[go: up one dir, main page]

TWI313995B - Content protection method - Google Patents

Content protection method Download PDF

Info

Publication number
TWI313995B
TWI313995B TW95129510A TW95129510A TWI313995B TW I313995 B TWI313995 B TW I313995B TW 95129510 A TW95129510 A TW 95129510A TW 95129510 A TW95129510 A TW 95129510A TW I313995 B TWI313995 B TW I313995B
Authority
TW
Taiwan
Prior art keywords
server
client
encryption
digital content
encrypted
Prior art date
Application number
TW95129510A
Other languages
Chinese (zh)
Other versions
TW200810483A (en
Inventor
Scott Wu
Original Assignee
Corel Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Corel Inc filed Critical Corel Inc
Priority to TW95129510A priority Critical patent/TWI313995B/en
Publication of TW200810483A publication Critical patent/TW200810483A/en
Application granted granted Critical
Publication of TWI313995B publication Critical patent/TWI313995B/en

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Description

修正本 1313995 九、發明說明: 【發明所屬之技術領域】 本發明係有關-種數位内容保護方法,_是指—種可讓聲 影像資料湖容瓶妓全料_容用戶端之數仙護方二。 【先前技術】 當網際網路持續增_舰,提供乡舰給制者的内容提供 者數量正在增加,使用者麟以技格式來戦這些多舰,而非MODIFICATION 1313995 IX. DESCRIPTION OF THE INVENTION: TECHNICAL FIELD OF THE INVENTION The present invention relates to a digital content protection method, and _ refers to a kind of sound image data that can be used to make a bottle of water. Fang II. [Prior Art] As the Internet continues to increase, the number of content providers providing ship-to-shippers is increasing, and users are using the technical format to smash these multiple ships instead of

載-整個難’然而這__送的方鎮有許錄減且面 拙.蓟。 舉例而言’網_路連線賴具有足_雜來提㈣料傳輸, 不足的頻寬通常會讓視訊撥放出現延遲現象。 此外,如果個-個非安全的通賴道,轉者可以纖所 於内容槪n和内容用戶端的通訊。重播攻擊為—種攻擊者側錄下在 -段連線階段_有的通訊資料,之後攻擊者假触容舰器並且將 之前侧錄的資料傳送給另-個連線階段内的内容用戶端。 若攻擊者成功侧錄媒體内容且能狗偽裝成内容祠服器,内容提供 者將會損失-般將媒_容傳遞給用戶端所應得的可能娜卜 /、 此外’這些舰内容中可能存在敏感、機密資訊、私人 業機密,或是麵給特定用戶端__容,缺乏實作適# 序可能會讓媒體内容落入不適當的他人手中。 隻程 這些媒體能 甚者,一旦14些媒體内容不受到内容提供者的控制 夠輕易的被重新散播。 因此’當多媒體資料透過—個非安全的通道傳送時,有一 來保護多媒體内容是有其必要性的。 ^ 【發明内容】 為達本發明之目的與其他有利之處,錢服傳統方法的缺點本 發明之目的將於此具體且廣泛地贿,本㈣提供了—套内容保護系 1313995 修正本 統得以從内容伺服器透過非安全的通道來安全地遞交聲音/影像資料 給内容用戶端。 ’ 内容舰器和内容用戶端可以是硬體或是軟體模組。若通道並非 -個安全的通道’攻擊者可以織介於内容舰器與内容用戶端之間 所有的通訊,本發明的系統不僅可阻止攻擊者取得明文資料,也可 止重播攻擊。 對於每個連線階段來說’本發明_容保護系統由兩個步驟組合 而成,第一階段是用戶端-伺服器端相互認證並建立連線階段金鑰= 在此步驟’内容伺服器與内容用戶端驗證彼此的合法性,並且同時門 交換資訊’藉此伺服器和用戶端都能計算/取得同樣的連線階段^ 瑜。第二個步驟中,聲音/影像資料在於内容飼服器端使用此一連線 階段金鍮進行純,並細額戶端使賴魏錄進行解密。 本發明採用了對稱式加解密演算法作為其元件,這套内容保護系 統的優點是採計分著名的加解密演算法而非設計_個新的演算法'。、 舉例而言,可使用-套128位元之AES加解密演算法,由於其安全 性已經被廣為信任,而且它能夠以軟體實作並能進行高速運算,也 以低邏輯陳量的硬體實作。此外,這項加解密演算法也能夠以其: 區塊加解密演异法取代’如DES、Blowfish或RC4等等。 此外’如果某個版本的伺服器或是用戶端被發現能被成功攻擊, 它的辨識號碼將會被放到黑名單中,每侧服器和用戶端均擁有 黑名單,這個名單將會定期進行更新,若—台舰器發現—台用 的辨識號碼在這個黑名單中,它將會終結這個連線階段;若一台用戶 端發現概H的辨賊碼在聰黑料巾,它會終結連線二段。 底下藉由具體實施例配合所附的圖式詳加說明,當 = 發明之目的、技_容、特點及其所達成之功效。 易瞭解本 【實施方式】 底下將配合所附關式詳述本發gj之具體實施例,並盡可能在圖 1313995 修正本 式和敘述中使用相同的參考符號以代表同樣或是相似的部分。 請參考第1A圖,此為本發明中用戶端和飼服器端之通訊流之實施 例示意圖’並且參考第1B圖,其為本發明中證認程序之—實: 程圖。 抓 本發明之内容保護系麟第-步驟係“戶端·飼 證產生和連線階段金雜合而成,挑戰/回應程序如描述= 服器50和用戶端6〇進行彼此之間的互相驗證,並且也建立一個 P0b段金输。用在這個程序之巾的舰根據以下敘絲定義: —Load - the whole is difficult. However, this __ sent to the town has a record of reduction and face 拙.蓟. For example, the 'network_road connection' has a sufficient amount of material to transmit, and the insufficient bandwidth usually causes delays in video playback. In addition, if there is a non-secure channel, the transferer can communicate with the content user and the content client. The replay attack is an attacker who records the communication data in the - segment connection phase, and then the attacker falsely touches the ship and transmits the previously recorded data to the content client in the other connection phase. . If the attacker successfully records the media content and can disguise the dog as a content server, the content provider will lose the possibility of passing the media content to the user's possible Nabu/, and in addition, the contents of these ships may be The existence of sensitive, confidential information, private business secrets, or face to a specific user __ capacity, lack of practical implementation may cause media content to fall into the hands of inappropriate others. Only those media can do it, once 14 media content is not easily controlled by the content provider, it can be easily re-distributed. Therefore, when multimedia data is transmitted through an unsecured channel, it is necessary to protect multimedia content. ^ [Summary of the Invention] In order to achieve the object and other advantages of the present invention, the disadvantages of the traditional method of the present invention are the specific and extensive bribery of this invention. (4) provides a set of content protection system 1313995 Securely deliver voice/video data to content clients from content servers via non-secure channels. The content ship and content client can be hardware or software modules. If the channel is not a secure channel, the attacker can weave all the communication between the content ship and the content client. The system of the present invention not only prevents the attacker from obtaining the plaintext data, but also the replay attack. For each connection phase, the present invention is composed of two steps. The first phase is the client-server end mutual authentication and establishing the connection phase key = in this step 'content server Verify the legitimacy of each other with the content client, and at the same time, the door exchanges information 'by both the server and the client can calculate/obtain the same connection phase ^ Yu. In the second step, the sound/image data is used by the content feeder to use the connection stage to perform the pure, and the fine account to decrypt the Lai Weilu. The present invention employs a symmetric encryption and decryption algorithm as its component. The advantage of this content protection system is that it is a well-known encryption and decryption algorithm rather than a design_a new algorithm'. For example, the 128-bit AES encryption and decryption algorithm can be used, because its security has been widely trusted, and it can be implemented in software and can perform high-speed operations, as well as low-status hardware. Implementation. In addition, this encryption and decryption algorithm can also be replaced by its: block encryption and decryption algorithm [such as DES, Blowfish or RC4 and so on. In addition, if a version of the server or client is found to be successfully attacked, its identification number will be placed in the blacklist. Each server and client have a blacklist. This list will be periodically. To update, if the ship is found - the identification number for the station is in this blacklist, it will end the connection phase; if a user finds that the identification code of the H is in the black towel, it will End the second paragraph of the connection. The following is a detailed description of the specific embodiments with the accompanying drawings, when the purpose of the invention, the technical capabilities, characteristics and the effects achieved. BRIEF DESCRIPTION OF THE DRAWINGS [Embodiment] The specific embodiment of the present invention will be described in detail below with reference to the accompanying drawings, and the same reference numerals will be used in the drawings and the description of FIG. 1313995 to represent the same or similar parts. Please refer to FIG. 1A, which is a schematic diagram of an embodiment of a communication flow between a user end and a feeder end in the present invention, and refers to FIG. 1B, which is a true diagram of the verification procedure in the present invention. Grasping the content of the invention, the protection system is based on the "end of the household, the birth certificate and the connection stage, and the challenge/response procedure is as follows = the server 50 and the user terminal 6 are mutually interacting with each other. Verification, and also establish a P0b segment of gold. The ship used in this program of towels is defined according to the following: -

11 連接11 connection

φ XORφ XOR

Rl 一串由伺服器產生的128位元之亂數。Rl A string of 128-bit random numbers generated by the server.

Rz 一串由用户端產生的128位元之亂數。 X1 Κχ2 一組128位元的秘密金鑰,飼服器與用戶端將使用 其來在相互認證與連線階段金鑰產生期間保護之間 的資料交換。伺服器和用戶端都會將這組金鑰内建 於其中。 IDsRz A string of 128-bit random numbers generated by the client. X1 Κχ2 A set of 128-bit secret keys that the feeder and client will use to exchange data between mutual authentication and protection during the connection phase key generation. Both the server and the client will have this set of keys built into it. IDs

IDcIDc

Εκχΐ() Εκχ2() EcO 一串128位元的伺服器辨識號碼,伺服器提供這個 號碼給用戶端,讓用戶端知道在與那台伺服器進行 通訊。伺服器的每個版本皆有一獨特的辨識號碼, 所有同版本的伺服器都共享同一組辨識號碼。 一串128位元的用戶端辨識號碼,用戶端提供這個 號碼給伺服器’讓伺服器知道該使用哪一組秘密金 鑰。用戶端的每個版本皆有一獨特的辨識號碼,所 有同版本的用戶端都共享同一組辨識號碼。 使用Κχ·ι的AES加密程序。 使用Κχ2的AES加密程序。 使用共通金鍮的AES加密程序,共通金錄為一串所 1313995 修正本 有版本的伺服器與用戶端都知道的固定128位元長 度的金输。 Ksi 一串由伺服器產生的128位元亂數,用以作為一部 分的連線階段金錄。 KS2 一串由用戶端產生的128位元亂數,用以作為一部 分的連線階段金鑰。 Ks 連線階段金鑰 如第1A圖及第1B圖所示,認證程序1〇〇的步驟包含: 步驟105 飼服器50通知用戶端60開始認證程序; 步驟110 伺服器50傳送亂數①與Ec(丨Ds㊉Ri)至用戶端6〇; 步驟112 用戶端60使用共通金鑰來解密Ec(丨為 (IDs®Ri),然後取出 IDs ; 步驟113 用戶端60使用|DS來查詢秘密金錄組心1與心2 ; 步驟115 用戶端60產生亂數R2與Ks2。用戶端6〇使用AES 加密來產生序列叫丨EC(IDC㊉R2) |丨Εκχ2(ΡΗ|Κ32), 並將其傳送至伺服器5〇 ; 步驟120 伺服器50使用共通金输來將Ec(丨Dc0R2)解密成 (IDC㊉R2),接著取出丨Dc ; 步驟125 饲服器50使用|DC來查詢秘密金输組Κχι與& ; 步驟130 伺服器50使用Κχ2來將Ekx^D解密成⑻,丨丨 KS2,); 步驟135 右Rl不等於Rl,則認證失敗’且伺服器50會終結 此連線階段; 步驟140 伺服器50產生一組亂數Ksi ; 步驟145 伺服器50制AES加贿縣加密(R2丨丨Ksi)為 II KS1) ’並將其送給用戶端6〇 ; 步驟150 用戶端60使用秘密金輪Κχι來將Ekxi(R2丨丨Ks撕 修正本 1313995 密為(R2’ 丨| Ksi,); 步驟160若R2’不相等於R2,則認證失敗且用戶端6〇會終 結此連線階段。 、 請參考第1C圖,其為一本發明中連線階段金鑰建立程序16〇之 -實施例雜,在帛1B騎叙程雜权後,鱗軸段並未被 伺服器或是用戶端終結’相互認證已經成功,為了要建立連線階段金 . 鑰’伺服器和用戶端會執行下列步驟: 步驟165伺服器計算連線階段金鑰為Ks=Ksi㊉Ks2,; 步驟170用戶端計算連線階段金鑰為Ks,=Ks1,㊉KS2,KS,應 要與Ks相等。 ~ 或者,伺服器可以KS = EKs1( KS2,)計算連線階段金鑰,並且用 戶知可以KS = EKs1’( KS2)計算連線階段金錄為,KS,應該要與KS 相等。 、 第2A圖為本發明中數位内容之加密/解密流程2〇〇之一實施例流 程圖。 在第1B圖和第1C圖所述之認證程序1〇〇以及連線階段金鑰建立 机程160成功完成之後’將可開始進行聲音/影像的傳輪,力〇密/解密的 φ 程序200係根據下列步驟共同組合而成: 步驟205 伺服器使用連線階段金錄Ks與128位元AES加解 密演算法加密聲音/影像資料; 步驟210 用戶端使用連線階段金鑰Ks,將聲音/影像資料解密。 為了提供尚品質的影像,例如HDTV,必須可以提供如1920x1080 x30fps之相當高解析度影像,在此狀況下,未壓縮的影像串流的使用 頻寬(bitrate)將會很高,大約120 MByte/sec。因此,在第2A圖中所 描述的封包内容加密方法將會要求伺服器端與用戶端具有強大的運算 能力’只有快速的CPU可能是不夠的’顯示卡上的GPUs可能也不 夠快使用AES解密法來解密每秒i20Mbytes的資料。 1313995 修正本 因此在本發明之實施例中,使用另一種方式來加密影像封包内 容’對每個影像訊框而言’根據以下方法來產生一個128位元的數字 KFi,而Kr將會作為用來加密第j個影像訊框的訊框金鑰。 A =^(1), for i -1 KFi 二KFi—' ® EKs、KFi for i > 1 於第2B圖中描述的加密/解密方法22〇係由下列步驟組合而成: 步驟225 決定i ; 步驟230對每個i值,若i =1,伺服器使用Κπ加密整個影像 訊框; 步驟235 若丨> 1,伺服器使用Kr加密整個影像訊框。 在實施例中,使用KR加密影像訊框之方法為RC4串流加解密演 算法,用以加密整個影像訊框,RC4較AES有數倍快,本方法的優 點在於RC4是個人們信任並且相當完善的加解密演算法。 此外,為了避免使用RC4之方法還不夠快,本發明採用了另一種 方法來加密一個影像訊框。 如第2C圖所示’此為本發明中數位内容之加密/解密流程24〇之 一實施例流程圖,在此方法中,影像訊框被切割為複數巨集區塊 (macro-blocks),每個巨集區塊擁有16χ16像素。在實施例中,下列 符號被定義如下:Εκχΐ() Εκχ2() EcO A string of 128-bit server identification numbers. The server provides this number to the client to let the client know that it is communicating with that server. Each version of the server has a unique identification number, and all servers of the same version share the same set of identification numbers. A string of 128-bit client identification numbers, the client provides this number to the server 'to let the server know which set of secret keys to use. Each version of the client has a unique identification number, and all users of the same version share the same identification number. Use A·ι's AES encryption program. Use the AES encryption program of Κχ2. Using the common AES encryption program, the common record is a string of 1313995. The fixed version of the server and the client know the fixed 128-bit length of gold. Ksi A string of 128-bit random numbers generated by the server, used as part of the connection stage record. KS2 A string of 128-bit random numbers generated by the client to serve as part of the connection phase key. The Ks connection stage key is as shown in FIG. 1A and FIG. 1B. The steps of the authentication procedure 1包含 include: Step 105: The feeder 50 notifies the client 60 to start the authentication procedure; Step 110 The server 50 transmits the random number 1 and Ec (丨Ds 十 Ri) to the client 6〇; Step 112 The client 60 decrypts Ec using the common key (丨s(IDs®Ri), and then takes out the IDs; Step 113 The client 60 uses the |DS to query the secret record group Heart 1 and heart 2; Step 115 Client 60 generates random numbers R2 and Ks2. The client 6 uses AES encryption to generate a sequence called EC (IDC X R2) | 丨Ε κ χ 2 (ΡΗ | Κ 32), and transmits it to the server. Step 120: The server 50 uses the common gold input to decrypt Ec (丨Dc0R2) into (IDC ten R2), and then takes out 丨Dc; Step 125 The feeder 50 uses |DC to query the secret gold input group Κχι and & Step 130 The server 50 uses Κχ2 to decrypt Ekx^D into (8), 丨丨KS2,); Step 135 Right Rl is not equal to R1, then the authentication fails 'and the server 50 terminates the connection phase; Step 140 Server 50 Generate a set of random numbers Ksi; Step 145 Server 50 AES Plus Bribe County Encryption (R2丨丨Ksi) II KS1) 'and send it to the client 6〇; Step 150 The client 60 uses the secret gold wheel Κχι to Ekxi (R2丨丨Ks tear correction 1313995 is (R2' 丨| Ksi,); Step 160 if R2 'Not equal to R2, the authentication fails and the client 6〇 will terminate this connection phase. Please refer to Figure 1C, which is a connection stage key establishment procedure in the invention. After the B1B rides the miscellaneous power, the scaled axis segment is not terminated by the server or the client. ' Mutual authentication has been successful. In order to establish the connection phase, the key 'server' and the client will perform the following steps: Step 165 The server calculates the connection phase key as Ks=Ksi ten Ks2; Step 170 The user calculates the connection phase key as Ks, =Ks1, ten KS2, KS, which should be equal to Ks. ~ Alternatively, the server can be KS = EKs1 ( KS2,) Calculate the connection phase key, and the user knows that KS = EKs1' (KS2) can be used to calculate the connection stage, and KS should be equal to KS. Figure 2A shows the encryption of digital content in the present invention. Flowchart of one embodiment of the decryption process 2. In Figure 1B and Figure 1C After the authentication procedure 1 and the connection stage key establishment process 160 are successfully completed, 'the sound/image transmission can be started, and the φ program 200 of the compact/decryption is combined according to the following steps: Step 205: The server encrypts the sound/image data by using the connection stage Jins Ks and the 128-bit AES encryption and decryption algorithm; Step 210 The user uses the connection stage key Ks to decrypt the sound/image data. In order to provide a quality image, such as an HDTV, it is necessary to provide a relatively high resolution image such as 1920x1080 x 30fps. In this case, the bitrate of the uncompressed video stream will be very high, about 120 MByte/ Sec. Therefore, the packet content encryption method described in Figure 2A will require strong computing power on the server side and the client side. 'Only a fast CPU may not be enough'. The GPUs on the display card may not be fast enough to use AES decryption. To decrypt the data of i20Mbytes per second. 1313995 Amendment Thus, in an embodiment of the present invention, another method is used to encrypt the image packet content 'for each image frame' to generate a 128-bit digital KFi according to the following method, and Kr will be used as To encrypt the frame key of the jth video frame. A =^(1), for i -1 KFi Two KFi-' ® EKs, KFi for i > 1 The encryption/decryption method 22 described in Figure 2B is a combination of the following steps: Step 225 Decide i Step 230 For each i value, if i =1, the server encrypts the entire video frame using Κπ; Step 235 If 丨> 1, the server uses Kr to encrypt the entire video frame. In the embodiment, the method of using the KR encrypted video frame is the RC4 stream encryption and decryption algorithm for encrypting the entire image frame, and the RC4 is several times faster than the AES. The advantage of the method is that the RC4 is trusted and quite perfect. The encryption and decryption algorithm. Furthermore, in order to avoid the RC4 method being fast enough, the present invention employs another method of encrypting an image frame. As shown in FIG. 2C, 'this is a flowchart of an embodiment of the encryption/decryption process 24 of digital content in the present invention. In this method, the image frame is cut into complex macro-blocks. Each macro block has 16χ16 pixels. In the embodiment, the following symbols are defined as follows:

Mi 在此影像訊框中第i個巨集區塊。 W 该影像訊框的寬度,以像素為單位。 5亥影像訊框的高度,以像素為單位。 P 一個質數,其也與(W/16)互質。 S(Mi) 使用一個輕量級的演算法打亂Mi,例如3 CPUcycle/byte 〇 加密的方法240係由下列步驟組合而成: 步驟245 決定i ; 1313995 修正本 步驟250對每個丨值,若I (mod PH,使用RC4加密从; 步驟255 若i (mod 1,則將Mi加密為: 夕(於LG-1)/#尸+1)㊉从i 這個方法將比全部使用RC4來加密影像的方法快上約p倍。 請參考第3圖,此為本發明中數位内容之銷毀流程3〇〇之^施例 流程圖。 若飼服器或用戶端的版本被認定為會產生危害,其辨識號碼將會 被放入一黑名單之中,每個伺服器和用戶端都擁有這張黑名單,這份 •名單將會被定時更新’第3圖所述之銷毀程序300由下列步驟組合: 成: 〇 步驟305 步驟310 步驟315 步驟320 用戶端自伺服器端收到IDS ; 用戶端判定該IDs是否在黑名單中; 若4丨Ds在黑名單中,用戶端結束此連線階段; 飼服器自用戶端接收到丨Dc; 步驟325恤器端判定該丨Dg是否在黑名單中; 步驟330若該丨Dc在黑名單中,舰器結束此連線階段。Mi is the i-th macro block in this video frame. W The width of the image frame, in pixels. The height of the 5th image frame, in pixels. P is a prime number, which is also compatible with (W/16). S(Mi) uses a lightweight algorithm to scramble Mi, for example, 3 CPUcycle/byte 〇 Encryption method 240 is composed of the following steps: Step 245 decides i; 1313995 Correct this step 250 for each threshold, If I (mod PH, use RC4 encryption from; step 255 if i (mod 1, then encrypt Mi to: eve (in LG-1) / #尸+1) ten from i this method will use RC4 to encrypt than all The method of image is about p times faster. Please refer to Figure 3, which is a flow chart of the process of destroying the digital content in the present invention. If the version of the feeder or the client is deemed to be harmful, The identification number will be placed in a blacklist. Each server and client has this blacklist. This list will be updated regularly. The destruction procedure 300 described in Figure 3 consists of the following steps. Combination: into: 〇 Step 305 Step 310 Step 315 Step 320 The client receives the IDS from the server; the client determines whether the IDs are in the blacklist; if 4丨Ds is in the blacklist, the client ends the connection phase The feeding device receives the 丨Dc from the user end; the step 325 determines the 丨Dg Whether it is in the blacklist; Step 330 If the 丨Dc is in the blacklist, the player ends the connection phase.

用戶端在傳送資料給伺服器前將查驗黑名單,如第1B圖中之步』 115所述,*舰器在傳送資·帛戶端祕查驗黑,如 中之步驟140所述。 1 太恭”Γ稱式加解密演算法做為其組成元件,但須註明的是 寅算法,舉例而言,使請位元AES= 古ill疋目广任其安全性’而且它能夠以軟體實作並能進行 ί=^=梅代俯S、8丨_料^等等 發明實施之範圍。故即;實施例而已’並非用來限定本 及精·•或修 11 1313995 修正本 【圖式簡單說明】 第1A圖為本發明中用戶端和伺服器端之通訊流之實施例示意圖。 第1B圖為本發明中一認證程序之流程圖。 第1C圖為本發明中一連線階段金瑜建立程 第2A圖至第2C圖為本發明中數位内容加=圖。 第3圖為本發明中—銷毀程序之流程圖。雜序之流輕圖。 【主要元件符號說明】 。 5〇伺服器 60用戶端The client will check the blacklist before transmitting the data to the server, as described in step 1B of Figure 1B, and the ship is inspected by the client, as described in step 140. 1 Tai Gong's nickname encryption and decryption algorithm is used as its component, but it must be noted that the algorithm is used, for example, to make the bit AES = Gu 疋 广 广 广 广 安全 安全 security and 'software The implementation can be carried out ί=^=Meidei S, 8丨_material^, etc. The scope of the invention is implemented. Therefore, the embodiment is not used to limit the essence and/or repair 11 1313995 BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1A is a schematic diagram of an embodiment of a communication flow between a client and a server in the present invention. FIG. 1B is a flow chart of an authentication procedure in the present invention. FIG. 1C is a connection stage gold in the present invention. Fig. 2A to Fig. 2C are diagrams showing the digital content plus = map in the present invention. Fig. 3 is a flow chart of the destruction procedure in the present invention. The flow diagram of the miscellaneous sequence. [Description of main component symbols]. Server 60 client

1212

Claims (1)

修正本 1313995 十、申請專利範圍: 一種數位内容保護方法,包括: 一用戶端與伺服器互相認證程序,其包含以下步驟: 伺服器通知用戶端開始該認證程序; 伺服器送出亂數R1與Ec(丨Ds®Ri)至用戶端,其中Ec係利用一公 共金鑰進行加密動作,而IDs為該伺服器之一識別號碼; 用戶端使用該公共金鑰將EcODseRi)解密為(IDs㊉Ri),並從中取 得 IDs ; 用戶端透過丨Ds找出加密金錄對Κχΐ及Κχ2 ; 用戶端產生亂數R2與KS2 ; 該用戶端利用加密方法產生要送給伺服器的r2丨丨Ec(IDc㊉R2) |丨 Ekx2(R1 |丨Ks2) ’ IDC為該用戶端之一識別號碼,Εκχ2則利用秘密 金矯Κχ2加密; 伺服器使用該公共金鑰將Ec(IDc㊉R2)解密為(IDc㊉R2),並從中 取得丨Dc ; 飼服器透過丨Dc找出加密金鑰對Κχι與Κχ2 ; 伺服器利用Κχ2將Εκχ2(Ρ^丨| Ks2)解密得到(Ri,丨| Ks2,); 其中,若R1’不等於R1,則認證程序失敗,且伺服器終止; 伺服器產生亂》數Ksi ; 5亥伺服器利用加密方法將闩2丨丨心❿密得到要送給伺服器之 2丨丨Ks1) ’此Εκχ1係利用秘密金鑰kx1加密; 伺服器利用秘密金鑰Km將Ekxi(R2丨丨Ksi)解密得到(R2,丨丨Ks1,); 其中,若R2’不等於R2,則認證程序失敗,且用戶端終止;以及 一連線階段金錄建立程序,其包含以下步驟: 飼服器計算Ks1㊉KS2得到連線階段金錄Ks ;以及 用戶端計算Ks1’ Θ Ks/得到連線階段金鑰Ks,; 其中,Ks’即為Ks。 13 修正本 1313995 如申明專利制第1項所述之數位内容倾方法,更. 一資料加解密程序,其包含下列步驟: g 階段金鑰KS及一密碼將該影音資料加密;以及 3」 姐階段錢KS’職聲音/影像資料解密》 凊專利範園第1項所述之數位内容保護方 5 :其一係 6·=:=:=^r法,該_ _ 位内容保護方法’™影 每一影像訊框中之一 128位元號碼KR係由下式產生: KF, =^(1), for i = 1 f〇r j > j 個訊框之—訊框金鍮為KR,"^第ith個訊框係利用 圍第6項所述之數位内容保護方法,其中該聲音/影 8_如申过、利,一扣4串流密碼將一整個影像訊框加密。 像她圍第6項所狀數位内絲護方法,其巾該聲音/影 9豕貝^係利用一 AES密碼加密。 利軸第6項所述之數位内容保護方法,其中該聲音/影 像貝j利用下列步驟進行加密: 對每^像訊框分割成複數巨集區塊(macro_bl〇cks); 1值而言,若i (mod P) = 1,則利用RC4將Mi加密;以 及 右丨(m〇d 1,則將Mi以下式加密: 1313995 修正本 夕(从Lg-ivpJxp+i)㊉风· 該Mi係為該影像訊框中第jth個巨集區塊,w為該影像訊框之寬 度,以像素為單位,Η為該影像訊框之高度,以像素為單位; Ρ為一質數,其亦與(W/16)互質,以及S(M〇利用一輕量級演 算法打亂Mi。 10_如申請專利範圍第9項所述之數位内容保護方法,其中每一該巨集 訊框包含16Ί6像素。 11.如申請專利範圍第1項所述之數位内容保護方法,更包括: 一銷毀程序,利用一會產生危害之伺服器及用戶端之黑名單,該銷 毀程序包括下列步驟: 用戶端接收伺服器之IDs ; 用戶端判斷該旧s是否在該黑名單中; 若該IDs在該黑名單中,則用戶端中止與伺服器之連線; 伺服器接收用戶端之旧。; 伺服器判斷該IDC是否在該黑名單中;以及 若該丨Dc在該黑名單中,則伺服器中止與用戶端之連線。 12_ —種數位内容保護方法,包括: 一用戶端與伺服器互相認證程序,其包含以下步驟: 伺服器通知用戶端開始該認證程序; 伺服器送出亂數R1與Ec(IDs㊉R1)至用戶端,其中Ec係利用_ 公共金鑰進行加密動作,而IDs為該伺服器之一識別號碼; 用戶端產生亂數R2與KS2 ; 該用戶端利用加密方法產生要送給伺服器的R2丨丨Ec(丨Dce R2) II Ekx2(R1丨丨Ks2),IDc為該用戶端之一識別號碼,Εκχ2則利用秘 密金錄ΚΧ2加密; 伺服器使用該公共金鑰將Ec(丨Dce Rz)解密為(丨Dc@ A),並從 中取得IDc ; 15 修正本 1313995 伺服器透過丨Dc找出加密金鑰對匕幻與^ ; 伺服器利用Κχ2將Ekx2(R1丨丨Ks2)解密得到(%,丨丨KS2,); 其中’若R·!’不等於&,則認證程序失敗,且伺服器終止; 伺服器產生亂數KS1; ' 該伺服器利用加欲方法將R2|| Ks*i加密得到要送給飼服器之 Ekx1(R2丨丨Ksi) ’此Εκχΐ係利用秘密金鑰κχ1加密; 伺服器利用秘密金鑰Κχ1將Εκχ# |丨Ks1)解密得到(r2,丨丨Ksi,); 其中,若R2’不等於R2,則認證程序失敗,且用户端終止;以及 一連線階段金錄建立程序,其包含以下步驟: 伺服器計算Ks1 Θ Ks2得到連線階段金瑜Ks ; 用戶端計算Ks1’㊉Ks2’得到連線階段金鑰|<s,; 其中,Ks’即為Ks ;以及 一資料加解密程序,其包含以下步驟: 伺服器將聲音/影像資料以連線階段金鑰Ks及電子密碼本 模式(electronic code book mode)中之一密碼加密: 及 以 用戶端利用連線階段金鑰KS,將該聲音/影像資料解 13.如申請專利範圍第12項所述之數位内容保護方法其中該。山 係利用AES加密來產生R2 || EC(IDC Θ R2)丨丨Ekx2(Ri丨、丨Ks=戶端 14·如申請專利範圍第12項所述之數位内容保護方法,其中H i ^ 係利用AES加密將的丨| Ks〇加密成EKx1(R2丨丨Ksi):、…1服器 15.如申請專利範圍第彳2項所述之數位内容保護方法,其 影像資料係利用一 128位元之AES密碼來加密。、、聲音/ 16·如申請專利範圍第12項所述之數位内容保護方法其 影像資料係使用下列步驟進行加密: 、5亥聲音/ 每一影像訊框中之一 128位元號碼KFi係由下式產生. 16 修正本Amendment 1313995 X. Patent application scope: A digital content protection method, comprising: a client-server mutual authentication procedure, comprising the following steps: The server notifies the user to start the authentication procedure; the server sends the random numbers R1 and Ec (丨Ds®Ri) to the client, where Ec uses a public key for encryption, and IDs identifies the number for one of the servers; the client uses the public key to decrypt EcODseRi) to (IDs Ten Ri), and The IDs are obtained from the client; the client finds the encrypted record pair Κχ and Κχ2 through 丨Ds; the user generates the random number R2 and KS2; the client uses the encryption method to generate r2丨丨Ec (IDc10 R2) to be sent to the server | Ekx2(R1 |丨Ks2) ' IDC is the identification number of one of the clients, and Εκχ2 is encrypted with the secret gold correction 2; the server decrypts Ec (IDc ten R2) into (IDc ten R2) using the public key, and obtains 丨Dc from it. The feeding device finds the encryption key pair Κχι and Κχ2 through 丨Dc; the server decrypts Εκχ2(Ρ^丨| Ks2) by Κχ2 (Ri, 丨| Ks2,); wherein, if R1' is not equal to R1, then The certificate fails and the server terminates; the server generates a chaotic number Ksi; 5H server uses the encryption method to encrypt the latch 2 to get the 2Ks1) to be sent to the server. 'This Ε χ χ 1 system uses the secret The key kx1 is encrypted; the server decrypts Ekxi (R2丨丨Ksi) by using the secret key Km (R2, 丨丨Ks1,); wherein, if R2' is not equal to R2, the authentication procedure fails, and the client terminates; And a connection stage gold record establishing procedure, which comprises the following steps: the feeding machine calculates Ks1 ten KS2 to obtain the connection stage gold record Ks; and the user end calculates Ks1' Θ Ks/ to obtain the connection stage key Ks; wherein Ks' That is Ks. 13 Amendment 1313995 The digital content dumping method described in item 1 of the patent system, a data encryption and decryption program, comprising the following steps: g stage key KS and a password to encrypt the video material; and 3" sister Stage money KS' job sound/image data decryption 凊 Patent range Fangyuan first item digital content protection party 5: its series 6·=:=:=^r method, the _ _ bit content protection method 'TM One of the 128-bit numbers KR in each video frame is generated by: KF, =^(1), for i = 1 f〇rj > j frames - the frame is KR, "^ The first ith frame uses the digital content protection method described in item 6, wherein the sound/shadow 8_such as Shen, Li, and a 4-stream password encrypts an entire image frame. Like her method of wire protection in the sixth item, the sound/shadow of the towel is encrypted with an AES password. The digital content protection method according to Item 6, wherein the sound/image is encrypted by the following steps: dividing each image frame into a plurality of macro blocks (macro_bl〇cks); If i (mod P) = 1, use RC4 to encrypt Mi; and right 丨 (m〇d 1, then Mi is encrypted as follows: 1313995 Amendment eve (from Lg-ivpJxp+i) Ten Wind · The Mi system For the jth macroblock in the image frame, w is the width of the image frame, in pixels, and the height of the image frame is in pixels; Ρ is a prime number, which is also (W/16) mutual quality, and S (M〇 uses a lightweight algorithm to disrupt Mi. 10_, as described in claim 9, the digital content protection method, wherein each of the macro frames contains 16. 6 pixels. 11. The digital content protection method described in claim 1 of the patent scope further includes: a destruction procedure, using a blacklist of servers and users that cause harm, the destruction procedure comprising the following steps: Receiving the ID of the server; the client determines whether the old s is in the blacklist; The IDs are in the blacklist, the client terminates the connection with the server; the server receives the old end of the client; the server determines whether the IDC is in the blacklist; and if the 丨Dc is in the blacklist The server terminates the connection with the client. 12_ - A digital content protection method, comprising: a client-server mutual authentication program, comprising the following steps: the server notifies the user to start the authentication procedure; the server sends out Random numbers R1 and Ec (IDs ten R1) to the client, where Ec uses the _ public key for encryption, and IDs is the identification number of one of the servers; the user generates random numbers R2 and KS2; the client uses the encryption method Generate R2丨丨Ec(丨Dce R2) II Ekx2(R1丨丨Ks2) to be sent to the server, IDc is one of the identification numbers of the client, and Εκχ2 is encrypted by the secret gold record ;2; the server uses the public gold The key decrypts Ec(丨Dce Rz) into (丨Dc@A) and obtains IDc from it; 15 Fix this 1313995 server to find the encryption key pair 匕 与 and ^ through 丨Dc; the server uses Κχ2 to Ekx2 (R1丨丨Ks2) decrypted (%, 丨丨 KS2,); where 'If R·!' is not equal to &, the authentication procedure fails, and the server terminates; the server generates a random number KS1; 'The server uses the add-on method to R2|| Ks*i encryption gets Ekx1 (R2丨丨Ksi) to be sent to the feeding device. 'This Ε χΐ is encrypted with the secret key κχ1; the server decrypts Εκχ# |丨Ks1) using the secret key Κχ1 (r2,丨丨Ksi,); wherein, if R2' is not equal to R2, the authentication procedure fails, and the client terminates; and a connection phase record creation procedure, which includes the following steps: The server calculates Ks1 Θ Ks2 to obtain the connection phase gold Yu Ks; the client calculates Ks1 'Ten Ks2' to get the connection stage key|<s,; where Ks' is Ks; and a data encryption and decryption program, which includes the following steps: The server will sound/image data One of the connection stage key Ks and the electronic code book mode: and the user uses the connection stage key KS to solve the sound/image data. Digital content protection method In this. The mountain system uses AES encryption to generate R2 || EC (IDC Θ R2) 丨丨 Ekx2 (Ri 丨, 丨 Ks = terminal 14), as described in claim 12, the H i ^ system Encryption of 丨| Ks〇 by AES encryption into EKx1 (R2丨丨Ksi):,...1 server 15. The digital content protection method described in item 2 of the patent application, the image data is a 128-bit image AES password is used to encrypt.,, sound / 16 · The digital content protection method described in claim 12, the image data is encrypted using the following steps: , 5 hai sound / one of each video frame The 128-bit number KFi is generated by the following formula. 16 Revision KFi,且第ith個訊框係利用 1313995 ⑴, for f〇r 其中該第ith個訊框之-訊框金输為 Kr來加密。 Ίΐί:範圍第12項所述之數位内容保護方法,其中該聲音/ 〜俅^係利用—RC4串流密碼將—整個影像訊框加密。 岑:C範圍第12項所述之數位内容保護方法,其中該聲音, 〜像資枓係利用一 AES密碼加密。 19.如申請專利範圍第12項所述之數位内容保護方法,其中該聲音, 影像資料係利用下列步驟進行加密: 將二影像訊框分割成複數巨集區塊 (macro-blocks); ,每一丨值而言’若丨(mod p) = i,則利用RC4將从加密;以及 若i (mod ρμ !,則將Mi以下式加密: $(崎(,_1)/p 知+1)㊉ % 该Mi係為該影像訊框中第ith個巨集區塊,W為該影像訊框之寬 度’以像素為單位’ Η為該影像訊框之高度,以像素為單位;p為 一質數’其亦與(w/16)互質,以及s(Mi)利用一輕量級演算法打亂 Mi。 2〇_如申請專魏圍第19項所述之數㈣容保護方法,其巾該每一該 巨集訊框包含16*16像素。 21_如申請專利範圍第12項所述之數位内容保護方法,更包括: 一銷毀程序’利用一會產生危害之伺服器及用戶端之黑名單,該銷 毁程序包括下列步驟: 伺服器接收用戶端之IDC ; 飼服器判斷該IDC是否在該黑名單中; 若該IDC在該黑名單中,則伺服器中止與該用戶端之連線; 用戶端接收伺服器之IDS ; 17 1313995 修正本 用戶端判斷該IDS是否在該黑名單中;以及 若該丨Ds在該黑名單中’則用戶端中止與該伺服器之連線。 22. —種數位内容保護方法,包括: 一用戶端與词服器互相認證程序,其包含以下步驟: 伺服器通知用戶端開始該認證程序; 伺服器送出亂數尺1與匕(丨Ds0R1)至用戶端,其中巳係利用一 公共金鑰進行加密動作,而丨Ds為該伺服器之一識別號碼; 用戶端產生亂數R2與KS2 ; 该用戶端利用加密方法產生要送給伺服器的R2丨丨Ec(丨Dc φ叫|丨 Ekx2(Ri II Ks2) ’ IDc為該用戶端之一識別號碼,Εκχ2則利用秘 密金输Κχ2加密; 伺服器使用該公共金鑰將Ec(IDc0 R2)解密為(IDc㊉R2),並從 中取得丨Dc; 伺服器透過IDC找出加密金鑰對匕幻與^ ; 伺服器利用KX2將曰似⑻|| KS2)解密得到(FV || KS2,); 其中,右Rl’不等於Rl,則認證程序失敗,且伺服器終止; 飼服器產生亂數KS1 ; Sx飼服器利用加密方法將R2丨| Ks<|加密得到要送給飼服器之 E=(R2 II KS1),此Εκχΐ係利用秘密金鑰κχ1加密; 用戶端^用秘密金錄Κχι將Ekxi(R2 π Μ解密得到(R2, H Ks尔 其中,右1¾不等於R2,則認證程序失敗,且用戶端終止; 階段麵建立程序,其包含以下步驟: 計算KS1㊉心2制連線階段金瑜Ks ;以及 用戶端計算Ks1,㊉Ks2,得到連線階段金鍮Ks,; 其中’ Ks’即為ks ; 一資料加解密程序,其包含下列步驟: 5艮器將聲曰/影像資料以連線階段金錄Ks及電子密碼本模式 18 1313995 修正本 (electronic code book mode)中之一密碼加密;以及 用戶端利用連線階段金鑰KS,將該聲音/影像資料解密;以及 一銷毀程序,利用一會產生危害之伺服器及用戶端之黑名單, 該銷毀程序包括下列步驟: 伺服器接收用戶端之IDC ; 伺服器判斷該IDC是否在該黑名單中;KFi, and the ith frame is encrypted by using 1313995 (1), for f〇r, where the frame of the ith frame is Kr. Ίΐί: The digital content protection method according to the item 12, wherein the sound/~俅 is encrypted by the RC4 stream password.岑: The digital content protection method described in item 12 of the C range, wherein the sound, such as the asset system, is encrypted using an AES password. 19. The digital content protection method of claim 12, wherein the sound and image data are encrypted by the following steps: dividing the second image frame into a plurality of macro-blocks; For a value, if mod p = i, then RC4 will be used for encryption; and if i (mod ρμ !, then Mi will be encrypted as follows: $(崎(,_1)/p +1) Ten% The Mi is the ith macroblock in the image frame, and W is the width of the image frame 'in pixels'. The height of the image frame is in pixels; p is one. The prime number 'is also compatible with (w/16), and s(Mi) uses a lightweight algorithm to disrupt Mi. 2〇_If applying for the number (4) capacity protection method described in item 19 of Wei Wei, Each of the macro frames contains 16*16 pixels. 21_ The digital content protection method described in claim 12 of the patent application further includes: a destruction procedure to utilize a server and a client that will cause harm The blacklist, the destruction procedure includes the following steps: The server receives the IDC of the client; the feeder determines whether the IDC is in the black name If the IDC is in the blacklist, the server suspends the connection with the client; the client receives the IDS of the server; 17 1313995 corrects that the client determines whether the IDS is in the blacklist; The 丨Ds is in the blacklist', then the client terminates the connection with the server. 22. A digital content protection method, comprising: a client and a vocabulary mutual authentication program, comprising the following steps: Notifying the client to start the authentication procedure; the server sends a random number 1 and 匕 (丨Ds0R1) to the client, wherein the system uses a public key for encryption, and the 丨Ds identifies the number of the server; The end generates random numbers R2 and KS2; the client uses the encryption method to generate R2丨丨Ec to be sent to the server (丨Dc φ is called|丨Ekx2(Ri II Ks2)' IDc is one of the identification numbers of the client, Εκχ2 Then use the secret gold transmission 2 encryption; the server uses the public key to decrypt Ec (IDc0 R2) to (IDc ten R2), and obtain 丨Dc from it; the server finds the encryption key pair 匕 与 and ^ through the IDC; Using KX2 will be similar (8)|| KS2) decrypted to get (FV || KS2,); where, right Rl' is not equal to Rl, the authentication procedure fails, and the server terminates; the feeding device generates random number KS1; Sx feeding device uses encryption method R2丨| Ks<|Encryption gets E=(R2 II KS1) to be sent to the feeding device, and this Εκχΐ is encrypted with the secret key κχ1; the user terminal ^ uses the secret gold record Κχι to decrypt Ekxi (R2 π Μ ( R2, H Ks, where the right 13⁄4 is not equal to R2, the authentication procedure fails, and the client terminates; the phase plane establishment procedure includes the following steps: calculating the KS1 ten heart 2 connection phase Jin Yu Ks; and the client computing Ks1 , 10 Ks2, get the connection stage gold 鍮Ks,; 'Ks' is ks; a data encryption and decryption program, which includes the following steps: 5 将 将 曰 影像 影像 影像 影像 影像 影像 影像 影像 影像 影像 影像 影像 影像 影像 影像 影像This mode 18 1313995 one of the electronic code book mode encryption; and the user side uses the connection stage key KS to decrypt the sound/image data; and a destruction procedure, using a server that will cause harm And the blacklist of the client The destruction program comprising the steps of: the server receiving the client IDC; server determines whether the IDC in the blacklist; 若該丨Dc在該黑名單中,則伺服器中止與該用戶端之連線; 用戶端接收伺服器之IDs ; 用戶端判斷該IDs是否在該黑名單中;以及 乃u若該丨DS在該黑名單中,顧戶端中止與該魏器之連線》 如申請專纖圍第22項騎之數仙容賴方法,其 係利用AES加密來產生R2 n Ec(IDce R2) N EMRi" κ㈤。 咖第22項所述之數位内容保護方法,其中該伺服器 调用AES加密將(r2丨丨KS1)加密為Ekx1(R2丨丨Ksi)。 25_如申請專利範圍第22項所述之數位内容保護方法 影像資料係利用-128位元之AES密碼加密。、Λ曰 26.如申請專概_ 22撕狀數仙容If the 丨Dc is in the blacklist, the server suspends the connection with the client; the client receives the ID of the server; the client determines whether the IDs are in the blacklist; and if the 丨DS is In the blacklist, the connection between the client and the device is suspended. If you apply for the number 22 of the special fiber, you can use AES encryption to generate R2 n Ec (IDce R2) N EMRi" κ (five). The digital content protection method of claim 22, wherein the server invokes AES encryption to encrypt (r2 丨丨 KS1) into Ekx1 (R2 丨丨 Ksi). 25_ Digital content protection method as described in claim 22 of the patent application. The image data is encrypted with an AES password of -128 bits. Λ曰 26. If you apply for a special _ 22 tearing number of fairy 影像2料係使用下列步驟進行加密: 〜中絲曰/ K 每一影像訊框中之一 128位元號碼KFi係由下式產生: Ά(ΚηJ, far i > 1 其:該第iM固訊框之-訊框金鑰A KFi’且帛ith個訊框係利 Μ來加密。 27·2Ϊ铜範_ 22項·之數㈣容倾枚,其巾該聲立/ 28二2係利用一和4串流密碼將一整個影像訊框加密。乂曰 圍第22項所述之數仙容保護方法,其中該聲音/ V像貝枓係利用一 AES密碼加密。 五心⑴, for i = 1 修正本 1313995 29·如申請專利範圍第22項所述之數位内容保護方法, 影像資料係利用下列步驟進行加密: ^曰 將一衫像訊框分割成複數巨集區塊(macr〇-b|〇Cks); 對每一丨值而言’若丨(mod P) = 1,則利用RC4將Mi加密;以及 若i (mod P)9t 1,則將队以下式加密: 該Mi係為該影像訊框中第hh個巨集區塊,w為該影像訊框之寬 度,以像素為單位,Η為該影像訊框之高度,以像素為單位;P 為一質數,其亦與(W/16)互質,以及S(M〇利用一輕量級演算法 打亂Mi。 30.如申請專利範圍第29項所述之數位内容保護方法,其中每一該巨 集訊框包含16*16像素。 修正本 1313995 七、指定代表圖: (一) 本案指定代表圖為:第(1契)圖。 (二) 本代表圖之元件符號簡單說明: 50伺服器 60用戶端 八、本案若有化學式時,請揭示最能顯示發明特徵的化學式:Image 2 is encrypted using the following steps: ~中丝曰/ K One of the 128-bit numbers KFi in each image frame is generated by: Ά(ΚηJ, far i > 1 of which: the iM Frame - frame key A KFi' and 帛ith frame is used to encrypt. 27·2 Ϊ copper fan _ 22 items (four) Rong dumping, its towel the sound / 28 2 2 system utilization One and four stream ciphers encrypt an entire video frame. The method described in Item 22, wherein the sound/V is encrypted with an AES cipher. Five hearts (1), for i = 1 Amendment 1313995 29 · The digital content protection method described in item 22 of the patent application scope, the image data is encrypted by the following steps: ^ 分割 split a shirt image frame into a plurality of macro blocks (macr〇- b|〇Cks); For each value, 'If mod P = 1, then use RC4 to encrypt Mi; and if i (mod P)9t 1, then encrypt the following: The hh macroblock in the image frame, where w is the width of the image frame, in pixels, and the height of the image frame is in pixels. ; P is a prime number, which is also relatively prime (W/16), and S (M〇 uses a lightweight algorithm to disrupt Mi. 30. The digital content protection method described in claim 29, Each of the macro frames contains 16*16 pixels. Amendment 1313995 VII. Designated representative map: (1) The representative map of the case is: (1) map. (2) Simple description of the symbol of the representative figure : 50 server 60 client terminal 8. If there is a chemical formula in this case, please disclose the chemical formula that best shows the characteristics of the invention:
TW95129510A 2006-08-11 2006-08-11 Content protection method TWI313995B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95129510A TWI313995B (en) 2006-08-11 2006-08-11 Content protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95129510A TWI313995B (en) 2006-08-11 2006-08-11 Content protection method

Publications (2)

Publication Number Publication Date
TW200810483A TW200810483A (en) 2008-02-16
TWI313995B true TWI313995B (en) 2009-08-21

Family

ID=44767376

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95129510A TWI313995B (en) 2006-08-11 2006-08-11 Content protection method

Country Status (1)

Country Link
TW (1) TWI313995B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI513290B (en) * 2010-07-23 2015-12-11 Silicon Image Inc Mechanism for partial encryption of data streams

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI411281B (en) * 2010-01-29 2013-10-01 Univ Nat Taiwan Science Tech System and method for protecting data with a capacity for authentication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI513290B (en) * 2010-07-23 2015-12-11 Silicon Image Inc Mechanism for partial encryption of data streams
US9654810B2 (en) 2010-07-23 2017-05-16 Lattice Semiconductor Corporation Mechanism for partial encryption of data streams

Also Published As

Publication number Publication date
TW200810483A (en) 2008-02-16

Similar Documents

Publication Publication Date Title
CN116614599B (en) Video monitoring method, device and storage medium for secure encryption
US7424615B1 (en) Mutually authenticated secure key exchange (MASKE)
JP5307191B2 (en) System and method for secure transaction of data between a wireless communication device and a server
KR101021708B1 (en) Group key distribution method and server and client therefor
JP2017063432A (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
CN101626294A (en) Certifying method based on identity, method, equipment and system for secure communication
WO2010078755A1 (en) Method and system for transmitting electronic mail, wlan authentication and privacy infrastructure (wapi) terminal thereof
CN118802114A (en) Computer-implemented system and method for highly secure, high-speed encryption and transmission of data
CN114650173A (en) An encrypted communication method and system
CN112637136A (en) Encrypted communication method and system
US20080046731A1 (en) Content protection system
CN108599926B (en) HTTP-Digest improved AKA identity authentication system and method based on symmetric key pool
CN106936788A (en) A kind of cryptographic key distribution method suitable for VOIP voice encryptions
CN119995859A (en) A method and related device for encrypted communication between client and server
WO2017197968A1 (en) Data transmission method and device
JP2005244534A (en) Encryption communication apparatus and encryption communication method
WO2012139427A1 (en) Media message processing method, system and device
CN102025485B (en) Key negotiation method, key management server and terminal
KR100789354B1 (en) Method and device for maintaining data security in network cameras, home gateways and home automation devices
CN118157859B (en) A device security communication method and device based on national secret security chip
CN117528194B (en) Video front-end equipment authentication method and system based on SM9 cryptographic algorithm
CN119766433A (en) Encryption communication method, device and system supporting post quantum algorithm
CN119995863A (en) A communication implementation method, system and computer device resistant to quantum computing
TWI313995B (en) Content protection method
CN115776390B (en) MQTT protocol identity authentication and data encryption method based on national secret

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees