The present invention provides an access control for a secure portable storage device. The access control is applicable to a host for accessing from the secure portable storage device. In particular, the host and the secure portable storage device cross-verify a key through a file system. The preferred embodiment according to the invention discloses the followings.
First, referring to
The host 1 described above can be an electronic device with an arithmetic function, such as a computer, a handheld communication device, a personal digital assistant, or a digital video disc playing device. The secure portable storage device 2 described above is used for storing encrypted content data, and the secure portable storage device 2 is usually called a memory card. The specification of the memory card described previously can be one selected from the specifications of a CompactFlash Card, a SmartMedia Card, a MultiMedia Card, a Memory Stick Card, an SD Memory Card, or an XD-Picture Card. The secure portable storage device 2 includes a transmission interface 20. As shown in
In the secure portable storage device 2 in
In the preferred embodiment of the invention, the host 1 pre-stores a first key, and the memory 23 of the secure portable storage device 2 pre-stores an encrypted content key. When the host 1 starts to access the secure portable storage device 2, the host transmits the first key to the first temporary space 211 of the secure portable storage device 2. The controlling/processing module 22 accesses the first key, and verifies if the first key is valid. If the first key is valid, the encrypted content key is duplicated into the second temporary space 212. The host 1 also uploads the encrypted content key stored in the second temporary space 212 by itself. The first decrypting module 11 of the host 1 is an arithmetic unit. The first decrypting module 11 uses the first key to decrypt the encrypted content key into a content key. The second decrypting module 12 uses the content key to decrypt the encrypted content data into content data. The host 1 can then transmit the content data out normally.
The decrypting algorithm built in the first decrypting module 11 and the second decrypting module 12 are prior art, and the decrypting algorithm is written in accordance with practical needs. Therefore, the decrypting algorithm is not described in details here.
Then, referring to
Next, the host 1 transmits the first key to the first temporary space 211 of the secure portable storage device 2 (step S31).
Then, the secure portable storage device 2 performs the verifying of the first key, in response to the change in the first temporary space 211. The controlling/processing module 22 downloads the first key stored in the first temporary space 211 to the buffer 24 to verify if the first key is valid (Step S32).
If the first key is verified to be valid, the step S33 is performed. The controlling/processing module 22 duplicates the encrypted content key pre-stored in the memory 23 into the second temporary space 212 (step S33).
Next, the controlling/processing module 22 uploads the encrypted content key stored in the second temporary space 212 to the host 1 (Step S34).
Next, the first decrypting module 11 uses the first key to decrypt the encrypted content key into the content key (Step S35).
Finally, the second decrypting module 12 uses the content key to decrypt the encrypted content data into content data (Step S36).
The inventor states that after the control method 3 is started and before the host 1 transmits the first key to the first temporary space 211, the controlling/processing module 22 can first clear the content of the first temporary space 211 and the second temporary space 212. At the same time, as described in step S34, after the second key stored in the second temporary space 212 is uploaded to the host 1, the controlling/processing module 22 can also clear the second temporary space 212. In this way, the security of the first key and the encrypted content key can be more complete.
In one embodiment of the invention, the memory 23 pre-stores a second key. In step S32, the verification of the first key is performed by comparing the first key with the second key.
In one preferred embodiment of the invention, the host 1 also includes a pre-stored third key. In the step S35, the decryption of the encrypted content key can be performed by use of the first key and the third key at the same time, or by using either the first key or the third key. The decryption method described here uses a combination of the first key and the third key to perform a decryption.
Accordingly, by the specifications of the invention above, one can clearly see that the access control of the secure portable storage device disclosed in the invention performs, based on the file system, the verification process of the key between the host and the secure portable storage device. At the same time, the performing of the decrypting algorithm of the encrypted content key is totally responsible by the host. In prior art, the verification process is performed through the protocol, and the decrypting algorithm of the encrypted content data is performed in the secure portable storage device. Obviously, the technology according to the invention differs from that according to prior art, and according to the access control method of the secure portable storage device of the invention, the host no longer needs to install a driver corresponding to the upgraded version to cope with the secure portable storage device when its hardware is upgraded. Moreover, the decrypting algorithm of the encrypted content key is totally the responsibility of the host, thus guaranteeing the copy control mechanism of copyrighted data.
With the example and explanations above, the features and spirits of the invention will be hopefully well described. Those skilled in the art will readily observe that numerous modifications and alterations of the device may be made while retaining the teaching of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
095127225 | Jul 2006 | TW | national |