AU1867700A - Electronic data storage and display apparatus - Google Patents
Electronic data storage and display apparatus Download PDFInfo
- Publication number
- AU1867700A AU1867700A AU18677/00A AU1867700A AU1867700A AU 1867700 A AU1867700 A AU 1867700A AU 18677/00 A AU18677/00 A AU 18677/00A AU 1867700 A AU1867700 A AU 1867700A AU 1867700 A AU1867700 A AU 1867700A
- Authority
- AU
- Australia
- Prior art keywords
- data
- data store
- encryption key
- electronic
- store
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/109—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Digital Computer Display Output (AREA)
Description
WO 00/38035 PCT/GB99/04219 Electronic data storage and display apparatus This invention relates to electronic data storage and display apparatus, and in particular to such apparatus 5 for the storage and display of electronic data that has commercial value such as electronically formatted books. With the advances in the fields of microchip and display screen technologies, and allied computing advances it is LO becoming increasingly economically viable to produce apparatus that is easily portable and can store, manipulate and display large quantities of electronic data. There is, however, often a reluctance on the part of the owners of that data to release it to members of 15 the public because of the ease of replication of electronic data. For data with commercial value such replication deprives the parties involved with the genesis and distribution of the data of a suitable reward for the production or distribution of that data. 20 For example, if the data when rendered legible by suitable software is the text of a book, then if the data becomes available to the public not under the control of a distributor, copyright owner or the like, then if electronic copies of that data may easily be 25 made, the publisher of that data and possibly others will suffer economic damage, for example being able only to sell fewer copies of a book than would otherwise be the case. 30 One approach is to render the data "copy-protected". This can be effective in some environments, though there is a widespread belief that copy-protection systems simply pose a challenge to those who would' ircumvent them. However, copy-protection systems which rely on 35 encryption and decryption of data provide some effectiveness, for example as described in WO 97/44736. However, the system is cumbersome and not always user -1- WO 00/38035 PCT/GB99/04219 friendly. Systems which have been proposed for use in this area include those described in EP-A-0665486, WO 95/08231 and W099/12087, though the last of these does not form part of the state of the art. All seek to 5 enhance the security against copying by using cryptographic techniques and generally require the use of encryption/decryption keys which are transmitted, after an authenticated request has been received, e.g. over a suitable communications link which has been 10 established for that purpose. The present invention provides apparatus for the transmittal, reception, storage and display of data in an electronic format in which there is provided a casing 15 that includes a data storage means, a data display means, and a data transmission/reception means including at least one output/input port,and wherein the data transmission/reception means includes means for decrypting received data and placing it in the data 20 storage means, encrypting and transmitting data from the data storage means and means for storing at least one encryption key, and characterised in that one encryption key references addresses in a portion of Read Only Memory forming part of the apparatus, and the content of 25 those addresses is used to encrypt/decrypt transmitted/received data. This approach, especially when used on a direct communications channel between user and information 30 provider, rather than via a wide area network such as the internet, is advantageous as there is never any need to engage in a key request dialogue. Instead, an encryption/decryption key may be generated and used by reference to the addresses of resident code areas in ROM 35 in the apparatus. This is explained in more detail below. -2- WO 00/38035 PCT/GB99/04219 In use, for example when the user of the apparatus wishes to obtain an electronic version of a book, the user connects the apparatus of the present invention to an appropriate source of electronic data in the 5 following manner: i) the apparatus enters into electronic communication with the data source and sends an identification code to the data source, 10 ii) the data source confirms the identity of the apparatus and thereby determines what encryption key to use in communicating with the apparatus, 15 iii) the user of the apparatus causes the apparatus to send a code to the data source identifying the data to be received by the apparatus, iv) the data source transmits the identified data in 20 encrypted form to the apparatus which decrypts that data and places it in the data storage means, v) the data source transmits a new encryption key to the apparatus, which key overwrites the previous 25 encryption key, and vi) the communication between the apparatus and the data source is broken. 30 By having the apparatus and the data source interact in this fashion, the electronic data is encrypted when it is travelling between the owners or distributors of the data and the legitimate end user of the data. Because the encryption key between the data source and the 35 apparatus is altered after each transaction, it will be very difficult for an illegitimate receiver of the data to decrypt that data. Even if that does prove possible, -3- WO 00/38035 PCT/GB99/04219 the illegitimate receiver only then gains the encryption key for one specific piece of apparatus the next time it connects to the data source and not the data source as a whole. 5 In a particularly preferred embodiment of the present invention the apparatus stores two encryption keys, one of which is stored in either Electronically Erasable Programable Read Only Memory or non-volatile Random 10 Access Memory, and the other of which is stored in Read Only Memory. The encryption key in the Electronically Erasable Programable Read Only Memory or non-volatile Random Access Memory is the key that is rewritten when the apparatus interacts with a data store. 15 In a preferred embodiment of the present invention, the encryption key in the Electronically Erasable Programable Read Only Memory or non-volatile Random Access Memory is 16 bytes in size. The portion of Read 20 Only Memory, the content of which is used to encrypt/decrypt transmitted/received data, is preferably 256 bytes in size. The data storage means in the apparatus of the present 25 invention is preferably non-volatile random access memory. It may, however, alternatively be in the form of a magnetic disk, built into the casing and so constructed that attempts to remove the disc would result in the destruction of at least the data on the 30 disc, or any other known data storage media which could be built into the casing. The method of communication between the apparatus of the present invention and the data store is most preferably 35 via the telephone network, and at least one input/output port in the casing is adapted to connect to that network most preferably via an electromagnetic radiation link. -4- WO 00/38035 PCT/GB99/04219 In alternative embodiments other methods of connection the data source are possible and at least one input/output port in the casing is appropriately configured for that connection. 5 In a preferred embodiment of the present invention, the display means includes a display screen and computer hardware and software to enable presentation of the data in graphical and/or textual form. The computer hardware 10 preferably includes user control means which will allow a user of the apparatus to move through the data in an appropriate fashion. The display screen of the present invention is preferably of sufficient size that the viewing area thereof is at least 110mm by 180mm. The 15 screen is preferably of a type that has a low power consumption. In an alternative embodiment of the present invention, the apparatus additionally includes known means for the 20 generation of sound. The sound generation means can be controlled by the computer software that controls the display means, or by independent control means. In this embodiment the reader of, for example, a book about ornithology may be played the sound of the bird which he 25 is reading about. It will be appreciated that the size of the data storage means in the apparatus of the present invention will be finite. As such, and to avoid the problem of either 30 having to delete and loose a previously acquired set of data, or having to acquire a new apparatus, the apparatus of the present invention is configured so that it can export some or all of the data stored in the data storage means. To prevent duplicatable and readable 35 copies of the data being exported, the apparatus is configured only to export the data in an encrypted form. -5- WO 00/38035 PCT/GB99/04219 It is clearly desirable that the exported data can be imported back onto the apparatus of the present invention, so that the data can be viewed again at a later date. 5 The data is preferably exported to and imported from a dedicated data store adapted to interact with the apparatus of the present invention. In the first preferred embodiment, the method of transfer of the data 10 is as follows: i) the apparatus enters into electronic communication with the data store which sends an identification code to the apparatus, 15 ii) the apparatus confirms the identity of the data store and thereby determines what data store encryption key to use in communicating with the data store, 20 iii) the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form, 25 iv) the receiver of the encrypted data decrypts that data and stores it, v) the apparatus transmits a new data store encryption key to the data store, which key overwrites the 30 previous data store encryption key, and vi) the communication between the apparatus and the data store is broken. 35 In a second preferred embodiment the method of transfer of the data is as follows: -6- WO 00/38035 PCT/GB99/04219 i) the apparatus enters into electronic communication with the data store, ii) the user of the apparatus causes the apparatus to 5 transfer preselected data between the apparatus and the data store in encrypted form, iii) the receiver of the data stores the data, and 10 iv) the communication between the apparatus and the data store is broken. In this second embodiment the data store stores the data in encrypted form. Preferably there is, however, a 15 little un-encrypted data attached to the encrypted data. That un-encrypted data can, for example, give an indication of the contents of the data, and/or the apparatus that placed the data in the data store and consequently the apparatus that can decrypt the data. 20 This will allow more than one piece of apparatus of the present invention to use the data store. In either of the two above described embodiments, the data transfer between the apparatus and the data store 25 can be either via electrical or optical cables or via electromagnetic radiation. The apparatus of the present invention may be provided with its own power source and/or means for taking power 30 from an external power source. In one particularly preferred embodiment of the present invention, the apparatus is provided with a computer chip that has the specification, details and method of 35 operation as follows: -7- WO 00/38035 PCT/GB99/04219 SPECIFICATION EEPROM: 16 bytes of key memory (addresses 0 - 15). 112 bytes of user memory (addresses 16 - 127). POWER: 5mA @5V when active 6mA @5V when writing to ceprom 1OuA @5V in power saving mode. CONVERSION RATE: approx. 30KPS. MASK LOOKUP TABLE Rom address 0 = 255 starting with address 0 = 255 the rom table is filled by 1 = 254 the following formula: 2 = 253 3 = 252 rom table[ address ] 255 - address 4 = 251 5=250 250 = 5 251 = 4 252 = 3 253=2 254= 1 255 = 0 ENCRYPTION/DECRYPTION OPERATION Version 1.0 of crypto uses a key length of 16 bytes. First write the 16 byte key to ceprom addresses 0 - 15. Each byte of key is used to access an 8 bit mask from within a 256 byte lookup table. Each data byte is encrypted/decrypted by exclusive oring it with the 8 bit mask. As each byte of data is encrypted/decrypted the mask is rotated one bit position to the left. After eight bit rotations a new mask is loaded using the next key in the sequence of sixteen. The sequence of masks will be repeated again when all sixteen have been used. 8 WO 00/38035 PCT/GB99/04219 OPERATION MODES EEPROM WRITE (mode 0) 1. Wait until BUSY line is a logic low. 2. Write number 0 (binary 00000000) to PORTO. 3. Wait until BUSY line is a logic low. 4. Write eeprom address (0 - 127) to PORTI. 5. Wait until BUSY line is a logic low. 6. Write eeprom data to PORT2. Steps 1 & 2 need only be done once to set eeprom write mode. DECRYPT DATA (mode 1) 1. Wait until BUSY line is a logic low. 2. Write number I (binary 00000001) to PORTO. 3. Wait until BUSY line is a logic low. 4. Write data for decryption to PORT2. 5. Wait until BUSY line is a logic low. 6. Read decrypted data from PORT3. Steps I & 2 need only be done once to set data decrypt mode. ENCRYPT DATA (mode 2) 1. Wait until BUSY line is a logic low. 2. Write number 2 (binary 00000010) to PORTO. 3. Wait until BUSY line is a logic low. 4. Write data for encyption to PORT2. 5. Wait until BUSY line is a logic low. 6. Read encrypted data from PORT3. Steps 1 & 2 need only be done once to set data encrypt mode. 9 WO 00/38035 PCT/GB99/04219 EEPROM READ (mode 3) 1. Wait until BUSY line is a logic low. 2. Write number 3 (binary 00000011) to PORTO. 3. Wait until BUSY line is a logic low. 4. Write eeprom address (0 - 127) to PORT2. 5. Wait until BUSY line is a logic low. 6. Read eeprom data from PORT3. Steps 1 & 2 need only be done once to set eeprom read mode. RESET COUNTERS (mode 4) This will reset the rotate counter & key index to zero. 1. Wait until BUSY line is a logic low. 2. Write number 4 (binary 00000100) to PORTO. POWER SAVING (mode 5) ThLis will put the crypto pcb into sleep mode. 1. Wait until BUSY line is a logic low. 2. Write number 5 (binary 00000101) to PORTO. 3. Wait until BUSY line is a logic zero before proceeding. Waking up the crypto unit from Power saving mode 1. Do a dummy read from PORTO or Write a new operation mode to PORTO. 2. Wait until BUSY line is a logic low before proceeding. 10 WO 00/38035 PCT/GB99/04219 20 WAY IDC CONNECTOR PIN OUT & DESCRIPTION 1. GND Power supply OV connection. 2. +5/3.3 VDC Power supply positive connection. 3. \RESET Active low external chip reset Leave disconnected if control of reset is not required. The chip takes approximately 80mS to reset after a low to high transition of the reset pin. 4. \RD Active low read control input 5. \WR Active low write control input 6. \CS Active low chip select input 7. AO Port address select input 8. Al Port address select input 9. D7 Bit 7 of bi-directional data bus. 10. D6 Bit 6 of bi-directional data bus. 11. D5 Bit 5 of bi-directional data bus. 12. D4 Bit 4 of bi-directional data bus. 13. D3 Bit 3 of bi-directional data bus. 14. D2 Bit 2 of bi-directional data bus. 15. Dl Bit I of bi-directional data bus. 16. DO Bit 0 of bi-directional data bus. 17. BUSY Active high busy output 18. \BUSY Active low busy output 19. RxD Serial data input (do not connect). 20. TxD Serial data output (do not connect). 1 1
Claims (1)
- ClaimsApparatus for the transmittal, reception, storage and display of data in an electronic format in which there is provided a casing that includes a data storage means, a data display means, and a data transmission/reception means including at least one output/input port, and wherein the data transmission/reception means includes means for decrypting received data and placing it in the data storage means, encrypting and transmitting data from the data storage means and means for storing at least one encryption key, and characterised in that one encryption key references addresses in a portion of Read Only Memory forming part of the apparatus, and the content of those addresses is used to encrypt/decrypt transmitted/received data..Apparatus according to claim 1 in which at least one encryption/decryption key is stored in a portion of either Electronically Erasable Programable Read Only Memory or non volatile Random Access Memory, and may be rewritten by an external key issuing computer .Apparatus according to claim 2 in which at least one encryption key is 16 bytes in size.Apparatus according to any one of claims 1 to 3 in which the Read Only Memory is at least 256 bytes in size.Apparatus according to any one of claims 1 to 4 in which the data storage means is comprised of non volatile Random Access Memory. Apparatus according to any one of claims 1 to 5 in which an output/input port is adapted to connect with a telephone socket via an electromagnetic radiation link.Apparatus according to any one of claims 1 to 6 in which the display means includes a display screen and computer hardware and software to enable presentation of the data in graphical and/or textual form.Apparatus according to any one of claims 1 to 7 which is provided with a computer chip that has the specification, details and method of operation as set out on attached sheets marked Al, A2 , A3, andA4.A method of using apparatus according to any one of claims 1 to 8 for the reception of electronic data from an external data source characterised in that:i) the apparatus enters into electronic communication with the data source and sends an identification code to the data source,ii) the data source confirms the identity of the apparatus and thereby determines what encryption key to use in communicating with the apparatus,iii) the user of the apparatus causes the apparatus to send a code to the data source identifying the data to be received by the apparatus,iv) the data source transmits the identified data in encrypted form to the apparatus which decrypts that data and places it in the data storage means,v) the data source transmits a new encryption key to the apparatus, which key overwrites the previous encryption key, andvi) the communication between the apparatus and the data source is broken.A method according to claim 9 in which the means of electronic communication between the apparatus and the data source is via the telephone network.A method according to claim 9 in which the means of electronic communication between the apparatus and the data source is via the internet.A method according to anyone of claims 9 to 11 in which the electronic data is electronically stored text and/or graphics.A method of using apparatus according to any one of claims 1 to 8 for the transfer of electronic data between the apparatus and an external data store characterised in that:i) the apparatus enters into electronic communication with the data store which sends an identification code to the apparatus,ii) the apparatus confirms the identity of the data store and thereby determines what data store encryption key to use in communicating with the data store,iii) the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form,iv) the receiver of the encrypted data decrypts that data and stores it,v) the apparatus transmits a new data store encryption key to the data store, which key overwrites the previous data store encryption key, andvi) the communication between the apparatus and the data store is broken.A method of using apparatus according to any one of claims 1 to 8 for the transfer of electronic data between the apparatus and an external data store characterised in that:i) the apparatus enters into electronic communication with the data store,ii) the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form,iii) the receiver of the data stores the data, andiv) the communication between the apparatus and the data store is broken.A method according to claim 14 in which the electronic data is transmitted from the data store to the apparatus, and is saved in the apparatus in decrypted form. A method according to claim 14 in which the electronic data is transmitted from the apparatus to the data store, and is saved in the data store in encrypted form, the encryption key being a permanent encryption key for that data held in the apparatus .A method according to any one of claims 13 to 16 in which the data store will on interrogation by the apparatus, provide the apparatus with a list of the data stored within the data store.A method according to any one of claims 13 to 17 in which the means of electronic communication between the apparatus and the data store is via electrical or optical cable.A method according to any one of claims 13 to 17 in which the means of electronic communication between the apparatus and the data store is via electromagnetic radiation.A method according to anyone of claims 13 to 19 in which the electronic data is electronically stored text and/or graphics.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB9828093.6A GB9828093D0 (en) | 1998-12-18 | 1998-12-18 | Electronic data storage and display apparatus |
| GB9828093 | 1998-12-18 | ||
| PCT/GB1999/004219 WO2000038035A1 (en) | 1998-12-18 | 1999-12-20 | Electronic data storage and display apparatus |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU1867700A true AU1867700A (en) | 2000-07-12 |
Family
ID=10844621
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU18677/00A Abandoned AU1867700A (en) | 1998-12-18 | 1999-12-20 | Electronic data storage and display apparatus |
Country Status (6)
| Country | Link |
|---|---|
| EP (1) | EP1159664A1 (en) |
| AU (1) | AU1867700A (en) |
| CA (1) | CA2355713A1 (en) |
| GB (2) | GB9828093D0 (en) |
| WO (1) | WO2000038035A1 (en) |
| ZA (1) | ZA200105908B (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| ES2236137T3 (en) | 2000-12-22 | 2005-07-16 | Nagravision Sa | METHOD OF ANTICLONATION. |
| GB2373597B (en) * | 2001-03-20 | 2005-02-23 | Hewlett Packard Co | Restricted data access |
| BR112013012356B1 (en) | 2010-11-19 | 2021-03-09 | Nagravision S.A. | method to detect cloned software |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2681165B1 (en) * | 1991-09-05 | 1998-09-18 | Gemplus Card Int | METHOD FOR TRANSMITTING CONFIDENTIAL INFORMATION BETWEEN TWO CHIP CARDS. |
| US5956034A (en) * | 1996-08-13 | 1999-09-21 | Softbook Press, Inc. | Method and apparatus for viewing electronic reading materials |
-
1998
- 1998-12-18 GB GBGB9828093.6A patent/GB9828093D0/en not_active Ceased
-
1999
- 1999-12-20 GB GB0117025A patent/GB2363649A/en not_active Withdrawn
- 1999-12-20 CA CA002355713A patent/CA2355713A1/en not_active Abandoned
- 1999-12-20 EP EP99962298A patent/EP1159664A1/en not_active Withdrawn
- 1999-12-20 WO PCT/GB1999/004219 patent/WO2000038035A1/en not_active Ceased
- 1999-12-20 AU AU18677/00A patent/AU1867700A/en not_active Abandoned
-
2001
- 2001-07-18 ZA ZA200105908A patent/ZA200105908B/en unknown
Also Published As
| Publication number | Publication date |
|---|---|
| GB9828093D0 (en) | 1999-02-17 |
| WO2000038035A1 (en) | 2000-06-29 |
| GB0117025D0 (en) | 2001-09-05 |
| CA2355713A1 (en) | 2000-06-29 |
| EP1159664A1 (en) | 2001-12-05 |
| GB2363649A (en) | 2002-01-02 |
| ZA200105908B (en) | 2002-02-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6367019B1 (en) | Copy security for portable music players | |
| US7337332B2 (en) | Transferring electronic content | |
| KR100503588B1 (en) | Storage device including a non-volatile memory | |
| CN100371847C (en) | Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof | |
| JP4857123B2 (en) | Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method | |
| US7933838B2 (en) | Apparatus for secure digital content distribution and methods therefor | |
| US20030046568A1 (en) | Media protection system and method and hardware decryption module used therein | |
| US20050210236A1 (en) | Digital rights management structure, portable storage device, and contents management method using the portable storage device | |
| US20040243488A1 (en) | Storage medium rental system | |
| JPH11328850A5 (en) | Data distribution device and data distribution terminal device | |
| NZ549543A (en) | Authentication between device and portable storage for digital rights management ( DRM ) | |
| JPH1069514A (en) | Financial transaction processing system | |
| WO2004109972A1 (en) | User terminal for receiving license | |
| NZ551221A (en) | Method and apparatus for playing back content based on digital rights management between portable storage and device and portable storage for the same | |
| US20040117639A1 (en) | Secure driver | |
| JPH07123086A (en) | Copyright communication management system using IC card | |
| JP2003018151A (en) | External storage device and certification method conducted between the external storage device and the system device, certification system, computer device and system device | |
| EP1146685A2 (en) | Decryption device | |
| JP2002099514A (en) | Digital data unauthorized use prevention method, digital data unauthorized use prevention system, registration device, distribution device, playback device, and recording medium | |
| JPH1020778A (en) | Encryption device and decryption device, and IC card | |
| AU1867700A (en) | Electronic data storage and display apparatus | |
| JP2001344216A (en) | Download system using memory card with record restriction information | |
| JP2002149061A (en) | Rental contents distribution system and method therefor | |
| JP2003281476A (en) | Communication system of ic card with cpu, ic card with cpu, management center and reading apparatus | |
| KR20030055713A (en) | The apparatus and method of digital contents's protection |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MK5 | Application lapsed section 142(2)(e) - patent request and compl. specification not accepted |