A copy prevention method and apparatus for a digital video system is disclosed including the steps of: (a) adding a header area of a header start code and key field to a reproduced bit stream: (b) decrypting and transmitting the bit stream to which the header area is added: (c) detecting a key field of the decrypted and transmitted bit stream and detecting copy prevention information; and (d) encrypting the bit stream according to information detected from stop (c) and recording it an tape.

Patent
   RE42951
Priority
Nov 26 1994
Filed
Nov 05 2004
Issued
Nov 22 2011
Expiry
Nov 22 2015
Assg.orig
Entity
Large
3
101
EXPIRED
0. 55. An apparatus for content protection, comprising:
a receiving device to receive encrypted digital content and key information, wherein the encrypted digital content includes one or more data segments, the one or more data segments including a header portion and a data portion, wherein at least a portion of the header portion is non-encrypted;
a key detecting device to detect the key information; and
a controller to control a decryption process of the digital content based on the detected key information,
wherein the header portion includes classification information to classify the digital content, and
the controller is to classify the digital content based on the classification information.
0. 60. An apparatus for content protection, comprising:
a generating device to generate protected digital content, the protected digital content including one or more data segments, the one or more data segments including a header portion and a data portion, wherein at least the data portion is protected and the header portion includes classification information to classify the protected digital content; and
a controller to transmit the protected digital content and first key information used to generate the protected digital content,
wherein the first key information is required to process the protected digital content in a receiving part and is encrypted using second key information different than the first key information.
0. 36. An apparatus for content protection, comprising:
an encryption device programmed to receive first key information, the first key information for encrypting digital data, and programmed to encrypt the first key information using second key information that is different than the first key information, wherein the digital data includes one or more data segments, the one or more data segments including a header portion and a data portion, wherein at least the data portion is encrypted using the first key information and the header portion is not encrypted and the header portion includes classification information to classify the data portion; and
a controller, coupled to the encryption unit, and programmed to control the encryption operation and control a transfer of the encrypted first key information.
0. 32. A content protection method for a digital data system including a controller and an encryption device, the method comprising:
receiving first key information by the encryption device within the digital data system, the first key information for encrypting digital content, the digital content including one or more data segments, the one or more data segments including a header portion and a data portion, wherein at least the data portion is encrypted using the first key information and the header portion includes classification information to classify the data portion;
encrypting, via the controller controlling the encryption device, the first key information using second key information that is different than the first key information; and
transferring the encrypted first key information with the controller.
0. 71. An apparatus for content protection, comprising:
a receiving device to receive protected digital content and key information required to process the protected digital content, wherein the protected digital content includes one or more data segments, the one or more data segments including a header portion and a data portion, wherein at least the header portion is non-protected;
a processor to process the protected digital content, using the received key information; and
a controller, coupled to the receiving device and the processor, to control the processing of the protected digital content,
wherein the header portion includes classification information to classify the digital content, and
wherein the controller is to classify the digital content based on the classification information received from the receiving unit.
0. 51. A content protection method within a digital data system for content protection including a controller and a receiving circuit, the method comprising:
receiving protected digital content and key information which is required to process the protected digital content by the receiving circuit, wherein the protected digital content includes one or more data segments, the one or more data segments including a header portion and a data portion, wherein at least a portion of the header portion is non-protected; and
processing, via the controller, the protected digital content, based on the received key information,
wherein the header portion includes classification information to classify the digital content, and
the receiving step includes classifying the digital content based on the classification information by the controller.
0. 40. A content protection method within a digital data system including a controller and a generating device, the method comprising:
generating, via the controller controlling the generating device, protected digital content, the protected digital content including one or more data segments, the one or more data segments including a header portion and a data portion, wherein at least the data portion is protected and the header portion includes classification information to classify the protected digital content; and
transmitting, via the controller, the protected digital content and first key information used to generate the protected digital content,
wherein the first key information is required to process the protected digital content in a receiving part and is encrypted using second key information different than the first key information.
0. 68. An apparatus for content protection, comprising:
a receiving device to receive encrypted digital content and encrypted first key information, the first key information being previously used for encrypting the digital content, the digital content including a header portion and a data portion, wherein only the data portion is encrypted;
a decryption device to decrypt the first key information using second information and decrypt the encrypted digital content using the decrypted first key information; and
a controller, coupled to the receiving unit and the decryption unit, to control the decryption operation,
wherein the header portion includes classification information to classify the digital content, and
wherein the controller is to classify the digital content based on the classification information received from the receiving device.
0. 64. An apparatus for content protection, comprising:
a receiving device to receive first key information, the first key information for encrypting digital data, the digital data including a header portion and a data portion;
an encryption device to encrypt the first key information using second information, and encrypt the digital data using the first key information, wherein only the data portion is encrypted;
a recording device to record the encrypted first key information and the encrypted digital data on a digital medium; and
a controller, coupled to the encryption device and the recording device, to control the encryption operation and the recording operation,
wherein the header portion includes classification information to classify the encrypted data portion, and
wherein the controller is to classify the encrypted data portion based on the classification information.
0. 44. A content protection method for a digital data system including a controller, a recording device and an encryption device, the method comprising:
receiving first key information by the encryption device within the digital data system, the first key information for encrypting digital data, the digital data including a header portion and a data portion;
encrypting, via the controller controlling the encryption device, the first key information using second information;
encrypting, via the controller controlling the encryption device, the digital data using the first key information, wherein only the data portion is encrypted; and
recording, via the controller controlling the recording device, the encrypted first key information and the encrypted digital data on a digital medium,
wherein the header portion includes classification information to classify the encrypted data portion on a digital medium.
0. 48. A content protection method for a digital data system including a controller, a receiving circuit and a decryptor, the method comprising:
(a) receiving encrypted digital content and encrypted first key information by the receiving circuit within the digital data system, the first key information being previously used for encrypting the digital content, the digital content including a header portion and a data portion, wherein only the data portion is encrypted;
(b) decrypting, via the controller controlling the decryptor, the first key information using second information; and
(c) decrypting, via the controller controlling the decryptor, the encrypted digital content using the decrypted first key information,
wherein the header portion includes classification information to classify the digital content, and
the step (a) includes classifying the digital content based on the classification information by the controller.
0. 1. A copy prevention method for a digital video system comprising the steps of:
(a) receiving a digital data stream reproduced from a digital medium;
(b) detecting an encryption key, which is a portion of said received digital data stream;
(c) decrypting said encryption key using key information;
(d) decrypting said received digital data stream based on said decrypted encryption key; and
(e) transmitting said decrypted digital data stream to at least one of a monitor and a digital recorder.
0. 2. A copy prevention method for a digital video system as claimed in claim 1, wherein said key information is predetermined by said digital video system.
0. 3. A copy prevention method for a digital video system as claimed in claim 1, wherein said decrypting step (d) is operated in units of predetermined block of said received digital data stream.
0. 4. A copy prevention apparatus for a digital video system comprising:
receiving means for receiving a digital data stream reproduced from a digital medium;
a key detector to detect an encryption key, which is a portion of said received digital data stream;
a decryption unit to decrypt said encryption key using key information and to decrypt said received digital data stream based on said decrypted encryption key; and
a controller to control transmission of said decrypted digital data stream to at least one of a monitor and a digital recorder.
0. 5. A copy prevention apparatus for a digital video system as claimed in claim 4, wherein said key information is predetermined by said digital video system.
0. 6. A copy prevention apparatus for a digital video system as claimed in claim 4, wherein said decryption unit is operated in units of predetermined block of said received digital data stream.
0. 7. A copy prevention method for a digital video system comprising the steps of:
(a) receiving a digital data stream reproduced from a digital medium;
(b) detecting an encryption key, which is a portion of said received digital data stream;
(c) decrypting said encryption key using key information;
(d) decrypting said received digital data stream based on said decrypted encryption key.
0. 8. A copy prevention method for a digital video system as claimed in claim 7, wherein said key information is predetermined by said digital video system.
0. 9. A copy prevention method for a digital video system as claimed in claim 7, wherein said decrypting step (d) is operated in units of predetermined block of said received digital data stream.
0. 10. A copy prevention apparatus for a digital video system comprising:
receiving means for receiving a digital data stream reproduced from a digital medium;
a key detector to detect an encryption key, which is a portion of said received digital data stream;
a decryption unit to decrypt said encryption key using key information and to decrypt said received digital data stream based on said decrypted encryption key.
0. 11. A copy prevention apparatus for a digital video system as claimed in claim 10, wherein said key information is predetermined by said digital video system.
0. 12. A copy prevention apparatus for a digital video system as claimed in claim 10, wherein said decryption unit is operated in units of predetermined block of said received digital data stream.
0. 13. A copy prevention method for a digital video system comprising the steps of:
(a) receiving a digital data stream reproduced from a digital medium;
(b) detecting an encryption key, which is a portion of said received digital data stream;
(c) decrypting said encryption key using predetermined key information;
(d) decrypting said received digital data stream based on said decrypted encryption key.
0. 14. A copy prevention method for a digital video system as claimed in claim 13, wherein said decrypting step (d) is operated in units of predetermined block of said received digital data stream.
0. 15. A copy prevention apparatus for a digital video system comprising:
receiving means for receiving a digital data stream reproduced from a digital medium;
a key detector to detect an encryption key, which is a portion of said received digital data stream;
a decryption unit to decrypt said encryption key using predetermined key information and to decrypt said received digital data stream based on said decrypted encryption key.
0. 16. A copy prevention apparatus for a digital video system as claimed in claim 15, wherein said decrypting unit is operated in units of predetermined block of said received digital data stream.
0. 17. A copy prevention method for a digital data system, comprising the steps of:
(a) receiving first key information;
(b) encrypting second key information using said first key information;
(c) encrypting digital data streams using said second key information; and
(d) recording at least said encrypted second key information and said encrypted digital data streams on a digital medium.
0. 18. The method of claim 17, wherein said (b) randomly selects said second key information.
0. 19. The method of claim 17, wherein said step (c) encrypts said digital data streams in blocks.
0. 20. A copy prevention apparatus for a digital data system, comprising the steps of:
an encryption unit receiving first key information, encrypting second key information using said first key information, and encrypting digital data streams using said second key information; and
a controller controlling recording of at least said encrypted second key information and said encrypted digital data streams on a digital medium.
0. 21. The apparatus of claim 20, wherein said encryption unit randomly selects said second key information.
0. 22. The apparatus of claim 20, wherein said encryption unit encrypts said digital data streams in blocks.
0. 23. A recording medium having a data structure for controlling operation of copy prevention function in a digital data processing device, comprising:
a digital data area storing digital data encrypted using first key information; and
a key information area storing said first key information encrypted using second key information, said first key information operatively controlling the decryption of said encrypted digital data in a digital data process device.
0. 24. A copy prevention method for a digital data system, comprising:
receiving first key information, said first key information for encrypting digital data;
encrypting said first key information using second information; and
transferring said encrypted first key information.
0. 25. The method of claim 24, wherein said encrypting step public key encrypts said second key information.
0. 26. The method of claim 24, wherein said transferring step records said encrypted first key information on a digital medium.
0. 27. The method of claim 24, wherein said transferring step transmits said encrypted first key information.
0. 28. A copy prevention apparatus for a digital data system, comprising:
an encryption unit receiving first key information, said first key information for encrypting digital data, and encrypting said first key information using second key information; and
a controller controlling a transfer of said encrypted first key information.
0. 29. The apparatus of claim 28, wherein said encryption unit public key encrypts said first key information.
0. 30. The apparatus of claim 28, wherein said controller controls recording said encrypted first key information on a digital medium.
0. 31. The apparatus of claim 28, wherein said controller controls transmitting said encrypted first key information.
0. 33. The method of claim 32, wherein the second key information is a public key, such that said encrypting step encrypts the first key information using the public key.
0. 34. The method of claim 32, wherein said transferring step includes recording the encrypted first key information on a digital storage medium.
0. 35. The method of claim 32, wherein said transferring step also transmits the encrypted digital content.
0. 37. The apparatus of claim 36, wherein the second key information is a public key, such that said encryption device is programmed to encrypt the first key information using the public key.
0. 38. The apparatus of claim 36, wherein said controller is programmed to control recording of the encrypted first key information and encrypted digital data on a digital storage medium.
0. 39. The apparatus of claim 36, wherein said controller is also programmed to control a transmitting of the encrypted digital data.
0. 41. The method of claim 40, further comprising:
encrypting the first key information using the second key information prior to said transmitting step.
0. 42. The method of claim 41, wherein the second key information is a public key, such that the first key information is encrypted using the public key.
0. 43. The method of claim 40, wherein the generating step includes encrypting the digital content by a block-cipher algorithm or a stream-cipher algorithm.
0. 45. The method of claim 44, wherein the second information is a public key, such that the first key information is encrypted using the public key.
0. 46. The method of claim 44, wherein the header portion and the data portion comprise a packet.
0. 47. The method of claim 44, wherein the first key information is randomly generated.
0. 49. The method of claim 48, wherein the second information is a public key such that the first key information is decrypted by the public key.
0. 50. The method of claim 48, wherein said step (c) decrypts the encrypted digital content only when the first key information is normally decrypted in step (b).
0. 52. The method of claim 51, wherein the received key information is encrypted, and
wherein the processing step includes processing the encrypted key information by the processor.
0. 53. The method of claim 52, wherein the protected digital content is processed only when the encrypted key information is normally decrypted.
0. 54. The method of claim 53, wherein the encrypted key information is decrypted using second key information.
0. 56. The apparatus of claim 55, wherein the key information is first key information, and wherein said key detecting device is to decrypt the first key information using second key information.
0. 57. The apparatus of claim 56, wherein said controller is to decrypt the data portion of each data segment using the decrypted first key information.
0. 58. The apparatus of claim 55, wherein said controller is to decrypt the data portion of each data unit using the detected first key information.
0. 59. The apparatus of claim 55, wherein the first key information was encrypted and predetermined by a digital data system.
0. 61. The apparatus of claim 60, further comprising:
an encryption device to encrypt the first key information using the second key information prior to said transmission.
0. 62. The apparatus of claim 61, wherein the second key information is a public key.
0. 63. The apparatus of claim 61, wherein the controller is to control the encryption device to protect the digital content by a block-cipher algorithm or a stream-cipher algorithm.
0. 65. The apparatus of claim 64, wherein the second information is a public key, and the encryption device is to encrypt the first key information using the public key.
0. 66. The apparatus of claim 64, wherein the header portion and the data portion comprise a packet.
0. 67. The apparatus of claim 64, wherein the first key information is randomly generated.
0. 69. The apparatus of claim 68, wherein the second information is a public key.
0. 70. The apparatus of claim 68, wherein said controller is to control the decryption device to decrypt the encrypted digital content only when the first key information is normally decrypted.
0. 72. The apparatus of claim 71, wherein the received key information is an encrypted key information.
0. 73. The apparatus of claim 72, wherein the controller is to control the processor to process the protected digital content only when the encrypted key information is normally decrypted.

to respect6 5 comprises a PES header detecting portion 10 for searching the parallel data in synchronization with a clock clk to detect the PES header, and a copy prevention information extractor 20 enabled by the PES header signal of PES header detecting portion 10 to detect the copy prevention information field.

Referring to FIG. 7, PES header detecting portion 10 comprises first and second flipflops 11 and 12 for sequentially delaying the parallel data according to clock elk clk, a packet start code detector 13 for searching the parallel data and the output of first and second flipflops 11 and 12 to detect the packet start code of the PES header, a stream ID detector 14 for searching the output of second flipflop 12 to detect the stream ID of the PES header, a delay 15 for sequentially delaying the output is-pscp of packet start code detector 13 according to clock clk, and a detection signal generator 16 for logically multiplying the outputs of delay 15 and stream ID detector 14 and outputting a PES header detection signal is-PES-header.

As shown in FIG. 9, copy prevention information extractor 20 comprises a D-flipflop 21 for holding the parallel data output from PES header detector 10, a D-flipflop 22 for holding PES header detection signal is-PES-header of PES header detector 10, a D-flipflop 23 cleared by the output of D-flipflop 22 and holding voltage (+5V) by a CR signal of the output of D-flipflop 21 and outputting a signal LCR, a D-flipflop 24 cleared by the output of D-flipflop 22 and holding voltage (+5V) by an OC signal of the output of D-flipflop 21 and outputting a signal LOR LOC, a copy prevention information position operator 25 for searching the parallel data of PES header detector 10 and calculating the position of an additional copy information field, a counter 26 for counting the output of copy information position operator 25, and a D-flipflop 27 for holding the additional copy information field of the output of D-flipflop 21.

The operation and effect of the present invention will be explained below. Generally, in case of reproducing or copy recording data on tapa tape, connections between systems are made as shown in FIG. 4.

With those connections, an MPEG bit stream reproduced from VCR A is input to a satellite receiver or high-definition TV so that it cannot be recognized whether the stream is displayed on a screen or input to VCR B and recorded on another video tape.

For this reason, according to the present invention, in case that the bit stream reproduced from VCR A is copied from VCR B, information on copy prevention is transmitted to VCR B from VCR A. VCR B analyzes this information which is recorded with the bit stream.

Here, the insertion position of the copy prevention information contained in a GA bit stream is very limited because it must not affect decoding of the decoder of the satellite receiver or high-definition TV so that an image is displayed normally on a monitor. The copy prevention information may be inserted into the front end of the MPEG bit stream or inside the PES header.

When the MPEG bit stream is decoded in units or of group of picture (GOP), the respective GOPs are classified by their cop GOP start codes. This is useful in transmitting initialization data to a recording-side VCR because decoding is never affected even when a slight amount of data is added to the front end of the MPEG bit stream.

The case of inserting the copy prevention information into the PES header is useful in repeated transmission of information because copy prevention of a recording medium such as DSM is decided using CR and OC flaps of the PES header and additional copy information field. In this case, there are a variety of copy preventing methods.

First, when a mode of “No Copy” is detected from the additional copy information field of the PES header, VCR B is not able to enter its recording mode.

Second, when a mode of “Copy Permitted” is detected in order to implement a copy prevention such as DAT mode, VCR B records but “No Copy” mode is recorded in the additional copy information field to interrupt recopying from a copying tape. This means that a secondary source tape can be made, but a third source tape cannot.

Third, for “Back-up Copy”, tape B copied from VCR B is reproducible normally only is VCR A. According to this method, reproducing-side VCR A encrypts the bit stream with its own inherent key and records it on tape so that only reproducing-side VCR A decrypts the MPEG bit stream recording on the tape. For every VCR set, a unique key is provided, encrypted by VCR's key and recorded on tape B. However, the VCR set foe recording tape B is VCR B and tape B is encrypted by VCR A's key so that VCR A's key needs to be transmitted to VCR B with GA bit stream.

Accordingly, when the key information of VCR A is transmitted as a header in advance prior to the bit stream in the “Back-up Copy”, it is recorded at the front end of tape B, which satisfies the insertion position of the copy prevention information mentioned before.

Here, as shown in FIG. 2, the position of the additional copy information field is varied within the PES header according to whether presentation time stamp (PTS)/Decoding time stamp (DTS) and DSM trick mode field are present or not. This varied position must be compensated. Here, information transmitted through the additional copy information is a copy prevention method to be performed by recording-side VCR B.

In case of recording the bit stream shown in FIG. 11A in the method of “Back-up Copy”, the formal of the bit stream recorded on tape is determined as shown in FIG. 11B.

Here, a header area added to the front of the MPEG bit stream is formed with a tape header start code, that is, the header identifier code, and a key field for storing key information. In case of encrypting the MPEG bit stream in units of GOP, encryption blocks are classified by the packet start code prefix and stream ID of the PES header. The encryption block is a basic unit of encryption and can change whether encryption is performed in units of the encryption block, and encryption algorithm and key selection. Here, the encryption blocks must not be encrypted until the additional copy information field of the PES header. Encryption is performed until the end of the encryption block after the additional copy information field. The first ‘transmission header’ is not encrypted.

The operation of performing the “back-up Copy” mode by adding the header will be described below.

First, in copying, when recording data of tape A is encrypted, reproducing-side VCR A decrypts it using the key information of the key field so is to make message m. Its key information is added to the header and transmitted in the formal of FIG. 11C.

Recording-side VCR B records the key information transmitted from reproducing-side VCR A on the header of copying tape B and then records the encrypted bit stream. Here, when the key information is transmitted from reproducing side to recording side, for security, a public-key encryption may be employed to the system because the information may be exposed to a pirate.

Such public-key encryption system ensures the secret of data even though the public-key is exposed but cannot be processed in real-time due to a great amount of calculation. Therefore, this system is not improper when the MPEG bit stream is encrypted directly. The “Back-up Copy” can be implemented when the MPEG bit stream is encrypted using a block-cipher algorithm or stream-cipher algorithm such as DES and a key used is encrypted in the public-key encryption.

In this case, every VCR u incorporates encryption algorithm EPKU corresponding to the public-key and decryption algorithm DPKU corresponding to the secret key. Encryption algorithm EPKU takes a power key of VCR u, and decryption algorithm DPKU an internal key of VCR u.

Here, the internal key may be opened to the public. Reproducing-side VCR A transmits the internal key on the key field of the header because another VCR encrypts using the internal key. Recording-side VCR B randomly selects a key Y used in the block-cipher algorithm such as DES and encrypts it with the public-key encryption system using an external key EPKA. The result is recorded on the key field of copying tape B.

Sequentially, the data is divided into encryption blocks and encrypted and recorded in the block-cipher algorithm using key Y. In this method, the bit stream of FIG. 11D is recorded on copying tape B.

When copying tape B is reproduced in reproducing-side VCR A, key Y can be restored by decryption DPKA[EPKA(Y)] in which data is decrypted properly. In other VCRs, key Y cannot be found, which disables the decryption of the bit stream.

As An embodiment of the present invention, shown in FIG. 5, for performing such an operation will be described below.

When playback starts for tape copying, reproducing portion 1 detects data recorded on tape as shown in FIG. 11A, and amplifies it by a predetermined level. As shown in FIG. 11B, key inserting portion 2 adds a header having a tape header start code and key field in the GA bit stream of reproducing portion 1 shown in FIG. 11A. Copy prevention information is loaded on the additional copy information field of the PES header to form a format shown in FIG. 11C. Here, decrypting portion 3 decrypts the bit stream formed in key inserting portion 2 and transmits it as parallel data to the recording-side VCR via an interface.

When the bit stream of FIG. 11C is transmitted to the recording-side VCR via the interface, key detecting/correcting portion 4 detects the key field added to the bit stream and corrects the key field if necessary.

Copying prevention information detecting portion 5 searches the PES header area to detect the additional copy information field. Here, though a slight amount of information is recorded in the additional copy information field, redundancy is provided in several areas of the bit stream to increase reliability of information transmitted.

Copy prevention information detecting portion 5 extracts the value of AC flag from the PES header flag in order to calculate the position of the additional copy information field because it varies within the PES header. Here, when copy prevention information correcting portion 6 corrects the output of copy prevention information detecting portion 5, encrypting portion 7 performs encryption using the block-cipher algorithm such as DES. Here, copy prevention information correcting portion 6 performs correction while the input data is stored in a RAM. Accordingly, encrypting portion 7 records the encrypted bit stream on tape in recording portion 8. Because the key information of the reproducing-side VCR is added on the copying tape, only a VCR having this key information can reproduce tape normally.

As shown in FIG. 6, in copy prevention information detecting portion 5, PES header detecting portion 10 searches the output of key detecting/correcting portion 4 and outputs a header detection signal is-PES-header. After header detection signal is-PES-header is input, copy prevention information extractor 20 detects the additional copy information field and OC and CR flags.

PES header detector 10 for detecting the PES header is formed as shown in FIG. 7. When bit stream data_in is input as shown in FIG. 8A, first flipflop 11 synchronized to clock clk is delayed for a predetermined time to output the bit stream delayed as shown in FIG. 8B. Second flipflop 12 delays the output of first flipflop 11 by are predetermined time and outputs the bit stream delayed as shown in FIG. 8C.

Here, packet start code detecting portion 13 searches the bit stream shown in FIG. 8A and the output of first and second flipflops 11 and 12 shown in FIGS. 8B and 8C in order to detect the packet start code of the PES header. When detection signal is-pscp is output as shown in FIG. 8D, delay 15 in which flipflops are coupled at multi-stages delays it sequentially according to clock clk.

Meanwhile, stream ID code detector 14 searches the output of second flipflop 12 and detects the stream ID area of the PES header. Then, detection signal is-sid shown in FIG. 8E is output to detection signal generator 16. Detection signal generator 16 logically multiplies the outputs of delay 15 and stream ID code detector 14, and the flipflops hold the output of the AND gate according to clock clk so that PES header detection signal is-PES-header is output to copy prevention information extractor 20 as shown in FIG. 8P 8F.

Here, copy prevention information extractor 20 for detecting the copy prevention information is formed as shown in FIG. 9. When the parallel data output from PES header detector 10 and shown in FIG. 10A is held and output as shown in FIG. 10B, D-flipflop 22 synchronized to PES header detection signal is-PES-header of PES header detector 10 shown in FIG. 8F holds voltage +5V so that a HIGH signal is output to the clear ports of D-flipflops 23, 24 and 27 to release the clear states.

D-flipflop 23 is synchronized to the CR flag or the output of D-flipflop 21 shown in FIG. 10B to hold voltage Vcc so that a HIGH signal LCR is output as shown in FIG. 10C. D-flipflop 24 is synchronized to the OC flag of the output of D-flipflop 21 to hold voltage Vcc so that a HIGH signal LOC is output as shown in FIG. 10D.

Copy prevention position detector 25 searches the PD, TM and AC flags of the parallel data of PES header detector 10 shown in FIG. 10A to calculate the position of the additional copy information field, which is output to counter 26 as shown in FIG. 10E. Counter 26 receiving the 4-bit value performs counting so that a HIGH signal is output as shown in FIG. 10F at a predetermined counting value.

D-flipflop 27 synchronized to HIGH output rco of counter 26 holds the additional copy information field from the parallel data of D-flipflop 21 shown in FIG. 10B. The field is output as shown in FIG. 10C.

As described above, in the copy prevention method and apparatus for a digital video system of the present invention, a key information is recorded with a bit stream so that a VCR having the key information reproduces tape normally, thereby preventing illegal copy of tape. In addition, for key information transmission, the public-key encryption is introduced to disable a pirate to release the copy prevention, increasing reliability of copy prevention.

Park, Tae Joon

Patent Priority Assignee Title
8190529, Jul 30 2002 Sony Corporation Information processing system, information communication terminal and method, information processing apparatus and method, recording medium, and program for internet transaction
9008308, Feb 08 2012 Pixelworks, Inc Container agnostic decryption device and methods for use therewith
9641322, Feb 08 2012 Pixelworks, Inc Container agnostic decryption device and methods for use therewith
Patent Priority Assignee Title
3753228,
4420829, Jan 08 1981 Holographic system for the storage of audio, video and computer data
4554461, Dec 24 1982 Hitachi, Ltd. Information transmitting apparatus
4694489, Dec 22 1983 Video transmission system
4736422, Jun 30 1983 Independent Broadcasting Authority Encrypted broadcast television system
4796220, Dec 15 1986 Pride Software Development Corp. Method of controlling the copying of software
4802215, Jul 23 1983 Independent Broadcasting Authority Security system for television signal encryption
4817140, Nov 05 1986 International Business Machines Corp. Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
4871140, May 20 1988 Moore Push-Pin Company Hanging device
4890319, Sep 21 1984 Scientific-Atlantic, Inc. Method for controlling copying of protected information transmitted over a communications link
4916738, Nov 05 1986 International Business Machines Corp. Remote access terminal security
4924513, Sep 25 1987 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Apparatus and method for secure transmission of data over an unsecure transmission channel
4937679, Aug 11 1986 Macrovision Dual deck video recording apparatus having enhanced copy protection and method for providing enhanced copy protection to such a recording apparatus
4965680, Jun 30 1987 Kabushiki Kaisha Toshiba Apparatus for releasing a restriction on the recording of an information signal on a recording medium
4975952, Sep 04 1985 U. S. Philips Corporation Method of data communication
4999806, Sep 04 1987 Software distribution system
5003590, Dec 18 1989 Eidak Corporation Encoding an optical video disc to inhibit video tape recording
5014274, Apr 08 1988 Victor Company of Japan, Ltd. Code-error correcting device
5034981, Apr 11 1988 EIDAK CORPORATION, A CORP OF DE Anti-copying video signal processing
5034985, Nov 13 1989 Pitney Bowes Inc. Matched mailing system employing address print array recognition
5054064, Mar 29 1990 Verizon Laboratories Inc Video control system for recorded programs
5057947, Feb 10 1988 MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD , Recording and reproducing apparatus with limited digital copying
5058162, Aug 09 1990 Hewlett-Packard Company Method of distributing computer data files
5073925, Jul 08 1987 Matsushita Electric Industrial Co., Ltd. Method and apparatus for the protection of signal copy
5109413, Nov 05 1986 International Business Machines Corporation Manipulating rights-to-execute in connection with a software copy protection mechanism
5134656, Feb 22 1989 NAGRA PLUS S A Pre-payment television system using a memory card associated with a decoder
5138659, May 02 1991 GENERAL INSTRUMENT CORPORATION GIC-4 Conversion of television signal formats with retention of common control data stream
5144658, Nov 24 1989 Sharp Kabushiki Kaisha Repeater of digital audio interface signal
5159633, Jan 19 1990 Canon Kabushiki Kaisha Multimedia network system
5182680, Feb 26 1990 Sony Corporation Recording control system
5193176, Oct 17 1990 POWERCARD SUPPLY, L C Computer work saving during power interruption
5231546, Feb 10 1988 Matsushita Electric Industrial Co., Ltd. Recording and reproducing apparatus with limited digital copying
5233650, Mar 03 1989 Sun Plan Investments Limited Telephone support device
5243650, Mar 23 1990 Televerket Method and apparatus for encryption/decryption of digital multisound in television
5260999, Jun 28 1991 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Filters in license management system
5265164, Oct 31 1991 INTERNATIONAL BUSINESS MACHINES CORPORATION A CORP OF NEW YORK Cryptographic facility environment backup/restore and replication in a public key cryptosystem
5289276, Jun 19 1992 General Electric Company Method and apparatus for conveying compressed video data over a noisy communication channel
5303294, Jun 18 1991 Matsushita Electric Industrial Co., Ltd. Video theater system and copy preventive method
5315448, Mar 18 1993 Macrovision Corporation Copy protection for hybrid digital video tape recording and unprotected source material
5323244, Sep 24 1992 Matsushita Electric Industrial Co., Ltd. Recording and reproducing apparatus
5377266, Jul 21 1992 MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD Scramble apparatus and descramble apparatus
5381481, Aug 04 1993 Cisco Technology, Inc Method and apparatus for uniquely encrypting a plurality of services at a transmission site
5392351, Mar 16 1992 Fujitsu Limited Electronic data protection system
5406625, Nov 22 1991 Sony Corporation Receiving apparatus and recording method
5418853, Jul 24 1992 Sony Corporation Apparatus and method for preventing unauthorized copying of video signals
5442541, Jul 23 1993 Xerox Corporation Enabling features over common communication channel
5469272, Mar 05 1991 Sony Corporation Digital signal recording and/or reproducing apparatus
5477276, Dec 17 1992 Sony Corporation Digital signal processing apparatus for achieving fade-in and fade-out effects on digital video signals
5504816, Feb 02 1994 Google Technology Holdings LLC Method and apparatus for controlling access to digital signals
5506903, Apr 06 1993 Sony Corporation Digital multiplex transmission system
5513260, Jun 29 1994 Macrovision Corporation Method and apparatus for copy protection for various recording media
5530756, Sep 15 1993 U S PHILIPS CORPORATION Television scrambling and descrambling method, and transmitter and receiver using said method
5546461, Apr 09 1993 MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD Scramble system for use in digital video signal recording and reproducing system or transmission and receiving system, comprising scramble apparatus and descramble apparatus
5563946, Apr 25 1994 ACTIVISION PUBLISHING, INC Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
5574787, Jul 25 1994 Macrovision Corporation Apparatus and method for comprehensive copy protection for video platforms and unprotected source material
5576843, Oct 29 1993 WARNER BROS HOME ENTERTAINMENT INC System and method for controlling play of multiple dialog audio tracks of a software carrier
5579120, Oct 08 1993 Sony Corporation Copyright protection for digital signal recording and/or reproduction and recording medium thereof
5588058, Mar 31 1993 U S PHILIPS CORPORATION Method and device for scrambling and descrambling of a specific television broadcast
5590306, Sep 08 1992 FUJIFILM Corporation Memory card management system for writing data with usage and recording codes made significant
5629980, Nov 23 1994 CONTENTGUARD HOLDINGS, INC System for controlling the distribution and use of digital works
5638513, Dec 22 1993 STAMPS COM, INC Secure software rental system using continuous asynchronous password verification
5646992, Sep 23 1993 MICROSEMI FREQUENCY AND TIME CORPORATION Assembly, distribution, and use of digital information
5659613, Jun 29 1994 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print
5673357, Feb 15 1994 Sony Corporation Video recording, transmitting and reproducing apparatus with concurrent recording and transmitting or multiple dubbing of copy protected video signals
5689559, Dec 08 1994 LG Electronics Inc Copy prevention method and apparatus of a digital magnetic recording/reproducing system
5689561, Oct 06 1995 Computer-based trading card system and method
5703859, Sep 01 1995 Sony Corporation Digital video copy protection system
5715403, Nov 23 1994 CONTENTGUARD HOLDINGS, INC System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
5757909, Nov 26 1994 LG ELECTRONICS, INC Illegal view and copy protection method in digital video system and controlling method thereof
5757910, Apr 06 1993 LG ELECTRONICS, INC Apparatus for preventing illegal copying of a digital broadcasting signal
5761302, Nov 26 1994 LG Electronics Inc Copy prevention method and apparatus for digital video system
5778064, Mar 31 1995 Sony Corporation Apparatus and method for processing a high definition video signal
5790664, Feb 26 1996 GraphOn Corporation Automated system for management of licensed software
5799081, Sep 18 1995 LG Electronics Inc. Illegal view/copy protection method and apparatus for digital broadcasting system
5832084, Nov 10 1995 LG Electronics, Inc. Recording method of digital magnetic recording medium for copyright protection and variable speed playback
5862115, Nov 30 1993 JVC Kenwood Corporation Method and apparatus for recording an information signal with scrambling thereof
5881038, Feb 27 1994 Matsushita Electric Industrial Co., Ltd. Method and apparatus for preventing illegal copy or illegal installation of information of optical recording medium
5898695, Mar 29 1995 Hitachi Maxell, Ltd Decoder for compressed and multiplexed video and audio data
5907443, May 30 1990 Canon Kabushiki Kaisha Recording and reproducing apparatus adapted to selectively control the number of copies made
5910987, Feb 13 1995 INTERTRUST TECHNOLOGIES CORP Systems and methods for secure transaction management and electronic rights protection
5925127, Apr 09 1997 Microsoft Technology Licensing, LLC Method and system for monitoring the use of rented software
5956505, Dec 24 1991 Pitney Bowes Inc. Remote activation of software features in a data processing device
6009401, Apr 06 1998 SAFENET DATA SECURITY ISRAEL LTD Relicensing of electronically purchased software
6028932, Nov 26 1994 LG Electronics Inc. Copy prevention method and apparatus for digital video system
6052242, Jun 07 1989 Canon Kabushiki Kaisha Recording apparatus with copy control based on copies made and allowed to be made
6236971, Nov 23 1994 CONTENTGUARD HOLDINGS, INC System for controlling the distribution and use of digital works using digital tickets
6430290, Jan 23 1998 Koninklijke Philips Electronics N V Conditional access
7069250, Oct 15 2001 CUFER ASSET LTD L L C Check based online payment and verification system and method
7114745, Dec 10 2002 TRW Automotive Safety Systems GmbH Monitoring system for detent connections
EP267039,
EP498617,
EP519320,
EP580367,
EP581227A2,
EP589459,
JP6162690,
JP6199288,
JP6339110,
JP670282,
RE33189, May 09 1988 Comsat Corporation Security system for SSTV encryption
RE36763, Jul 24 1992 Sony Corporation Apparatus and method for preventing unauthorized copying of video signals
/
Executed onAssignorAssigneeConveyanceFrameReelDoc
Nov 05 2004LG Electronics Inc.(assignment on the face of the patent)
Date Maintenance Fee Events
Dec 21 2011ASPN: Payor Number Assigned.


Date Maintenance Schedule
Nov 22 20144 years fee payment window open
May 22 20156 months grace period start (w surcharge)
Nov 22 2015patent expiry (for year 4)
Nov 22 20172 years to revive unintentionally abandoned end. (for year 4)
Nov 22 20188 years fee payment window open
May 22 20196 months grace period start (w surcharge)
Nov 22 2019patent expiry (for year 8)
Nov 22 20212 years to revive unintentionally abandoned end. (for year 8)
Nov 22 202212 years fee payment window open
May 22 20236 months grace period start (w surcharge)
Nov 22 2023patent expiry (for year 12)
Nov 22 20252 years to revive unintentionally abandoned end. (for year 12)