WO2000039800A1 - Dispositif et procede de traitement d'informations, et support d'enregistrement de programmes - Google Patents
Dispositif et procede de traitement d'informations, et support d'enregistrement de programmes Download PDFInfo
- Publication number
- WO2000039800A1 WO2000039800A1 PCT/JP1999/007302 JP9907302W WO0039800A1 WO 2000039800 A1 WO2000039800 A1 WO 2000039800A1 JP 9907302 W JP9907302 W JP 9907302W WO 0039800 A1 WO0039800 A1 WO 0039800A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- information
- cpu
- data
- stored
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 143
- 230000010365 information processing Effects 0.000 title claims description 24
- 230000008569 process Effects 0.000 claims description 103
- 238000003672 processing method Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 description 69
- 238000012546 transfer Methods 0.000 description 24
- 238000004891 communication Methods 0.000 description 23
- 230000006870 function Effects 0.000 description 22
- 238000010586 diagram Methods 0.000 description 19
- 230000006835 compression Effects 0.000 description 15
- 238000007906 compression Methods 0.000 description 15
- 230000004044 response Effects 0.000 description 15
- 238000006243 chemical reaction Methods 0.000 description 8
- 230000005236 sound signal Effects 0.000 description 7
- 208000031339 Split cord malformation Diseases 0.000 description 5
- 238000013478 data encryption standard Methods 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 238000004645 scanning capacitance microscopy Methods 0.000 description 5
- 239000004065 semiconductor Substances 0.000 description 5
- 238000013068 supply chain management Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 230000010355 oscillation Effects 0.000 description 4
- XAGFODPZIPBFFR-UHFFFAOYSA-N aluminium Chemical compound [Al] XAGFODPZIPBFFR-UHFFFAOYSA-N 0.000 description 3
- 229910052782 aluminium Inorganic materials 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 239000013078 crystal Substances 0.000 description 3
- 238000013523 data management Methods 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 230000001681 protective effect Effects 0.000 description 2
- 230000005855 radiation Effects 0.000 description 2
- JEYCTXHKTXCGPB-UHFFFAOYSA-N Methaqualone Chemical compound CC1=CC=CC=C1N1C(=O)C2=CC=CC=C2N=C1C JEYCTXHKTXCGPB-UHFFFAOYSA-N 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000003321 amplification Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 229940048662 kwai Drugs 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00123—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
- G11B20/00173—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software wherein the origin of the content is checked, e.g. determining whether the content has originally been retrieved from a legal disc copy or another trusted source
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0071—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a purchase action
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
- G11B20/00768—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/0084—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific time or date
Definitions
- the present invention relates to an information processing apparatus and method, and a program storage medium, and more particularly to, for example, an information processing apparatus and method capable of appropriately restricting content duplication, and a program storage medium.
- UCS Uni Copy System
- identification information for identifying content and time information when the content is copied are stored corresponding to the identification information, identification information of the content to be copied is acquired, and the acquired identification information is acquired. That is, the content is duplicated in accordance with the stored time information.
- the information processing apparatus provides: A storage unit for storing the time information, an obtaining unit for obtaining the identification information of the content to be copied, the identification information obtained by the obtaining unit, and the time information stored in the storage unit. And copying means for copying the content.
- the information processing method according to the present invention includes: a storage step of storing identification information for identifying the content, time information corresponding to the identification information when the content was copied, and identifying the content to be copied. It is characterized by including an acquisition step of acquiring information, a duplication step of duplicating content corresponding to the identification information acquired in the acquisition step, and the time information stored in the storage step.
- the program of the program storage medium comprises: identification information for identifying content; a storage step for storing time information when the content is duplicated, corresponding to the identification information; and a content to be duplicated. And a duplication step of duplicating the content corresponding to the identification information acquired in the acquisition step and the time information stored in the storage step. .
- FIG. 1 is a diagram for explaining SCMs and CGMs.
- FIG. 2 is a diagram showing an embodiment of the voice data overnight management system according to the present invention.
- FIG. 3 is a diagram for explaining the configuration of the personal convenience in the above-mentioned voice data management system.
- FIG. 4 is a diagram for explaining the configuration of a portable device in the above-mentioned audio data management system.
- FIG. 5 is a block diagram illustrating the functional configuration of the personal computer. It is a lock figure.
- FIG. 6 is a diagram illustrating an example of a window displayed on a display by a recording program in the personal computer.
- FIG. 7 is a flowchart for explaining processing when copying from a compact disk to an HDD in the personal computer.
- FIG. 8 is a flowchart for explaining the deadline database check processing in step S12 in the flowchart shown in FIG.
- FIG. 9 is a diagram illustrating an example of the term database.
- FIG. 10 is a diagram illustrating a watermark.
- FIG. 11 is a diagram showing an example of a music database.
- FIGS. 12A, 12B and 12C are flowcharts illustrating the operation of moving data from the HDD to the portable device.
- FIG. 13 is a flowchart for explaining the check processing such as the reproduction condition of the selected music piece in step S55 in the flowchart shown in FIG. 12A.
- FIG. 14 is a diagram for explaining playback conditions managed by the portable device 6.
- FIG. 15 is a flowchart for explaining the details of the format conversion processing in step S58 in the flowchart shown in FIG. 12A.
- FIG. 16A, FIG. 16B, and FIG. 16C are flowcharts illustrating the operation when data is copied from the HDD 21 to the portable device 6.
- Figure 17 shows a case where data is transferred from a portable device to the HDD. 6 is a flowchart for explaining the operation in the case of FIG.
- FIG. 18 is a flowchart for explaining the operation when data is copied from the portable device to the HDD.
- FIG. 19 is a flowchart for explaining a process when data is copied from the EMD server to the HDD.
- FIG. 20 is a flowchart illustrating details of the accounting-related processing in step S204 in the flowchart shown in FIG.
- FIG. 21 is a diagram for explaining a charging log.
- FIG. 22A and FIG. 22B are flow charts for explaining processing when data is copied from the IEC 60958 terminal of the personal computer to the HDD.
- FIGS. 23A and 23B are flow charts for explaining the operation when data is output from the HDD to the IEC 60958 terminal.
- FIG. 24 is a flowchart for explaining a check process such as a reproduction condition in step S275 in the flowchart shown in FIG. 23A.
- FIG. 25A and FIG. 25B are flowcharts for explaining the operation when data is output from the HDD via the portable device.
- FIG. 26 is a diagram for explaining the function of the nonvolatile memory provided in the adapter of the personal computer.
- FIG. 27 is a flowchart illustrating the operation of the adapter.
- FIG. 28 is a diagram showing an internal configuration of the adapter.
- FIG. 29A and FIG. 29B are diagrams showing an example of the internal configuration of the nonvolatile memory.
- FIG. 30 is a diagram showing an example of the internal configuration of the nonvolatile memory.
- FIG. 2 is a diagram showing an embodiment of the audio data management system according to the present invention.
- the personal computer 1 is connected to a network 2 composed of a local area network or an internet.
- the personal computer 1 is an EMD (Elecrical
- the data (hereinafter, referred to as contents) of music received from the servers 4_1 to 4-3 or read from a CD (Compact Disc) described later is subjected to a predetermined compression method (for example, ATRAC 3 (Trademark)) and encrypted with an encryption method such as DES (Data Encryption Standard) and recorded.
- a predetermined compression method for example, ATRAC 3 (Trademark)
- an encryption method such as DES (Data Encryption Standard)
- the personal computer 1 records the usage conditions indicating the usage conditions of the content in correspondence with the content that has been encrypted and recorded.
- the usage condition data can be used, for example, in a content corresponding to the usage conditions in three portable devices (also called PDs) 6-1 to 6-3 simultaneously. , copy
- the content recorded in the personal computer 1 can be used.
- the content is stored in the portable device 6-1 to 6_3.
- the number of times you can do this may be limited, in which case the number will not increase.
- Move to the computer the content recorded on the personal computer 1 becomes unavailable after storing the content on the portable devices 6-1 to 6-3). Details of the usage conditions will be described later.
- the personal computer 1 connects the encrypted recorded content together with data related to the content (for example, a song title or playback conditions) via a USB (Universal Sirial Bus) cable 7-1.
- data related to the content for example, a song title or playback conditions
- USB Universal Sirial Bus
- checkout In addition to storing the contents in the stored portable device 6-1 and updating the contents of the usage conditions corresponding to the stored contents in response to storing the stored contents in the stored portable device 6-1 (hereinafter referred to as “ Below, referred to as “ Below, referred to as checkout). More specifically, when the user checks out, the number of times that the personal computer 1 can check-out the data of the usage conditions corresponding to the content is reduced by one. If the number of checkouts is 0, the corresponding content cannot be checked out.
- the personal computer 1 stores the encrypted and recorded content together with the data related to the content in the connected portable device 6-2 via the USB cable 7-2.
- the portable computer 6-2 updates the usage condition data corresponding to the stored content in accordance with the stored content.
- the personal computer 1 associates the encrypted and recorded content with the content.
- the stored content is stored in the portable device 6-3 via the USB cable 7-3, and the stored content is stored in the portable device 6-3. Update the corresponding usage condition data.
- the personal computer 1 transmits the contents that the personal computer 1 has picked up to the connected portable device 6-1 via the USB cable 7-1, and the portable device 6- 1 (or make it unusable) and update the usage condition data corresponding to the deleted content (hereinafter referred to as check-in). More specifically, when check-in is performed, the number of times that the personal computer 1 can check data of the usage condition of the corresponding content, which is recorded, is increased by one.
- the personal computer 1 causes the portable device 6-2 connected via the USB cable 7-2 to delete the content checked out by the personal computer 1 to the portable device 6-2 ( Otherwise, the data of the use condition corresponding to the deleted content is updated.
- the personal computer 1 causes the connected portable device 6-3 to delete the content checked out by the personal computer 1 via the USB cable 7-3 to the portable device 6-3 ( Or, the data of the use condition corresponding to the deleted content is updated.
- the personal computer 1 cannot check in the content checked out by the other personal computer (not shown) to the device 6-1.
- the personal computer 1 cannot check in the content checked by another personal computer to the portable device 6-2.
- the personal computer 1 cannot check in the content checked out by another personal computer to the portable device 6_3.
- the EMD registration server 3 responds to the request from the personal computer 1 via the network 2, A program for transmitting an authentication key required for mutual authentication between the personal computer 1 and the EMD servers 4-1 to 4-1-3 to the personal computer 1 and connecting to the EMD servers 4-1 to 4-2.
- the EMD server 4-1 responds to the request of the personal computer 1 and sends the content to the personal convenience server 1 via the network 2 together with the data relating to the content (for example, a song title or playback restriction). Supply.
- the EMD server 412 supplies the content to the personal computer 1 via the network 2 together with the data related to the content in response to the request from the personal computer 1.
- the EMD server 4-3 supplies the content to the personal computer 1 via the network 2 along with the data related to the content in response to the request of the personal computer 1.
- the content supplied by each of the EMD servers 4-1 to 4-3 is compressed by the same or different compression method.
- the content supplied by each of the EMD servers 41 to 4-3 is encrypted by the same or different encryption method.
- the WWW (World Wide Web) server 5-1 responds to the request of the personal computer 1 by using a CD that has read the content via the network 2 (for example, a CD album name or CD sales). (E.g. company), and data corresponding to content read from CDs (eg For example, the name of a song or the name of a composer) is supplied to the personal computer 1.
- the WWW server 5-2 supplies the personal computer 1 with the CD from which the content has been read and the data corresponding to the content read from the CD via the network 2.
- the broadcast device 6-1 stores the content supplied from the personal computer 1 (ie, the checked-out content) together with the content-related data (for example, a song name or playback restriction). I do.
- the portable device 6-1 plays the stored content based on the data related to the content and outputs the content to a headphone (not shown).
- the portable device 6-1 stops playback of the corresponding content.
- the portable device 6-1 stops playing the corresponding content.
- the user removes the portable device 6-1 that stores the content from the personal computer 1, carries it around, plays back the stored content, and listens to music corresponding to the content on a headphone or the like. be able to.
- the portable device 6-2 stores the contents supplied from the personal computer 1 together with the contents related to the contents.
- the portable device 6-2 reproduces the stored content based on the data related to the content, and a headphone (not shown). Output to ON etc.
- the user can remove the portable device 6-2 storing the content from the personal computer 1, carry it around, play back the stored content, and listen to music corresponding to the content on a headphone or the like. it can.
- the portable device 6-3 stores the content supplied from the personal computer 1 together with the content related to the content.
- the portable device 6-3 reproduces the stored content based on the data related to the content and outputs the content to a headphone (not shown).
- the user removes the portable device 6-3 storing the content from the personal computer 1, carries it around, plays back the stored content, and plays music corresponding to the content using a headphone or the like. You can listen.
- portable devices 6-1 to 6-3 they are simply referred to as portable devices 6.
- FIG. 3 is a diagram illustrating the configuration of the personal computer 1.
- the CPU Central Processing Unit
- a ROM Read-only Memory
- a RAM Random-Access Memory 13 stores programs used in the execution of the CPU 11 and parameters that change as appropriate in the execution. These are interconnected by a host bus 14 composed of a CPU bus and the like.
- the host bus 14 is connected to a PCI (Peripheral Component Interconnect / Interface) Connected to an external bus 16 such as a bus.
- PCI Peripheral Component Interconnect / Interface
- the keyboard 18 is operated by the user when inputting various commands to the CPU 11.
- the mouse 19 is operated by the user when pointing or selecting a point on the screen of the display 20.
- the display 20 is composed of a liquid crystal display device or a CRT (Cathode Ray Tube), and displays various information in text or images.
- An HDD (Hard Disk Drive) 21 drives a hard disk and records or reproduces a program or information executed by the CPU 11 on the hard disk.
- the drive 22 reads out data or programs recorded on the mounted magnetic disk 41, optical disk 42 (including CD), magneto-optical disk 43, or semiconductor memory 44, and reads the data or program. It supplies the RAM 13 connected via the interface 17, the external bus 16, the bridge 15, and the host bus 14.
- the portable device 6-1 is connected to the USB port 23-1 via the USB cable 7-1.
- the USB port 23-1 is connected to the data supplied from the HDD 21, CPU 11, or RAM 13 via the interface 17, external bus 16, bridge 15, or host bus 14. Output the evening (including, for example, content or the command of the portable device 6-1) to the portable device 6-1.
- USB device 6-2 is connected to the USB port 23-2 via a USB cable 7-2.
- USB ports 23-2 are interface 17, external bus 16, bridge 15, or host Outputs data (including, for example, contents or commands of the portable device 612) supplied from the HDD 21, the CPU 11, or the RAM 13 to the portable device 6-2 via the bus 14. .
- USB device 6-3 is connected to the USB port 23-3 via a USB cable 7-3.
- USB port 23-3 is supplied from HDD 21, CPU 11 or RAM 13 via interface 17, external bus 16, bridge 15 or host bus 14.
- Output data (eg, including content or commands for portable device 6-3) to portable device 6-3.
- the audio input / output interface 24 with 8 terminals performs digital audio input / output or analog audio input / output interface processing. Based on the audio signal supplied from the input / output interface 24, a predetermined audio corresponding to the content is output.
- the keyboard 18 to the voice input / output interface 24 are connected to the interface 17, and the interface 17 is connected to the external bus 16, the bridge 15, and the host bus 14. Connected to CPU11.
- the communication unit 25 is connected to the network 2 and converts data (for example, a registration request or a content transmission request) supplied from the CPU 11 or the HDD 21 into a packet of a predetermined format. Stored and transmitted via the network 2 and stored in the packet received via the network 2 (for example, an authentication key or Content, etc.) to CPU 11, RAM 13 or HDD 21.
- data for example, a registration request or a content transmission request
- the CPU 32 of the adapter 26 integrally formed as a semiconductor IC and attached to the personal computer 1 is connected to the CPU 11 of the personal computer 1 via the external bus 16, the bridge 15, and the host bus 14. Cooperates with to execute various processes.
- the RAM 33 stores a data program necessary for the CPU 32 to execute various processes.
- the nonvolatile memory 34 stores data that needs to be retained even after the power of the personal computer 1 is turned off.
- the ROM 36 stores a program for decrypting an encrypted program when the program is transferred from the personal computer 1.
- the RTC (Real Time Clock) 35 performs a timekeeping operation and provides time information.
- the communication unit 25 and the adapter 26 are connected to the CPU 11 via the external bus 16, the bridge 15, and the host bus 14.
- USB ports 23 when it is not necessary to individually distinguish the USB ports 23-1 to 23-3, they are simply referred to as the USB ports 23.
- USB cable 7-1 to 7-3 will be simply referred to as the USB cable 7 when there is no need to individually distinguish them.
- the power supply circuit 52 drives the entire portable device 6 by converting a power supply voltage supplied from the dry battery 51 into internal power of a predetermined voltage and supplying the internal power to the CPU 53 to the display unit 67.
- USB controller 57 When the USB controller 57 is connected to the personal computer 1 via the USB connector 56 and the USB cable 7, Transfers content transferred from personal computer 1 to internal bus
- the content is composed of 64 bytes of data per packet and is transferred from the personal computer 1 at a transfer rate of 12 Mbit / sec.
- the content transferred to the portable device 6 is composed of header and audio data (data corresponding to the audio signal, which is the substance of the content), and the header contains the file name, header size, and content. Key, file size, codec ID, file information, etc. are also stored, as well as playback restriction data necessary for playback restriction processing, start date and time, end date and time, number of times, and number of times of playback.
- the audio data is data corresponding to an audio signal of a predetermined music piece, which is encoded and encoded by an encoding method such as ATRAC3.
- the header size indicates the length of the header data (for example, 33 bytes, etc.), and the file size indicates the length of the audio data (for example, 33, 636, 138 bytes, etc.).
- the content key is a key for decrypting the encrypted audio data, and is encrypted based on a session key (temporary key) generated by the mutual authentication process between the personal computer 1 and the portable device 6. In this state, the data is transmitted from the personal computer 1 to the portable device 6.
- This mutual authentication process is, for example, a challenge-response authentication process.
- the DSP 59 of the portable device 6 executes a decryption (decryption) process when performing the challenge response type authentication process.
- the challenge-response method is, for example, a value (challenge) generated by the personal device 1 using a secret key shared by the portable device 6 with the personal device 1.
- (Response) a value generated by the personal computer 1 changes every time the authentication process is performed.For example, the value generated using the secret key output from the portable device 6 is used. Even if the value is read out and the system is subjected to a so-called spoofing attack, the personal computer 1 can detect the fraud in the following mutual authentication processing because the value used for the mutual authentication is different.
- the codec ID is an ID corresponding to the audio decoding coding system.
- the codec ID “1” corresponds to ATRAC3, and the codec ID “0” is MP3. (MPEG (Moving Picture Experts Group) Audio Layer-3).
- the file name is a data file obtained by converting a content file (described later) recorded by the personal computer 1 corresponding to the content into an ASCII (Amencan National Standard Code for Information Interchange) code. This is data obtained by converting the song title, artist name, lyricist name, or composer name, etc., corresponding to the content into ASCII code.
- ASCII mencan National Standard Code for Information Interchange
- the playback restriction data indicates the period during which the content can be played (ie, This is a short time that indicates whether the start date and time or the end date and time or the number of times limit (the limit of the number of times of reproduction) is set. During the playback limit, "1" is assigned when the number of times limit is set, and “2" is assigned when the period during which playback is possible is set. If no period is set (so-called purchase), "0" is assigned.
- the start date and time and the end date and time are data indicating the range of the reproducible period when the reproduction restriction data is "2". For example, if the start date and time is "0 0040 F" and the end date and time is "000070 F", the corresponding content can be played from April 15, 2000 to July 15, 2000. It is.
- the count limit is the preset number of reproducible times corresponding to the content.
- the count indicates the number of times the content has been played, which is updated by the CPU 53 when the process of playing the content is executed. For example, when the number of times limit is "02", the number of times that the content can be played is two, and when the number of plays count is "01", the number of times that the content is played is one. is there.
- Device 6 can play the corresponding content twice, one time, from April 15, 2000 to July 15, 2000.
- the playback restriction data is "1" and the start date and time is “0000”. 00 “, the end date and time is” 000000 “, the playback limit is” 0a “, and the playback count is” h5 “, the corresponding content is in the playable period. There is no limit, and the number of reproducible times is 10 and the number of replays is 5.
- the CPU that executes the main program read from the ROM 55 to the RAM 54 is executed.
- the flash memory 61 has a storage capacity of about 64 MB yte and stores contents (audio data).
- the flash memory 61 stores in advance a reproduction code for expanding audio data compressed by a predetermined compression method.
- the flash memory 61 can be detachably attached to the portable device 6.
- the DSP 59 detects errors in the audio data based on the reproduction code transferred from the flash memory 61 using the CRC (Cyclic Redundancy Check) method, and then generates and reproduces the data ( Figure 4).
- D 1 is supplied to the digital / analog conversion circuit 63.
- the DSP 59 is integrally formed with a transmitting circuit (not shown) provided inside, and reproduces audio data based on a master clock MC LK from a transmitter 59 A made of an external crystal, From the master clock MCLK, the master clock MCLK, the bit clock BCLK of a predetermined frequency generated by the internal oscillation circuit based on the master clock MCLK, and the L-channel clock LCLK and R-channel clock RCLK in frame units Is supplied to the digital-to-analog conversion circuit 63.
- the DSP 59 supplies the above operation clock to the digital-to-analog conversion circuit 63 according to the reproduction code when reproducing the audio data, and according to the reproduction code when not reproducing the audio data.
- the supply of the operation clock is stopped, and the digital-to-analog conversion circuit 63 is stopped to reduce the power consumption of the portable device 6 as a whole.
- the CPU 53 and the USB controller 57 are also provided with a crystal oscillator 53 A or 57 A externally, respectively, and based on the master clock MC LK supplied from the oscillator 53 A or 57 A, respectively. Execute the process.
- the portable device 6 does not need a clock generation module for supplying a clock to each circuit block such as the CPU 53, the DSP 59, and the USB controller 57, and the circuit configuration is reduced. It can be simplified and downsized.
- the digital-to-analog conversion circuit 63 converts the reproduced audio data into an analog audio signal and supplies the analog audio signal to the amplifier circuit 64.
- the amplification circuit 64 amplifies the audio signal and supplies the audio signal to a headphone (not shown) via the headphone jack 65.
- the portable device 6 reproduces the audio data stored in the flash memory 61 based on the control of the CPU 53, Stops playing audio data when the play / stop button is pressed.
- the portable device 6 When the play / stop button is pressed again after the stop, the portable device 6 restarts the reproduction of the audio data from the stopped position based on the control of the CPU 53.
- the play / stop button stops playback by a pressing operation and a few seconds elapse without any operation being applied, the portable device 6 automatically turns off the power and reduces power consumption.
- the portable device 6 does not play the audio data from the position where the portable device was stopped, but plays the music from the first music.
- the CPU 53 of the portable device 6 controls the LCD controller 68 to display the playback mode state (for example, repeat playback, intro playback, etc.), equalizer adjustment (ie, sound) on the display 67.
- the playback mode state for example, repeat playback, intro playback, etc.
- equalizer adjustment ie, sound
- Information such as the adjustment of the gain corresponding to the signal frequency band), song number, playing time, playback, stop, fast forward, fast reverse, etc., volume and remaining battery 51 are displayed.
- the portable device 6 stores, in the EEPRQM 68, the number of contents written in the flash memory 80, the block position of the flash memory 61 in which each content is written, and various other so-called memory storage information. Stores FAT (File Alloca tion Table).
- ⁇ ⁇ ⁇ is 64KB yt e is treated as one block, and the block position corresponding to the content of one song is stored in the FAT.
- the block position corresponding to the content of the first song is set to FAT as the FAT.
- the block position corresponding to the content of the second song is written to the flash memory 61 (the same area as the first song) as a FAT. It is.
- the FAT is rewritten each time content is written to the flash memory 61, and furthermore, the same data is double-written for reserve for data protection.
- the portable device 6 stores the FAT in the EEPROM 68 to reduce the frequency of rewriting the flash memory 61 corresponding to one content write.
- the portable device 6 can increase the number of times that the content can be written by several tens of times, compared to storing the FAT in the flash memory 61. Can be increased. Further, since the CPU 53 causes the EPROM 68 to be written so as to add the FAT, the EEPR Reduce the frequency of rewriting the same area of the OM 68 to prevent the EEPR0M 68 from becoming unrewritable in a short period of time.
- the portable device 6 When the portable device 6 is connected to the personal computer 1 via the USB cable 7 (hereinafter, this is referred to as a USB connection), the portable device 6 receives the interrupt signal supplied from the USB controller 57 to the CPU 53 based on an interrupt signal. Recognizes that USB connection has been established.
- the portable device 6 When the portable device 6 recognizes that the USB connection has been made, the portable device 6 receives external power of a specified current value from the personal computer 1 via the USB cable 7 and controls the power supply circuit 52 so that the dry battery 51 To stop supplying power.
- the CPU 53 stops the playback processing of the audio data of the DSP 59. As a result, the CPU 53 prevents the external power supplied from the personal computer 1 from exceeding the specified current value, and performs control so that the external power having the specified current value can always be received.
- the CPU 53 when the CPU 53 is connected to the USB, the CPU 53 switches from the power supplied from the dry cell 51 to the power supplied from the personal computer 1, so that the external power from the personal computer 1 with a low unit price is used, The power consumption of the dry battery 51 having a high unit price is reduced, and thus the life of the dry battery 51 can be extended.
- FIG. 5 is a block diagram illustrating a configuration of functions of the personal computer 1, which is realized by executing a predetermined program of the CPU 11 or the like.
- the content management program 111 is an EMD selection program 131, a checkin / checkout management program 132, an encryption method conversion program 133, a compression method conversion program 134, an encryption program 135, and a usage condition conversion program 13 6. It consists of a number of programs, including a signature management program 137, an authentication program 138, a decryption program 139, a PD driver 140, a purchase driver 141, and a purchase driver 142.
- the content management program 1 1 1 is described in, for example, shuffled instructions or encrypted instructions, concealing the processing contents from the outside, and making it difficult to read the processing contents (For example, even if the user directly reads the content management program 111, the user cannot identify the instruction.)
- the EMD selection program 1311 When the content management program 111 is installed in the personal computer 1, the EMD selection program 1311 is not included in the content management program 111, and is processed via the network 2 in the EMD registration process described later. Received from the EMD registration server 3.
- the EMD selection program 1 3 1 selects the connection with any of the EMD servers 4-1 to 4-3 and sends it to the purchase application 1 15 or the purchase driver 14 1 or 142.
- EMD server 411 Executes communication with any one of 1 to 4-3 (for example, downloading of content when purchasing content).
- Check-in / checkout management program 1 32 Quin or ticket settings, and content base 1
- the content stored in the content file 16 1—1 to 16 1—N can be copied to the device 6 — Check in one of 1 to 6-3 or check in the content stored in the portable device 6-1 to 6-3.
- the check-in / check-out management program 13 2 uses the use condition files 16 2—1 to 16 2—N recorded in the content database 114 in response to check-in or check-out processing. Updates the usage conditions stored in.
- the encryption method conversion program 1 3 3 uses the network 2 for the purchase application program 1 15 to encrypt the content received from the EMD server 4 1 1 from the EMD server 4 1 1 and the purchase driver 1 4 1 to the EMD server 4 — Content file in which the content database 1 14 records the method of encrypting the content received from 2 or the method of encrypting the content received from the EMD server 4 3 by the purchase driver 14 2 3 It is converted to the same encryption method as the content stored in 161-1-1 to 161-N.
- the encryption method conversion program 13 when checking out the contents to the portable device 6 1-1 or 6-3, converts the content to be checked out into an encryption method that can be used by the portable device 6-1 or 6-3. Convert to
- the compression method conversion program 13 4 is a method for compressing the content received from the EMD server 4-1 by the purchase application program 11 5 through the network 2, and the dryino 14 1 is a EMD for the purchase.
- the content compression system received from the server 4_2 or the purchase dryino, and the content compression system received from the EMD server 4-3 is recorded by the content server Content files 16 1-1 through 16 1 -N are converted to the same compression format as the content stored in them.
- the compression format conversion program 13 4 reads the content (uncompressed) read from the CD and supplied from the recording program 113 into the content file 1 Encode using the same encoding method as the content stored in 6 1 _ 1 to 16 1 -N.
- the compression format conversion program 1334 converts the content to be checked out into a compression format that can be used by the portable device 6-1 or 6-3. Convert to method.
- the encryption program 135 reads the content (unencrypted) read from the CD and supplied from the recording program 113, for example, in a content file in which the content 114 records the content.
- 1 16 1-1 through 16 1-N Encrypt with the same encryption method as the content stored in N.
- the usage condition conversion program 136 is used to convert the usage conditions of the content received by the purchase application program 115 from the EMD server 4-1 via the network 2 into data (a so-called Usage Rule). Data indicating the usage conditions of the content received by the purchasing driver 14 1 from the EMD server 4-1 or data indicating the usage conditions of the content received by the purchasing driver 14 2 from the EMD server 4-3. Is converted to the same format as the usage rule data stored in the usage rule files 162-1-1 through 162-N recorded in the content database 114.
- the usage condition conversion program 136 converts the usage condition data corresponding to the content to be checked out into the portable device 6-1 or 6-3. — 3 is converted into usable condition data.
- the signature management program 13 7 uses the usage conditions stored in the usage conditions files 16 2—1 to 16 2—N recorded in the content database 114. Based on the signature (to be described later) included in the data, the falsification of the usage condition data is detected.
- the signature management program 1337 is stored in the use condition files 162-1-1 through 162-N recorded in the content database 114 along with the check-in or checkout processing. Update the signature included in the usage rule data in response to the update of the usage rule data.
- the authentication program 13 8 handles the mutual authentication between the content management program 11 1 and the purchase application program 11 5 and the mutual authentication between the content management program 11 1 and the purchase driver 14 1. Execute. In addition, the authentication program 13 8 processes mutual authentication between the EMD server 4 11 and the purchase application program 11 5, and the mutual authentication between the EMD server 4 1 2 and the purchase driver 14 1. It stores the authentication key used in the authentication process and the cross-authentication process between the EMD server 413 and the purchase dryno ′ 142.
- the authentication key used by the authentication program 1338 in the mutual authentication process is not stored in the authentication program 1338 when the content management program 111 is installed on the personal computer 1
- the registration processing is normally executed by the display operation instruction program 112 it is supplied from the EMD registration server 3 and stored in the authentication program 138.
- the decryption program 1339 When the personal computer 1 reproduces the content stored in the content files 161-1-1 to 161-1N recorded on the content data base 114, the decryption program 1339 generates the content. Is decrypted.
- the PD driver 140 is used to check out predetermined contents to the portable device 6-2, or to check in predetermined contents from the portable device 6-2, or to transfer contents to the portable device 6-2. Alternatively, a command to cause the portable device 6-2 to execute a predetermined process is supplied.
- the PD driver 140 is used when checking out a predetermined content to the portable device 6-1 or checking in predetermined content from the portable device 6-1. To the content or command to cause the device driver 1 16-1 to execute the specified process.
- the device driver 1 16-2 stores the content in the device driver 116-2. Alternatively, supply a command to execute the specified processing to the device driver '1 16-2.
- the purchase driver 141 is a so-called plug-in program, which is installed together with the content management program 111, supplied from the EMD registration server 3 via the network 2, or recorded on a predetermined CD. Supplied.
- the purchase driver 141 transmits and receives data to and from the content management program 111 via an interface of a predetermined format of the content management program 111.
- the purchase driver 141 requests the EMD server 4-2 to transmit predetermined content via the network 2, and receives the content from the EMD server 4-2.
- the purchase driver 141 executes a billing process when receiving the content from the EMD server 412.
- the dryino 142 for purchase is a program that is installed together with the content management program 111, which requests transmission of predetermined content to the EMD server 4-3 via the network 2, and sends the EMD server Receive content from 4 _ 3. Further, the purchase driver 142 executes a billing process when receiving the content from the EMD server 413.
- the display operation instruction program 111 is based on the display data file 181, display data file 182, image file 183 1 1 ⁇ 183 K K, or history data 184 file based on the display. An image of a predetermined window is displayed on the screen 20, and based on an operation on the keyboard 18 or the mouse 19, the content management program 111 is instructed to execute a check-in or check-out process.
- Filtering data file 18 1 The content files 16 1 -1 to 16 1 NN recorded in the HDD 114 store the data for weighting each of the contents stored in the HDD 114, and are stored in the HDD 21. I have.
- the display data file 182 stores the data corresponding to the contents stored in the content files 1 6 1-1 to 16 1 -N recorded in the content database 1 14, and stores the data in the HDD. 2 Recorded in 1.
- the image files 183-1 to 183-K correspond to the content files 161-1 to 161-1N recorded in the content database 114, or to the packages described later.
- the image to be recorded is stored in the HDD 21.
- image files 183-1 to 183-K are simply referred to as image files 183.
- the history data file 184 has been checked in the number of times the content stored in the content files 161-1 to 16-1N recorded on the content overnight base 114 has been checked out.
- the history data such as the number of times and the date is stored in HDD 21.
- the display operation instruction program 111 transmits the ID of the content management program 111 stored in advance to the EMD registration server 3 via the network 2 during the registration process, It receives the authentication key and the EMD selection program 13 1 from the EMD registration server 3 and supplies the authentication key and the EMD selection program 13 1 to the content management program 1 11.
- the recording program 1 1 3 displays the image of the predetermined window, Based on the operation of the keyboard 18 or the mouse 19, the data such as the recording time of the content is read from the optical disk 42 mounted on the drive 22 CD.
- the recording program 113 sends the data corresponding to the CD (for example, album name) to the WWW server 5-1 or 5-2 via the network 2 based on the recording time of the content recorded on the CD. Or the name of the artist) or the transmission of data (for example, song titles) corresponding to the content recorded on the CD, and the CD from the WWW server 5-1 or 5-2. To receive data or data corresponding to the content recorded on the CD.
- the CD for example, album name
- the recording program 113 sends the data corresponding to the CD (for example, album name) to the WWW server 5-1 or 5-2 via the network 2 based on the recording time of the content recorded on the CD. Or the name of the artist) or the transmission of data (for example, song titles) corresponding to the content recorded on the CD, and the CD from the WWW server 5-1 or 5-2.
- the recording program 113 supplies the data corresponding to the received CD or the data corresponding to the content recorded in the CD to the display operation instruction program 112.
- the recording program 113 When a recording instruction is input, the recording program 113 reads content from a CD, which is the optical disc 42 mounted on the drive 22, and outputs the content to the content management program 111.
- the content database 114 compresses the content compressed by a predetermined method supplied from the content management program 111 and encrypted by the predetermined method into content files 161-1-1 to 1611N.
- the content data base 1 1 4 is the content file 1 6 1-1 through 1 6 1-N of the usage conditions corresponding to the content stored in each of the content files. 6 1-1 to 16 1 -N are stored in any of the use condition files 16 2-1 to 16 2 -N corresponding to N (recorded on HDD 21).
- the content file 16 1-1 to 16 1 -N or the use condition file 16 2-1 to 16 2 -N may be recorded as a record.
- the usage condition data corresponding to the content stored in the content file 161-1-1 is stored in the usage condition file 162-1-1.
- the usage rule data corresponding to the content stored in the content file 161-N is stored in the usage rule file 1621-N.
- the data recorded in the use condition files 162-1-1 to 162-N correspond to the data recorded in the term database described later or the data recorded in the music database. That is, the content database 114 is configured to include a term database and a music database described later.
- the content file 16 1 c when it is not necessary to individually distinguish the content files 16 1—1 to 16 1—N, the content file is simply referred to as the content file 16 1 c and the usage condition file 16 2—1 to 16 2 —When it is not necessary to distinguish N individually, it is simply referred to as a use condition file 16 2.
- the purchase application program 115 is supplied from the EMD registration server 3 via the network 2 or recorded on a predetermined CD and supplied.
- the purchase application program 115 requests the EMD server 411 to transmit predetermined content via the network 2, receives the content from the EMD server 4-1, and executes the content management program 115. 1 supply to 1. Further, the purchase application program 115 executes a billing process when receiving the content from the EMD server 411.
- the association between the data stored in the display data file 82 and the content files 161-1-1 to 161-N stored on the content server will be described.
- the content stored in any one of the content files 161-1-1 to 161-1N belongs to a predetermined package. More specifically, the package is either an original package, a my select package, or a package.
- the original package belongs to one or more contents, and corresponds to the classification of the contents in the EMD servers 411 to 4-3 (for example, corresponding to a so-called album) or one CD.
- Content belongs to one of the original packages and cannot belong to more than one original package.
- the original package to which the content belongs cannot be changed.
- the user can edit a part of the information corresponding to the original package (addition of information or change of added information).
- the MySelect package contains one or more contents arbitrarily selected by the user.
- the user can arbitrarily edit which content belongs to the MySelect package.
- Content can belong to one or more MySelect packages at the same time. Content does not have to belong to any MySelect package.
- the content file selected based on the content data stored in the content file 18 1 belongs to the content package.
- Filing data is sent from the EMD server 4-1 to 4-1-3 or from the WWW server 5-1 or 5-2. It is supplied via the work 2 or recorded on a predetermined CD.
- the user can edit the file stored in the file 181.
- Filing data serves as a basis for selecting predetermined content or calculating a weight corresponding to content. For example, if you use Filing data corresponding to this week's J-POP (Japanese pop) best ten, personal computer 1 will be able to provide the contents of this week's Japanese pop 1st place or this week's Japanese pop 10 The content of the order can be specified.
- J-POP Japanese pop
- the content file is a file that has been checked out during the past month, and the content that has been checked out frequently in the past six months.
- the content of the content ring package is the content display data corresponding to the content 2 2 1 (including the content set by the user in the content display data 2 21) or the history. The selection is made in correspondence with the date of the evening, such as 1 84 and the day of the evening.
- FIG. 6 is a diagram for explaining a window that the recording program 113 displays on the display 20 when CD information is received from the WWW server 5_2. Based on the information on the CD received from the WWW server 5-2, the recording program 113 displays the title of the CD, for example, "asynchronized" in the field 201. Recording program 1 1 3 based on CD information received from WWW server 5 2 Displays the artist name in field 202, for example, "Quie".
- the recording program 113 Based on the information on the CD received from the WWW server 5-2, the recording program 113 displays the song title in the field 203, for example, "Heat”, “Blannet”, “Black”, Displays the song name such as "Soul”. Similarly, the recording program 113 displays the artist name, for example, "Kwai” in the field displaying the artist in the field 203.
- the recording program 113 After the recording program 113 receives the predetermined CD information, the recording program 113 stores the CD information in a predetermined directory of the HDD 21.
- the recording program 113 When a button 204 or the like is clicked to receive an instruction to acquire CD information, the recording program 113 first searches a predetermined directory of the HDD 21. When the CD information is stored in the directory, the recording program 113 displays a dialog box (not shown) to allow the user to use the CD information stored in the directory. Is selected.
- the recording program 1 1 3 When the button 2 ⁇ 6 is clicked to start recording content placed in the window displayed by the recording program 1 13, the recording program 1 1 3 will start recording content from the CD stored in the drive 2 2. And supplies the content read from the CD to the content management program 111 along with the information of the CD.
- the compression method conversion program 13 4 of the content management program 11 1 compresses the content supplied from the recording program 11 3 by a predetermined compression method, and the encryption program 13 5 generates the compressed content. Encrypt the password.
- the use condition conversion program 1336 generates use condition data corresponding to the compressed and encrypted content.
- the content management program 111 supplies the compressed and encrypted content together with the usage condition data to the content overnight base 114.
- the content database 1 1 4 generates a content file 16 1 and a use condition file 16 2 corresponding to the content received from the content management program 1 1 1, and stores the content in the content file 16 1 At the same time, use condition data is stored in the use condition file 16 2.
- the CD management program 111 When the content management program 111 stores the content and usage conditions corresponding to the content in the content overnight base 114, the CD management program 111 receives the information of the CD received from the recording program 113 and the usage conditions. The data is supplied to the display operation instruction program 1 1 2.
- the display operation instruction program 112 uses the data of the usage conditions and the CD information corresponding to the content stored in the content database 114 during the recording process, and displays the original package display data 201 and Generate display data for content 2 2 1
- buttons 205 for setting whether or not to allow any one to check out are arranged.
- recording program 1 13 displays a pull-down menu showing a list of possible devices 6-1 through 6-3.
- the personal computer 1 causes the selected portable device 6-1 to 6-3 to be selected. Then automatically check out the recorded content from the CD. If the user selects "Don't check out" from the pull-down menu, Personal Consumer Night 1 will not check out when recording content from a CD.
- the CPU 11 executing the recording program 1 13 transfers the music data reproduced from the CD mounted on the drive 22 to the HDD 21 and copies the music data.
- the processing in the case of performing is described.
- the user operates the keyboard 18 or the mouse 19 to play music from a CD (not shown) mounted on the drive 22 to the CPU 11 via the interface 17.
- the CPU 11 proceeds to step S 11 to select a song to be copied to the display 20 via the interface 1.
- Display GU I Graphical User Interface
- the CPU 11 reads the TOC (Table Of Contents) of the CD mounted on the drive 22, obtains information on the music included in the CD, and displays the information on the display 20.
- the CPU 11 reads an ISRC (International Standard Recording Code) for each music included in the CD, obtains information on the music, and displays the information on the display 20.
- the CPU 11 The user accesses the WWW server 5-1 or 5-2 via the network 2 to obtain information on the song on the CD using TOC, and displays the corresponding GUI on the display 20. The user operates the keyboard 18 or the mouse 19 using the GUI of the display 20 to select a song to be copied.
- step S12 the CPU 11 transmits the term database stored in the HDD 21 (the use condition files 162-1 to 162- of the content database 114 shown in FIG. 5).
- Check (corresponding to N). Details of the deadline database check processing are shown in the flowchart of FIG.
- step S31 the CPU 11 cooperates with the CPU 32 of the adapter 26 to calculate the hash value of the entire expiration date base, and in step S32, calculates the calculated value and the previous value. Compare it with the saved hash.
- the CPU 11 When no data is recorded in the term database, the CPU 11 does not calculate the hash value.
- the HDD 21 has a time limit data base, and the music data (contents) recorded on the HDD 21 as shown in FIG.
- the management information for managing the song the ISRC of the song that has been recorded in the past and the copy date and time are stored in association with each other.
- the ISRC and the copy date and time of each of the three items, item 1 to item 3 are stored.
- the hash value of the entire expiration database based on the I SRC and the copy date and time of all the songs recorded on this expiration date base is described in step S38. It is calculated by PU32 and stored in the non-volatile memory 34.
- a hash value is a value obtained by applying a hash function to data.
- a hash function is a one-way function that generally maps variable-length long data to a fixed-length short value, and has a property that hash values do not easily collide with each other.
- Examples of hash functions include SHA (Secure Hash Algorithm) and MD (Message Digest) 5.
- step S31 the CPU 11 calculates a hash value in the same manner as that executed by the CPU 32. Then, in step S32, the CPU 11 requests the CPU 32 to read the hash value stored in the non-volatile memory 34, and in step S31, Compare with the hash value calculated by yourself.
- step S33 the CPU 11 determines whether or not the hash value calculated in step S31 matches the previous expiration date-based hash value stored in the nonvolatile memory 34. If it is determined that they do not match, it is determined that the expiration date database has been falsified, and the CPU 11 determines in step S34, for example, that "copying cannot be performed because the expiration date database has been falsified.” Is generated, output to the display 20 via the interface 17 and displayed, and thereafter, the processing is terminated. That is, in this case, the process of reproducing the music data recorded on the CD and copying it to the HDD 21 is prohibited.
- step S31 If the hash value calculated in step S31 matches the previous hash value, the process proceeds to step S35, where CPU 11 is selected as the song to be copied specified in step S11.
- Song selected song
- Step S36 CPU 11 uses the I SRC (that is, the selected song) acquired in Step S35 as the deadline database (Fig.
- step S 37 the CPU 11 registers the ISRC of the song and the current date and time on an expiration date basis, and the CPU 11 receives the transfer from the CPU 32 as the current date and time, Use the value output by the RTC 35 of the adapter 26.
- step S38 the CPU 11 The data on the basis of the expiration date at that time is read and transferred to the CPU 32 of the adapter 26.
- the CPU 32 calculates the hash value of the transferred data and stores it in the nonvolatile memory 34. As described above, the hash value stored in this manner is used as the hash value stored previously in step S32.
- step S39 the CPU 11 sets an unregistered flag indicating that the selected music is not registered on the expiration date base. This flag is used when determining whether or not the selected music piece is registered in the time limit database in step S13 of FIG. 7 described below.
- step S36 If it is determined in step S36 that the ISRC of the selected song is registered in the time limit database, at least one This means that the song has been registered on the HDD 21 '. Therefore, in this case, the process proceeds to step S40, where the CPU 11 selects the selected song registered on the From the registration date and time, it is determined whether or not the current date and time (the current date and time output by the RTC 35 of the adapter 26) has passed 48 hours or more.
- step S41 the CPU 11
- the base date and time are changed from the past registration date and time to the current date and time (the date and time output by the RTC 35.)
- step S38 the CPU 11 again returns to the hash value of the entire expiration date database.
- the CPU 32 causes the CPU 32 to calculate and store the data in the non-volatile memory 34.
- step S39 an unregistered flag is set for the music.
- step S40 the current time is
- the CPU 11 sets a registered flag corresponding to the selected song.
- step S13 the CPU 11 It is determined from the above-mentioned flag whether or not the selected music has been registered in the term database. If the selected song has been registered, go to step S14, The CPU 11 causes the display 20 to display a message such as, for example, “This song has not been copied since it has not been copied more than 48 hours after being copied once”. This allows the user to know why the song cannot be copied to the HDD 21.
- step S13 If it is determined in step S13 that the selected song is not registered on the expiration date base, the process proceeds to step S15, in which the CPU 11 controls the drive 22 and sets the CD mounted therein. From the music. As shown in FIG. 10, a music mark code is inserted at a predetermined position in this music program.
- step S16 the CPU 11 extracts the war mark code included in the music data and determines in step S17 whether the war mark code indicates that copying is prohibited. judge. If the warning mark code indicates that copying is prohibited, the process proceeds to step S 18, and the CPU 11 displays the copy on the display 20 via the interface 17, for example, “copying is prohibited”. Is displayed, and the copy process ends.
- step S17 determines whether the war mark does not indicate that copying is prohibited.
- the process proceeds to step S19, and the CPU 11 executes the music playback, for example, the ATR.
- the data is compressed by software processing using a method such as AC (Adaptive Transform Acoustic Coding) 3 (trademark).
- step S20 the CPU 11 uses an encryption key that is set in advance and stored in the memory 13 to perform encryption using, for example, a DES (Data Encryption Standard) scheme or a FEAL (Fast Encryption Algorithm) scheme.
- DES Data Encryption Standard
- FEAL Fast Encryption Algorithm
- the music data by the encryption method Become As the encryption key, for example, a random number generated by software, or a key generated based on a random number generated by the CPU 32 of the adapter 26 can be used. In this way, not only the personal computer 1 but also the CPU 32 of the adapter 26 attached as hardware attached to the personal computer 1 cooperate with the personal computer 1 to execute the encryption processing, so that the decryption can be performed. This makes it more difficult to perform encryption.
- step S 21 the CPU 11 transfers the encrypted data to the HDD 21, and stores one file (content file).
- step S22 the CPU 11 uses the storage key stored in the predetermined RAM 13 (which is stored so that it is difficult to read if it is read illegally).
- the encryption key that encrypted the music data was encrypted using the DES method, FEAL method, etc., and the data was stored on the HDD 21 based on the song data (based on the content file shown on Fig. 5). 1 62—1 to 16 2—N).
- step S23 the CPU 11 sets the information on the stored file, the encrypted encryption key, the information of the music, and the information of the music title input by the user through the GUI as a set to the HDD. 2 1 song de night Register to base. Then, in step S24, the CPU 11 causes the CPU 32 to calculate the hash value of the entire music database and store it in the nonvolatile memory 34.
- a song data base as shown in FIG. 11 is registered on the HDD 21.
- the file name of item 1 to item 3 the encrypted encryption key, song title, length, playback conditions (start date and time, end date and time, number of times limit), playback count, playback billing conditions , Copy conditions (number of times), copy number count, and copy conditions (S CMS) are recorded.
- the contents of the time limit database recorded on the HDD 21 via the network 2 can be shared.
- step S51 the CPU 11 calculates the hash value of the entire song data overnight, and in step S52, causes the CPU 32 to calculate the hash value the last time and stores the hash value in the nonvolatile memory 34. Compare. If the two do not match, the CPU 11 proceeds to step S53, for example, displays a message such as “the song database may have been falsified” on the display 20, and ends the process.
- step S53 displays a message such as “the song database may have been falsified” on the display 20, and ends the process.
- the processing in this case is the same as the processing in steps S31 to S34 in FIG. In this case, the transfer of the music data from the HDD 21 to the portable device 6 is not executed.
- step S54 the CPU 11 reads out the information of the songs registered therein from the song list formed on the HDD 21 and displays the information for the selection on the display 20. Display as GU I. The user selects a song to be moved from the HDD 21 to the portable device 6 by operating the keyboard 18 or the mouse 19 based on the GUI for this selection.
- step S55 the CPU 11 checks the reproduction condition, the copy condition, the reproduction charging condition, and the like of the selected music piece selected in step S54. Details of this processing will be described later with reference to the flowchart in FIG.
- step S56 mutual authentication processing is performed between the CPU 11 of the personal computer 1 and the CPU 53 of the portable device 6, and a communication key is shared.
- the flash memory 61 (or EE PROM 68) of the portable device 6 previously stores the mass key KM, and the RAM 13 of the personal computer 1 (or the predetermined memory of the HDD 21).
- File) pre-stores the individual key KP and ID.
- the CPU 53 receives the ID stored in the RAM 13 from the CPU 11 in advance, applies a hash function to the ID and the master key KM of the CPU 13 itself, and stores the ID in the RAM I 3 Generate the same key as the individual key of Personal Computer 1. In this way, a common individual key is shared by both the personal computer 1 and the portable device 6. Using this individual key, a temporary communication key can be further generated.
- the ID and the master key KMP are stored in the RAM I 3 of the personal computer 1 in advance, and the ID of the portable device 6 and the memory key KMM are also stored in the flash memory 6 1 of the portable device 6. Is stored. Then, by transmitting each ID and the master key to each other, the other applies a hash function to the ID and the mass key transmitted from one to generate the other individual key. Then, a temporary communication key is generated from the individual key.
- IOS International Organization for Standardization
- step S57 the CPU 11 reads the file name of the selected music from the music data base, and That fa The music data of the file name (for example, encrypted in the process of step S20 in FIG. 7) is read from the HDD 21.
- step S58 the CPU 11 compresses the digital music data read out in step S57 (the processing in step S19), the encryption method (the processing in step S20), the format, and the like. Of the portable device 6. Details of this conversion processing will be described later with reference to the flowchart of FIG.
- step S59 the CPU 11 encrypts the music data converted in step S58 with the communication key shared by the mutual authentication process in step S56, and connects the portable device 6 to the portable device 6 via the USB port 23. Transfer.
- step S60 when receiving the transmitted music data via the USB connector 56, the CPU 53 of the portable device 6 stores the music data in the flash memory 61 as it is.
- step S61 the CPU 11 further manages the playback conditions (start date / time, end date / time, number-of-times limit, etc.) of the selected song registered in the song title by the portable device 6. Format.
- step S62 the CPU 11 further converts the SCM S information in the copy condition registered in the song database of the selected song into a format managed by the portable device 6.
- step S63 the CPU 11 transfers the reproduction conditions converted in step S61 and the SCMS information converted in step S62 to the portable device 6.
- the CPU 53 of the portable device 6 stores the transferred reproduction conditions and the SCMS information in the flash memory 61.
- step S64 the CPU 11 also sets the playback conditions, playback charging conditions, and copy conditions registered in the song database of the selected song in the format that the CPU 11 handles in the song database. Then, the data is transferred to the portable device 6 and stored in the flash memory 61.
- step S65 the CPU 11 reads the encrypted key of the selected song from the song database, and in step S66, stores the encrypted key in the storage device stored in the RAM I3. Decrypt with a key and encrypt with a communication key. Then, the CPU 11 transfers the encryption key encrypted with the communication key to the portable device 6.
- step S67 the CPU 53 of the portable device 6 decrypts the encryption key transferred from the personal computer 1 by using the communication key shared in the mutual authentication process, and uses its own storage key. Then, the data is encrypted and stored in the flash memory 61 in association with the stored data.
- the CPU 53 When the storage of the encryption key is completed, the CPU 53 notifies the personal computer 1 that the encryption key has been stored in step S68. Upon receiving the notification from the portable device 6, the CPU 11 of the personal computer 1 receives
- step S70 the CPU 11 transfers the music data to the CPU 32 of the adapter 26, calculates the entire hash value, and stores it in the nonvolatile memory 34. Let it.
- This hash value is In step S52 described above, the hash value is used as the previously stored hash value.
- step S81 the CPU 11 reads various conditions from the music data base.
- step S82 the CPU 11 determines whether the number of times of copying has exceeded the number of times of copying among the various conditions read in step S81. If the copy count has already exceeded the copy limit count, it is not possible to permit further copying, so the process proceeds to step S83, and the CPU 11 executes, for example, "The copy count has already been set to the copy limit. Message is displayed on the display 20 and the process is terminated.
- step S84 it is determined whether or not the current date and time is after the reproduction end date and time.
- the current date and time the one output from the RTC 35 of the adapter 26 is used. This prevents the user from intentionally correcting the current time of the personal convenience set 1 to a past value.
- the CPU 11 receives the current date and time from the CPU 32 and makes the determination in step S84 itself, or, in step S81, updates the reproduction condition read from the music data base.
- the CPU 32 is supplied to the CPU 32 at step 26 to cause the CPU 32 to execute the determination processing of step S84.
- step S85 the CPU 11 deletes the selected song from the HDD 21 and sets Delete the information of the selected song from the database.
- step S86 the CPU 11 causes the CPU 32 to calculate a hash value based on the song data and stores the calculated hash value in the nonvolatile memory 34. Thereafter, the process ends. Therefore, in this case, movement of music data is not performed.
- step S84 If it is determined in step S84 that the current date and time does not exceed the playback end date and time, the process proceeds to step S87, and the CPU 11 sets the playback charging conditions (for example, It is determined whether or not the fee is registered during the song song. If the charging conditions for playback have been registered, the CPU 11 communicates with the portable device 6 in step S88, and determines whether the charging function exists in the portable device 6. Determine whether or not. If the portable device 6 does not have a billing function, the selected music cannot be transferred to the portable device 6, and therefore, in step S89, the CPU 11 executes, for example, “the transfer destination has a billing function. Message is displayed on the display 20, and the moving process for the music is completed.
- the playback charging conditions for example, It is determined whether or not the fee is registered during the song song. If the charging conditions for playback have been registered, the CPU 11 communicates with the portable device 6 in step S88, and determines whether the charging function exists in the portable device 6. Determine whether or not. If the portable device 6 does not
- step S87 If it is determined in step S87 that the playback charging condition is not registered, or if it is determined in step S88 that the portable device 6 has a charging function, the process proceeds to step S90.
- the CPU 11 determines whether or not other reproduction conditions such as the number of times of reproduction are registered for the selected music. If another playback condition has been registered, the process proceeds to step S91, and the CPU 11 determines whether or not the portable device 6 has a function to observe the playback condition. Portable device 6 observes the playback conditions If not, the CPU 11 proceeds to step S92, and the CPU 11 displays a message such as “The transfer destination device does not have a function to observe the playback condition”. 20 is displayed and the processing ends.
- step S90 If it is determined in step S90 that the playback condition is not registered, or if it is determined in step S91 that the portable device 6 has a function to observe the playback condition, The check processing ends, and the process returns to step S56 in FIG. 12A.
- FIG. 14 shows an example of playback conditions managed by the portable device 6 (which can be protected).
- the playback start date and time and the playback end date and time are registered for each song from Item 1 to Item 3, but the number of playbacks is registered only for Item 2 and for Item 1 and Item 3 not registered. Therefore, if the song of item 2 is selected, the playback condition of the number of plays can be maintained, but if the song of item 1 or item 3 is selected, the number of plays Condition cannot be observed.
- step S101 the CPU 11 checks the format (reproduction conditions, use conditions, copy conditions, etc.) of the selected music piece recorded on the HDD 21.
- step S102 the CPU 11 checks the conditions that can be set for the device of the other party (in this case, the portable device 6). In other words, CPU 11 is C in portable device 6. Queries the settable conditions to PU53 and obtains the answer.
- step S103 the CPU 11 determines, among the format conditions registered during the song data base, the conditions that can be set for the destination device in step S102. Decide based on
- step S104 the CPU 11 determines whether there is a condition that can be set, and if there is no condition that can be set, the process proceeds to step S105, where the music data is read. Prohibit the process of moving to portable device 6. In other words, in this case, the portable device 6 cannot keep the conditions registered during the music display. Traveling in the evening is prohibited.
- step S104 If it is determined in step S104 that a condition that can be set exists, the process proceeds to step S106, and the CPU 11 converts the condition into a condition of the other party's function format. Then, in step S107, the converted conditions are set in the partner device. As a result, the portable device 6 can play back the music data according to the set conditions (observing the conditions).
- Steps S11 1 through S12 27 in Figs. 16A, 16B and 16C is performed from the HDD 21 in Figs. 12A, 12B and 12C.
- Steps for Moving Music Data to Portable Device 6 Steps S51 to S67 Reason. That is, also in this case, after the alteration of the song database is checked, the process of checking the reproduction condition of the selected song is performed.
- the music data is transferred from the HDD 21 of the personal computer 1 to the flash memory 61 of the portable device 6 and stored. Is done. Thereafter, in step S128, CPU 11 of personal computer 1 copies the song database.
- step S129 CPU 11 causes CPU 32 to calculate the hash value of the entire music database, and stores the value in nonvolatile memory 34.
- step S 161 the CPU 11 of the personal computer 1 requests the CPU 53 of the portable device 6 to read out the information of the music stored in the flash memory 61. In response to this request, the CPU 53 transmits the information of the music stored in the flash memory 61 to the personal computer 1.
- the CPU 11 of the personal computer 1 displays a GUI for selecting a song stored in the flash memory 61 on the display 20 based on this information.
- the user operates the keyboard 18 or the mouse 19 to specify a song to be moved from the portable device 6 to the HDD 21 based on the GUI.
- step S 162 the CPU 11 performs a mutual authentication process with the CPU 53 and shares a communication key. This processing is similar to the processing in step S56 in FIG. 12A.
- step S163 the CPU 53 reads out the encrypted music data of the selected music tune stored in the flash memory 61 and transfers it to the personal computer 1.
- step S 164 the CPU 11 of the personal computer 1 saves the music data transferred from the portable device 6 as a single file with a file name and stores the music data in the HDD 21. . This can be done, for example, by giving the location information of the file name (for example, the number of bytes from the beginning) as part of one file.
- step S165 the CPU 53 reads the encrypted key of the selected music stored in the flash memory 61, decrypts it with its own storage key, and further encrypts it with the communication key. After that, it is transferred to the personal computer 1.
- This encryption key has been stored in the flash memory 61 in the process of step S67 in FIG. 12C, for example.
- step S166 when the CPU 11 of the personal computer 1 receives the transfer of the encryption key from the portable device 6, it decrypts it with the communication key and encrypts it with its own storage key.
- step S167 the CPU 11 sends the file name of the music file saved in step S164, the song name entered by the user via the GUI, and the program in step S166. Register the encrypted encryption key etc. in the song data on HDD 21.
- step S168 the CPU 11 calculates the hash value of the entire song database. The calculation is made by the CPU 32 and the data is stored in the nonvolatile memory 34.
- step S169 the CPU 11 of the personal computer 1 notifies the portable device 6 that the encryption key has been stored, and requests deletion of the music data of the music.
- the CPU 53 deletes the music data of the music stored in the flash memory 61 in step S170.
- step S 18 1 to step S 188 shown in FIG. 18 corresponds to the processing from step S 16 1 to step S 16 1 in the processing for moving music data from portable device 6 to HDD 21 in FIG.
- This processing is similar to the processing of S168. That is, in the case of the copy process, the process is basically the same as the process of the move, except that the processes of steps S169 and S170 in FIG. 17 are omitted. Is omitted.
- step S201 the CPU 11 controls the communication unit 25 and activates the network 2 when the user instructs the access to the EMD server 4 via the keyboard 18 or the mouse 19.
- the EMD server 4 responds to the access by Transfers information such as the issue, song title, and information to the personal computer 1 via the network 2.
- the CPU 11 of the personal computer 1 acquires this information via the communication unit 25, it displays it on the display 20 via the interface 17.
- the user uses the GUI displayed on the display 20 to specify a song to be copied in step S202.
- This designation information is transferred to the EMD server 4 via the network 2.
- step S203 the CPU 11 executes a mutual authentication process with the EMD server 4 via the network 2, and shares a communication key.
- the mutual authentication process performed between the personal computer 1 and the EMD server 4 can be performed using, for example, a public key and a secret key defined in IS09798-3.
- the personal computer 1 has its own secret key and the public key of the EMD server 4 in advance, and the EMD server 4 has its own secret key, and the mutual authentication process is performed.
- the public key of the personal computer 1 is transferred from the EMD server 4, or a certificate distributed in advance to the personal computer 1 is transferred from the personal computer 1 to the EMD server 4, and the certificate is transferred to the EMD server 4.
- the EMD server 4 may confirm and obtain the public key.
- the CPU 11 executes processing related to charging with the EMD server 4. The details of the charging process will be described later with reference to the flowchart of FIG.
- step S205 the EMD server 4 instructs the personal computer 1 to encrypt the song specified in step S202.
- the encrypted music data is transferred to the personal computer 1 via the network 2.
- the time information is also transferred appropriately.
- step S206 the CPU 11 saves the transferred music file as one file with a file name in the HDD 21.
- step S207 the EMD server 4 further encrypts the encryption key of the music using the communication key shared with the personal computer 1 in step S203, and transfers it to the personal computer 1.
- step S208 the CPU 11 decrypts the encryption key transferred from the EMD server 4 by itself or with the CPU 32 of the adapter 26 using the communication key, and obtains the decrypted encryption key. Encrypt the key with your own storage key.
- step S209 CPU 1
- step S210 the CPU 11 causes the CPU 32 to calculate the hash value of the entire song database, and stores the hash value in the nonvolatile memory 34.
- step S205 the EMD server 4 transmits the time data to the personal computer 1 together with the music data. This time is transferred from the personal computer 1 to the adapter 26.
- CPU 32 of adapter 26 is a personal computer
- the time of the RTC 35 is corrected in step S211.
- the time information of the RTC 35 of the adapter 26 is corrected based on the time information obtained from the external device recognized as the correct device as a result of the mutual authentication.
- the adapter 26 can always hold correct time information.
- step S221 the CPU 11 of the personal computer 1 reads the price information of the selected song specified in step S202 from the price information transmitted from the EMD server 4 in step S201. This is written in the accounting log on HDD 21.
- Figure 21 shows an example of such a billing log.
- the user has copied items 1 to 3 from the EMD server 4, the area for item 1 and item 2 is 50 yen, and the fee for item 3 is 60 yen.
- the hash value of the charging port at that time is also calculated by the CPU 32 and registered in the nonvolatile memory 34.
- step S222 the CPU 11 of the personal computer 1 reads out the accounting log written in step S221 from the HDD 21 and transfers it to the EMD server 4 via the network 2.
- step S223 the EMD server 4 performs a charging calculation process based on the charging log transferred from the personal computer 1. That is, the EMD server 4 additionally updates the built-in database with the accounting log transmitted from the user of the personal computer 1.
- step S224 the EMD server 4 determines whether or not to make an immediate decision on the billing log. 4 transfers the product name, amount, etc. necessary for the approval to the approval server (not shown).
- step S226 the decision making server executes a decision making process for the user of the personal computer 1. If it is determined in step S224 that the decision is not made immediately, the processing of steps S225 and S226 is skipped. That is, this process is performed periodically thereafter, for example, once a month.
- step S241 the user connects the IEC 60958 output terminal of the CD player to the IEC60958 terminal of the audio input / output interface 24 of the personal computer 1.
- step S242 the user operates the keyboard 18 or the mouse 19 to input the song name (or the number corresponding to the song) of the song to be copied from the CD player.
- step S243 the user operates a button of the CD player to start reproduction of the CD player. If a line for sending and receiving control signals is connected between the CD player and the personal computer 1, a playback start command is input via the keyboard 18 or the mouse 19 of the personal computer 1, and the CD is started. It is also possible to have the player start playing the CD.
- step S244 When the CD player starts playing the CD, in step S244, the music data output from the CD player Transferred to personal computer 1 via C 609 58 terminal. In step S245, the CPU 11 reads the S CMS (Serial Copy) from the data input through the IEC 60958 terminal.
- S CMS Serial Copy
- This S CMS data includes copy information such as copy prohibition, copy only once, and copy free. Therefore, in step S246, the CPU 11 determines whether or not the S CMS data indicates copy prohibition, and if it indicates copy prohibition, the process proceeds to step S247, and the CPU proceeds to step S247.
- step S246 determines in step S246 that the SCM S information read in step S245 does not indicate copy prohibition
- the process proceeds to step S248 to read the warrior mark code and read the warrior mark. It is determined in step S249 whether or not indicates that copying is prohibited. When the war mark code indicates that copying is prohibited, the process proceeds to step S247, and a predetermined message is displayed as in the case described above, and the copying process ends.
- step S249 If it is determined in step S249 that the war mark does not indicate that copying is prohibited, the process proceeds to step S250, where a time limit database check process is performed. If the selected song has already been registered as a result of the time limit database check, the process ends in steps S251 and S252. This processing is similar to the processing in steps S13 and S14 in FIG.
- steps S 253 through S 258 the registration processing is executed.
- the processing in steps S253 to S258 is the same as that in step S1 in FIG. 7 except that in step S257, the S CMS information supplied from the IEC 60958 terminal is also registered in the music database. Since the processing is the same as the processing from step 9 to step S24, the description thereof is omitted.
- the music data by the CPU 11 executing the content management program 11 1 is output from the HDD 21 to the IEC 60958 terminal ( The following describes the processing when playing back.
- steps S271 to S273 the hash value of the entire song data is calculated as in steps S111 to S113 of FIG. It is determined whether or not the hash value matches the stored hash value, and the music data based tampering check process is performed. If it is determined that the song data base has not been tampered with, the process proceeds to step S274, where the CPU 11 accesses the song data base of the HDD 21 and is registered there.
- step S275 the CPU 11 executes a check process such as a reproduction condition of the selected music piece.
- the details of the check processing such as the reproduction conditions will be described later with reference to the flowchart of FIG.
- step S276 the CPU 11 reads the encryption key of the music selected in step S274 from the music database, and decrypts it with the storage key.
- step S277 the CPU 11 Read the S CMS information of the selected song from the song data base and determine the S CMS information output from the IEC 60958 terminal according to the rules of the S CMS system. For example, if the number of times of playback is limited, the number of times of playback is incremented by 1 and becomes new SCM S information (in step S 278, CPU 11 further adds ISR C of the selected song). Read from song database.
- step S279 the CPU 11 reads the selected music file name from the music database and reads the music data from the HDD 21 based on the file name.
- the CPU 11 further reads out the encryption key corresponding to the music data from the music data base, decrypts it with the storage key, and decrypts the encrypted music data using the decrypted encryption key. .
- the CPU 11 further decodes the compressed code of the music data.
- step S280 the CPU 11 transmits the decoded digital music data together with the SCM information determined in step S277 and the I SRC information read out in step S278 in IEC 609 in step S279. Output from the IEC 60958 terminal according to the provisions of 58. Further, the digital music data is converted into an analog signal, which is output from the analog output terminal of the audio input / output interface 24.
- step S281 the CPU 11 increments the value of the reproduction count during the song data base by one. Then, in a step S282, it is determined whether or not a playback charging condition is added to the selected music piece. If the playback charging condition has been added, the process proceeds to step S283, in which the CPU 11 writes the corresponding fee in the charging log, and in step S284, the entire song data is collected. In step S282, if it is determined that the playback fee is not added to the selected song, the processing in step S283 and step S284 is performed. Skipped.
- step S301 the CPU 11 reads out various conditions of the music database.
- step S302 the CPU 11 determines whether or not the number of times of reproduction has exceeded the limit in the read conditions. If the number of times has exceeded the limit, the process proceeds to step S303 to delete the selected song from the HDD 21. And delete the information of the selected song from the song list.
- step S304 the CPU 11 further causes the CPU 32 to calculate a new hash value based on the song data, and stores the hash value in the nonvolatile memory 34. In this case, playback output is prohibited.
- step S302 If it is determined in step S302 that the number of times of reproduction has not exceeded the limit number of times, the process proceeds to step S305, and the CPU 11 determines whether or not the reproduction end date and time is past the current date and time. If the playback end date and time is past the current date and time, the selected music is deleted from the HDD 21 and also deleted from the music data base in step S303 as in the case described above. Then, in step S304, the hash value of the new song database is calculated and stored. In this case, the reproduction output is also prohibited.
- step S305 the playback end date and time is past the current date and time. If it is determined that there is no such song, the process proceeds to step S306, and the CPU 32 determines whether or not a playback charging condition is added to the selected song. If the playback charging condition is added, step S 30
- Step S 3 the CPU 11 causes the display 20 to display a message indicating that the playback charging condition is added and the fee.
- step 06 If it is determined in step 06 that the playback charging condition has not been added, the process of step S307 is skipped.
- the CPU 11 that executes the content management program 11 and the CPU 53 that executes the main program are used to transfer data from the HDD 21 to the portable device.
- a process for outputting (playing) music data via the device 6 will be described.
- steps S321 to S325 the alteration check of the music database, the designation of the selected music, and the check processing such as the reproduction condition of the selected music are performed. This processing is the same as the processing from step S271 to step S275 in FIG. 23A, and a description thereof will be omitted.
- step S326 a mutual authentication process is performed between the portable device 6 and the personal computer 1, and a communication key is shared between the portable device 6 and the personal computer 1.
- step S327 the CPU 11 of the personal convenience 1 instructs the portable device 6 to reproduce the encrypted audio data to be transmitted.
- the CPU 11 reads the file name of the selected song specified in step S324 from the song database, and reads out the music file with the file name from the HDD 21.
- CPU 11 is step S
- the compression encoding method, encryption method, A process is performed to convert one map or the like to the one of the Poble Device 6 format. Then, in step S330, the CPU 11 encrypts the music data converted in step S329 with a communication key and transfers the encrypted music data to the portable device 6.
- step S331 the CPU 53 of the portable device 6 decrypts the transferred data with the communication key in step S327 in response to the instruction transferred from the personal computer 1. And output it for playback.
- step S3332 CPU 11 increments the number-of-plays count of the music database by one. Further, in step S333, the CPU 11 determines whether or not a playback charging condition has been added to the selected song. If so, in step S333, the CPU 11 reduces the fee. It is written into the billing log, and in step S335, the CPU 32 causes the CPU 32 to newly calculate the hash value of the entire music data base and store it. If the charging condition for reproduction is not added to the selected music, the processing of steps S334 and S335 is skipped.
- a program for operating the CPU 11 is a so-called tamper resistant software in which the execution order changes every time.
- a part of the function of the CPU 11 is shared by the adapter 26 as hardware, and the two cooperate to execute various processes. This has made it possible to further enhance safety.
- the hash value of the song database is Instead of being stored in the overnight base itself, it is stored in the non-volatile memory 34 of the adapter 26. That is, in the comparison processing with the previously stored hash values such as steps S32 and S33 in FIG. 8, the past hash values to be compared are stored in the nonvolatile memory 34. It is assumed. Thus, for example, before copying or moving the music data stored on the HDD 21 to another recording medium, the recorded contents of the HDD 21 are backed up and the HDD 21 is stored there. After copying or moving the music data stored in the HDD 21 to another recording medium, the data backed up to the HDD 21 is restored again, so that the copy or move It is possible to prevent a single blow.
- the non-volatile memory 34 stores hash values corresponding to information on the songs A and B.
- the recording data of the HDD 21 is backed up to another recording medium 251.
- the hash value of the non-volatile memory 34 is also changed to the hash value corresponding to song B.
- the nonvolatile memory 34 stores the hash value calculated from the information of the song B, and does not store the hash value calculated from the information of the song A and the song B.
- the hash value does not match the past hash value stored in the nonvolatile memory 34, and it is detected that the music data base has been tampered with. As a result, the use of the songs A and B stored in the HDD 21 is restricted thereafter.
- the adapter 26 has a built-in RTC 35, and the value of the RTC 35 is transferred from another device (for example, the EMD server 4) that has obtained a correct authentication result.
- the time information is corrected based on the received time data.
- RTC 35 is used instead of the one managed by Personal Computer 1. Therefore, the user cannot deliberately correct the current time of the personal computer 1 to a past time and cannot escape determination of the reproduction end date and time as the reproduction condition.
- the security of the adapter 26 is further enhanced by configuring the adapter 26 to decrypt and execute the program transferred in accordance with the program stored in the ROM 36 in advance.
- step S351 the program to be executed by the adapter 26 is stored in the RAM 13 in advance.
- the data is encrypted using the existing encryption key and transferred to the adapter 26.
- step S 3 52 a program for decrypting and executing the encrypted program transferred from the personal computer 1 is stored in advance.
- the CPU 32 executes the encrypted program transferred from the personal computer 1 according to the program stored in the RQM 36 in step S 3 52 Decrypts.
- step S313 the CPU 32 loads the decrypted program into the RAM 33, and executes the program in step S354.
- the CPU 11 of the personal computer 1 when causing the adapter 26 to calculate the hash value based on the song data on the HDD 21, the CPU 11 of the personal computer 1 encrypts the song database data with the encryption key and uses the encryption key to calculate the hash value. Transfer to CPU 32 of 26.
- the CPU 32 calculates a hash value by applying a hash function to the transferred song data based on the song data. Then, the calculated hash value is stored in the nonvolatile memory 34.
- the CPU 32 compares the hash value with a past hash value stored in advance, and transfers the comparison result to the CPU 11 of the personal computer 1.
- FIG. 28 shows a more specific configuration inside the adapter 26 (the adapter 26 is formed as a semiconductor IC.
- the adapter 26 has the interface 31, CPU 32, RAM 33 shown in FIG. 3).
- the nonvolatile memory 34, the RTC 35, and the ROM 36 it has a RAM controller 261, which controls writing and reading to and from the RAM 33, and a logic circuit 262.
- the logic circuit 262 includes, for example, It is used for processing when the encrypted music data is decrypted and the decrypted data is output directly from the adapter 26.
- These interfaces 31 to ROM 36 and RAM controller The mouthpiece 26 1 and the logic circuit 262 are integrated into a semiconductor IC and are configured so that they cannot be disassembled from the outside.
- the crystal oscillator 271 is used when the adapter 26 generates a reference clock when executing various processes.
- Oscillation circuit 272 is an oscillation circuit for operating the RTC 35.
- the battery 273 supplies power for backup to the oscillation circuit 272, the nonvolatile memory 34, and the RTC 35.
- the other circuits of the adapter 26 are supplied with power from the power supply circuit 281 of the personal computer 1.
- the non-volatile memory 34 can be configured by a writable and erasable ROM. However, when the nonvolatile memory 34 is configured by a RAM that is backed up by a backup power supply from the battery 273, for example, FIG. As shown in FIG. 29B, a protective aluminum layer 291 is formed on the nonvolatile memory 34, and the battery 273 is transferred to the nonvolatile memory 34 so as to be on the same plane as the protective aluminum layer 291. A power supply pattern 292 for supplying the same power can be formed.
- the non-volatile memory 34 is to be falsified, and if the protection aluminum layer 291 is to be deleted, the power supply pattern 292 on the same plane is also deleted, and the power supply to the non-volatile memory 34 is reduced. If you do, the data stored inside will be erased. With this configuration, the tumbler resistance can be further improved.
- the wirings 301-1 to 301-1-3 for writing or reading data to or from the non-volatile memory 34 may be overlapped in the vertical direction (depth) at the corresponding positions. It is formed in.
- the upper wirings 301-1-1, 101-2 must be removed, and a plurality of wirings 301-1-1, Data cannot be read simultaneously from 30 1-2 and 30 1-3.
- this distribution If the lines 301-1 to 301-3 are formed redundantly and directly probed, their additional capacity makes it difficult to analyze their contents.
- the present invention can also be applied to a case where data is transferred or copied to another recording medium. It is.
- the data may be image data or other data.
- the data is encrypted and stored in the HDD 21 and the encryption key is also encrypted with the storage key and recorded on the HDD 21, the data is recorded on the HDD 21. Even if the music data is copied, it cannot be decrypted, so that it is possible to prevent a large number of copies from being distributed.
- the hash value of the data is calculated and stored, which makes it easier to prevent the database from being tampered with.
- the software of the personal computer 1 is checked by means of mutual authentication to determine whether it is legitimate. This prevents music data from being passed to Touae.
- the ISRC is used to determine the identity of songs, and when the ISRC cannot be obtained, the TOC is used.Thus, the identity of the songs can be determined even if the ISRC cannot be obtained. Becomes possible.
- the processing executed by the adapter 26 may be executed by the CPU 11 using a secure program.
- the par The Sonal computer 1 downloads the current time data from a specific server (for example, the EMD registration server 3) connected to the network 2 instead of the current time supplied by the RTC 35 of the adapter 26. And executes the judgment process based on the current time.
- the personal computer 1 stores the current time at predetermined time intervals, displays an error when a time earlier than the stored time is set, and accepts the time setting. You may not.
- the series of processes described above can be executed by hardware, but can also be executed by software.
- the programs that make up the software can be installed on a computer that is built into dedicated hardware, or by installing various types of programs. It is installed from the program storage medium, for example, at a general-purpose personal computer where functions can be executed.
- a program storage medium for storing a program installed in a computer and made executable by the computer includes a magnetic disk 41 (including a floppy disk), an optical disk 42 (CD-ROM ( Package media consisting of Compact Disc-Read Only Memory), DVD (including Digital Versatile Disc), magneto-optical disk 43 (including MD (Mini-Disc)), semiconductor memory 44, etc. It is composed of ROM 12 and HDD 21 which are stored permanently.
- the program can be stored in the program storage medium via a local area network, if necessary, via an interface such as the communication unit 25. It is performed using a wired or wireless communication medium, such as a network 2 such as the Inuichi Network or digital satellite broadcasting.
- the steps of describing a program stored in a program storage medium are not limited to processing performed in chronological order in the order described, but are not necessarily performed in chronological order. It also includes processes that are executed individually or individually.
- a system refers to an entire device configured by a plurality of devices.
- time information at the time of duplication is stored in association with the identification information of the content, so that the user's profit is greatly increased. It will be possible to substantially prohibit mass duplication without loss.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Management Or Editing Of Information On Record Carriers (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
Abstract
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE69915041T DE69915041T2 (de) | 1998-12-25 | 1999-12-24 | Informationsverarbeitungsvorrichtung und -methode, und programmspeichermedium |
US09/622,517 US7249106B1 (en) | 1998-12-25 | 1999-12-24 | Information processing method and apparatus and program storage medium for prohibiting duplication of contents in large quantities |
EP99961388A EP1058257B1 (fr) | 1998-12-25 | 1999-12-24 | Dispositif et procede de traitement d'informations, et support d'enregistrement de programmes |
AU18013/00A AU1801300A (en) | 1998-12-25 | 1999-12-24 | Information processing device and method, and program storage medium |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP10/369414 | 1998-12-25 | ||
JP36941498 | 1998-12-25 | ||
JP11/39222 | 1999-02-17 | ||
JP3922299 | 1999-02-17 | ||
JP36608699A JP4568933B2 (ja) | 1998-12-25 | 1999-12-24 | 情報処理装置および方法、並びにプログラム格納媒体 |
JP11/366086 | 1999-12-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000039800A1 true WO2000039800A1 (fr) | 2000-07-06 |
Family
ID=27290077
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP1999/007302 WO2000039800A1 (fr) | 1998-12-25 | 1999-12-24 | Dispositif et procede de traitement d'informations, et support d'enregistrement de programmes |
Country Status (4)
Country | Link |
---|---|
JP (1) | JP4568933B2 (fr) |
CN (1) | CN1144212C (fr) |
AU (1) | AU1801300A (fr) |
WO (1) | WO2000039800A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002063521A1 (fr) * | 2001-02-07 | 2002-08-15 | Sony Corporation | Dispositif de traitement d'information |
EP1176754A3 (fr) * | 2000-07-24 | 2004-12-01 | Sony Corporation | Système, procédé et dispositif de distribution de clés et support d'un programme ordinateur |
KR100788045B1 (ko) * | 2000-08-03 | 2007-12-24 | 소니 가부시끼 가이샤 | 재생장치 및 재생방법 |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002236808A (ja) * | 2001-02-07 | 2002-08-23 | Sony Corp | 情報処理装置および方法、プログラム格納媒体、並びにプログラム |
JP2002288041A (ja) | 2001-03-23 | 2002-10-04 | Sony Corp | 情報処理装置および方法、プログラム格納媒体、並びにプログラム |
JP4716068B2 (ja) * | 2001-03-26 | 2011-07-06 | ソニー株式会社 | 情報配信方法、情報配信システム、およびクライアント機器 |
JP3778009B2 (ja) | 2001-06-13 | 2006-05-24 | ソニー株式会社 | データ転送システム、データ転送装置、データ記録装置、データ管理方法 |
JP4200686B2 (ja) * | 2002-05-08 | 2008-12-24 | ソニー株式会社 | 情報通信端末、情報配信装置、情報配信システム、情報受信方法、情報配信方法 |
US8220064B2 (en) | 2004-07-20 | 2012-07-10 | Panasonic Corporation | Content management system and content management unit |
JP2007243703A (ja) * | 2006-03-09 | 2007-09-20 | Toshiba Corp | 携帯端末 |
JP4636008B2 (ja) * | 2006-11-17 | 2011-02-23 | 日本電気株式会社 | データレプリケーションシステム、データレプリケーション方法、データレプリケーションプログラム |
JP4423314B2 (ja) * | 2007-07-09 | 2010-03-03 | 株式会社日立製作所 | デジタル情報記録再生装置および表示装置 |
JP2008257847A (ja) * | 2008-04-03 | 2008-10-23 | Hitachi Ltd | ディジタル放送信号受信方法 |
JP4927974B2 (ja) * | 2010-06-29 | 2012-05-09 | シャープ株式会社 | 情報再生装置 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH03250878A (ja) * | 1990-02-28 | 1991-11-08 | Canon Inc | 記録再生装置 |
JPH08195064A (ja) * | 1995-01-12 | 1996-07-30 | Sony Corp | 記録媒体及び記録再生装置 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3309362B2 (ja) * | 1994-02-16 | 2002-07-29 | 日本電信電話株式会社 | ディジタル情報複製方法及びその装置 |
JP3060819B2 (ja) * | 1994-03-04 | 2000-07-10 | 株式会社日立製作所 | ヘリカル走査型の記録再生装置 |
JP3092432B2 (ja) * | 1994-02-17 | 2000-09-25 | 株式会社日立製作所 | 情報記録再生装置 |
JPH103745A (ja) * | 1996-06-12 | 1998-01-06 | Sony Corp | 記録媒体、デジタルコピー管理方法、再生装置、及び記録装置 |
JP3485750B2 (ja) * | 1997-01-31 | 2004-01-13 | 日本ビクター株式会社 | 不法コピー防止方法、コピー元レコーダ及びコピー先レコーダ |
JP3361729B2 (ja) * | 1997-08-05 | 2003-01-07 | 松下電器産業株式会社 | 記録装置 |
JP4045388B2 (ja) * | 1999-01-14 | 2008-02-13 | ソニー株式会社 | 情報信号複製制限方法、情報信号複製制御システムおよび情報信号記録装置 |
-
1999
- 1999-12-24 WO PCT/JP1999/007302 patent/WO2000039800A1/fr active IP Right Grant
- 1999-12-24 JP JP36608699A patent/JP4568933B2/ja not_active Expired - Fee Related
- 1999-12-24 CN CNB998054518A patent/CN1144212C/zh not_active Expired - Fee Related
- 1999-12-24 AU AU18013/00A patent/AU1801300A/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH03250878A (ja) * | 1990-02-28 | 1991-11-08 | Canon Inc | 記録再生装置 |
JPH08195064A (ja) * | 1995-01-12 | 1996-07-30 | Sony Corp | 記録媒体及び記録再生装置 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1176754A3 (fr) * | 2000-07-24 | 2004-12-01 | Sony Corporation | Système, procédé et dispositif de distribution de clés et support d'un programme ordinateur |
US7131010B2 (en) | 2000-07-24 | 2006-10-31 | Sony Corporation | Data processing system, data processing method, data processing apparatus, and program providing medium |
KR100788045B1 (ko) * | 2000-08-03 | 2007-12-24 | 소니 가부시끼 가이샤 | 재생장치 및 재생방법 |
WO2002063521A1 (fr) * | 2001-02-07 | 2002-08-15 | Sony Corporation | Dispositif de traitement d'information |
CN1326069C (zh) * | 2001-02-07 | 2007-07-11 | 索尼公司 | 信息处理装置 |
US7917531B2 (en) | 2001-02-07 | 2011-03-29 | Sony Corporation | Information processing apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN1144212C (zh) | 2004-03-31 |
AU1801300A (en) | 2000-07-31 |
CN1298537A (zh) | 2001-06-06 |
JP4568933B2 (ja) | 2010-10-27 |
JP2000305854A (ja) | 2000-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100632495B1 (ko) | 정보처리장치 및 방법과 프로그램 격납매체 | |
KR100862371B1 (ko) | 정보처리 시스템 | |
KR100654879B1 (ko) | 정보 처리 장치 및 방법, 및 프로그램 저장 매체 | |
KR100633588B1 (ko) | 반도체 ic, 정보처리방법, 정보처리장치 및 프로그램 기록매체 | |
JP4568933B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000305846A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP4556277B2 (ja) | 情報処理装置および方法、情報処理システム、並びにプログラム格納媒体 | |
JP4379653B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000347852A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP4300442B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP4304819B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000306006A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000349751A (ja) | 情報処理装置および方法、認証方法、並びにプログラム格納媒体 | |
JP2000348105A (ja) | 情報提供装置および方法、並びにプログラム格納媒体 | |
JP2000347851A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000347847A (ja) | 情報処理装置および方法、半導体ic、情報処理システム、並びにプログラム格納媒体 | |
JP2000305855A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
AU2003257706B2 (en) | Information processing apparatus and method, and program storage medium | |
JP2000347848A (ja) | 半導体ic、情報処理方法、情報処理装置、並びにプログラム格納媒体 | |
JP2000307568A (ja) | 半導体ic、情報処理方法、情報処理装置、並びにプログラム格納媒体 | |
JP2000347849A (ja) | 情報提供装置および方法、並びにプログラム格納媒体 | |
MXPA00010101A (en) | Information processing device and method, and program storage medium | |
JP2000347850A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
AU2003262491A1 (en) | Information processing system | |
MXPA00011785A (en) | Information processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99805451.8 Country of ref document: CN |
|
ENP | Entry into the national phase |
Ref document number: 2000 18013 Country of ref document: AU Kind code of ref document: A |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999961388 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09622517 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020007009381 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1999961388 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007009381 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 1999961388 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020007009381 Country of ref document: KR |