MXPA01012402A - Information recording reproducing apparatus and method. - Google Patents

Information recording reproducing apparatus and method.

Info

Publication number
MXPA01012402A
MXPA01012402A MXPA01012402A MXPA01012402A MXPA01012402A MX PA01012402 A MXPA01012402 A MX PA01012402A MX PA01012402 A MXPA01012402 A MX PA01012402A MX PA01012402 A MXPA01012402 A MX PA01012402A MX PA01012402 A MXPA01012402 A MX PA01012402A
Authority
MX
Mexico
Prior art keywords
key
generation
information
managed
renewed
Prior art date
Application number
MXPA01012402A
Other languages
Spanish (es)
Inventor
Asano Tomoyuki
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from JP2000391973A external-priority patent/JP2002191639A/en
Application filed by Sony Corp filed Critical Sony Corp
Priority claimed from PCT/JP2001/003004 external-priority patent/WO2001078301A1/en
Publication of MXPA01012402A publication Critical patent/MXPA01012402A/en

Links

Abstract

If the generation of a master key that a reproducing apparatus has is older than that used when data is recorded and consequently the data cannot be reproduced, or if the generation of a master key that a recording apparatus has is older than that required when data is to be recorded on a record medium and consequently the data cannot be recorded, the user is prompted to update the master key, and the user acquires a required master key to perform reproducing or recording. the updated master key is delivered in the form handled only by a specific device through a transmission medium such as a record medium, a network, an IC card, or a telephone line by using, e.g., a tree structured key delivery system.

Description

APPARATUS AND METHOD OF RECORDING / REPRODUCING INFORMATION Technical Field The present invention relates in general terms to an information recorder, information player, information recording method, information reproduction method, key renewal terminal, renewal method key managed by generation, means of recording information, and a program service means, and more particularly to an information recorder, information player, information recording method, information reproduction method, key renewal terminal , key renewal method managed by generation, means of recording information, and a program service medium that can prevent the writing of data in a recording medium in which data can be recorded and from which data can be reproduced and also to avoid the unauthorized copying of data in data reproduction s. BACKGROUND ART With recent advances and developments in digital signal processing technology, digital recorders and recording media are becoming increasingly common. With said digital recorder and recording medium, an image or sound, for example, can be recorded repeatedly and reproduced numerous times without any degradation of its quality. Since digital data can be copied repeatedly many times without degrading the quality of the image and sound, recording means that have illegally registered digital data there, if commercialized, cause economic losses to the owners of the copyright of several Content such as music, movies, etc., or appropriate or authorized distributors of the contents; Such losses could be eliminated if unauthorized copying is not possible. To prevent such unauthorized copying of digital data, several non-authorized copy prevention systems have recently been introduced into digital recorders and recording media. As an example of the aforementioned unauthorized copying prevention systems, the SCMS (Serial Copy Management System) is adopted in the MD (minidisk) unit (MD is a trademark). The SCMS is of such a nature that on one side of data reproduction, audio data is produced together with an SCMS signal from a digital interface (DIF) while on one side of data recording, the data record audio from the data player side is controlled based on the SCMS signal coming from the data player side, thus preventing the audio data from being copied illegally. More particularly, the SCMS signal above indicates that an audio data is a data "with free copying" which allows it to be freely copied several times, a data "of a single allowed copy" that can be copied only once or a data with "prohibited copy" that can not be copied. On the data record side, when an audio data is received from the DIF, the SCMS signal transmitted along with the audio data is detected. If the SCMS signal indicates that the audio data is a "free copied" data, the audio data is recorded along with the SCMS signal on the MD. If the SCMS signal indicates that the audio data is a data with "a single copy allowed", the audio data is converted into a "forbidden copy" data and the SCMS signal is recorded along with the audio data in the minidisk. In addition, if the SCMS signal indicates that the audio data is a prohibited copy data, the audio data is not registered in the MD. Under control with the SCMS signal, illegal copying of audio data protected by copyright in the minidisc unit is prevented. However, the SCMS is valid only when the data logger itself is constructed to control the recording of audio data from the data player side based on the SCMS signal. Therefore, it is difficult for the SCMS to support a non-built minidisk unit to perform the SCMS control. To apply the SCMS, a DVD player, for example, adopts a content coding system to prevent illegal copying of data protected by copyright. The content coding system is such that encrypted video data, encrypted audio data and the like are recorded on a DVD-ROM (read-only memory) and a decryption key for use in order to decrypt the encrypted data. Provides each licensed DVD player. The license is granted to a DVD player designed in accordance with a predetermined operation rule against unauthorized copying, etc. Therefore, using the decryption key granted, a licensed DVD player can decrypt encrypted data recorded on a DVD-ROM to thereby reproduce the video and audio data from the DVD-ROM. On the other hand, an unlicensed DVD player can not decrypt the encrypted data recorded on a DVD-ROM since it has no decryption key for the encrypted data. In summary, the content coding system prevents a DVD player that does not comply with the license requirements from playing a DVD-ROM that has digital data registered there in order to avoid unauthorized copying. However, the content coding system adopted on the DVD-ROM is directed to a recording medium in which the user can not write data (which is referred to as "ROM media" below where appropriate), but not to a recording medium in which the user can write data (which will be known below as "RAM medium", if appropriate). That is, the copying of all the encrypted data registered in a ROM medium in a RAM medium will produce what is known as a pirated edition of the data, said data can be reproduced by a licensed DVD player. To solve the problem set forth above, the Applicant of the present invention proposed, in accordance with that disclosed in Japanese Published Unexamined Application No. 224461 of 1999 (Japanese Patent Application No. 25310 of 1998), a method in which the information to identify each recording medium (referred to as "media ID information" below) is recorded with other data in a recording medium to allow access to the media ID information in the recording medium only when a The player that is about to play the record medium is licensed for the media ID information. The method mentioned above encrypts data in the registration medium with a private key (master key) acquired through the license of the media ID information in such a way that an unlicensed player can not obtain any significant data even if it can read the encrypted data. Note that a player that is licensed for media ID information has restricted operation against unauthorized copying. No unlicensed player can access the media ID information. The media ID information is unique for each record medium. Even if an unlicensed player could copy all the encrypted data recorded in said recording medium in a new recording medium, the data recorded in this way in the new recording medium can not be decrypted correctly by the unlicensed player and by a licensed player. Thus, it is substantially possible to avoid illegal copying of data. It will now be remembered that in the conventional system mentioned above, a private key, (master key) acquired through licensing as proposed in the Japanese Patent Application must be common to all devices included in a system, which is required to reproduce a recording medium that has data recorded there by any other device in the system (to ensure interoperability). Nevertheless, if an attacker has attacked one of the devices included in a system and has succeeded in discovering the private key stored in the device, it will be equal to the discovery of the private keys of all the devices, in such a way that the data recorded in the device before the discovery of the private key as well as the data recorded after the discovery of the private key will be analyzed cryptographically by the attacker with the private key discovered in this way. To avoid the foregoing, the Applicant of the present invention proposed, as in Japanese Patent Application No. 294928 of 1999, a method for managing the generation of the master key. The method is such that a master key common to all the devices in a system is used starting with the first generation of the master key and a unique private key for each of the device groups is used, acquiring therefore, as of record medium, a master key that is the most recent when the record medium has been produced. Specifically, to a group whose master key has been discovered as above, no master key of the next generation is granted for record means that are produced after the discovery of the master key. Thus, the appropriate or authorized devices, that is, whose master key has not been discovered, can acquire a master key of a more recent generation while the devices whose master key has been discovered can not acquire any master key of a more recent generation than the generation of the master key that has been discovered in the last resort. The registrar can record data in a record medium only with a master key of a generation as recent or more recent than the generation of the master key stored in the record medium. A registrar that has a master key that meets the above mentioned cryptography data requirement with its most recent master key for registration. Thus, even for registration in an old record medium, data is encrypted for registration with an almost newer master key by a device (recorder / player) that is appropriate, that is, whose master key has not been discovered. Thus, you can avoid reading the data recorded in the old record medium by an inappropriate or unauthorized device that can not acquire the most recent master key. In a system in which the master key handled by generation mentioned above is used, the data cryptography recorder with its own most recent generation master key to record the data in a recording medium. To reproduce the recording medium through a player other than the recorder / player that has registered data in the recording medium, the master key of the generation that has been used to record the data must be known to the registrar who is about to play the recording medium. However, a more recent generation master key can not be acquired unless you have access to a more recent generation logging medium. Specifically, since the master key of the generation in which the data has been recorded can not be known, even an appropriate or authorized player can not reproduce data recorded in the recording medium, as the case may be. Likewise, a registrar that is about to register data in a record medium must have a master key of a more recent generation than allowed by the record medium. However, since there is a probability that a cryptographic master key common to a group of devices has been removed from a master key table in the registration medium due to the discovery of the master key for the group, even an appropriate or authorized registrar who is about to register data in a recording medium can not record the data on the recording medium as the case may be. Disclosure of the invention Accordingly, the present invention aims to overcome the drawbacks mentioned above of the prior art by providing an information logger, information player, information recording method, information reproduction method, key renewal terminal, renewal method key managed by generation, means of information registration and a program service medium, which can ensure a broader interoperability while maintaining the function of preventing illegal data copying. In accordance with the first aspect of the present invention, an information recorder can be provided for recording information in a recording medium, the apparatus includes: a cryptography device for encrypting information to be registered in the recording medium through cryptography with a cryptographic key managed by generation that is renewed in a different key for each generation; and a user interface for making a comparison between the generation information in a generation-managed encryption key stored in the device that is in a storage device of the information recorder and a pre-registration generation information that is a information of generation of recording medium pre-stored in the recording medium, and sends a warning when the result of the comparison is that the generation information of pre-registration is more recent than the generation information in the encryption key handled by generation stored in the device. Likewise, in the aforementioned information recorder according to the present invention, the generation-managed encryption key stored in the device is a master key stored in a common manner in several information registers. Furthermore, in the aforementioned information recorder according to the present invention, the encryption device includes devices for renewing, when the pre-registration generation information is more recent than the generation information in the encryption key managed by generation stored in device, a cryptographic key managed by generation of a generation as recent or more recent than indicated by the generation information of pre-registration. In addition, in the aforementioned information recorder according to the present invention, the encryption device includes a device for creating a key to create, based on the cryptography key handled by generation stored in the device, a cryptography key managed by generation whose generation information is older than the generation information in the encryption key managed by generation stored in the device. In addition, in the aforementioned information recorder according to the present invention, the encryption device includes a device for renewing, when the pre-registration generation information is more recent than the generation information in the encryption key handled by generation stored in the device, a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the pre-registration generation information, and the key renewal device deciphers a cryptographic key handled by generation to renew encrypted with a device key stored in the information recorder in order to create a renewed cryptography key managed by generation. In addition, in the aforementioned information recorder according to the present invention, the encryption device acquires a key table wherein the cryptography key handled by cryptographic renewal generation and a decryption device key identifier are correlated with each other. in order to decrypt the encryption key managed by generation to be renewed encrypted with a device key identified based on the device key identifier in the key table. In addition, in the aforementioned information recorder according to the present invention, the device key is a key common to information recorders grouped by division into category in a common category.
In addition, in the aforementioned information recorder according to the present invention, the device key is a common key to information recorders belonging to the same group by grouping based on serial numbers assigned to the information recorders. Furthermore, in the aforementioned information register according to the present invention, a unique node key is provided for each of the nodes included in a hierarchical structure of tree type that includes several different information recorders as each of the leaves and a single-page key for each of the information registers, and the generation-driven encryption key is a key that can be renewed with at least either the node key or the sheet key. Furthermore, in the aforementioned information recorder according to the present invention, the encryption key managed by generation is a master key common to the various information recorders. Furthermore, in the aforementioned information recorder according to the present invention, the node key can be renewed, it is distributed when a node key must be renewed, a key renewal block (KRB) derived from the encryption of the key node renewed with at least either a node key or a leaf key at a lower stage of the tree-like structure to an information recorder on a sheet where the node key must be renewed, and the device encrypted in the information logger receives renewal data for the cryptographic key managed by crypto generation with the renewed node key, cryptography the key renewal block (KRB) to acquire the renewed node key and acquires renewal data for the encryption key managed by generation based on the renewed node key acquired in this way. Furthermore, in the aforementioned information register according to the present invention, the key renewal block (KRB) is stored in a registration medium and the cryptography encryption device the key renewal block (KRB) read from of the recording medium. Furthermore, in the aforementioned information recorder according to the present invention, the encryption key handled by generation has a generation number as correlation information correlated with it, and the encryption device stores, as a registration number, a number of generation of the encryption key managed by generation that has been used to store encrypted data in the recording medium. In accordance with the second aspect of the present invention, an information recorder can be provided for recording information in a recording medium, the apparatus includes: a cryptography device for encrypting information to be recorded in the recording medium by a cryptography with a encryption key managed by generation that is renewed to a different key for each generation; and a key acquisition device for making a comparison between the generation information in a generation-managed encryption key stored in an information recording storage device and a pre-registration generation information which is generation information. registration means pre-stored in the registration medium, and acquire a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the generation information of pre-registration when the result of the comparison is that the information The generation of pre-registration is more recent than the generation information in the encryption key handled by generation stored in a device. Likewise, in the aforementioned information recorder according to the present invention, the key acquisition device includes a communication interface that can receive data through a network.
In addition, in the aforementioned information register according to the present invention, the key acquisition device includes a communication modem that can receive data through a telephone line. In addition, in the aforementioned information recorder according to the present invention, the key acquisition device includes an I / C card interface that can receive data through an IC card. Furthermore, in the aforementioned information recorder according to the present invention, the encryption device performs a rr authentication. tua with a key service device when the key acquisition device must acquire the encryption key handled by generation and the key acquisition device effects the acquisition of the key handled by generation only when the authentication r.utual with the device of key service has been carried out successfully. Furthermore, in the aforementioned information recorder according to the present invention, the generation-managed encryption key stored in the device is a master key common to several information registers. Furthermore, in the aforementioned information recorder according to the present invention, the encryption device includes a device for renewing, when the pre-registration generation information is more recent than the generation information in the encryption key handled by generation stored in a device, a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the generation information of pre-registration. Furthermore, in the aforementioned information recorder according to the present invention, the encryption device includes a key generation device for creating, based on the cryptography key managed by generation stored in the device, a cryptography key managed by generation whose generation information is older than the generation information in the cryptography key managed by generation stored in the device. In addition, in the aforementioned information recorder according to the present invention, the encryption device includes a device for renewing, when the pre-registration generation information is more recent than the generation information in the encryption key managed by generation stored in a device, a cryptographic key managed by generation of a generation as recent or more recent than indicated by the generation information of pre-registration, and the key renewal device deciphers a key of encryption handled by generation to be renewed encrypted with a device key stored in the information recorder in order to create a cryptographic key managed by renewed generation. In addition, in the aforementioned information recorder according to the present invention, the encryption device acquires a key table wherein the cryptography key managed by cryptographic renewal generation and a key identifier of decryption device are correlated with each other. in order to decrypt the encryption key managed by generation to be renewed encrypted with a device key identified based on the device key identifier in the key table. In addition, in the aforementioned information recorder according to the present invention, the device key is a common key to information loggers grouped by classification into categories in a common category. Furthermore, in the aforementioned information recorder according to the present invention, the device key is a common key to information recorders belonging to the same group by grouping based on serial numbers assigned to the information recorders. further, in the aforementioned information register according to the present invention, a unique node key is provided for each of the nodes included in a hierarchical structure of tree type that includes several different information recorders as each of the leaves and a single sheet key for each of the information recorders, and a generation-driven encryption key is a key that can be renewed with at least either the node key or the sheet key. Furthermore, in the aforementioned information recorder according to the present invention, the encryption key managed by generation is a master key common to the various information recorders. Furthermore, in the aforementioned information recorder according to the present invention, the node key can be renewed, it is distributed when the node key must be renewed, a key renewal block (KRB) derived from the encryption of the key node renewed with at least either a node key or a leaf key at a lower stage of the tree-like structure to an information recorder on a sheet where the node key must be renewed and the encryption device in the information logger receives renewal data for the cryptographic key managed by crypto generation with the renewed node key, cryptography the key renewal block (KRB) to acquire the renewed node key, and acquires renewal data for the encryption key managed by generation based on the renewed node key acquired in this way. Furthermore, in the aforementioned information recorder according to the present invention, the key renewal block (KRB) is stored in a registration medium and the cryptography encryption device the key renewal block (KRB) read from of the recording medium. Furthermore, in the aforementioned information recorder according to the present invention, the encryption key managed by generation has a generation number as correlated renewal information, and the encryption device stores, as a record generation number in the middle of registration, a generation number of the encryption key managed by generation that has been used to store encrypted data in the recording medium. According to the third aspect of the invention, an information recorder can be provided to record information in a recording medium, the apparatus includes: a cryptography device for encrypting information to be registered in the recording medium through *. - =, -. &! * a cryptography with a cryptography key managed by generation that is renewed in a different key for each generation; and an interface that connects key renewal terminals for the connection of a key renewal terminal that performs a comparison between the generation information in a managed-by-generation encryption key stored in a device stored in a storage device of the information recorder and a pre-registration generation information that is a generation information of the pre-stored registration medium in the registration medium, and acquires a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the information of pre-registration generation when the result of the comparison is that the pre-registration generation information is more recent than the generation information in the encryption key managed by generation stored in the device. Furthermore, in the aforementioned information register according to the present invention, a mutual authentication is performed with the key renewal terminal to acquire the encryption key managed by generation from the key renewal terminal, and the key of encryption managed by generation that acquired only when the mutual authentication with the key renewal terminal has been carried out successfully. In addition, in the aforementioned information recorder according to the present invention, a unique node key is provided for each of the nodes included in a hierarchical structure of tree type that includes several different information registers each one as a sheet and a single-page key for each of the information recorders, and the encryption key managed by generation is a key that can be renewed with at least either the node key or the sheet key. Furthermore, in the aforementioned information recorder according to the present invention, the encryption key managed by generation is a master key common to several information registers. Furthermore, in the aforementioned information register according to the present invention, the node key can be renewed, it is distributed, when a node key is to be renewed, a key renewal block (KRB) derived from the encryption of the renewed node key with at least either a node key or a leaf key at a lower stage in the tree structure to an information logger on a sheet where the node key must be renewed, and the device encrypted in the information logger receives renewal data for the cryptographic key managed by crypto generation with the renewed node key, cryptography the key renewal block (KRB) to acquire the renewed node key, and acquires renewal data for the cryptography key managed by generation based on the renewed node key acquired in this way. Furthermore, in the aforementioned information recorder according to the present invention, the key renewal block (KRB) is stored in a registration medium and the cryptography encryption device the key renewal block (KRB) read from of the recording medium. Furthermore, in the aforementioned information recorder according to the present invention, the encryption key managed by generation has a generation number as correlated renewal information, and the encryption device stores, as a record generation number in the middle of registration, a generation number of the encryption key managed by generation that has been used to store encrypted data in the recording medium. In accordance with the fourth aspect of the present invention, an information player for reproducing information from a recording medium, the included apparatus, can be provided. A cryptography device for deciphering information read from the recording medium by a cryptography with a generation-managed encryption key that is renewed in a different key for each generation; and a user interface for effecting a comparison between the generation information in a decryption key handled by generation stored in device that is stored in a storage device of the information player and the generation information of record which is generation information which has been used to record information in the recording medium, and to send a warning when the result of the comparison is that the generation information of the record is more recent than the generation information in the decryption key handled by generation stored in the device. . Likewise, in the compliance information register for the present invention, the encryption device does not perform any decryption of information when a comparison is made between the generation information of the record which is the generation information that has been used to record the information in the recording medium and the pre-registration generation information which is a generation information of the record medium previously stored in the recording medium shows that the pre-registration generation information is more recent than the registration generation information . In addition, in the aforementioned information recorder according to the present invention, the decryption key managed by generation stored in the device is a master key stored in common for several information players. In addition, in the aforementioned information register according to the present invention, the encryption device includes a device for renewing, when the pre-registration generation information is more recent than the generation information in the decryption key handled by generation stored in device a decryption key managed by generation of a generation as recent or more recent than the generation indicated by the generation information of pre-registration. Furthermore, in the aforementioned information player according to the present invention, the encryption device includes a key creation device for creating, based on the decryption key handled by generation stored in the device, a decryption key managed by generation whose generation information is older than the generation information in the decryption key managed by generation stored in the device. Furthermore, in the aforementioned information player according to the present invention, the encryption device includes a device for renewing, when the registration generation information is more recent than the generation information in the encryption key handled by stored generation. in device, a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by a pre-registration generation information, and the key renewal device decrypts a cryptographic key handled by generation to be renewed encrypted with a device key stored in the information player in order to create a cryptographic key managed by renewed generation. In addition, in the aforementioned information player according to the present invention, the encryption device acquires a key table wherein the encryption key managed by cryptographic generation to be renewed and a key identifier of the decryption device are correlated with each other. to decrypt the cryptographic key managed by generation to be renewed encrypted with a device key identified based on the device key identifier in the key table. Furthermore, in the aforementioned information player according to the present invention, the device key is a common key for information players grouped by classification into categories in a common category. further, in the aforementioned information recorder according to the present invention, the device key is a common key to information players belonging to the same group by grouping based on serial numbers assigned to the information players. In addition, in the aforementioned information player according to the present invention, a unique node key is provided for each of the nodes included in a hierarchical tree-like structure that includes several different information players as each of the leaves and a single-page key for each of the information players, and the generation-driven encryption key is a key that can be renewed with at least any of the node key or sheet key. Furthermore, in the aforementioned information player according to the present invention, the encryption key managed by generation is a master key common to the various information players. Furthermore, in the aforementioned information player according to the present invention, the node key can be renewed, it is distributed, when the node key has to be renewed, a key renewal block (KRB) derived from the encryption of the renewed node key with at least any of a node key or a sheet key in a lower stage of the tree-like structure to an information player in a sheet where the node key must be renewed, and the device Cryptography receives renewal data for the decryption key handled by generation encrypted with the renewed node key, cryptography the key renewal block (KRB) to acquire the renewed node key, and acquires renewal data for the decryption key managed by generation based on the renewed node key acquired in this way. Furthermore, in the aforementioned information player according to the present invention, the key renewal block (KRB) is stored in a recording medium and the cryptography encryption device the key renewal block (KRB) read from of the recording medium. In addition, in the aforementioned information player according to the present invention, the decryption key handled by generation has a generation number as correlated renewal information, and to decrypt cryptographic data read from the recording medium, the cryptographed reads from the recording medium a generation number of the encryption key managed by generation that has been used to encrypt the data and decrypts the encrypted data with a decryption key managed by generation corresponding to the generation number read from this shape. According to a fifth aspect of the invention an information player can be provided to reproduce information from a recording medium, the apparatus includes: a cryptography device for deciphering the information read from the recording medium by a cryptography with a decryption key managed by generation that is renewed in a different key for each generation; and a key acquisition device for making a comparison between the generation information in a decryption key handled by generation stored in device stored in a storage device of the information player and a generation information of record that is generation information which has been used to record the information, and acquire a decryption key managed by generation of a generation as recent or more recent than the generation indicated by the record generation information when the comparison result is that the generation information of record it is more recent than the generation information in the decryption key managed by generation stored in the device. Likewise, in the aforementioned information player according to the present invention, the encryption device does not perform decryption of information when a comparison is made between the record generation information which is generation information that has been used to record the information in the recording medium and the pre-registration generation information which is a record medium generation information previously stored in the record medium shows that the pre-record generation information is more recent than the generation information register. Likewise, in the aforementioned information player according to the present invention, the key acquisition device includes a communication interface capable of receiving data through a network. In addition, in the aforementioned information player according to the present invention, the key acquisition device includes a communication modem that can receive data through a telephone line. Furthermore, in the aforementioned information player according to the present invention, the key acquisition device includes an I / C card interface that can receive data through an IC card.
Furthermore, in the aforementioned information player according to the present invention, the encryption device performs a mutual authentication with the key service device when the key acquisition device is about to acquire the decryption key handled by generation , and the key acquisition device effects the acquisition of the key handled by generation only when the mutual authentication with the key service device is carried out successfully. Furthermore, in the aforementioned information player according to the present invention, the decryption key managed by generation stored in the device is a master key common to several information players. Furthermore, in the aforementioned information recorder according to the present invention, the encryption device includes a device for renewing, when the generation information of the record is more recent than the generation information in the decryption key handled by stored generation. in device, a decryption key managed by generation of a generation as recent or more recent than the generation indicated by the record generation information. In addition, in the information player mentioned above in accordance with the present invention, the encryption device includes a key creation device for creating, based on the encryption key managed by generation stored in the device, a key of decrypted 5 managed by generation whose generation information is older than the generation information in the decryption key handled by generation stored in the device. Furthermore, in the aforementioned information player of ^ fc, according to the present invention, the encryption device includes a device for renewing, when the registration generation information is more recent than the generation information in the decryption key. managed by generation stored in device, a key of 15 encryption managed by generation of a generation as recent or more recent than the generation indicated by the registration generation information, and the • key renewal decrypts a decryption key managed by generation to be renewed encrypted with a password of 20 device stored in the information player to create a cryptographic key managed by renewed generation. Furthermore, in the aforementioned information player according to the present invention, the device of 25 encryption acquires a key table in which the encryption key managed by cryptographic renewal generation and a decryption device key identifier are correlated to decipher the cryptography key handled by generation to be renewed encrypted with an identified device key based on the device key identifier in the key table. Furthermore, in the aforementioned information player according to the present invention, the device key is a common key to information players grouped by distribution by categories in a common category. Furthermore, in the aforementioned information player according to the present invention, the device key is a common key to information players belonging to the same group by grouping based on serial numbers assigned to the information players. In addition, in the aforementioned information player according to the present invention, a unique node key is provided for each of the nodes included in a hierarchical structure of tree type that includes several different information players each one as a sheet and a single sheet key for each of the information players, and the decryption key managed by generation is a key that can be renewed with at least any of the node key or sheet key. Furthermore, in the aforementioned information player according to the present invention, the decryption key handled by generation is a master key common to the various information players. Furthermore, in the aforementioned information player according to the present invention, the node key can be renewed, it is distributed, when the node key must be renewed, a key renewal block (KRB) that is derived from the decryption of the renewed node key with at least either a node key or a leaf key at a lower stage of the tree-like structure to an information player on a sheet where the node key must be renewed, and the cryptographic device receives renewal data for the decryption key handled by generation encrypted with the renewed node key, cryptography the key renewal block (KRB) to acquire the renewed node key, and acquires renewal data for the key of decryption handled by generation based on the renewed node key acquired in this way. Furthermore, in the aforementioned information player according to the present invention, the key renewal block (KRB) is stored in a registration medium and the cryptography encryption device the key renewal block (KRB) read from of the recording medium. Furthermore, in the aforementioned information player according to the present invention, the decryption key handled by generation has a generation number as correlated renewal information and to decrypt cryptographic data read from the registration means, the encryption device reads, from the recording medium, a generation number of the encryption key managed by generation that has been used to encrypt the data and decrypts the encrypted data with a decryption key managed by generation corresponding to the generation number read from this form. According to the sixth aspect of the present invention, an information player can be offered to reproduce information from a recording medium, the apparatus includes: a cryptography device for deciphering information read from the recording medium by cryptography with a decryption key managed by generation that is renewed in a different key for each generation; and a key renewal terminal connection interface for connecting a key renewal terminal that performs a comparison between the generation information in a generation-managed encryption key stored in a device stored in a device. • storage device of the information player 5 and the generation information of the record which is generation information that has been used to record the information in the recording medium and acquires a decryption key managed by generation of such a recent generation or more recent than indicated by the 10 generation information in the decryption key handled by generation stored in device when the result of the comparison is that the generation information of record is more recent than the generation information in the decryption key handled by generation stored in 15 the device. Furthermore, in the aforementioned information player according to the present invention, a mutual authentication is performed with a key service device when the key acquisition device is about to 20 acquiring the decryption key handled by generation, and the acquisition of the key handled by generation is effected only when the mutual authentication with the key service device has been carried out successfully. Also, in the aforementioned information player of In accordance with the present invention, a unique node key is provided for each of the nodes included in a tree-like hierarchical structure that includes several different information players each on a sheet and a single-page key for each of them. the players of information, and the decryption key managed by generation is a key that can be renewed with at least any of the node key or sheet key. Furthermore, in the aforementioned information player according to the present invention, the decryption key handled by generation is a master key common to the various information players. Furthermore, in the aforementioned information player according to the present invention, the node key can be renewed, it is distributed, when the node key has to be renewed, a key renewal block (KRB) derived from the decryption of the renewed node key with at least either a node key or a leaf key at a lower stage of the tree structure to an information player on a sheet where the node key must be renewed, and the device encrypted in the information player receives renewal data for the decryption key handled by generation encrypted with the renewed node key, encodes the key renewal block (KRB) to acquire the renewed node key, and acquires renewal data for the decryption key managed by generation based on the renewed node key acquired in this way. In addition, in the aforementioned information player according to the present invention, the key renewal block (KRB) is stored in the registration means and the cryptography encryption device the key renewal block (KRB) read from of the recording medium. Furthermore, in the aforementioned information player according to the present invention, the decryption key managed by generation has a generation number as correlated renewal information, and for the decryption of encrypted data read from the recording medium, the The cryptographic device reads, from the recording medium, a generation number of the encryption key managed by generation that has been used to encrypt the data and decodes the encrypted data with a decryption key managed by generation corresponding to the number of generation read in this way. In accordance with the seventh aspect of the present invention, a method of recording information for recording information in a recording medium can be provided, the method includes the steps of: deciphering information to be recorded in the recording medium by a cryptography with a encryption key managed by generation that is renewed in a different key for each generation; making a comparison between generation information in a generation-managed encryption key stored in a device stored in a storage device and a pre-registration generation information and information recorder, which is a previously stored record medium generation information in the middle of registration; and producing a warning when the result of the comparison is that the pre-registration generation information is more recent than the generation information in the encryption key managed by generation stored in the device. According to the eighth aspect of the present invention, an information recording method for recording information in a recording medium can be provided, the method includes the steps of: encrypting information to be recorded in the recording medium by a cryptography with a encryption key managed by generation that is renewed in a different key for each generation; and making a comparison between the generation information in a cryptographic key managed by generation stored in the device stored in a storage device of the information recorder and the generation information of pre-registration which is a generation information of registration means previously. stored in the record medium; and acquiring a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the generation information of pre-registration when the result of the comparison is that the generation information of pre-registration is more recent than The generation information in the cryptography key managed by generation stored in the device. In addition, in the aforementioned information registration method according to the present invention, the step of acquiring the key can also include the steps of: renewing the key of encryption handled by generation with at least any of a single node key for each of the nodes included in a hierarchical tree-like structure that includes several different information registers each as a single sheet sheet or key for each one of the information recorders; and the encryption of data to be registered in the registration medium with the encryption key managed by renewed generation in the renewal step. In addition, in the aforementioned information registration method according to the present invention, the encryption key managed by generation is a master key common to the various information recorders.
In addition, in the aforementioned information registration method according to the present invention, the node key can be renewed; is distributed, when a node key is to be renewed, a key renewal block (KRB) derived from the encryption of the renewed node key with at least any of a node key or a leaf key at a lower stage of the tree structure to an information recorder on a sheet where the node key must be renewed; and the renewal step further includes the steps of: acquiring a renewed node key by encryption of the key renewal block (KRB); and calculate renewal data for the encryption key managed by generation based on the renewed node key acquired in this way. Further, in the aforementioned information registration method according to the present invention, the generation-driven encryption key has a generation number as correlated renewal information; and the encryption step further includes the step of: storing, as a registration generation number in the recording medium, a generation number of the encryption key handled by generation that has been used to store encrypted data in the registration medium . According to the ninth aspect of the present invention, a method of reproducing information for reproducing information from a recording medium can be provided, the method includes the steps of: deciphering information read from the recording medium by cryptography with a cryptographic key managed by generation that is renewed in a different key for each generation; making a comparison between generation information in a decryption key handled by generation stored in device stored in a storage device of the information recorder and recording generation information that is generation information that has been used to record information in the registration means; and producing a warning when the result of the comparison is that the record generation information is more recent than the generation information in the decryption key handled by generation stored in the device. According to the tenth aspect of the present invention, a method of reproducing information for reproducing information from a recording medium can be provided, the method includes: deciphering the information read from the recording medium by a cryptography with a decryption key managed by generation that is renewed in different keys for each generation; making a comparison between generation information in a decryption key handled by generation stored in device stored in a storage device of the information recorder / player and the generation information of record which is generation information that has been used to record information; and acquiring a decryption key managed by generation of a generation as recent or more recent than the generation indicated by the record generation information when the result of the comparison is that the generation information of the record is more recent than the generation information. in the decryption key handled by generation stored in device. Furthermore, in the aforementioned information reproduction method, in accordance with the present invention, the key acquisition step further includes the steps of: renewing the decryption key handled by generation with at least any of a single node key for each of the nodes included in a tree-like hierarchical structure that includes several different information players each as a single sheet sheet or key for each of the information players; and decipher data to be registered in the registration medium with the decryption key managed by renewed generation in the renewal step. Furthermore, in the aforementioned information reproduction method according to the present invention, the decryption key handled by generation is a master key common to the various information players. In addition, in the method of reproducing information according to the present invention, the node key can be renewed; is distributed when a node key must be renewed, a key renewal block (KRB) that is derived from the encryption of the renewed node key with at least any of a node key or sheet key at a lower stage of the tree structure to an information player on a sheet where the node key must be renewed; and the renewal step also includes the steps of: acquiring a renewed node key by means of the crypto-key of the key renewal block (KRB); and calculate renewal data for the decryption key managed by generation based on the renewed node key acquired in this way. Furthermore, in the aforementioned information reproduction method according to the present invention, the decryption key handled by generation has a generation number as correlated generation information; and the decryption step further includes passing the points reading a generation number of the encryption key handled by generation that has been used to encrypt the data from the registration means; and deciphering the encrypted data read from the recording medium with a decryption key handled by generation corresponding to the generation number read in this way. According to an eleventh aspect of the present invention, an information recording means can be provided in which information can be recorded, the recording medium has stored there: pre-registration generation information as generation information on a key allowed as a cryptography key that can be used to write encrypted data in the information recording medium or a decryption key that can be used to decrypt data read from the information recording medium. Also, in the aforementioned information recording medium according to the present invention, the pre-registration generation information is recorded in a non-writing area thereof. In accordance with the twelfth aspect of the present invention, a key renewal terminal can be provided to service a renewed generation key to an information recorder or information player having a cryptography device for encrypting information to be recorded in a means of registration or an information recorder or information player that has a cryptographic device for deciphering information read from a recording medium, each by a cryptography with a key managed by generation that can be renewed in a different key for each generation, the apparatus includes: an interface that can be connected to a recorder or information player; a device for communications with the outside; and a device for controlling each of the acquisitions of a unique identifier for a device from the information recorder or player through the interface, transmission of the unique identifier of the device through the communication device, and transfer of the device. the key managed by generation renevada to the recorder or player through the interface. In accordance with the thirteenth aspect of this In the invention, a key renewal terminal can be provided to serve a key managed by renewed generation to an information recorder or player having a cryptography device for encrypting information to be recorded in a registration medium or a 20 recorder or player of information that has a device of encryption to decipher information read from a means of registration, each one through a cryptography with a key managed by generation that can be renewed in a different key for each 25 generation, the apparatus includes: an ipterface that can be connected to the information recorder or player; a storage device having stored there a key table wherein a key handled by generation encrypted with a unique encryption key for the device is correlated with a unique identifier for the recorder or player; and a device for controlling each acquisition of the unique identifier for device from the information recorder or player through the interface, acquisition based on the identifier fc 10 unique for the device, of a key handled by encrypted generation corresponding to the unique identifier for device from the device of storage and transfer of the key managed by renewed generation to the recorder or player of information through the 15 interface. Also, in the aforementioned key renewal terminal according to the present invention, a mutual authentication is performed with the information recorder or player; and the key handled by 20 generation is sent to the information recorder or player only when mutual authentication has been successful. In accordance with the fourteenth of the present invention, a managed key renewal method can be provided 25 per generation to send a key managed by renewed generation to an information recorder or player having a cryptographic device for encrypting the information to be recorded in a recording medium or a recorder or player of information having a encryption device for decipher information read from a recording medium, each time through a cryptography with a key managed by generation that can be renewed in a different key for each generation, the method includes the steps of: connecting a 10 key renewal terminal that includes an interface that can be connected to the information recorder or player and a device for communication with the outside to the information recorder or player; acquire a unique identifier for a device from 15 recorder or player of information through the Interface; transmit the unique identifier for device through the communications device; receive the key managed by renewed generation through the communications device; and transfer the key handled by generation 20 renewed to the recorder or player of information through the interface. In accordance with the fifteenth aspect of the present invention, a key renewal method managed by generation can be provided to send a managed key 25 per renewed generation to an information recorder or player having a cryptographic device for encrypting information to be recorded in a recording medium or an information recorder having a encryption device for deciphering the information read from a medium of registration, each time by a cryptography with a key managed by generation that can be renewed in a different key for each generation, the method includes the steps of: connecting the key renewal terminal that includes an interface that can be connected to the registrar or information player and a storage device that has stored there a key table where a key handled by crypto generation with a unique encryption key for a unique key for device is correlated with a unique identifier for device of the information recorder or player to the recorder or reproduce information tor; acquire the unique identifier for the device from the information recorder or player through the interface; acquiring, based on the unique device identifier, a key handled by encrypted generation that corresponds to the unique device key from the storage device; and transferring a key managed by renewed generation to the recorder or player of information through the interface. Also, in the above-mentioned generation key renewal method according to the present invention, mutual authentication is performed with the information recorder or information player; and the key managed by renewed generation is sent to the recorder or player of information only when the mutual authentication has been successful. In accordance with the sixteenth aspect of the present invention, a program service means may be provided to service a computer program under which the information is recorded in a means of recording in a computer system, the program of compute includes the steps of: effecting a comparison between the generation information in a generation-managed encryption key stored in a device stored in a storage device of an information recorder and the pre-registration generation information which is information of generation of record medium previously stored in the recording medium; cryptography the information to be stored in the recording medium through a cryptography with a cryptography key managed by generation that can be renewed in a different key for each generation; and effecting at least the generation of a warning or the acquisition of a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the generation information in the cryptography key handled by generation stored in the device when The result of the comparison is that the information • generation of pre-registration is more recent than generation information 5 in the cryptography key managed by generation stored in the device. Furthermore, in the aforementioned program service medium in accordance with the present invention, the computer program also includes the step of renewing the key of 10 encryption handled by generation by means of encryption of encrypted data read from the registration means with at least any of a single node key for each of the nodes included in the hierarchical structure in the form of a tree including several 15 different information recorders each one as a sheet or a single sheet key for each of the information recorders. In accordance with the seventeenth aspect of the present invention, a service means of In order to serve a computer program under which the information is recorded in a recording medium in a computer system, the computer program includes the steps of: making a comparison between the generation information in a cryptographic key managed by 25 generation stored in a device that is stored in a storage device of an information player and the generation information of record which is a generation information that has been • used to record the information in the middle of 5 registration; decipher the information read from the means of registration by cryptography with a decryption key managed by generation that can be renewed in a different key for each generation; and perform at least either the sending of a warning or the acquisition of a key 10 of encryption managed by generation of a generation • as recent or more recent than the generation indicated by the generation information in the decryption key handled by generation stored in the device when the result of the comparison is that the generation information of The record is more recent than the generation information in the decryption key handled by generation stored in the device. • In addition, in the above-mentioned program service medium for the present invention, the computer program includes 20 also a step to renew the description key managed by generation by renewing encrypted data read from the registration medium with at least one single node key for each of the nodes included in the hierarchical structure of tree 25 including several players with different information, each one as a sheet or a single sheet key for each of the information players. In accordance with the present invention, when the • generation of a master key stored in a player 5 is older than the generation in which data has been recorded in such a way that the data can not be reproduced, the user is requested to renew the master key and acquire a master key necessary for the reproduction of the data. The master key is acquired using a transmission medium such as means other than the recording medium having data recorded there, network, or the like, and the data is displayed with the master key acquired in this way. Thus, in accordance with the present invention, when the generation of a registered stored master key is older than a generation of a master key necessary to register data in a recording medium in such a way that the data can not be recorded, the user is 20 indicates that you renew the master key and acquire a master key needed to record the data. The master key is acquired using a transmission medium such as a medium other than the recording medium in which the data must be registered, network or similar, and the data is 25 registered with the master key acquired in this way.
Note that the means serving the program in accordance with aspects sixteen and seventeen of the present invention are, for example, a means that sends a computer program in a computer-readable form to a computer system for general purposes that can Make several program codes. The medium is not limited to any special form but can be any means of registration, for example CD, FD, MO, etc., and transmission medium, such as network. The means serving the aforementioned program define a functional or structural collaboration between a computer program and a means for performing functions of a predetermined computer program in a computer system. In other words, when the computer program is installed in a computer system, -through the program, the medium that serves the program, works collaboratively in the computer system in order to offer similar effects to the obtained objects. in the other aspects of the invention. These objects and other objects add features and advantages of the present invention will be more apparent from the following detailed description of the preferred embodiments of the present invention when taken in combination with the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a block diagram showing the construction of the encryption unit included in the information recorder / player of the present invention. Figure 2 illustrates the master key handling in the information recorder / player in accordance with the present invention. Figure 3 shows a flow of operations carried out in the renewal of a master key in the information recorder / player according to the present invention. Figure 4 is a block diagram of master key renewal in the information recorder / player in accordance with the present invention. Figure 5 shows a flow of operations carried out in the reproduction of information in the information recorder / player according to the present invention. Figure 6 is a block diagram showing the construction of the information recorder / player (mode 1) in accordance with the present invention. Figure 7 is a block diagram showing the construction of the encryption unit that can perform strict master key generation handling in the information recorder / player in accordance with the present invention. Figure 8 shows the master key handling in the information recorder / player according to the present invention, which can effect the strict handling of the master keys. Figure 9 shows a flow of operations carried out in the content register in the information recorder / player according to the present invention, which can carry out strict handling of the master keys. Figure 10 shows a flow of the operations performed in the master key renewal in the information recorder / player in accordance with the present invention, which can effect a strict master key handling. Figure 11 shows the storage of master key generation information in the recorder / player of 15 information in accordance with the present invention, which can effect strict master key handling. Figure 12 shows a flow of the operations performed in the reproduction of content in the information recorder / player according to the present invention, which 20 can carry out strict handling of master keys. Figure 13 is a block diagram showing the construction of the information recorder / player (mode 2) in accordance with the present invention. Figure 14 shows the flow of operations carried out 25 in the content register in the information recorder / player (mode 2) in accordance with the present invention, which can perform a strict master key handling. Figure 15 shows a flow of the operations carried out in the reproduction of content in the information recorder / player (mode 2) according to the present invention, which can effect a strict handling of the master keys. Figure 16 is a block diagram showing the construction of the information recorder / player (mode 3) in accordance with the present invention. Figure 17 shows a flow of the operations performed in the content register in the information recorder / player (mode 3) in accordance with the present invention, which can perform a strict master key handling. Figure 18 shows an authentication sequence (common key system) that can be applied to the acquisition of key in the information recorder / player in accordance with the present invention. Figure 19 shows an authentication sequence (public key system) that can be applied to the acquisition of key in the information recorder / player in accordance with the present invention. Figure 20 shows the configuration of a public key certificate that is used in the authentication application for key acquisition in the information recorder / player in accordance with the present invention. Figure 21 shows the configuration of a revocation list in the information recorder / player according to the present invention. Figure 22 shows the configuration of record list in the information recorder / player in accordance with 10 the present invention. Figure 23 shows a flow of the operations performed in content reproduction in the information recorder / player in accordance with the present invention. Figure 24 is a block diagram showing the 15 construction of the key renewal terminal that is used in the information recorder / player in accordance with the present invention. Figure 25 is a block diagram explaining an example (1) of key renewal with the renewal terminal 20 key in the information recorder / player in accordance with the present invention. Figure 26 shows an authentication sequence (common key system) that uses the key renewal terminal, applicable to the acquisition of keys in the 25 information recorder / player in accordance with the present invention. Figure 27 shows an authentication sequence (public key system) using the key renewal terminal, applicable to the acquisition of keys in the information recorder / player in accordance with the present invention. Figure 28 shows an example of the key table contained in an institute issuing keys, used in the acquisition of keys by the key renewal terminal in the information recorder / player in accordance with the present invention. Figure 29 is a block diagram explaining an example (2) of the renewal of keys with the key renewal terminal in the information recorder / player in accordance with the present invention. Figure 30 is a block diagram explaining an example (3) of the key renewal with the key renewal terminal in the information recorder / player in accordance with the present invention. Figure 31 is a block diagram explaining an example (4) of the key renewal with the key renewal terminal in the information recorder / player in accordance with the present invention. Figure 32 shows a tree-type structure diagram that explains the encryption of keys such as a master key, media key and the like in the information recorder / player in accordance with the present invention. Figures 33A and 33B show examples of the key renewal block (KRB) which is used in the distribution of keys such as a master key, media key and the like is a block diagram (1) explaining key renewal with the key renewal terminal in the information recorder / player in accordance with the present invention. Figure 34 shows examples of key distribution and decryption using the key renewal block (KRB) for the master key in the information recorder / player in accordance with the present invention. Figure 35 shows a flow of operations performed in the decryption using the key renewal block (KRB) for the master key in the information recorder / player in accordance with the present invention. Fig. 36 is a block diagram explaining a procedure, followed in the information recorder / player according to the present invention, to receive KRB from the outside through a communications device or the like and its storage in an environment of registry . Figure 37 shows a flow of the operations performed in the reception of KRB from outside through the communication devices or the like and their storage in an er recording medium. the information recorder / player in accordance with the present invention. Figure 38 explains the procedure, followed in the information recorder / player in accordance with the present invention, to receive KRB from outside through the communication devices or the like and its storage in a recording medium. Figure 39 shows an example of the recording medium that can be used in the system according to the present invention. Figure 40 is a block diagram showing the construction of the data processor that processes data through a programmatic in the information recorder / player in accordance with the present invention. PREFERRED MODE OF THE INVENTION 1. Basic System Configuration for Managing Master Key Generation Referring now to Figure 1, an embodiment of the information player according to the present invention is schematically illustrated in the form of a block diagram. mainly the encryption unit. The information player is generally indicated with a reference 100. The information player 100 includes a device key retainer 101 which retains a device key DK_j assigned to the information player 100. The information recorder / player 100 also includes a retainer of encrypted data 102 retaining a cryptographic master key C (j, i) (master key MK_i encrypted with the device key DK). The relationship between the device key DK_j, master key MK_i and encrypted master key C (j, i) is expressed by C (j, i) = Enc (CK_j, MK_i). Note that "i" indicates a generation number of the master key, "j" indicates a category number. The category number is a number assigned to a device such as an information player or the like. It is assigned to each predetermined unit such as a device, device manufacturer, device model, device batch or a predetermined number of devices, for example, a serial number attached to a device. The device key DK_j will be known simply as "DK device key" below when the device key DK_j does not have to be identified with a category number j_- D similarly, the master key MK will be known simply as "master key" MK "below when it does not have to be identified with the generation number i. Correspondingly, the cryptographic master key C (j, i) will be known simply as "C encrypted master key" below. The device key DK and the encrypted master key C are provided to a device from a key issuing institute, and stored previously. The key issuer stores the MK encrypted master key while confidentially storing the DK device key in correlation with the category number j_. The information player 100 further includes a master key decoding unit 103 which uses the device key DK retained in the device key retainer 101 to decrypt the encrypted master key C stored in the encrypted data retainer 102, thereby acquiring the master key MK. That is, considering that a key through which an encrypted data X is deciphered with a key Y is DEC (X, Y), the master key decryption unit 103 calculates an equation MK_i = DEC (DK_j, C (j , i)). The master key MK acquired in this way is supplied to a cryptographic analysis unit 104 also included in the information player 100. The cryptographic analysis unit 104 uses the master key 104 supplied from the master key decryption unit 103 for cryptographically analyzing data encrypted with the master key MK, read by the data reader 105 from a recording medium (optical disk) 150 or the like. More particularly, the recording medium 150 • it has registered there data that has been encrypted with the master key MK, and the cryptographic analysis unit 104 cryptographically analyzes (decrypts) the data encrypted with the master key MK. When the cryptographically analyzed data is image data, for example, it will be sent to a visualization device and 10 presented visually in said device. Likewise, a • data reader 105 is included in the information player 100. In order to renew the master key MK as will be described below, the data reader 105 will read, from the recording medium (optical disk) 150 that has 15 there to record data to be renewed, the encrypted master key C derived from the encryption of the master key MK with the device key DK, and send it to the encrypted data retainer 102. The renewal of the key will be described below. 20 master MK in the information player 100. The master key MK is irregularly renewed, for example, when the master key MK_i having a generation number i_ has been discovered by an attacker or the like, or regularly at predetermined intervals . TO Next, it is considered that to renew the master key MK_i, an optical disk that has registered there a master key MK_i that has been encrypted with the device keys DK_j of all the devices (master key cryptographed C (j, i)) is distributed from the key issuing institute to the information player 100. Note that the encrypted master key C (j, i) can obviously be distributed through a recording medium other than an optical disk or through a network such as Internet. Likewise, the recording medium (optical disk) 150 does not have to be a dedicated recording medium for the renewal of the master key MK_i, but it can be any one that has registered there a content such as video data, audio data. or similar, or a means of registration in which content can be recorded in the future. Figure 2 shows an example of the cryptographic master key C (j, i) registered in the recording medium (optical disk) 150. It is an example of the renewal of a master key MK_i of a generation ia a master key MK_i + l of a generation i + 1. That is, the optical disc 150 has there registered a category number j_ AND a cryptographic master key C (j, i + 1) derived from the encryption of the master key MK_ i + 1 with the device key DK_j of the category number j . in accordance with the correlation between them.
As can be seen from Figure 2, the master key MK_i + l is common to all category numbers j_, that is, to all devices. Thus, this common character of the MK master key to all devices allows licensed devices each to contain a formal DK device key to use data encrypted with the common MK master key, i.e. interoperability is maintained. Any device that does not have the formal device key DK can not decrypt the master key MK and therefore can not decrypt data that has been encrypted with the master key MK. For example, when a device of a category 2 number has been attacked by an attacker, and it is known that the device key DK_2 has been opened, the field for a cryptographic master key C (2, i + 1) corresponding to the category number 2, of the data to renew the master key MK (encrypted master key C (j, i + 1)), will be invalidated as shown in figure 2. Thus, the failure to grant a master key MK_i + From a new generation to the device whose DK device key has been discovered due to said attack, it is possible to remove the device having the device key DK_2 from a group of devices each of them having the legal right of use. With reference now to figure 3, a flow of operations carried out in the renovation of the master key is shown. The operations of the information player for renewing the master key MK_i from a generation i to a master key MK_i + l of a generation i + 1 will be described below with reference to the flow diagram. In step S1301, the recording medium (optical disc) 150 which has data recorded there for the renewal of the master key MK mentioned above is set by the user in the information player. In step S302, the data reader 105 in the information player reads, from the optical disc established in this way 150, a cryptographic master key C (j, i + 1) assigned to the category number j_ of the information player (stored device key DK). For example, when the category number j. is "3", the data reader 105 reads a cryptographic master key C (3, i + 1). The encrypted master key C (j, i + 1) read in this way is stored in the encrypted data retainer 102 in step S303. Thus, only the renewed master key C (j, i + 1) is stored in the encrypted data retainer 102. For the reproduction of data that has been encrypted with the master key MK registered in the optical disk 150 through the use of the master key C (j, i + 1) stored in the encrypted data retainer 102, the master key decryption unit 103 decrypts the encrypted master key C (j, i + 1) stored in the encrypted data retainer 102 with a device key DK_j retained in the device key retainer 101 for acquiring a master key MK_i + l as shown in Figure 4. Then, the encrypted data recorded in the recording medium (optical disk) 150 is decrypted with the master key MK_i + l. Figure 5 shows a flow of the operations performed in this data reproduction procedure. First, in step S5001, the data reader 105 in the information player reads data from the recording medium (optical disc) 150 set in the information player. It should be remembered that the recording medium (optical disc) 150 includes an input area and a data area and the input area has registered there file names and TOC (table of contents) as for example directory information of the data registered in the data area. Likewise, the input area has registered there data (generation information) that indicate the generation of a master key MK that has been used to encrypt the data in the data area. Note that the generation information indicates the generation of an MK master key used to encrypt data to be recorded. Thus, generation information will be known as "record generation information" below, if appropriate. In step S501, the data reader 105 reads data from the input area and the information player proceeds to step S502 where the key decoding unit 5 master 103 checks, based on the data read by the reader data 105 and supplied through the encrypted data retainer 102, the generation i of the master key MK that has been used to encrypt the data in the data area of the recording medium 150. Then, the information player 10 continues until step S503 wherein the master key decryption unit 103 creates a master key MK_i for generation i. of the MK master key that you have examined. For example, when generating the master key 15 examined in this way MK is the last generation i + 1, the master key decryption unit 103 uses the DK device key retained in the key retainer of • device 101 for deciphering the encrypted master key C (j, i + 1) stored in the data retainer 20 encrypted 102, in order to create a master key MK_i + l. When the generation of the MK master key that has been examined as described above is a generation older than the generation retained in the data retainer 25 encryption 102, the master key decryption unit 103 creates an MK master key of this generation from the encrypted master key C stored in the encrypted data retainer 102. That is, the • master key decryption 103 first deciphers the master key 5 MK_i + l as above. Then, the master key decryption unit 103 retains a function of one direction f and applies the master key MK_i + l to the one-way function f several times correspondingly to a difference between the generation of the master key MK_i + 1 and the generation 10 examined the master key MK, thus creating an MK master key of the examined generation. For example, when the generation number of the master key MK stored in the encrypted data retainer 102 is i + 1 and when the generation number 15 of the master key MK read as above is i-1, the master key MK_i-l is created by the master key decryption unit 103 using the one-way function f twice and calculating f (f (MK _? + L )). When the generation number of the master key MK stored in the data retainer 20 encrypted 102 is i + 1 and that the master key MK read as above is a generation i-2, the master key MK_i-2 is created by the master key decryption unit 103 using the one-way function f three times and calculating f (f (f (MK_i + l))). 25 It must be remembered here that the function of one direction can be, for example, the verification function. More particularly, it can be for example MD5 (message summary 5) SHA-1 (secure verification algorithm-1) or the like. He • institute issuing default keys master keys 5 MK_1, MK_2, ...., MK_N from which master keys each of a generation older than the generation of a master key for the device in question can be created using the one-way function That is, first, a master key MK-N is established that has the 10 generation number N, the one-way function is applied once to the master key MK_N for each generation to be determined, and then the oldest master keys MK_N-1, MK_N-2, ..., MK_1 are created sequentially. the master key MK_N. Then, the master keys created from this 15 form are used in sequence starting with the master key MK_1 of the oldest generation. Here we are going to consider that the function of a sense used for the creation of a master key of a generation older than the generation of a master key from the The device in question is set in the master key description unit 103 of each information player. Likewise, the function of a sense can be public key cryptography for example. In this case, the institute The key issuer has a private key based on public key cryptography and provides a public key for the private key to each of the information players. The key issuer institutes a MK_1 master key of the first generation and uses the master key MK_1 first. That is, when a master key MK_i of the second generation is the required key, the key issuer institutes that key for its use by converting a master key MK_i-l from a generation that is a generation older than the key master MK_i with the private key. This also applies to any master key of the third generation and subsequent generation. In this case, the key issuing institute does not have to create a master key that has the generation number N using the one-way function in advance. Theoretically, this method can be used to create master keys of an infinite number of generations. Note that if the information player has a one-generation MK master key, it can acquire a master key from a generation older than that generation by converting the master key MK with the public key. As above, the master key decryption unit 103 can use a master key C derived from the encryption of an MK master key of the last generation to create an MK master key of a generation older than the generation. Thus, the encrypted data retainer 102 only has to store there the encrypted master key C of the master key MK of the last generation. When the master key MK of the generation examined in step S503 is created (decrypted), the data reader 105 reads data from the data area in the recording medium (optical disk) 150 in step S504. Further, in step S504, the cryptographic analysis unit 104 uses the master key MK acquired in step S503 to cryptographically analyze (decrypt) the data read by the data reader 105. When the data is cryptographically analyzed in this way (decrypted) they are image data, for example, said data is sent to a display device and displayed visually in said display device in step S305. Since an MK master key from which a master key of a generation older than the generation of the master key for the device in question can be created is renewed by encrypting the MK master key with a DK device key retained by each device and distributing it to each device, as above, it is possible to renew the MK master key and remove a device that has a discovered device key DK while maintaining interoperability. Also, since each device having a master key MK of the last generation can create a master key designated MK using a function of one direction f, the device can have a correspondingly reduced memory capacity. In the information player, the MK master key used to decrypt the data is discarded after finishing the decryption. When the master key MK becomes necessary again, a corresponding master key can be created by decrypting the encrypted master key C with the device key DK. In the information player, it is possible to prevent the MK master key from becoming less confidential due to the fact that it is not encrypted. In this embodiment, only a C-encrypted master key of a generation that is one generation after the renewal of the master key C is stored in the encrypted data retainer 102. In addition, however, a C-encrypted master key of each generation can be stored in the encrypted data retainer 102. In this case, since the master key MK of each generation can not be acquired by calculation, the load of the data processing will be correspondingly reduced. Note that since the master keys MK_1, MK_2, .., MK_N from which master keys of older generations can be created using a one-way function, can not be used to create master keys of more recent generations as above , in such a way that no data can be deciphered with a key • MK teacher of a new generation created from a 5 master key of an older generation. It must be remembered, however, that the renewal of an MK master key allows to protect encrypted data with any MK master key of a generation that is one after the renewal of the MK master key but they exist 10 certain problems regarding the protection of data encrypted with an MK master key not yet renewed. More particularly, the master key renewal method mentioned above presents a problem in the sense that it can be applied to a data logger. 15 encrypted with a master key and encrypted data with a master key of a generation older than the generation of the master key used to encrypt the data, can be reproduced from a recording medium by an information player that has been 20 attacked by an attacker and that has not received any MK master keys of a new generation (ie, a device to be revoked) but that has a MK master key of a generation older than the generation of the master key used to encrypt the data, as above. 25 Therefore, if a registrar in which data is encrypted with an MK master key of an older generation, that is, a player in which the master key MK is not renewed or can not be renewed, it is used during a Prolonged period of time, the data will be 5 possibly deciphered by a player of inappropriate information, that is, an information player that does not have any MK master key of a new generation, sometimes over a long period of time. 2. System configuration for strict administration of 10 Master Key Generation 2.1 Recorder / Player Construction Referring now to Figure 6, a form of the information recorder / player constructed to solve the drawbacks is illustrated in the form of a block diagram. 15 above in accordance with the present invention. The information recorder / player is generally indicated with a reference 600 in Figure 6. The information recorder / player 600 includes a 610 bus, a digital I / F (interface) 620, an MPEG code (Moving 20 Pictures Experts Group) 630, a cryptographic unit 650 formed from an encrypted / decrypted LSI (large scale integrated circuit), a CPU (central processing unit) 670, a 680 memory, an I / F medium of registration 690 and a user I / F 660, all connected between 25 them.
The digital I / F 620 receives digital signals as a content supplied from the outside and sends them to the bus 610, while receiving digital signals on the bus 610 and sending them outwards. The codec in accordance with MPEG 630 performs a 5 MPEG compliant decoding of MPEG compliant encoded data supplied through the 610 bus and sends the data to a combination of analog to digital data converter and digital to analog data converter 635 also included in the 600 information recorder / player 10, while coding MPEG conformance of the digital signals supplied from the 635 combination of analogue to digital data converter and digital to analog data converter and sends the data to bus 610. 15 The combination of analog-to-digital data converter and digital-to-analog data converter 635 performs a conversion of digital to analog data (conversion of digital to analog data) of digital signals decoded in accordance with MPEG supplied to split 20 of the MPEG 630 codec to analog signals and supplies the analog signals to an analog I / F 640 also included in the information recorder / player 600, while performing an A / D conversion (analog / digital) of the supplied digital signals from the combination of 25 analog to digital data converters and digital to analog data converter 650 to analog signals and sends the analog signals to the codec in accordance with MPEG 630. The analog I / F 640 receives analog signals as a content supplied from outside and sends the signals Analog to the combination of analog-to-digital data converter and digital-to-analog data converter 635 while sending analog signals out. The encryption unit 650 consists of an LSI of a chip, for example. Cryptography or decrypts digital signals as a content supplied through the bus 610 and sends the data to the bus 610. Note that the encryption unit 650 is not limited to the LSI of a chip but can be formed of a combination of several types of programmatic or equipment. The construction of said cryptographic unit formed by programmatic will be described later. The central processing unit 670 executes a program stored in the memory 680 for. control the codec in accordance with MPEG 630, the encryption unit 650, etc. and also perform several processing operations. The memory 680 is, for example, a non-volatile memory and stores programs to be executed by the central processing unit 670 and data necessary for the operations of the central processing unit 670. The recording medium I / F 690 reads (reproduces ) digital data, for example, from the recording medium 200 such as for example an optical disc or the like and sends the data to the bus 610, while supplying digital data supplied from the bus 610 to the recording medium 200 for recording. The user I / F 660 includes a display unit and an input unit (not shown). It provides information to the user, receives an instruction from the user, and sends said information to the bus 610. 2.2 Construction of the encryption unit Next, the encryption unit 650 (for example, encryption / decryption LSI) shown in FIG. 6 will be described. with details with reference to Figure 7. Note that the components of the encryption unit 650, which correspond to the components of the information recorder / player shown in Figure 1, are indicated by the same reference numerals and will not be further described. if appropriate. As shown, the encryption unit 650 includes an encoder 701. The encoder 701 encrypts a flat content (non-encrypted content) supplied through the bus 610 with an MK master key supplied from the master key decryption unit 103 for provide a cryptographed data (encrypted content) and send the encrypted content to the bus 610. The encryption unit 650 also includes a decoder 702 that decrypts a cryptographic content supplied through? fc of the bus 610 with a master key MK from the master key decryption unit 103 to provide a 5 unencrypted content and sends the non-encrypted content to the bus 610. The encryption unit 650 also includes a master key renewal unit 703 which controls the renewal of the master key MK stored in the encrypted data retainer 102. (f 10 2.3 Key table format Figure 8 shows an example format of the recording medium 200 in which the recorder / player 600 in figure 6 records data or from which the recorder / player 600 in figure 6 reproduces data.
Figure 8 shows the recording medium 200 similar to the recording medium (optical disc) 150 in Figure 2 and which has stored there a key table based on which a • master key MK_i of a generation i. is renewed in a master key MK_i + l of a generation i + 1. The means of Register 200 has registered there a table (key table) where a category number j_ and a cryptographic master key C (j, i + 1) correlated with each other as in optical disk 150. Registration means 200 also has registered generation information (generation #n) that 25 indicates the oldest generation of a necessary master key MK for recording or reproducing data in the recording medium 200. It will be recalled that the generation information, Generation #n is pre-registered in the recording medium during the production of the latter , for example. To differentiate from the registration generation information mentioned above, generation information, Generation #n will be known as "pre-registration generation information" (generation #n of pre-registration) then, if appropriate, 10 The smallest generation number of the master key that MK is required to record and reproduce data in the recording medium 200 illustrated in Figure 8 is n. The generation number n is provided as a sequential generation number, for example. In the case in which the number of The generation of a master key stored in the memory of the recorder / player 600 is less than n, the recording of data in the recording medium 200 in FIG. 1 8 or the reproduction of data from the recording medium illustrated in the figure 8, will be rejected. The registration means 200 shown in Figure 8 is a registration means that allows to acquire a master key MK_i + l by decryption of a cryptographic master key C (i + 1) stored in the key table with a device key. DK stored in each recorder / player. 25 Note that all recording media do not have a key table stored there. In the case of a recording medium 200 having registered there only one generation number (pre-registration generation number), it is set in the 600 recorder / player to record or reproduce data, the 600 recorder / player will make a comparison between the generation number (pre-registration generation number) and the generation number of a master key stored in the recorder / player. If the generation number of the master key stored in the memory of the recorder / player 600 is smaller than the generation number (pre-registration generation number) n of the recording medium 200, no data can be recorded in the medium register 200 shown in FIG. 8 or reproduced from recording medium 200. The smallest generation number of the required master key MK for recording or reproducing data in recording medium 200 or from recording medium 200 in Figure 8 is n. A register / player 600 in which the generation number of the master key stored in its own memory is so large or larger than n, will be able to record data in the record means 200. However, if the generation number of the master key stored in the memory of the recorder / player 600 is less than n, the registration of data in the recording medium 200 will not be allowed. The data recorded in the recording medium 200 by an inappropriate register with a master key of a generation oldest will not be reproduced by any appropriate player. Also, since data to • register legally in the registry means 200 are 5 encrypted, for registration, with a master key that has a generation number as large or greater than n without failures, the 600 recorder / player will not be able to decipher (reproduce) the data from of the registration medium if the generation number of the master key stored in its 10 own memory is less than n. Note that the key table and generation pre-registration information Generation #n are registered in the record means 200, for example, in the input area (area where it can not be written), where they can not be 15 re-written, so the key table and Generation #n generation pre-registration information can not be rewritten illegally. The device is designed in such a way that the data record in the recording medium 200 shown in Figure 8 does not 20 can be effected (not allowed) without an MK master key of a generation subsequent to a generation indicated by the pre-registration generation information in the registration means 200. Accordingly, with the distribution of the registration means 200 that has a generation information 25 pre-registration Generation #n indicating a certain generation n, the renewal of a master key MK is promoted in a recorder that registers data in the recording medium 200 or in the recorder / player shown in figure 6, and that can record or reproduce the pre-registration generation information, so that registrars and recorders / players in which a master key of an older generation is used will be reduced in number with the result of preventing the unauthorized decryption of data. That is, a registrar having the unrenewed master key can register data in the recording medium (optical disc) 150 that have been described in Figure 4 for example and where the pre-registration generation information is not registered, as above. Thus, an information player having the non-renewed master key can reproduce data from the optical disc 150 where data has been recorded, while no registration is allowed in the recording medium 200 having the pre-generation information. -register registered there as described above with reference to Figure 8 unless a MK master key of a more recent generation than a generation indicated by the pre-registration generation information is available for this information player. Specifically, since a MK master key of a more recent generation than the generation indicated by the pre-registration generation information recorded in the registration means 200 is required to register data in the registration means 200, it is possible to prevent registration from • data in a registrar that has the master key not 5 renewed. Note that in this embodiment, it is considered that the generation of a master key in the key table registered in the record means 200 is recorded as generation information of pre-record Generation #n. Without However, the generation number of a master key in the • key table registered in the record means 200 should not always coincide with a generation number n indicated by the generation information of pre-registration Generation #n. 15 2.4 Master key renewal The following will describe several processing operations of the recorder / player shown in the • figure 6 with reference to figures 9 to 12. First, it will be described with reference to the flow diagram of figure 9 20 the renewal of a master key, which will be effected when the registration means 200 is set in the recorder / player to register or reproduce data in the record means 200. After the placement of the record means 200 in the 25 recorder / player, first in step S901, the registration medium I / F 690 (in figure 6) reads a generation table key information Generation # i + starting from registration medium 200 and supplies said information to • master key renewal unit 703 of the 5 encryption unit 650 (in figure 7). The master key refresh unit 703 reads a C encrypted master key stored in the encrypted data retainer 102, and makes a comparison between the generation number of the encrypted master key and the generation number i + 1 fck 10 indicated by the key table generation information Generation # i + l to determine which of the generations is more recent or older than the other, in step S902. If it is determined in step S902 that the generation number i + 1 indicated by the generation table information of 15 keys Generation # i + l is not greater than the generation number of the encrypted master key C stored in the encrypted data retainer 102, specifically, if the generation number of the encrypted master key C stored in the encrypted data retainer 102 is 20 as large or greater than the generation number i + 1 indicated by the key table generation information generation # i + l, the logger / player will skip steps S903 to S905 and exit the master key renewal procedure. In other words, in this case, since the master key MK (encrypted master key C) stored in the encrypted data retainer 102 has not been renewed, the renewal will not be carried out. On the other hand, if the generation number i + 1 indicated by the Generation generation information # i + l in the key table is determined in step S902 as greater than the generation number of the encrypted master key C stored in the encrypted data retainer 102, specifically, if the generation number of the master key C stored in the encrypted data retainer 102 is smaller than the generation number i + 1 indicated by the key table generation information. + 1, the recorder / player proceeds to step S903 where the recording medium I / F 690 reads a key table from the recording medium 200 (in FIG. 8) and supplies it to the renewal unit of the recording medium. Master key 703 of the encryption unit 650 (in Figure 7). In step S904, the master key renewal unit 703 determines whether a C encrypted master key assigned to a device number j. of the device exists in the key table. If the determination is that the C encrypted master key is not found in the key table, the logger / player skips step S905 and exits the master key renewal procedure. That is, in the case in which it is already known that the recorder / player has been attacked by an attacker and the device key DK_j thereof has been known by the attacker in accordance with what was previously described with • reference to figure 2, the field for a cryptographic master key 5 (j, i + 1) corresponding to the category number j_ in the key table is invalidated, so that the master key MK will not be renewed ( it can not be renewed). On the other hand, if the result of the determination made ^ fc 10 in step S904 is that the encrypted master key C assigned to the device number j exists in the key table. of the same recorder / player, the recorder / player proceeds to step S905 where the master key renewal unit 703 supplies the master key 15 cryptographed C to the encrypted data retainer 102 wherein the encrypted master key is replaced by a cryptographic master key stored in the retainer 102 and • stored there, and exit the master key renewal procedure. 2.5 Content recording Next, with reference to the flow diagram of Figure 10, operations performed by the recorder / player to re-encode data in the recording medium 200 will be described. First, in step S1001, the medium register I / F 690 reads the generation information of pre-registration Generation # from the registration means 200 and supplies said information to the central processing unit 670 the • central processing unit 670 recognizes the generation of the encrypted key C stored in the encrypted data retainer 102 of the encryption unit 650 (in figure 7), and makes a comparison between the generation number of the encrypted master key and the generation number n indicated by the generation of pre-registration | A 10 Generation # y determines which of the generations is more recent or older than the other in step S1002. If the encryption generation number C stored in the encrypted data retainer 102 is determined in step S1002 which is not greater than the generation number n 15 indicated by the generation information of pre-registration Generation #n, that is, if the generation number of the master key C stored in the data retainer • Cryptographed 102 is less than the generation number n indicated by the pre-registration generation information 20 Generation #n, the recorder / player proceeds to step S1005. On the other hand, if the result of the determination made in step S1002 is that the generation number of the encrypted master key C stored in the data retainer 25 encryption 102 is greater than the generation number n indicated by the Generation #n pre-registration generation information, that is, if the generation number of the encrypted master key C stored in the encrypted data retainer 102 is so large or greater than the generation number n of the Generation #n pre-registration generation information, the recorder / player proceeds to step S1003 where the central processing unit 670 will control the registration medium I / F 690 to record the information of generation indicating the generation of the cryptographic master key C stored in the encrypted data retainer 102 as record generation information 200 (in Figure 8). Then, in step S1004, a content to be recorded in the recording medium 200, supplied from the recorder / player is encrypted by the encryption unit 650 and supplied to the recording medium via the bus 610. More particularly, supplied with digital signals as content to be recorded in the recording medium 200, the digital I / F 620 supplies it to the encoder 701 of the encryption unit 650 (in FIG. 7) via the bus. Likewise, supplied with analog signals as content to be recorded in the recording medium 200, the analog I / F 640 1 or supplies the codec 360 in accordance with MPEG through the 635 converter. The codec of MPEG 630 makes a conformity coding with MPEG of the digital signals supplied from the converter 635 and supplies the data to the encoder 701 of the encryption unit 650 to • via bus 610. 5 In the encryption unit 650, the master key decryption unit 103 decrypts the cryptographic master key C stored in the encrypted data retainer 102 with the device key DK stored in the device key holder 101 to a master key MK, and 10 supplies the master key MK to the encoder 701 which at its • once uses the master key MK from the master key decoding unit 103 to encrypt decrypted digital signals (content) supplied and will provide the encrypted content in this way to the 15 I / F registration means 690 via bus 610. Further, in step S1004, the registration means I / F 690 supplies the encrypted content from the encryption unit 650 to the registration means 200 for registration, and exit the content registration procedure. Note that if the recording medium 200 is disk-shaped, such as for example an optical disc, the record generation information is recorded in a sector header of a sector or the like, as, for example, as shown in the figure. 11. That is, a sector consists of a 25 sector header and a part of user data and record generation information is recorded in the sector sector header while the content that has been encrypted with the master key MK of a generation indicated by the generation information of Registration is registered in the user data part of the sector. Said method for recording generation information is disclosed in detail in Japanese Patent Application No. 352975 of 1998 of the Application of the present invention. Likewise, to register as a file in the registration means 200, a content of encryption can be registered in the registration means 200 in such a way that the record generation information can be handled in correlation with the file. Above, a master key of a generation stored in the encrypted data retainer 102 is used to encrypt a content for registration. Alternatively, however, a master key of a generation indicated by a pre-registration generation information registered in the registration means 200, created from a master key of a generation registrar in the encrypted data retainer 102, as for example, it can be used to encrypt a content for registration. In this case, since the generation of the master key used to encrypt a content to be registered in the registration means 200 always coincides with the generation indicated by the pre-registration generation information registered in the registration means 200, it is not It is necessary to record the registration generation information on the registration means 200. On the other hand, if the registrar / player has proceeded to the step S1005, no registration is allowed (can not be performed) on the registration means 200 if the The generation number of the encrypted master key C stored in the encrypted data retainer 102 is less than the generation number n indicated by the generation information of pre-registration Generation #n. Thus, in step S1005, the content registration procedure ends with the visual presentation of a message to encourage renewal of the master key to a younger generation key or to provide a warning sound or warning indication to the user , through user I / F 660. When the prompting message or the warning sound or indication is provided, the user follows the message to take his device to a service station of the device manufacturer for the purpose of removing it. the master key or follows the method included in the following description of the modality to renew the master key. Thus, data may be registered in the registry 200 medium. 2. 6 Content reproduction Next, operations of the regitrator / player for reproducing data from the recording medium 200 will be described with reference to the flow diagram of Figure 12. First in step S1201, the I / F 690 of the medium of register reads the generation information of pre-registration Generation # from the registration means 200 and supplies said information to the central processing unit 690. Next, the I / F 690 proceeds to step S1202 where it reads, from the register means 200, the generation information (record generation information) of the master key MK that has been used to encrypt a content (data) to be reproduced and supplies said information to the central processing unit. In step S1203, the central processing unit 670 makes a comparison between the generation number n indicated by the generation information of pre-registration Generation #a from the I / F of the registration means 690 and the generation number m indicated by the record generation information to determine which of the generations is more recent or older than the other. If the generation number m indicated by the record generation information is determined in step S12C3 as no greater than the generation number n indicated by the Generation #n generation pre-registration information, that is, if the number of m generation indicated by the record generation information is less than the generation number n indicated by the Generation #n pre-registration generation information, the recorder / player will skip steps S1204 to S1206, and will exit the reproduction procedure of content. Accordingly, in the case in which a content registered in the registration means 200 has been encrypted with a master key MK of a generation older than the generation n indicated by the generation information of pre-registration Generation #n, no will be reproduced (reproduction is not allowed). Specifically, since the above case means that the content is data that has been encrypted with a master key from an old generation and registered in the record 200 medium by an inappropriate registrar whose inappropriate nature has been discovered and who has no master key of the most recent generation provided, the recording medium 200 that has data recorded there through an inappropriate device of this type can not be reproduced, so it is possible to revoke any inappropriate device. On the other hand, if the result of the determination made in step S1203 is in the sense that the generation number m indicated by the record generation information is greater than the generation number n indicated by the generation information of Generation record #n, is • say, if the generation number m indicated by the record generation information is as great or greater than the generation number n indicated by the generation information of pre-registration Generation #n, and consequently the content registered in the record means 200 has been encrypted with a master key MK that has a number 10 generation greater than the generation number n indicated • by Generation #n pre-registration generation information, the recorder / player proceeds to step S1204 where the central processing unit 670 recognizes the generation of a stored encrypted C master key 15 in the encrypted data retainer 102 of the encryption unit 650 (in FIG. 7) and performs a comparison between the generation number of the master key • C-encryption and the generation number m indicated by the registration generation information to determine which of 20 generations is more recent or older than the other. If the generation number of the encrypted master key C stored in the encrypted data retainer 102 is determined in step S1204 as not greater than the generation number m indicated by the generation information of 25 registration, that is, if the generation number of the encrypted master key C stored in the encrypted data retainer 102 is smaller than the generation number m indicated by the registration generation information, the recorder / player continues to step S1207. On the other hand, if the result of the evaluation performed in step S1204 is that the generation number of the encrypted master key C stored in the encrypted data retainer 102 is greater than the generation number m indicated by the generation information of registration, is 10 say, if the generation number of the master key • C-encrypted stored in the encrypted data retainer 102 is as large or larger than the generation number m indicated by the registration generation information, the recorder / player proceeds to the step 15 S1205 wherein the master key decryption unit 103 of the encryption unit 650 (in FIG. 7) decrypts the encrypted master key C stored in the retainer • of encrypted data 102 with a device key DK stored in the device key holder 101 to a 20 master key MK. Furthermore, if the generation number of the master key MK decrypted in this way is greater than the generation number m indicated by the registration information, the master key decryption unit 103 will create, from the master key MK decrypted from this 25, a master key MK having a generation number m indicated by the record generation information from the master key MK, and supplying it to the decoder 702. Then, the recorder / player proceeds to step S1206 where the recording medium I / F 690 reads a content encrypted from the recording medium 200, and supplies the data to the encryption unit 650 via the bus 610. Furthermore, in step S1206, the decoder 702 of the unit Cryptograph 650 decrypts the encrypted content read from the registration medium 200 with the master key MK that has been acquired in step S1205, and leaves the content reproduction procedure. The content deciphered in accordance with the above is sent out through the bus 610 and the digital I / F 620. Alternatively, the content is subjected to decoding in accordance with MPEG in the codec 630 in accordance with MPEG, and then to a conversion of digital data to analog data in the 635 converter to analog signals. The analog signals are sent out through the analog I / F 640. On the other hand, in the step S1207, in the reproduction of data from the recording medium 200 is not allowed since the number of generation of the key C-encrypted master stored in the encrypted data retainer 102 is smaller than the generation number m indicated by the record generation information. That is, if the generation number of the C encrypted master key is lower • that the generation number m indicated by the 5 generation record information, a master key MK having a generation number m greater than the generation number of the master key MK acquired from the encrypted master key C can not can be created from this last MK master key, so data can not be reproduced 10 from the recording medium 200. Thus, in step S1207, the data reproduction procedure ends with the visual presentation of a message to drive the master key renewal to a more recent generation master key, or to provide a sound 15 or a warning indication, to the user via the user's I / F 660. Thus, the user follows the message to take his device to a service station of the device manufacturer in order to renew the master key or follow a method 20 included in the following description of the modality to renew the master key. Thus it is possible to reproduce data from the recording medium 200. Since no reproduction can be made in the case in which the generation indicated by the information of The generation of registration is not more recent than indicated by the generation information of pre-registration, it is possible to force the user to renew the master key, so it is possible to indirectly avoid the distribution of a record medium that has data Illegally registered by an inappropriate device. Likewise, if a device can not register or reproduce data in a recording medium or from a recording medium due to the fact that it does not have a master key of the last generation stored there, a message to encourage renewal of the master key may be visualized to the user, thus further promoting the procedure of renewing the master key throughout the system. 3. Other modalities 3.1 System configuration for renewing a master key per IC card Another embodiment of the recorder / player in accordance with the present invention will be described with respect to the exemplary construction thereof with reference to figure 13. In figure 13 , the recorder / player is generally indicated with a reference number 1300. Most of the recorder / player components 1300 shown in Fig. 13 are similar to the components shown in Fig. 6 and will not be described in more detail. As shown in Figure 13, an IC card I / F (integrated circuit) 1302 is connected to the bus 610. The IC card I / F 1301 is an intended interface for transferring data to an IC card 1302 and from an IC card 1302 • that can be removably placed in the recorder / player 1300. The procedure for renewing a master key when the record means 200 is placed in the recorder / player 1300 is similar to the procedure described and illustrated in figure 9. 10 A Next, operations of the • recorder / player 1300 for recording data in recording medium 200 with reference to the flow chart of figure 14. The operations in steps S1401 to S1405 shown in FIG. 15 figure 14 are similar to the operations in steps SlOOl to S1005 in figure 10, and will not be described in more detail. In step S1405, however, a message for • prompting to renew the master key is presented visually to the user and the recorder / player continues until the 20 step S1406. That is, a message to prompt to renew the master key to a key of a more recent generation is presented to the user through the user's I / F 660 or a sound or warning indication is provided to the user, and the registrar / 1300 player continues until 25 step S1406.
In step S1406, the IC card 1302 is placed by the user and then the master key is renewed using the IC card 1302. That is, the IC card 1302 has registered there a key table similar to the registered table 5 in the recording medium 200, which has been previously described with reference to FIG. 8, and the recorder / player 1300 can perform the method mentioned above to process the key table, in order to acquire a master key encrypted from the 10 last generation. • In the aforementioned mode, the IC card 1302 has there registered the key table similar to the key registered in the registration means 200, which has been previously described as reference to figure 8. However, the 15 IC card 1302 can be used in accordance with the following. Specifically the memory 680 of the recorder / player • 1300 has stored there an identification information (device ID) to identify each 20 recorder / player and a device key corresponding to each device ID, and the IC card 1302 has stored there a cryptographic master key derived from the encryption of a master key of the last generation with a device ID corresponding to the 25 device key. By handling the encrypted master key in a similar manner to the key table stored in the recording medium 200, the 1300 recorder / player can acquire a master key • encryption of the latest generation. 5 Since the IC card that has data for each user related there can be easily mailed to the user by the key issuer, the use of the IC card as above is helpful insofar as the key can be handled in an elaborate manner and by Consequently, the registration capacity of the recording medium will not be wasted by the storage of the key table. Then, in step S1407, it is checked whether a cryptographic master key of a necessary generation has been acquired 15 through the IC card 1302 in step S1406. If a cryptographic master key of the necessary generation has been acquired in step S1406, the recorder / player 1300 proceeds to step S1403 where it finally records data in the record means 200.
If the encrypted master key of the necessary generation has not been acquired in step S1406, the recorder / player 1300 will exit the data recording procedure without recording data in the record means 200. Note that at that time, a message that reports 25 the encrypted master key of the necessary generation has not been acquired can be presented visually to the user. Next, with reference to the flowchart of FIG. 15, the operations of the recorder / player 1300 will be described when reproducing data recorded in the recording medium 200. The operations in steps S1501 to S1507 shown in FIG. 15 are similar to those of FIG. operations in steps S1201 to S1207 in Figure 12, and therefore will not be described in more detail. In step S1507, however, a message to prompts to renew the master key is presented visually to the user and the 1300 recorder / player proceeds to step S1508. That is, a message to prompts to renew the master key to a key of a more recent generation is displayed to the user through the user's I / F 660 or the user is provided with a sound or a warning indication, and the recorder / player proceeds to step S1508. In step S1508, a cpptographed master key of a necessary generation is acquired from the IC card 1302 as in step S1406 in figure 14. Next, the recorder / player 1300 proceeds to step S1509. In step S1509, it is checked whether a cryptographic master key of a necessary generation has been acquired in step S1508.
If the encrypted master key of the necessary generation has been acquired in step S1508, the recorder / player 1300 proceeds to step S1505 in • where it finally reproduces data from the means of registration 200. If the encrypted master key of the necessary generation has not been acquired in step S1508, the recorder / player 1300 exits the data reproduction procedure without reproducing data from the medium 10 of record 200. Note that at this time, a message • informing that the encrypted master key of the necessary generation has not been acquired can be displayed to the user. 3.2 System configuration for the renewal of a password 15 master through modem Next, with reference to figure 16, another mode of the recorder / player will be described in accordance with • the present invention with respect to an example construction thereof. In figure 16 the recorder / player is generally indicated with the reference number 1600. As shown in figure 16, most of the components of the recorder / player 1600 are similar to the components shown in figure 6 and are not will describe further.
However, the memory 680 has there stored identification information that is unique to a recorder / player (device ID), a cryptography key of a common key encryption system or a private key of a key encryption system 5 public, only for each device, a public key certificate, etc. As shown in Figure 16, the bus 610 is connected to a modem 1610 connected to a telephone line. Next, with reference to Fig. 17, the operations of the recorder / player 1600 constructed as shown in Fig. 16 in the data record in recording medium 200 will be described. The operations in steps S1701 to S1704 in Figure 17 is similar to the operations in steps SlOOl to S1004 in Figure 10, and will not be described with 15 more details. If the generation number of a cryptographed master key stored in the recorder / player 1600 itself is determined in step S1702 as being smaller than a generation number indicated by the information of 20 generation of pre-registration, the recorder / player 1600 proceeds to step S1705 where the modem 1601 of the recorder / player 1600 makes a link with the issuer of keys through the telephone line to receive and acquire a master key encrypted 25 sent from the key issuing institute.
Note that at this time, a mutual authentication protocol can be performed both by the 1600 registrar / player and by the key issuer in order to mutually confirm the appropriateness of its counterpart. For example, well-known mutual authentication protocols include a protocol that uses a common key cryptography as in ISO / IEC 9798-2, or a protocol that uses public key encryption as in ISO / IEC 9798-3, a protocol which uses a cryptographic revision function as in ISO / IEC 9798-4, etc. Figure 18 shows the application of one of the protocols using the cryptographic revision function for mutual authentication and sharing the encryption key according to the modality. In Figure 18, a recorder / player (B: device) has stored there DK_B which is a unique ID for device and a private key DK_B. A key issuing institute (A) has stored there a device ID for each device and a private key table corresponding to each device ID. First, the registrar / player creates a random number R_B and sends that number together with an ID_B to the key issuer. Note that the symbol "i I" in Figure 18 indicates a concatenation.
Then, the key issuing institute creates random numbers R_A, S_A and ID_A, and sends MAC (DK_B, R_A1 I R_BÍ | S_A) together with them to the recorder / player. The ID_A is a • identification information indicating the issuing institute 5 of keys and MAC (DK_B, R_A | I R_B | I S_A) indicates the entry of DK_B as a key to the cryptographic revision function R_A1 I R_B | I S_A as data. The cryptographic revision function can be formed by applying the Data Encryption (DES) standard defined in PIFS 46-2 as 10 shows in ISO / IEC 9797. Likewise, DK_B used in the • example above is retrieved from the private key table stored using ID_B as the recovery key. The recorder / player uses data received for 15 calculate MAC (DK_B, R_A | I R_B | | S_A) by itself and check if the result of the calculation matches what has been received MAC (DK_B, R_A1IR_BI! S_A). If a match is found • between MAC (DK_B, R_AI I R_B | I S_A) calculated and received, the registrar / player will determine that the issuing institute 20 of keys is appropriate, and operates continuously. If this is not the case, the registrar / player determines that the key issuer is inappropriate, and abandons the master key renewal procedure. Then, the recorder / player creates a random number 25 S B and send this number together with MAC (DK B, R A | I R B | I S A) to the issuing institution. The code issuing institute will also use the data received to calculate MAC (DK_B, R_A | I R_B | I S_A) by itself and • confirm if the result of the calculation matches the 5 MAC (DK_B, R_AJ | R_B || S_A) received. If the calculated MAC (DKJ3, R_A] I R_ß | I S_A) matches the one received, the key issuing institution will determine that the recorder / player is appropriate and operates continuously. If this is not the case, the code issuing institution determines that the 10 recorder / player is inappropriate and leaves the • master key renewal procedure. Then, the registrar / player creates the random number S_B, and sends it together with MAC (DK_B, R_B | I R_A] I S_B) to the key issuer. 15 The key emitting institute also uses the received data to calculate MAC (DK__B, R_BI | R_AJ I S_B) and confirm if the result of the calculation coincides with the MAC (DK_B, R_B || R_A || S_B) received. If a match is found between the MAC (DK_B, R_B | I R_AJ I S_B) calculated and the When received, the key issuing institute determines that the recorder / player is appropriate. If this is not the case, the code issuing institution determines that the registrar / player is not appropriate and suspends the master key renewal procedure. Finally, both the recorder / player and the key issuing institute calculate MAC (DK_B, R_ß | I R_AI I S_B) and use it as a session key in this session. Since the key issuing institute and the registrar / player can mutually confirm the appropriateness of its counterpart and also share session key security as above, the key issuing institute can for example encrypt a master key of the latest generation DES or similar or using the session key as a key, and send the master key securely encrypted to the recorder / player. Figure 19 shows an application of an authentication technique that uses cryptography as the public key to this modality. In Figure 19, each of the key issuing institute A and the recorder / player B has an ID for identification, a public key certificate and a revocation list or registration list. The public key certificate is a certified document with a signature by the center (Key Issue Institute) for the entity ID and public key as shown in figure 20. The revocation list is also known as "non-device list". authorized "or" blacklist ". As shown in figure 21, it presents a list of the IDs of devices whose private keys have been discovered and has a version number that will be monotonously larger and a digital signature made by the center (Key issuer institute). . The list of records is also known as "list of • authorized devices "or" list of registered devices. "As shown in figure 22, it presents a list of the IDs of currently trusted devices (whose private keys have not been discovered) and has a version number that will be higher monotonous and a digital signature made by the center (Instituto emisor de 10 keys). As shown in figure 19 the • registrar / player creates the random number R_B and sends it to the key issuer. The institute issuing keys creates random numbers K_A and R_A calculates V_A by multiplying a common point 15 to the system (base point) G on an elliptic curve E by K_A and sends a public key certificate (Cert_A, R_A, R_B, V_A) together with a signature made to data R_AJ I R_B | I V_A with • your own private key (Prikey_A) to the recorder / player. 20 The registrar / player reviews the validity of the public key certificate from the key issuer institute and the signature made by the key issuer institute. When you have a revocation list stored there, confirm that the counterpart ID is not on the list of 25 revocation. If you have a registration list stored there, confirm that the counterpart ID is in that list of records. If the registrar / player did not succeed in the confirmation, it determines that the key issuer is inappropriate and leaves the master key renewal procedure. When the registrar / player has succeeded in the confirmation, creates the random number K_B performs a calculation similar to the calculation made by the key issuer and sends a signature made to data R_B | I R_A | | V_B together with a public key certificate (Cert_B, R_B, R_A, V_B) to the key issuing institute. The key issuing institute will perform inspections similar to inspections that have been made by the registrar / player to the received data and follow the master key renewal procedure only when all inspections have been successful. Then the key emitting institute multiplies K_A and V_B, while the recorder / reproducer multiplies K_B and V_A, in the elliptic curve E, respectively, to acquire a session key K_S whose use has been described in relation to figure 18. Observe that the multiplication of elliptical curve, creation of digital signature, and inspection method are within the framework of the definition elaborated by IEEEP1363, and are presented with details in the available preliminary standard.
Then, in step S2308, if the encrypted master key of the necessary generation has been successfully acquired in step S2307, the recorder / player proceeds to step S2305 where it eventually reads data from recording medium 200. On the other hand , if the encrypted master key of the necessary generation has not been successfully acquired, the recorder / player exits the master key renewal procedure without reading data from the record means 200. Note, that at this time, it can be displayed for the user a message informing that the master key of the necessary generation has not been successfully acquired. Note also that, in the procedure for renewing the master key with the IC card, which was described with reference to figures 13 to 15, mutual authentication can be performed between the recorder / player 1300 and the IC card 1302 to acquire a master key renewed only when authentication has been successful. Likewise, for the acquisition of a master key, the recorder / player 600 constructed as shown in figure 6 must preferably be constructed to perform the aforementioned authentication by network communications through the digital I / F 620 for example in order to acquire a renewed master key only when the authentication has been successful. it is such that the devices revoked once and that should not be revoked are recovered in the system, specifically, the key renewal terminal is used to renew the master key, thus rehabilitating normal registration and reproduction. Several modes of renewing master keys with the key renewal terminal will be described below. 3.3.1 Renewing the master key through the key renewal terminal - example 1 First, the system for renewing a master key through the key renewal terminal in the built-in information recorder or player will be described. Figure 6. It will be recalled that in this mode, however, the information recorder or player has securely stored there a category number to which the device belongs, a device key corresponding to the category number and in addition, an ID of device and a unique key for device that corresponds to the device ID. The unique key for device is stored in the encryption unit that has been previously described with reference to figure 1, for example. In this mode, to renew the master key of the information recorder or player, an information processor for renewing a key (hereinafter referred to as music, movie or the like.) For the acquisition of a master key from the key issuer institute. , however, digital I / F 2501 and digital I / F 2403 of key renewal terminal 2400 are connected to each other to establish a communication path from modem 2402 of key renewal terminal 2400 to The issuing institution of keys through a telephone line The controller 2401 controls communications, conversion of data format to be transmitted, selection of data to be transmitted, etc. After the recorder / player 2500 has established a communication path with the key issuer institute through the key renewal terminal 2400, the key issuer institute and the recorder / reproducer they use mutual authentication and a key-sharing protocol based on common-key cryptography (shown in Figure 26) or mutual authentication and a key-sharing protocol based on public-key cryptography (shown in figure 27) to mutually confirm its appropriateness and then the key issuing institute provides a master key of the latest generation to the recorder / player,. Figures 26 and 27 show a mutual authentication and a key distribution protocol based on the common key cryptography, in a manner similar to that shown in Figure 18 and a mutual authentication and a key distribution protocol based on the encryption of public keys, similarly to what is illustrated in figure 19. Thus, for reference to the 5 details of these protocols, it is sent to figures 18 and 19. In the mutual authentication and protocol of distribution of keys based on common key cryptography, as shown in figure 26, however, a unique key to device (DUK) that is a unique key for each of the 10 registers / players is used as a private key instead of the device key (DK) which is a private key used in the sequence in figure 18. Accordingly, the key issuer has a table that includes a device ID decade 15 recorder / player and a unique device key that corresponds to the device ID. Mutual authentication and key distribution protocol as shown in figures 26 or 27 is executed between the recorder / player 2500 and the issuing institute 20 keys through the key renewal terminal 2400 shown in FIG. 25. A renewed master key acquired through the above operations can be transmitted securely by encrypting the renewed master key with a session key K_S that he has 25 been shared based on the protocol.
Note that in the above, a master key is transmitted from the key issuer to the registrar / player after the authentication is completed but the key issuer can only receive a device ID from a recorder / player that has requested a key renewal with omission of mutual authentication, takes a single key for device (DUK) for the registrar / player in question from its table that includes device IDs and unique keys for devices, encrypting a master key with the key single for device (DUK) and transmit the master key encrypted to the recorder / player. The registrar / player that has received the encrypted master key will decrypt that master key with its own device key (DUK) to acquire a renewed master key. In this case, the counterpart with which the recorder / player communicates can be a server or the like that has stored there a table of master keys shown in figure 28, not the key issuer institute that must be reliable. The table shown in Figure 28 is a table created in correlation with individual recorders / players included in a category and where a unique device identification number is stored for each recorder / player and a master key (MK n) that has the generation number n, encrypted with a unique key for corresponding device for the recorder / player, in correlation between them. The registrar / player whose master key must be renewed 5 has access to a server that has a table shown in figure 28 stored there through the key renewal terminal to acquire the master key of n-ava generation (MK_n) encrypted with its own unique key for device (DUK). 10 3.3.2 Renewing the master key through the key renewal terminal - Example 2 A second example of master key renewal through the key renewal terminal will be described below. In this example, the interface of 15 communication (I / F) of the recorder / player is connected to the key renewal terminal to acquire a renewed master key. As shown in Figure 29, the recorder / player is usually indicated with a reference number 2900. As 20 it can be seen, the recorder / player 2900 is connected to a communication I / F 2951 of a key renewal terminal 2950 through a communication I / F 2901 and is also connected to the key issuing institute through a 2952 modem under the control of a controller 25 2951. The 2900 logger / player executes the mutual authentication mentioned above and the key distribution protocol to acquire a renewed master key. The communication I / F 2901 of the recorder / player 2900 may be of a type of radio communication such as infrared communication or Bluetooth type. 3.3.3 Master key renewal through a key renewal terminal - Example 3 In the two previous examples, the communication path to the key issuer institute is established through the key renewal terminal and a renewed master key is acquired through communication with the key issuer institute. In this third example, the key renewal terminal does not provide any communication path between the registrar / player and the key issuing institute but functions as a key issuing institute or as the server mentioned above. That is, the key renewal terminal includes a storage unit where a master key table is stored as shown in Fig. 28 as for example. Figures 30 and 31 explain a third example and a fourth example, respectively, of the renewed master key acquisition. The recorder / player in the third example is generally indicated with reference 3000. As shown in FIG. 30, the recorder / player 3000 includes a digital I / F 3001 which is normally used to transmit content data such as music, movies, etc. To acquire a master key from a key renewal terminal 2050, however, the digital I / F 3001 is connected to a digital I / F 3053 of the key refresh terminal 3050 to acquire a corresponding encrypted master key. to a device ID of the recorder / player 3000 from a cryptographic master key table shown in Figure 28 for example and stored in a registration medium 5052 of the key renewal terminal 3050. The key renewal terminal 3050 it also includes a controller 3051 that controls communications between the recorder / player 3000 and the key renewal terminal 3050. In the fourth example shown in FIG. 31, a recorder / player 3100 is connected to a communication I / F 3151 of the key renewal terminal 3150 through a communication I / F 3101 of the 3100 recorder / player itself. The recorder / player 3100 acquires, from a table of encrypted master key shown in figure 28, for example, and stored in a registration means 3153 of the key renewal terminal as in the previous example, a master key encrypted corresponding to its own device IID under the control of a controller 3151 also included in the key renewal terminal 3150. The communication I / F 3101 of the recorder / player 3100 can be of a radio communication type such as infrared communication or Bluetooth type. Also in this example, the key renewal terminal and the registrar / player can execute the mutual authentication and key exchange protocol to confirm their appropriateness. Then, the key renewal terminal can use the shared encryption key in the protocol to send the master key securely to the recorder / player. For these operations, the authentication and key exchange protocol can be applied based on common key cryptography as shown in figure 26 and the authentication and key exchange protocol based on public key cryptography as shown in figure 27, what has been described above. If the authentication and key exchange protocol based on common key cryptography is employed, as shown in Figure 26, a unique key table for device is provided to the key renewal terminal and the device ID of a device. recorder / player from which it is known that its unique device key (DUK) has been discovered, it is marked with an indication of the DUK discovery, in this way no master key is given to the recorder / player. Likewise, in the case in which the authentication and key exchange protocol is used based on public key cryptography, as shown in figure 27, the key renewal terminal does not require the unique device key (DUK), but in order not to provide a master key to a recorder / player whose unique device key (DUK) has been discovered, a list of ID revocations The device is stored in the key renewal terminal in order to provide a master key only to a device for which no ID corresponding to a device ID of a recorder / player that has made a device is found in the list. key renewal request. Through the key renewal mentioned above by means of the key renewal terminal, it is possible to acquire a renewed master key through the key renewal terminal provided separately from the registrar / player. For example, a device that has to renew its master key since the key of any other device belonging to the same category has been discovered can establish a communication path with the key issuer through the key renewal terminal to acquire a master key or you can acquire a master key directly from the key renewal terminal, in such a way that a different procedure for the renewal of ! • the master key can be carried out for each of the 5 terminals belonging to the same category. Likewise, the key renewal terminal can be adapted for use in the status provided to a registrar / player only when it is necessary to renew the master key. Since the key renewal terminal can send and 10 receiving information from the recorder / player and from the recorder / player through a normally provided interface, this arrangement is also beneficial insofar as no modem or similar equipment has to be provided at the recorder / player, 15 specifically, it does not cause the increase in the cost of the system. 4. Type structure key distribution system • tree The recorder / player shown in figure 6 distributes 20 through a tree-type structure key distribution system, to each of the other recorders / players included in the system, a master key necessary to record data in the recording medium or to reproduce data from the middle of 25 record as will be described below. Figure 32 shows the distribution of keys in the recorder / player in a structure registration system in the form of a tree. The numbers 0 to 15 shown in the I * lower part of figure 32 indicate 5 individual recorders / players. That is, in Figure 32, each of the leaves of the structure in the form of a tree corresponds to each of the recorders / players (it will be known as "device" below, where appropriate). During production (or at the time of shipment), a node key assigned to a node of its own sheet to a path and a leaf key for each sheet in a device is stored in each of devices 0 to 15 in a default initial tree. "K0000" to "Kllll" in the lower portion Next in Figure 32 are leaf keys assigned to devices 0 to 15, respectively, and "KR" in the highest node to "Klll" in the background nodes are the node keys. In the tree structure shown in Figure 32, for example, device 0 has a leaf key K0000 and 20 node keys KOOO, KOO, KO and KR. The device 5 has a leaf key K0101 and node keys K010, KOI, KO and KR. The device 15 has a leaf key Kllll and node keys Klll, Kll, Kl and KR. Note that the tree shown in Figure 32 includes only 16 devices 0 to 15 placed 25 in 4 stages and well balanced in horizontal symmetry but said tree may include more devices placed there and the number of stages may vary from one part to another thereof. The recorders / players (devices) included in the tree structure shown in Figure 32 include various types of recorders / players that use various recording means, such as DVD, CD, MD, memory stick (registered trademark), etc. In addition, several application services coexist with each other in the tree structure. The key distribution system shown in Figure 32 is applied while such different devices and different applications coexist with each other. In the system in which such devices and applications coexist, a portion of the tree, shown in a circle with a dotted line in figure 32 and including devices 0, 1, 2 and 3, is joined as a group in which the devices They use the same means of registration. For example, each of the devices included in the circulated group receives a common encrypted content sent from a content provider or a common master key or sends a rate payment data of encrypted content to the provider or a payment institution. The content provider, the payment institution or an institution for data communications with each of the devices collectively sends data to the portion shown in Figure 32., that is, devices 0, 1, 2 and 3, as a group. More than a group of this type can exist in the tree shown in figure 32. Note that the node key and the leaf key can be handled collectively by a certain key management center or by each of the groups that they include the provider, payment institution, etc. that perform several data communications with each group. If these node and sheet keys have been discovered, for example, they are renewed by the key management center, provider, payment institution, etc. In the tree structure shown in Figure 32, the four devices 0, 1, 2 and 3 included in a group have common keys KOO, KO and KR as node keys. Due to this common use of node keys, such as, for example, a common master key can be used only by devices 0, 1, 2 and 3. For example, by setting the KOO node key itself possessed in common as a master key, it is only possible for devices 0, 1, 2 and 3 to establish a common master key without receiving any new key. Likewise, by means of the distribution, to the devices 0, 1, 2 and 3 through a network or stored in a recording medium, of an Ene value (KOO, Kmaster) obtained through the encryption of a new master key Kmaster with the KOO node key, only devices 0, 1, 2 and 3 can analyze the Ene value (KOO, Kmaster) with the common node key KOO owned by each of the devices to acquire the Kmaster master key. Observe that Ene (Ka, Kb) is a data derived from the encryption of Kb with Ka. If at a time t, it has been revealed that the keys K0011, KOOl, KOO, KO and KR possessed by the device 3, for example, were analyzed and discovered by any intruder (cybernetic pirate), it is necessary to disconnect the device 3 from the system in order to protect data transferred to a system and from a system (the group that includes devices 0, 1, 2 and 3) after this. For this purpose, if the node keys KOOl, KOO, KO and KR have to be changed to the new keys K (t) 001, K (t) 00, K (t) 0, K (t) R, respectively, and the new keys have to be transferred to devices 0, 1 and 2. Note that K (t) aaa is a renewed key of a Kaaa key in a generation t. The renewed key distribution will be described below. A key will be renewed by supplying a composite table where block data known as key renewal block (KRB) as shown in Figure 33A to each of devices 0, 1 and 2 through a network or in accordance with what is stored in a recording medium. As shown in Figure 33A, the renewal key block (KRB) is formed of a block data that has a data structure that can be renewed only by a device that requires renewing a node key. The example shown in Figure 33A is a block data formed for the purpose of distributing a renewed node key of generation ta to devices 0, 1 and 2 included in the tree structure shown in Figure 32. As is apparent of Figure 32, devices 0 and 1 must have renewed node keys K (t) 00, K (t) 0 and K (t) R while device 2 requires renewed node keys K (t) 001, K (t) 00, K (t) 0 and K (t) R. As can be seen from Figure 33A, the KRB includes several encryption keys. The background encryption key is Ene (K0010, K (t) 001). It is a renewed node key K (t) 001 encrypted with a leaf key K0010 of device 2. Device 2 can decrypt this cryptography key with its own leaf key to acquire K (t) 001. Likewise, the device 2 can decrypt an encryption key Enc (K (t) 001, K (t) 00) in the subsequent background stage with K (t) 001 that it has acquired through decryption, to acquire from this forms a renewed node key K (t) 001. After that, the device 2 decrypts an Encryption key Enc (K (t) 0, K (t) R) in the next higher stage in Figure 33A to acquire a renewed node key K (t) 0, and decrypts a key of encrypted ^ v ^ ?? iu Enc (K (t) 0, K (t) R) in the upper stage in Fig. 33A to acquire a renewed encryption K (t) R. On the other hand, for devices 0 and 1, a KOOO node key should not '• be renewed but the keys of the node to be renewed are K (t) 00, 5 K (t) 0 and K (t) R. Devices 0 and 1 decipher an Ene encryption key (KOOO, K (t) 00) in a third higher stage in Figure 33A to acquire a renewed node key K (t) 00. Subsequently devices 0 and 1 decrypt an Encryption key Enc (K (t) 00, K (t) O) in \ 9 10 the second upper stage in Fig. 33A to acquire a renewed node key K (t) 0, and decrypts an encryption key Enc ((K (t) 0, K (t) R) in the upper stage in Figure 33A to acquire a renewed node key K (t) R. In this way, devices 0, 1 and 2 can acquire the 15 renewed node keys K (t) 00, K (t) 0 and K (t) R. Note that the "index" in Figure 33A shows an absolute address of the node key or sheet key that is used as the key • decryption. The KO and KR node keys in the upper stage of the 20 tree structure shown in figure 32 have not been renewed. If only the KOO node key has to be renewed, the use of the key renewal block (KRB) in Figure 33B allows the distribution of the renewed node key K (t) 00 to devices 0,1 and 2. 25 KRB shown in Figure 33B is suitable for the J. distribution of a new master key for common use in a specific group for example. More particularly as in the devices 0, 1, 2 and 3 in the group shown in the dotted circle in figure 32 they use a certain registration means 5 and require a new common master key K (t) master. At that time, a node key K (t) 00 derived from the renewal of the KOO node key common to devices 0, 1, 2 and 3 is used to distribute the data Enc (K (t), K (t ) master) derived from the encryption of the new common master key K (t) master) together with the KRB shown in FIG. 33B. With this distribution, data that can not be deciphered in the devices included in another group, such as device 4, can be distributed. 15 That is to say, devices 0, 1 and 2 can acquire the master key K (t) master at a time t by deciphering the data encrypted with K (t) 00 acquired by the • KRB processing. Master key distribution using KRB 20 Figure 34 shows a procedure for acquiring master master K (t) at a time t through device 0 that has acquired a data Enc (K (t) 00, K (t) master) derived from the encryption of a new common master key K (t) master with K (T) 00, and KTB shown in figure 33B. 25 As shown in Figure 34, device 0 generates a ^ * ^ Sg ^ node key K (t) 00 through a similar processing of KRB to the one above from KRB at a time t (generation in which KRB is stored) and the KOOO node pre-stored itself. In addition, device 0 decrypts the renewed master key K (t) master with the renewed node key decrypted K (t) 00, the cryptography with its own key K0000 for later use, and stores it. Note that in the case where the device 0 can safely store the renewed master key K (t) there, it is not necessary to encrypt that key with the sheet key K00OO. Likewise, the acquisition of the renewed master key will be described with reference to the flow diagram shown in figure 35. It is considered here that the registrar / player receives the last master key K (c) at the time of sending and has stored it safely in its own memory (more precisely, encrypted with its own key sheet). When the record medium having the renewed master key K (n) master and KRB stored there is set to the recorder / player, the latter will read, first in step S3501, the generation number n of the master key K (n ) master (it will be known as "generation information of pre-registration Generation #n" below) from the registration medium. The recording medium has a generation number n of a master key K (n) pre-stored master. Then, the recorder / player of the C encrypted master key from its own memory. In step • S3502, compares the generation number c of its own encrypted master key 5 and a generation n indicated by the generation information of pre-registration Generation #n to determine which of the generations c or n is newer or older. If the register / player has determined in step S3502 10 that the generation n indicated by the generation information fc of pre-registration Generation #n is not more recent than generation c of the encrypted master key stored in its own memory, that is, if generation c of the master key is encrypted C stored in memory is Also as old as the generation no older than the generation n indicated by the generation information of pre-registration Generation #n, the recorder / player will skip steps S3503 to 3508 and exit the master key renewal procedure. In this case, since it is not If it is necessary to renew the master key K (c) master (encrypted master key C) stored in the memory of the recorder / player, the renewal will not take place. On the other hand, if the recorder / player has determined in step S3502 that the generation n indicated by the 25 pre-registration generation information Generation #n is more recent than generation c of the C encrypted master key stored, that is, if generation c of the C encrypted master key stored in memory is older than generation n indicated by the Generation #n pre-registration generation information, the recorder / player will go to step S3503 where it will read a key renewal block (KRB) from the recording medium. In step S3504, the recorder / player calculates a key K (t) 00 for node 00 at the time (time t in figure 34) indicated by generation information of pre-registration Generation # from KRB which has read in step S3503, sheet key (K0000 for device 0 of figure 32) and node keys (KOOO and KOO, ... for device 0 of figure 32), stored in the memory thereof. In step S3505, it is examined whether K (t) 00 has been acquired in step S3504. If this is not the case, that means that the recorder / player has been revoked from the group in the tree-like structure at this time, and therefore the recorder / player skips steps S3506 to 3508 and exits the master key renewal procedure . If K (t) 00 has been acquired, the recorder / player goes to step S3506 where it reads a value derived from the encryption of the master key at time t with Enc (K (t) 00, K (t) master) , specifically, K (t) 00, read from the recording medium. In step S3507, the recorder / player calculates the master key K (t) master by deciphering the value encrypted with K (t) 00. In step S3508, the cryptographic recorder / player master key K (t) master with its own sheet key (K0000 for device 0 of figure 32) and stores it in memory. Here, the recorder / player exits the master key renewal procedure. 10 It will be recalled that the master key is used in the order fc ascending from the moment (generation) 0 but each of the devices in the system must be able to acquire in a desirable way through calculation, an older generation master key from of a generation master key 15 new. That is, the recorder / player must have a one-way function f and generate a master key in a tested generation by applying its own »Master key to the function of a sense f for a number of times corresponding to a difference between generation 20 of the master key and the generation of a necessary master key. More particularly, for example, in the case in which the generation of a master key MK stored in the recorder / player is i + 1 while the generation of 25 an MK master key necessary for the reproduction of a data (which has been used when the data is recorded) is i-1, the recorder / player generates a Master K (il) master key by using the one-way function F '• twice and calculating F (f (K (i + l) master)). 5 Likewise, in the case in which the generation of the master key stored in the recorder / player is i + 1 while the generation of the necessary master key is i-2, the recorder / player generates a master key K (i - 2) master by using a one-way function 10 f twice and calculating f (f (f (K (i + l) master))). fc The function of a sense can be a verification function, for example. More particularly, the verification function can be MD5 (message summary 5), SHA-1 (secure verification algorithm - 1) or similar, for 15 example. An institution issuing keys must determine master keys K (0) master, K (l) master, K (2) master, ..., K (n) master with which a generation older than the current generation w it can be pregenerated using these one-way functions. That is, first, a key 20 master, K (N) master of generation N must be established and a one-way function must be applied once to master key K (N) master thus generating master keys K (N- Dmaster, K (N-2 ) master, ..., K (l) master, K (0) master of the preceding generations one after the other Master keys 25 must be used one after another starting with the master key K (0) master of the oldest generation. Note that the one-way function used to generate a one-generation master key is considered • old that the current generation is the same in all 5 recorders / players. Likewise, as a one-way function, public key cryptography can be used for example. In this case, the institution issuing keys must have a private key that is based on public key cryptography and 10 issue a public key corresponding to the private key to each of the players. The institute that issues keys must establish a master key of 0-ava generation K (0) master and use master keys that start with K (0) master. That is, when the institute that issues keys 15 requires a master key K (i) master more recent than the first generation master key, converts a key , teacher K (i-l) master a generation before K (i) master ~ * with the private key in order to generate the master key K (i) master for use. Thus, the institute that issues 20 keys do not have to pregenerate a N-ava generation master key using the one-way function. With this form of key generation, it is theoretically possible to generate a master key in all generations. Note that if the recorder / player has a key 25 master for a generation, you can convert the master key with the public key in order to acquire master keys for generations older than this generation. 5. Storage of a key renewal block (KRB) in the middle of registration by registrar / player 5 In the previous example, a key renewal block (KRB) is pre-stored in a recording medium. However, the recorder / player can register a KRB received from any other device through the I / F input / output, IC card, modem or similar to a medium 10 of record where you initially record data in the middle fc of record or record data in the middle of record all the time. That is, as shown in Figure 36, the recorder / player may also be adapted to 15 Acquiring a KRB and non-encrypted data derived from the encryption of a master key with a node key in advance through the I / F input / output, IC card, modem or the like, storing them in its own memory, and processing them as shown in the flow diagram of the 20 figure 37 when recording content data in the recording medium. The operations of the recorder / player in the KRB register in the recording medium will be described with reference to Fig. 37. In step S3701, the recorder / player 25 check if a KRB is already registered in a recording medium in which data must be recorded. If it is found that KRB is already registered in the recording medium, the recorder / player skips step S3702 and exits the KRB storage procedure fc (proceeds to the content data recording procedure 5). If no registered KRB is found in the recording medium, the recorder / player proceeds to step S3702 where it registers the KRB stored in its own memory and non-encrypted data derived from the encryption of a key 10 teacher in a recording medium. After finishing this KRB storage procedure, the recorder / player proceeds with the content data recording procedure. Figure 39 shows an exemplary construction of the medium of 15 record used in this modality. A record generation generation number is stored in the recording medium shown in Figure 39. The recording medium is fc indicated generally with a reference number 3900. The registration means 3900 has registered there a number of 20 generation (Generation #n) as generating information indicating the smallest generation number of a master key MK that is required to record data in the registration means 3900 and to reproduce data from said recording medium. It must be remembered that the number of Generation (Generation #n) is pre-registered in the record means 3900 produced, for example, and similar to the aforementioned pre-registration generation information (Generation #n of pre-registration). The smallest generation number of the master key MK 5 that is required to record data in the registration means 3900 or to reproduce data from said registration means 3900 shown in FIG. 39 is n. The generation number n is provided as a sequential generation number. If the generation number of a cfc master key 10 stored in the recorder / player memory is less than the generation number n, the record in the record means 3900 in figure 39 or the reproduction from the record means 3900 in figure 39 it will be rejected. To register or reproduce data in the recording medium 15 3900 or from registration means 3900 having a generation number (pre-registration generation number) registered there, placed in the recorder / player, the recorder / player makes a comparison between the generation number (generation number of pre-registration) and 20 the generation number of the master key stored in the recorder / player. If the generation number of the master key stored in the memory of the recorder / player is less than the generation number (pre-registration generation number) n of the medium of In the registration, the recorder / player can not record any data in the registration means 3900 in FIG. 39 or reproduce any data from the registration means 3900 in FIG. 39. As mentioned above, the smallest generation number 5 of the master key MK which is required to record data in the registration means 3900 in figure 39 or to reproduce data from the registration means 3900 in figure 39 is n. If the generation number of the master key stored in the recorder / player memory 10 is as large or larger than the smallest generation number n, the recorder / player can store data in the record means 3900 in the figure 39. However, if the generation number of the master key stored in the memory of the recorder / player is smaller than the 15 smaller generation number n, the recorder / player can not register data in the registration means 3900. Even if the registration means 3900 has data recorded there with an older generation master key through an inappropriate device, a The appropriate device will not be able to reproduce the data from the registration means 3900. Likewise, since legally registered data in the registration means 3900 have been encrypted with a master key that has a generation number as large or larger than the number of If the generation number of the master key stored in the memory of the recorder / player is smaller than the smallest generation number n, the recorder / player can not decrypt (reproduce) data from the record medium. 5 Note that the Generation #n pre-registration generation information is registered in an area of the 3900 registration medium where it can not be re-written (area where it can not be rewritten), for example, in the area of input, so that the key table and generation information p 10 of pre-registration Generation #n can not be rewritten illegally. The device is designed in such a way that the data record in the registration means 3900 shown in Fig. 39 can not be performed (not allowed) without an MK master key 15 of a generation more recent than the generation indicated by the generation information of pre-registration in the middle of record 3900. Therefore, since the means of? register 3900 that has registered there a generation information of pre-registration Generation #n that indicates a 20 generation is distributed, the renewal of the master key in a recorder that registers data in the registration means 3900 or a recorder / player (in figure 6) that can register or reproduce data in the registration means 3900 and from the middle registration 3900 is promoted, so the The number of recorders or recorders / players that use an MK master key that has a generation lower than Generation #n decreases with the result that it is possible to prevent illegal data decryption. • That is, a recorder having the master key not renewed can register data in the recording medium (optical disc) 150 shown in FIG. 4 and that has no pre-registration generation information recorded therein. An information player that has the master key not renewed will be able to reproduce the optical disc 150 that has data 10 registered in this way there. On the other hand, the registration MJ of data in the registration means 3900 having the pre-registration generation information registered there and which has been described with reference to figure 39 is not allowed unless an MK master key of 15 a generation more recent than the generation indicated by the pre-registration generation information. Specifically, since the data record in the registration medium 3900 • requires a master key of a more recent generation than the generation indicated by the generation information 20 of pre-registration registered in the registration means 3900, it is possible to prevent a registrar having the non-renewed master key from registering data in the registration means 3900. Note that the procedure for renewal of the key The master can be such that a key renewal block (KRB) and unencrypted data derived from the cryptography of a master key encrypted with a node key are acquired through an I / F input / output, an IC card , modem or similar and a renewed master key can be acquired through KRB processing. Since only one device that has a node key and a leaf key with which KRB can be decrypted as above can process KRB, it is not necessary to perform any mutual authentication for KRB distribution and only an appropriate device can acquire a master key renewed 6. Construction of the data processor Note that the aforementioned series of operations can be carried out either by a team or by a programmatic one. Specifically, the encryption unit 650, for example, can be formed from an encryption / decryption LSI and also the cryptography, that is, in encryption / decryption, by the encryption unit 650 can be carried out by having a general purpose computer or a microcomputer of a chip that executes a corresponding program. To carry out the series of operations through a programmatic, a program that includes the programmatic is installed in a computer for general purposes, microcomputer of a chip or similar. Figure 40 shows an example construction of a mode of a computer in which the program for the series of operations is installed. • The program can be pre-registered on a hard disk 4005 and 5 ROM 4003 as recording media incorporated in the computer. Alternatively, the program can be temporarily or permanently stored (registered) in a removable 4010 record medium such as a soft disk CD-ROM (compact disk, read-only memory), H 10 MO disk (magneto-optical), DVD (digital versatile disk), magnetic disk, semiconductor memory or similar. Said removable record means 4010 can be provided as what is known as a programmatic package. It must be remembered that the program can be installed from 15 of the aforementioned removable record medium 4010 to a computer, otherwise, transferred from a download site to the computer by a radio communication network through a digital broadcast satellite or transferred to the computer via a cable per medium of a network like 20 for example a LAN (local area network), Internet or the like, the computer receives the program transferred in this way through a communications unit 4008 and installs said program on the integrated hard disk 4005. The computer incorporates a CPU ( central unit 25 processing) 4002 as shown. The CPU 4002 is connected to an input / output interface 4011 via a bus 4001. When the central processing unit 4002 receives an instruction from an input unit 4007 operated by the user, such as keyboard, mouse or similar through the input / output interface 4011, executes the program stored in a ROM (read only memory) 4003. Alternatively, the CPU 4002 loads, in a RAM (random access memory) 4004 for execution, a program stored on the hard disk 4005, a program transferred from a satellite or network, received by the communication unit 4008 and installed on the hard disk 4005 or a program read from the removable record medium 4010 placed in a unit 4009 and installed on the hard disk 4005. Thus, the central processing unit 4002 performs operations as in the flow diagrams mentioned above or operations as in the block diagrams mentioned above. The central processing unit 4002 sends the results of these operations from an output unit 4006 such as an LCD (liquid crystal display) or speaker, or transmits them from the communication unit 4008, or registers them in hard disk 4005, through the input / output interface 4011, as necessary.
Note that the operations or processes to describe a program that allows the computer to perform several operations can be carried out not always in the sequence • temporary as in the flow diagrams but can include operations or processes executed in parallel or individually (parallel processes or processes per object, for example). The program can be a program that can be executed by an individual computer or in a decentralized way 10 for several computers. In addition, the program can be a program that can be transferred to a remote computer for execution. Above, the present invention has been described in relation to the example in which a block of encryption formed by 15 an LSI cryptography / decryption of a cryptography chip and decrypts a content. Note, however, that the content encryption / decryption block can also be an individual programmatic module that must be executed by a central processing unit. In the above, the present invention has been described with details as to specific modalities thereof. However, it will be apparent that the present invention can be modified or altered by those skilled in the art without departing from the scope or spirit of the present invention.
That is, the embodiments of the present invention have been described by way of example and the present invention is not limited to these modalities. The substance of the present invention is apparent from the appended claims. < • Industrial Exploitation 5 In the information recording / reproducing apparatus and method according to the present invention, when the device does not have the first key of a generation necessary to record or reproduce data, a message to prompt key renewal is displayed for him 10 user, thus allowing to accelerate the renewal of password for the whole system and to avoid the illegal copying of data. In addition, in the apparatus and method of recording / reproducing information in accordance with the present invention, when the device does not have the first key of the generation 15 necessary to register data or to reproduce data, a key of the necessary generation is acquired from an external device, thus allowing to accelerate the renewal of code for the whole system and to avoid the illegal copying of data. In addition, in the apparatus and method of recording / reproducing information according to the present invention, the encryption unit can be used to create a key of an older generation based on a key of a generation stored in the device, allowing A) Yes 25 that the illegal copying of data while maintaining the interoperability is avoided. In addition, the information recording means according to the present invention has there stored generation information indicating the generation of a key that can be used to encrypt or decrypt data and an information recorder / player makes a comparison between the generation of a key stored there and the generation information stored in the recording medium to determine whether the recording or reproduction of | ^ * k 10 data can be done or not. Therefore, it is possible to avoid copying data with an older generation key, which is now invalid. In addition, in the terminal and key renewal method according to the present invention, a renewed key 15 may be acquired through a key renewal terminal provided separately from a registrar / player. For example, a device that has to renew the master key since the master key of another device that belongs to the same category has been discovered, can establish a means of communication with a key issuer through the renewal terminal of keys, and therefore terminals belonging to the same category can be supported differently, respectively. 25 Furthermore, in the apparatus and method of recording / reproducing ^^^ jiaja information in accordance with the present invention, since the renewal data for a master key is transmitted together with a key renewal block (KRB) by the tree structure key 5 distribution system, a key A decipherable master of this type can be transmitted or distributed only to a device in which the key has to be renewed and consequently the size of a message to be distributed can be reduced. In addition, a key that can be deciphered only by a device-specific group jjgfc 10 that is defined by the tree structure and can not be deciphered by any other device that does not belong to the group, can be distributed in such a way that it can be ensure the security of the distribution or delivery of keys. fifteen • twenty 25

Claims (1)

  1. CLAIMS 1. An information recorder for recording information in a recording medium, the apparatus comprises: 5 a cryptographic device for encrypting information to be registered in the recording medium through a cryptography with a cryptography key managed by generation that is renewed in a different key for each generation; and a user interface for making a comparison between the generation information in a managed-by-generation encryption key stored in a device that is stored in a storage device of the information recorder and a pre-generation information. - record which is a generation information of record means previously stored in the middle of W record, and produce a warning when the result of the comparison is that the information of pre-registration generation is more recent than the generation information in the cryptography key managed by generation stored in the device. 2. The apparatus according to claim 1, wherein the generation-managed encryption key stored in the device is a key. 4 ^ »^? ^ E ^ £ j ^ gg teacher stored in common for several information recorders. The apparatus according to claim 1, wherein the encryption device includes a device for renewing, when the pre-registration generation information is more recent than the generation information in the generation-managed encryption key stored in the device. , a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the generation information of pre-registration. The apparatus according to claim 1, wherein the encryption device includes a device for creating, based on the cryptography key handled by generation stored in the device, a generation-managed encryption key whose generation information is older than the generation information in the encryption key managed by generation stored in the device. The apparatus according to claim 1, wherein: the encryption device includes a device for renewing, when the pre-registration generation information is more recent than the generation information in the encryption key handled by generation stored in the device, a key • encrypted managed by generation of a 5 generation as recent or more recent than the generation indicated by the pre-registration generation information; and the key renewal device of a cryptographic key managed by generation to be renewed, 10 encrypted, with a device key stored in the information register to create a cryptographic key managed by renewed generation. 6. The apparatus according to claim 5, wherein the encryption device acquires a 15 key table where the encryption key managed by generation to be renewed, encrypted, and a decryption device key identifier are correlated to decipher the encryption key managed by generation to be renewed, 20 encrypted, with a device key identified based on the device key identifier in the key table. The apparatus according to claim 5, wherein the device key is a common key to 25 information recorders grouped by division into categories into a common category. 8. The apparatus according to claim 5, wherein the device key is a common key to '• information recorders that are in the 5 same group by grouping based on serial numbers assigned to the information recorders. The apparatus according to claim 1, wherein: a single node key is preserved for each of | á * fc 10 the nodes included in a hierarchical structure of tree type including several different information registers each as a sheet and a single sheet key for each of the information recorders; and 15 the encryption key handled by generation is a key that can be renewed with at least any of the node key or sheet key. 10. The apparatus according to claim 9, wherein the encryption key handled by 20 generation is a master key common to several information recorders. The apparatus according to claim 9, wherein: the node key can be renewed; 25 is distributed, when a node key must be renewed, a key renewal block (KRB) derived from the encryption of the renewed node key with at least either a node key or a leaf key in a step bottom of the tree structure to an information recorder on a sheet where the node key must be renewed; and the encryption device in the information recorder receives renewal data for the cryptographic key managed by generation, encrypted _ \ 10 with the renewed node key, cryptography the key renewal block (KRB) to acquire the node key renewed, and acquires renewal data for the encryption key managed by generation based on the renewed node key acquired in this way. The apparatus according to claim 9, wherein: the key renewal block (KRB) is stored in a registration means; and the encryption cryptography device the key renewal block (KRB) read from the registration means. The apparatus according to claim 9, wherein: the encryption key handled by generation ..., ^ ^ ^^? ^ -8Í6és has a generation number as renewal information correlated with it; and the encryption device stores, like a • record generation number in the middle of 5 registration, a generation number of the encryption key managed by generation that has been used to store encrypted data in the recording medium. 14. An information recorder for recording ^ * t 10 information in a recording medium, the apparatus comprises: a cryptography device for encrypting information to be registered in the recording medium by a cryptography with a managed encryption key 15 per generation that is renewed in a different key for each generation; and a key acquisition device to effect # a comparison between the generation information in a cryptography key managed by generation 20 stored in a device that is stored in a storage device of the information recorder and a pre-registration generation information that is a previously stored record medium generation information. 25 in the middle of registration, and acquire a password i cryptographed managed by generation of a generation as recent or more recent than indicated by the generation information of pre-registration when the result of the comparison is that the information of 5 generation of pre-registration is more recent than the generation information in the cryptography key managed by generation stored in the device. 15. The apparatus according to claim 14, wherein the key acquisition device includes ji ^ ** 10 a communication interface that can receive data at IV through a network. The apparatus according to claim 14, wherein the key acquisition device includes a communication modem that can receive data through 15 of a telephone line. The apparatus according to claim 14, wherein the key acquisition device includes fc an I / C card interface that can receive data through an IC card. 18. The apparatus according to claim 14, wherein: the encryption device performs a mutual authentication with a key delivery device when the key acquisition device 25 is about to acquire the encryption key managed by generation; and the key acquisition device effects the acquisition of the key handled by generation only when the mutual authentication with the key delivery device has been successful. 19. The apparatus according to claim 14, where the encryption key managed by generation stored in the device is a master key common to several information registers. The apparatus according to claim 14, wherein the encryption device includes a device for renewing, when the pre-registration generation information is more recent than the generation information in the encryption key. 15 handled per generation stored in the device, a cryptographic key managed by generation of a generation as recent or more recent than indicated by the pre-registration generation information. 21. The apparatus according to claim 14, wherein the encryption device includes a key creation device for creating, based on the encryption key handled by generation stored in the device, a key of 25 encryption managed by generation whose information of generation is older than the generation information in the encryption key managed by generation stored in the device. • The apparatus according to claim 14, wherein: the encryption device includes a device for renewing, when the pre-registration generation information is more recent than the generation information in the encryption key handled by h ^ 10 generation stored in device, a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the generation information of pre-registration; and 15 the key renewal device decrypts a cryptographic key managed by generation to be renewed, encrypted, with a device key if stored in the information recorder in order to create a managed encryption key 20 per generation renewed. 23. The apparatus according to claim 22, wherein the encryption device acquires a key table in which the cryptography key managed by generation to be renewed, encrypted, and a 25 decryption device key identifier are TO . < "Four" are correlated with each other in order to decrypt the cryptographic key managed by generation to be renewed, encrypted, with a device key identified based on the key identifier of the device in the key table. 24. The apparatus according to claim 22, wherein the device key is a common key to information loggers grouped by division into categories into a common category. OR*? 25. The apparatus according to claim 22, wherein the device key is a common key to information recorders that are in the same group by grouping based on serial numbers assigned to the information recorders. 26. The apparatus according to claim 14, wherein: a single node key is preserved for each of the nodes included in a tree-like hierarchical structure that includes several node registers. 20 different information such as each sheet and a single sheet key for each of the information recorders; and the encryption key managed by generation is a key that can be renewed with at least 25 any of the node key or sheet key. 27. The apparatus according to claim 26, wherein the encryption key managed by generation is a master key common to the various information registers. 28. The apparatus according to claim 26, wherein: the node key can be renewed; is distributed, when a node key must be renewed, a key renewal block (KRB) derived from the encryption of the renewed node key with at least any of a node key or sheet key at a lower stage of the tree-like structure to an information recorder as a sheet where the node key has to be renewed; and the encryption device in the information logger receives renewal data for the cryptographic key managed by crypto generation with the renewed node key, cryptography the key renewal block (KRB) to acquire the renewed node key, and acquires renewal data for the encryption key managed by generation based on the renewed node key acquired in this way. 29. The apparatus according to claim 26, wherein: the key renewal block (KRB) is stored in a registration means; and the encryption device cryptography the block • Key renewal (KRB) read from average 5 of registration. 30. The apparatus according to claim 26, wherein: the encryption key managed by generation has a generation number as information of • 10 renewal correlated with it; and the encryption device stores, as a registration generation number in the recording medium, a generation number of the encryption key managed by generation that has been used to store encrypted data in the recording medium. 31. An information recorder for recording information in a recording medium, the apparatus comprising: a cryptography device for encrypting information to be registered in the recording medium by a cryptography with a generation-managed encryption key that is renewed in a different key for each generation; and a key renewal terminal connection interface for connecting a key renewal terminal that performs a comparison between the generation information in a cryptography key handled by • generation stored in the device that is stored in a storage device of the information recorder and generation information of pre-registration which is a generation information of record means previously stored in the recording medium, and * * t 10 acquires a cryptographic key managed by generation of a generation as recent or more recent than indicated by the pre-registration generation information when the result of the comparison is that the generation information of pre-registration is more recent that the generation information in the encryption key managed by generation stored in the device. ? S 32. The apparatus according to claim 31, wherein: a mutual authentication is performed with the key renewal terminal for the purpose of acquiring the encryption key managed by generation from the renewal terminal. key, and the acquisition of the encryption key is made 25 managed by generation only when the mutual authentication with the key renewal terminal has been carried out successfully. The apparatus according to claim 31, wherein: a single node key is preserved for each of the nodes included in a hierarchical tree-like structure that includes several different information recorders such as each sheet and a single sheet key for each of the information recorders; and the encryption key managed by generation is a key that can be renewed with at least one of the node key or sheet key. The apparatus according to claim 33, wherein the encryption key managed by generation is a master key common to the various information registers. The apparatus according to claim 33, wherein: the node key can be renewed; is distributed, when a node key must be renewed, a key renewal block (KRB) derived from the encryption of the renewed node key with at least one node key or sheet key at a lower stage of the structure from tree type to an information recorder as a sheet where the node key has to be renewed; and the encryption device in the recorder of • information receives renewal data for the encryption key managed by crypto generation with the renewed node key, cryptography the key renewal block (KRB) to acquire the renewed node key, and acquires renewal data for the renewal key. encrypted managed by generation with 10 basis in the renewed node key acquired in this way. 36. The apparatus according to claim 33, wherein: the key renewal block (KRB) is stored in a recording medium.; and the encryption cryptography device the key renewal block (KRB) read from the registration means. 37. The apparatus according to claim 33, wherein: the encryption key handled by generation has a generation number as renewal information correlated therewith; and the encryption device stores, as a registration generation number in the recording medium, a generation number of the encryption key managed by generation that has been used to store encrypted data in the recording medium. 5 38. An information player for reproducing information from a recording medium, the apparatus comprises: a cryptographic device for deciphering information to be registered in the recording medium by a jdfc 10 encrypted with a cryptographic key managed by generation that it is renewed in a different key for each generation; and a user interface for making a comparison between the generation information in a key of 15 decryption handled by generation stored in the device that is stored in a storage device of the information player and a generation information of record which is generation information that has been 20 used to record the information in the recording medium, and produce a warning when the result of the comparison is that the generation information of the record is more recent than indicated by the generation information in the key of 25 deciphered managed by generation stored in the device. 39. The apparatus according to claim 38, wherein the encryption device does not perform any decryption of information when a comparison 5 carried out between the record generation information which is a generation information that has been used to record the information in the recording medium and a pre-record generation information that is a media generation information | ** M 10 The registry record previously stored in the record means shows that the pre-registration generation information is more recent than the record generation information. 40. The apparatus according to claim 38, wherein the decryption key handled by generation stored in the device is a common master key for several information players. • 41. The apparatus according to claim 38, wherein the encryption device includes a 20 device for renewing, when the pre-registration generation information is more recent than the generation information in the decryption key handled by generation stored in the device, a decryption key managed by generation of a 25 generation as recent or more recent than the generation indicated by the pre-registration generation information. 42. The apparatus according to claim 38, in • where the encryption device includes a 5 key creation device for creating, based on the decryption key managed by generation stored in the device, a decryption key managed by generation whose generation information is older than the generation information in the key code of the code. deciphered managed by generation stored in the device. 43. The apparatus according to claim 38, wherein the encryption device includes a device for renewing, when the information of 15 generation of record is more recent than the generation information in the encryption key handled by generation stored in the device, • a cryptographic key managed by generation of a generation as recent or more recent than 20 generation indicated by the pre-registration generation information; and the key renewal device decrypts a cryptographic key managed by generation to be renewed, encrypted, with a device key 25 stored in the information player to create a cryptographic key managed by renewed generation. 44. The apparatus according to claim 43, in • where the encryption device acquires a 5 key table where the encryption key managed by generation to be renewed, encrypted, and a key identifier of the decryption device are correlated to decrypt the encryption key managed by generation to be renewed, 10 encrypted, with a key of device identified based on the device key identifier in the key table. 45. The apparatus according to claim 43, wherein the device key is a common key to 15 information players grouped by division into categories into a common category. 46. The apparatus according to claim 43, wherein the device key is a common key to information players found in the 20 same group by grouping based on serial numbers assigned to the information players. 47. The apparatus according to claim 38, wherein: a single node key is preserved for each of the nodes included in a hierarchical tree-like structure that includes several different information players each one as a leaf and one single sheet key for each of the information players; and 5 the encryption key handled by generation is a key that can be renewed with at least any of the node key or sheet key. 48. The compliance apparatus according to claim 47, wherein the encryption key managed by | 4 * k 10 generation is a common master key to the various information players. 49. The compliance apparatus in claim 47, wherein: the node key can be renewed; 15 is distributed, when a node key must be renewed, a key renewal block (KRB) derived from the encryption of the renewed node key with at least any of a node key or a sheet key in a lower stage of a structure of 20 tree to an information player as a sheet where you must renew the node key; and the encryption device in the information player receives renewal data for the decryption key handled by generation, encrypted with 25 the renewed node key, cryptography the block JL U? U ?? CSSU key renewal (KRB) to acquire the renewed node key, and acquire renewal data for the decryption key managed by generation based on the renewed node key acquired in this way. 50. The apparatus according to claim 47, wherein: the key renewal block (KRB) is stored in a registration means; and the encryption cryptography device the key renewal block (KRB) read from the registration means. 51. The apparatus according to claim 47, wherein: the decryption key handled by generation has a generation number as correlated renewal information; and to decrypt cryptographic data read from the recording medium, the encryption device reads, from the recording medium, a generation number of the encryption key handled by generation that has been used to encrypt the data and decrypt the encrypted data with a decryption key managed by generation that corresponds to the generation number read in this way. 52. An information player for reproducing information from a recording medium, the apparatus comprises: • a cryptographic device for deciphering information read from the recording medium by a cryptography with a decryption key managed by generation that is renewed in a different key for each generation; and a key acquisition device for performing I? _ \ 10 a comparison between the generation information between generation information in a decryption key handled by generation stored in the device that is stored in a storage device of the player of Information and generation information that is a generation information that has been used to record the information, and acquire a decryption key managed by generation of a generation as recent or more recent than indicated 20 for the record generation information when the result of the comparison is that the record generation information is more recent than the generation information in the decryption key handled by generation stored in the device. 53. The apparatus according to claim 52, wherein the encryption device does not perform no decryption of information when a comparison is made between the generation information of the record which is generation information that has been used to record the information in the recording medium and a generation information of the pre-record which is generation information of record means previously stored in the record means shows that the pre-registration generation information is more recent than the record generation information. 54. The apparatus according to claim 52, wherein the key acquisition device includes a communication interface capable of receiving data at 15 through a network. 55. The apparatus according to claim 52, wherein the key acquisition device includes a communication modem capable of receiving data through a telephone line. 56. The apparatus according to claim 52, wherein the key acquisition device includes an I / C card interface capable of receiving data through an IC card. 57. The apparatus according to claim 52, in 25 where: 1. «Mtaimr. ? the encryption device performs a mutual authentication with a key delivery device when the key acquisition device is about to acquire the decryption key handled by generation; and the key acquisition device effects the acquisition of the key handled by generation only when the mutual authentication with the key delivery device has been carried out successfully. 58. The apparatus according to claim 52, wherein the decryption key handled by generation stored in the device is a master key common to several information players. 59. The apparatus according to claim 52, wherein the encryption device includes a device for renewing, when the registration generation information is more recent than the generation information in the decryption key handled by generation stored in the device. , a decryption key managed by generation of a generation as recent or more recent than indicated by the generation of registration information. 60. The apparatus according to claim 52, wherein the encryption device includes a key creation device for creating, based on the encryption key managed by generation stored in the device, a decryption key managed by generation whose generation information 5 is older than the generation information in the decryption key handled by generation stored in the device. 61. The apparatus according to claim 52, wherein: 10 10 the encryption device includes a device M to renew, when the record generation information is more recent than the generation information in the decryption key handled by generation stored in the device, a password of 15 encryption managed by generation of a generation as recent or more recent than the generation indicated by the registration generation information; and the key renewal device decrypts a 20 decryption key managed by generation to be renewed, encrypted, with a device key stored in the information player in order to create a cryptographic key managed by renewed generation. 62. The apparatus according to claim 61, wherein the encryption device acquires a key table in which the code of encryption handled by generation to be renewed, encrypted, and a • decryption device key identifier are 5 correlated among them to decrypt the cryptographic key handled by generation to be renewed encrypted with a device key identified based on the device key identifier in the key table. »63. The apparatus according to claim 61, wherein the device key is a common key to the information players grouped by division into categories into a common category. 64. The apparatus according to claim 61, in 15 where the device key is a common key for the information players that are in the same group by grouping based on • serial numbers assigned to the information players. 65. The apparatus according to claim 52, wherein: a unique node key is provided for each of the nodes included in a hierarchical structure of tree type that includes several players of 25 different information each as a sheet and a single sheet key for each of the information players; and the decryption key handled by generation is a key that can be renewed with at least 5 of the node key or sheet key. 66. The apparatus according to claim 65, wherein the decryption key handled by generation is a master key common to the various information players. * 10 67. The apparatus according to claim 65, wherein: the node key can be renewed; is distributed, when a node key must be renewed, a key renewal block (KRB) derived 15 of the decryption of the renewed node key with at least one node key or sheet key in a lower stage of the tree-like structure to an information player in a sheet where the node key has to be renewed; and 20 the encryption device in the information player receives renewal data for the decryption key handled by generation encrypted with the renewed node key, cryptography the key renewal block (KRB) to acquire the key of 25 renewed node, and acquires renewal data for the decryption key managed by generation based on the renewed node key acquired in this way. 68. The apparatus according to claim 65, wherein: the key renewal block (KRB) is stored in a registration means; and the encryption cryptography device the key renewal block (KRB) read from the registration means. 69. The apparatus according to claim 65, wherein: the decryption key handled by generation has a generation number as correlated renewal information; and 15 for decrypting encrypted data read from the recording medium, the encryption device reads, from the recording medium, a number of • generation of the cryptographic key managed by generation that has been used to encrypt the 20 data and decrypts the encrypted data with the decryption key managed by generation that corresponds to the generation number read in this way. 70. An information player to reproduce information from a recording medium, the The apparatus comprises: a cryptography device for deciphering information read from the recording medium by a cryptography with a decryption key managed by generation that is renewed in a different key for each generation; and a key renewal terminal connection interface for connecting a key renewal terminal that performs a comparison between the generation information in a cryptography key handled by i '? k generation 10 stored in the device that is stored in an information player storage device and a record generation information that is generation information that has been used for 15 register the information in the registration medium and acquire a cryptography key managed by generation of a generation as recent or more recent than that indicated by the generation information in the decryption key managed by Generation stored in the device when the result of the comparison is that the record generation information is more recent than the generation information in the generation-managed decryption key stored in the device. 71. The apparatus according to claim 70, wherein: a mutual authentication is performed with a key distribution device when the key acquisition device is about to acquire the decryption key 5 handled by generation; and the acquisition of the key managed by generation is effected only when the mutual authentication with the key distribution device has been carried out successfully. At 10 72. The apparatus according to claim "0, wherein: a single node key is retained for each of the nodes included in a hierarchical tree-like structure that includes several node players. 15 different information each one as a sheet and a single sheet key for each of the information players; and the decryption key managed by generation is a key that can be renewed with at least 20 any of the node key or sheet key. 73. The apparatus according to claim 72, wherein the decryption key handled by generation is a master key common to the various information players. 74. The apparatus according to claim 72, wherein the node key can be renewed, is distributed, when a node key must be renewed, a key renewal block (KRB) derived from the decryption of the key node renewed with at least any one of a node key or leaf key at a lower stage of the tree-like structure to an information player on a sheet where the node key has to be renewed; and the encryption device receives data from 10 renewal for the decryption key managed by generation encrypted with the renewed node key, cryptography the key renewal block (KRB) to acquire the renewed node key, and acquire renewal data for the key of 15 decryption handled by generation based on the renewed node key acquired in this way. 75. The apparatus according to claim 72, wherein: the key renewal block (KRB) is stored in a recording medium; and the cryptography encryption device the key renewal block (KRB) read from the registration means. 76. The apparatus according to claim 72, wherein: • • • • • • The decryption key managed by generation has a generation number as correlated renewal information; and to decrypt cryptographic data read from the recording medium, the encryption device reads, from the recording medium, a generation number of the encryption key handled by generation that has been used to encrypt the data and decrypt the encrypted data ccr a decryption key managed by a generator. which corresponds to the generation number read in this way. A method of recording information to record information in a recording medium, the method comprises the steps of: encrypting information to be recorded in the recording medium through encryption with a generation-managed encryption key which is renewed in a key different for each generation; making a comparison between the generation information in a generation-managed encryption key stored in the device which is stored in a storage device of an information recorder and a pre-registration generation information which is an information of generation of record medium previously stored in the recording medium; and producing a warning when the result of the comparison is that the pre-registration generation information is more recent than the generation information in the generation-managed cryptography key stored in the device. 78. A method of recording information to record information in a recording medium, method 10 comprises the steps of: • encrypting information to be registered in the recording medium through encryption with a generation-managed encryption key which is renewed in a different key for each generation; and 15 making a comparison between the generation information in a generation-managed cryptography key stored in the device which is stored in a storage device of an information register and a pre-registration generation information which is a registration medium generation information previously stored in the recording medium; and acquire a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the information L * t, ^ < && amp; & amp; g & of generation of pre-registration when the result of the comparison is that the generation information of pre-registration is more recent than the generation information in the encryption key handled by 5 generation stored in the device. 79. The method according to claim 78, wherein the key acquisition step further includes the steps of: renewing the encryption key handled by ^ ** t 10 generation with at least one single node key for each of the nodes included in a tree-like hierarchical structure that includes several different information registers each as a sheet or as a single sheet key for each of the information registers; and encrypt data to be recorded in a registration medium with the encryption key managed by renewed generation in the renewal step. 80. The method according to claim 79, wherein the encryption key managed by generation is a master key common to the various information registers. 81. The method according to claim 79, wherein: the node key can be renewed; is distributed, when the node key needs to be renewed, a key renewal block (KRB) that is derived from the encryption of the renewed node key • with at least either a node key or a leaf key 5 in a lower stage of the tree structure to an information logger on a sheet where the node key must be renewed; and the renewal step further includes the steps of: acquiring a renewed node key by cryptography j * 10 of the key renewal block (KRB); and calculate renewal data for the encryption key managed by generation based on the renewed node key acquired in this way. 82. The method according to claim 9, in 15 where: the encryption key managed by generation has a generation number as correlated renewal information; and the step of encryption also includes the step of: storing, as the generation number of registration in the recording medium, a generation number of the encryption key managed by generation that has been used to store encrypted data in the middle of registry. 25 83. A method of reproducing information to reproduce information from a means of registration, the method includes the steps of: deciphering the information read from the medium of • registration for a cryptography with a key of 5 encryption handled by generation which is renewed in a different key for each generation; and making a comparison between generation information in a decryption key handled by generation stored in the device which is 10 finds stored in a storage device of the information player and the generation information of record which is generation information that has been used to record the information in the recording medium; and producing a warning when the result of the comparison is that the record generation information is more recent than the generation information in the decryption key handled by fc generation stored in the device. 20 84. A method of reproducing information to reproduce information from a recording medium, the method includes: deciphering the information read from the recording medium by means of a cryptography with a password of 25 encryption handled by generation which is . m ~ ß a renewed in a different key for each generation; and making a comparison between the generation information in a decryption key managed by generation stored in the device, which is stored in a storage device of an information recorder / player and the generation information of record which is generation information that has been used to record the information; and 10 acquiring a decryption key managed by generation of a generation as recent or more recent than the generation indicated by the record generation information when the result of the comparison is that the generation information of The record is more recent than the generation information in the decryption key handled by generation stored in the device. ™ * and 85. The method according to claim 84, wherein the key acquisition step further includes 20 the steps of: renewing the decryption key managed by generation with at least any of a single node key for each of the nodes included in a hierarchical tree-like structure that includes several 25 different information players each as a sheet or a single sheet key for each of the information players; and decrypt data to be recorded in a registration medium with the decryption key managed by renewed generation in the renewal step. 86. The method according to claim 85, wherein the decryption key handled by generation is a master key common to the various information players. 87. The method according to claim 85, wherein: the node key can be renewed; is distributed, when the node key needs to be renewed, a key renewal block (KRB) that is derived from the encryption of the renewed node key with at least one node key or one sheet key in one stage bottom of the tree structure to an information player on a sheet where the node key must be renewed; and the renewal step further includes the steps of: acquiring a renewed node key by encryption of the key renewal block (KRB); and calculate renewal data for the decryption key managed by generation based on the renewed node key acquired in this way. 88. The method according to claim 85, wherein: the decryption key handled by generation has a • generation number as correlated renewal information 5; and the step of deciphering also includes the step of: reading a generation number of a cryptographic key managed by generation that has been used to encrypt the data from the 10 means of registration; and W deciphering the encrypted data read from the recording medium with a decryption key handled by generation corresponding to the generation number read in this way. 15 89. A medium for recording information in which information can be recorded, the medium has stored there: a pre-registration generation information as generation information on a key allowed as a cryptography key that can be used to Write encrypted data in the information recording medium or a decryption key that can be used to decrypt data read from the information recording medium. 90. The means of recording information in accordance with 25 claim 89, wherein the information of __ ^ __ ^ ¡^ "* • -" - * * - • * - pre-registration generation is registered in an area where you can not rewrite a means of information registration. 91. A key renewal terminal for sending a key managed by renewed generation to an information recorder or player having a cryptographic device for encrypting information to be recorded in a recording medium or a recorder or player of information having a j ^ k 10 device encrypted to decrypt information read to From a recording medium, each by means of a cryptography with a key managed by generation that can be renewed in a different key for each generation, the apparatus comprises: an interface that can be connected to the information recorder or player; a device for communications with the outside; Y ^? ^ "j a device to control the acquisition of a unique identifier for a device from the 20 recorder or player of information through the interface, the transmission of the unique identifier for device through the communication device, and the transfer of the key managed by renewed generation to the recorder or player of information to 25 through the interface. r -? ~ --- lt f.J1ímn B * > -'- '- »- * -» »-» > - 92. A key renewal terminal to distribute a key managed by renewed generation to an information recorder or player that has a device • cryptography r to encrypt information to be registered in a recording medium or a recorder or player of information that has a cryptographic device to decipher information read from the recording medium, each one by a cryptography with a key managed by generation that jj ^ ** 10 can be renewed in a different key for each generation, the apparatus comprises: an interface that can be connected to the information recorder or player; a storage device that has stored 15 therein a key table in which a key managed by crypto generation with a unique encryption key for device is correlated IM with a unique identifier for the information recorder or player; and a device for controlling the acquisition of the unique identifier for the device from the information recorder or player through the interface, the acquisition, based on the unique identifier for the device, of a key managed by the device. 25 encrypted generation corresponding to the ^^ g ^ g ^^ unique identifier for device from the storage device, and the transfer of the key handled by renewed generation to the 9 recorder or player of information through the interface. 93. The means according to claim 92, wherein: a mutual authentication is performed with the information recorder or player; and jj ^ 10 the key handled by generation is distributed to the recorder or player of information only when the mutual authentication has been carried out successfully. 94. A key renewal method managed by 15 generation to provide a key managed by renewed generation to an information recorder or player having a cryptographic device for encrypting information to be recorded in a recording medium or a recorder or player of Information that has a cryptographic device to decipher information read from a recording medium, each one by a cryptography with a key managed by generation that can be renewed in a different key for each generation, the method 25 comprises the steps of: connecting a key renewal terminal that includes an interface that can be connected to an information recorder or player and a MP device for communications with the outside to the 5 information recorder or player; acquire a unique identifier for a device from the recorder or player of information through the interface; transmit the unique identifier for device to j ^^ 10 through the communication device; P receiving the key manages by renewed generation through the communications device; and transfer the key managed by renewed generation to the recorder or player of information through the 15 interface. 95. A key renewal method managed by generation to provide a key managed by renewed generation to an information recorder or player that has a cryptographic device 20 for encrypting information to be recorded in a recording medium or a recorder or player of information having a cryptographic device for deciphering information read from a recording medium, each by a cryptography with a 25 key managed by generation that can be renewed in ...... ........ ......... a different key for each generation, the method includes the steps of: connecting a key renewal terminal that '• includes an interface that can be connected to a data recorder or player and a storage device that has stored there a key table where a key handled by generation encrypted with a unique encryption key for a device is »10 correlated with a unique identifier for device of the recorder or player of information to the recorder or player of information; acquire the unique identifier for device to 15 from the information recorder or player through the interface; acquire, based on the unique identifier for the device, a key managed by encrypted generation which corresponds to the unique key 20 for device from the storage device; transfer the key managed by renewed generation to the recorder or player of information through the interface. 96. The method according to claim 95, wherein: a mutual authentication is performed with the information recorder or player; and the key handled by renewed generation is distributed to the recorder or information player only when the mutual authentication has been successfully performed. A program distribution means for distributing a computer program under which the information is recorded in a recording medium in a computer system, the computer program comprises the steps of: making a comparison between generation information in a key of encryption handled by generation stored in the device which is stored in a storage device of an information recorder and a generation information of pre-registration which is a generation information of record means previously stored in the middle of registry; encrypt information to be stored in the recording medium through cryptography with a cryptographic key managed by generation that can be renewed in a different key for each generation; and to carry out at least either the production of a warning or the acquisition of a cryptographic key managed by generation of a generation as recent or more recent than the generation indicated by the generation information in the cryptography key handled by generation stored in the device when the result of the comparison is that the pre-registration generation information is more recent than the generation information in the generation-managed encryption key stored in the device. The means according to claim 97, wherein the computer program includes the step of: renewing the cryptographic key handled by generation by means of the cryptography of encrypted data read from the registration means with at least one key of single node for each of the nodes included in a hierarchical structure of tree type that includes several different information recorders, each one as a sheet or a single sheet key for each of the information recorders. A means of providing a program to provide a computer program under which the information is ,. ... registered to a means of registration in a computer system, the computer program comprises the steps of: making a comparison between the information of 5 generation on a key of encryption handled by generation stored in device which is stored in a device of storage of an information player and record generation information which is 10 a generation information that has been used to record the information in the recording medium; decipher the information read from the recording medium by a cryptography with a password of 15 deciphered managed by generation that can be renewed in a different key for each generation; and perform at least either the production of a warning P or the acquisition of a cryptographic key managed by generation of a 20 generation as recent or more recent than the generation indicated by the generation information in the decryption key handled by generation stored in the device when the result of the comparison is that generation information of 25 record is more recent than information from . ^. A. , ^ rn ^^ rn ^. ^^ - > generation in the decryption key handled by generation stored in the device. 100. The medium according to claim 99 in • where the computer program also includes the 5 steps of: renewing the decryption key managed by generation by decrypting encrypted data read from the registration medium with at least one single node key for each one of them the 10 nodes included in a tree-like hierarchical structure that includes several different information players each as a sheet or a single sheet key for each of the information players. fifteen fc twenty 25
MXPA01012402A 2000-04-06 2001-04-06 Information recording reproducing apparatus and method. MXPA01012402A (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
JP2000105328 2000-04-06
JP2000106039 2000-04-07
JP2000170604 2000-06-07
JP2000391973A JP2002191639A (en) 2000-12-25 2000-12-25 Paper diaper
PCT/JP2001/003004 WO2001078301A1 (en) 2000-04-06 2001-04-06 Information recording/reproducing apparatus and method

Publications (1)

Publication Number Publication Date
MXPA01012402A true MXPA01012402A (en) 2002-06-07

Family

ID=34119931

Family Applications (1)

Application Number Title Priority Date Filing Date
MXPA01012402A MXPA01012402A (en) 2000-04-06 2001-04-06 Information recording reproducing apparatus and method.

Country Status (1)

Country Link
MX (1) MXPA01012402A (en)

Similar Documents

Publication Publication Date Title
US7224804B2 (en) Information processing device, information processing method, and program storage medium
US7093128B2 (en) Information recording/reproducing apparatus and method
US7088822B2 (en) Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith
US7940935B2 (en) Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium
JP4857123B2 (en) Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method
US20030051151A1 (en) Information processing apparatus, information processing method and program
MXPA06010778A (en) Digital rights management structure, portable storage device, and contents management method using the portable storage device.
WO2001078300A1 (en) Information recording/reproducing apparatus and method
KR20020079900A (en) Content data transmitting device and method, and recording/reproducing device
CN103947151A (en) Information processing device, information storage device, server, information processing system, information processing method, and program
JP2005252866A (en) Information processing apparatus, authentication processing method, and computer program
CN101103587A (en) System and method for secure and convenient handling of cryptographic binding state information
CN100458740C (en) Recording system and method, recording device and method, input device and method, reproduction system and method, reproduction device and method, recording medium, and program
JP2007124717A (en) System for preventing illegal copying of digital content
JP5624121B2 (en) REPRODUCTION DEVICE, CONTENT DISTRIBUTION SYSTEM, REPRODUCTION METHOD, COMPUTER PROGRAM, AND INTEGRATED CIRCUIT
KR20090002660A (en) Method for reproducing and approving playback of encrypted contents and apparatus thereof
JP4505693B2 (en) Information processing apparatus, information processing method, and recording medium
JP2005505853A (en) Apparatus and method for reading or writing user data
KR100746537B1 (en) Information recording/reproducing apparatus and method
JP2005223504A (en) Service providing server, information processor and data processing method, and computer program
JP4131067B2 (en) Information processing apparatus, information processing method, and program recording medium
KR100695665B1 (en) Apparatus and method for accessing material using an entity locked secure registry
JP2002244552A (en) Information reproducing device, information reproducing method, and information recording medium and program storage medium
JP4367166B2 (en) DRIVE DEVICE, REPRODUCTION PROCESSING DEVICE, INFORMATION RECORDING MEDIUM, DATA PROCESSING METHOD, AND COMPUTER PROGRAM
JP2002236622A (en) Device for regenerating information device for recording information, method of regenerating information, method of recording information, recording medium for information, and medium for recording program