WO2000074046A1 - Data recording medium and data management system - Google Patents
Data recording medium and data management system Download PDFInfo
- Publication number
- WO2000074046A1 WO2000074046A1 PCT/JP2000/003482 JP0003482W WO0074046A1 WO 2000074046 A1 WO2000074046 A1 WO 2000074046A1 JP 0003482 W JP0003482 W JP 0003482W WO 0074046 A1 WO0074046 A1 WO 0074046A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- data
- recording medium
- output
- data recording
- Prior art date
Links
- 238000013523 data management Methods 0.000 title claims description 65
- 238000007726 management method Methods 0.000 claims description 81
- 238000000034 method Methods 0.000 claims description 73
- 238000012545 processing Methods 0.000 claims description 40
- 238000013500 data storage Methods 0.000 claims description 9
- 239000004065 semiconductor Substances 0.000 abstract description 68
- 238000010586 diagram Methods 0.000 description 55
- 230000006854 communication Effects 0.000 description 18
- 238000004891 communication Methods 0.000 description 17
- 239000004235 Orange GGN Substances 0.000 description 10
- 230000003287 optical effect Effects 0.000 description 10
- 230000006870 function Effects 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 6
- 238000012790 confirmation Methods 0.000 description 5
- 230000002457 bidirectional effect Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 241000283690 Bos taurus Species 0.000 description 1
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 241000251730 Chondrichthyes Species 0.000 description 1
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 1
- -1 RAM Chemical compound 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 229910052799 carbon Inorganic materials 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000001678 irradiating effect Effects 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 230000002250 progressing effect Effects 0.000 description 1
- 239000004173 sunset yellow FCF Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B23/00—Record carriers not specific to the method of recording or reproducing; Accessories, e.g. containers, specially adapted for co-operation with the recording or reproducing apparatus ; Intermediate mediums; Apparatus or processes specially adapted for their manufacture
- G11B23/28—Indicating or preventing prior or unauthorised use, e.g. cassettes with sealing or locking means, write-protect devices for discs
- G11B23/281—Indicating or preventing prior or unauthorised use, e.g. cassettes with sealing or locking means, write-protect devices for discs by changing the physical properties of the record carrier
- G11B23/282—Limited play
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00876—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy wherein physical copy protection means are attached to the medium, e.g. holograms, sensors, or additional semiconductor circuitry
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B7/00—Recording or reproducing by optical means, e.g. recording using a thermal beam of optical radiation by modifying optical properties or the physical structure, reproducing using an optical beam at lower power by sensing optical properties; Record carriers therefor
- G11B7/24—Record carriers characterised by shape, structure or physical properties, or by the selection of the material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2121—Chip on media, e.g. a disk or tape with a chip embedded in its case
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B7/00—Recording or reproducing by optical means, e.g. recording using a thermal beam of optical radiation by modifying optical properties or the physical structure, reproducing using an optical beam at lower power by sensing optical properties; Record carriers therefor
- G11B7/002—Recording, reproducing or erasing systems characterised by the shape or form of the carrier
- G11B7/0037—Recording, reproducing or erasing systems characterised by the shape or form of the carrier with discs
Definitions
- the present invention relates to a data recording medium and a data management system, and more particularly to a technique for improving the copyright protection of content for a digital copy.
- FIG. 45 shows a reproduction apparatus 504 having a digital output for controlling copyright protection by the CGMS method.
- reference numeral 500 denotes a disk medium such as a CD-ROM
- 504 denotes a reproduction medium. Device.
- the playback device 504 includes a playback signal processing circuit 501 for processing a signal bow read from a disk medium using, for example, an optical pickup 506, a digital interface 503 for outputting a playback signal,
- the reproduction signal processing circuit 501 is composed of a CPU 502 for controlling the operation of the digital signal interface 503.
- the CGMS information added to the disk medium 500 is transferred from the reproduction signal processing circuit 501 to the CPU 502.
- CPU 502 uses the same GMS information Accordingly, the digital output of the playback data of the disk medium 500 from the digital interface 503 is controlled as follows.
- the information “0 ne More copy” on the recording device side is described as “No More Copy”. It is configured to record and manage new data on the recording medium by rewriting it to Copyj.
- a management information area 505 capable of recording information for limiting the number of copies is provided on the disk medium 5 ⁇ 0 surface, so that the information becomes a predetermined value. If the playback device is configured to prohibit copying, the number of copies is rewritten each time the content of One More Copyj is copied, and if Suppress scheme over may be considered.
- Japanese Patent Application Laid-Open No. Hei 7-161172 discloses a data recording medium which has high security and is easy to use when various kinds of data are recorded on a recording medium such as a disk or a tape.
- a recording medium on which data is to be stored is housed in a housing, and an IC is attached to a predetermined portion of the housing, and a starting program and the encrypted data are stored in the recording medium.
- the recorded data encryption program and the password are stored in the memory of the IC
- the entered password is supplied to the IC, and the calculation means compares it with the password stored in the memory of this IC.
- the encryption program stored in the memory of the IC If the password matches, the encryption program stored in the memory of the IC
- the encrypted data recorded on the recording medium can be decrypted or the data recorded on the recording medium can be encrypted, so that the security is high and the case includes the encryption program. Having an IC makes it easy to use keywords without complicating keyword management.
- the content copied from the recording medium having the conventional CGMS information is rewritten in the CGMS information at the time of recording on the recording medium so that the content cannot be copied further.
- the CGMS information is "One More Copy”
- the data recording medium disclosed in Japanese Patent Application Laid-Open No. 7-161611 discloses a program for encrypting the encrypted content recorded on the recording medium,
- the storage medium may be stored in an IC attached to the housing that stores the data, and the recording medium may be destroyed using the encryption program in the IC.
- the recording medium itself was used separately for illegal copying.
- the present invention has been made to solve the above-mentioned conventional problems, and has as its object to provide highly secure copyright management in a disc medium. Disclosure of the invention
- the data recording medium according to the present invention (Claim 1) is a data recording medium for self-recording or reproducing contents.
- a reproduction history management circuit for recording and managing the reproduction output of the content by referring to the copyright protection information when reproducing the content is provided.
- the data recording medium having such a configuration, since the data recording medium is provided with the reproduction history management circuit, the reproduction of the content can be managed by itself, and the unlimited use of the recording medium of the copy source is possible. And prevent infringement of copyrighted work effectively.
- the data recording medium according to the present invention is the data recording medium according to Claim 1, wherein the data recording medium includes a recording layer for recording contents and a layer.
- the reproduction history management circuit is embedded in the base layer portion of the clipping area in the data recording medium, and the clipping area rotates the recording medium.
- the data recording medium is an area where the data recording medium is fixed with respect to the rotary drive. According to the data recording medium having such a configuration, the reproduction history management circuit is embedded in the base portion of the data recording medium. Therefore, even if physical stamping is performed, the encryption program can be used. Because it is embedded, it is not copied, and if you try to retrieve it, the contents will be broken, so you can provide more secure copyright management.
- the data recording medium according to the present invention (Claim 3) is the data recording medium according to Claim 1, wherein the content is encrypted using a key and the data is recorded on the data recording medium.
- the reproduction history management circuit which is recorded on a medium, stores a decryption key for decrypting the content recorded on the data recording medium, and a storage unit for reproducing the content from the data recording medium.
- a content output management unit for limiting the number of times that the decrypted content is output in a digital format.
- the content is encrypted and recorded on the data S recording medium, and a decryption channel for decrypting the content is provided in the reproduction history management circuit, thereby limiting the number of times of output in the digital format. So that even if you perform a physical stamp coby, etc., it can be played back because the content is encrypted. In the case of reproduction, the number of output times is limited and reproduction cannot be performed more than a predetermined number of times, so that copyright infringement can be effectively prevented.
- the data recording medium according to the present invention (Claim 4) is the data recording medium according to Claim 3, wherein the content recorded on the data recording medium is a title unit or an arbitrary content.
- the content output management unit has a decryption key for each of the above-mentioned content encryption units, and uses a different key for each of the above-mentioned content encryption units, and encrypts the content for each content title unit or arbitrary data size unit.
- the number of outputs in the digital format is limited.
- the content is encrypted using a different key for each unit of the title or an arbitrary unit of the data size, and is encrypted in units of the title or any unit of the size of the data.
- the data recording medium according to the present invention (claim 5) is the data recording medium according to claim 4, wherein the content output management unit is configured to output the content in a digital format.
- the Lai count is updated and recorded, and the count is compared with a preset limit count. If the number of times that the content is output in digital format exceeds the limit count, the content is output in digital format. Is not performed.
- the content output management unit updates and records the number of digital outputs, compares the number of times of digital output with a preset number of times, and does not output the digital output based on the result. As a result, it is possible to limit the number of times that content is copied in digital form.
- the data recording medium according to the present invention is the data recording medium according to Claim 5, wherein the content output management unit is configured so that the content is simultaneously transmitted in a digital format to a plurality of channels.
- the output path number storage section stores the number of paths when the content is output in the digital format. It is characterized by counting the digital output of content in consideration of the number.
- the output path number recording unit counts the number of paths in consideration of the number of paths when the contents are output in the digital format in a plurality of paths simultaneously. Even in a playback device equipped with a plurality of digital output interfaces, the number of duplications can be managed.
- the data recording medium according to the present invention (Claim 7) is the data recording medium according to any one of Claims 1 to 6, wherein the content output management unit is It has a personal information storage unit that stores personal information for recognizing the owner of the data recording medium, and compares information input from outside during the content reproduction with the personal information, and when the comparison result matches. The reproduction of the content can be performed only for the first time.
- the content output management unit has the personal information recording unit, compares the information input from outside at the time of reproducing the content with the personal information, and permits the reproduction only when the contents match. By doing so, it is possible to prevent an unspecified person other than the owner of the data recording medium from reproducing the content without permission.
- the data recording medium according to the present invention is the data recording medium according to Claim 7, wherein the content output management unit is configured to store information input from outside and A comparison is made with personal information, and a mismatch count storage unit is provided for storing the number of mismatches when the results of the comparison are successively mismatched. When the number of mismatches is greater than a predetermined value, the content is reproduced. It is characterized by suppressing the notification and notifying the outside.
- the content output management unit is provided with a number-of-coincidence holding unit, and the number of mismatches between the comparison result of the information input from the outside and the personal information is stored.
- the output of the content is suppressed and the notification is made to the outside. Therefore, it is possible to prevent an unspecified person other than the owner of the recording medium from reproducing the content without permission.
- the data storage medium according to the present invention (Claim 9) is the data storage medium according to any one of Claims 1 to 8,
- the output management unit further includes an encryption processing unit that performs an encryption process in accordance with a predetermined algorithm, performs cryptographic authentication between the data recording medium and the recording / reproducing device, and performs the content It is characterized by suppressing re-cattle.
- the reproduction history management circuit is provided with the encryption processing unit, and the authentication by the encryption can be performed between the reproduction history management circuit and the data recording medium. Content security can be further improved.
- the data management system according to the present invention [Claim 10] is a data management system for managing data using a data recording medium for recording or reproducing contents.
- a reproduction history management circuit for recording copyright protection information on a medium and referring to the copyright protection information during content reproduction to manage the reproduction output of the content; And a media management unit that manages writing or reading of data on the data recording medium.
- the encrypted content is stored in the playback history management circuit.
- the data is decrypted and reproduced using the decryption key possessed by the device and output in the digital format, the number of times of output is limited by the reproduction history management circuit. It is.
- the media management unit connected to the playback history management circuit manages writing or reading of data on the data storage medium, and the playback history management circuit performs the digitization. Since the output in the evening format is restricted, a system that effectively protects the copyright of the content can be provided.
- the data management system according to claim 10 is the data management system according to claim 10, wherein the recording / reproducing device includes a plurality of digital output devices.
- the playback history management circuit further records the number of paths when the content is output in a plurality of paths simultaneously in a digital format, and digitally records the plurality of paths. When outputting in format, the number of outputs is limited by the reproduction history circuit taking into account the number of paths described above.
- a data recording / reproducing apparatus having such a configuration records a plurality of paths by a reproduction history circuit, and outputs the digital data. Since the number of paths is added to the number of outputs in formula output, the number of paths is limited, so if multiple digital outputs are used and the reproduced content is simultaneously digitally copied, the number of copies must be limited. Can be.
- the data management system according to the present invention is the data management system according to Claim 10 or Claim 11, wherein the reproduction history management circuit is In addition, personal information for recognizing the owner of the data recording medium is further recorded, and when reproducing the content, the information input from outside is compared with the personal information of the reproduction history management circuit. However, according to the comparison result, the reproduction of the content is suppressed.
- the personal information of the playback history management circuit is compared with information input from the outside, and the content playback is suppressed based on the result. Unauthorized copying by anyone other than the owner can be prevented, and the security of the content can be strengthened.
- the data management system according to the present invention (claim 13) is the data management system according to claim 12, wherein the re-recording history management circuit further calculates the number of inconsistencies in the comparison result.
- the reproduction of the content is suppressed by comparing the number of times set as a child with the number of mismatches in the reproduction history channel. It is.
- the number of inconsistencies of the history management circuit is compared with a predetermined value to suppress the reproduction of the content, so that the content is not reproduced by anyone other than the owner of the content. Can be warned to the owner, and the security of the content can be further strengthened.
- the data management system according to the present invention (claim 14) is the data management system according to any one of claims 10 to 13, wherein the reproduction history management circuit is When the encryption key is encrypted according to a predetermined algorithm, the media management unit performs the encryption processing on the key with the same algorithm as that of the playback history management circuit. Using the encryption processing by the playback history management circuit and the encryption processing by the media management unit, Authentication is performed between a recording medium and the recording / reproducing apparatus, and whether or not the content can be decrypted is determined based on the result of the authentication.
- the authentication operation using encryption is performed between the recording / reproducing apparatus and the data recording medium, so that the content can be reproduced only in an environment where the encrypted communication is possible. Cows are allowed and content security can be enhanced.
- FIG. 1 is a diagram showing a conceptual configuration of a disk medium as a data recording medium according to a first embodiment
- FIG. 2 is a diagram showing a configuration including wire wiring of the disk media of the first embodiment.
- FIG. 3 (a) is a diagram showing a recording / reproducing apparatus used for reproducing contents recorded on the disk medium of Embodiment 1 or recording contents, and an arrangement of the disk medium.
- FIG. 3 (b) is a diagram showing a state in which the content recorded on the disk medium according to the first embodiment is placed on a motor for rotating a disk medium used for reproducing or recording content. .
- FIG. 3 (c) is a diagram showing the configuration of the disk medium of the first embodiment in more detail.
- FIG. 4 is a configuration diagram schematically showing a configuration of the semiconductor chip of the first embodiment.
- FIG. 5 is a configuration diagram showing an overall configuration of a data management system using a data recording medium according to the first embodiment.
- FIG. 6 is a diagram showing an overall operation when a content is decoded and recorded using the data management system according to the first embodiment.
- the 7 ⁇ is a diagram showing a detailed process of step Z1 at the time of recording of the data management system according to the first embodiment.
- FIG. 8 shows step Z2 of recording of the data management system according to the first embodiment.
- FIG. 10 is a diagram showing a detailed process.
- FIG. 9 is a diagram showing a detailed process of step Z3 at the time of self-recording of the data management system according to the first embodiment.
- FIG. 10 is a diagram for explaining an overall operation when the content recorded on the disk medium according to the first embodiment is reproduced by the recording / reproducing apparatus.
- FIG. 11 is a diagram showing a detailed process of step A2 when reproducing the content of the data management system according to the first embodiment.
- FIG. 13 is a diagram showing a detailed procedure of step A3 when reproducing the content of the data management system according to the first embodiment.
- FIG. 14 is a diagram showing a detailed process of step A4 when reproducing the content of the data management system according to the first embodiment.
- FIG. 15 is a configuration diagram schematically showing a configuration of a semiconductor chip mounted on a disk medium as a data recording medium according to the second embodiment.
- FIG. 16 is a configuration diagram showing an overall configuration of a data management system using a data storage medium according to the second embodiment.
- FIG. 17 is a diagram for explaining the overall operation when the content recorded on the disk medium according to the second embodiment is reproduced by the recording / reproducing device.
- FIG. 8 is a diagram showing a detailed process of step B1 when reproducing the content of the data management system according to the second embodiment.
- FIG. 19 is a diagram showing a detailed process of step B2 when the contents of the data management system according to the second embodiment are synchronized.
- FIG. 20 is a diagram showing a detailed process of step B3 when reproducing the content of the data management system according to the second embodiment.
- FIG. 2 is a diagram showing a detailed process of a step B4 of the P festival for reproducing the content of the data management system according to the second embodiment.
- 2nd ⁇ is a configuration diagram schematically showing a configuration of a semiconductor chip mounted on a disk medium which is a data recording medium according to the third embodiment.
- FIG. 23 shows a data management system using a data recording medium according to the third embodiment.
- FIG. 2 is an overall configuration diagram showing a procedure for registering personal information of a personal computer.
- FIG. 24 is a diagram showing a detailed step S1 of the procedure for registering personal information of the data management system according to the third embodiment.
- FIG. 25 is a diagram showing a detailed process of step C2 which is a procedure of registering personal information of the data management system according to the third embodiment.
- FIG. 26 is a diagram showing a detailed process of step C3 which is a procedure for registering personal information of the data management system according to the third embodiment.
- FIG. 27 is a diagram showing a detailed process of step C4, which is a procedure of registering personal information of the data management system according to the embodiment 3 of Fuse.
- FIG. 28 is an overall configuration diagram showing a procedure for confirming registered personal information of the data management system using the overnight recording medium according to the third embodiment.
- FIG. 29 is a diagram showing a detailed process of step D3, which is a procedure for confirming registered personal information in the data management system according to the third embodiment.
- FIG. 30 is a diagram showing a detailed process of step D4 which is a procedure for confirming registered personal information of the data management system according to the third embodiment.
- FIG. 31 is a diagram showing a detailed process of step D4 which is a procedure for confirming registered personal information of the data management system according to the third embodiment.
- FIG. 32 is a configuration diagram schematically showing a configuration of a semiconductor chip mounted on a disk medium which is a data storage medium according to the fourth embodiment.
- FIG. 33 is an overall configuration diagram showing a procedure for recording an unauthorized access at the time of confirming personal information in a data management system using a data recording medium according to the fourth embodiment.
- FIG. 34 is a diagram showing a detailed process of Step E4 in the order of recording the unauthorized access of the data management system according to the fourth embodiment.
- FIG. 35 is a diagram showing a detailed process of Step E5 which is a procedure for recording an unauthorized access of the data management system according to the fourth embodiment.
- FIG. 36 is a configuration diagram schematically showing a configuration of a semiconductor chip mounted on a disk medium as a data recording medium according to the fifth embodiment.
- FIG. 37 is a configuration diagram showing an overall configuration of a data management system using a data storage medium according to the fifth embodiment.
- FIG. 38 is a diagram for describing an overall operation when performing authentication using a cryptographic algorithm when reproducing content in the data management system according to the fifth embodiment.
- FIG. 39 is a diagram showing a detailed process of step G1, which is a procedure for performing authentication of the data management system according to the fifth embodiment.
- FIG. 40 is a diagram showing a detailed process of step G2 which is a procedure for performing authentication of the data management system according to the fifth embodiment.
- FIG. 41 is a diagram showing a detailed process of step G3 which is a procedure for performing authentication of the data management system according to the fifth embodiment.
- FIG. 42 is a diagram showing a detailed process of Step G4 which is a procedure for performing authentication of the data management system according to the fifth embodiment.
- FIG. 43 is a diagram showing a detailed process of Step G5 which is a procedure for performing authentication of the data management system according to the fifth embodiment.
- FIG. 44 is a diagram for explaining a CGS (Copy Generation Management System) system, which is an example of a copyright protection system using a conventional data management system.
- CGS Copy Generation Management System
- FIG. 45 is a configuration diagram showing the overall configuration of a conventional data management system using a conventional data recording medium.
- FIG. 1 is a conceptual configuration diagram of a disk medium 100 which is a data recording medium according to Embodiment 1 of the present invention.
- 100 is, for example, DVD—Disc media composed of poly-carbon such as RAM
- 101 is a semiconductor chip (reproduction history management circuit) including a non-volatile semiconductor chip as a storage element
- 102 is a data area
- 103 is a disk medium for fixing the disk medium 100 to a rotary drive described later.
- Living area 104 is disk media 1
- the number of semiconductor chips is one here, for example, two semiconductor chips may be arranged so as to be symmetrical with respect to the center hole 90 so as to provide a balance when there are a plurality of semiconductor chips.
- FIG. 2B is a diagram showing an example of a wire arrangement provided on the disk medium for connecting the semiconductor chip 101 mounted on the disk medium 100 to an electrical signal.
- reference numeral 105 denotes a single wire provided in the clipping area 1.03, a data line as a bidirectional signal line from the outer peripheral side of the disk medium 100, and a power supply line for supplying a power source.
- a clock line for supplying a clock for driving the semiconductor chip 101 and a GND line for supplying a ground potential are arranged in this order in a circle.
- one wire is arranged only on the upper surface of one side of the disk medium 100, but it may be arranged on both sides.
- FIGS. 3 (a) and 3 (b) show a recording / reproducing apparatus 200 for recording / reproducing using the disk medium 100 having the above configuration and a wire wiring 1 provided on the disk medium 100.
- FIG. 3 (c) shows a partial plan view and a cross-sectional view when connection with the disk medium 105 is made
- FIG. 3 (c) is a cross-sectional view showing the configuration of the disk medium 10 ° in more detail.
- reference numeral 106 denotes a tray for arranging the disk medium 100
- reference numeral 107 denotes a clip for fixing the disk medium 100
- reference numeral 108 denotes a disk for the clipping 107.
- Reference numeral 109 denotes a spindle motor for rotating the disk medium 100
- reference numeral 208 denotes an optical pickup for reading out bits formed in the data area 102 of the disk medium 100.
- the disc medium 100 has three layers, 13 1 is a ⁇ ⁇ layer, and 13 2 is a recording layer for recording contents.
- the semiconductor chip 101 is provided with a pin 133 corresponding to the wire-to-wire wiring 105 provided in the clipping region 103, whereby the semiconductor chip 101 is provided. And the wire wiring 105, and as described above, power and signals are supplied to the semiconductor chip 101.
- a semiconductor chip 105 provided with a bin 133 is fitted into a layer 131 having a concave portion in the clipping region 103.
- the recording layers 13 2 are applied to both sides, a metal pattern is formed on the surface from which the bins 13 3 are exposed by masking wire wirings 105 corresponding to the respective bins 13 3. Things.
- the recording layer may be two layers having only one side.
- the tray 106 when the disc media 100 is mounted on the tray 106, the tray 106 is housed inside the recording / reproducing device 200, and the disc media 100 is clipped. 7 and the spindle motor 109 rotate from top to bottom, rotate by the spindle motor 109, and access the data area 102 of the disk medium 100 by the optical pickup 208, which will be described later. It communicates with the encryption unit overnight for recording and playback.
- the above clipping 107 fixes the disc medium 100
- the wire arranged on the disc medium 100 comes into contact with the wire, so that the recording / reproducing apparatus 200 and the disc medium are connected through the data line.
- the semiconductor chip 101 embedded in 100 can perform data communication. Next, the operation will be described.
- the semiconductor chip 101 When encrypting and recording the contents in the disk media 100, as shown in FIG. 4, the semiconductor chip 101 has a bidirectional communication port of I / O 110, CPU 1 1 1 (content output management unit) that controls and calculates the overnight signal and control signal, and holds non-volatile memory, such as EPR0M and EEPR0M, that stores management information for recording data.
- Table 1 shows the contents of the information stored in the storage unit 112, where 114 is the title, 115 is the decryption key that holds the decryption key when encrypting in units of title, and 1 Reference numeral 16 denotes digital output limit number information, which is information for limiting the number of digital outputs of recording data in units of titles.
- FIG. 5 is a block diagram of the recording / reproducing apparatus 200 shown in FIG. 3 (a) for recording data on the disk medium 100 or reproducing the recorded data.
- Reference numeral 201 denotes a signal processing unit; 202, a media management unit for managing data read / write to the disk medium 100; 203, a data signal in the recording / reproducing device 200;
- the CPU 204 that controls the control signal is used to perform bidirectional data communication with the external recording / reproducing device 212, which is an external device connected to the recording / reproducing device 200 via the connection cable 213.
- a digital interface 205 is a D / A converter that converts digital data into analog data and outputs the analog data.
- Reference numeral 206 denotes a user or a user setting unit for performing an operation of the recording / reproducing device 200
- reference numeral 207 denotes a user interface for displaying the operation of the recording / reproducing device 200.
- Display unit, 208 is optical bit-up for recording or reproducing data on disk media 100
- 209 is an A / D converter that converts input analog data to digital data
- 211 is encryption This is a random number section for validating the key used in the section 210.
- the digital output limit number information 1 1 6 data of the semiconductor chip 101 If not set, it shall be set to “0”, and if set, it shall be counted down every time a digital copy is performed, and if the value becomes “1”, digital copying shall be prohibited, for example, l loJ When only digital copying is permitted, the explanation above assumes that the above value is set to “2”. Recording or playback of content on the disc medium 100 is performed in title units.
- step Zl and step Z3 are performed by the recording / reproducing device 200, step Z2 is performed by the semiconductor chip 101, and performed by the procedure of step Z1 to step Z3. .
- step Z1 shown in FIG. 7 when the disk medium 100 is arranged in the recording / reproducing apparatus 200 in step A201 as shown in FIG.
- the optical pickup 208 accesses the T0B area 104 of the disc medium 100, the title and arrangement of data recorded by the user and the empty area in the disc medium 100 are detected. After that, the evening title is displayed on the display unit 2007.
- step A202 the user sets the title of the content data recorded by the user, the digital output limit count information, and the presence / absence of content encryption in the user setting section 20fi (here, the title: program: A, Digital output limit number information: 5, (5) Bowing: Yes.
- step A203 the CPU 203 transfers the title and digital output limit count information to the media management section 202 based on the information set in the user setting section 206, and the random number section 2 11. Generate a cryptographic key (Key A) by using the random number according to 1.
- step A204 the analog program A is input to the A / D converter 209, where it is converted to digital, and further transmitted to the Shinbow processing unit 201, where blog ram a recorded formatted, and transmitted to the encryption unit 2 1 0, in the encryption unit 2 1 0, then transmitted to the optical big up 2 Q 8 encrypts the program a by using the key a, CPU 2 0
- the encrypted program A is recorded in the optical data storage area 102 of the disk medium 100 from the optical pickup 202 under the control of step 3 to the recording data area 102 of the disk medium 100.
- Titles and discs The data arrangement in media 100 is recorded in TOB area 104.
- step A205 the media management unit 202 transmits the registration command, title (program A), digital output limit count information (5), and key A to the semiconductor chip 101 via the data line.
- step 8 of step Z2 in step A208, the registration command, title (program A), digital output limit count information (5), and key A are stored in the I / O 110. Receive.
- step 209 the CPU 111 transmits the received information of step A208 to the storage unit 112 by the registration command received by the I / O 110, and as shown in Table 1, Remember.
- step A210 the storage end communication is transmitted to the media management unit 202.
- step 3 which is the processing of step 3, the communication end is received in step A213, and the operation of storing the setting information in the disk medium 100 ends.
- step A1 and step ⁇ 3 are performed by the recording / reproducing device 200
- step A2 and step A4 are performed by the semiconductor chip 101
- steps A1 to A4 are performed. Done in steps.
- step A401 when the disk media 100 is arranged in the recording / reproducing apparatus 200 as shown in FIG. 3 is that the optical backup 208 accesses the TOB area 104 of the disk medium 100, and the title and arrangement of the data recorded by the user in the disk medium 100, the empty area, etc. After detection, the evening title is displayed on the display unit 2007.
- step A4-2 the user wants to play the title to play. Whether or not to output from the external interface 204 to the external recording / reproducing apparatus 212 via the connection cable 213 is set in the CPU 203 via the user setting section 206 (Title: Program A, digital Output: Yes).
- step A403 the CPU 203 transmits a start command indicating the start of reproduction, a title to be reproduced, and information on the presence or absence of digital output to the semiconductor chip 101 from the media management unit 202 via the data lines 108 and 105.
- step A406 the semiconductor chip 101 receives the information set in step A402 by the I / O 110, the CPU 111 confirms the start command, and thereafter, in step A407, Check the presence or absence of digital output at.
- step A409 the decryption key (key A) selected from the decryption key unit 115 of the storage unit 112 according to the title (program A) is recorded and reproduced. Send to 200.
- step A407 if there is a digital output in step A407 (yes), the process proceeds to step A408, where the digital output limit count information 116 of the semiconductor chip 101 is compared with “2” to determine the digital output limit count.
- the decryption key (key A) selected from the decryption key unit 115 of the storage unit 112 according to the title (program A) in step A409 is recorded / reproduced 200 Send to
- step A408 if the digital output limit count information 116 is smaller than “2j (no), in step A410, the recording / reproducing apparatus 200 transmits a reproduction rejection command to reject the transmission of the decryption key for reproducing the content. Then, the communication is terminated in step A411.
- step A414 the decryption key in step A409 is received, or the reproduction rejection command is received in step A410, and in step A415, the reproduction rejection command is confirmed. If the command is a reproduction disallowed command (yes), the process proceeds to step A 416 and the display unit 207 visually or audibly changes the setting information in step A 402. Prompt.
- step A403 After the end of step A403, the setting information of step A402 can be changed. In the case of the change, the setting information is deleted and the setting is restarted from step A402. As a result, even if the digital output is set to “absent” in step ⁇ 402 and the digital output is set to “present” after step 2 402, the digital output starts from step ⁇ 408 It is possible to prevent illegal digital output of impossible contents.
- step A415 the flow advances to step A417 to check for the presence or absence of the digital output set in step A402. (Yes), go to step A 418 and enter the decryption key (key A) obtained in step A 414 with the contents of the title (program A) set in step A 402.
- the digital data is output from the digital interface 204 in a digital format, and in step A419, when the reproduction is completed, the reproduction end is transmitted to the semiconductor chip 101.
- step A 4 17 the presence or absence of the digital output set in step A 402 is confirmed, and if this is “none” (no), the process proceeds to step A 420 and proceeds to step A 4 ⁇
- the title (program A) set in step 2 is decrypted using the decryption key (key A) received in step-up A4 14 and played back in analog format from the DZA converter 205. .
- the semiconductor chip 101 is provided in the disc medium 100 as the content recording medium, and the information for limiting the number of digital outputs to the semiconductor chip 101 is provided.
- the number of digital outputs such as digital copying of content can be limited, and the semiconductor chip Since the chip 101 is embedded in the disk medium 100, even if the content memory area is physically copied by a method such as stamp copying, the semiconductor chip 101 is not copied.
- the content since the content is encrypted so that it can be decrypted only with the key stored in the semiconductor chip 101, the content is not taken out in a reproducible state.
- step A 4 23 the digital output limit count information 1 16 is updated, so the digit output is stopped during playback due to some kind of trouble. Even in this case, digital output of the content can be guaranteed.
- Embodiment 2 of the present invention a data recording medium and a data management system according to Embodiment 2 of the present invention will be described.
- the first embodiment the case where there is one digital interface has been described.
- the second embodiment a case where a reproducing operation having a plurality of digital input / output ports is used will be described.
- Fig. 15 is a diagram showing the configuration of the semiconductor chip 101a.
- 113 holds the number of digital outputs to the outside.
- This is a digital output number holding unit (output / path number storage unit) for performing the operation.
- the same reference numerals as those in FIG. 4 denote the same or corresponding parts.
- FIG. 16 is a block diagram of a # 3 recording / reproducing apparatus having a plurality of digital input / output ports and capable of reproducing the recorded data of the disk medium 100 and having the operation of FIG. 3 (a).
- 300 is a recording / reproducing device
- 301 is a digital interface (A)
- 302 is a digital interface with multiple digital output ports (B)
- 3 ⁇ 3 is a hard disk (HDD ) Device (A)
- 304 is a hard disk (HDD) device (B).
- the same reference numerals as those in Fig. 5 indicate the same or corresponding parts.
- steps B1 and B3 are performed by the recording / playback apparatus 300, and steps B2 and B4 are performed by a semiconductor. This is performed with chip 101a, and the procedure is performed in steps B1 to B4.
- step B601 when the disk medium 100 is arranged in the recording / reproducing apparatus 300 as shown in FIG.
- Reference numeral 203 denotes an optical pickup that accesses the TOB area 104 to recognize the title and arrangement of data recorded by the user and the empty area in the disc medium 100. To display the title on the display unit 2007.
- step B602 the title that the user wants to play is set in the user setting section 206 to the digital interface (A) 301, (B) 302, and the connection cable 213.
- step B603 Select when digital output is to be performed on 304, and set the number of digital outputs to CPU 203 via user setting section 206 (Digital: Program A, Digit: 3 Then, in step B603, a start command indicating the start of the program, the title to be reproduced, and the number of digital outputs are transmitted to the semiconductor chip 10la.
- step B603 a start command indicating the start of the program, the title to be reproduced, and the number of digital outputs are transmitted to the semiconductor chip 10la.
- the explanation is made as "0".
- step B606 the information set in step B602 is received, and after confirming the start command, step B606 is executed.
- step 7 the presence or absence of digital output is detected by comparing the number of digital outputs with “0 j.”
- step B607 if the number of digital outputs is “0” (no), The digital output is determined to be “absent” and the process proceeds to step B 6 14, where the decryption key (key A) selected from the decryption key section 115 according to the evening is transmitted to the recording / reproducing device 300.
- step B607 if the digital output number is other than “0” in step B607 (yes), the digital output is set to “yes” and the process proceeds to step B608, where the digital output limit l £ l number information 1 1 Is digital output possible by comparing 6 with “2”? Is detected.
- step B608 if the digital output limit count information 116 is smaller than "2" (no), the process proceeds to step B611, where the reproduction key that rejects the transmission of the decryption key for reproducing the content cannot be reproduced. The permission command is transmitted to the semiconductor chip 101a. On the other hand, if the digital output limit count information 116 is equal to or greater than “2” in step B 608 (yes), step B 609 is executed.
- step B609 the number of digital outputs is compared with "2". If the number of digital outputs is less than "2", that is, if it is "1" or less (no), step B In 613, the number of digital outputs is set in the digital output number holding unit 113, and in step B614, the decryption key (key A) selected from the decryption key unit 115 in accordance with the evening (program A) is stored in the recording / reproducing apparatus 300. Send.
- step B610 If the number of digital outputs is greater than 2 in B609 (yes), proceed to step B610, where the digital output limit count information 116—the number of digital outputs is compared with “1” Digital output limit count information 1 16—If the number of digital outputs is less than “1” (yes), a playback disable command that rejects the transmission of the decryption key for content playback in step B 611 is sent to the semiconductor. Transmit to chip 101a and end communication in step B612.
- Digital output limit count information 1 16 in B 610 If the number of digital outputs is greater than or equal to “1” (no), go to step B 613 to reduce the number of digital outputs to the number of digital outputs It is set in the storage unit 113 (3), and the decryption key (key A) selected from the decryption key 115 according to the title (program A) is transmitted to the recording / reproducing device 300 in step B 614.
- step B617 the reproduction disable command of step B611 or the decryption key of step B614 is received, and in step B618, the above received It is confirmed whether or not the command is a playback rejection command. If the command is a playback rejection command (yes), the process proceeds to step B 619, and the display unit 207 visually or audibly proceeds to step B 602. Prompt for change of setting information. On the other hand, if it is determined in step B 618 that the received command is not a reproduction disable command (no), the process proceeds to step B 620 to compare the number of digital outputs with “0”. Use to detect the presence or absence of digital output.
- step B620 if the number of digital outputs is "0" (no), the digital output is set to "none", and in step B623, the contents of the title (program A) set in step B602 are used.
- step B 617 Using the decryption key (key A) received in step B 617, only the analog output from D / A converter 205 is reproduced.
- step B 620 determines whether the number of digital outputs is “0” in step B 620 (yes). If the number of digital outputs is not “0” in step B 620 (yes), the digital output is regarded as “present” and the contents of the title (program A) set in step B 602 are used. It is reproduced using the decryption key (key A) received in step B 617, and is output in digital form from the digital interface (A) 301 or digital interface (B) 302. When the reproduction is completed in 622, the reproduction end is transmitted to the semiconductor chip 101a.
- step B626 it is confirmed that the reproduction has been completed. If the reproduction has been completed, the process proceeds to step B627, and the digit output limit number information 116 (5) is used.
- the digital output limit information 116 (2) is updated to the number of times the digital output number holding unit 113 (3) is subtracted, and the digital output limit count information 116 (2) is stored.
- the semiconductor chip 101a in the disk medium 100 has a function of holding the number of digital outputs. After the digital copy, the value of the digital output number storage unit 113 is subtracted from the digital output limit count information 116, so that the reproduced content can be digitally copied simultaneously using multiple digital outputs. Can be limited to the number of Coby.
- the semiconductor chip 10 lb has a function of permitting the reproduction of the disk media by performing the personal authentication using the user's personal information (password). It is added.
- the function of the third embodiment is applied to the first embodiment.
- FIG. 22 is a block diagram showing the configuration of the semiconductor chip 101b in the third embodiment.
- 117 is a personal information holding unit (personal information holding unit) for holding a password for personal authentication.
- Information storage unit The other parts are the same as in FIG. 4, and the description thereof is omitted here.
- Embodiment 3 configured as described above will be described with reference to FIGS. 23 to 27.
- the CPU 111b of the semiconductor chip 101b checks the personal information storage unit 117, and if the personal information is set (other than 0), recording and playback Description will be made assuming that access to the storage unit 112 is restricted if the personal information input from the device 200 does not match.
- Step C1 and Step C3 are performed by the recording / reproducing apparatus 200, Step C2 and Step C4 are performed by the semiconductor chip 101b, and Step C1 to Step C4 are performed.
- the procedure is as follows.
- step C801 the disk medium 100 is placed in the recording / reproducing device 200, so that the CPU 203 becomes the disk medium 100.
- step 804 the personal information confirmation command is received, and the CPU 111b receives the personal information confirmation command and returns to step C8 ⁇ 5 based on the personal information confirmation command.
- step C 807 the personal information holding unit 117 is “0” (no)
- step C806 the process proceeds to step C806 to transmit a personal information present command as “personal information exists”.
- step C811 the command with personal information or the command without personal information is received, and the CPU 203 confirms in step C812 whether or not the command is without personal information. If a command without personal information is detected (yes), the process proceeds to step C813 to perform a playback operation, or a registration command for registering personal information and a personal information to be registered are set in the user setting unit 206. And sends it to the semiconductor chip 10 1 b.
- the operation in the case where a command other than the command with no personal information is detected in step C812 (no) will be described in the operation of the personal authentication described later.
- step C817 the registration command and the personal information to be registered are received, and the CPU 111b receives the personal information in step C818 based on the registration command. It is stored in the holding unit 117.
- Step C1, Step D3 and Step D5 are performed by the recording / reproducing apparatus 200, and Step C2 and Step D4 are performed with a semi-conductive chip of 10 lb. Perform step D5. Note that, here, the same step names as in FIGS. 23 to 27 are the same processing, and the description thereof will be omitted.
- step D1011 a command with personal information or a command without personal information is received, and then in step D1012, the CPU 203 determines whether the command without personal information or ⁇ When the command is confirmed and the command is other than the command without personal information (no), input of personal information is prompted to the display unit 207 in step D1014. When the personal information is input, step D1015 is executed. In step (1), a personal information command, which is a command for confirming personal information, and input personal information are transmitted to the semiconductor chip 101b.
- step D1018 the personal information command and the input personal information are received, and the CPU 11lb receives the personal information in step D1019 based on the personal information command.
- the personal information in the holding unit 117 is compared with the input personal information, and if the personal information matches (yes), the process proceeds to Step D1020, and a continuation command is transmitted to inform the user that the personal authentication has been established. In the case of a match (no), the process proceeds to step D1021 to transmit a communication end.
- step D 1019 the user authentication is established, and the CPU 11 lb thereafter operates to access the storage unit 112, thereby allowing the CPU 11 lb to access the disk medium 100. Recording or re-cow-movement becomes possible.
- FIG. 31 which is the processing of step D5, in step D1024, the relay command or the communication end is received, and in step D1025, the CPU 2 ⁇ 3 checks whether or not the connection command is a continuous command. If it is determined that the command is a continuation command (yes), the flow advances to step D1026 to issue a recording or reproducing operation to the disk medium 100 or an instruction to erase information in the personal information holding unit 117. It is possible to issue an erasure command and send a registration command for changing registered personal information.
- step D 1025 determines whether the command is a continuation command (no). If it is determined in step D 1025 that the command is not a continuation command (no), the process proceeds to step D 1027 to end communication.
- the personal information holding unit 117 may be provided with a plurality of personal information, and the user may select his / her personal information in the personal information holding unit 117 and perform the above operation a plurality of times. .
- the personal authentication information may be set in units of titles registered in the storage unit 112 of the semiconductor chip 101b, and the reproduction may be performed only when the personal authentication is established.
- the personal information (password) of the user is stored in the semiconductor chip 1 • 1b in the disk medium 100, and the user's personal information (password) is recognized when the medium is reproduced.
- the user can be identified on the disc media side, and the act of unauthorized copying of the disc media 100 by a third party can be prevented, and the security of the content is strengthened. Things.
- FIG. 32 is a block diagram showing the structure of the semiconductor chip 101c in the fourth embodiment.
- 118 indicates that the confirmation of the personal information (password) did not match.
- It is an illegal count holding unit for holding the count (151 individual matching number holding unit).
- the other parts are the same as those described in the section 22 and their description is omitted here.
- Step C1, Step D3 and Step E5 are performed by the recording / reproducing apparatus 200, and Step C2 and Step E4 are performed by the semiconductor chip 101c. Perform the procedure from C1 to Step E5.
- the same step names as those in FIG. 28 are the same processing, and the description thereof is omitted.
- step E111 a personal information command and input personal information are received.
- step E 1102 the CPU lllc compares the stored content of the unauthorized number storage unit 118 with “0”, and if the stored content of the unauthorized number storage unit 118 is “0” ( (yes), proceed to step El 10
- the primary access command is transmitted to the recording / reproducing device 200.
- step E 1102 if the storage content of the illegal number holding unit 1 18 is not “0” (no), the process proceeds to step E 110 4, and the CPU 11 1 c Based on the personal information command, the personal information storage unit 117 is compared with the input personal information. If the result matches (yes), the process proceeds to step E 1105 and the number of times of unauthorized number storage unit 1 1 Clear 8 to set a predetermined value other than "0", and in step El106, send a continuation command to notify that the identity has been established.
- step E 1104 if there is no match (no), the process proceeds to step E 1107, and the result of subtracting “1” from the value stored in the individual number holding unit 118 Is stored as the individual loJ number storage unit 118, and the end of communication is transmitted to the recording / reproducing device 200 in step E111.
- step E111 if the personal authentication is established before the value set in the unauthorized number storage unit 118 becomes “0”, the non-TK ⁇ number storage unit 118 Is cleared and returns to the specified value. As a result, even if the wrong number is recorded due to the wrong input by the user, the incorrect number is counted again by performing the correct input again, and the disk media is unexpectedly accumulated due to the accumulation of the wrong number due to the wrong input. Access to the Internet is not prevented. In addition, if a person other than the person continuously inputs information that is not stored in the personal information storage unit 117 in order to perform unauthorized personal authentication, the value of the fraud count storage unit 118 is changed to “0”. ”, And when the number-of-illegal-times storage unit 118 becomes“ 0 ”, it can be detected that there has been an unauthorized access.
- step E111 an unauthorized access command, a succession command, or communication termination is received, and in step E111, the CPU 2 03 checks whether the received information is an unauthorized access command or not. If the received information is an unauthorized access command (yes), the process proceeds to step E111 and proceeds to the display section 210. , Or visually indicate that the wrongdoing has been committed.
- step E111 the process proceeds to step E111 and proceeds to C
- the PU 203 checks whether or not the information is a continuation command. If this information is a continuation command (yes), the process proceeds to step E111, and the recording or reproduction on the disk medium 100 is performed. It can transmit an operation, an erase command which is an instruction for erasing information in the personal information storage unit 117, a registration command for changing registered personal information, and the like.
- step E1114 If it is determined in step E1114 that CPU203 is not a continuation command (no), the process proceeds to step E111 to end communication.
- the semiconductor chip 101 c of the disk medium 100 with a function of storing the number of times of unauthorized access, for example, a third party maliciously uses the disk medium 100 c. Since the unauthorized access to 0 can be recorded and held on the disk medium 100 side, it is possible to warn the authorized owner of the disk medium 100 of the unauthorized access.
- the re-cattle device when unauthorized access is detected, it is possible for the re-cattle device to stop the illegal act by threatening, for example, by making a loud noise.
- FIG. 3G is a block diagram showing the configuration of the semiconductor chip 101 d according to the fifth embodiment.
- reference numeral 119 denotes the same encryption unit as the encryption unit 210 of the recording / reproducing apparatus 200.
- a cryptographic unit having a cryptographic algorithm 120 is a random number unit that generates random numbers, and 121 is a key box unit that is a set of key arrays used in the cryptographic unit 119.
- the other parts are the same as those shown in FIG. 4, and the description thereof is omitted here.
- FIG. 37 is a block diagram of the recording / reproducing device 400 in the fifth embodiment.
- reference numeral 214 denotes a semiconductor chip 101 d mounted on the disk medium 100.
- Table 2 shows information held in the key box section 121 and the key box section 214.
- 1700 is a key code for selecting a key
- 1701 is selected according to a key code 1700. Is the key.
- step Gl, step G3, and step G5 are performed by the recording / reproducing apparatus 400, and step G2 and step G4 are performed by the semiconductor chip 101d, and the steps G1 to G5 are performed. .
- step G1 an authentication set command is transmitted to the semiconductor chip 101d in step G1801.
- step G2 which is the processing of Step G2
- the authentication set command is received in Step G1804, and the CPU 1111d generates a random number by the random number unit 120 in Step G1805 based on the authentication start command.
- step G 1806 a sequence of random numbers RX is used to generate “key code 1”, and “key KC 1” is selected from “key code 1” in the key box section 121.
- step G1811 E1 and "key code 1" are received, and in step G1812, the CPU 203 executes "key code 1" in the key box unit 214.
- step G1814 a random number is generated by the random number section 211, and a “key code 2” different from the “key code 1” is generated using the sequence of the random numbers.
- the key is selected from the key box 214 as “key KC 2”.
- step G1821 which is the processing of step G4
- step G1821 ⁇ 2 and “key code 2” are received
- step G1822 CPU 1 11d converts “key code 2” in key box section 121 to “key code 2”.
- step G1823 decrypt E 2 using the “Key KC2” as the key and decrypt it with the encryption unit 119:
- Execute D2 (KC2, E2) to create D2.
- G 1824 turbulent Comparing the numbers RX and D2, if the random numbers RX and D2 do not match (no), proceed to step G1827 to transmit a communication end, and end the communication in step G1828.
- step G1531 the continuation command or the communication end is received.
- step G1532 it is confirmed whether or not the received information is the continuation command. ⁇ If it is determined that the command is not a general command (no), the flow proceeds to step G1534 to end the communication. Conversely, if it is determined that the command is a continuation command (yes), the flow proceeds to step G1533. Perform playback operation with.
- the encryption processing function is provided in the semiconductor chip 101 d of the disk medium 100, and authentication is performed using encryption. 100 playbacks will be allowed, and the content security can be further improved.
- the transmission key for encrypting and transmitting the data necessary for the recording or reproducing operation using the data of the communication process including the random number data may be different for each authentication. Because it is generated in a secure key, a highly secure key can be created.
- the semiconductor chip 101 to which the bin 133 is connected is fitted into the base 131 having a concave portion, and the recording layers 132 are formed on both sides thereof.
- the example of application is described above, only the portion of the cribbing region 103 having the semiconductor chip 101 and the wire-to-wire 105 is separately formed, and the disk media 10 outside the cribbing region 103 are formed as before. A method of fitting it to zero is also possible.
- the power supply and the signal are supplied to the semiconductor chip 101 mounted on the disk medium 100 by using the wire wiring 105 for the clipping area 103.
- An example of this is shown in the figure.
- a solar battery panel is mounted in the clipping area 103 to supply power to the semiconductor chip 101 and to specify the semiconductor laser to identify the solar battery panel.
- the ability to exchange signals by irradiating a position is also a feature.
- the password is stored in the disk medium 100 as personal information, and the password is confirmed.
- the disk medium 100 and the playback device 4 are encrypted using encryption processing. Authentication was performed between 0 and 0, but the algorithm for authentication was provided in a medium such as an I-card, and a medium such as an IC card was used instead of a key during content playback. It is also possible to prevent unauthorized use. Available on the shark industry
- the overnight recording medium and the overnight management system according to the present invention can improve the security of copyright management on disk media and effectively prevent copyright infringement. It is extremely useful as a tool.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP11/152057 | 1999-05-31 | ||
JP15205799 | 1999-05-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000074046A1 true WO2000074046A1 (en) | 2000-12-07 |
Family
ID=15532118
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2000/003482 WO2000074046A1 (en) | 1999-05-31 | 2000-05-31 | Data recording medium and data management system |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2000074046A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005316994A (en) * | 2004-04-01 | 2005-11-10 | Sony Corp | Optical disk recording/reproducing device, optical disk reproducing device, optical disk, optical disk recording/reproducing method, optical disk reproducing method and content protection program |
JP2007528061A (en) * | 2004-02-17 | 2007-10-04 | ソニー株式会社 | Apparatus for managing a copy of a digital medium using a wireless IC tag (RFID) |
JP2008021395A (en) * | 2006-07-14 | 2008-01-31 | Univ Of Tokyo | Optical memory to record access |
JP2009110596A (en) * | 2007-10-30 | 2009-05-21 | Sony Corp | Disk, information processing method, and computer program |
JP2009272002A (en) * | 2008-05-08 | 2009-11-19 | Sony Corp | Information processor, disk, and information processing method and program |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08195064A (en) * | 1995-01-12 | 1996-07-30 | Sony Corp | Recording medium and recording and reproducing device |
JPH1021144A (en) * | 1996-07-03 | 1998-01-23 | Hitachi Ltd | Digital writing work distributing system and illegal copy detecting method |
JPH10228727A (en) * | 1996-12-20 | 1998-08-25 | Texas Instr Inc <Ti> | Bios based on tiris for protecting copyright setting program medium |
JPH1196675A (en) * | 1997-09-24 | 1999-04-09 | Matsushita Electric Ind Co Ltd | Digital recording medium, data ciphering device of the same, data deciphering device, data ciphering/deciphering device, its method, and recording medium recording the method |
-
2000
- 2000-05-31 WO PCT/JP2000/003482 patent/WO2000074046A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08195064A (en) * | 1995-01-12 | 1996-07-30 | Sony Corp | Recording medium and recording and reproducing device |
JPH1021144A (en) * | 1996-07-03 | 1998-01-23 | Hitachi Ltd | Digital writing work distributing system and illegal copy detecting method |
JPH10228727A (en) * | 1996-12-20 | 1998-08-25 | Texas Instr Inc <Ti> | Bios based on tiris for protecting copyright setting program medium |
JPH1196675A (en) * | 1997-09-24 | 1999-04-09 | Matsushita Electric Ind Co Ltd | Digital recording medium, data ciphering device of the same, data deciphering device, data ciphering/deciphering device, its method, and recording medium recording the method |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007528061A (en) * | 2004-02-17 | 2007-10-04 | ソニー株式会社 | Apparatus for managing a copy of a digital medium using a wireless IC tag (RFID) |
JP4796510B2 (en) * | 2004-02-17 | 2011-10-19 | ソニー株式会社 | Apparatus for managing a copy of a digital medium using a wireless IC tag (RFID) |
KR101082267B1 (en) * | 2004-02-17 | 2011-11-09 | 소니 일렉트로닉스 인코포레이티드 | System using radio frequency identification(rfid) for copy management of digital media |
JP2005316994A (en) * | 2004-04-01 | 2005-11-10 | Sony Corp | Optical disk recording/reproducing device, optical disk reproducing device, optical disk, optical disk recording/reproducing method, optical disk reproducing method and content protection program |
JP2008021395A (en) * | 2006-07-14 | 2008-01-31 | Univ Of Tokyo | Optical memory to record access |
JP4621895B2 (en) * | 2006-07-14 | 2011-01-26 | 国立大学法人 東京大学 | Access recordable optical memory |
JP2009110596A (en) * | 2007-10-30 | 2009-05-21 | Sony Corp | Disk, information processing method, and computer program |
JP2009272002A (en) * | 2008-05-08 | 2009-11-19 | Sony Corp | Information processor, disk, and information processing method and program |
US8365300B2 (en) | 2008-05-08 | 2013-01-29 | Sony Corporation | Information processing device, disc, information processing method, and program |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4305593B2 (en) | DATA RECORDING / REPRODUCING METHOD AND DEVICE, DATA RECORDING DEVICE AND METHOD | |
EP1069491B1 (en) | Contents management method, contents management apparatus, and recording medium | |
KR100682290B1 (en) | Contents management system, device, method, and program storage medium | |
KR100566627B1 (en) | Semiconductor memory card and data reading apparatus | |
EP1166265B1 (en) | Copy security for portable music players | |
US7392225B2 (en) | Revocation information updating method, revocation information updating apparatus and storage medium | |
JP5269145B2 (en) | Method and apparatus for restricting disk usage of recording medium using user key | |
EP1585248A1 (en) | Mutual authentication method, program, recording medium, signal processing system, reproduction device, and information processing device | |
US20040030656A1 (en) | Information recording device and information reproducing device | |
US20070160199A1 (en) | Copy control apparatus and method thereof, information processing apparatus and method thereof, and content receiving apparatus | |
JP2005505885A (en) | Copy method and apparatus using one safe drive | |
JP2003067256A (en) | Data protection method | |
CN100458740C (en) | Recording system and method, recording device and method, input device and method, reproduction system and method, reproduction device and method, recording medium, and program | |
TWI271618B (en) | Apparatus and method for reading or writing user data | |
JP2001319339A (en) | Write once type optical disk and recording and reproducing device and recording medium for the optical disk | |
US7620820B2 (en) | Content data processing method, recording device, and reproduction device | |
WO2000074046A1 (en) | Data recording medium and data management system | |
US20050141011A1 (en) | Apparatus and method for recording data on and reproducing data from storage medium | |
JP2002196982A (en) | Information recording medium, recording/regenerating device, and method | |
JP2005346523A (en) | Copyright protecting method and copyright protecting system | |
JPH07161172A (en) | Data recording medium | |
JP2000242562A (en) | Recording medium and reproducing device | |
US20090310455A1 (en) | Optical Disc Reproducing Apparatus, In-Vehicle Optical Disc Reproducing Apparatus, In-Vehicle Optical Disc Reproducing System, and Optical Disc Reproducing Method | |
JP3862935B2 (en) | Data processing apparatus and data processing method | |
JP2004303321A (en) | Recording/reproducing system for information recording medium, information recording medium, recording/reproducing method for information recording medium, and recording/reproducing program for information recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP KR US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 500264 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09980093 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |