shared secret 値. Another input (represented by a KDF variable) is Is a counter that increments between KDF applications or random or pseudo-random 値, it is best not to use it repeatedly in subsequent KDF applications. The output is a hash word that is considered a keyword, or may be of different length Multiple keywords. Keywords can then be used in batch encryption methods such as data encryption standards. Keywords can also be used as the input of a subroutine to use proofs and encryption as defined below. KDF's input shared secrets. In some cases To maintain the constant, -31-This paper size is applicable to the Chinese National Standard (CNS) A4 specification (2IOX297 mm) ^; --- Withdrawal — (Please read the back first Please fill in this page and fill in this page) Order Λ Printed by the Consumer Standards Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs and printed by the Cooperative Standards of the Ministry of Economic Affairs and the Consumers ’Cooperatives of the Central Standard Vehicle Bureau of the Ministry of Economics 4328 52. at ___ B7 V. Description of Invention (29) By, for example, periodically replacing the new shared key (generated by one of the 2 entities) with the new shared key to recover the input itself, it is best to use a random or pseudo-random number generation method. By using a proof defined below And the encryption subroutine can transfer the newly input shared secret key from the original entity to another entity, where the keywords are used as the proof and the encryption subroutine input is generated using the KDF with the current input shared secret key. In the following subroutine definitions, shared secrets may not be used, so there is no need to understand that they appear in the subroutine argument table. KDF (KDF variable) = Hash (KDF variable "shared secret 値, KDF variable) instruction proof function (proof). You can use a proof to prove an instruction of arbitrary length. Its function is similar to HMAC. You can refer to the keyword hash function of message proof. The author] Vi Bellare et al. 'Cryptographic Essence (Cryptographic Forum 1996), which uses nested hashing. Proof (KDF variable, message) = Hash96 (message, keyword) ㊉ keyword, where Hash96 represents the 96 most significant bits of the hash word Hash (message, keyword), and the result of the keyword and keyword is because Input KDF variables and get KDF. For example, if the function SHA-1 is used as a hash in KDF, the derived keywords can be the first 64 bits, and the keywords are 96 bits long. Specifically, the keywords are equal to the 64 least significant bits of the KDF (KDF variables), and the keywords are equal to the 96 most significant bits of the KDF (KDF variables). Because the message cannot be calculated from the result of the proof function, for example, -32- This paper size can be applied to the Chinese national standard (CNS M4 specification (210X297 mm) ----: ---: ----- (please first (Read the note on the back and fill out this page)

*ST 4328 52 A7 B7 力口全來傳送,如以 五、發明説明(30 ) 用加密法而分開的將訊息以一般本文或 下所定義。 加密,解密及確認 在抑制KDF變數的例子中,需要產 為受座生關鍵詞値的KDF變 數値假設爲已知’或是在2個標題間商議。以下定義適用 於: 加密(一般本文訊息)=一般訊息θ關鍵詞=加密本文訊息 解密(加密本文訊息)=加密訊息θ關鍵詞=一般本文訊息 若且唯若,加密(區域一般本文訊息)匹配收到的加密本 文訊息’則確認(收到的加密本文訊息)爲眞。由接收實體 使用確認以確保傳送實體擁有一般本文値的知識。若對方 猜疑一般本文値,則會破壞此函數的安全性。可於使用 Hash ( —般本文)之處實際應用確認以替代一般本文訊息本 身。 接收者未偵測到之前不能改變確認訊息的證明。 盜取卡拒絕(PCR)協定 這些協定使用配對操作的結果,而來源200及CAM 400則 由此共用一秘密。此秘密向來源200證明(明示或隱藏) CAM 400。以CAM 400及沉300配對爲例,其共用另一秘密 以便向CAM 400證明沉300。 協定的操作環境最好包含以下狀態: 1) 設定資訊存取:要求建立播放: 2) 資訊存取:請求播放的狀態; 3) 結束資訊存取:以積極動作中止播放’在無再度設定資 -33 本紙張尺度適用中國國家標準(CNS > A4現格(210X297公釐) ----^---^------1T------.41 (請先閲t背面注意事項再填寫本f ) 經濟部中央標率局員工消費合作社印製 A7* ST 4328 52 A7 B7 is transmitted by full power, as described in V. Invention Description (30). Encryption method is used to separate the message as defined in general text or below. Encryption, Decryption, and Confirmation In the case of suppressing KDF variables, it is necessary to generate the KDF variable 受 which is the subjective keyword 値 assuming it is known 'or to negotiate between the two titles. The following definitions apply: Encryption (general text messages) = general information θ keywords = encrypted text messages decryption (encrypted text messages) = encrypted messages θ keywords = general text messages if and only if encryption (regional general text messages) matches The received encrypted text message 'confirms that the received encrypted text message is 眞. The acknowledgement is used by the receiving entity to ensure that the transmitting entity has the general knowledge in this document. If the other party suspects that this article is normal, it will break the security of this function. The actual application confirmation can be used in place of Hash (—general text) to replace the general text itself. The recipient did not detect proof that the confirmation message could not be changed before. Stolen Card Rejection (PCR) Agreements These agreements use the results of a pairing operation, whereby the source 200 and CAM 400 share a secret. This secret proves to the source 200 (explicit or hidden) CAM 400. Take the pairing of CAM 400 and Shen 300 as an example, they share another secret in order to prove Shen 300 to CAM 400. The agreed operating environment should preferably include the following states: 1) Setting information access: requesting playback: 2) Information access: status of requesting playback; 3) Ending information access: aborting playback with positive action 'set no more resources -33 This paper size applies to Chinese national standards (CNS > A4 now (210X297 mm) ---- ^ --- ^ ------ 1T ------. 41 (Please read t Note on the back then fill in this f) Printed by the Consumer Standards Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs A7

經濟部申央梯準局貝工消费合作社印製 4 3 28 5 2 五、發明説明(31 ) 訊存取之前不能接著存取資訊; 4)清除資訊存取:與結束資訊存取相關,動作的處理(若有) 是在播放暫停或中止之後,若此發生,則接著恢復設定資 訊存取。Printed by Shelley Consumer Cooperative of the Shenyang Elevator Bureau of the Ministry of Economic Affairs 4 3 28 5 2 V. Description of the Invention (31) Information cannot be accessed before the information is accessed; 4) Clear information access: Related to ending information access, actions The processing of (if any) is after the playback is paused or suspended, if this happens, then the setting information access is resumed.

標題式PCR 在標題式PCR實施例中,登錄由客户存取一資訊時間视 窗的客户,並接著允許客户在該視窗期間存取資訊。適於 時間視窗的協定遠比資訊長(如借電影二天)5 在如圖10所示的此實施例中,來源2〇〇最好包含:資訊接 收/產生裝置204 ’恢復產生器206,來源控制邏輯2〇8,證 明邏輯210’及存取視窗邏輯212。恢復產生器產生一隨意 値’恢復產生器例如是計數器以產生一計數値,或是隨機 數產生器以產生一随機數,其中該計數器可以任何遞增量 向上計數,或是以任何遞減量向下計數。而且,CAM 400 最好包含CA (條件存取)解密邏輯408,計時器410,CAM控 制邏輯412,證明邏輯414及存取視窗416。存取視窗邏輯 2 12及416分別在來源200及CAM 400中設定一時間長度限 制’以允許使用者存取一特定程式。圖1 〇實施例的操作如 圖11及12的流程圖所示,熟於此技術者將了解,圖丨丨及丨之中 的協定是分別由來源控制邏輯208及CAM控制邏輯412執 行。 在圖11中,來源200向CAM 400提供以下訊息,其包含來 自恢復產生器206的計數器値,及要從資訊接收/產生裝置 204存取的程式標題(S 1101)。使用的計數器値與先前訊息的 -34 - 本纸張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) -----^---^---种衣------ίτ------^ (請先聞讀背面t江意事爷再填寫本頁) 經濟部中央梯準局貝工消費合作社印製 A7 B7 五、發明説明(32 ) 計數器値不同。例如計數器可以是來自一隨機數產生器的 随機數’在協定的每次執行時都重新選擇,或者是儲存在 非揮發記憶體(NVM)中的計數器,其於每次使用時都遞 增。CAM 400使用上述配對操作中判定的共用秘密而證明 訊息(S1109)。接著CAM 400將證明的訊息送回來源200 (S 1102 ’ S U 10),然後來源200也使用上述配對操作中判定 的共用秘密來證明訊息(S 1103)。來源200及CAM 400都分別 根據來源200及CAM 400中的存取視窗邏輯212及416而重設 存取視窗。CAM 400接著登錄使用者存取(s m2),其可於 稍後時間由後端700 (圖1〇中未示)使用呤判定應該向使用 者收多少錢。來源200中的證明邏輯2 10 (圖10)分別驗證在 步驟S1103由來源200產生的證明訊息,以及驗證在步騍 S 1109由移動產生的證明訊息(S j 105)。這些證明訊息應該匹 配’因爲其各使用相同的共用審理關鍵詞而產生。若證明 訊息不匹配’則來源200停止協定。若證明訊息匹配(驗 證),則來源200傳送期望程式的内容以便由來源2〇〇中的資 訊接收/產生裝置2〇4存取以送到CAM 400 (S1106, S1113)。由CAM控制邏輯412使用CAM 400中的CA解密邏輯 408以解密收到的資訊(si 114),而CAM 400傳送解密資訊到 沉300 ’在此以可使用的形式顯示給使用者(sm5, S 1 1 Π)。各來源200及CAM 400使用其各自的存取視窗邏輯 (212及416)以判定存取視窗是否已終止011〇7,51116)。當 各CAM 400及來源200獨立判定其各自記憶體中的存取視窗 已終止時,即獨立停止處理資訊。 _____-35- 本紙張尺度適用中國國家標準(CNS ) A4規格(2丨0X297公釐) I— I u 裝 訂 I ^ * . . (請先閱讀背面之ίΐ·意事項再填寫本頁) 4328 52 . A7 B7 五、發明説明(33 ) 因爲上述協定會在整個時間視窗中向使用者收費,所以 來源200最好向CAM 400詢問先前購買的視窗是否仍使用。 此一詢問是在圖11步驟之前的圖12步驟中執行。如圖12所 示,來源200向CAM 400查詢程式的剩餘時間以及包含計數 器値及標題的訊息(S1201,S1207)。CAM 400使用一計時器 410 (圖1〇)以判定剩餘時間。CAM 400使用證明邏輯414 (圖10)以證明計數器値及實際剩餘時間(S1208),並且將實 際剩餘時間以及證明的計數器値與實際剩餘時間一起送回 來源200 (S1209,S1202)。來源2_00使用證明邏輯206以證明 計數器値及剩餘時間(S1203),並接著判定其證明是否匹配 CAM 400執行的證明,即驗證該證明(s 1204) »若其匹配, 則來源將剩餘時間設定爲是(S1205),若證明不匹配,則來 源將剩餘時間設定爲非(S1206)。因此當例如已中斷DVD光 碟播放時,即不能向使用者第二次收費。 標題的證明最好向來源200確認CAM 400正在登錄存取資 訊’該資訊正在由來源200產生。此授權來源2〇〇產生位Caption PCR In the caption PCR embodiment, a customer is logged in by a customer who accesses an information time window, and then the customer is allowed to access information during that window. The protocol suitable for the time window is much longer than the information (for example, borrowing a movie for two days). 5 In this embodiment as shown in FIG. 10, the source 200 preferably includes: the information receiving / generating device 204'recovery generator 206, the source Control logic 208, proof logic 210 'and access window logic 212. The recovery generator generates an arbitrary 'recovery generator' such as a counter to generate a count, or a random number generator to generate a random number, where the counter can count up by any increment, or count by any decrement. Count down. Moreover, CAM 400 preferably includes CA (conditional access) decryption logic 408, timer 410, CAM control logic 412, certification logic 414, and access window 416. The access window logic 2 12 and 416 set a time length limit 'in the source 200 and the CAM 400, respectively, to allow the user to access a specific program. The operation of the embodiment of Fig. 10 is shown in the flowcharts of Figs. 11 and 12. Those skilled in the art will understand that the agreements in Figs. 丨 and 丨 are executed by the source control logic 208 and the CAM control logic 412, respectively. In FIG. 11, the source 200 provides the following message to the CAM 400, which includes a counter 自 from the recovery generator 206, and a program title to be accessed from the information receiving / generating device 204 (S 1101). The counter used 値 -34 of the previous message-This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) ----- ^ --- ^ --- seed clothing ------ ίτ ------ ^ (please read and read this article on the reverse side before filling out this page) Printed by A7 B7, Shellfish Consumer Cooperative, Central Stairway Bureau of the Ministry of Economic Affairs 5. Description of invention (32) The counter is different. For example, the counter may be a random number from a random number generator that is reselected each time the protocol is executed, or a counter stored in non-volatile memory (NVM) that is incremented each time it is used. The CAM 400 uses the shared secret determined in the above-mentioned pairing operation to prove the message (S1109). The CAM 400 then sends the certified message back to the source 200 (S 1102 ′ S U 10), and then the source 200 also uses the shared secret determined in the above pairing operation to prove the message (S 1103). Both source 200 and CAM 400 reset the access window based on access window logic 212 and 416 in source 200 and CAM 400, respectively. CAM 400 then logs in to the user access (sm2), which can be used later by the backend 700 (not shown in Figure 10) to determine how much money should be charged to the user. The proof logic 2 10 (FIG. 10) in the source 200 verifies the proof message generated by the source 200 in step S1103 and the proof message (S j 105) generated by the move in step S1109. These proof messages should match because they each use the same common trial keyword. If the proof message does not match ', the source 200 ceases the agreement. If the proof message matches (verifies), the source 200 transmits the content of the desired program for access by the information receiving / generating device 204 in the source 200 to the CAM 400 (S1106, S1113). The CAM control logic 412 uses the CA decryption logic 408 in the CAM 400 to decrypt the received information (si 114), and the CAM 400 sends the decrypted information to the Shen 300 ', which is displayed to the user in a usable form (sm5, S 1 1 Π). Each source 200 and CAM 400 uses their own access window logic (212 and 416) to determine whether the access window has been terminated (011107, 51116). When each CAM 400 and source 200 independently determines that the access window in their respective memory has been terminated, it stops processing the information independently. _____- 35- This paper size applies to Chinese National Standard (CNS) A4 (2 丨 0X297mm) I— I u Binding I ^ *.. (Please read the ΐ · Implement on the back before filling this page) 4328 52 A7 B7 V. Description of the Invention (33) Because the above agreement will charge the user for the entire time window, the source 200 preferably asks CAM 400 whether the previously purchased window is still used. This inquiry is performed in the step of FIG. 12 before the step of FIG. 11. As shown in FIG. 12, the source 200 queries the CAM 400 for the remaining time of the program and a message including the counter and the title (S1201, S1207). The CAM 400 uses a timer 410 (Fig. 10) to determine the remaining time. The CAM 400 uses the proof logic 414 (Fig. 10) to prove the counter 値 and the actual remaining time (S1208), and returns the actual remaining time and the certified counter 値 to the source 200 (S1209, S1202) together with the actual remaining time. The source 2_00 uses the proof logic 206 to prove the counter and the remaining time (S1203), and then determines whether its proof matches the proof executed by CAM 400, that is, to verify the proof (s 1204) »If it matches, the source sets the remaining time to Yes (S1205), if the proof does not match, the source sets the remaining time to non (S1206). Therefore, for example, when the playback of a DVD disc has been interrupted, the user cannot be charged a second time. The proof of the title preferably confirms to the source 200 that the CAM 400 is logging in to access the information 'and that the information is being generated by the source 200. This authorized source generates 200 bits

元D 經濟部中央標準局貝工消費合作社印裂 --------^---^-- {請先閲讀背面之'注意事嘎再填寫本頁) 旅 若來源200具有一繼續播放模式,則最好追縱複數個時 間,並且於視窗空時中止播放。 當只有單一付費視窗,而資訊必須在該視窗中播放時, 尤其是當該視窗遠大於實際播放資訊時,即適合此協定。 此實施例使用雙方(合併來源及沉裝置)或三方(來源及沉 裝置分開),及/或PC架構。此外,此實施例在來源2〇〇中不 需要非揮發圮憶體202,但是來源200最好知道標題資訊’ -36- 本紙張尺反通用宁國國家標準(CNS ) ( 2!0x297公釐) <32852. A7 B7 五、發明説明(34 ) 並限制繼續播放。 從視窗開始起若使用資訊流量(即總長)作度量,而不是 播放時間,則計量標題式PCR是一更適合的協定。Yuan D, the Central Bureau of Standards, Ministry of Economic Affairs, Shellfish Consumer Cooperative, -------- ^ --- ^-{Please read the 'Cautions on the back before filling this page) In playback mode, it is best to track multiple times and stop playback when the window is empty. This agreement is suitable when there is only a single paid window and the information must be played in that window, especially when the window is much larger than the actual broadcast information. This embodiment uses two parties (combining the source and sink devices) or three parties (the source and sink devices are separated), and / or a PC architecture. In addition, in this embodiment, the non-volatile memory 202 is not required in the source 200, but the source 200 preferably knows the title information '-36- This paper rule is against the General National Standard of China (CNS) (2.0 × 297 mm ) ≪ 32852. A7 B7 V. Description of the Invention (34) and restricting continued playback. From the beginning of the window, if the information traffic (ie total length) is used as a measurement instead of the playing time, then the metered title PCR is a more suitable protocol.

計量標題式PCR 另一 PCR協定是計量標題式PCR,其中客户存取資訊時遞 增收費。此實施例的例子以及其使用的各協定例子如圖13 至15所示。圖13説明一較佳裝置以執行圖14及15所示的操 作。可根據播放時間或資訊存取的總長(即位元组)而登錄 及收費。 _ 經濟部中央標隼局員工消费合作社印製 (請先閱讀背面之注意事項再填寫本頁) 在圖I3所示的此實施例中,來源2〇〇a最好包含:資訊接 收/產生裝置204a’恢復產生器206a,來源控制邏輯208a, 證明邏輯210a,及存取視窗邏輯212a,計時數214a,及資 訊計量器216a。恢復產生器206a產生一隨意値,恢復產生 器206a是計數器以產生一計數値,或是随機數產生器以產 生一隨機數。此外,CAM 400a最好包含:解密邏輯408a, 計時器410a,CAM控制邏輯412a,證明邏輯414a,存取視窗 邏輯416a,及資訊計量器418a。來源200a及CAM 400a中的 存取視窗邏輯212a及4 16a分別設定允許使用者存取一特定 程式的時間長度限制。而且,資訊計量器216a及資訊計量 器218a在存取過程中最好藉由偵測包含資訊的資料封包數 目以測量資說量。熟於此技術者該了解,資訊是以編號的 不同資料封包來傳送,各封包能包含一預設資料量。計時 器410a及資訊計量器418a追蹤使用的資訊量及/或剩餘視窗 量。而且熟於此技術者該了解,圖14及15中的典型協定分 -37- 本紙張尺度適用中國國家操率 ( CNS ) A4規格(2丨0X297公釐) 4 3 28 5 2 經濟部中央標隼局貝工消費合作社印製 Α7 Β7 五、發明説明(35 ) 別是由來源控制邏輯208a及CAM控制邏輯412a執行的。 在圖14所示的協定實施例中,來源200a向CAM 400a提供 訊息,其包含:恢復產生器206a產生的恢復値,要存取的 程式標題,及播放視窗請求(S 1401,S1408)。一新的播放視 窗可延伸一先前購買但是未完全使用的播放視窗。 CAM 400a使用證明邏輯414a以證明訊息,並且將證明的訊 息以及處理視窗一起送回來源200a (S1409,S1410, S1402)。來源200a也使用證明邏輯210a來證明訊息 (S1403),並且藉由使用來源控制邏輯208a而判定其是否匹 配來源證明(S1404)以驗證該CAM證明=CAM 400a的驗證證 明指示CAM 400a已在步騍S1412收費,或是已登綠存取請 求新請求的視窗。驗證訊息時,來源200a藉由一預設量 「播放視窗J而廷伸存取視窗(S1405)。接著,來源200a將 資訊(其關於要存取的期望程式)從資訊接收/產生裝置204a 傳送到 CAM 400a (S1406,S1413)。CAM 400a使用解密邏輯 408a以解密資訊(S1414),並提供解密資訊到沉裝置並且以 可使用的方式顯示给使用者(S1415,S1417)。各來源200a及 CAM 400a使用其各存取視窗邏輯212a及416a及其各資訊計 量器216a及418a,而判定存取視窗是否已終止(S1407, S1416)。較佳地,存取視窗邏輯212a及存取視窗邏輯416a各 設定存取視窗長度,其可由一段時間表示或是由一預設資 料封包數目來表示。當以一段時間表示時,計時器410a即 監控剩餘的存取視窗。若以一預設資料封包數目表示時, 資訊計量器216a及資訊計量器418a各偵測資料封包數,其 -38 - 本紙張尺度適用中國國家標準(CNS ) Μ規格(210X297公釐) '' — ----:--^---^------1Τ------0 (請先聞‘讀背面^-注^-項再填寫本頁) 432852 . 經濟部中央標準局貝工消費合作社印製 A7 B7 五、發明説明(36 ) 承載正在存取的期望程式資訊。一旦已偵測到預設的資料 封包數’則來源200a及CAM 400a即停止處理。因此允許使 用者存取資訊直到CAM 400a或來源200a判定該存取視窗已 終止。 而且在資訊播放結束時’來源200a或CAM 400a具有一未 使用的部分視窗’即未使用的信用,所以如圖丨5所示它即 請求信用來源200a向CAM 400a提供一訊息,其包含:信 用請求,及訊息證明包含將計數器値加一,及請求信用(即 請求信用,證明(計數器加_—,請求信用))(sl5〇1, S1502)。CAM 400a使用證明邏輯414a以證明信用及計數器 加一的請求(S1503)。接著CAM 400a藉由證明邏輯414a執行 的證明是否與證明邏輯2 l〇a執行的證明匹配而驗證該證明 (S1504)。若證明匹配,即接著驗證cam 400a登錄該信用請 求(S1505),若證明不匹配,則協定停止。 此外CAM 400a在此請求中判定恢復値是否與最新的計數 器値連接以請求一播放視窗》若使用一隨機値以取代一計 數器値(其要求一非揮發記憶體202),則該値可接著是加一 的最新隨機値。CAM 400a會在該點停止處理資訊,而來源 200a也會停止產生資訊。允許的信用最好是根據其本身資 訊而由CAM 4〇〇a允許中的較小者,以及來源2〇Oa請求的。 若CAM 400a僅使用追蹤的資訊以判定使用者的到期信用, 則可使用合法來源200a以播放具盜取CAM 400a的無限資 訊。同理,若CAM 400僅使用來源200給予的資訊以判定使 用者的到期信用,則接著可使用盜取的來源200以播放具合 ____-39- _ 本紙張尺度適用中國國家標準(CNS ) A4.規格(2丨0X297公釐) ~ (請先閲讀背面之再填寫本頁) 裝- 订 經濟部中央標準局男工消費合作社印製 432852 , A7 _______B7 五、發明説明(37) 法CAM 400的無限資訊。注意,來源200能證明信用請求的 能力不必確認來源200正在請求該信用,而且只有cam 400 證明的相同装置才會作請求。 或者’若不遞增付費,則此協定可使用單一收費中扣除 的金額以涵蓋一大視窗’以償還先前的借方視窗。例如, 使用者會要求48小時的實際資訊存取。在該情況下,來源 200a使用CAM 400a作爲視窗中剩餘總長的計量器,而來源 200a則報告其遞增的總使用量。預付梘窗最好分成許多檢 查點以對應其他播放視窗請求1而來源2〇〇a最好預先報告 次一檢查點。來源200a於每次到達檢查點時即向cam 400a 報告,而且每次都再度設定資訊存取。若借方視窗只是存 取資訊期間的一時段’則標題式PC R (如上所述)即足夠而 且很簡單,因爲不必中間報告。 在此實施例中’不論使用信用方式或借方方式, CAM 400a及來源200a都會追蹤資訊存取,並且於視窗用完 時停止播放。若CAM 400a不追蹤存取資訊量,則可使用一 盜取來源裝置以播放幾乎是免費含合法Cam的資訊。類似 的’若來源200a不追蹤使用的資訊量,則合法CAM將一授 權視窗給予來源200a後’盜取CAM能從來源2〇〇a解密無限 的資訊。 在來源裝置上具NVM (非揮發記憶體)之計量標題式pCR 圖16所示實施例使用大致上與上述相同的協定,除了信 用可於電力損失後请求以外。分別依資訊計量器2 1朴及資 訊計量器418b中的NVM 220b,420b的工作周期(包含電池爲 __-40- 本紙張尺度適用中國國家橾车(CNS )_A4現格(210X297公^―)_ ----——-1---襄------^------^ *· (請先閲讀背面之.注意事項再填寫本頁) ^32852. at B7 經濟部中央標隼局貝工消費合作社印袋 五、發明説明(38 ) 動力的RAM (BBRAM)),而決定要如何時常更新資訊計量 器218b及418b,應該向使用者收取幾乎所有應該收取的費 用β資訊計量器2 16b中的NVM 220b是在來源200b之中,以 及在CAM 400b的資訊計量器418b的NVM之中,最好具有儲 存能力,其大於要存取的程式,可執行檔等的實際資訊 量。 超加密及再加密 在圖17的實施例及圖18所示的對應協定中,可防止資訊 流的有效再使用送入CAM 400ce及從CAM 400c送出。例如 攻擊者嘗試攔截來源200c與CAM 400c之間,或是CAM 400c 與沉300c之間的資訊流。雖然來源200c與CAM 400c之間的 資料流可以用一般盜取CAM來解密,但是此協定可抿抗這 些攻擊,而且允許隨意的微調付費的詳細程度。 在圖17中,來源200c最好包含接收/產生裝置204c,超加 密邏輯222c,及來源邏輯208c。超加密裝置222c又使用如 DES (資料加密標準)FIPS Pub. 46-2 (1998)以加密資訊資料 (其已加密),因而產生超加密資訊。而且CAM 400c最好包 含超解密邏輯422c,條件存取解密邏輯4〇8c,其與解密邏 輯422c ’介面加密邏輯426c,及CAM控制邏輯412c等相 同。沉300c包含介面解密邏輯304c以便使用一商議審理關 键詞而從CAM 400c將再加密資訊資料解密。沉3〇〇c也包含 沉控制邏輯306c。後端700與CAM 400c互動。一典型輸出裝 置500接到介面解密邏輯304c,雖然熟於此技術者將了解輸 出裝置500可以和沉3〇Oc整合在一起。 ----:--J---^------1T------Λ- . * (讀先閲讀背面之'注意事i再填寫本頁) _ -41 - 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公楚) 02852 . at _____ B7 經濟部中央標準局貝工消費合作社印裝 五、發明説明(39) 在圖18所示此實施例的典型協定中,來源2〇〇c々CAM4〇〇c 提供要存取的程式標題(S1801,S1804)。CAM 400c最好使用 該標題以找出資訊存取過程(如解密)中所需的關鍵詞 (S1805) ’並作出登錄輸入(或收費)(sl8〇6)。來源2〇〇c使用 超加密邏輯222c以超加密保護的資訊(Sl8〇2),最好在目前 審理關鍵巧(其與CAM 400c共用)之下。使用一協定如上述 的關键詞導出函數而建立此(串)審理關键詞。沉3〇〇c將一 沉计數器値傳送到CAM 400c (S1814,S1807),其由沉300c 及CAM 400c使用以導出一新商議審理關键詞(S1815, S1808)。CAM 400c接著從來源2〇〇c接收超加密資訊資料 (S1803,S1809)。CAM 400c使用超加密邏輯422c以超解密該 超加密資訊(S1810)。CAM 4〇Oc接著使用條件存取解密邏輯 424c以解密資訊本身(S1S11),而且(:八]^ 4〇〇c使用介面加密 邏輯420c在商議審理關鍵詞下以沉3〇〇c (s 1812)再加密資 訊。沉300c從CAM 400c接收再加密資訊,並五使用商議審 理關鍵詞及介面解密邏輯304c以解密該再加密資訊(S1813, S 18 16,S1817)。沉300c現在能處理資訊資料以將它以可使 用的形式向使用者顯示,如顯示等在輸出裝置5 〇〇上。 在步驟S1814 ’沉300c最好向CAM 400c提供一計數器値 (沉計數器)’其由沉300c及CAM 400c使用以導出由沉3〇〇c 及CAM 400c共用的恢復審理關鍵詞。沉3〇〇c最好在每次重 新執行協定時使用新的計數器値。 根據此實施例,每次當存取資訊程式等時(不僅是第一次) 可登綠資訊存取(或是向其收費)。而且在此實施例中,來 -42- 本紙張Λ度適用中國國家標準(CNS ) A4^格(210X297公釐) Ί---_---^-- - * - (請先閲讀背面之汰意事境再填寫本頁) 订 旅 A7 B7 五、發明説明(40 ) 源200c使用一關鍵詞以超加密受保護的資訊’以(至少)穩 藏式證明CAM 400c作爲防止盜取CAM再使用資訊的預防性 措施。此外,來源200c可以將恢復引入審理關鍵詞用於超 加密,因而改變用於超加密的審理關鍵詞’即用於與 CAM 400c通訊。而昱,最好由合法沉300c將恢復併入審理 關鍵詞,開始現一攔省資訊流至沉300c的重新播放不會被 沉裝置有效地解密。此外,一捆截資訊流至合法CAM 400c 的重新播放會導致存取的額外登錄,因此可偵測到盜取或 是向盜取者收取額外存取的費甩。 在此實施例中,CAM 400c可以用任一,種細度來登錄(付 費),而視訊解碼器100e (來源及/或沉)不必知道登錄(付費) 策略。而且,此實施例可用於雙方,三方’及,或PC架構 中。Metered-Title PCR Another PCR protocol is a metered-Title PCR, in which customers charge incrementally when they access information. Examples of this embodiment and examples of the agreements used by them are shown in Figs. Fig. 13 illustrates a preferred apparatus for performing the operations shown in Figs. It can be registered and charged according to the playing time or the total length of information access (ie bytes). _ Printed by the Consumers' Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs (please read the notes on the back before filling this page) In this embodiment shown in Figure I3, the source 200a preferably includes: information receiving / generating device 204a 'recovery generator 206a, source control logic 208a, certification logic 210a, and access window logic 212a, timing number 214a, and information meter 216a. The recovery generator 206a generates an arbitrary frame. The recovery generator 206a is a counter to generate a counting frame, or a random number generator to generate a random number. In addition, CAM 400a preferably includes: decryption logic 408a, timer 410a, CAM control logic 412a, certification logic 414a, access window logic 416a, and information meter 418a. The access window logics 212a and 416a in the sources 200a and CAM 400a respectively set time limits that allow the user to access a particular program. In addition, the information meter 216a and the information meter 218a preferably measure the amount of data by detecting the number of data packets containing information during the access process. Those skilled in the art should understand that information is transmitted in different data packets with numbers, and each packet can contain a preset amount of data. The timer 410a and the information meter 418a track the amount of information used and / or the amount of remaining windows. And those who are familiar with this technology should understand that the typical agreement points in Figures 14 and 15 are -37- This paper size is applicable to China's national operating rate (CNS) A4 specification (2 丨 0X297 mm) 4 3 28 5 2 Central standard of the Ministry of Economic Affairs Printed by the Bureau Shellfish Consumer Cooperative A7 B7 V. Description of the Invention (35) It is executed by the source control logic 208a and the CAM control logic 412a. In the embodiment of the agreement shown in FIG. 14, the source 200a provides a message to the CAM 400a, which includes: a recovery card generated by the recovery generator 206a, a program title to be accessed, and a playback window request (S 1401, S1408). A new playback window can extend a previously purchased but not fully used playback window. The CAM 400a uses the certification logic 414a to prove the message, and sends the certified message along with the processing window back to the source 200a (S1409, S1410, S1402). The source 200a also uses the proof logic 210a to prove the message (S1403), and uses the source control logic 208a to determine whether it matches the source certificate (S1404) to verify that the CAM certificate = the verification certificate of the CAM 400a indicates that the CAM 400a is in step. S1412 charges, or has accessed the new request window for green access. When verifying the message, the source 200a accesses the window (S1405) by a preset amount "play window J. Then, the source 200a sends information (its desired program to be accessed) from the information receiving / generating device 204a. To CAM 400a (S1406, S1413). CAM 400a uses decryption logic 408a to decrypt the information (S1414), and provides the decrypted information to the sink device and displays it to the user in a usable way (S1415, S1417). Each source 200a and CAM 400a uses its access window logic 212a and 416a and its information meters 216a and 418a to determine whether the access window has been terminated (S1407, S1416). Preferably, the access window logic 212a and the access window logic 416a The length of each set access window can be expressed by a period of time or a preset number of data packets. When expressed by a period of time, the timer 410a monitors the remaining access windows. If a preset number of data packets is used At the time of display, the number of data packets detected by the information meter 216a and the information meter 418a is -38-This paper size applies to the Chinese National Standard (CNS) M specification (210X297 mm) '' ----:-^ --- ^ ------ 1Τ ------ 0 (please read 'read the back ^ -note ^ -item before filling out this page) 432852. Central Standard of the Ministry of Economic Affairs Printed by Bureau Coconut Consumer Cooperative A7 B7 5. The invention description (36) carries the desired program information being accessed. Once the preset number of data packets has been detected, the source 200a and CAM 400a will stop processing. Therefore, use is allowed The user accesses the information until the CAM 400a or the source 200a determines that the access window has terminated. And at the end of the information playback, the 'source 200a or CAM 400a has an unused partial window', that is, unused credit, so as shown in Figure 5 It indicates that it requests the credit source 200a to provide a message to the CAM 400a, which includes: a credit request, and the message certificate includes incrementing the counter by one, and requesting credit (ie, requesting credit, proof (counter plus _ —, requesting credit)) sl5〇1, S1502). The CAM 400a uses the proof logic 414a to prove the request for credit and counter increment (S1503). Then the CAM 400a matches whether the proof performed by the proof logic 414a matches the proof performed by the proof logic 2 10a. Verify the certificate (S1504). If the certificate If it matches, it will verify that cam 400a logs in to the credit request (S1505). If it does not match, the agreement will stop. In addition, CAM 400a determines in this request whether to resume (connect to the latest counter) to request a playback window. A random frame is used instead of a counter frame (which requires a non-volatile memory 202), and the frame may be followed by the latest random frame incremented by one. CAM 400a stops processing information at this point, and source 200a stops generating information. The allowable credit is preferably requested by the lesser of CAM 400a and the source 200a based on its own information. If the CAM 400a only uses the tracked information to determine the user's expired credit, a legitimate source 200a can be used to broadcast the unlimited information that the CAM 400a stole. Similarly, if the CAM 400 only uses the information given by the source 200 to determine the user's expired credit, then the stolen source 200 can be used to play the ____- 39- _ This paper standard applies Chinese National Standard (CNS) A4. Specifications (2 丨 0X297mm) ~ (Please read the back page before filling out this page) Binding-Order Printed by the Male Standards Consumer Cooperative of the Central Standards Bureau of the Ministry of Economics 432852, A7 _______B7 V. Description of Invention (37) Law CAM 400 Unlimited information. Note that the ability of the source 200 to prove a credit request does not necessarily confirm that the source 200 is requesting the credit, and only the same device certified by cam 400 will make the request. Or 'if there is no incremental payment, this agreement may use the amount deducted from the single charge to cover a large window' to repay the previous debit window. For example, users will request 48 hours of actual information access. In this case, source 200a uses CAM 400a as a gauge of the total remaining length in the window, while source 200a reports its incremental total usage. The prepaid window is preferably divided into a number of checkpoints to correspond to other playback window requests1 and the source 200a is preferably to report the next checkpoint in advance. The source 200a reports to cam 400a each time it arrives at the checkpoint and sets up information access again each time. If the debit window is only a period of time during which the information is being accessed ', a titled PC R (as described above) is sufficient and simple, as no intermediate reporting is necessary. In this embodiment, 'whether the credit method or the debit method is used, the CAM 400a and the source 200a will track information access, and stop playing when the window is used up. If the CAM 400a does not track the amount of information accessed, a stolen source device can be used to play back information that is almost free of legitimate Cams. Similarly, if the source 200a does not track the amount of information used, the legitimate CAM will give an authorized window to the source 200a after the stolen CAM can decrypt unlimited information from the source 200a. Metered-title pCR with NVM (non-volatile memory) on the source device The embodiment shown in Figure 16 uses a protocol substantially the same as above, except that credit can be requested after power loss. According to the working cycle of the NVM 220b and 420b in the information meter 21 and the information meter 418b (including the battery __- 40- this paper size is applicable to China National Car (CNS) _A4) (210X297 public ^ ― ) _ --------- 1 --- XIANG ------ ^ ------ ^ * · (Please read the back. Note before filling out this page) ^ 32852. At B7 Economy The Ministry of Standards and Technology Administration of the People's Republic of China, Printed Bags of the Shellfish Consumer Cooperative, V. Description of the Invention (38) Powered RAM (BBRAM)), and decide how to update the information meters 218b and 418b from time to time, users should be charged almost all fees that should be charged The NVM 220b in the β information meter 2 16b is in the source 200b and the NVM in the information meter 418b of the CAM 400b, preferably with storage capacity, which is larger than the program to be accessed, executable files, etc. The actual amount of information. Super-encryption and re-encryption In the embodiment of Fig. 17 and the corresponding protocol shown in Fig. 18, effective reuse of the information stream can be prevented from being sent to and from CAM 400ce. For example, an attacker attempts to intercept the information flow between the source 200c and the CAM 400c, or between the CAM 400c and the Shen 300c. Although the data flow between source 200c and CAM 400c can be decrypted with general stealing CAM, this agreement is resistant to these attacks and allows the fine-tuning of payment details at will. In FIG. 17, the source 200c preferably includes a receiving / generating device 204c, a super-encryption logic 222c, and a source logic 208c. The super-encryption device 222c uses, for example, DES (Data Encryption Standard) FIPS Pub. 46-2 (1998) to encrypt information data (which is encrypted), thereby generating super-encrypted information. Moreover, the CAM 400c preferably includes super decryption logic 422c, conditional access decryption logic 408c, which is the same as the decryption logic 422c 'interface encryption logic 426c, and the CAM control logic 412c. Shen 300c contains interface decryption logic 304c to decrypt the re-encrypted information data from CAM 400c using a negotiated trial key. Shen 300c also contains Shen control logic 306c. The backend 700 interacts with the CAM 400c. A typical output device 500 is connected to the interface decryption logic 304c, although those skilled in the art will understand that the output device 500 can be integrated with Shen 300c. ----: --J --- ^ ------ 1T ------ Λ-. * (Read the "Notes on the back" before filling out this page) _ -41-This paper The dimensions are applicable to the Chinese National Standard (CNS) A4 specification (210X297). 02852. At _____ B7 Printed by the Bayer Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention (39) In the typical agreement of this embodiment shown in FIG. 18 , Source 200c々CAM400c provides the title of the program to be accessed (S1801, S1804). The CAM 400c preferably uses the title to find out the keywords (S1805) 'required in the information access process (such as decryption) and makes a registration input (or charge) (s1806). Source 200c uses super-encryption logic 222c to super-encrypt the protected information (S1802), preferably under the current trial key (which is shared with CAM 400c). This (string) trial keyword is established using a keyword derivation function with a contract as described above. Shen 300c transmits a Shen counter 値 to CAM 400c (S1814, S1807), which is used by Shen 300c and CAM 400c to derive a new negotiation keyword (S1815, S1808). The CAM 400c then receives the super-encrypted information data from the source 200c (S1803, S1809). The CAM 400c uses super encryption logic 422c to super decrypt the super encrypted information (S1810). CAM 4〇Oc then uses conditional access decryption logic 424c to decrypt the information itself (S1S11), and (: 8) ^ 4〇c uses interface encryption logic 420c to defer to 3〇c (s 1812) ) Re-encrypted information. Shen 300c receives the re-encrypted information from CAM 400c, and uses the negotiation keywords and interface decryption logic 304c to decrypt the re-encrypted information (S1813, S 18 16, S1817). Shen 300c can now process information data It is displayed to the user in a usable form, such as display on the output device 500. In step S1814, it is better to provide a counter 値 (sink counter) to the CAM 400c at the step S1814, which is provided by the Shen 300c and the CAM. 400c is used to derive the resumption keywords shared by Shen 300c and CAM 400c. Shen 300c preferably uses a new counter every time the agreement is re-executed. According to this embodiment, each time access Information programs can be accessed (not only for the first time), and the information can be accessed (or charged). And in this embodiment, Lai-42- this paper Λ degree applies Chinese National Standard (CNS) A4 ^ grid (210X297 mm) Ί ---_--- ^--* -(Please read the context on the back of the article before filling out this page) Booking Travel A7 B7 V. Invention Description (40) Source 200c uses a keyword to super-encrypt the protected information 'with (at least) a stable proof of CAM 400c is used as a preventive measure to prevent the theft of CAM reuse information. In addition, source 200c can introduce recovery keywords into super encryption for super encryption, thus changing the keywords used for super encryption to communicate with CAM 400c. Yu, it is better that the legal Shen 300c will reinstate the keywords into the trial, and the replay of the current information flow to Shen 300c will not be effectively decrypted by the Shen device. In addition, a bundle of intercepted information flows to the legal CAM 400c. Replaying will result in additional registration of access, so it is possible to detect theft or charge an additional access fee to the thief. In this embodiment, CAM 400c can log in with any one of the fineness ( Pay), and the video decoder 100e (source and / or Shen) does not need to know the login (pay) policy. Moreover, this embodiment can be used in two-party, three-party 'and, or PC architecture.

合併超加密/再加密及標題式PCR 圖19的實施例合併標題式PCR與超加密/再加密的屬性。 該了解執行本發明協定的(圖19)架構大致包含圖1〇及17的 合併。爲了圖19的目的,來源200d及CAM 4〇〇d包含圖10來 源200及CAM 400所示的所有元件。 經濟部中央標準局貝工消贫合作杜印製 (請先閲讀背面之注^>項再填寫本頁) 在圖20中,來源200d向CAM 400d提供一訊息,其最妤包 含計數器値及資訊標題如要存取的程式(S2001,S2006)。來 源200d及CAM 400d分別使用CAM 400d的證明邏輯414d以各 自獨立的證明訊息(S2007)。來源200d從CAM 400d接收證明 的訊息(S2008,S2002),而來源2 0 0 d的證明邏輯2 1 0 d則驗 證證明的訊息(S2003)。若證明的訊息匹配(S2004),則來源 -43 本紙蒗尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) 經济部中央標準扃眉工消費合作社印製 432852 · at __B7__五、發明説明(41 ) 200d傳送超加密資訊至CAM 400d,在此將它超解密 (S2005,S2012,S2013)。接著CAM 400d使用超解密邏輯 422d (在較佳實施例中,該超解密邏輯422d與條件存取解 密邏輯408d相同))以解密資訊(S2014)。在步驟S2017,沉 300d最好向CAM 400d提供一計數器値(沉計數器),其由沉 3O0d及CAM 400d使用以導出由沉300d及CAM 400d共用的恢 復審理關鍵詞(S2010,S20〖l,S2018)。沉300d最好在不同 資訊中使用新的計數器値。CAM 400d使用介面加密邏輯 426d在含有沉300d的商議審理關鍵詞之碼於將資訊再加密 (S2015) «沉300d從CAM 4〇Od接收再加密資訊’並使用商議 審理關鍵詞及介面解密邏輯3〇4d以解密該再加密資訊 (S2020)。沉300d現在能經由如輸出裝置500而以使用者可使 用的形式處理資訊資料。 此實施例利用以下事實’即證明係潛在地比加密強’原 因是高速資料加密及解密實施的考量。 證明媒體源 在上述實施例中,PCR協定不能防止資訊流從來源再播 放至CAM,因爲其不能將資訊位元與再播放區分。在與一 些商業模型中這是足夠的’因爲這種再播放會導致登綠° 惟若模型要求CAM看到證明資訊流正在由來源裝置20〇於目 前播放時間中產生’則圖22的協定可使用圖21中使用的架 構。 在圖2 1的實施例中’來源200e最好包含一資訊接收/產生 裝置,一恢復產生器206e,來源控制邏輯208e ’證明邏輯 _- 44 -____ 本紙乐尺度適用中國國家梂準(CNS ) A4規格(210X297公釐) (請先閱讀背面之注意事項再填窝本頁) 經濟部中央標準局員工消费合作社印裝 4328 52 . A7 _____B7__ 五、發明説明(42 ) 210e,及媒體證明邏輯224e。CAM 400e最好包含恢復產生 器432e,CAM控制邏輯412e,證明邏輯414e及媒體證明邏 輯435e。恢復產生器432e是計數器或是随機數產生器◊圖 21所示實施例的操作如圖22的流程圖所述。該了解圖22所 示協定最好分別由來源控制邏輯208e及CAM控制邏輯412e 執行。 來源200e最好向CAM 400e提供一訊息,其包含來自恢復 產生器206e的計數器値(來源計數器)(S2201,S2208)。恢復 產生器在此實施例中最好是一計數器。CAM 400使用證明 邏輯412以證明訊息(S2209)。CAM 400也從恢復產生器428e 產生另一計數器値(CAM_counter,即CAM計數器),並 傳送證明的訊息及値CAM_counter到來源200e (S2210, S2202)。來源200e使用證明邏輯210e以證明訊息(S 2 2 0 3 )。 CAM 4〇Od證明該證明的訊息並等待來源200d回應(S2211)。 在此實施例中恢復產生器206e最好是計數器。驗證該證明 訊息時(S2204) ’來源200e向CAM 400e傳送另一訊息,包含 證明値CAM_counter及要存取的資訊標題如程式,可執行檔 等(S2205,S2206),並將 CAM counter (S2207)値遞增。 CAM 400e以CAM步驟S2211中證明的訊息來驗證步驟S2205 中產生的訊息(S2U2,S2213),並且於成功驗證時由 CAM 400e將CAM_counter (S2214)值遞增並且返回步驟 S2211。若步驟S2113中的證明爲否,則CAM 400e拒絕進一 步處理資訊。 在圖23的第二協定中,CAM 400e中的恢復產生器432e最 ___ - 45 - 本紙依適用中家標隼(CNS ) Α4ϋ ( 21GX297公釐) ^ ' --------^---^------1T------^ * (請先閲讀背面之注項再填寫本頁) 經濟部中央榇準局貝工消費合作社印裝 4328 52 . A7 __B7_ 五、發明説明(43 ) 好是隨機數產生器。CAM 400e向來源200e提供恢復產生器 432e的隨機數(S2305,S2301)。來源200e及CAM 400e都證明 隨機數及要存取的程式,可執行檔的標題,即證明(隨機, 標題)(S2302,S2306)。來源200e將證明從證明邏輯210e (52303) 傳送到CAM 400e (S2307)並且將隨機數値遞增 (52304) 。驗證時,CAM 400e將随機數遞增(S2308, S2309),而協定則繼續。若CAM 400e不能驗證隨機數的證 明,則拒絕再處理資訊。在步驟S2303傳送證明的隨機數及 標題至CAM 400e之後,來源200e即將隨機數値遞增。 因爲圖22,23所示的協定不直接證明資訊流,而是證明 來源200e正在存取資訊,因此它不能與特定標題作區分(即 來源200e相信它正在存取眞的資訊)。因此在資訊播放期間 必須重覆此協定。重覆的頻率是依威脅而定。例如若目標 是要求從原來媒體播放,則協定重覆的次數必須足以導致 不必花時間將媒體在來源裝置與挑戰之間移動。若 CAM 400e沒收到期望的證明訊息,則它必須繼續處理資訊 解密。 此協定的功效是依產生一盜取媒體及盜取來源裝置的困 難度而定。若合法來源裝置包含專屬的技術以致盜取者不 能迅速地大量製造,則盜取來源裝置很難。或者,各合法 來源裝置具有可驗證的秘密,因此每一者都能用以向CAM 證明其本身。這些秘密的個別化可以和配對的使用合併作 爲一種強制反盜取機構。 超加密/再加密,標題式PCR,及媒體證明之合併 _-46- 本紙張尺度適用中國國家標隼(CNS ) A4規格(210X297公釐) ----_---^---^------II------0 (請先閲^-背面<.注意事項再填寫本頁) 經濟部中央標準局員工消費合作社印震 3 28 5 2 ,1 A7 __B7 _ 五、發明説明(44 ) 圖24的實施例將超加密/再加密與標題式PCR及媒體證明 合併。該了解執行本實施例協定的架構(如圖25)大致包含 圖10, 17,及21所示架構的合併。爲了圖24的目的,來源 200f及CAM 400f包含圖10的來源200及CAM 400中所示所有 的基本元件,以及圖17來源200c與CAM 400c的所有基本元 件。 在圖25的流程圖中,來源200f向CAM 400f提供一訊息, 包含來源計數器値及要存取程式的標題(步驟S2501, S2508)。CAM 400f使用證明邏輯414f以證明該訊息,並提 供證明的訊息到來源200f (S25 10)。CAM jOOf也從恢復產生 器(也稱爲CAM計數器)432產生另一計數器値 (CAM_counter),並傳送證明的訊息及値CAM_counter至來 源200f (S2510,S2502),而在此實施例中恢復產生器206f最 好是計數器。CAM 400f使用標題以解開資訊存取及處理, 如以解密及作登錄輸入(S2511)。來源200f使用證明邏輯 210f以驗證訊息的眞實性(S2504)。若驗證爲否,則來源 200f停止產生資訊而協定即結束。沉300f向CAM 400f傳送 一沉計數器値(S2523,S2512),其由沉300f與CAM 400f使用 以導出一商議的審理關鍵詞(S2513,S2524)。驗證證明的訊 息時(S2504),來源200f向CAM 4〇Of傳送另一訊息,包含 CAM_counter的證明値及審理關键詞證據(S25〇5 ’ S25丨5) 〇 CAM 400f藉由判定其是否匹配先前由CAM 400f在步驟 S25 14中執行的證明,以驗證訊息的證明。若驗證爲否,則 CAM 400f停止處理資訊而協定即結束。若證明的訊息驗證 __-47-___ 本紙張尺度適用中國國家標準(CNS ) A4规格(210x297公釐) I n I I I- I - I 1 I. : n n I n n - · - {請先閲讀背面之注意事吩再填寫本頁) 4 經濟部中央樣準局貝工消費合作社印装 328 52 · at _____B7_五、發明説明(45 ) 爲是,則CAM 400f將恢復產生器432f如CAM_counter (S2517) 遞增。接著CAM 400f接收來自來源200f的超加密資訊資料 (S2507,S2318) CAM 400f使用超解密邏輯422f以超解密該超 加密資訊(S2S19)。CAM 400f使用CA解密邏輯408f而將資訊 本身解密(S2520),並接著介面解密邏輯426f在商議審理關 鍵詞下,以沉300f (S2521)再加密資訊。沉300f從CAM 400f 接收再加密資訊(S2523,S2525),並且使用商議審理關鍵詞 及介面解密邏輯306f以解密該再加密資訊(S2526)。沉300f 現在能以使用者可使用的形式I理資訊資料。 雖然此實施例的協定已使用一恢復產生器432 (其在 CAM 400f中是計數器的形式)來說明以便證明,但它也能使 用CAM 400f中的隨機數產生器以取代CAM_counter,其方式 類似於上述圖21及23所示者。 若在此實施例中省去標題攔,則協定最好僅合併超加密/ 再加密與媒體證明,此外,在此實施例中由來源200f向 CAM 400f提供的審理關鍵詞證據最好足以供CAM 400f再度 確認來源200f知道正確的審理關鍵詞β例如審理關鍵詞證 據可以是審理關鍵詞本身的元件,一關鍵詞功能’或其他 屬於該關鍵詞的證據°證明訊息最好不要使審理關鍵詞的 功能降低。 在STB上含NVM (非揮發記憶體)以及在CAM上含BBRAM (電池爲動力的RAM)之資料式PCR 現在參考圖2*7的流程圖以説明圖26的操作。此實施例使 用視訊解碼器100 (STB)上的非揮發記憶體1丨6 (NVM)及CAM -48 - 本紙張尺度適用中國國家標準(CNS ) A4規格(2丨〇><297公產) ----:---:---^------.訂------^ • I' (請先閲讀背面之ΐϊ意事嘹再填寫本頁) 4 切 52 ·5 經濟部中央標準局貝工消費合作社印製 Α7 Β7五、發明説明(46 ) 400g上的電池爲動力的RAM (BBRAM) 406g。此外,雖然所 述的視訊解碼器STB 100包含合併的來源及沉裳置,該了解 STB 100也能只包含來源或沉,而其他者則在STB 100的外 部。 在圖26的此實施例中,STB 100 (其可以是來源2〇〇與沉 300的合併)最好包含··資訊接收/產生裝置102,NVM 116中 的索引計數器104,密碼邏輯裝置106,STB邏輯裝置1〇8, 關鍵詞邏輯110,及NVM 116中的種子產生邏輯H2。此 外,CAM 400g最好包含密碼邏輯440g,NVM 406g中的索引 計數器442,關鍵詞邏輯446,及NVM 406g中的種子產生邏 輯448。該了解圖27所示的協定最好分別由STB控制邏輯1〇8 及CAM控制邏輯444執行。 在圖27所示的流程圖中,儲存圖圖向CAM 400提供一商 議訊息以建立新的共用秘密値(種子),用以向視訊解碼器 100證明CAM 400g (S2701,S2707)。此訊息僅發生於 CAM 400g及STB 100不是密碼同步時。資訊提供者提供的資 訊最好以離散的索引資訊封包方式提供,而STB 100及 CAM 400都會使用索引計數器104 (最好包含在NVM 116之 中)及索引計數器442 (最好包含在NVM 406g之中)以分別在 STB 100及CAM 400g之中計算提供的資訊封包數。 CAM 400g收到訊息後,STB 100及CAM 400必須根據其各自 的計數而同步,亦即,其從相同的封包開始計數。 在步驟S2708,CAM 400g向STB 100提供一訊息,包含挑 戰的證明與加密,及一狀態證明(S2708,S2702)。該狀態向 _______-49- _ 本紙張尺度適用中國國家標隼(CNS ) A4規格(210X297公釐) --------^---¾------1T------d. . > (請先閲讀背面之注意事項再填寫本頁) 經濟部中央標準局員工消費合作社印聚 4 3 2852 ·, at B7五、發明説明(47 ) STB 100指示其(STB 100)是否仍與CAM 400g (S2703)作密碼 式同步,即密碼同步° 換言之,判定CAM 400g及STB 100是否仍使用相同的審理 關鍵詞,亦即該狀態指示是否分別使用先前定義的證明及 加密副程式而完成證明及加密。挑戮證明及挑戟加密最好 是分開操作。由該挑戰,STB 100能推論其必須產生回應的 封包索引(即挑戰封包)。STB 100也由該挑戰推論出封包索 引,然後必須送出產生的回應(即回應視窗的開始,其接在 挑戟視窗之後)。若STB 100判定它不是密碼同步,則協定 返回步驟S2701。若STB 100及CAM 400g是密碼同步,則接 著在步騍S2504由STB 100判定它是否在含CAM 400g的封包 同步中。若STB 100判定它不是同步(S27〇4) ’則STB 100向 CAM 400g傳送封包再同步的證明請求(S2706,S2709)。若 STB 100及CAM 400g在封包同步(S2704),則流程跳到步驟 S2705,而STB 100則向CAM 400g提供一證明的回應 (S2705,S2710)。由挑戰的封包計算出證明的回應,而它是 依STB 1〇〇傳送的訊息,以及對應該封包的一般本文而定。 CAM 400g接著驗證證明的回應(S271丨)。若是在回應視窗期 間收到回應並且驗證,則CAM 400g將NACK計數器減一。 控制接著返回步驟S2708。 步驟S2705中的證明回應最好於計算後不立即傳送。反 之,直到回應視窗開始時才傳送,但最好在該視窗結束前 必須傳送。或者在步驟S2705由STB 100傳送一加密回應(不 是證明回應),在此情況下CAM 400g使用確認副程式。在 ___-50-__ 本紙張尺度適用中國國家標芈(CNS ) A4規格(210X297公釐) I —II ^ n II . i 1111 訂— — 111 戚 (請先閱婧背面之注意事项再填寫本頁) A7 B7 432852 五、發明説明(48 ) ^ 是回應加密。 此情況下可以將HashB (回應)而不% ^ „ 杳挑戰傳送時即開始挑戰 上述視窗對應數個不同索引β δ * a a >缺束。較佳的,挑戮射包 視窗,而且在回應視窗開始心前Ί ^ ^ ★滿窗中是隨機的。挑戰視 索引在挑戰視窗之中,且最好在祝® i I η ▲ , 於每次執行圖27的協定 窗最好是隨機長度,其由CAM 4〇〇gt $ Μ et β Η m〜ΑΑ较雄長度’雖然應該大到 時定義。回應視苜最好是固定的輯 足以允許STB 100的回應可靠的傳送列CAM 4〇〇g ° CAM 400在回應視窗後傳送其新的挑戰’若回應驗證爲Combining Super-Encryption / Re-Encryption and Header-Type PCR The embodiment of FIG. 19 merges the attributes of header-type PCR and super-encryption / re-encryption. This understanding (Fig. 19) of the architecture implementing the agreement of the present invention roughly includes the merge of Figs. 10 and 17. For the purpose of FIG. 19, source 200d and CAM 400d include all the elements shown in source 200 and CAM 400 of FIG. Du printed by the Central Bureau of Standards, Ministry of Economic Affairs, Poverty Alleviation Cooperation (please read the note on the back ^ > and then fill out this page) In Figure 20, the source 200d provides a message to the CAM 400d, which includes the counter and Information title is the program to be accessed (S2001, S2006). The source 200d and the CAM 400d respectively use the certification logic 414d of the CAM 400d to provide independent certification information (S2007). The source 200d receives the proof message from the CAM 400d (S2008, S2002), while the proof logic 2Od of the source 200d verifies the proof message (S2003). If the certified information matches (S2004), then the source -43 This paper scale is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) Printed by the Central Standard of the Ministry of Economic Affairs of the Cooperative Consumer Cooperative 432852 · at __B7__ 五 、 Description of the invention (41) 200d sends super-encrypted information to CAM 400d, where it is super-decrypted (S2005, S2012, S2013). The CAM 400d then uses the super decryption logic 422d (in a preferred embodiment, the super decryption logic 422d is the same as the conditional access decryption logic 408d) to decrypt the information (S2014). In step S2017, Shen 300d preferably provides a counter 値 (Sink counter) to CAM 400d, which is used by Shen 300d and CAM 400d to derive the recovery trial keywords shared by Shen 300d and CAM 400d (S2010, S20, 1, S2018 ). Shen 300d had better use the new counter in different information. CAM 400d uses the interface encryption logic 426d to re-encrypt the information in the code containing the negotiation key of Shen 300d (S2015) `` Shen 300d receives the re-encrypted information from CAM 400D and uses the consultation key and the interface decryption logic 3 〇4d to decrypt the re-encrypted information (S2020). Shen 300d is now able to process information data via, for example, output device 500 in a user-usable form. This embodiment makes use of the fact that the reason that it is proved to be potentially stronger than encryption is the consideration of high-speed data encryption and decryption implementation. Proving Media Source In the above embodiment, the PCR protocol cannot prevent the information stream from being replayed from the source to the CAM, because it cannot distinguish the information bit from the replay. In some commercial models, this is sufficient 'because this replay will lead to greening. However, if the model requires the CAM to see that the information stream is being generated by the source device 20 at the current playback time', then the agreement in Figure 22 may The architecture used in Figure 21 is used. In the embodiment of FIG. 21, 'the source 200e preferably includes an information receiving / generating device, a recovery generator 206e, and the source control logic 208e.' Proof logic _- 44 -____ This paper scale is applicable to China National Standards (CNS) A4 specifications (210X297 mm) (Please read the notes on the back before filling in this page) Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 4328 52. A7 _____B7__ V. Description of the invention (42) 210e, and media certification logic 224e . CAM 400e preferably includes a recovery generator 432e, CAM control logic 412e, certification logic 414e, and media certification logic 435e. The recovery generator 432e is a counter or a random number generator. The operation of the embodiment shown in FIG. 21 is as described in the flowchart of FIG. 22. The understanding shown in FIG. 22 is preferably performed by the source control logic 208e and the CAM control logic 412e, respectively. The source 200e preferably provides a message to the CAM 400e, which contains a counter 値 (source counter) from the recovery generator 206e (S2201, S2208). The recovery generator is preferably a counter in this embodiment. The CAM 400 uses the certification logic 412 to prove the message (S2209). CAM 400 also generates another counter 値 (CAM_counter, CAM counter) from the recovery generator 428e, and sends a certified message and 値 CAM_counter to the source 200e (S2210, S2202). The source 200e uses the proof logic 210e to prove the message (S 2 2 0 3). CAM 400d proves the message of the certificate and waits for the source 200d to respond (S2211). The recovery generator 206e is preferably a counter in this embodiment. When verifying the certification message (S2204) 'Source 200e sends another message to CAM 400e, including certification 値 CAM_counter and the title of the information to be accessed, such as programs, executable files, etc. (S2205, S2206), and the CAM counter (S2207)値 Increment. The CAM 400e verifies the message (S2U2, S2213) generated in step S2205 with the message proved in the CAM step S2211, and upon successful verification, the CAM 400e increments the CAM_counter (S2214) value and returns to step S2211. If the proof in step S2113 is NO, the CAM 400e refuses to further process the information. In the second agreement of FIG. 23, the recovery generator 432e in the CAM 400e is the most ___-45-This paper is in accordance with the applicable Chinese standard 隼 (CNS) Α4ϋ (21GX297 mm) ^ '-------- ^ --- ^ ------ 1T ------ ^ * (Please read the notes on the back before filling out this page) Printed by the Shellfish Consumer Cooperative, Central Procurement Bureau, Ministry of Economic Affairs 4328 52. A7 __B7_ 5 The invention description (43) is a random number generator. The CAM 400e supplies the random number of the recovery generator 432e to the source 200e (S2305, S2301). Both the source 200e and the CAM 400e prove the random number and the program to be accessed, and the title of the executable file, that is, the proof (random, title) (S2302, S2306). Source 200e passes the proof from proof logic 210e (52303) to CAM 400e (S2307) and increments the random number 値 (52304). During verification, the CAM 400e increments the random number (S2308, S2309), and the agreement continues. If the CAM 400e cannot verify the proof of the random number, it refuses to process the information. After transmitting the random number and title of the certificate to the CAM 400e in step S2303, the source 200e is about to increment the random number 値. Because the protocol shown in Figures 22 and 23 does not directly prove the information flow, but proves that the source 200e is accessing the information, it cannot be distinguished from a specific title (that is, the source 200e believes that it is accessing the information). Therefore, this agreement must be repeated during the information broadcast. The frequency of repetitions depends on the threat. For example, if the goal is to request playback from the original media, the agreement must be repeated a sufficient number of times to eliminate the need to take time to move media between the source device and the challenge. If the CAM 400e does not receive the desired proof message, it must continue to process the information decryption. The effectiveness of this agreement depends on the difficulty of generating a media theft and source device theft. It is difficult to steal source devices if the legitimate source device contains proprietary technology that prevents a thief from quickly mass-producing them. Alternatively, each legitimate source device has a verifiable secret, so each can use it to prove itself to CAM. Individualization of these secrets can be combined with paired use as a mandatory anti-theft agency. Combination of super encryption / re-encryption, title-based PCR, and media certification_-46- This paper size applies to China National Standard (CNS) A4 specification (210X297 mm) ----_--- ^ --- ^ ------ II ------ 0 (please read ^ -back < note before filling out this page) Employee Consumer Cooperatives, Central Standards Bureau, Ministry of Economic Affairs, India Zhen 3 28 5 2, 1 A7 __B7 _ V. Description of the Invention (44) The embodiment of FIG. 24 combines super-encryption / re-encryption with header PCR and media certification. The understanding of the architecture for implementing the agreement of this embodiment (as shown in FIG. 25) roughly includes a combination of the architectures shown in FIGS. 10, 17, and 21. For the purpose of FIG. 24, the sources 200f and CAM 400f include all the basic elements shown in the sources 200 and CAM 400 of FIG. 10, and all the basic elements of the sources 200c and CAM 400c of FIG. In the flowchart of FIG. 25, the source 200f provides a message to the CAM 400f including the source counter and the title of the program to be accessed (steps S2501, S2508). CAM 400f uses certification logic 414f to prove the message and provides the certified message to source 200f (S25 10). CAM jOOf also generates another counter 値 (CAM_counter) from the recovery generator (also known as CAM counter) 432, and transmits a certified message and 値 CAM_counter to the source 200f (S2510, S2502), and in this embodiment the recovery generator 206f is preferably a counter. CAM 400f uses the title to unlock information access and processing, such as decryption and registration input (S2511). Source 200f uses proof logic 210f to verify the authenticity of the message (S2504). If the verification is negative, the source 200f stops generating information and the agreement ends. Shen 300f sends a sink counter 値 (S2523, S2512) to CAM 400f, which is used by Shen 300f and CAM 400f to derive a negotiated trial keyword (S2513, S2524). When verifying the proof message (S2504), the source 200f sends another message to CAM 4〇Of, including the certificate of CAM_counter and the trial keyword evidence (S25〇5 'S25 丨 5). CAM 400f determines whether it matches The certification previously performed by the CAM 400f in step S25 14 to verify the certification of the message. If the verification is no, the CAM 400f stops processing the information and the agreement ends. If the verified information is verified __- 47 -___ This paper size applies Chinese National Standard (CNS) A4 (210x297 mm) I n II I- I-I 1 I.: nn I nn-·-{Please read first Note on the back, please fill in this page again) 4 Printed by the Central Bureau of Standards, Ministry of Economic Affairs, Shellfish Consumer Cooperative, 328 52 · at _____B7_V. Description of the invention (45) If yes, CAM 400f will restore the generator 432f such as CAM_counter ( S2517) Increment. Then CAM 400f receives super encrypted information data from source 200f (S2507, S2318). CAM 400f uses super decryption logic 422f to super decrypt the super encrypted information (S2S19). The CAM 400f uses the CA decryption logic 408f to decrypt the information itself (S2520), and then the interface decryption logic 426f re-encrypts the information with the Shen 300f (S2521) under the negotiation key. Shen 300f receives the re-encrypted information from CAM 400f (S2523, S2525), and uses negotiation keywords and interface decryption logic 306f to decrypt the re-encrypted information (S2526). Shen 300f can now organize information in a form that users can use. Although the protocol of this embodiment has been illustrated using a recovery generator 432 (which is in the form of a counter in CAM 400f) for proof, it can also use a random number generator in CAM 400f instead of CAM_counter in a manner similar to 21 and 23 described above. If the title block is omitted in this embodiment, the agreement is best to combine only super encryption / re-encryption and media certification. In addition, in this embodiment, the trial keyword evidence provided by the source 200f to the CAM 400f is preferably sufficient for the CAM. 400f reconfirmed that the source 200f knew the correct trial keyword β. For example, the trial keyword evidence can be a component of the trial keyword itself, a keyword function 'or other evidence belonging to the keyword. Reduced functionality. Data PCR with NVM (non-volatile memory) on STB and BBRAM (battery-powered RAM) on CAM Now refer to the flowchart of FIG. 2 * 7 to explain the operation of FIG. 26. This embodiment uses the non-volatile memory 1 丨 6 (NVM) and CAM-48 on the video decoder 100 (STB). This paper size is applicable to the Chinese National Standard (CNS) A4 specification (2 丨 〇 > < 297). ) ----: ---: --- ^ ------. Order ------ ^ • I '(Please read the intentions on the back before filling this page) 4 Cut 52 · 5 Printed by the Central Bureau of Standards, Ministry of Economic Affairs, Shellfish Consumer Cooperative, A7, B7, V. Invention Description (46) 406g of battery-powered RAM (BBRAM) on 400g. In addition, although the video decoder STB 100 includes a merged source and a sinker, the understanding STB 100 can also include only a source or a sink, while others are external to the STB 100. In this embodiment of FIG. 26, the STB 100 (which may be a combination of the source 200 and the Shen 300) preferably includes an information receiving / generating device 102, an index counter 104 in the NVM 116, a cryptographic logic device 106, The seed in STB logic device 108, keyword logic 110, and NVM 116 generates logic H2. In addition, CAM 400g preferably includes cryptographic logic 440g, index counter 442 in NVM 406g, keyword logic 446, and seed generation logic 448 in NVM 406g. The understanding shown in FIG. 27 is preferably performed by the STB control logic 108 and the CAM control logic 444, respectively. In the flowchart shown in FIG. 27, the stored map provides a negotiation message to the CAM 400 to establish a new shared secret card (seed) to prove the CAM 400g to the video decoder 100 (S2701, S2707). This message only occurs when CAM 400g and STB 100 are not password synchronized. The information provided by the information provider is best provided in discrete index information packets, while the STB 100 and CAM 400 both use the index counter 104 (preferably included in the NVM 116) and the index counter 442 (preferably included in the NVM 406g). Middle) Calculate the number of information packets provided in STB 100 and CAM 400g respectively. After the CAM 400g receives the message, the STB 100 and the CAM 400 must be synchronized according to their respective counts, that is, they start counting from the same packet. In step S2708, the CAM 400g provides a message to the STB 100, including challenge certification and encryption, and a status certificate (S2708, S2702). This status is _______- 49- _ This paper size is applicable to China National Standard (CNS) A4 (210X297 mm) -------- ^ --- ¾ ------ 1T --- --- d.. > (Please read the notes on the back before filling out this page) Printed by the Consumers' Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 4 3 2852 ·, at B7 V. Invention Description (47) STB 100 instructs it ( STB 100) whether it is still in cipher synchronization with CAM 400g (S2703), that is, password synchronization. In other words, determine whether CAM 400g and STB 100 still use the same trial keywords, that is, the status indicates whether to use the previously defined certification and Encrypt subprograms to complete certification and encryption. Proof of attack and encryption of pickle are best operated separately. From this challenge, the STB 100 can infer the packet index (that is, the challenge packet) that it must respond to. STB 100 also infers the packet index from this challenge, and must then send the resulting response (ie, the beginning of the response window, which follows the pick window). If the STB 100 determines that it is not a password synchronization, the agreement returns to step S2701. If STB 100 and CAM 400g are password synchronized, then step S2504 determines by STB 100 whether it is in packet synchronization with CAM 400g. If the STB 100 determines that it is not synchronized (S270), the STB 100 transmits a packet resynchronization certification request to the CAM 400g (S2706, S2709). If STB 100 and CAM 400g are in packet synchronization (S2704), the flow skips to step S2705, and STB 100 provides a certified response to CAM 400g (S2705, S2710). Proof responses are calculated from the challenged packet, and it is based on the message sent by STB 100 and the general text corresponding to the packet. CAM 400g then verifies the response to the certificate (S271 丨). If a response is received and verified during the response window, CAM 400g decrements the NACK counter by one. Control then returns to step S2708. The certification response in step S2705 is preferably not transmitted immediately after calculation. Conversely, it is not sent until the beginning of the response window, but it is best to send it before the end of the window. Alternatively, an encrypted response (not a certification response) is transmitted by the STB 100 at step S2705, in which case the CAM 400g uses a confirmation subroutine. In ___- 50 -__ This paper size applies to China National Standard (CNS) A4 specification (210X297 mm) I —II ^ n II. I 1111 Order — 111 Qi (please read the precautions on the back of Jing before filling in (This page) A7 B7 432852 V. Description of the invention (48) ^ is response encryption. In this case, HashB (response) can be used instead of% ^ „杳 When the challenge is transmitted, it starts to challenge the above window corresponding to several different indexes β δ * aa > lacking. Better, pick and shoot the packet window, and in response The window is starting to look forward ^ ^ ★ The full window is random. The challenge view index is in the challenge window, and it is best to wish ® i I η ▲, each time the agreement window of Figure 27 is executed, it is best to have a random length. It is defined by CAM 4〇gt $ Μ et β Η m ~ ΑΑ's longer length, although it should be defined as large as possible. The response video is preferably fixed enough to allow the STB 100 response to reliably transmit the CAM 4〇g ° CAM 400 sends its new challenge after responding to the window

是(如若CAM 400計算出相同的-回應),則此挑戰認可STB 100提供的回應。 ’ 若STB 100不滿意接收及預測的挑戟’則STB 100會中止 資訊封包的傳送,最好不再傳送封包到CAM 400g,以及不 再直釋從CAM 400g返回的封包。 除了挑戰封包及回應視窗的開始以外’ STB 100也從挑戰 推論一値RDM。使用値RDM以證明及加密後續訊息,亦 即,値RDM成爲使用的審理關键詞以取代商議的審理關鍵 詞。較佳的,第一審理關鍵詞向STB 100證明CAM 400g ’ 而後續審理關鍵詞則向STB 100確認它仍與CAM 400g通 訊,並且向CAM 400g確認它仍與相同的STB 100通訊,該 STB 100於開始時商議出一關鍵詞。 雖然STB 100對應來自CAM 400g的挑戰,它實際上是配對 CAM 400g的合法操作(其由STB 100驗證)。若STB 100未從 配對CAM 400g收到挑戰,則它會拒絕通訊資訊封包。較佳 的’若合法CAM 400g偵測出太多違規(如因爲盜取CAM的 -51 - 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X297公釐} (請先聞讀背面之注^^項再填寫本頁 '奉' " 經濟部中央標华局負工消費合作社印笨 4328 52 . A7B7 經濟部中央標準局員工消费合作社印製 五、發明説明(49 ) 出現),則它會拒絕產生挑戰,而STB 100會拒絕盜取 CAM。 當STB 100首次與新的CAM 400g—起啓動時,協定會建立 一共用秘密値。若挑戰及狀態都沒問題,則STB 100在STB 100上的微處理器114中設定一NACK請求旗號,並將它及 RDM寫入NVM 116。當STB 100上的微處理器114計算出回 應時,此回應(具有目前RDM的相關値)儲存在NVM 116直 到與CAM 400g通訊,並且相對於此回應已結束處理。該了 解在圖26中,微處理器114及NV_M 116是以示意而非架構式 表示。 在CAM 400g上,於每一回應視窗開始時即改變NACJC, 而且若是在預設時段結束時收到正確的回應,則將NACK計 數器減一(如N ACK未變)。CAM 400g最好包含微處理器 450,如圖26的示意圖所示,以計算一回應及決定NACK狀 態,計算出的回應及挑戰的NACK狀態則窝入CAM 400g上 的 NVM 406g。 共用秘密値(種子)是商議的,這導因於例如KDF變數的 使用(如計數器以及一長期共用秘密値)。 若回應較早(即在回應視窗開始之前傳送)但是以下爲 眞,即與證明的回應一起傳送的加密的回應訊息檔頭(若有) 是正確的,則CAM 400g產生NACK並且發出新的挑戰(包含 RDM的新値),因而太早結束目前挑戰。 若封包再同步的證明請求經驗證爲正確的,則CAM 400g 將本身設定爲STB 100的目前封包索引’並發出新的挑戰,__: 52 本紙張尺度適用中國國家標準(CNS ) Μ规格(2「〇><297公釐) ' ----:---:---择------.1r------Φ, (請先閲t背面,s-ii.$^再填寫本页) 432852 A7 B7 經濟部中央標準局貝工消費合作社印製 五、發明説明(50 ) 因而太早結束目前挑戰。 處理一共用秘密値商議訊息期間CAM 400g設定一 CAM旗 號,其具有NACK請求旗號設定。CAM 400g重設CAM旗號 以回應一後續商議訊息,其不具有NACK請求旗號設定,或 是在收到資訊封包時,或是若此追蹤功能在CAM上執行時 超出商議訊息重試或時間限制時。在CAM 400g上累加 NACK以回應一商議訊息,其具有NACK請求旗號設定,除 非執行追蹤功能而且CAM旗號已於收到訊息時設定了。若 狀態中的CAM旗號値不匹配STB 100的NACK請求旗號設 定,則STB 100不接受返回的挑戰訊息,在該情況下 STB 100傳送另一商議訊息到CAM 400g。 在此協定中的STB不必知道付費資訊,或是付費策略。 或者,在此實施例中,CAM 400g不使用BBRAM來儲存而 是在一小時段之前登錄。較佳的,資訊存取的各登錄記錄 也包含類型/位準及/或標題關鍵詞I D,其對應於C AM 400g 使用的C A關鍵詞以解密資訊。 雖然已藉由參考附圖的例子而完全説明本發明,要注意 的是熟於此技術者可以作各種變化及修正,例如熟於此技 術者可了解本發明的PCR系統可配合其他資訊反盜取防護 方法(如要求一原始媒體)而使用,其由作者Linnartz在資料 收藏子群拷貝保護技術工作群所出版的名稱「飛利浦電子 公司對於各項建議之回應」的文章中提出。而且將了解本 文所述的各協定及架構可藉由選擇性的採用部分已知協定 及/或架構,而修正以符合一特殊應用的安全要求。因此除 -53- 本紙張尺度適用中國圉家標準(CNS ) A4規格(210X297公釐> ----^------^------1T------Φ. (請先閲讀背面之.注意事項再填寫本頁) 4 3 28 52· a7 __B7五、發明説明(51 )非這些變化及/或修正違反後附申請專利範圍定義的本發明 範圍,否則應該將其解釋爲包含在其中。 .^ ^ 訂 線 (請先閲讀背面之ii意事货再填寫本頁) 經濟部中央標準局貝工消費合作社印裝 54 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐)Yes (if the same-response is calculated by CAM 400), then this challenge acknowledges the response provided by STB 100. ’If STB 100 is unsatisfied with the received and predicted picks’, then STB 100 will suspend the transmission of information packets. It is better not to send packets to CAM 400g and not to directly release packets returned from CAM 400g. In addition to the start of the challenge packet and response window, STB 100 also infers RDM from the challenge. Use 値 RDM to prove and encrypt subsequent messages, that is, 値 RDM becomes the trial keyword used instead of the negotiated trial key. Preferably, the first trial keyword proves to the STB 100 that CAM 400g 'and the subsequent trial keywords confirm to the STB 100 that it is still communicating with the CAM 400g, and confirms to the CAM 400g that it is still communicating with the same STB 100, the STB 100 Negotiate a keyword at the beginning. Although STB 100 corresponds to the challenge from CAM 400g, it is actually a legitimate operation to pair CAM 400g (which is verified by STB 100). If the STB 100 does not receive the challenge from the paired CAM 400g, it will reject the communication information packet. Better 'If the legal CAM 400g detects too many violations (such as because of stealing CAM's -51-This paper size applies to Chinese National Standard (CNS) A4 specifications (210 X297 mm) (Please read the note on the back first ^^ Please fill out this page 'Feng' " Printed by the Central Standardization Bureau of the Ministry of Economic Affairs, Consumer Cooperatives, Ben Ben 4328 52. A7B7 Printed by the Consumers Cooperative of the Central Standards Bureau of the Ministry of Economics, 5. Description of Invention (49) appears, then it Will refuse to create a challenge, and STB 100 will refuse to steal CAM. When STB 100 is first started with the new CAM 400g, the agreement will establish a shared secret. If the challenge and status are OK, STB 100 will be in STB 100 A NACK request flag is set in the microprocessor 114 on the upper side, and it is written into the NVM 116 with the RDM. When the microprocessor 114 on the STB 100 calculates a response, the response (with the current RDM-related 値) is stored in the NVM 116 until the communication with CAM 400g, and the response has ended processing. The understanding is shown in Figure 26, the microprocessor 114 and NV_M 116 are shown in a schematic rather than an architectural way. On CAM 400g, each response window starts Change NACJC from time to time, and If the correct response is received at the end of the preset period, the NACK counter is decremented by one (if N ACK is not changed). The CAM 400g preferably includes a microprocessor 450, as shown in the schematic diagram of Figure 26, to calculate a response and The NACK status is determined, and the calculated NACK status of the response and challenge is embedded in the NVM 406g on the CAM 400g. The shared secret (seed) is negotiated, which is caused by, for example, the use of KDF variables such as counters and a long-term shared secret値). If the response is earlier (that is, sent before the response window starts) but the following is 眞, that is, the encrypted response message header (if any) sent with the certified response is correct, then CAM 400g generates a NACK and sends New challenges (including new ones for RDM), thus ending the current challenge too soon. If the packet resynchronization certification request is verified to be correct, CAM 400g sets itself as the current packet index of STB 100 'and issues a new challenge , __: 52 This paper size applies Chinese National Standard (CNS) M specifications (2 "〇 > < 297 mm) '----: ---: --- selection ---. 1r ------ Φ, (Please read the back of t first, s-ii . $ ^ Fill in this page again) 432852 A7 B7 Printed by the Central Laboratories of the Ministry of Economic Affairs, Shellfish Consumer Cooperative, V. Invention Description (50) So the current challenge is ended too soon. CAM 400g sets a CAM flag during the processing of a shared secret / negotiation message , Which has a NACK request flag setting. CAM 400g resets the CAM flag in response to a subsequent negotiation message, which does not have a NACK request flag setting, or when an information packet is received, or if the tracking function exceeds the negotiation message retry or time limit when executed on CAM . NACK is added to CAM 400g in response to a negotiation message, which has a NACK request flag setting, unless the tracking function is performed and the CAM flag is set when the message is received. If the CAM flag in the status does not match the NACK request flag setting of STB 100, STB 100 will not accept the returned challenge message. In this case, STB 100 sends another negotiation message to CAM 400g. The STB in this agreement does not need to know the payment information or payment strategy. Alternatively, in this embodiment, the CAM 400g does not use BBRAM for storage but is registered one hour before. Preferably, each registration record of information access also includes a type / level and / or title keyword ID, which corresponds to the CA keyword used by CAM 400g to decrypt the information. Although the present invention has been fully explained by referring to the examples of the drawings, it should be noted that those skilled in the art can make various changes and modifications. For example, those skilled in the art can understand that the PCR system of the present invention can cooperate with other information to counter theft. The protection method (such as requiring an original media) is used by the author Linnartz in the article entitled "Philips Electronics Co., Ltd. Response to Various Recommendations" published in the Data Collection Subgroup Copy Protection Technology Working Group. It will also be understood that the protocols and architectures described herein can be modified to meet the security requirements of a particular application by selectively adopting some known protocols and / or architectures. Therefore, except for -53-, this paper size is applicable to the Chinese Standard (CNS) A4 specification (210X297 mm > ---- ^ ------ ^ ------ 1T ------ Φ (Please read the notes on the back before filling in this page) 4 3 28 52 · a7 __B7 V. Description of the invention (51) It is not these changes and / or amendments that violate the scope of the invention as defined in the appended patent scope, otherwise it should Explain that it is included.. ^ ^ Order (please read the second article on the back before filling out this page) Printed by the Central Standards Bureau of the Ministry of Economic Affairs, Shellfish Consumer Cooperatives 54 This paper size applies to Chinese National Standards (CNS) A4 size (210 X 297 mm)

Claims (1)

8 Do 8 8 ABCD 4 3 28 52 / 六、申請專利範圍 1. 一種用以防止未授權存取資訊之裝置,包含: 一非再生裝置,用以接收要處理之資訊;以及 一可再生裝置,用以授權非再生裝置以處理資訊,該 非再生裝置藉由一共用秘密而與該可再生裝置配對,以 使各非再生裝置及可再生裝置互相通訊,其中可再生裝 置使用共用秘密並根據一預設協定而與非再生裝置通 訊。 2-如申請專利範園第1項之裝置,其中將資訊加密,而非 再生裝置包含一輸出用以輸出_資訊至可再生裝置,而其 中可再生裝置包含一解密邏輯以解密資訊,及一輸出用 以輸出解密資訊至非再生裝置。 3,如申s青車利範園第1及2項中任一項之裝置,其中資訊 包含一特定程式,而其中至少一該非再生裝置及該可再 生裝置包含一存取視窗邏輯,用以產生特定程式之預設 時段之存取時間视窗,該時間視窗限制存取該特定程式 至該預設時段。 4.如申請專利範圍第3項之裝置,其中該非再生裝置包含 一控制邏輯以產生一詢問訊息,及一證明邏輯使用該共 用秘密以證明包含在該詢問訊息中之資訊及包含在一回 應訊息中之資訊,藉以產生一非再生裝置證明訊息, 其中可再生裝置最好包含一證明邏輯,使用該共用秘密 以證明包含在詢問訊息中之資訊,及回應訊息中之資 訊,藉以產生一可再生裝置證明訊息,可再生裝置更包 含一控制邏輯,可操作以產生回應訊息,並且以該回應 _________-55- 表紙張尺度適用中國國家標率(CNS ) A4規格(210X297公釐) ^-------^------ΐτ------ (請先聞讀背面之注^^項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 4328 52 . A8 B8 C8 D8 經濟部中央標準局員工消費合作社印製 六、申請專利範圍 訊息提供给該非再生裝置;該非再生裝置控制邏輯更可 操作以使可再生裝置證明訊息與非再生装置證明訊息匹 配’並且若可再生裝置證明訊息匹配非再生裝置證明訊 息,則以該特定程式提供給可再生裝置。 5.如申請專利範圍第4項之裝置,其中提供回應訊息至非 再生裝I後,可再生裝置即登錄存取該資訊。 6·如申請專利範圍第4項之裝置,其中該詢問訊息包含一 隨意値及一該特定程式標題之至少一者。 7·如申請專利範圍第6項之裝置,更包含一恢復產生器, 與非再生裝置結合用以產生該隨意値〇, 8.如申請專利範園第7項之裝置,其中該恢復產生器包含 一計數器。 9·如申請專利範圍第7項之裝置,其中該恢復產生器包含 一隨機數產生器。 10·如申請專利範圍第4項之裝置,其中該詢問訊息更包含 一剩餘存取時間請求,該回應訊息包含一剩餘時間指 示,而其中該非再生裝置包含一存取視窗邏輯,若可再 生裝置證明訊息匹配非再生裝置證明訊息,其即指示剩 餘時間。 11.如申請專利範園慕4項之裝置,其中該訊息更包含一處 理視窗請求,而該可再生裝置更包含一資訊計量器以測 量已存取之資訊量,而其中可再生裝置提供回應訊息中 之處理視窗’因此可延伸存取時間視窗以包含處理視窗 時間。 -56- 本紙張尺度適用中國國家標準(CNS) Λ4規格(210 X 297公釐} ----:--Γ---装-- (婧先閲讀背面之注意事來再填寫本頁) 訂 線 432852 . A8 BS C8 D8 經濟部中央標準局員工消費合作社印裂 六、申請專利範圍 12. 如申請專利範園第11項之裝置’其中該非再生裝置更包 含一資訊計量器以測量已存取之資訊量;其中若該回應 訊息匹配該證明之回應訊息,則非再生裝置可延伸存取 時間視窗以包含處理視窗時間。 13. 如申請專利範圍第12項之裝置,其中該可再生裝置中之 資訊計量器及該非再生裝置中之資訊計量器各包含一非 揮發記憶體。 14. 如申請專利範園第12項之裝置,其中各該非再生裝置及 該可再生裝置包含一存取視窗邏輯裝置,用以產生一存 取時間視窗其中存取該資訊限於該等,存取視窗邏輯裝 置產生之存取時間視窗之較短者。 15. 如申請專利知園第12項之裳置,其中各該非再生裝置及 該可再生裝置包含一存取視窗邏輯裝置,用以判定存取 時間剩餘量,及用以產生一信用量,其中由該等存取視 窗邏輯裝置產生之存取時間視窗之較短者判定該信用 量。 16. 如申請專利範圍第4項之裝置,其中資訊係加密,而該 非再生裝置更包含一超加密邏輯用以超加密資訊;以及 其中該可再生裝置更包含一超解密邏輯用以超解密超 加密之資訊,及一解密邏輯用以解密資訊。 如申請專利範園第16項之裝置,其中該可再生裝置更包 含一介面加密邏輯用以再加密解密之資訊,而其中該非 再生裝置更包含一介面解密邏輯用以解密再加密之資 訊。 -57- i紙張尺度適用中國國家標準(CNS ) Λ4規格(210 X 297公釐) ------— ------^---^------ΐτ------0 -·· (锖先Μ讀背面之注^項再填寫本頁) 4 3 28 5 2 · AS B8 C8 D8 經濟部中央標準局貞工消費合作社印製 六、申請專利範圍 18. 如申請專利範圍第17項之裝置,其中該資訊包含要存取 之特疋程式,而其中該非再生裝置包含一控制邏輯可操 作以產生一訊息,該可再生裝置包含一控制邏輯可操作 俾從該訊息判定一超解密關鍵詞,及商議複數個闕鍵詞 供超解密及再加密。 19. 如申請專利範圍第18項之裝置,其中該非再生裝置包含 _來源可操作以產生該訊息,該來源包含該超加密邏輯 及該控制邏輯;及一沉可操作以商議一再加密關鍵詞, 該沉包含該介面解密邏輯及該控制邏輯β 20. 如申請專利範園第19項之裝置,其中該來源及該沉包含 一整合裝置。 21‘如申請專利範圍第19項之裝置,其中該來源及該沉包含 複數個分開裝置。 22. 如申請專利範圍第19項之裝置,其中該訊息包含一該特 定程式標題。 23. 如申請專利範園第19項之裝置,其中該可再生裝置之控 制邏輯至少部分根據該訊息内容而判定一超解密關键 詞。 24. 如申請專利範圍第17項之裝置,其中該非再生裝置包含 一非再生裝置媒體證明邏輯用以證明一媒體,其上承載 要存取之資讯’而該可再生裝置包含一媒體證明邏輯用 以證明媒體。 25. 如申請專利範園第24項之裝置,其中可再生裝置提供一 隨意値給非再生裝置。 -58- 本紙張尺度適用中國國家標準(CNS ) .Μ規格(21 〇 X 297公釐) --'---裝------訂------線 ί請先E讀背面t注意事·項-S填寫本頁)8 Do 8 8 ABCD 4 3 28 52 / VI. Patent application scope 1. A device for preventing unauthorized access to information, including: a non-reproducing device for receiving information to be processed; and a renewable device, It is used to authorize a non-reproducible device to process information. The non-reproducible device is paired with the regenerable device by a shared secret, so that the non-reproducible device and the regenerable device communicate with each other, wherein the regenerable device uses the shared secret and is based on a preset Establish a protocol to communicate with non-regenerative devices. 2- As the device of the patent application Fanyuan No. 1, wherein the information is encrypted, the non-reproducing device includes an output to output the _information to the regenerable device, and the regenerable device includes a decryption logic to decrypt the information, and a The output is used to output the decrypted information to the non-reproducing device. 3. For example, the device of any one of items 1 and 2 of Shenyang Qingcheli Fanyuan, wherein the information includes a specific program, and at least one of the non-reproducible device and the regenerable device includes an access window logic for generating An access time window for a preset time period of a specific program, the time window restricting access to the specific program to the preset time period. 4. The device of claim 3, wherein the non-regenerative device includes a control logic to generate an inquiry message, and a proof logic uses the shared secret to prove the information contained in the inquiry message and a response message Information in order to generate a non-reproducible device certification message, wherein the regenerable device preferably includes a certification logic, using the shared secret to prove the information contained in the inquiry message, and respond to the information in the message to generate a renewable Device certification information, the reproducible device also contains a control logic, which is operable to generate a response message, and the response is _________- 55- The paper size applies the Chinese National Standard (CNS) A4 specification (210X297 mm) ^- ----- ^ ------ ΐτ ------ (Please read the note ^^ on the back before filling out this page) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 4328 52. A8 B8 C8 D8 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 6. Information on the scope of patent applications provided to the non-renewable device; the control logic of the non-renewable device is more operable to make the renewable device Reproducing apparatus with non-proof post message matches proof 'proof device and if the message matches non-renewable information reproducing apparatus proved message, places the particular program may be supplied to the reproducing apparatus. 5. If the device in the scope of patent application No. 4 is provided, after providing the response message to the non-recyclable device I, the regenerable device will log in to access the information. 6. The device according to item 4 of the scope of patent application, wherein the inquiry message includes at least one of a random code and a title of the specific program. 7. If the device in the scope of the patent application for item 6 further includes a recovery generator, combined with a non-regenerating device to generate the random 値 0. 8. If the device in the patent application park for the seventh item, the recovery generator Contains a counter. 9. The device according to item 7 of the patent application scope, wherein the recovery generator comprises a random number generator. 10. The device according to item 4 of the patent application, wherein the inquiry message further includes a remaining access time request, the response message includes a remaining time indication, and the non-reproducing device includes an access window logic. The proof message matches the non-regenerative device proof message, which indicates the time remaining. 11. For example, the patented Fan Yuanmu device of item 4, wherein the message further includes a processing window request, and the renewable device further includes an information meter to measure the amount of information that has been accessed, and the renewable device provides a response The processing window 'in the message can therefore be extended to access the time window to include the processing window time. -56- This paper size applies to Chinese National Standard (CNS) Λ4 specification (210 X 297 mm) ----: --Γ --- Packing-(Jing first read the notes on the back to fill in this page) Order line 432852. A8 BS C8 D8 Printed by the Consumer Standards Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 6. Application scope of patents 12. If the device of the patent application park No. 11 is used, 'The non-regenerating device also contains an information meter to measure the stored The amount of information taken; if the response message matches the certificate's response message, the non-reproducible device can extend the access time window to include the processing window time. 13. For a device with a scope of patent application of item 12, the regenerable device Each of the information meter in the non-regenerating device and the information meter in the non-regenerating device includes a non-volatile memory. 14. For example, the device of Patent Application No. 12 wherein each of the non-regenerating device and the regenerable device includes an access window. Logic device for generating an access time window where the access to the information is limited to the shorter of the access time window generated by the access window logic device. 2 items, in which each of the non-reproducible device and the regenerable device includes an access window logic device to determine the remaining amount of access time and to generate a credit amount, wherein the access window logic device The shorter of the generated access time window determines the credit amount. 16. For the device under the scope of the patent application, the information is encrypted, and the non-reproducible device further includes a super-encryption logic to super-encrypt the information; and The regenerative device further includes a super-decryption logic to super-decrypt the super-encrypted information, and a decryption logic to decrypt the information. For example, the device of the patent application No. 16 of the patent application park, wherein the regenerative device further includes an interface encryption logic. It is used for re-encrypting and decrypting information, and the non-regenerating device further includes an interface decryption logic for decrypting the re-encrypting information. -57- i Paper size applies Chinese National Standard (CNS) Λ4 specification (210 X 297 mm)- -----— ------ ^ --- ^ ------ ΐτ ------ 0 -... (锖 read the note on the back ^ before filling this page) 4 3 28 5 2AS B8 C8 D8 Central Standard of the Ministry of Economic Affairs Printed by Zhengong Consumer Cooperative 6. Patent application scope 18. For the device with patent application scope item 17, where the information contains the special program to be accessed, and where the non-regenerative device contains a control logic operable to generate a message The regenerable device includes a control logic operable to determine a super-decryption keyword from the message, and negotiate a plurality of key words for super-decryption and re-encryption. 19. For example, the device in the 18th scope of the patent application, wherein the non- The regeneration device includes a source operable to generate the message, the source including the super-encryption logic and the control logic; and a sink operable to negotiate re-encrypted keywords, the sink including the interface decryption logic and the control logic β 20. For example, the device of the patent application No. 19, wherein the source and the sink include an integrated device. 21 ' The device of claim 19, wherein the source and the sink include a plurality of separate devices. 22. For a device under the scope of patent application 19, the message includes a title of the specific program. 23. The device of claim 19, wherein the control logic of the reproducible device determines a super decryption key based at least in part on the content of the message. 24. If the device of the scope of patent application 17 is applied, wherein the non-reproducible device includes a non-reproducible device media certification logic to prove a medium carrying information to be accessed 'and the renewable device includes a media certification logic Used to prove the media. 25. As for the device of the patent application No. 24, the regenerative device provides an optional device to the non-regenerative device. -58- This paper size is applicable to Chinese National Standards (CNS) .M specifications (21 〇X 297 mm) --'--------------------- Order to read the line, please read E first (Notes on the back t and item-S fill out this page) 轾濟部中央榛率局員工消費合作社印製 κ、申請專利範圍 26如申請專利範圍第25項之裝置,更包含與該可再生裝置 結合之恢復產生器,用以產生該隨意値。 如申請專利範圍第26項之裝置,其中該恢復產生器包含 一計數器。 28. 如申請專利範圍第26項之裝置,其中該恢復產生器包含 —隨機數產生器。 29. 如申請專利範圍第1項之裝置,其中資訊係加密,而該 非再生裝置更包含一超加密邏輯用以超加密資訊;以及 其中該可再生裝置更包含一超解密邏輯用以超解密超 加密之資訊,及一解密邏輯用以解密資訊。 30·如申請專利範圍第29項之裝置,其中該可再生裝置更包 含一介面加密邏輯用以再加密解密之資訊,而其中該非 再生裝置更包含一介面解密邏輯用以解密再加密之資 訊a 3 L如申請專利範圍第30項之裝置,其中該資訊包含要存取 之特定程式,該非再生裝置包含一控制邏輯可操作以废 生一訊息’而該可再生裝置包含一控制運輯可操作俾從 該訊息判定一超解密關鍵詞,及商議複數個關鍵詞供超 解密及再加密。 32·如申請專利範圍第31項之裝置,其中該非再生裝置包含 一來源,該來源包含該超加密邏輯及該控制邏輯;並且 可操作以商議一再加密關鍵詞,該沉包含該介面解密邏 輯及該控制邏輯。 33,如申請專利範圍第32項之裝置’其中該來源及該沉包含 -59- 本紙張尺度適用中國國家標準(CNS ) Λ4^格(210 X 29?公釐> ------^---^------ΪΤ------^ - · - (請先鬩讀背面之注項再填寫本頁) 4328 52 . Α8 Β8 C8 D8 經濟部中失標準扃員工消費合作社印裝 六、申請專利範圍 一整合裝置。 34·如申請專利範圍第32項之裝置’其中該來源及該沉包含 複數個分開裝置。 35.如申請專利範圍第32項之裝置,其中該訊息包含一該特 定程式標題。 36_如申請專利範圍第32項之裝置,其中該可再生裝置之控 制邏輯至少部分稂據該訊息内容而判定一超解密關鍵 詞ΰ 37. 如申請專利範圍第30項之裝置」其中該非再生裝置包含 一非再生裝置媒體證明邏輯用以證明一媒體,其上承載 要存取之資訊,而該可再生裝置包含一媒體證明邏輯用 以證明媒體。 38. 如申請專利範園第37項之裝置,其中該可再生裝置提供 一随意値给該非再生裝置。 39. 如申請專利範圍第38項之裝置,更包含與該可再生裝置 結合之恢復產生器,用以產生該隨意値。 40·如申請專利範圍第39項之裝置,其中該恢復產生器包含 一計數器。 41.如申請專利範園第39項之裝置,其中該恢復產生器包含 一隨機數產生器。 /42.如申請專利範圍第1項之裝置,其中該非再生裝置包含 一非再生裝置媒體證明邏輯用以證明一媒體,其上承載 要存取之資訊,而該可再生裝置包含一媒體證明邏輯用 以證明媒體。 -60- 本紙張尺度適用中國國家標準(CNS ) Μ規格(210 x^97公ϋ -------:---装------訂------~線 (請先閲讀背面之注意1f.項再填寫本頁) 經濟部中央標準局員工消費合作社印製 A8 B8 C8 D8 六、申請專利範圍 43·如申請專利範圍第42項之裝置,其中該可再生裝置提供 一隨意値給該非再生裝置。 44·如申請專利範園第43項之裝置,更包含與該可再生裝置 結合之恢復產生器,用以產生該隨意値。 45.如申請專利範圍第44項之裝置,其中該恢復產生器包含 —計數器》 46·如申請專利範園第45項之裝置,其中該恢復產生器包含 一隨機數產生器。 47. —種防止未授權存取一系統中黃訊之方法,該系統包含 —非再生裝置具有一控制邏輯及具有一控制邏輯之可再 生裝置,該方法包含以下步驟: 將一非再生裝置與一可再生裝置配對; 根據從該非再生裝置及可再生裝置之一之該選擇訊 息,選擇性證明非再生裝置與可再生裝置間交換之訊 息’並傳送一證明訊息至該非再生裝置及可再生裝置之 另一者: 在另一該非再生裝置及可再生裝置中驗證證明訊息; 以及 授權存取該資訊。 48. 如申請專利範圍第47項之方法,其中該配對步驟更包含 以下步驟: 產生非再生裝置之ID値; 產生可再生裝置之ID値; 根據該非再生裝置之ID値及該可再生裝置之ID値而 -61 - 本紙張尺度迆用中國國家標準(CNS > Λ4規格(210X297公釐 ----一--:---^------ir------0 (诗先Μ讀背面之注意事項再填寫本X ) 4328 52 Λ8 Β8 C8 D8 經濟部中央標準局員工消費合作社印裝 六、申請專利範圍 C / 產生至少一證書;及 傳送該至少一證書至至少—非再生裝置及可再生裝 置。 49.如申請專利範圍第48項之方法,其中該可再生裝置之ID 値包含一公用關鍵到。 5〇.如申請專利範圍第48項之方法,其中產生非再生裝置之 ID値之步驟更包含傳送ID値至可再生裝置。 51. 如申請專利範園第48項之方法,其中該系統包含一後端 系統,而其中產生一證書之步驟更包含在後端系統產生 該證書。 1 52. 如申請專利範園第51項之方法,其中該至少一證書合併 非再生裝置之ID値與可再生。 53. 如申請專利範圍第51項之方法,其中該至少一證書合併 可再生裝置之ID値與非再生。 54. 如申請專利範圍第5 1項之方法,其中該至少一證書合併 一非再生裝置公用關鍵詞與非再生裝置ID値。 55. 如申請專利範園第54項之方法,更包含以下步騍:若非 再生裝置不包含至少一證書,則提供至少一證書給非再 生裝置。 56. 如申請專利範園第54項之方法,其中該至少一證書合併 一可再生裝置公用關鍵詞與可再生裝置ID値。 57. 如申請專利範圍第48項之方法,其中非再生裝置包含一 來源裝置。 58_如申請專利範圍第48項之方法,其中非再生装置包含一 -62- 本紙張尺度ϊΑΛ巾ϋ ®家縣(C;NS ) Λ4現格(210χ]97ϋ ----,-----疼------ir------0 (請先W讀背面之注意事•項再填寫本頁) · 432852. AS B8 C8 D8 經濟部中失梯準局男工消費合作社印製 六、申請專利範圍 沉裝置。 59.如申請專利範園第47項之方法,其中該系統包含一後端 系統而該配對步驟更包含以下步驟: 產生非再生裝置之ID値; 判定非再生裝置是否包含一實體證書; 傳送該實體證書至該可再生裝置及後端系統; 判.定該後端系統是否包.含_另一實體證書; 將一該實體證書及該另一實體證書傳送給該可再生裝 置;以及 _ 將一交叉證書傳送給該可再生裝置。, 60·如申請專利範圍第47項之方法,其中該系統包含一後端 系統而該配對步驟更包含以下步驟: 產生非再生裝置之ID値; 根據非再生裝置之I D値而判定後端系統中非再生裝置 之秘密資訊;以及 傳送秘密資訊至該可再生裝置。 61. 如申請專利範圍第54項之方法,更包含若該非再生裝置 不包含秘密資訊,則提供秘密資訊給該非再生裝置之步 驟。 62. 如申請專利範園第60項之方法,其中非再生裝置包含一 來源装置。 63. 如申請專利範園第61項之方法,其中非再生裝置包含一 沉裝置。 64. 如申請專利範圍第47項之方法,其中各非再生裝置及可 -63- 本紙張尺度適用中國國家標隼(CNS ) A4规格(210X297公釐) ----ΊΙ.---^------ΐτ--------.it . f . (請先聞讀背面之注$項再填寫本頁) ^328 52 Α8 Β8 C8 DS 經濟部中央標準局負工消費合作社印裝 六、申請專利範園 再生裝置包含一證明邏輯,而其中選擇性證明訊息之步 驟更包含以下步驟: 傳送來自該非再生裳置之詢問訊息至該可再生裝置; 使用一共用秘密以證明包含在該詢問訊息中之資訊及 _回應訊息中之資說’藉以產生一可再生裝置證明訊 息,由可再生裝置產生該回應訊息; 使用該共用秘密以證明包含在詢問訊息中之資訊及包 含在回應訊息中之資訊,藉以產生一非再生裝置證明訊 息:以及 _ 驗證該可再生裝置證明訊息是否匹I該非再生裝置證 明訊息。 65·如申請專利範圍第64項之方法,其中該詢問訊息包含一 隨意値及一該資訊之特定程式,及標題,而該回應却息 不包含資訊。 66. 如申請專利範圍第64項之方法,更包含由可再生裝置提 供回應訊息给非再生裝置後,登綠存取該資訊之步驟。 67. 如申請專利範圍第64項之方法,其中非再生裝置更—恢 復產生器,及更包含產生該隨意値之步驟。 68. 如申請專利範園第67項之方法,其中恢復產生器包含一 計數器,而該隨意値係一計數値。 69. 如申請專利範園第67項之方法,其中恢復產生器包含— 隨機數產生器,而該隨意値係一随機數。 70. 如申請專利範園第64項之方法,其中該詢問訊息更包含 一剩餘存取時間請求,而該回應訊息包含一剩餘時間指 -64 - ----:—.---装------訂--------線 c請先聞讀背面之注意务項再填寫本頁) 本紙張尺度適用中國國家標準(CNS ) Α4規格(2〖〇X297公釐) 43^8 52 . A8 B8 C8 D8 經濟部_央標準局Λ工消費合作社印製 六、申請專利範圍 示,而其中該非再生裝置包含一存取視窗邏輯,該方法 更包含以下步騍: 若該可再生裝置證明訊息匹配該非再生裝置證明訊 息’則指TF剩餘時間。 71. 如申請專利範園第64項之方法’其中該訊息更包含一處 理視窗請求,而該可再生裝置更包含一資訊計量器,而 且該方法更包含以下步驟: 測量該可再生裝置已存取之資訊量;以及 提供回應訊息中之處理視窗身間,其中可延伸存取時 間視窗以包含處理視窗時間。 , 72. 如申請專利範圍第71項之方法,其中該非再生裝置更包 含一資訊計量器,而且該方法更包含以下步驟: 測量非再生裝置已存取之資訊量;以及 若該可再生裝置證明訊息匹配該非再生裝置證明訊 息’則延伸存取時間視窗以包含該處理視窗時間, 73. 如申請專利範圍第72項之方法,其中各該非再生及該可 再生裝置包含一存取視窗邏輯裝置用以判定存取時間剩 餘量,而且該方法更包含步驟: 在非再生裝置產生一存取時間視窗·, 在可再生裝置產生一存取時間視窗;以及 限於存取非再生装置及可再生裝置中產生之存取時間 視窗之較短者。 74·如申請專利範圍第73項之方法,更包含以下步驟: 根據該限制存取步驟並根據存取而產生要給予一使用 -65- 本紙張尺度賴+賴家辟((:叫44胁(21(^297公釐)' "~~-- 11 —J '11 j^1T----11^. - 『♦ <請先閲讀背面之注意事項再填寫本頁) 4328 52 . Β8 CS D8 經濟部中央搮準局貝工消費合作社印製 六、申請專利範圍 者之信用量。 75.如申請專利範圍第64項之方法,其中資訊係加密,而說 息包含一該資訊之特定程式標題,非再生裝置包含一超 加密邏輯,而可再生裝置包含一超解密邏輯,而且該方 法更包含以下步驟: 超加密該非再生裝置中之資訊; 提供該超加密資訊給該可再生裝置;以及 將該可再生裝置中之超加密資訊解密。 76-如申請專利範園第75項之方法,其中可再生裝置包含解 密裝置,而且該方法更包含以下步驟: 在該可再生裝置解密該資訊。 77. 如申請專利範園第76項之方法,其中該非再生裝置包含 一來源裝置,該可再生裝置包含再加密邏輯,而該系統 更包含一沉裝置其包含解密邏輯,而且該方法更包含以 下步騍: 再加密該解密資訊; 提供再加密資訊給沉裝置;以及 解密該再加密資訊。 78. 如申請專利範園第77項之方法,更包含以下步驟: 判定用於在該再加密步驟及該解密步驟中之介面加密 關鍵詞。 79. 如申請專利範圍第78項之方法,其中該判定一介面加密 關鍵詞之步驟更包含以下步驟: 從該沉裝置傳送一沉隨意値至該可再生装置; -66 - 本紙張尺度適用中國躅家樣準< CN&) Α4規格(210X297公嫠) ' ----^--,---^------tr-------練' -- (請先閱讀背面之注意事項再填寫本頁) 4328 52· A8 B8 C8 D8 申請專利範圍 經濟部中央標车局員工消費合作‘杜印11 在該可再生裝置使用包含在該沉隨意値中之資訊以獨 J·地導出介面加密關鍵詞:以及 在該沉裝置使用包含在該沉隨意値中之資訊以獨立地 導出介面加密關鍵詞 80. 如申請專利範圍第75項之方法,更包含以下步驟: 判定用於在該超再加密步骤及該超解密步驟中之超加 密關鍵詞。 81. 如申請專利範圍第80項之方法,其中判定一超加密關鍵 詞之步驟更包含以下步驟:_ 根據一特定程式之該標題而使用資訊,以判定該可再 生裝1之超加密關鍵詞。 82. 如申請專利範園第75項之方法,其中訊息更包含一隨意 値,而且該方法更包含以下步驟: 從該可再生裝置傳送一媒體詢問訊息至非再生裝置; 證明在該非再生裝置產生而包含在該媒體詢問訊息中 之資訊及包含在一媒體回應訊息中之資訊,藉以產生一 非再生裝置媒體證明訊息; 傳送該媒體回應訊息及該非再生裝置媒體證明訊息至 該可再生裝置; 證明在該可再生裝置產生而包含在該媒體回應訊息中 之資訊及包含在該媒體詢問訊息中之資訊,藉以產生可 再生裝置媒體證明訊息:以及 在該可再生裝置以該可再生裝置媒體證明訊息驗證該 非再生裝置媒體證明訊息。 -67- 本紙張尺度適用令國國家標準(CNS ) A4規格(2丨0X297公釐} (請先閲讀背面之注意事項再填寫本頁) i裝· -5 —泉 A8 B8 C8 D8 432852. 六、申請專利範圍 83.如申請專利範圍第82項之方法,其中媒體詢問訊息包含 在該回應訊息中。 84·如申請專利範園第82項之方法,其中可再生裝置包含一 計數器用以產生包含在該媒體詢問訊息中之可再生裝置 計數値,而且該方法更包含以下步驟: 在非再生裝置遞增該可再生裝置計數値:以及 若驗證步驟成功,則在該可再生裝置遞增該可再生裝 置計數値。 85. 如申請專利範圍第82項之方法,其中可再生裝置包含一 隨機數產生器用以產生包含在該媒體歲問訊息中之可再 生裝置隨機値,而且該方法更包含以下步驟: 在該非再生裝置遞增該可再生裝置隨機値:以及 若驗證步驟成功,則在該可再生裝置遞增該可再生裝 置隨機値。 86. —種防止未授權存取一系统中加密資訊之方法,該系統 包含:一非再生裝置,具有一控制邏輯及一超加密邏 輯’一可再生裝置,具有一控制邏輯及一超解密邏輯, 該方法包含以下步驟: 經濟部中央椋準局貝工消費合作社印聚 在該非再生裝置中超加密該資訊: 提供該超加密資訊給該可再生裝置;以及 在該可再生裝置解密該超加密資訊。 87. 如申請專利範園第86項之方法,其中可再生裝置包含解 密邏輯,而且該方法包含以下步驟: 在該可再生裝置解密資訊。 ~ 68 _ 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公着) 經濟部中央樣準局貝工消費合作社印裝 432852. H C8 D8 六、申請專利範圍 88. 如申請專利範圍第87項之方法,其中該非再生裝置包本 一來源裝置,該可再生装置包含再加密邏輯,而該系蘇 更包含一沉裝置其包含解密邏輯,而且該方法更包含以 下步驟: 再加密該解密資訊: 提供再加密資訊給沉裝置;以及 解密該再加密資訊。 89. 如申請專利範園第88項之方法,更包含以下步躁: 判定用於在該再加密步驟及—解密步驟中之介面加密關 鍵Ί可。 90. 如申請專利範圍第89項之方法,其中該判定-介面如密 關鍵詞之步驟更包含以下步驟 從該沉裝置傳送一沉隨意値至該可再生裝置; 在該可再生裝置使用包含在該沉隨意値中之資訊以揭 立地導出介面加密關鍵詞;以及 在該沉裝置使用包含在該沉隨意値中之資訊以獨' 導出介面加密關鍵詞。 91. 如申請專利範圍第86項之方法,更包含以下步驟: 判足用於在該超再加密步骤及該超解密步驟中之超 密關鍵詞。 92. 如申請專利範圍第91項之方法,其中資訊包含具有—襟 題之特定程式,而判定一超加密關鍵詞之步驟更包含〆 下步驟: 根據特定程式之標題而使用資訊,以判定該可再生裝 __________-69-_ 本紙張尺度適家標準(CNS ) A術Μ 210X297公瘦) ' —--- ----^---:---------II------處 f請先閱1»背面之Ϊ1·意事免再填寫本 4328 52. Ag B8 C8 D8 經濟部中央標準局員工消費合作社印製 六、申請專利範圍 置之超加密關鍵詞。 93. —種防止未授權存取一系統中資訊之方法,該系統包含 具有一控制邏輯之非再生裝置,及具有一控制邏輯之可 再生裝置’該方法包含以下步驟: 從該可再生裝置傳送媒體詢問訊息至非再生裝置; 證明在該非再生裝置產生而包含在該媒體詢問訊息中 之資訊及包含在一媒體回應訊息中之資訊,藉以產生一 非再生裝置媒體證明訊息; 傳送該媒體回應訊息及該非再生裝置媒體證明訊息至 該可再生裝置; 證明在該可再生裝置產生而包含在媒體回應訊息中之 資訊及包含在媒體1句問訊息中之資訊,藉以產生一可再 生裝置媒體證明訊息;以及 在該可再生裝置以該可再生裝置媒體證明訊息驗證該 非再生裝置媒體證明訊息。 94. 如申請專利範圍第93項之方法,其中可再生裝置包含一 計數器用以產生包含在該媒體詢問訊息中之可再生裝置 計數値,而且該方法更包含以下步躁: 在該非再生裝置遞增該可再生裝置計數値:以及 若該驗證步驟成功,則在該可再生裝置遞増該可再生 裝置計數値。 95. 如申請專利範園第93項之方法,其中可再生裝置包含一 隨機數產生器用以產生包含在該媒體詢問訊息中之可再 生裝置随機値,而且該方法更包含以下步驟: -70-__ 本紙張尺度適用中國國家標準(〇阳>八4規格(21〇><297公釐) (請先聞讀背面之注意事項再填寫本頁) 裝. -1r A8 B8 C8 D8 432852 . 申請專利範圍 在該非再生裝置遞增該可再生裝置隨機値;以及 若該驗證步驟成功,則在該可再生裝置遞増該可再生 裝置隨機値。 96. —種防止未授權存取—系統中資訊之方法,該系統包含 —非再生裝置及一可再生裝置,該方法包含以下步驟: (a) 將一種子商議請求從該非再生裝置傳送到該可再生 裝置: (b) 將一挑戰及一狀態詢問從該可再生裝置傳送到該非 再生裝置: _ (c) 判定該非再生裝置及該可再生裝置是否在密碼同步 中;以及 (d) 若該非再生裝置及可再生裝置都不在密碼同步中, 則返回步驟(a)。 97. 如申請專利範圍第96項之方法,更包含以下步驟: (e) 判定該非再生裝置及該可再生裝置是否在封包同步 中:以及 (f) 當該非再生裝置及該可再生裝置都在封包同步之中 時’即以各別編號之封包提供資訊至該可再生裝置。 98. 如申請專利範園第97項之方法,其中提供資訊至—預設 存取回應視窗中之可再生裝置,而提供資訊之步驟更包 含以下步驟: 由該預設存取回應視窗中之可再生裝置驗證一該部分 資訊及該資訊接收。 99. 如申請專利範園第98項之方法,其中該可再生裝置包含 -71 - 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) -----„---1---^------1T------Λ --- (請先閲讀背面之注意事t再填寫本頁) 經濟部中央標率局員工消費合作社印製 4328 52 A8 B8 C8 D8 經濟部中央橾準局員工消費合作社印製 六、申請專利範圍 回應可再生裝置之錯誤計數器,而該驗證步驟更包含以 下步驟: 驗證從可再生裝置傳送至非再生裝置之一般本文由非 再生裝置接收。 100.如申請專利範圍第98項之方法,其中該可再生裝置包含 回應可再生裝置之錯誤計數器,而該驗證步驟更包含以 下步骤: 驗證在該預設存取回應視窗中收到該資訊。 101·如申請專利範園第98項之方法_,更包含以下步驟: 當該驗證在該可再生裝置不成功時,即累積一錯誤計 數。 102. 如申請專利範固第ι〇1項之方法,更包含以下步驟: 若認出一預設錯誤計數描述,則中止該可再生装置之 處理。 103. 如申請專利範圍第101項之方法,其中可再生裝置包含 一計數器’其計算驗證步驟前之錯誤數目,而且該方法 更包含以下步驟: 若驗證不成功則遞減計數器,藉以刪除一該錯誤指 示。 104. 如申請專利範圍第103項之方法,其中錯誤係以一 NACK 反映。 105·如申請專利範圍第104項之方法,其中當該預設存取回 應視窗之前收到該資訊時,不遞減一該NACK計數。 106.如申請專利範園第98項之方法,其中該預設存取回應視 __ -72- 本紙張尺度適用中國國家橾準(CNS ) A#現格(210X297公釐) iiln I J--J— n I -- f請先閲讀背面之注意事項再填寫本頁} 訂 /1328 5 2 A8 6S C8 D8 六、申請專利範圍 窗具有一啓始時間及一持續時間,而且該方法更包含 以 經濟部中央標準局負工消费合作社印製 下步騍: 設定該預設存取回應視窗之啓始時間及持續時間,以 回應步驟(b)中該可再生裝置發出之挑戰。 107. 如申請專利範圍第97項之方法,其中若該可再生裝置及 该非再生裝置不在封包同步中,則步驟(b)更包含以下 步驟: 指示該可再生裝置成爲與該非再生裝置作封包同步。 108. 如申請專利範圍第1〇7項之方法,其中該指示該可再生 装置成爲封包同步之步樣更包含: 從該非再生裝置傳送一指令至該可再生裝置,該指令 包含一封包索引; 設定可再生裝置爲該封包索引;以及 返回步驟(b)。 109. 如申請專利範圍第1〇8項之方法,其中在一挑戰回應時 間視窗中隨機地選擇該封包索引。 110. 如申請專利範圍第96項之方法,更包含: 若該非再生及該可再生裝置在步驟(c)中不是密碼同 步,即發出一新挑戰。 111. 如申请專利範園第96項之方法,其中若從該可再生裝置 沒收到有意義挑戰,則該方法更包含以下步驟: 在步驟(a)中傳送另一種子商議請求^ 112. 如申請專利範固第96項之方法,更包含以下步驟: 由非再生裝置請求可再生裝置之NACK狀態;以及 從該挑戰判定是否承認請求。 〜 -73- ( 210X297,^7 (請先間讀背面之注意事項再填寫本頁) 裝. 、1T APrinted by the Consumer Cooperative of the Central Hazel Bureau of the Ministry of Economic Affairs, and applied for patent scope 26. The device in the scope of patent application No. 25, further includes a recovery generator combined with the renewable device to generate the random radon. The device of claim 26, wherein the recovery generator includes a counter. 28. The device of claim 26, wherein the recovery generator includes a random number generator. 29. For the device in the first scope of the patent application, wherein the information is encrypted, and the non-regenerative device further includes a super-encryption logic to super-encrypt the information; and wherein the renewable device further includes a super-decryption logic to super-decrypt the super-encryption information. Encrypted information, and a decryption logic to decrypt the information. 30. The device according to item 29 of the patent application scope, wherein the reproducible device further includes an interface encryption logic to re-encrypt and decrypt the information, and the non-reproducible device further includes an interface decryption logic to decrypt the re-encrypted informationa 3 L If the device of the scope of patent application No. 30, wherein the information contains the specific program to be accessed, the non-reproducible device contains a control logic operable to scrap a message 'and the regenerable device contains a control operation operable判定 Determine a super-decryption keyword from the message, and negotiate a plurality of keywords for super-decryption and re-encryption. 32. The device according to item 31 of the patent application scope, wherein the non-regenerative device includes a source, the source includes the super encryption logic and the control logic; and is operable to negotiate the keywords for re-encryption, the sink includes the interface decryption logic and The control logic. 33. If the device of the scope of application for the patent No. 32, where the source and the sink contains -59- This paper size applies the Chinese National Standard (CNS) Λ 4 ^ grid (210 X 29? Mm >) ------ ^ --- ^ ------ ΪΤ ------ ^-·-(Please read the notes on the back before filling out this page) 4328 52. Α8 Β8 C8 D8 Out of standard employees in the Ministry of Economic Affairs Consumption cooperative print 6. Integrated device with patent application scope. 34. If the device with patent application scope No. 32, where the source and the sink contains a plurality of separate devices. 35. With the patent application scope No. 32 equipment, where The message contains a title of the specific program. 36_ If the device of the scope of patent application 32, wherein the control logic of the reproducible device is at least partly based on the content of the message to determine a super-decryption keyword 37. If the scope of the patent application The device of item 30 ", wherein the non-reproducible device includes a non-reproducible device media certification logic to prove a medium, which carries information to be accessed, and the regenerable device includes a media certification logic to prove the media. 38. If you apply for the 37th item of Patent Park The regenerative device provides a random coil to the non-regenerative device. 39. For example, the device in the scope of patent application No. 38 further includes a recovery generator combined with the renewable device to generate the random coil. 40 · For example, the device of the scope of patent application 39, wherein the recovery generator includes a counter. 41. The device of the scope of patent application 39, wherein the recovery generator includes a random number generator. / 42. For patent application The device of the scope item 1, wherein the non-reproducible device includes a non-reproducible device media certification logic to prove a medium carrying information to be accessed, and the regenerable device includes a media certification logic to prove the media. 60- This paper size applies to Chinese National Standards (CNS) M specifications (210 x ^ 97 cm) -------: --- --------------- order --- line (please (Please read Note 1f. On the back before filling this page) Printed by the Consumer Standards Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs A8 B8 C8 D8 6. Application for Patent Scope 43 · If you apply for the scope of Patent Scope Item 42, the renewable device provides Feel free to give Non-regenerating device. 44. For example, the device of patent application No. 43 includes a recovery generator combined with the regenerative device to generate the random 产生. 45. For example, the device of patent application No. 44 includes The recovery generator includes a counter. 46. The device according to item 45 of the patent application park, wherein the recovery generator includes a random number generator. 47. A method to prevent unauthorized access to the yellow message in a system, The system includes a non-regenerative device having a control logic and a regenerable device having a control logic. The method includes the following steps: pairing a non-regenerative device with a regenerable device; The selection message selectively certifies the message exchanged between the non-reproducible device and the regenerable device and transmits a certification message to the other of the non-regenerative device and the regenerable device: verification in another non-regenerative device and regenerable device Supporting information; and authorizing access to that information. 48. If the method according to item 47 of the scope of patent application, the pairing step further includes the following steps: generating the ID 非 of the non-regenerating device; generating the ID 値 of the regenerable device; ID 値 -61-This paper size adopts Chinese national standard (CNS > Λ4 specification (210X297mm ---- 一-: --- ^ ------ ir ------ 0 (Please read the notes on the back of the poem before filling in this X) 4328 52 Λ8 Β8 C8 D8 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 6. Apply for a patent scope C / Generate at least one certificate; and transmit the at least one certificate to at least —Non-regenerative devices and regenerable devices. 49. If the method of the scope of patent application is 48, the ID of the regenerative device contains a public key. 50. If the method of the scope of patent application 48, which generates The step of ID 値 of the non-regenerating device further includes transmitting the ID 値 to the regenerable device. 51. For example, the method of applying for patent park No. 48, wherein the system includes a back-end system, and the step of generating a certificate is further included in Back-end system generation 1 52. If the method of applying for patent No. 51 in the patent application park, the at least one certificate combines the ID of the non-renewable device and the renewable. 53. If the method of applying for the scope of patent No. 51, the at least one certificate is combined ID 値 and non-renewable devices of regenerable devices. 54. For example, the method of item 51 in the scope of patent application, wherein the at least one certificate combines a common keyword of non-renewable devices and ID 値 of non-renewable devices. The method of item 54 further includes the following steps: If the non-regenerating device does not contain at least one certificate, provide at least one certificate to the non-regenerating device. 56. For the method of applying for patent model park item 54, the at least one certificate is combined A common keyword of a renewable device and the ID of a renewable device. 57. For example, the method of the 48th scope of the patent application, where the non-regeneration device includes a source device. 58_ The method of the 48th scope of the patent application, where the non-regeneration The device contains a -62- this paper size ϊΛΛϋϋ ® Jiaxian (C; NS) Λ4 present grid (210χ) 97ϋ ----, ----- pain ------ ir ----- -0 (Please read the cautions on the reverse side first (Write this page) · 432852. AS B8 C8 D8 Printed by the Men ’s Consumer Cooperatives of the Ministry of Economic Affairs of the Ministry of Economic Affairs. 6. Application for patent scope sinking device. 59. For the method of applying for the 47th item of the Patent Park, the system includes a Back-end system and the pairing step further includes the following steps: generating the ID of the non-regenerating device; determining whether the non-regenerating device contains an entity certificate; transmitting the entity certificate to the renewable device and the back-end system; determining the back-end Does the system include _another entity certificate; transmitting an entity certificate and the other entity certificate to the renewable device; and_ transmitting a cross-certificate to the renewable device. 60. If the method according to item 47 of the patent application scope, wherein the system includes a back-end system and the pairing step further includes the following steps: generating the ID 非 of the non-regenerating device; determining the back-end system based on the ID 値 of the non-regenerating device The secret information of the regeneration device in China and Africa; and transmitting the secret information to the regenerative device. 61. If the method of the scope of application for the patent No. 54 further includes the step of providing secret information to the non-reproducing device if the non-reproducing device does not contain secret information. 62. The method of claim 60, wherein the non-regenerative device includes a source device. 63. The method according to item 61 of the patent application park, wherein the non-regenerative device includes a sink device. 64. If you apply for the method of item 47 in the scope of patent application, where each non-recycling device and can be -63- This paper size applies to China National Standard (CNS) A4 specification (210X297 mm) ---- ΊΙ .--- ^ ------ ΐτ --------. it. f. (Please read the note on the back before filling in this page) ^ 328 52 Α8 Β8 C8 DS Cooperative cooperative printing 6. The patent application Fanyuan regeneration device includes a proof logic, and the step of selectively proving the information further includes the following steps: sending an inquiry message from the non-regeneration clothes to the renewable device; using a shared secret to prove The information contained in the inquiry message and the information in the _response message say 'to generate a reproducible device certification message, and the regenerative device generates the response message; use the shared secret to prove the information contained in the inquiry message and include The information in the response message is used to generate a non-reproducible device certification message: and _ verify that the reproducible device certification message matches the non-reproduced device certification message. 65. The method according to item 64 of the patent application, wherein the inquiry message includes a random program and a specific program of the information and a title, but the response message does not include the information. 66. For the method of applying for the scope of patent application No. 64, the method further includes the step of accessing the information after the green message is provided by the renewable device to the non-reproduced device. 67. The method of claim 64, wherein the non-regenerative device is a recovery generator, and further includes a step of generating the random loop. 68. The method according to item 67 of the patent application park, wherein the recovery generator includes a counter, and the random is not a count. 69. The method of claim 67 in the patent application park, wherein the recovery generator includes a random number generator, and the random number is a random number. 70. For example, the method of applying for the patent item No. 64, wherein the inquiry message further includes a request for remaining access time, and the response message includes a remaining time indicator -64-----: -.--- equipment- ----- Order -------- Line c, please read the attention items on the back before filling in this page) This paper size applies the Chinese National Standard (CNS) Α4 specification (2 〖〇X297mm) 43 ^ 8 52. A8 B8 C8 D8 Printed by the Ministry of Economic Affairs_Central Bureau of Standards Λ Industrial Consumer Cooperative Co., Ltd. 6. The scope of patent application is shown, and the non-reproducible device includes an access window logic. The method further includes the following steps: If the The reproducible device certification message matches the non-reproducible device certification message 'means the remaining time of the TF. 71. For example, the method of applying for patent item No. 64, wherein the message further includes a processing window request, and the regenerative device further includes an information meter, and the method further includes the following steps: measuring that the regenerative device has been stored The amount of information taken; and the processing window in the response message, where the access time window can be extended to include the processing window time. 72. If the method according to item 71 of the patent application scope, wherein the non-regenerating device further includes an information meter, and the method further includes the following steps: measuring the amount of information accessed by the non-regenerating device; and if the renewable device proves If the message matches the non-reproducible device certification message, then the access time window is extended to include the processing window time. 73. If the method of the scope of patent application is No. 72, wherein each of the non-regenerative and regenerable devices includes an access window logic device, To determine the remaining amount of access time, and the method further includes the steps of: generating an access time window in a non-reproducible device, generating an access time window in a reproducible device; and limiting access to non-reproducible devices and regenerable devices The shorter of the resulting access time windows. 74. If the method of applying for the scope of the patent, the item 73, further includes the following steps: According to the restricted access step and generated according to the access, a use is required to be given. -65- This paper standard Lai + Lai Jiapi ((: called 44 threats) (21 (^ 297mm) '" ~~-11 --J '11 j ^ 1T ---- 11 ^.-"♦ < Please read the precautions on the back before filling this page) 4328 52. Β8 CS D8 Printed by the Central Bureau of Standards and Quarantine of the Ministry of Economic Affairs, Shellfish Consumer Cooperatives. 6. Credit amount of those applying for patents. 75. For the method of applying for the scope of patents No. 64, the information is encrypted, and the information includes one of the information. In a specific program title, the non-reproducible device includes a super-encryption logic, and the reproducible device includes a super-decryption logic, and the method further includes the following steps: super-encrypt the information in the non-reproducible device; provide the super-encrypted information to the reproducible device And decrypt the super-encrypted information in the reproducible device. 76- The method according to item 75 of the patent application garden, wherein the reproducible device includes a decryption device, and the method further includes the following steps: decrypting the Information 77. The method of claim 76 of the patent application park, wherein the non-regenerating device includes a source device, the renewable device includes re-encryption logic, and the system further includes a sink device including decryption logic, and the method further includes the following Step 骒: re-encrypt the decrypted information; provide the re-encrypted information to the sink device; and decrypt the re-encrypted information. 78. The method of item 77 of the patent application park further includes the following steps: And the interface encryption keywords in the decryption step. 79. For example, the method of claim 78 in the scope of patent application, wherein the step of judging an interface encryption keyword further includes the following steps: Sending a random message from the sink device to the Recycling device; -66-This paper size is applicable to China's family standards < CN &) Α4 size (210X297) '' ---- ^-, --- ^ ------ tr --- ---- Lian '-(Please read the precautions on the back before filling this page) 4328 52 · A8 B8 C8 D8 Patent Application Scope Consumer Co-operation of the Central Standard Vehicle Bureau of the Ministry of Economic Affairs' Du Yin 11 used in this renewable device Contained in the Shen Sui The information in the document can be used to derive the interface encryption keywords independently: and the information contained in the software can be used in the sink device to independently derive the interface encryption keywords. 80. For the method of the 75th scope of the patent application, The method further includes the following steps: determining the super-encrypting keywords used in the super re-encryption step and the super-decrypting step. 81. For example, in the method of applying for the scope of the patent, the step of determining a super-encrypting keyword further includes the following Steps: _ Use the information according to the title of a specific program to determine the super-encrypted keywords of the renewable pack 1. 82. For the method of applying for patent No. 75, the message further includes a random message, and the method further includes the following steps: transmitting a media inquiry message from the reproducible device to a non-reproducible device; The information contained in the media inquiry message and the information contained in a media response message are used to generate a non-reproducible device media certification message; transmitting the media response message and the non-reproduced device media certification message to the renewable device; certification The information generated in the renewable device and included in the media response message and the information included in the media inquiry message, thereby generating a renewable device media certification message: and using the renewable device media certification message in the renewable device Verify the non-reproducible device media certification message. -67- This paper size applies the national standard (CNS) A4 specification (2 丨 0X297 mm) (Please read the precautions on the back before filling out this page) i equipment · -5 — 泉 A8 B8 C8 D8 432852. 6 Scope of patent application 83. The method of claim 82, in which the media inquiry message is included in the response message 84. The method of claim 82 in the patent application park, wherein the regenerative device includes a counter for generating The regenerative device count included in the media inquiry message, and the method further includes the steps of: incrementing the regenerable device count in a non-reproducible device; and, if the verification step is successful, incrementing the regenerable device in the regenerable device. The device counts 値. 85. The method according to item 82 of the patent application, wherein the reproducible device includes a random number generator for generating a random 値 of the reproducible device included in the media message, and the method further includes the following steps. : Increment the regenerative device randomly at the non-regenerating device; and increment the regenerative device at the regenerative device if the verification step is successful 86. —A method for preventing unauthorized access to encrypted information in a system, the system includes: a non-regenerative device with a control logic and a super-encryption logic 'a renewable device with a control logic and A super-decryption logic, the method includes the following steps: the central government's quasi-burial agency, the Shellfish Consumer Cooperative, prints and super-encrypts the information in the non-reproducible device: provides the super-encrypted information to the reproducible device; and decrypts the reproducible device; The super-encrypted information. 87. For example, the method of the patent application No. 86, wherein the reproducible device includes decryption logic, and the method includes the following steps: Decrypt the information on the reproducible device. ~ 68 _ This paper standard applies to China Standard (CNS) A4 specification (210X297) Printed by the Central Samples Bureau of the Ministry of Economic Affairs, Shellfish Consumer Cooperative, 432852. H C8 D8 VI. Application for a patent scope 88. For the method of the 87th scope of the patent application, where the non-renewable device package The source device, the renewable device includes re-encryption logic, and the system Su further includes a sink device and its package Contains decryption logic, and the method further includes the following steps: re-encrypting the decrypted information: providing the re-encrypted information to the sink device; and decrypting the re-encrypted information. 89. For the method of applying for patent No. 88, the method further includes the following steps: Impatience: It is judged that the interface encryption key used in the re-encryption step and the -decryption step is not acceptable. 90. For example, the method of the 89th scope of the patent application, wherein the step of determining the interface-like key words further includes the following steps: The sink device sends a sinker to the renewable device; the information contained in the sinker is used in the regenerative device to reveal the interface encrypted keywords openly; and the sinker device is used to contain the sinker ’s random key. The information is encrypted with the unique export interface. 91. The method according to item 86 of the patent application scope further includes the following steps: determining the super-dense keywords used in the super-re-encryption step and the super-decryption step. 92. If the method of applying for item 91 of the patent scope, where the information includes a specific program with a title, and the step of determining a super-encrypted keyword further includes the following steps: Use the information according to the title of the specific program to determine the Recyclable __________- 69-_ This paper is compliant with family standards (CNS) A surgery M 210X297 male thin) '----- ---- ^ ---: --------- II- ----- Please read 1 »on the back of the page 1 · Issue free and then fill out this 4328 52. Ag B8 C8 D8 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economy . 93. —A method for preventing unauthorized access to information in a system, the system comprising a non-regenerative device having a control logic, and a regenerative device having a control logic 'The method comprises the following steps: transmitting from the regenerable device Media inquiry message to a non-reproduced device; proof that the information generated in the non-reproduced device is included in the media inquiry message and information included in a media response message to generate a non-reproduced device media certification message; send the media response message And the non-reproducible device media certification information to the regenerable device; certifying the information generated in the regenerable device and included in the media response message and the information contained in the media's 1-sentence message to generate a renewable device media certification message ; And verifying the non-reproducible device media certification message with the reproducible device media certification message at the reproducible device. 94. The method of claim 93, wherein the regenerative device includes a counter to generate a count of the regenerable device included in the media inquiry message, and the method further includes the following steps: increment the non-reproducible device The regenerative device counts: and if the verification step is successful, the regenerative device counts are retransmitted at the regenerative device. 95. The method according to item 93 of the patent application, wherein the renewable device includes a random number generator for generating a random number of the renewable device included in the media inquiry message, and the method further includes the following steps: -70 -__ This paper size applies to Chinese national standards (〇 阳 > 八 4 规格 (21〇 > < 297 mm)) (Please read the precautions on the back before filling this page). -1r A8 B8 C8 D8 432852. The scope of the patent application is to increment the random number of the regenerative device at the non-regenerable device; and if the verification step is successful, the random number of the regenerative device is transmitted at the regenerative device. 96.-Preventing unauthorized access-System The information method includes a non-regenerating device and a renewable device. The method includes the following steps: (a) transmitting a sub-negotiation request from the non-regenerating device to the renewable device: (b) transferring a challenge and A status query is transmitted from the renewable device to the non-reproducible device: _ (c) determines whether the non-reproducible device and the regenerable device are in password synchronization; and (d) if the non-reproducible device is If neither the device nor the regenerative device is in the password synchronization, return to step (a). 97. If the method of the scope of the patent application is 96, it further includes the following steps: (e) determine whether the non-regenerative device and the regenerable device are in a packet. Synchronization: and (f) when the non-regenerating device and the regenerable device are in packet synchronization, 'the information is provided to the regenerable device in a separately numbered packet. Method, in which information is provided to a reproducible device in a default access response window, and the step of providing information further includes the following steps: a part of the information and the information are verified by the regenerable device in the default access response window Accepted. 99. For example, the method of applying for patent No. 98 in the patent park, wherein the renewable device contains -71-This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ----- „- --1 --- ^ ------ 1T ------ Λ --- (Please read the note on the back before filling this page) Printed by the Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 4328 52 A8 B8 C8 D8 Employees of the Central Bureau of Assistance, Ministry of Economic Affairs Printed by the Consumer Cooperatives 6. The patent application scope responds to the error counter of the regenerative device, and the verification step further includes the following steps: Verify that the general text transmitted from the regenerative device to the non-regenerative device is received by the non-regenerable device. The method of scope item 98, wherein the regenerative device includes an error counter in response to the regenerable device, and the verification step further includes the following steps: Verify that the information is received in the default access response window. 101. If applying for a patent The method of Fanyuan Item 98 further includes the following steps: When the verification is unsuccessful in the regenerative device, an error count is accumulated. 102. If the method of applying patent No. ιo1, further includes the following steps: if a preset error count description is recognized, the processing of the renewable device is suspended. 103. The method of claim 101, wherein the regenerative device includes a counter, which counts the number of errors before the verification step, and the method further includes the following steps: if the verification is unsuccessful, the counter is decremented to delete one of the errors Instructions. 104. For the method of applying for item 103 of the patent scope, wherein the error is reflected by a NACK. 105. The method of claim 104, wherein when the information is received before the preset access response window, the NACK count is not decremented. 106. If the method of applying for the patent item No. 98, wherein the default access response is __ -72- This paper size is applicable to China National Standards (CNS) A # now grid (210X297 mm) iiln I J-- J— n I-f Please read the notes on the back before filling out this page} Order / 1328 5 2 A8 6S C8 D8 VI. The scope of patent application window has a start time and a duration, and the method further includes The Central Laboratories of the Ministry of Economic Affairs printed the following steps: Set the start time and duration of the default access response window to respond to the challenge from the renewable device in step (b). 107. If the method according to item 97 of the patent application is applied, wherein if the regenerative device and the non-regenerative device are not in packet synchronization, step (b) further includes the following steps: instruct the regenerable device to become a packet with the non-regenerative device Synchronize. 108. The method of claiming scope 107 of the patent application, wherein the step of instructing the regenerable device to become a packet synchronization step further includes: transmitting an instruction from the non-regenerable device to the regenerable device, the instruction including a packet index; Set the reproducible device as the packet index; and return to step (b). 109. The method of claim 108, wherein the packet index is randomly selected in a challenge response time window. 110. The method of claim 96 further includes: If the non-regenerative and regenerative device is not cryptographically synchronized in step (c), a new challenge is issued. 111. If the method of applying for patent No. 96 in the patent application, wherein if no meaningful challenge is received from the renewable device, the method further includes the following steps: In step (a), send another seed negotiation request ^ 112. The method of Patent Fangu Item 96 further includes the following steps: a non-reproducing device requests the NACK status of the regenerative device; and judging whether the request is acknowledged from the challenge. ~ -73- (210X297, ^ 7 (Please read the precautions on the back first and then fill out this page). 1T A
TW88102581A 1998-02-20 1999-02-20 Information access control system and method TW432852B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US7543398P 1998-02-20 1998-02-20
US8176698P 1998-04-15 1998-04-15
US8173998P 1998-04-15 1998-04-15
US11600299P 1999-01-15 1999-01-15
US25301399A 1999-02-19 1999-02-19

Publications (1)

Publication Number Publication Date
TW432852B true TW432852B (en) 2001-05-01

Family

ID=27536053

Family Applications (1)

Application Number Title Priority Date Filing Date
TW88102581A TW432852B (en) 1998-02-20 1999-02-20 Information access control system and method

Country Status (1)

Country Link
TW (1) TW432852B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8549592B2 (en) 2005-07-12 2013-10-01 International Business Machines Corporation Establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platform
TWI708248B (en) * 2020-02-11 2020-10-21 華邦電子股份有限公司 Memory device and method of adjusting parameter used of memory device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8549592B2 (en) 2005-07-12 2013-10-01 International Business Machines Corporation Establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platform
TWI708248B (en) * 2020-02-11 2020-10-21 華邦電子股份有限公司 Memory device and method of adjusting parameter used of memory device

Similar Documents

Publication Publication Date Title
JP4206529B2 (en) Content management method and content storage system
CA2319538C (en) Information access control system and method
US6834346B1 (en) Content processing system
CN108028750B (en) License information management method and system, terminal, and computer-readable recording medium
CN101677010B (en) Content distribution system, recording device and method, reproduction device and method, and program
JP3759455B2 (en) Data playback device
JP5330488B2 (en) Method and apparatus for safely distributing content
EP1278331A1 (en) Content data storage
CN113326541B (en) Cloud edge collaborative multi-mode private data transfer method based on intelligent contract
JP4889637B2 (en) License management apparatus and method
JP2002259605A (en) Device and method for information processing and storage medium
KR20060025159A (en) User terminal for receiving license
CN101719205A (en) Digital copyright management method and system
EP2915085A1 (en) Content protection
CN102170448A (en) Copyright protection system, multimedia data transmitting and receiving equipment and method based on cloud media publishing platform
CN101606161A (en) Be used for definite supper-distribution and record the method for the price of product
JP3934941B2 (en) Recording device
JP2009140438A (en) Information processing apparatus and license distribution system
TW200306746A (en) Management method of rights of a content encrypted and stored in a personal digital recorder
Briscoe et al. Nark: Receiver-based multicast non-repudiation and key management
TW432852B (en) Information access control system and method
JP2003174439A (en) Distribution and storage system for digital contents
WO2000022539A1 (en) Information providing system
JP2002026835A (en) Limited reception method and system
JP2007310562A (en) Settlement method using electronic money

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees