WO2006049083A1 - 鍵情報提供方法、情報再生装置、および、鍵情報提供装置 - Google Patents
鍵情報提供方法、情報再生装置、および、鍵情報提供装置 Download PDFInfo
- Publication number
- WO2006049083A1 WO2006049083A1 PCT/JP2005/019809 JP2005019809W WO2006049083A1 WO 2006049083 A1 WO2006049083 A1 WO 2006049083A1 JP 2005019809 W JP2005019809 W JP 2005019809W WO 2006049083 A1 WO2006049083 A1 WO 2006049083A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- key information
- transmission
- key
- removable
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00666—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of erasing or nullifying data, e.g. data being overwritten with a random string
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Definitions
- the present invention belongs to a technical field related to a key information providing process in consideration of copyright protection used when decrypting encrypted content data.
- this super-distribution system uses various networks such as networks in which content data is represented by communication lines, CD (Compact Disc), and DVD (Digital Versatile Disc) recording media.
- CD Compact Disc
- DVD Digital Versatile Disc
- key information called a license for performing decryption or reproduction management of the content data is used.
- This super-distribution system uses this key information to manage the use of content data and to protect copyrights (for example, Non-Patent Document 1).
- Non-Patent Document 1 Ryoichi Mori, Masaharu Kawahara, Yasuhiro Otsuki “Electronic Technology for Superdistribution Intellectual Property Rights Processing” Information Processing, Information Processing Society of Japan, December 1996, No. 37, No. 2, pp. 1
- the present invention can accurately exchange key information by transmitting and receiving the key information in stages while encrypting the key information.
- the present invention can accurately exchange key information by transmitting and receiving the key information in stages while encrypting the key information.
- the invention according to claim 1 is different from the first storage means in the first storage means for storing the key information for decrypting the encrypted data.
- a key information providing method for providing to the storage means wherein the first storage means generates a plurality of transmission information from the key information cover, and the generated transmission information is transmitted to another
- the first storage means is a piece of transmission information. Is transmitted to the second storage means. It is configured to delete the transmitted transmission information before transmitting other transmitted information.
- the invention according to claim 9 is an information reproducing apparatus that obtains the key information from a storage unit that records key information for decrypting the encrypted data and reproduces the data.
- a plurality of transmission information used for encrypting the key information is generated in the storage unit, and each of the generated transmission information is sequentially processed at a timing different from other transmission information.
- the invention according to claim 12 is a key information providing apparatus for providing key information for decrypting encrypted data to an information reproducing apparatus for reproducing the data, wherein the key information Is stored in advance, generating means for generating a plurality of transmission information for use in encrypting the key information, and each of the generated transmission information at different timings from other transmission information.
- the transmission means transmits the transmission means to the other storage means in sequence and the transmission information after transmitting the one transmission information and before transmitting other transmission information that has not yet been transmitted.
- an erasing unit for erasing transmission information.
- FIG. 1 is a block diagram showing a configuration of an information recording / reproducing apparatus according to the present application.
- FIG. 2 is a diagram for explaining license key information provision processing in the first embodiment.
- FIG. 3 is a table showing the presence of license key information and the reproducible state in the removable HD and key information acquisition unit in the first embodiment.
- ⁇ 4] A flowchart showing the operation of the content data reproduction start process in the reproduction control unit of the first embodiment.
- FIG. 7I is a diagram (I) for explaining the process of encrypting and transferring the license key information based on the shared key information.
- FIG. 8 is a diagram (II) for explaining the process of encrypting and transferring the license key information based on the shared key information.
- FIG. 9 is a diagram for explaining another example of the license key information providing process in the information recording / reproducing apparatus in the first embodiment.
- ⁇ 10 It is a diagram (I) for explaining the secret sharing method used in the license key information transfer process of the second embodiment.
- ⁇ 12 A diagram for explaining a process of providing license key information in the second embodiment.
- FIG. 13 is a table showing the presence of license key information and the reproducible state in the removable HD and key information acquisition unit in the second embodiment.
- FIG. 16 is a diagram for explaining another example of the license key information provision processing in the information recording / reproducing apparatus in the second embodiment.
- the embodiment described below has a portable hard disk (hereinafter referred to as "removable HD") in which content data including audio data and video data is recorded, and the content is stored in the removable HD.
- removable HD portable hard disk
- the content data itself belongs to a distribution system called super distribution in which content data viewing control is performed by managing this key information without performing management for copyright protection.
- the information recording / reproducing apparatus will be described.
- FIG. 1 is a program showing the configuration of the information recording / reproducing apparatus in this embodiment.
- the information recording / reproducing apparatus 100 includes encrypted content data (hereinafter referred to as encrypted content data) provided by the removable HD 10 or by a broadcast wave transmitted from a predetermined broadcast station. ) Is executed using the key information (hereinafter referred to as license key information) supplied by the content HD provided by the removable HD10 (hereinafter referred to as the decryption process).
- the content data decrypted is output to an external device such as a monitor connected to the outside.
- the information recording / reproducing apparatus 100 of the present embodiment acquires license key information from the removable HD 10
- the information recording / reproducing apparatus 100 decrypts the encrypted content data in the information recording / reproducing apparatus 100 and the removable HD 10, respectively.
- the license key information is exchanged step by step.
- the information recording / reproducing apparatus 100 allows each license key information to be exchanged between each apparatus or the like in order to accurately exchange the license key information without having one license key information existing in a plurality of apparatuses or recording media.
- Each license key information is managed by transferring the license key information in stages between each device and the recording medium.
- the information recording / reproducing apparatus 100 of the present embodiment includes a TV receiver 110 that receives encrypted content data as a broadcast wave via an antenna AT, and a removable HD10.
- HD drive 120 to be installed, key information acquisition unit 130 that acquires license key information from removable HD10, decryption processing unit 140 that decrypts encrypted content data based on the acquired license key information, and content
- a decryption control unit 150 that controls processing of data decryption
- an output processing unit 160 that converts the decrypted content data into a predetermined signal and outputs the signal to an external device.
- the encrypted content data recorded on the removable HD10 is decrypted and output to an external device (not shown).
- the key information acquisition unit 130, the decryption processing unit 140, and the decryption control unit 150 are physically isolated so that they are connected by the bus B and can be accessed only by a predetermined operation. It is arranged in the secure area R, which is the designated area. Therefore, the license key information acquired by the key information acquisition unit 130 is not output outside the secure area R by a method other than the license key providing method in the present embodiment.
- the decoded content data is not output to any other than the output processing unit 160 as a decoded signal.
- the information recording / reproducing apparatus 100 is linked to a recording control unit 170 that performs recording control of received content data and a decryption key control unit 150, and performs reproduction control of encrypted content data.
- Playback control unit 180 to perform, OSD processing unit 190 to perform OSD (On screen Display) processing on the output video signal, and operations to perform various setting operations for recording and playback of encrypted content data Unit 200, system control unit 210 for controlling each unit, and ROMZRAM 220 used for controlling each unit.
- System control unit 210 is connected to each unit including decryption control unit 150 by bus B. Yes.
- the removable HD 10 of the present embodiment constitutes the first storage means and the conversion means of the present invention
- the key information acquisition unit 130 includes the second storage means, the reception means, and the restoration means.
- the decryption processing unit 140 and the output processing unit 160 of the present embodiment constitute the reproducing means of the present invention.
- the system control unit 210 of the present embodiment constitutes a transmission control control unit of the present invention.
- the TV receiver 110 receives broadcast waves transmitted from each broadcast station via the antenna AT, for example, broadcast waves having a predetermined digital format such as BS (Broadcasting Satellite) digital broadcast. It demodulates the signal wave received in synchronization with the reception band selected by the user into encrypted content data, and the demodulated encrypted content data is sent to the HD drive 120 or the decryption processing unit 140. It is designed to output.
- BS Broadcasting Satellite
- the HD drive 120 has a structure for making the removable HD10 removable, and has an HD drive interface compliant with standards such as iVDR (Information Versatile Disc for Removable usage). Yes. Also, the HD drive 120 reads from the removable HD10 under the control of the playback control unit 180 or the recording control unit 170. Input / output switching for encrypted content data or license key information data to be output, and HD recording / playback control associated therewith are performed.
- iVDR Information Versatile Disc for Removable usage
- the HD drive 120 of the present embodiment operates in conjunction with the decryption control unit 150 under the control of the playback control unit 180 when the license key information is output from the removable HD 10 to the key information acquisition unit 130.
- a plurality of pieces of information (hereinafter referred to as encryption information or transmission information) that allow the key information acquisition unit 130 to decrypt the license key information while performing encryption of the license key information stored in the removable HD10. ))
- the generated encrypted information is output to the key information acquisition unit 130 step by step.
- the HD drive 120 performs a predetermined process for recording the encrypted content data received by the TV receiving unit 110 in the removable HD 10 attached.
- the HD information 120 is output to the key information acquisition unit 130 in conjunction with the HD drive 120.
- a plurality of pieces of cryptographic key information are sequentially input.
- the key information obtaining unit 130 uses all the cryptographic key information to license. Key information is generated.
- the key information acquisition unit 130 outputs the generated license key information to the decryption processing unit 140 via the decryption control unit 150.
- the key information acquisition unit 130 has a nonvolatile memory M inside, and the encryption memory and other information necessary for providing the license key information transmitted from the removable HD 10 are stored in the nonvolatile memory M. To come to remember.
- the details of the decryption key processing unit 140 in the present embodiment in particular, details of processing related to reception of encryption information and generation of license key information (hereinafter referred to as encryption information reception processing). This will be described later.
- encryption information reception processing details of processing related to reception of encryption information and generation of license key information. This will be described later.
- the above-described encryption information transmission process and encryption key information reception process are referred to as a license key information provision process.
- the decoding key processing unit 140 includes the darkness output from the HD drive 120 or the TV receiving unit 110.
- the key content data and the license key information generated by the key information acquisition unit 130 are input.
- This decryption processing unit 140 is encrypted content data output from the TV receiving unit 110 or read from the removable HD 10 under the control of the decryption key control unit 150 based on the license key information.
- the decrypted content data is output to the output processing unit 160.
- the decryption key control unit 150 controls each unit of the key information acquisition unit 130 and the decryption key processing unit 140 under the control of the reproduction control unit 180. Specifically, the decryption control unit 150 controls the reception of encrypted information in the key information acquisition unit 130, the generation control of license key information based on the encryption information, and the encryption key in the decryption key processing unit 140. ⁇ Decryption processing of content data is controlled.
- Content data decrypted by the decryption key processing unit 140 is input to the output processing unit 160.
- the output processing unit 160 converts the input content data into a predetermined signal. It is converted to and output to an external device, not shown.
- the output processing unit 160 of the present embodiment separates the decoded content data into audio data and video data under the control of the reproduction control unit 180, and each of these data By performing predetermined processing such as decoding processing, video data and audio data in the content data are generated.
- the output processing unit 160 converts the decoded video data and audio data into a signal format of NTSC format, and the converted video signal is generated by the OSD processing unit 190.
- the input display data is superimposed.
- the output processing unit 160 is connected to a video signal on which display data is superimposed and an audio signal whose signal format is converted via a video signal output terminal T1 and an audio signal output terminal T2. Output to the device! /
- a monitor having a function of amplifying audio is connected as an external device, and the video signal or audio signal output from the output processing unit 160 is The sound is amplified and displayed by the monitor.
- the recording control unit 170 is configured to receive a recording instruction input from the operation unit 200 via the system control unit 210.
- the recording control unit 170 includes the system control unit 210. Under the control, the HD drive 120 is controlled based on the input recording instruction, and the encrypted content data output from the TV receiver 110 is recorded in the removable HD 10.
- the playback control unit 180 receives a playback instruction input from the operation unit 200 via the system control unit 210, and the playback control unit 180 controls the system control unit 210. Under the control, the TV receiver 110, HD drive 120, decoding key control unit 150, and output processing unit 160 are controlled based on the input playback instruction, and license key information acquisition control is performed. Playback control that decrypts and plays back the content data is performed.
- the playback control unit 180 links the HD drive 120 and the decryption key control unit 150 to transfer the license key information stored in the removable HD 10 to the key information acquisition unit 130. Control of information provision processing, control of decrypting encrypted content data based on the acquired license key information, and conversion of the decrypted content data into a predetermined signal for output to an external device Each control of the control is performed.
- reproduction start process Details of the operation of the process for starting the reproduction of content data including the license key information providing process (hereinafter referred to as the reproduction start process) in the reproduction control unit 180 of the present embodiment will be described later.
- the OSD processing unit 190 Under the control of the reproduction control unit 180, the OSD processing unit 190 generates display data to be superimposed on a video signal output to an external device such as character information, and the generated character information and the like The display data is output to the output processing unit 160.
- the operation unit 200 includes a remote control device having a large number of keys such as various confirmation buttons, selection buttons, and numeric keys, and a light receiving unit that receives the transmitted signal, or various confirmation buttons.
- the operation panel has a number of keys such as a selection button and numeric keys.
- the operation unit 200 is used for various instructions when receiving content data, recording the content data on the removable HD10, or reproducing the content data recorded on the removable HD10. Get ready! [0044]
- the system control unit 210 reads the control program stored in the ROMZRAM 220 for the receiving device, executes each process, and temporarily holds the data being processed in the ROMZRAM 220.
- the system control unit 210 controls the license key information providing process in an integrated manner when reproducing the decrypted content data while controlling the reproduction control unit 180! / RU
- FIG. 2 is a diagram for explaining the processing for providing the license key information in the present embodiment.
- FIG. 3 shows the existence of the license key information in the removable HD 10 and the key information acquisition unit 130 in the present embodiment. It is a table
- the HD drive 120 of this embodiment controls the removable HD 10 when transmitting the license key information from the removable HD 10 to the key information acquisition unit 130.
- the HD drive 120 operates in conjunction with the key information acquisition unit 130 via the decryption control unit 150 under the control of the playback control unit 180, and Authenticates with the key information acquisition unit 130 and sends the key information to the removable HD10 Key information different from the license key information common to the acquisition unit 130 (hereinafter referred to as common key information) is held (state 1). That is, the HD drive 120 holds the same key information as the key information stored in the key information acquisition unit 130 in the removable HD 10 as common key information! /.
- the HD drive 120 when the removable HD 10 and the key information acquisition unit 130 are authenticated, the HD drive 120 generates a random number based on a predetermined process in the removable HD 10 ( In state 2), based on the generated random number, the license key information stored in the removable HD 10 is encrypted by a predetermined encryption process (state 3).
- the HD drive 120 controls transmission of license key information encrypted from the removable HD 10 (hereinafter referred to as encryption key information) to the key information acquisition unit 130 as first encryption information. (State 4).
- the HD drive 120 deletes the license key information that is the basis of the encryption key information. Further, when the encryption key information is generated, the encryption key information is stored in the removable HD10, and the generated random number is stored in the removable HD10 as random number information. It's like! /
- the HD drive 120 transmits the relevant information to the removable HD 10.
- the encryption key information stored in the removable HD 10 is erased (status 5).
- the HD drive 120 then causes the removable HD 10 to encrypt the random number information stored in the removable HD 10 based on the common key information (state 6), and the encrypted random number information (from the removable HD 10 (The encryption random number information is hereinafter controlled to be transmitted to the key information acquisition unit 130 (state 7).
- the HD drive 120 receives the reception confirmation information indicating that the encrypted random number information has been received from the key information acquisition unit 130 after transmitting the encrypted random number information
- the HD drive 120 receives the removable HD information. 10 will delete the encryption key information stored in the removable HD 10! (State 8 and state 9).
- the key information acquisition unit 130 receives license key information from the removable HD 10.
- the key information acquisition unit 130 operates in conjunction with the HD drive 120 via the playback control unit 180 under the control of the decryption key control unit 150, and
- the common key information common to the removable HD10 is stored in the internal non-volatile memory M (state 1 to state 3). That is, the key information acquisition unit 130 holds the same key information as the key information stored in the removable HD 10 in the nonvolatile memory M as the common key information.
- the key information acquisition unit 130 stores the encryption key information in the nonvolatile memory M. Then, reception confirmation information indicating that the encryption key information has been received is transmitted to the removable HD 10 (state 4 to state 6).
- the reception confirmation information transmitted to the removable HD 10 is an instruction to delete the encryption key information stored in the removable HD 10. Also, when the key information acquisition unit 130 receives the encryption key information and does not correctly receive the encryption key information, the key information acquisition unit 130 does not transmit the reception confirmation information, and does not transmit a retransmission instruction or a predetermined error. Processing is to be performed.
- the key information acquisition unit 130 stores the cryptographic random number information in the nonvolatile memory M.
- the reception confirmation information indicating that the encrypted random number information has been received is transmitted to the removable HD 10 (state 7 and state 8).
- the removable HD1 is the same as when the encryption key information is received.
- the reception confirmation information sent to 0 is an instruction to delete the encrypted random number information stored in the removable HD 10. Further, when receiving the encrypted random number information, the key information acquiring unit 130 does not transmit the reception confirmation information and does not transmit the reception confirmation information when the encrypted random number information is not correctly received. Start processing! /
- the key information acquisition unit 130 decrypts the encrypted random number information based on the shared key information, and based on the decrypted random number information.
- V the encryption key information is decrypted and the license key information is restored (state 9). O Then, the key information acquisition unit 130 is restored as described above.
- the license key information is output to the decryption key processing unit 140.
- the removable HD 10 and the HD drive 120 and the key information acquisition unit 130 perform encryption key information transmission processing and encryption key information reception processing in this way. That is, as shown in the table of FIG. 3, in the removable HD 10 and the key information acquisition unit 130, the license key information (or encryption key information) and random number information (or encryption key information) in state 1 to state 9, respectively. ) And the common key information are not held at the same time, the license key information is always present in only one device. Therefore, in this embodiment, in the removable HD 10 and the key information acquisition unit 130, the license key information (encrypted, N !, state license key information) exists in each component. As a result, it is not possible to decrypt multiple content data at the same time with one license key information! / Speak.
- FIG. 4 is a flowchart showing the operation of the content data reproduction start process in the reproduction control unit 180 of this embodiment.
- the removable HD 10 is mounted in the HD drive 120 in advance, and the removable HD 10 stores license key information for decrypting the encrypted content data to be played back. It is assumed that the content data to be played is recorded in advance on the removable HD10.
- the content recorded on the removable HD10 is operated by operating the operation unit 200.
- the playback control unit 180 When the playback control unit 180 is instructed to be played back and the instruction is input to the playback control unit 180 via the system control unit 210, the playback control unit 180 detects the command (step Sl l), and The playback control unit 180 executes the license key information provision process by linking the HD drive 120 and the decryption key control (step S12).
- playback control unit 180 outputs an instruction to execute license key information provision processing to HD drive 120 and decryption key control unit 150, and HD drive 120 and decryption processing unit 140. Starts control of encryption key transmission processing or encryption key reception processing based on the instruction.
- the reproduction control unit 180 determines whether or not the license key information provision processing has been properly performed (step S 13), and can appropriately perform the license key information provision processing. If it is determined that the license key information is correct, it is determined again whether or not the license key information provision processing is to be performed (step S14).
- the playback control unit 180 controls the OSD processing unit 190 and the output processing unit 160 to display whether or not to perform the license key information provision processing again, and is input from the operation unit 200 The determination is made based on the instruction.
- step S12 the reproduction control unit 180 shifts to the process of step S12 and performs the license key information provision process. If it is determined to cancel, this operation is terminated without playing the content data.
- the reproduction control unit 180 determines that the license key information provision processing can be properly performed, the reproduction control unit 180 receives the decryption processing unit 150 via the decryption control unit 150. 140 and HD drive 120 are controlled to instruct to start playback of the encrypted content data stored in removable HD 10 (step S15), and this operation is terminated.
- the playback control unit 180 instructs each unit to start playback, playback of the encrypted content data is executed.
- HD drive 120 power removable HD10
- the encryption key content data is sequentially read and output to the decryption processing unit.
- the decryption key processing unit 140 sequentially decrypts the input encrypted key content data based on the license key information acquired by the key information acquisition unit 130.
- the output processing unit 160 sequentially converts the decrypted content data into a predetermined video signal and sound signal, and outputs them to an external device.
- FIG. 5 and 6 are flowcharts showing the operation of the license key information providing process in the HD drive 120 and the decryption key control unit 150 of the present embodiment.
- the encryption key transmission process in the removable HD 10 that transmits the license key information and the encryption key reception process in the key information acquisition unit 130 that receives the license key information are performed for each process. Will be described with reference to individual flowcharts.
- the HD drive 120 and the decryption key control unit 150 start control of the cipher key transmission process and the cipher key reception process based on an instruction from the playback control unit 180. Each process will be described with reference to the encrypted transmission process.
- Step S112 when an instruction to execute the license key information provision processing from the playback control unit 180 is input to the HD drive 120 and the decryption key control unit 150, the HD drive 120 and the decryption key control unit 150 are decrypted.
- the control unit 150 operates in conjunction with each other to execute authentication of the removable HD 10 and the key information acquisition unit 130 (steps S111 and S211), and determines whether or not the authentication between the removable HD 10 and the key information acquisition unit 130 is properly executed. Judgment (Step S112, Step S212
- the HD drive 120 and the decryption key control unit 150 determine that the authentication of the removable HD 10 and the key information acquisition unit 130 is not properly executed, the HD drive 120 and the decryption key control unit 150 150 ends the operation.
- the HD drive 120 and the decryption key control unit 150 determine that the authentication of the removable HD 10 and the key information acquisition unit 130 has been properly performed, the HD drive 120 and the decryption control unit 150 The removable HD 10 or the key information acquisition unit 130 holds the shared key information (steps S 113 and S 213). At this time, the decryption key control unit 150 stores the shared key information in the nonvolatile memory M inside the key information acquisition unit 130 and waits for reception of the encryption key information transmitted from the removable HD 10. (Step S 214).
- the HD drive 120 causes the removable HD 10 to generate a random number as random number information in the removable HD 10 by a predetermined process (step S114), and a license key based on the generated random number information.
- the information is encrypted, and the encryption key information is generated in the removable HD 10 as encryption key information (step S115).
- the HD drive 120 reads the encrypted information, which is the generated encryption key information, from the removable HD 10 and transmits it to the key information acquisition unit 130, and the reception transmitted from the key information acquisition unit 130 Waiting for receipt of confirmation information (step S116).
- the decryption key control unit 150 sends the key information acquisition unit 130 to the key information acquisition unit 130.
- the validity of the received encryption key information is determined (step S216). If it is determined that the encryption key information is not valid, the decryption key control unit 150 ends this operation.
- the playback control unit 180 receives the notification of the termination (hereinafter referred to as termination notification), and the HD drive 120 of the HD drive 120 is based on the termination notification.
- termination notification the notification of the termination
- the encryption key transmission process is also forcibly terminated.
- the decryption key control unit 150 sends the encryption key to the key information acquisition unit 130.
- Reception confirmation information indicating that the information has been received, that is, information on the erasure instruction (hereinafter referred to as erasure instruction information) is transmitted to the HD drive 120 (step S217).
- the HD drive 120 determines whether or not the received reception confirmation information is valid. That is, the key information acquisition unit 130 determines whether or not the encryption key information has been received effectively (step S118). If the reception confirmation information is not valid, this operation is terminated.
- the playback control unit 180 receives the end notification, and based on the end notification, the decryption control unit 150 performs the encryption key reception process. Is also forcibly terminated.
- the HD drive 120 determines that the encryption key information has been properly acquired by the key information acquisition unit 130, the HD drive 120 controls the removable HD 10 to control the removable HD 10.
- the encryption key information stored in is deleted (step S119).
- the HD drive 120 causes the removable HD10 to encrypt the random number information generated in step S114 based on the common key information stored in the removable HD10!
- the encryption random number information is generated as encryption key information in the removable HD 10 (step S120).
- the HD drive 120 reads the encrypted information, which is the generated encrypted random number information, from the removable HD 10 and transmits it to the key information acquisition unit 130, and the reception transmitted from the key information acquisition unit 130 Waiting for receipt of confirmation information (step S121).
- step S219 the decryption key control unit 150 terminates this operation.
- the playback control unit 180 receives the termination notification and, based on the termination notification, of the HD drive 120, similarly to the processing in step S215 described above.
- the cipher key transmission process is also forcibly terminated.
- the decryption key control unit 150 sends the encrypted random number information to the key information acquisition unit 130.
- Reception confirmation information indicating that the information has been received is transmitted to the HD drive 120 (step S220).
- the HD drive 120 determines whether or not the received reception confirmation information is valid. That is, the key information acquisition unit 130 determines whether or not the encryption key information has been received effectively (step S123). If the reception confirmation information is not valid, the operation is terminated.
- the playback control unit 180 receives the end notification, and based on the end notification, the decryption key control unit 150 performs the encryption key reception process. Is also forcibly terminated.
- the HD drive 120 determines that the encrypted random number information has been properly acquired by the key information acquisition unit 130, the HD drive 120 controls the removable HD 10 and stores it in the removable HD 10.
- the encrypted encryption random number information is deleted (step S124), and this operation is terminated.
- the decryption key control unit 150 causes the key information acquisition unit 130 to decrypt the received encrypted random number information and the encrypted key information (step S221), and also decrypts the decrypted license information. The validity of the sense key information is determined (step S222), and when it is determined that the decrypted license key information is not valid, the decryption key control unit 150 ends this operation.
- the playback control unit 180 receives the end notification, and forcibly ends the encryption key transmission processing of the HD drive 120 based on the end notification.
- the decryption key control unit 150 performs playback control indicating that the license key information provision processing has been properly completed. Section 180 is notified (step S223), and this operation is terminated.
- the information recording / reproducing apparatus 100 performs the key information acquisition unit 130 different from the removable HD10 from the removable HD10 that stores the key information for decrypting the encrypted content data.
- a generation process for generating a plurality of pieces of encryption key information used when encrypting the license key information, and the generated encryption information are The transmission process that sequentially transmits from the removable HD 10 to the key information acquisition unit 130 at a timing different from the encryption information of the original, and the reception that sequentially receives each encryption key information transmitted by the key information acquisition unit 130 And a generation process for generating license key information using all the encrypted information after all the encrypted information is received by the key information acquisition unit 130.
- the transmission process After the HD10 has transmitted the encryption key information, it is still transmitted to the information acquisition unit, and before the other encryption key information is transmitted, the transmitted encryption key information is deleted. It has a configuration to
- the information recording / reproducing apparatus 100 of the present embodiment allows each of the generated encrypted information to be Information is sent in sequence from the removable HD 10 to the key information acquisition unit 130 at different timings from other encryption key information, and each encryption key information transmitted by the key information acquisition unit 130 is received in sequence. After all the encryption key information is received by the key information acquisition unit 130, the license key information is generated using all the encryption key information. Then, the information recording / reproducing apparatus 100 of the present embodiment is not yet transmitted to the key information obtaining unit 130 after the encryption key information of the removable HD 10 has been transmitted. Delete the transmitted encrypted information before it is transmitted.
- the license key information providing process of the present embodiment even if the encrypted content data is transferred between members, the encrypted content data and the encrypted content data are transmitted by each member. Since there is always only one member for which the encrypted key content data and the license key information exist at the same time, the license key information is always from one license key information. Only one cipher key content data can be played back.
- FIG. 7 is a diagram (I) for explaining the process of encrypting and transferring the license key information based on the shared key information.
- FIG. 8 is a diagram (II) for explaining the process of encrypting and transferring the license key information based on the shared key information.
- the ARIB Association of Radio Industries and Business
- content data move transfer recording
- the content data transfer side the move source
- the content data in the move process are transferred during the move process. It is stipulated that content data having a predetermined time, that is, a time length exceeding 1 minute, must not be able to be played back simultaneously on both devices (moving destinations). Therefore, a distribution method that does not satisfy this condition, such as the method of providing license key information shown in FIGS. 7 and 8, cannot build a super distribution system.
- the license key information providing process of this embodiment there is always one member in which the encrypted content data and the license key information exist at the same time.
- the license key information that can decrypt the encrypted content data does not exist at the same time on both members, and the standard is satisfied.
- the license key information providing process of the present embodiment only one piece of encrypted content data can always be reproduced from one license key information, and the license key information is being transferred.
- the system can satisfy the requirements even in a system that provides strong copyright protection, such as the above-mentioned super-distribution system, so that license key information can be exchanged accurately and content data can be exchanged. Can be securely and accurately protected.
- the information recording / reproducing apparatus 100 simply performs encryption key information and encryption key random number information between the removable HD 10 and the key information acquisition unit 130 in the license key information provision process.
- each information is transmitted from the sender regarding the transmission / reception of each encryption key information and the transmission / reception confirmation information.
- the removable HD10 or key information acquisition unit 130 performs the digital signature in the removable HD10 or key information acquisition unit 130.
- the signature of the removable HD10 or key information acquisition unit 130 that transmitted the information using the attached signature information is verified.
- the removable HD 10 or the key information acquisition unit 130 that has received the information is generated and attached as signature information.
- the information recording / reproducing apparatus 100 of the present embodiment is configured such that the license key information is provided by a removable DVD 10 or other portable recording medium such as a DVD. Moho.
- the information recording / reproducing apparatus 100 has a license key information provided by the removable HD 10 such as a personal computer or a hard disk recorder via a communication line such as the Internet. It may be provided by another information reproducing apparatus or information recording / reproducing apparatus 100.
- the information recording device that provides the license key information erases the encryption key information and the encrypted random number information via the communication line while sequentially transmitting to the device that provides the license key information. To do.
- the license key information is uniquely assigned to the license key information. It is characterized in that it is distributed over a plurality of key information to be determined and license key information is provided using the distributed key information (hereinafter referred to as distributed key information).
- distributed key information distributed key information
- Other configurations are the same as those in the first embodiment.
- the same members are denoted by the same reference numerals and description thereof is omitted, and the reproduction start process that is a premise of the license key information provision process in the present embodiment is Since the operation is the same as that of the first embodiment, the description thereof is omitted.
- the split key information is generated in the license key information transfer process.
- An information division method called a secret sharing method is used as a method for this.
- FIGS. 10 and 11 are diagrams for explaining the secret sharing process used in the license key information transfer process of the present embodiment.
- the secret sharing process is a process of encoding the license key information into a plurality of pieces of shared information! ⁇
- This secret sharing process is a process for each piece of distributed information to obtain the entire information, that is, the license. It becomes impossible to know key information, and it is possible to maintain high security from leakage of license key information! / Speak.
- secret sharing processing is performed on the license key information using this principle, and when the license key information is restored, the respective shared information is acquired, Based on the distributed information, secret sharing processing (integration) is performed, and information necessary for restoring the license key information is provided to other members.
- each piece of encoded shared information is based on common key information. Furthermore, encryption is performed, and leakage of license key information is highly prevented.
- FIG. 12 is a diagram for explaining the processing for providing the license key information in the present embodiment.
- FIG. 13 shows the existence and reproduction of the license key information in the removable HD 10 and the key information acquisition unit 130 of the present embodiment. It is a table
- the HD drive 120 performs decryption under the control of the playback control unit 180 when the HD license key information is output from the removable HD 10 to the key information acquisition unit 130.
- the license key information stored in the removable HD10 is generated by a predetermined process to generate a plurality of information, that is, distributed information, and encryption is performed on each distributed information.
- the key information acquisition unit 130 generates a plurality of pieces of encryption information necessary for decrypting the license key information, and outputs the generated pieces of encryption information to the key information acquisition unit 130 step by step.
- the HD drive 120 of the present embodiment controls the removable HD10 when transmitting the license key information from the removable HD10 to the key information acquisition unit 130.
- the license key information is encrypted and output from the removable HD 10 to the key information acquisition unit 130.
- the state in the force lever described above or described later indicates each state in FIG. Specifically, as shown in FIG. 12, the HD drive 120 operates in conjunction with the key information acquisition unit 130 via the decryption key control unit 150 under the control of the playback control unit 180, and While authenticating with the key information acquisition unit 130, the removable HD 10 holds the common key information common to the key information acquisition unit 130 (state 1).
- the HD drive 120 When the HD drive 120 authenticates the removable HD 10 and the key information acquisition unit 130, the HD drive 120 performs a secret distribution process (distribution) on the license key information in the removable HD 10.
- the first key information and the second key information are generated in addition to the license key information (state 2), and the generated first key information based on the common key information is obtained by a predetermined encryption process. It is supposed to be encrypted (state 3).
- the HD drive 120 controls to transmit the first key information, which is the first key information encrypted from the removable HD 10, to the key information acquisition unit 130 as the first encryption information. Yes (state 4)
- the HD drive 120 receives reception confirmation information indicating that the key information acquisition unit 130 received the encryption key first key information.
- the removable HD 10 stores the encrypted first key information stored in the removable HD 10 (state 5).
- the HD drive 120 then causes the removable HD 10 to encrypt the second key information stored in the removable HD 10 based on the common key information (state 6).
- the second key information which is the encrypted second key information, is transmitted to the key information acquisition unit 130 (state 7).
- the HD drive 120 receives reception confirmation information indicating that the key information acquisition unit 130 received the encryption key second key information.
- the second HD key information stored in the removable HD 10 is erased! /, And is deleted (state 8 and state 9).
- the key information acquisition unit 130 of the present embodiment receives the HD drive 120 when acquiring license key information from the removable HD 10 under the control of the decryption control unit 150, as in the first embodiment.
- the key information acquisition unit 130 receives all the encrypted information, and the multiple encryption key information output from the HD drive 120 is sequentially input. After that, the license key information is generated using all the encryption key information. Then, the key information acquisition unit 130 outputs the generated license key information to the decryption processing unit 140 via the decryption control unit 150.
- the key information acquisition unit 130 has a nonvolatile memory M therein, and transmits the encryption information and other information necessary for providing the license key information transmitted from the removable HD 10 to the nonvolatile memory M. To come to remember.
- the key information acquisition unit 130 of the present embodiment When receiving the license key information from the removable HD 10, the key information acquisition unit 130 of the present embodiment
- the encryption key 1 and key information 2 transmitted from the removable HD 10 are received and the license key information is restored.
- the states in the force lever described above or below indicate each state in FIG.
- the key information acquisition unit 130 operates in conjunction with the HD drive 120 via the playback control unit 180 under the control of the decryption key control unit 150, and
- the common key information common to the removable HD10 is stored in the internal non-volatile memory M (state 1 to state 3). That is, the key information acquisition unit 130 holds the same key information as the key information stored in the removable HD 10 in the nonvolatile memory M as the common key information.
- the key information acquisition unit 130 authenticates with the removable HD 10 and receives the first key information transmitted from the encryption key, the key information acquisition unit 130 stores the first key information in the cipher key in a non-volatile manner.
- the reception confirmation information stored in the property memory M and indicating that the first key information of the encryption key has been received is transmitted to the removable HD 10 (state 4 to state 6).
- the reception confirmation information transmitted to the removable HD 10 is an instruction to delete the first key information of the encryption key stored in the removable HD 10. Also, key information When the acquisition unit 130 receives the encryption key first key information and does not correctly receive the encryption first key information, the acquisition unit 130 does not transmit the reception confirmation information, and sends a retransmission instruction or a predetermined error. Start processing! /
- the key information acquisition unit 130 receives the encryption key 2 key information.
- Reception confirmation information stored in the non-volatile memory M and indicating that the encryption key second key information has been received is transmitted to the removable HD 10 (state 7, state 8).
- the encrypted second key stored in the removable HD 10 using the reception confirmation information transmitted to the removable HD 10 is the same as when receiving the first key information of the encryption key. This is an instruction to delete information. Also, when the key information acquisition unit 130 receives the encrypted second key information and does not correctly receive the encrypted second key information, the key information acquisition unit 130 does not transmit the reception confirmation information and retransmits it. Get instructions / predetermined error handling!
- the key information acquisition unit 130 decrypts the encrypted first key information and the encrypted second key information based on the common key information. At the same time (state 9), a secret sharing process is performed based on the decrypted first key information and second key information to restore the license key information (state 9). Then, the key information acquisition unit 130 outputs the restored license key information to the decryption key processing unit 140 as described above.
- the removable HD 10 and the HD drive 120 and the key information acquisition unit 130 perform encryption key information transmission processing and encryption key information reception processing in this way. That is, as shown in the table of FIG. 13, in the removable HD 10 and the key information acquisition unit 130, in the state 1 to the state 10, the first key information (or encrypted first key information) and the second key information (or Since the encryption key (second key information) and the common key information are not held at the same time, the license key information is always present in only one device. Therefore, in this embodiment, the removable HD 10 and the key information acquisition unit 130 do not have license key information (the license key information in an encrypted state) individually. With information, multiple content data cannot be decrypted at the same time.
- FIG. 14 and 15 are flowcharts showing the operation of the license key information providing process in the HD drive 120 and the decryption key control unit 150 of the present embodiment.
- the HD drive 120 and the decryption key control unit 150 start control of the cipher key transmission process and the cipher key reception process based on an instruction from the playback control unit 180. Each process will be described with reference to the encrypted transmission process.
- the HD drive 120 and the decryption key control unit 150 are decrypted.
- the control unit 150 operates in conjunction with each other to execute authentication of the removable HD 10 and the key information acquisition unit 130 (steps S311 and S411), and determines whether or not the authentication between the removable HD 10 and the key information acquisition unit 130 has been properly executed. Judgment (Step S312, Step S412
- the HD drive 120 and the decryption key control unit 150 determine that the authentication of the removable HD 10 and the key information acquisition unit 130 is not properly executed, the HD drive 120 and the decryption key control unit 150 150 ends the operation.
- the HD drive 120 and the decryption key control unit 150 determine that the authentication of the removable HD 10 and the key information acquisition unit 130 has been properly performed, the HD drive 120 and the decryption control unit 150 The removable HD 10 or the key information acquisition unit 130 holds the shared key information (Step S313, Step S413).
- the decryption key control unit 150 stores the shared key information in the internal nonvolatile memory M, and waits for reception of the encryption key information transmitted from the removable HD 10 (step S414).
- the HD drive 120 causes the removable HD10 to execute secret sharing processing and
- the license key information power also generates the first key information and the second key information (step S314), encrypts the first key information based on the common key information, and uses the first key information as the encrypted information to remove the relevant key.
- Generate in HD10 step S315).
- the removable HD 10 generates the first key information and the second key information, and then deletes the license key information that is the basis of the secret sharing process.
- the HD drive 120 reads out the encrypted information that is the generated first encryption key information from the removable HD 10 and transmits it to the key information acquisition unit 130, which is transmitted from the key information acquisition unit 130. Waiting for reception confirmation information to be received (step S316).
- the decryption key control unit 150 receives the key information acquisition unit.
- the validity of the encryption key first key information received in 130 is determined (step S416). If it is determined that the encryption key is not valid, the decryption key control unit 150 ends this operation.
- the playback control unit 180 receives the notification of the termination (hereinafter referred to as the termination notification), and based on the termination notification, the playback of the HD drive 120 The encryption key transmission process is also forcibly terminated.
- the decryption key control unit 150 stores the encrypted first key information in the key information acquisition unit 130.
- the reception confirmation information indicating that the activation key information has been received, that is, the erasure instruction information is transmitted to the HD drive 120 (step S417).
- the HD drive 120 determines whether or not the received reception confirmation information is valid. That is, the key information acquisition unit 130 determines whether or not the encryption key information has been received effectively (step S318). If the reception confirmation information is not valid, the operation is terminated.
- the playback control unit 180 receives the end notification, and the encryption key reception process of the decryption key control unit 150 is also forcibly performed based on the end notification. Terminate.
- the HD drive 120 properly obtains the encrypted first key information by the key information obtaining unit 130. If it is determined, the HD drive 120 controls the removable HD10 to delete the encryption key 1 key information stored in the removable HD10 (step S319).
- the HD drive 120 encrypts the second key information generated in step S114 based on the common key information stored in the removable HD10! Then, the second information of the encryption key is generated as the encryption key information in the removable HD 10 (step S320).
- the HD drive 120 reads out the encrypted information, which is the generated encrypted second key information, from the removable HD 10 and transmits it to the key information acquisition unit 130, which is transmitted from the key information acquisition unit 130. Waiting for reception confirmation information to be received (step S321).
- the decryption key control unit 150 receives the key information acquisition unit.
- the validity of the encryption key second key information received in 130 is determined (step S419), and when it is determined that the encryption key is not valid, the decryption key control unit 150 ends this operation.
- the playback control unit 180 receives the termination notification and, based on the termination notification, the playback control unit 180, similarly to the processing in step S415 described above.
- the encryption key transmission process is also forcibly terminated.
- the decryption key control unit 150 transmits the encryption to the key information acquisition unit 130.
- Reception confirmation information indicating that the second key information has been received is transmitted to the HD drive 120 (step S420).
- the HD drive 120 determines whether or not the received reception confirmation information is valid. That is, it is determined whether or not the key information acquisition unit 130 has received the encrypted second key information effectively (step S323). If the reception confirmation information is not valid, this operation is terminated.
- the playback control unit 180 receives the end notification, and the decryption key control unit 150 performs the encryption key reception process based on the end notification. Is also forcibly terminated.
- the HD drive 120 determines that the encryption key second key information has been properly acquired by the key information acquisition unit 130, the HD drive 120 controls the removable HD 10 to control the removable HD 10
- the encrypted second key information stored in is deleted (step S324), and this operation is terminated.
- the decryption key control unit 150 causes the key information acquisition unit 130 to decrypt the received encrypted first key information and encrypted key second key information based on the common key information (Step S1). S42 21), performing the integration process in the secret sharing process using the decrypted first key information and second key information to restore the license key information (step S422).
- the decryption key control unit 150 causes the key information acquisition unit 130 to determine the validity of the restored license key information (step S423), and if the decrypted license key information is not valid. If it is determined, the decryption key control unit 150 ends this operation.
- the playback control unit 180 receives the end notification, and forcibly ends the encryption key transmission processing of the HD drive 120 based on the end notification.
- the decryption key control unit 150 performs playback control indicating that the license key information provision processing has been properly completed. Section 180 is notified (step S424), and this operation is terminated.
- the information recording / reproducing apparatus 100 has a key information acquisition unit different from the removable HD10 from the removable HD10 that stores the key information for decrypting the encrypted content data.
- a generation process for generating a plurality of pieces of encryption key information used for encrypting the license key information, and each of the generated encryption information Step-by-step transmission processing from the removable HD 10 to the key information acquisition unit 130 at a different timing from other encryption information, and each encryption key information transmitted from the key information acquisition unit 130 is received sequentially.
- the information recording / reproducing apparatus 100 transfers the generated encrypted information from the removable HD 10 to the key information acquisition unit 130 step by step at different timing from the other encryption key information.
- the encryption information is sequentially transmitted, and each encryption key information transmitted by the key information acquisition unit 130 is sequentially received. After all the encryption key information is received by the key information acquisition unit 130, all the encryption key information is received.
- the license key information is generated using the key information. Then, the information recording / reproducing apparatus 100 of this embodiment is not yet transmitted to the key information acquisition unit 130 after the encryption key information of the removable HD 10 has been transmitted. Before the message is transmitted, the transmitted encrypted information is deleted.
- the encrypted content data is transmitted by each member.
- the license key information for decrypting the encrypted content data does not exist at the same time, that is, there is always one member for which the encrypted content data and the license key information exist at the same time. Therefore, only one piece of encrypted content data can always be reproduced from the license key information.
- the ability to exchange license key information by the method of providing license key information shown in FIG. 7 and FIG. 8 is also possible with the method of providing these license key information.
- the license key information is erased, it is possible to decrypt the content data encrypted in each of the plurality of components, or some trouble during the license key information transfer process. If the transfer process is stopped by the above, the license key information cannot be decrypted in the transfer status (the state of each member of the license key information).
- the license key information providing process of the present embodiment there is always one member in which the encrypted content data and the license key information exist at the same time.
- the license key information that can decrypt the encrypted content data does not exist at the same time on both members, and the standard is satisfied.
- the license key information providing process of the present embodiment only one piece of encrypted content data can always be reproduced from one license key information and the license key information is being transferred.
- the system can satisfy the requirements even in a system that provides strong copyright protection, such as the above-mentioned super-distribution system, so that license key information can be exchanged accurately and content data can be exchanged. Can be securely and accurately protected.
- the information recording / reproducing apparatus 100 of this embodiment simply uses the encryption key 1st key information and encryption key between the removable HD 10 and the key information acquisition unit 130 for the license key information provision process. ⁇
- the power to send / receive the second key information In order to increase the security in the transfer of each encryption key information, each information is sent and received regarding the transmission / reception of each encrypted information and the transmission / reception of the reception confirmation information. You may use a digital signature method that is sent from the person and shows that no tampering has been done on the way.
- the removable HD10 or key information acquisition unit 130 signs the digital signature in the removable HD10 or key information acquisition unit 130 at the time of transmission of each encrypted information and reception confirmation information. It is generated and attached as information, and after receiving each information, the signature of the removable HD10 or key information acquisition unit 130 that transmitted the information using the attached signature information is verified. Then, when the digital signature is approved, the removable HD 10 or the key information acquisition unit 130 that has received the information is generated and attached as signature information.
- the information recording / reproducing apparatus 100 of the present embodiment is configured such that the license key information is provided by a removable DVD 10 or other portable recording medium such as a DVD. Moho.
- the information recording / reproducing apparatus 100 is provided with the license key information in the removable HD 10 via a communication line such as the Internet, such as a personal computer or a hard disk recorder. It may be provided by another information reproducing apparatus or information recording / reproducing apparatus 100.
- the information recording device that provides the license key information erases the encryption key information and the encrypted random number information via the communication line while sequentially transmitting to the device that provides the license key information. To do.
- license key information transfer process of this embodiment two key information is generated from the license key information, encrypted, and transferred. Of course, three or more license key information are transferred from the license key information. You can generate key information, encrypt it, and transfer it!
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006543256A JPWO2006049083A1 (ja) | 2004-11-02 | 2005-10-27 | 鍵情報提供方法、情報再生装置、および、鍵情報提供装置 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-319209 | 2004-11-02 | ||
JP2004319209 | 2004-11-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006049083A1 true WO2006049083A1 (ja) | 2006-05-11 |
Family
ID=36319095
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/019809 WO2006049083A1 (ja) | 2004-11-02 | 2005-10-27 | 鍵情報提供方法、情報再生装置、および、鍵情報提供装置 |
Country Status (2)
Country | Link |
---|---|
JP (1) | JPWO2006049083A1 (ja) |
WO (1) | WO2006049083A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006311073A (ja) * | 2005-04-27 | 2006-11-09 | Fujitsu Ltd | コンテンツ管理システム、コンテンツ管理装置及びコンテンツ管理方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000138673A (ja) * | 1998-11-04 | 2000-05-16 | Sony Corp | 情報処理装置および方法、提供媒体、並びに情報記憶媒体 |
JP2003323342A (ja) * | 2002-04-30 | 2003-11-14 | Matsushita Electric Ind Co Ltd | ディジタルコンテンツの配信システム、ディジタル動画配信システム、コンテンツ保存システム、暗号化装置、及びプログラム |
JP2004140808A (ja) * | 2002-09-25 | 2004-05-13 | Denon Ltd | コンテンツデータ送受信システム、コンテンツデータ送信装置、コンテンツデータ受信装置及びコンテンツデータ送受信方法 |
-
2005
- 2005-10-27 WO PCT/JP2005/019809 patent/WO2006049083A1/ja active Application Filing
- 2005-10-27 JP JP2006543256A patent/JPWO2006049083A1/ja active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000138673A (ja) * | 1998-11-04 | 2000-05-16 | Sony Corp | 情報処理装置および方法、提供媒体、並びに情報記憶媒体 |
JP2003323342A (ja) * | 2002-04-30 | 2003-11-14 | Matsushita Electric Ind Co Ltd | ディジタルコンテンツの配信システム、ディジタル動画配信システム、コンテンツ保存システム、暗号化装置、及びプログラム |
JP2004140808A (ja) * | 2002-09-25 | 2004-05-13 | Denon Ltd | コンテンツデータ送受信システム、コンテンツデータ送信装置、コンテンツデータ受信装置及びコンテンツデータ送受信方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006311073A (ja) * | 2005-04-27 | 2006-11-09 | Fujitsu Ltd | コンテンツ管理システム、コンテンツ管理装置及びコンテンツ管理方法 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2006049083A1 (ja) | 2008-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070219911A1 (en) | Apparatus and method for utilizing data block of right to decrypt content | |
JP2000341263A (ja) | 情報処理装置及び方法 | |
JP4585460B2 (ja) | 同一コンテンツから派生した形式の異なるコンテンツを複数個所で同時に利用することを防ぐ記憶装置、システム及び方法 | |
JP2003195759A (ja) | 暗号化データの生成方法、記録装置、記録媒体、復号方法、記録媒体再生装置、伝送装置、および、受信装置 | |
JP2002319227A (ja) | ディジタル情報記録装置および再生装置 | |
JP3682840B2 (ja) | コンテンツ情報記録方法及びコンテンツ情報記録装置 | |
JP4164265B2 (ja) | 著作権保護システム、デジタル情報処理装置および著作権保護方法 | |
JP2002305512A (ja) | データ受信装置 | |
JPH09326166A (ja) | 著作権保護方法及び著作権保護システム | |
JP2009016002A (ja) | ダビング装置 | |
JP4340694B2 (ja) | ディジタル情報送信装置、ディジタル情報送信方法、ディジタル情報受信装置およびディジタル情報受信方法 | |
JP2008301261A (ja) | 受信装置及び受信方法 | |
WO2006049083A1 (ja) | 鍵情報提供方法、情報再生装置、および、鍵情報提供装置 | |
JP2003224557A (ja) | 受信記録再生装置および受信記録再生方法 | |
JP2010220093A (ja) | 放送受信装置、放送設備、放送システム、及び放送受信方法 | |
JP2008160520A (ja) | データ送信装置、データ受信装置、およびデータ送信方法 | |
JP5110942B2 (ja) | 情報保護システム | |
JP6794504B2 (ja) | デジタルコンテンツ送受信システム及びデジタルコンテンツ送受信方法 | |
JP2008300967A (ja) | 放送番組データ受信装置、コンピュータシステムおよび情報処理装置 | |
WO2006033218A1 (ja) | データ配信装置、データ提供装置、データ配信方法、データ提供方法、データ配信プログラム、データ提供プログラム、および、それらのプログラムが記録された情報記録媒体 | |
JP2000341264A (ja) | 情報処理装置及び方法 | |
JP2002222119A (ja) | 情報処理装置 | |
JP5178037B2 (ja) | ディジタル情報記録装置およびディジタル情報記録方法ディジタル情報送信装置およびディジタル情報送信方法、ディジタル情報処理装置およびディジタル情報処理方法 | |
JP5754980B2 (ja) | コンテンツ保護装置及びコンテンツ保護方法 | |
JP4500847B2 (ja) | デジタル信号記録方法、デジタル信号再生方法、デジタル信号記録再生方法およびデジタル信号記録再生装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006543256 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 05805335 Country of ref document: EP Kind code of ref document: A1 |