WO2007000805A1 - Digital video content copyright management method - Google Patents
Digital video content copyright management method Download PDFInfo
- Publication number
- WO2007000805A1 WO2007000805A1 PCT/JP2005/011782 JP2005011782W WO2007000805A1 WO 2007000805 A1 WO2007000805 A1 WO 2007000805A1 JP 2005011782 W JP2005011782 W JP 2005011782W WO 2007000805 A1 WO2007000805 A1 WO 2007000805A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- user terminal
- playback
- media
- video
- Prior art date
Links
- 238000007726 management method Methods 0.000 title claims abstract description 24
- 238000000034 method Methods 0.000 claims abstract description 37
- 238000012545 processing Methods 0.000 claims description 20
- 238000004891 communication Methods 0.000 claims description 4
- 238000012217 deletion Methods 0.000 description 4
- 230000037430 deletion Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 230000006866 deterioration Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011900 installation process Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00137—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Definitions
- the present invention relates to a copyright management method for digital video content encoded with a video work.
- An object of the present invention is to propose a novel copyright protection method for digital video content.
- a novel copyright management method for digital video content includes a media server that distributes digital video content recorded as digital data through an information communication network, and a viewer of the video product. It is implemented in a configuration that communicates with the user terminal used,
- an encrypted media file obtained by encrypting a media file corresponding to the digital video content of one video work with a common key A, and a playback permission file that includes viewing restrictions information about the common key A and the video work
- a media storage step for storing for each video work
- the authentication information of the viewer is stored in the user terminal, and the user information registration step of registering the individual identification information of the user terminal and the authentication information in association with each other in the media server; ,
- a video work requesting step for requesting the video work from the media server
- a media file returning step for returning the corresponding encrypted media file to the user terminal that has requested the video work
- a playback permission file corresponding to the encrypted media file is displayed.
- the common key B is generated using the individual identification information corresponding to the authentication information.
- An encrypted license file sending step for sending the encrypted license file obtained by encrypting the requested playback license file with the common key B to the user terminal;
- the common key B is generated based on the individual identification information and the stored authentication information, and the encryption license file returned with the media server power is also sent to the user terminal.
- the media server power is also returned with the common key A in the playback permission file.
- the decrypted media The file is stored, the playback permission file is updated in the viewing restriction information in the playback permission file, the playback permission file is updated, and the updated playback permission file is generated in the encryption key permission file with the common key B. It is also possible to adopt a copyright management method for digital video content including a license file update step to be stored.
- the user terminal decrypts the encrypted license file stored in the user terminal into a reproduction license file, and the video
- the work playback step if the user terminal confirms the playback permission of the video work based on the viewing restriction information described in the playback permission file obtained by decrypting the encryption permission file, It is also possible to process the media file that is stored and play back the video work for viewing!
- the video work playback step is specified by a media file scrambling method as viewing restriction information in the playback permission file and decrypted.
- playback of video works is not permitted based on the viewing restriction information contained in the playback permission file, it includes processing to encrypt the media file stored on the user terminal based on the specified scramble method. May be.
- the video work playback step is instructed to delete the media file as viewing restriction information in the playback permission file, and the decrypted playback permission file If playback of the video work is not permitted based on the included viewing restriction information, the media file stored in the user terminal can be deleted.
- FIG. 1 is a network configuration diagram in which a copyright management method according to an embodiment of the present invention is implemented.
- FIG. 2 is a schematic structural diagram of viewing restriction information described in a reproduction permission file created by the above-mentioned author transfer management method.
- FIG. 4 Flow chart of processing for viewing video works based on the above copyright management method.
- FIG. 5 is a flowchart of a playback prohibition process included in the above-mentioned video work viewing process flow. Explanation of symbols
- FIG. 1 shows a schematic configuration in an embodiment of the present invention. It is connected to a computer (user terminal) 1 used by viewers of video works, a server (media server) 2 that distributes digital video content to the user terminal, and Power Internet 3.
- the user terminal 1 can employ a personal computer equipped with a browser.
- the user terminal 1 is assumed to be installed with a program (viewing program) for processing the digital video content and reproducing the video work so that it can be viewed!
- digital video content is provided as a media file filed for each video work.
- the media server 2 stores and manages a file (encrypted media file) encrypted with the common key A in its own storage resource for a number of video works based on the common key encryption method. ing. For each video work, store / manage / manage and manage the common key A used to generate the corresponding encrypted media file and the playback permission file containing the viewing restriction information of the video work.
- FIG. 2 shows an outline of the viewing restriction information described in the reproduction permission file in this embodiment.
- the contents of each item of the number of reproducible times, the reproducible upper limit date, the reproducible days, the scramble method and the automatic deletion are described.
- the number of playable times is the maximum number of media files that can be played back to view a video work, and is specified by a numerical value. This item stipulates that playback processing exceeding the specified value is prohibited. If there is no upper limit to the number of playbacks, the content column for this item is blank. Playback is forbidden! / Turn to 0 (zero).
- the reproducible upper limit date is the last date on which the reproduction process can be performed, and the reproduction process is prohibited from being performed past the stated date.
- the content field for this item will be blank.
- the reproducible number of days is the number of days from the first playback until the power playback is prohibited, and playback beyond that number is prohibited. If the number of days is not set, the content field will be blank as with other items.
- the date of the first playback (first playback date) is described in the content field of this playable days item. Note that the playback permission file stored on the media server does not include the date of the first playback.
- the contents column of the scramble method a method for scrambling and encrypting the media file is described.
- this scramble method item when the scramble method is specified in the content column, playback is prohibited due to any of the above items in the viewing restriction information when the media file is played back on the user terminal. In this case, it is stipulated that the media file be encrypted using the specified scramble method.
- a flag for determining whether or not the media file can be deleted is described in the content column. It is stipulated that media files should be deleted when playback is prohibited by any of the above items at the time of playback processing of the media file and the determination flag corresponds to “delete”.
- Fig. 3 shows the flow of processing for pre-processing before viewing a video work in the copyright management method of this embodiment.
- the creator of the video work creates the video work in a media file of a predetermined format (si), encrypts the media file with the common key A based on the common key encryption method, and creates an encrypted media file. Generate (s2, s3). Also, a reproduction permission file is created in which viewing restriction information based on the copyright content of the video work is included. Then, the encrypted media file and the reproduction permission file are associated with each video work and stored in the storage resource of the media server 2 (s4, s5).
- a viewing program is installed in the user terminal.
- the viewing program may be supplied by a medium, etc. It may be prepared so that it can be downloaded to any server computer.
- the viewing program When the viewing program is installed on the user terminal 1 (s6), the viewing program prompts the user to register authentication information such as a user ID and password during the installation process, and the authentication information is input by the user. Then, this is stored in the user terminal, and appropriate individual identification information for identifying the user terminal such as the MAC address of the user terminal and the identification number of the OS node disk device is acquired (s7 , s8) 0 Then, the individual identification information and the viewer authentication information are sent to the media server as user information (s9).
- the media server stores the sent user information in an appropriate storage resource (slO).
- FIG. 4 shows the process flow.
- the viewer requests the media server 2 for the desired video work.
- Media Server 2 has a WWW server function and publishes a web page (work selection page) that allows the browser to select the video work stored and managed by itself! Shall.
- the user terminal 1 is assumed to have a browser installed.
- Media server 2 returns the work selection page to the browser of user terminal 2 that has been accessed by specifying the specified URL (sl l, sl2).
- the viewer finds the desired video work in the work selection page ordered by the user terminal 1, the viewer requests the video work by designating the desired work (sl3, sl4).
- the media server 2 Upon receiving the request for the video work, the media server 2 returns the corresponding encrypted media file to the user terminal 1 (sl5), and the user terminal 1 stores the encrypted media file (sl6).
- the viewer In order for the viewer to view the video work, start the viewing program on user terminal 1 and specify the video work to be viewed (sl7, sl8) 0
- the encrypted media file of the specified video work Is stored in user terminal 1 by sl6. Then, it is confirmed whether or not the playback permission file corresponding to the specified video work exists on the user terminal. If it does not exist, the user terminal is accessed to the media server, and the video work to be viewed is specified.
- Information and viewer authentication information are sent (sl9 ⁇ s20 ⁇ s21) [0021]
- the media server 2 confirms registration of the corresponding user information, and if the registration is confirmed, Based on the algorithm, the common key B is generated from the individual identification information in the user information, and the reproduction permission file corresponding to the video work to be viewed is encrypted with this key B to encrypt the encryption permission file. Is generated (s22 to s24). Then, the encryption permission file is sent to the user terminal 1 (s26).
- the user terminal 1 When the encrypted media file is returned by the viewing program, the user terminal 1 also generates a common key B for the individual identification information power of the user terminal 1 installed by itself.
- the decryption permission file is decrypted into a playback permission file (s27 to s29). Then, based on the viewing restriction information included in the playback permission file, it is determined whether or not the playback process of the video work to be viewed can be executed (s30).
- the user terminal uses the viewer program to decrypt the encrypted media file into a media file using the common key A in the playback permission file, process it, and play the video work to view it on the user terminal. (S30 ⁇ s31, s32).
- the media file is stored on the user terminal.
- the reproduction permission file is updated by reflecting information related to this reproduction processing opportunity in appropriate items in the viewing restriction information in the reproduction permission file of the video work (s34, s35). For example, if the reproducible number of times is initially set to “5”, it is set to “4”, or the reproduction processing date is described in the reproducible number of days column as the first reproduction date. Then, the updated reproduction permission file is encrypted again with the common key B to generate an encryption permission file and store it (s36, s37).
- the viewing restriction information of the playback permission file may have been updated to the content corresponding to playback prohibition after the first playback processing, such as the playback possible power S “0”. If the viewing program determines that playback of the video work subject to viewing is prohibited based on the viewing restriction information included in the playback permission file, the playback process of the video work is interrupted and playback processing prohibited processing is performed. (S30 ⁇ s40).
- FIG. 5 shows the flow of the regeneration prohibiting process 40.
- the user terminal 1 running the viewing program encrypts the media file with the specified scramble method (s41 ⁇ s42) if the scramble method is specified by the viewing restriction information in the playback permission file. ).
- the scramble method is specified by the viewing restriction information in the playback permission file.
- deletion is specified by the viewing restriction information, the media file itself is deleted (s41 ⁇ s43 ⁇ s44). In this case, it is possible to eliminate the possibility that the scramble information is decrypted and the scramble is illegally released.
- the viewing restriction information prohibits the playback process! And there is no scramble method designation or automatic deletion instruction, the playback process for the media file is stopped (s43 ⁇ s45).
- the entire encrypted media file has been downloaded to the user terminal.
- the media server 1 converts the encrypted media file into streaming data using a well-known streaming technology to the user terminal 1, and the user terminal 1 transmits the streaming data of the encrypted media file that has been transferred.
- the video work may be played back so as to be viewable by sequentially decoding while buffering.
- the encrypted media file or media file is not stored in the user terminal 2 after viewing the video work.
- the copyright management method of the present invention is not limited to the video work shown in the above embodiment, It can also be applied to still and music works.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
A digital video content copyright management method stores user information on a user, an encrypted medium file obtained by encrypting a medium file of a digital video content by a common key A, and reproduction permission file containing view limit information on a video work and the common key A in a media server. The media server transmits an encrypted medium file of the video work requested from a user terminal of a user and encryption-permitted in which a reproduction-permitted file is encrypted by a common key B generated from the user information corresponding to the user terminal, to the user terminal. The user terminal decrypts the encryption-permitted file by the common key B generated according to its user information into a reproduction-permitted file and acquires the common key A. The user terminal processes a medium file obtained by decrypting the encrypted medium file by using the key A and reproduces a video work in such a way that it can be viewed.
Description
明 細 書 Specification
デジタル映像コンテンツの著作権管理方法 Digital video content copyright management method
技術分野 Technical field
[0001] 本発明は、映像作品を符号ィ匕したデジタル映像コンテンツの著作権管理方法に関 する。 [0001] The present invention relates to a copyright management method for digital video content encoded with a video work.
背景技術 Background art
[0002] パーソナルコンピュータにおけるグラフィック処理能力も向上と、 ADSLゃ光フアイ バなどのブロードバンド化されたインターネット通信環境の整備とにより、高画質のデ ジタル映像コンテンツを情報通信ネットワークを介して利用者のコンピュータに配信し て視聴に供するサービスが普及しつつある。 [0002] By improving the graphics processing capability of personal computers and the development of broadband Internet communication environments such as ADSL and optical fibers, high-quality digital video content can be transmitted to users' computers via an information communication network. Services that are distributed to and used for viewing are becoming widespread.
発明の開示 Disclosure of the invention
発明が解決しょうとする課題 Problems to be solved by the invention
[0003] デジタル映像コンテンツは、コンピュータにより簡単に複製を作ることが可能であり、 また、複製を繰り返しても画質劣化がほとんど無いことから、映像コンテンツの配信業 者は、自身が取り扱うデジタル映像コンテンツに対して十分に著作権保護対策を講 じる必要がある。そして本発明は、新規なデジタル映像コンテンツの著作権保護方法 を提案することを目的として ヽる。 [0003] Digital video content can be easily duplicated by a computer, and even if duplication is repeated, there is almost no deterioration in image quality. Therefore, it is necessary to take sufficient copyright protection measures. An object of the present invention is to propose a novel copyright protection method for digital video content.
課題を解決するための手段 Means for solving the problem
[0004] 本発明における新規なデジタル映像コンテンツの著作権管理方法は、映像作品を デジタルデータにして収録したデジタル映像コンテンツを情報通信ネットワークを介 して配信するメディアサーバーと、映像作品の視聴者が使用する利用者端末とが通 信する構成において実施され、 [0004] A novel copyright management method for digital video content according to the present invention includes a media server that distributes digital video content recorded as digital data through an information communication network, and a viewer of the video product. It is implemented in a configuration that communicates with the user terminal used,
メディアサーバーにおいて、一つの映像作品のデジタル映像コンテンツに相当する メディアファイルを共通鍵 Aにより暗号ィ匕した暗号化メディアファイルと、共通鍵 Aと映 像作品に関する視聴制限情報が含まれた再生許諾ファイルとを映像作品毎に記憶 するメディア格納ステップと、 On the media server, an encrypted media file obtained by encrypting a media file corresponding to the digital video content of one video work with a common key A, and a playback permission file that includes viewing restrictions information about the common key A and the video work And a media storage step for storing for each video work,
利用者端末にぉ ヽて、メディアファイルを処理して映像作品を視聴可能にする視聴
プログラムをインストールする過程で、視聴者の認証情報を当該利用者端末に記憶 するとともに、利用者端末の個体識別情報と前記認証情報とを対応付けしてメディア サーバーに登録する利用者情報登録ステップと、 Viewing on a user terminal to process media files and view video works In the process of installing the program, the authentication information of the viewer is stored in the user terminal, and the user information registration step of registering the individual identification information of the user terminal and the authentication information in association with each other in the media server; ,
利用者端末において、前記映像作品を指定するユーザ入力があると、メディアサー バーに当該映像作品を要求する映像作品要求ステップと、 When there is a user input for designating the video work at the user terminal, a video work requesting step for requesting the video work from the media server;
メディアサーバーにおいて、映像作品を要求してきた利用者端末に該当の暗号ィ匕 メディアファイルを返送するメディアファイル返送ステップと、 In the media server, a media file returning step for returning the corresponding encrypted media file to the user terminal that has requested the video work;
視聴プログラムが起動して 、る利用者端末にぉ 、て、ユーザ入力により前記返送さ れてきた暗号化メディアファイルに対する再生指示があると、当該暗号化メディアファ ィルに対応する再生許諾ファイルが利用者端末に存在するか否かを調査し、存在し なければメディアサーバーに前記認証情報を送付して再生許諾ファイルの返送を要 求する再生許諾ファイル要求ステップと、 When the viewing program is activated and the user terminal gives a playback instruction for the encrypted media file returned by user input, a playback permission file corresponding to the encrypted media file is displayed. A reproduction permission file requesting step for investigating whether or not the user terminal exists, and if not, sending the authentication information to the media server and requesting the return of the reproduction permission file;
メディアサーバーにおいて、再生許諾ファイルを要求してきた利用者端末カゝら受け 付けた認証情報が登録済みであれば、当該認証情報に対応する個体識別情報を用 Vヽて共通鍵 Bを生成するとともに、要求された再生許諾ファイルを共通鍵 Bで暗号ィ匕 した暗号ィ匕許諾ファイルを利用者端末に送付する暗号ィ匕許諾ファイル送付ステップ と、 If the authentication information received from the user terminal requesting the playback permission file has already been registered in the media server, the common key B is generated using the individual identification information corresponding to the authentication information. An encrypted license file sending step for sending the encrypted license file obtained by encrypting the requested playback license file with the common key B to the user terminal; and
利用者端末にお!、て、自身の個体識別情報と前記記憶した認証情報とに基づ 、 て共通鍵 Bを生成するとともに、メディアサーバー力も返送されてきた暗号ィ匕許諾ファ ィルを当該共通鍵 Bを使って再生許諾ファイルに復号する許諾ファイル復号ステップ と、 At the user terminal, the common key B is generated based on the individual identification information and the stored authentication information, and the encryption license file returned with the media server power is also sent to the user terminal. A license file decrypting step for decrypting into a playback license file using the common key B;
利用者端末において、復号した再生許諾ファイルに含まれる視聴制限情報に基づ Vヽて映像作品の再生許可を確認したならば、当該再生許諾ファイル中の共通鍵 Aで メディアサーバー力も返送されてきた暗号化メディアファイルをメディアファイルに復 号し、当該メディアファイルを処理して映像作品を視聴可能に再生する映像作品再 生ステップと、 If the user terminal confirms the playback permission of the video work based on the viewing restriction information contained in the decrypted playback permission file at the user terminal, the media server power is also returned with the common key A in the playback permission file. A video work playback step of decrypting the encrypted media file into a media file, processing the media file, and playing back the video work for viewing;
を含んでいる。 Is included.
また利用者端末において、映像作品の再生を終了したならば、復号したメディアフ
アイルを記憶するとともに、再生許諾ファイル中の視聴制限情報に当該再生機会を 反映させて再生許諾ファイルを更新し、当該更新後の再生許諾ファイルを共通鍵 B により暗号ィ匕許諾ファイルに生成して記憶する許諾ファイル更新ステップを含むデジ タル映像コンテンツの著作権管理方法とすることもできる。 If the user terminal finishes playing the video work, the decrypted media The file is stored, the playback permission file is updated in the viewing restriction information in the playback permission file, the playback permission file is updated, and the updated playback permission file is generated in the encryption key permission file with the common key B. It is also possible to adopt a copyright management method for digital video content including a license file update step to be stored.
[0006] 上記の許諾ファイル更新ステップを含む著作権管理方法において、許諾ファイル 復号ステップでは、利用者端末が、自身に記憶されている暗号ィ匕許諾ファイルを再 生許諾ファイルに復号し、前記映像作品再生ステップでは、利用者端末が、暗号ィ匕 許諾ファイルを復号して得た再生許諾ファイルに記載されている視聴制限情報に基 づ 、て映像作品の再生許可を確認したならば、自身に記憶されて 、るメディアフアイ ルを処理して映像作品を視聴可能に再生するようにしてもよ!ヽ。 [0006] In the copyright management method including the license file update step, in the license file decryption step, the user terminal decrypts the encrypted license file stored in the user terminal into a reproduction license file, and the video In the work playback step, if the user terminal confirms the playback permission of the video work based on the viewing restriction information described in the playback permission file obtained by decrypting the encryption permission file, It is also possible to process the media file that is stored and play back the video work for viewing!
[0007] 上記の許諾ファイル更新ステップを含む著作権管理方法において、前記映像作品 再生ステップには、再生許諾ファイル中の視聴制限情報としてメディアファイルのスク ランブル方式が指定されて ヽるとともに、復号した再生許諾ファイルに含まれる視聴 制限情報に基づいて映像作品の再生が許可されない場合、利用者端末に記憶され て 、るメディアファイルを指定のスクランブル方式に基づ 、て暗号化する処理が含ま れていてもよい。 [0007] In the copyright management method including the permission file update step described above, the video work playback step is specified by a media file scrambling method as viewing restriction information in the playback permission file and decrypted. When playback of video works is not permitted based on the viewing restriction information contained in the playback permission file, it includes processing to encrypt the media file stored on the user terminal based on the specified scramble method. May be.
[0008] 上記の許諾ファイル更新ステップを含む著作権管理方法において、前記映像作品 再生ステップは、再生許諾ファイル中の視聴制限情報としてメディアファイルの削除 が指示されているとともに、復号した再生許諾ファイルに含まれる視聴制限情報に基 づ 、て映像作品の再生が許可されな 、場合、利用者端末に記憶されて 、るメディア ファイルを削除することも可能である。 [0008] In the copyright management method including the permission file update step, the video work playback step is instructed to delete the media file as viewing restriction information in the playback permission file, and the decrypted playback permission file If playback of the video work is not permitted based on the included viewing restriction information, the media file stored in the user terminal can be deleted.
図面の簡単な説明 Brief Description of Drawings
[0009] [図 1]図 1は、本発明の一実施形態に係る著作権管理方法が実施されるネットワーク 構成図である。 FIG. 1 is a network configuration diagram in which a copyright management method according to an embodiment of the present invention is implemented.
[図 2]上記著差遣管理方法において作成される再生許諾ファイルに記載される視聴 制限情報の概略構造図である。 FIG. 2 is a schematic structural diagram of viewing restriction information described in a reproduction permission file created by the above-mentioned author transfer management method.
[図 3]上記著作権管理方法に基づいて映像作品を視聴する以前の処理の流れ図で ある。
[0010] * [Figure 3] This is a flowchart of the process before viewing a video work based on the above copyright management method. [0010] *
[図 4]上記著作権管理方法に基づいて映像作品を視聴するための処理の流れ図で ある。 [Fig. 4] Flow chart of processing for viewing video works based on the above copyright management method.
[図 5]上記映像作品の視聴処理の流れに含まれる再生禁止処理の流れ図である。 符号の説明 FIG. 5 is a flowchart of a playback prohibition process included in the above-mentioned video work viewing process flow. Explanation of symbols
[0011] 1 利用者端末、 2 メディアサーバー、 3 インターネット [0011] 1 User terminal, 2 Media server, 3 Internet
発明を実施するための最良の形態 BEST MODE FOR CARRYING OUT THE INVENTION
[0012] = = =実施形態 = = = [0012] = = = Embodiment = = =
図 1に本発明の一実施形態における概略構成を示した。映像作品の視聴者が使用 するコンピュータ (利用者端末) 1と、利用者端末にデジタル映像コンテンツを配信す るサーバー (メディアサーバー) 2と、力インターネット 3上に接続されている。利用者 端末 1は、ブラウザを実装したパーソナルコンピュータを採用することができる。そして 、利用者端末 1にはデジタル映像コンテンツを処理して映像作品を視聴可能に再生 するためのプログラム(視聴プログラム)がインストールされて!/、るものとする。 FIG. 1 shows a schematic configuration in an embodiment of the present invention. It is connected to a computer (user terminal) 1 used by viewers of video works, a server (media server) 2 that distributes digital video content to the user terminal, and Power Internet 3. The user terminal 1 can employ a personal computer equipped with a browser. The user terminal 1 is assumed to be installed with a program (viewing program) for processing the digital video content and reproducing the video work so that it can be viewed!
[0013] 本実施形態では、デジタル映像コンテンツは映像作品毎にファイルィ匕されたメディ ァファイルとして提供される。メディアサーバー 2は、多数の映像作品について、メデ ィァファイルを共通鍵暗号ィ匕方式に基づ 、て共通鍵 Aで暗号ィ匕したファイル(暗号化 メディアファイル)を自身の記憶資源に記憶 '管理している。また映像作品毎に、該当 の暗号化メディアファイルを生成するのに使用した共通鍵 Aと、映像作品の視聴制限 情報などが記載された再生許諾ファイルも記憶 ·管理して!/ヽる。 In this embodiment, digital video content is provided as a media file filed for each video work. The media server 2 stores and manages a file (encrypted media file) encrypted with the common key A in its own storage resource for a number of video works based on the common key encryption method. ing. For each video work, store / manage / manage and manage the common key A used to generate the corresponding encrypted media file and the playback permission file containing the viewing restriction information of the video work.
[0014] = = =再生許諾ファイル = = = [0014] = = = Playback permission file = = =
図 2に本実施例における再生許諾ファイルに記載されている視聴制限情報の概略 を示した。再生可能回数、再生可能上限日、再生可能日数、スクランブル方式、自 動削除の各項目についてその内容が記載されている。再生可能回数は、映像作品 を視聴するためにメディアファイルを再生処理する上限数であり、数値により指定され る。この項目では、指定値を超えて再生処理することを禁止することを規定している。 なお、再生回数に上限が無い場合には、この項目の内容欄は空欄となる。再生が禁 止されて!/ヽれば「0 (ゼロ)」となる。
[0015] 再生可能上限日は、再生処理を行うことができる最終の日付であり、記載された日 付を過ぎて再生処理することを禁止する。上限日が設定されていない場合には、この 項目の内容欄は空欄となる。再生可能日数は、最初に再生されて力 再生を禁止す るまでの日数であり、その日数を超えて再生することを禁止する。 日数が設定されて いない場合には、他の項目と同様にして内容欄が空欄となる。また、再生処理済み の映像作品に対応する再生許諾ファイルでは、この再生可能日数項目の内容欄に 最初に再生した日付 (初回再生日)が記載される。なお、メディアサーバーに蓄積さ れている再生許諾ファイルは、初回再生日は記載されていない。 FIG. 2 shows an outline of the viewing restriction information described in the reproduction permission file in this embodiment. The contents of each item of the number of reproducible times, the reproducible upper limit date, the reproducible days, the scramble method and the automatic deletion are described. The number of playable times is the maximum number of media files that can be played back to view a video work, and is specified by a numerical value. This item stipulates that playback processing exceeding the specified value is prohibited. If there is no upper limit to the number of playbacks, the content column for this item is blank. Playback is forbidden! / Turn to 0 (zero). [0015] The reproducible upper limit date is the last date on which the reproduction process can be performed, and the reproduction process is prohibited from being performed past the stated date. If no upper limit date has been set, the content field for this item will be blank. The reproducible number of days is the number of days from the first playback until the power playback is prohibited, and playback beyond that number is prohibited. If the number of days is not set, the content field will be blank as with other items. In addition, in a playback permission file corresponding to a video work that has been played back, the date of the first playback (first playback date) is described in the content field of this playable days item. Note that the playback permission file stored on the media server does not include the date of the first playback.
[0016] スクランブル方式の内容欄には、メディアファイルにスクランブルを施して暗号化す るための方式が記載される。このスクランブル方式の項目では、内容欄にスクランプ ル方式が指定されて ヽて、利用者端末にてメディアファイルを再生処理する時点で 視聴制限情報の上記各項目の 、ずれかにより再生が禁止されて 、る場合にメディア ファイルを指定のスクランブル方式で暗号ィ匕することが規定されて 、る。 自動削除の 項目では、メディアファイルを削除する力否かの判定フラグが内容欄に記載される。 そして、メディアファイルの再生処理時点で上記各項目のいずれかにより再生が禁止 されていて、判定フラグが「削除」に該当する場合、メディアファイルを削除することが 規定されている。 [0016] In the contents column of the scramble method, a method for scrambling and encrypting the media file is described. In this scramble method item, when the scramble method is specified in the content column, playback is prohibited due to any of the above items in the viewing restriction information when the media file is played back on the user terminal. In this case, it is stipulated that the media file be encrypted using the specified scramble method. In the item of automatic deletion, a flag for determining whether or not the media file can be deleted is described in the content column. It is stipulated that media files should be deleted when playback is prohibited by any of the above items at the time of playback processing of the media file and the determination flag corresponds to “delete”.
[0017] = = =メディアファイルの作成 Z暗号ィ匕 Z格納 = = = [0017] = = = Create media file Z encryption key Z storage = = =
図 3に、本実施例の著作権管理方法における映像作品を視聴する以前の事前処 理についての処理の流れを示した。映像作品の制作者などがその映像作品を所定 形式のメディアファイルに作成し (si)、そのメディアファイルを共通鍵暗号ィ匕方式に 基づいて共通鍵 Aにより暗号ィ匕して暗号化メディアファイルを生成する(s2, s3)。ま た、映像作品の著作権の内容に基づく視聴制限情報がきさいされた再生許諾フアイ ルを作成する。そして、映像作品毎に暗号化メディアファイルと再生許諾ファイルとを 対応付けしてメディアサーバー 2の記憶資源に格納しておく(s4, s5)。 Fig. 3 shows the flow of processing for pre-processing before viewing a video work in the copyright management method of this embodiment. The creator of the video work creates the video work in a media file of a predetermined format (si), encrypts the media file with the common key A based on the common key encryption method, and creates an encrypted media file. Generate (s2, s3). Also, a reproduction permission file is created in which viewing restriction information based on the copyright content of the video work is included. Then, the encrypted media file and the reproduction permission file are associated with each video work and stored in the storage resource of the media server 2 (s4, s5).
[0018] = = =利用者情報の登録 = = = [0018] = = = Registration of user information = = =
一方、利用者端末には、視聴プログラムをインストールしておく。視聴プログラムは、 媒体などによって供給されてもよし、メディアサーバー 2などのインターネット上の適宜
なサーバーコンピュータにダウンロード可能に用意しておいてもよい。そして、利用者 端末 1にて視聴プログラムをインストールすると(s6)、視聴プログラムは、自身がイン ストールされる過程で、ユーザ IDやパスワードなどの認証情報の登録を促し、認証情 報がユーザ入力されると、これを利用者端末に記憶させるとともに、利用者端末の M ACアドレスや OSゃノヽードディスク装置の識別番号など、利用者端末を識別するた めの適宜な個体識別情報を取得する(s7, s8) 0そして、個体識別情報と視聴者認証 情報とを利用者情報としてメディアサーバーに送付させる(s9)。メディアサーバーは 、送付されてきた利用者情報を適宜な記憶資源に格納する (slO)。 On the other hand, a viewing program is installed in the user terminal. The viewing program may be supplied by a medium, etc. It may be prepared so that it can be downloaded to any server computer. When the viewing program is installed on the user terminal 1 (s6), the viewing program prompts the user to register authentication information such as a user ID and password during the installation process, and the authentication information is input by the user. Then, this is stored in the user terminal, and appropriate individual identification information for identifying the user terminal such as the MAC address of the user terminal and the identification number of the OS node disk device is acquired (s7 , s8) 0 Then, the individual identification information and the viewer authentication information are sent to the media server as user information (s9). The media server stores the sent user information in an appropriate storage resource (slO).
[0019] = = =暗号化メディアファイルのダウンロード = = = [0019] = = = Download encrypted media file = = =
つぎに、本実施形態における著作権管理方法に基づいて映像作品を利用者端末 1にて視聴するための処理を具体的に説明する。図 4にその処理の流れを示した。視 聴者が希望の映像作品をメディアサーバー 2に要求する。本実施例では、メディアサ 一バー 2は WWWサーバー機能を備え、自身に蓄積管理されている映像作品をブラ ゥザに選択させるための Webページ(作品選択ページ)を公開して!/、るものとする。 そして利用者端末 1は、ブラウザを実装しているものとする。メディアサーバー 2は、所 定の URLを指定してアクセスしてきた利用者端末 2のブラウザに作品選択ページを 返送する(sl l, sl2)。視聴者は、利用者端末 1により取り寄せた作品選択ページ中 に視聴希望の映像作品を見出したならば、その作品を指定して映像作品を要求する (sl3, sl4)。メディアサーバー 2は、映像作品の要求を受け付けると、該当の暗号化 メディアファイルを利用者端末 1に返送し (sl5)、利用者端末 1はその暗号化メディア ファイルを記憶する(sl6)。 Next, a process for viewing a video work on the user terminal 1 based on the copyright management method in the present embodiment will be specifically described. Figure 4 shows the process flow. The viewer requests the media server 2 for the desired video work. In this example, Media Server 2 has a WWW server function and publishes a web page (work selection page) that allows the browser to select the video work stored and managed by itself! Shall. The user terminal 1 is assumed to have a browser installed. Media server 2 returns the work selection page to the browser of user terminal 2 that has been accessed by specifying the specified URL (sl l, sl2). When the viewer finds the desired video work in the work selection page ordered by the user terminal 1, the viewer requests the video work by designating the desired work (sl3, sl4). Upon receiving the request for the video work, the media server 2 returns the corresponding encrypted media file to the user terminal 1 (sl5), and the user terminal 1 stores the encrypted media file (sl6).
[0020] = = =再生許諾ファイルの暗号ィ匕 = = = [0020] = = = Encryption key for playback license file = = =
視聴者が映像作品を視聴するためには、利用者端末 1にて視聴プログラムを起動 し、視聴したい映像作品を指定する(sl7, sl8) 0ここでは、指定された映像作品の 暗号化メディアファイルが sl6により利用者端末 1に記憶されている。そして、指定の 映像作品に対応する再生許諾ファイルが利用者端末に存在するか否かを確認し、 存在しなければ、利用者端末をメディアサーバーにアクセスさせ、視聴対象となる映 像作品を特定するための情報と視聴者認証情報とを送付させる(sl9→s20→s21)
[0021] メディアサーバー 2は、利用者端末 1から映像作品の特定情報と認証情報とが送付 されてくると、該当する利用者情報の登録確認を行い、登録済みを確認したならば、 所定のアルゴリズムに基づいて共通鍵 Bをその利用者情報における個体識別情報か ら生成するとともに、この鍵 Bで視聴対象となる映像作品に対応する再生許諾フアイ ルを暗号ィ匕して暗号ィ匕許諾ファイルを生成する(s22〜s24)。そして、その暗号化許 諾ファイルを利用者端末 1に送付する(s26)。 In order for the viewer to view the video work, start the viewing program on user terminal 1 and specify the video work to be viewed (sl7, sl8) 0 Here, the encrypted media file of the specified video work Is stored in user terminal 1 by sl6. Then, it is confirmed whether or not the playback permission file corresponding to the specified video work exists on the user terminal. If it does not exist, the user terminal is accessed to the media server, and the video work to be viewed is specified. Information and viewer authentication information are sent (sl9 → s20 → s21) [0021] When the video server specific information and authentication information are sent from the user terminal 1, the media server 2 confirms registration of the corresponding user information, and if the registration is confirmed, Based on the algorithm, the common key B is generated from the individual identification information in the user information, and the reproduction permission file corresponding to the video work to be viewed is encrypted with this key B to encrypt the encryption permission file. Is generated (s22 to s24). Then, the encryption permission file is sent to the user terminal 1 (s26).
[0022] = = =映像作品の視聴 = = = [0022] = = = Watching video works = = =
利用者端末 1は、視聴プログラムにより、暗号化メディアファイルが返送されてくると 、自身力インストールされている利用者端末 1の個体識別情報力も共通鍵 Bを生成し 、この共通鍵 Bで暗号ィ匕許諾ファイルを再生許諾ファイルに復号する(s27〜s29)。 そして、再生許諾ファイルに含まれている視聴制限情報に基づいて視聴対象の映像 作品の再生処理を実行可否を判断する(s30)。ここでは、メディアサーバー 2から返 送されてきた暗号化メディアファイルを処理対象としているため、視聴制限情報の各 項目のいずれによっても再生処理が禁止されておらず、再生処理の実行可能と判断 されるそして利用者端末は、視聴者プログラムにより、再生許諾ファイル中の共通鍵 Aを用いて暗号化メディアファイルをメディアファイルに復号してこれを処理し、映像 作品を再生して利用者端末における視聴に供する(s30→s31, s32)。 When the encrypted media file is returned by the viewing program, the user terminal 1 also generates a common key B for the individual identification information power of the user terminal 1 installed by itself. The decryption permission file is decrypted into a playback permission file (s27 to s29). Then, based on the viewing restriction information included in the playback permission file, it is determined whether or not the playback process of the video work to be viewed can be executed (s30). Here, since the encrypted media file returned from the media server 2 is the processing target, the playback processing is not prohibited by any of the viewing restriction information items, and it is determined that the playback processing can be executed. Then, the user terminal uses the viewer program to decrypt the encrypted media file into a media file using the common key A in the playback permission file, process it, and play the video work to view it on the user terminal. (S30 → s31, s32).
[0023] = = =再生許諾ファイルの更新 = = = [0023] = = = Renewal of playback permission file = = =
利用者端末 1において、再生中の映像作品の視聴を終了する旨のユーザ入力が あったり、映像作品を一通り再生し終えたりしたならば、メディアファイルを利用者端 末に記憶した上で、この再生処理機会に関わる情報を映像作品の再生許諾ファイル 中の視聴制限情報における適宜な項目に反映させて再生許諾ファイルを更新する( s34, s35)。例えば、当初、再生可能回数が「5」に設定されていれば、それを「4」に したり、初回再生日として当該再生処理日を再生可能日数の欄に記載したりする。そ して、その更新した再生許諾ファイルを再度共通鍵 Bにより暗号ィ匕して暗号ィ匕許諾フ アイルを生成し、それを記憶する(s36, s37) If the user terminal 1 receives a user input to end viewing of the video work being played back or if the video work has been completely played back, the media file is stored on the user terminal. The reproduction permission file is updated by reflecting information related to this reproduction processing opportunity in appropriate items in the viewing restriction information in the reproduction permission file of the video work (s34, s35). For example, if the reproducible number of times is initially set to “5”, it is set to “4”, or the reproduction processing date is described in the reproducible number of days column as the first reproduction date. Then, the updated reproduction permission file is encrypted again with the common key B to generate an encryption permission file and store it (s36, s37).
= = =再生禁止処理 = = =
暗号化メディアファイルが復号されて映像作品が利用者端末にて視聴に供されると= = = Reproduction prohibition processing = = = When the encrypted media file is decrypted and the video work is viewed on the user terminal
、暗号化されて ヽな ヽメディアファイルが利用者端末 1に記憶されることになる(s34) 。再生許諾ファイルの視聴制限情報は、初回の再生処理を経た後で、再生可能回数 力 S「0」になるなどして、再生禁止に該当する内容に更新されている可能性がある。視 聴プログラムは、再生許諾ファイルに含まれている視聴制限情報に基づいて視聴対 象の映像作品の再生処理を禁止すると判断したならば、映像作品の再生処理を中 断して再生処理禁止処理に移行する(s30→s40)。 Then, the encrypted media file is stored in the user terminal 1 (s34). The viewing restriction information of the playback permission file may have been updated to the content corresponding to playback prohibition after the first playback processing, such as the playback possible power S “0”. If the viewing program determines that playback of the video work subject to viewing is prohibited based on the viewing restriction information included in the playback permission file, the playback process of the video work is interrupted and playback processing prohibited processing is performed. (S30 → s40).
[0024] 図 5に再生禁止処理 40の流れを示した。視聴プログラムが起動している利用者端 末 1は、再生許諾ファイル中の視聴制限情報によりスクランブル方式が指定されてい る場合には、メディアファイルを指定のスクランブル方式で暗号ィ匕する(s41→s42)。 それによつて、例えば、再生許諾ファイルが不正に改竄され、視聴制限情報が再生 処理を禁止しない内容に変更されたとしても、スクランブルを解除できず、映像作品 を視聴することができない。また、視聴制限情報により、削除が指定されている場合 には、メディアファイルそのものを削除する(s41→s43→s44)。この場合には、スクラ ンブル情報が解読され不正にスクランブルが解除される可能性を排除できる。なお、 視聴制限情報により再生処理が禁止されて!、て、スクランブル方式の指定や自動削 除の指示がない場合には、メディアファイルに対する再生処理を中止する(s43→s4 5)。 FIG. 5 shows the flow of the regeneration prohibiting process 40. The user terminal 1 running the viewing program encrypts the media file with the specified scramble method (s41 → s42) if the scramble method is specified by the viewing restriction information in the playback permission file. ). As a result, for example, even if the playback permission file is illegally altered and the viewing restriction information is changed to a content that does not prohibit playback processing, the scramble cannot be released and the video work cannot be viewed. If deletion is specified by the viewing restriction information, the media file itself is deleted (s41 → s43 → s44). In this case, it is possible to eliminate the possibility that the scramble information is decrypted and the scramble is illegally released. If the viewing restriction information prohibits the playback process! And there is no scramble method designation or automatic deletion instruction, the playback process for the media file is stopped (s43 → s45).
[0025] = = =メディアファイルの配信方式 = = = [0025] = = = Media file distribution method = = =
上記実施例では、暗号化メディアファイル全体が利用者端末にダウンロードされて いた。この例に限らず、メディアサーバー 1が周知のストリーミング技術により暗号化メ ディアファイルをストリーミングデータにして利用者端末 1に転送し、利用者端末 1は、 転送されてきた暗号化メディアファイルのストリーミングデータをバッファリングしながら 逐次復号して映像作品を視聴可能に再生するようにてもよい。この場合、映像作品を 視聴した後で暗号化メディアファイルやメディアファイルが利用者端末 2に記憶される ことはない。 In the above embodiment, the entire encrypted media file has been downloaded to the user terminal. Not limited to this example, the media server 1 converts the encrypted media file into streaming data using a well-known streaming technology to the user terminal 1, and the user terminal 1 transmits the streaming data of the encrypted media file that has been transferred. The video work may be played back so as to be viewable by sequentially decoding while buffering. In this case, the encrypted media file or media file is not stored in the user terminal 2 after viewing the video work.
[0026] = = =本発明の適用範囲 = = = [0026] = = = Scope of application of the present invention = = =
本発明の著作権管理方法は、上記実施例に示した映像作品に限らず、写真などの
静止画作品や音楽作品にも適用することが可能である。 The copyright management method of the present invention is not limited to the video work shown in the above embodiment, It can also be applied to still and music works.
産業上の利用可能性 Industrial applicability
本発明によって、新規なデジタル映像コンテンツの著作権保護方法を実現すること ができる。
According to the present invention, a novel digital video content copyright protection method can be realized.
Claims
請求の範囲 The scope of the claims
映像作品をデジタルデータにして収録したデジタル映像コンテンツを情報通信ネッ トワークを介して配信するメディアサーバーと、映像作品の視聴者が使用する利用者 端末とが通信する構成において実施される著作権管理方法であって、 Copyright management method implemented in a configuration in which a media server that distributes digital video content recorded as digital data through a communication network communicates with a user terminal used by viewers of the video product Because
メディアサーバーにおいて、一つの映像作品のデジタル映像コンテンツに相当する メディアファイルを共通鍵 Aにより暗号ィ匕した暗号化メディアファイルと、共通鍵 Aと映 像作品に関する視聴制限情報が含まれた再生許諾ファイルとを映像作品毎に記憶 するメディア格納ステップと、 On the media server, an encrypted media file obtained by encrypting a media file corresponding to the digital video content of one video work with a common key A, and a playback permission file that includes viewing restrictions information about the common key A and the video work And a media storage step for storing for each video work,
利用者端末にぉ ヽて、メディアファイルを処理して映像作品を視聴可能にする視聴 プログラムをインストールする過程で、視聴者の認証情報を当該利用者端末に記憶 するとともに、利用者端末の個体識別情報と前記認証情報とを対応付けしてメディア サーバーに登録する利用者情報登録ステップと、 In the process of installing a viewing program that enables the viewing of video works by processing media files on the user terminal, the viewer authentication information is stored in the user terminal and the individual identification of the user terminal is performed. A user information registration step of registering information and the authentication information in association with the media server;
利用者端末において、前記映像作品を指定するユーザ入力があると、メディアサー バーに当該映像作品を要求する映像作品要求ステップと、 When there is a user input for designating the video work at the user terminal, a video work requesting step for requesting the video work from the media server;
メディアサーバーにおいて、映像作品を要求してきた利用者端末に該当の暗号ィ匕 メディアファイルを返送するメディアファイル返送ステップと、 In the media server, a media file returning step for returning the corresponding encrypted media file to the user terminal that has requested the video work;
視聴プログラムが起動して 、る利用者端末にぉ 、て、ユーザ入力により前記返送さ れてきた暗号化メディアファイルに対する再生指示があると、当該暗号化メディアファ ィルに対応する再生許諾ファイルが利用者端末に存在するか否かを調査し、存在し なければメディアサーバーに前記認証情報を送付して再生許諾ファイルの返送を要 求する再生許諾ファイル要求ステップと、 When the viewing program is activated and the user terminal gives a playback instruction for the encrypted media file returned by user input, a playback permission file corresponding to the encrypted media file is displayed. A reproduction permission file requesting step for investigating whether or not the user terminal exists, and if not, sending the authentication information to the media server and requesting the return of the reproduction permission file;
メディアサーバーにおいて、再生許諾ファイルを要求してきた利用者端末カゝら受け 付けた認証情報が登録済みであれば、当該認証情報に対応する個体識別情報を用 Vヽて共通鍵 Bを生成するとともに、要求された再生許諾ファイルを共通鍵 Bで暗号ィ匕 した暗号ィ匕許諾ファイルを利用者端末に送付する暗号ィ匕許諾ファイル送付ステップ と、 If the authentication information received from the user terminal requesting the playback permission file has already been registered in the media server, the common key B is generated using the individual identification information corresponding to the authentication information. An encrypted license file sending step for sending the encrypted license file obtained by encrypting the requested playback license file with the common key B to the user terminal; and
利用者端末にお!、て、自身の個体識別情報と前記記憶した認証情報とに基づ 、 て共通鍵 Bを生成するとともに、メディアサーバー力も返送されてきた暗号ィ匕許諾ファ
ィルを当該共通鍵 Bを使って再生許諾ファイルに復号する許諾ファイル復号ステップ と、 Based on the individual identification information of the user terminal and the stored authentication information, the common key B is generated at the user terminal, and the encryption server license returned to the media server is also returned. A license file decrypting step of decrypting the file into the playback license file using the common key B;
利用者端末において、復号した再生許諾ファイルに含まれる視聴制限情報に基づ Vヽて映像作品の再生許可を確認したならば、当該再生許諾ファイル中の共通鍵 Aで メディアサーバー力も返送されてきた暗号化メディアファイルをメディアファイルに復 号し、当該メディアファイルを処理して映像作品を視聴可能に再生する映像作品再 生ステップと、 If the user terminal confirms the playback permission of the video work based on the viewing restriction information contained in the decrypted playback permission file at the user terminal, the media server power is also returned with the common key A in the playback permission file. A video work playback step of decrypting the encrypted media file into a media file, processing the media file, and playing back the video work for viewing;
を含むことを特徴とするデジタル映像コンテンツの著作権管理方法。 A copyright management method for digital video content, comprising:
[2] 請求項 1に記載の著作権管理方法であって、 [2] The copyright management method according to claim 1,
利用者端末において、映像作品の再生を終了したならば、復号したメディアフアイ ルを記憶するとともに、再生許諾ファイル中の視聴制限情報に当該再生機会を反映 させて再生許諾ファイルを更新し、当該更新後の再生許諾ファイルを共通鍵 Bにより 暗号ィ匕許諾ファイルに生成して記憶する許諾ファイル更新ステップを含むとともに、 前記許諾ファイル復号ステップでは、利用者端末が、自身に記憶されている暗号ィ匕 許諾ファイルを再生許諾ファイルに復号し、 When playback of the video work is completed on the user terminal, the decrypted media file is stored, and the playback permission file is updated by reflecting the playback opportunity in the viewing restriction information in the playback permission file. Including a license file update step of generating and storing a subsequent playback license file in a cryptographic key license file with the common key B, and in the license file decrypting step, the user terminal stores the cryptographic key stored in itself. Decrypt the license file into a playback license file,
前記映像作品再生ステップでは、利用者端末が、暗号化許諾ファイルを復号して 得た再生許諾ファイルに記載されている視聴制限情報に基づいて映像作品の再生 許可を確認したならば、自身に記憶されて ヽるメディアファイルを処理して映像作品 を視聴可能に再生する、 In the video product playback step, if the user terminal confirms the playback permission of the video product based on the viewing restriction information described in the playback license file obtained by decrypting the encryption license file, the user terminal stores it. Processed media files that can be played and played back video images for viewing.
ことを特徴とするデジタル映像コンテンツの著作権管理方法。 A copyright management method for digital video content.
[3] 請求項 2に記載の著作権管理方法であって、前記映像作品再生ステップには、再 生許諾ファイル中の視聴制限情報としてメディアファイルのスクランブル方式が指定 されているとともに、復号した再生許諾ファイルに含まれる視聴制限情報に基づいて 映像作品の再生が許可されな 、場合、利用者端末に記憶されて ヽるメディアフアイ ルを指定のスクランブル方式に基づ 、て暗号化する処理が含まれて 、ることを特徴と するデジタル映像コンテンッの著作権管理方法。 [3] The copyright management method according to claim 2, wherein a scramble method of the media file is specified as the viewing restriction information in the reproduction permission file and the decoded reproduction is performed in the video work reproduction step. If playback of the video work is not permitted based on the viewing restriction information contained in the license file, includes the process of encrypting the media file stored in the user terminal based on the specified scramble method. A copyright management method for digital video content characterized by that.
[4] 請求項 2に記載の著作権管理方法であって、前記映像作品再生ステップには、再 生許諾ファイル中の視聴制限情報としてメディアファイルの削除が指示されているとと
もに、復号した再生許諾ファイルに含まれる視聴制限情報に基づいて映像作品の再 生が許可されな 、場合、利用者端末に記憶されて ヽるメディアファイルを削除するこ とを特徴とするデジタル映像コンテンツの著作権管理方法。
[4] The copyright management method according to claim 2, wherein the video work playback step is instructed to delete a media file as viewing restriction information in the playback permission file. In addition, if playback of the video work is not permitted based on the viewing restriction information included in the decrypted playback permission file, the digital file is characterized in that the media file stored in the user terminal is deleted. Copyright management method for video content.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2005/011782 WO2007000805A1 (en) | 2005-06-28 | 2005-06-28 | Digital video content copyright management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2005/011782 WO2007000805A1 (en) | 2005-06-28 | 2005-06-28 | Digital video content copyright management method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007000805A1 true WO2007000805A1 (en) | 2007-01-04 |
Family
ID=37595069
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/011782 WO2007000805A1 (en) | 2005-06-28 | 2005-06-28 | Digital video content copyright management method |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2007000805A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000293439A (en) * | 1999-04-06 | 2000-10-20 | Fujitsu Ltd | Content usage control system, content usage device, and computer-readable recording medium storing a program for causing a computer to execute the usage method |
JP2001175604A (en) * | 1999-12-14 | 2001-06-29 | Sony Corp | Device and method for information processing, device and method for provision, and program storage medium |
-
2005
- 2005-06-28 WO PCT/JP2005/011782 patent/WO2007000805A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000293439A (en) * | 1999-04-06 | 2000-10-20 | Fujitsu Ltd | Content usage control system, content usage device, and computer-readable recording medium storing a program for causing a computer to execute the usage method |
JP2001175604A (en) * | 1999-12-14 | 2001-06-29 | Sony Corp | Device and method for information processing, device and method for provision, and program storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5530299B2 (en) | Content receiver and method for writing content receiver | |
US20190147143A1 (en) | Decoupling rights in a digital content unit from download | |
US7908477B2 (en) | System and method for enabling device dependent rights protection | |
US7499550B2 (en) | System and method for protecting a title key in a secure distribution system for recordable media content | |
KR101067566B1 (en) | Use of media storage structure with multiple pieces of content in a content-distribution system | |
RU2290767C2 (en) | Receiving device for protective preservation of a unit of content and reproduction device | |
US7089425B2 (en) | Remote access authorization of local content | |
KR101127194B1 (en) | System and method for providing a secure content with revocable access | |
US8086535B2 (en) | Decoupling rights in a digital content unit from download | |
US20010053222A1 (en) | Data processing apparatus and method | |
JP2009533908A (en) | Method and apparatus for delivering encoded content | |
JP2004193843A (en) | Content distribution device, content distribution method, content distribution program and content reproduction device, content reproduction method, content reproduction program | |
JP2005539423A (en) | Metadata encryption / decryption method, encrypted metadata management method and system | |
JP5122468B2 (en) | Method for recording digital data and securely delivering the same, access device and recorder | |
JP2004139473A (en) | Content recording device, reproduction device, record reproduction device, and storage medium | |
KR100373811B1 (en) | Data encription system and method thereof and portable data-carring device for use in the method | |
JP4017150B2 (en) | Content distribution device | |
JP4398708B2 (en) | Content receiving terminal, history search device, history data generation program, and history search program | |
JP3861790B2 (en) | Data management system, data management method, client terminal, and server device | |
WO2007000805A1 (en) | Digital video content copyright management method | |
KR100635128B1 (en) | A device for generating an encrypted video file and an encrypted video restoring device in an IOS base media file format, and a method for restoring the same | |
KR101203744B1 (en) | Contents playback management system and contents playback management method | |
JP2009048508A (en) | Content distribution system and image receiving apparatus | |
JP2008016095A (en) | Communication system, decoding reproduction system, recording device, communication program, and recording medium | |
US20050100315A1 (en) | Method of and apparatus for copying AV stream, and method of copying AV contents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 05755799 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |