MXPA06007122A - Information processing device and method - Google Patents

Information processing device and method

Info

Publication number
MXPA06007122A
MXPA06007122A MXPA/A/2006/007122A MXPA06007122A MXPA06007122A MX PA06007122 A MXPA06007122 A MX PA06007122A MX PA06007122 A MXPA06007122 A MX PA06007122A MX PA06007122 A MXPA06007122 A MX PA06007122A
Authority
MX
Mexico
Prior art keywords
data
information
processing
recording medium
unit
Prior art date
Application number
MXPA/A/2006/007122A
Other languages
Spanish (es)
Inventor
Takashima Yoshikazu
Watanabe Ayako
Original Assignee
Sony Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corporation filed Critical Sony Corporation
Publication of MXPA06007122A publication Critical patent/MXPA06007122A/en

Links

Abstract

It is possible to provide use management for data generated or acquired after data which hasbeen stored in an information recording medium, and secure data management. Late data such as information generated or downloaded later by a user in association with content information in the content management unit stored in an information recording medium is made into encrypted data by applying a unit key corresponding to a content management unit or a unit key corresponding to a new content management unit and recorded as data constituting the content management unit. With this configuration, it is possible to realize secure data management and use management of the late data like the original-unit-corresponding data.

Description

INFORMATION PROCESSING DEVICE AND METHOD Technical Field The present invention relates to a device for information processing, to an information processing method, and to a computer program. More particularly, the present invention relates to an information processing device, an information processing method, and a computer program, wherein the information, recently generated or downloaded by a user in relation to content information stored in a means of recording information in increments of units, is recorded as managed data corresponding to the units, with secure data management and use management that are achieved by each unit of the data recently generated equally. Prior Art Various types of software data, such as audio data such as music and the like, image data such as movies and the like, game programs, various types of application programs and the like (hereinafter referred to collectively as "content"), can be stored in recording media, such as Blu-ray discs (commercial name of optical disc format) using blue lasers, or DVDs (Digital Versatile Disks (CDs = Digital Versatile), Mini Discs (MDs) - Mini Disc), compact discs (CDs = Compact Disk), or similar, as digital data, in particular, Blu-ray discs that use blue laser, are capable of high density recording and can record large amounts of image content and Like high definition data, digital contents are stored in the various types of information recording media and are provided to the user.The user reproduces and uses the contents using a playback device such as a PC Personal Computer (PC = Personal Computer), and disc player or similar, with many contents, such as music data, image data and the like, in general distribution rights are retained. by the author or distributor. Accordingly, in general, an arrangement is made such that certain restrictions of use are applied to the distribution of these contents, that is, only authorized users can use the contents and that no unauthorized duplications are made and so on. . With digital recording devices and recording media, the data can be repeatedly recorded and played without deterioration in image quality or audio quality, for example, and in accordance there is the problem of wide distribution of unauthorized copies of content via the Internet, so-called pirate recording discs, where the contents are copied to CD-Rs or similar, and the use of copied contents stored on hard disks of PCs and the like. High capacity recording media such as DVDS and blue laser recording media developed in recent years, are capable of storing large amounts of digital information, one to several movies on a disc, for example. The ability to record this information from images or movies and the like as digital information, makes avoiding unauthorized copies to protect the holders of copyright, an aspect increasingly important. To date, various techniques have been put into practice to avoid unauthorized copying with digital recording devices and recording media, in order to protect this unauthorized copying of digital data. For example, the Content Encryption System is used with DVD players. With the Content Encryption System, video data, audio data, etc. are recorded in a read-only memory on DVD-ROM (Read Only Memory) in an encrypted form, and a key is provided to be used in deciphering Encrypted data to a licensed DVD player. A license is provided to a DVD player designed to follow stipulations of predetermined action, such as not performing unauthorized copying and so on. According to this, licensed DVD players can play the images and audio of the DVD-ROM by using the key provided to decrypt the encrypted data recorded on the DVD-ROM. On the other hand, unlicensed DVD players do not have the key to decrypt the encrypted data and accordingly, they can not decipher the encrypted data recorded on the DVD-ROM. In this way, DVD players that do not meet the conditions required at the time of licensing, can not play DVD-ROM storing digital data, thus avoiding unauthorized copying. In this way, a content management system stored in the information recording medium has been established. However, secure data management and secure usage administration are far from being achieved with respect to data generated by a user running a program stored in the medium of recording information such as content and data content obtained from external servers, and so on. In the case of secure administration of data generated by users running programs stored in media for recording or recording information and data content obtained from external servers, the individual data must be handled by the user with protection with its own password. , applying an encryption key obtained externally to create encrypted data, and so on. This data management configuration results in the growing problem of an increased number of encryption keys and passwords to handle in the event that generated data and data are obtained, the location of data easily does not become clear and also the correlation of stored data and key encryption / keys does not become clear either. Another current aspect is that insufficient measures are not implemented with respect to these new data. Description of the Invention Problems to be Resolved by the Invention The present invention has been made in light of the foregoing, and accordingly, an objective thereof is to provide an information processing device, an information processing method and an information processing device. a computer program for recording or recording new data, such as information that a user has generated or information that has recently been downloaded in relation to content information in increments of units stored in a recording medium or information record, such as data managed for the units, to achieve secure data management and management of data usage recently generated equally. Means for Resolving Problems According to a first aspect of the present invention, an information processing device comprises: a recording medium interface for executing data reading of an information recording medium; and a data processing unit for executing processing of recording new data, either generated or obtained by applying information obtained from the information recording medium; wherein the information recording medium is a means of recording information that stores data recorded in increments of content management units including encrypted data, encrypted by unit keys, each of which is established as different encryption keys; and wherein the data processing unit obtains a unit key corresponding to a content management unit to which the obtained information belongs or a corresponding unitary key to a new content management unit, executes encryption processing of the new data applying the obtained unit key and executing recording processing with the generated encrypted data, as data that configure the content management unit. In addition, according to an embodiment of the information processing device according to the present invention, the data processing unit is configured to establish a content management unit corresponding to the new data and also executes adjustment processing for a key. of encryption that serves as administration information corresponding to the content management unit including the new data. Further, according to an embodiment of the information processing device according to the present invention, the data processing unit is configured to adjust a content management unit corresponding to the new data and also executes adjustment processing for information of content use control that serves as management information that corresponds to the content management unit including the new data. Further, in accordance with an embodiment of the information processing device according to the present invention, the data processing unit is configured to execute write processing of the new data to a region stipulated by a program included in the information that is obtains from the information recording medium. Further, according to one embodiment of the information processing device according to the present invention, the data processing unit is configured to, in a case of storing the new data in the storage means other than a recording medium of information from which the information has been obtained, execute processing to store the new data correlated with the identification information of the information recording medium, from which the information has been obtained. In addition, according to an embodiment of the information processing device according to the present invention, the data processing unit is configured to execute encryption processing of an AV current data file including new data and a navigation file that it includes control information or a program to be applied to reproduction processing of the AV data stream and to execute recording processing of the new data in storage media. In addition, according to an embodiment of the information processing device according to the present invention, the data processing unit is configured to apply a corresponding unit key to a content management unit as an encryption key to be applied by the encryption processing. Furthermore, according to an embodiment of the information processing device according to the present invention, the data processing unit is configured to execute encryption processing by applying, as an encryption key or encryption key generation information, information that can only be obtained by a licensed application to execute processing with respect to the content management unit. In addition, according to one embodiment of the information processing device in accordance with the present invention, the information that can only be obtained by a licensed application is information that includes a device ID as a unique identifier to the device where it is installed. the application. In addition, according to an embodiment of the information processing device according to the present invention, the data processing unit is configured to generate a summary function value or hash, for verification by tampering with respect to at least one of an AV current data file including new data and a navigation file including control information or a program to apply in reproducing processing of AV current data, and registering the hash value in the storage media. Further, according to one embodiment of the information processing device according to the present invention, the data processing unit is configured to execute tampering verification processing of data, based on the hash value that is established for a AV stream data file including new data or a navigation file, at the time of using the file, and execute processing of use of the files under the condition that there is no tampering. In addition, according to an embodiment of the information processing device according to the present invention, the data processing unit is configured to execute recording processing of a navigation file, including control information or a program to be applied in playback. processing of AV current data including new data, to storage media, such as a file to which an electronic signature has been added for verification of tampering. In addition, according to an embodiment of the information processing device in accordance with the present invention, the data processing unit is configured to execute tampering verification processing of data, based on the electronic signature established for the data file. AV current data including new data or the navigation file, at the time of using the file, and executes processing of use of the files under the condition that there is no tampering. Furthermore, according to a second aspect of the present invention, an information processing device comprises: a recording medium interface, for executing data reading of an information recording medium.; and a data processing unit, for executing processing of a program included in information that is read from the information recording medium; wherein the data processing unit is configured to determine the type of information recording medium from which the program has been read and execute the program under the condition that the program is of a type with respect to which it has been established in advance Execution permit. In addition, according to an embodiment of the information processing device according to the present invention, the data processing unit is configured to obtain, from information read from the information recording medium, type information of the information recording medium. with respect to which program execution is allowed and execute the determination of allowing / not allowing the execution of the program, according to the obtained information.
In addition, according to a third aspect of the present invention, an information processing method comprises: a data reading step for reading data from an information recording medium; and a data processing step, to execute recording processing of new data either generated or obtained by applying information obtained from the information recording medium; wherein the information recording medium is a means of recording information that stores data recorded in increments of content management units including encrypted data, encrypted by unit keys, each of which is established as different encryption keys; and wherein the data processing stage includes a obtaining step, to obtain a unitary key corresponding to the content management unit to which the obtained information belongs or a unitary key corresponding to a new content management unit, a step to execute encryption processing of the new data by applying the obtained unit key, and a step to execute recording processing with the encrypted data generated as data that configure the content management unit. In addition, according to one embodiment of the information processing method in accordance with the present invention, the data processing step includes a step for adjusting a content management unit corresponding to the new data and also executing adjustment processing for a encryption key, which serves as administration information corresponding to the content management unit including the new data. Further, according to one embodiment of the information processing method in accordance with the present invention, the data processing step includes a step for adjusting a content management unit corresponding to the new data and also executing adjustment processing for information. Use control that serves as administration information corresponding to the content management unit, including new data. In addition, according to one embodiment of the information processing method according to the present invention, the data processing stage includes a step to execute write processing of the new data in a region stipulated by a program included in the information obtained. of the information recording medium. In addition, according to an embodiment of the information processing method according to the present invention, in a case of storing the new data in storage means other than a recording medium of information from which the information has been obtained, the data processing executes processing to store the new correlated data with identification information of the information recording medium from which the information has been obtained. Further, according to one embodiment of the information processing method according to the present invention, the information processing method further comprises an encryption processing processing step of encrypting an AV current data file, including new data and a navigation file that includes control information or a program to be applied to reproduce processing of the AV current data, and execute the processing of recording new data in storage medium. In addition, according to one embodiment of the information processing method according to the present invention, the encryption recording processing step is a step to execute encryption processing, applying a corresponding unitary key to a content management unit such as an encryption key to apply to encryption processing. further, according to an embodiment of the information processing method in accordance with the present invention, the encryption recording processing stage is a step to execute encryption processing, to apply, such as an encryption key or key generation information. encryption, information that can only be obtained by an application with a license to execute processing with respect to the content management unit. Further, according to one embodiment of the information processing method in accordance with the present invention, the information that can only be obtained by a license application is information that includes a device ID as a unique identifier for the device where it is stored. install the application. Furthermore, according to one embodiment of the information processing method according to the present invention, the information processing method further comprises a step to generate a hash value for tampering verification with respect to at least one of a data file of AV stream including new data, and a navigation file • that includes information of 'control or a program to be applied to playback AV data stream processing and record the hash value in storage media. In addition, according to an embodiment of the information processing method according to the present invention, the information processing method further comprises a step to execute processing for tampering of data, based on the hash value that is established for the file of AV current data, including new data or the navigation file, at the time of using the file and executing processing of use of the files under the condition that there is no tampering. In addition, according to one embodiment of the information processing method according to the present invention, the information processing method further comprises a step to execute recording processing of a navigation file, including control information or a program to be applied. to reproduce AV current data processing including new data, to storage media, such as a file to which an electronic signature has been added for verification of tampering. In addition, according to one embodiment of the information processing method in accordance with the present invention, the information processing method further comprises a step to execute verification processing for tampering with data, based on the electronic signature that is established for the archiving of AV current data including new data or the navigation file, at the time of .using the file, and executing processing of use of the files under the condition that there is no tampering. In addition, according to a fourth aspect of the present invention, an information processing method comprises: a data reading step for reading data from an information recording medium; and a data processing step for executing processing of a program included in information that is read from the information recording medium; wherein the data processing step includes a step to determine the type of information recording medium from which the program has been read and execute the program under the condition that the program is of a type with respect to which it has been established. beforehand the execution permit. In addition, according to an embodiment of the information processing method according to the present invention, in the data processing step, the information type of information recording medium with respect to which program execution is allowed, the information that reads from the information recording medium, and execution determination of allowed / not allowed program according to the obtained information is executed. Further, according to a fifth aspect of the present invention, a computer program for executing an information processing method comprises: a data reading step, for reading data from an information recording medium; and a data processing step for executing recording processing of new data either generated or obtained by applying information obtained from the information recording medium; wherein the information recording medium is a means of recording information that stores data recorded in increments of content management units including encrypted data, encrypted by unit keys, each of which is established as different encryption keys; and wherein the data processing step includes a obtaining step, to obtain a unit key corresponding to a content management unit to which the information obtained belongs or a corresponding unitary key to a new content management unit, a step to execute encryption processing of the new data, applying the obtained unit key, and a step to execute recording processing with encrypted data generated as data that configure the content management unit. In addition, according to a mode of the computer program according to the present invention, the computer program further comprises an encryption recording processing step, to execute encryption processing of an AV current data file including new data and a navigation file that includes control information or a program to be applied to play AV data stream processing including new data, and record recording media. In addition, according to a mode of the computer program according to the present invention, the computer program further comprises a step of recording, on storage media, tampering verification data with respect to at least one of a data file of AV stream including new data, and a navigation file that includes control information or a program to be applied to playback AV data stream processing including new data, and recording on recording media. In addition, according to a mode of the computer program according to the present invention, the computer program further comprises a step to execute processing for tampering of data, based on the tampering verification data established for the AV current data file, including new data or the navigation file, at the time of using the file and executing processing of use of the files under the condition that there is no tampering. Furthermore, according to a sixth aspect of the present invention, a computer program for executing an information processing method comprises: a data reading stage, for reading data from an information recording medium; and a data processing step, for executing processing of a program included in information read from the information recording medium; wherein the data processing step 'includes a step to determine the type of information recording medium from which the program has been read, and execute the program under the condition that the program is of a type with respect to which it has been pre-established execution permission. It should be noted that the computer program according to the present invention is a computer program that can be provided to, for example, a computer system capable of executing various types of program codes, in a program-readable format, through means of storage or means of communication, for example recording medium such as DVDs, CDs, MOs, or the like or means of communication such as networks. Processing corresponding to the program is achieved in the computer system by this program that is provided in a computer readable format. Additional objects, features and advantages of the present invention will be more apparent from the following embodiments of the present invention and from the detailed description of the accompanying drawings. It should be noted that the system as used in the present specification means a logical group of multiple devices and is not restricted to each of the devices of the configuration that is within the same housing. Advantages According to the configuration of the present invention, new data such as information that a user has generated or information that has recently been downloaded, in relation to content information in increments of units stored in an information recording medium, in the form of encrypted data to which a corresponding unit key has been applied to a content management unit or a unit key corresponding to a new content management unit, such as configuration data of the content management unit, in such a way that Administration of use and management of secure data for recently generated data is achieved in the same way as with the correlated data of the original unit. Furthermore, according to the configuration of the present invention, when executing a program included in information read from an information recording medium, the type of information recording medium from which the program has been read is determined and the program is executed under the condition that the type is established in advance with permission to execute the program, so that the execution of the program using a copy of the content, for example will be rejected and unauthorized use of copied discs can be avoided. Further, in accordance with the configuration of the present invention, in addition to AV current data files, navigation files are likewise encrypted or adjusted with tampering verification data and stored, such that a data file of AV stream compatible with CPS drive or applications that apply different navigation files to license application, or perform processing such as modifying data or the like, in a device capable of using various applications such as a PC or the like, for example, can be avoided and the unauthorized use of data compatible with CPS unit including the navigation files can be eliminated. BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a diagram for describing the configuration of data stored in an information recording medium. Figure 2 is a diagram illustrating an example of a CPS unit management table. Figure 3 is a diagram for describing an example of adjustment of content management units established with respect to the content stored in an information recording medium. Figure 4 is a diagram for describing an example of encryption configuration of content management units that are established with respect to content stored in an information recording medium. Figure 5 is a diagram for describing an example configuration of a data storage directory in an information recording medium. Figure 6 is a diagram for describing processing for generating or obtaining new data in an information processing device to which a means of recording or recording information has been mounted. Figure 7 is a diagram for describing a new sequence for obtaining data with the information processing device. Figure 8 is a diagram for describing an example of new data generated or obtained with the information processing device. Figure 9 is a diagram for describing an example of new data generated or obtained with the information processing device. Figure 10 is a diagram to describe the relationship between new data generated or obtained, and CPS units, with the information processing device. Figure 11 is a diagram for describing an example of adjusting control information for copying / reproducing new data generated or obtained with the information processing device. Figure 12 is a diagram for describing an adjustment example for encryption key information by new data generated or obtained with the information processing device. Figure 13 is a diagram for describing a processing configuration for storage of encryption of navigation files. Figure 14 is a diagram for describing a storage processing configuration, to avoid tampering and activate the tampering verification of browsing files. Figure 15 is a flow chart for describing a write processing sequence of new data generated or obtained with the information processing device. Figure 16 is a flowchart to describe a configuration to identify as a • CPS unit, new data generated u. obtained with the information processing device. Figure 17 is a diagram for describing a configuration for identifying as a CPS unit and obtaining new data generated or obtained with the information processing device. Figure 18 is a diagram for describing a configuration for identifying as a CPS unit new data generated or obtained with the information processing device. Figure 19 is a flow chart for describing a processing sequence for restricting execution of a program based on the type of information recording medium.
Figure 20 is a diagram for describing a specific example of processing for restricting the execution of a program based on the type of information recording medium. Figure 21 is a diagram for describing an example configuration of an information processing device that is mounted with an information recording medium and executes reproduction processing or recording processing. BEST MODE FOR CARRYING OUT THE INVENTION The following is a detailed description of the information processing device, information processing method and computer program, in accordance with the present invention, with reference to the drawings. It should be noted that the description will proceed on the following items. 1. Data stored in the medium of recording information 2. Configuration of content storage 3. Configuration and administration of use and encryption for stored content 4. Configuration of administration for recently generated data or obtained data 5. Configuration of test tampering and file encryption of navigation 6. Processing of storage of new data generated or obtained by information processing device 7. Configuration to correlate CPS unit that configures data in an information recording medium and CPS unit that configures data stored outside of a medium of information recording 8. Processing of conditions of execution of program of restriction of configuration 9. Example of configuration of device of processing of information [1. Data Stored in Information Recording Media] First, data stored in an information recording medium will be described. Figure 1 illustrates an example of an information recording medium wherein the content is stored in which the processing of the present invention applies. An information recording medium 100 is an information recording medium that stores authorized content, manufactured by a disc manufacturing plant, under the permission of a so-called holders of content rights that have authorized content authorizations or rights of ownership. distribution. It should be noted that with the following embodiment, an example of a discose means will describe as an example of the information recording medium, but the present invention can be applied to configurations using various forms of information recording means. The information recording medium 100 is a recording medium of various forms, such as for example a ROM disk to which it is impossible to rewrite data, a partial ROM disk in which only a part of the data region is susceptible to re-writing, a disc where the re-writing of data can be done for the whole region and so on. As shown in Figure 1, the content 101 is stored in the information recording medium 100. This is content 101 constituted for example by AV (Visual Audio) streams of moving image content such as Alta film content. Definition (HD = High Definition) which are high-definition moving image data, game programs in formats stipulated by particular standards, image files, audio data, text data and so on. These contents include various forms of information, such as information only usable by data for the information recording medium 100, information usable by combining data from the information recording medium 100 and data that is provided from a server connected to a network, and so on. The content 101 stored in the information recording medium 100 has at least a part stored as encrypted content, and a recording seed (REC SEED) 102 is stored as information necessary to generate a key to be applied to decryption processing of the encrypted content . The encrypted contents are stored in the information recording medium 100 as encrypted data to which a unitary key has been applied as an individual encryption key for each one., for administration of use of the contents. The recording seed (REC SEED): Vu 102, is key generation information to be applied to generate individual unit keys. It should be noted that the recording seed (REC SEED) 102 is not restricted to being stored in the information recording medium 100 and can be obtained from a network connected server, for example. The information recording medium 100 further stores a disk ID 103 which serves as identifier information of the information recording medium 100, a study ID 104 which serves as an identifier of an editing studio of the stored contents of the medium of information recording 100, a packet ID 105 that serves as a packet identifier as a manufacturing unit of the information recording medium 100, and disk type identification information 106. The contents stored in the information recording medium 100 are contents consisting for example of Audio Visual (AV) streams of moving picture contents such as High Definition movie content (HD = High Definition) which are high definition motion picture data, game programs in formats stipulated by particular rules, image files, audio data, text data and so on. In the case where the information recording medium is a Biu-ray disc, which is a data recording disc using blue laser that is capable of high density recording, for example data that follows the format of the ROM standard Blu-ray disc is stored as main content. In addition, there may be cases where data having data formats does not follow a particular AV data format, such as game programs that serve as service data, image files, audio data, text data and similar content, they are stored as sub-contents.
The various contents 101 stored in the information recording medium 100 are each stored in the information recording medium 100 individually encrypted by applying individual unitary keys, for administration of use of the contents. The recording seed 102 is applied as key generation information to generate unit keys. That is, AV currents (visual audio), music data, moving images, still images and similar image data, game programs, WEB content and the like, which constitute the content, are selected in units that are administration units of use of content, with a different recording seed: Vu 102 is applied to each section unit, so that a unit key can be generated based on the recording seed corresponding to each unit and reproduction by decryption processing is allowed. the encrypted contents applying the unit key. For example, at the time of using contents of an AV (Visual Audio) stream stored in the information recording medium 100, a predetermined encryption key generation sequence is executed by applying the recording seed: Vu 102 and although not shown the drawings, other secret information such as a physical Index recorded in the information recording medium 100 or the like, in order to obtain a unitary key corresponding to the unit, and decryption processing of the encrypted content contained in the unit, is made based on in the unit key obtained and the reproduction is performed. As described above, the encrypted contents stored in the information recording medium 100 are sectioned into units that are content usage management units. These units are called content management units (CPS = content management units). Figure 2 shows an example of correlation of CPS unit confirmations and recording seeds. Figure 2 illustrates the correlation between a CPS unit management table, which serves as information management information stored in the information recording medium and CPS unit keys that can be generated based on the recording seeds corresponding to each unit. As illustrated in the CPS unit management table shown in Figure 2, there are various adjustment increments of a CPS unit, such as a content title, application, data groups and so on, with a CPS unit ID which serves as an identifier corresponding to each CPS unit, recording seed information, and so forth correlated to each CPS unit administration table. In Figure 2, Title 1 is the CPS 1 unit and Vul is set as a corresponding recording seed, Title 2 is the CPS unit 1 and Vul is set as a corresponding recording seed and Application 1 is adjusted as a CPS unit 2. For example, a Kul unitary key is generated based on the Vul recording seed and decrypted processing of the encrypted contents contained in the CPS unit (CPSl) that can be distinguished by Title 1 and Title 2, by encryption processing that applies the Kul unitary key. In the same way, a unitary key Ku2 is generated based on the recording seed Vu2 and the decryption processing of the encrypted contents contained in the CPS unit (CPS2) that can be distinguished by the Application 1, by encryption processing that applies the unitary key Ku2. The same is true for the rest. It should be noted that the CPS units are adjusted in the CPS unit management table for new data other than content stored in the information recording medium, such as data that the user has recently generated or data obtained that the user has generated recently. or data obtained externally. These are CPS units that the user may have recently defined regarding the new data. The CPS units corresponding to the data fields 121 shown in Figure 2, are applicable as units for new data. These CPS units are units that can be adjusted as management units for new data that the user has generated or obtained, such as, for example, data obtained by executing content stored in the information recording medium, such as a program, for example. specifically, newly generated data such as partial information or game performance information, auxiliary data corresponding to AV streams that are contained in the information recording medium, such as screen data obtained from an external server, for example, and so on. Ways of using these will be described later in detail. [2. Configuration for Content Storage] The storage format of content stored in the information recording medium according to the present invention will be described with reference to Figure 3. As illustrated in Figure 3, the information recording medium stores an AV stream of moving image contents, such as High Definition movie content (HD = High Definition) which is high-definition moving image data, for example as the main content 200 and other data and programs, such as game programs that are service data, image files, audio data, text data and so on, for example are stored as sub-contents 300. The main content 200 is stored after a particular AV format, for example the format of the Blu-ray Disc ROM standard, such as standard Blu-ray Disc ROM data, and the sub-contents 300 are stored in an arbitrary format It does not follow the format of the Blu-ray Disc ROM standard, as data other than standard Blu-ray Disc ROM data. As shown in Figure 3, the main content 200 stored following the standard Blu-ray Disc ROM format, has the content of moving images (AV current) as current content to be played, and has a hierarchical configuration that follows the format standard Blu-ray disc ROM, which is (A) Application 210 (B) File that specifies the Playback section (playlist) 230 (C) Cutout (content data file) 240. (C) Cutout ( content data file) 240 has cutouts 241, 242 and 243, each of which are sectioned content data files, with each cutout 241 having an AV (Audio-Visual) 261 current file and clipping information file 251 The clipping information file 251 is a data file that stores attribute information pertaining to the AV (Audio-Visual) 261 current file. An example of the AV (Audio-Visual) 261 current file is the data of the Tran Stream Expert Picture Group on Motion (MPEG-TS = Moving Pictures Experts Group-Transport Stream), which has a data structure where various types of information, such as images (video), audio (Audio), subtitle data and similar, they have multiplied. There are also cases in which where command information to perform control of a player device at the time of reproduction, are multiplied equally. (B) File that specifies playback section (playlist) 230, has multiple files that specify playback section (playlists) 231, 232, and 233. Each of the files that specify playback section (playlists) ) 231, 232, and 233 is of a configuration having one or more reproduction items, wherein one of multiple AV stream data files included in the clipping (content data file) 240 has been selected and the point of start of reproduction and the end point of reproduction of a particular data portion of the selected AV stream data file has been chosen, such that when selecting a file specifying playback section (play list), a reproduction sequence is determined in which a reproduction is executed following a reproduced item of the file specifying playback section (playlist). For example, in the case of selecting the file that specifies reproduction section (playlist) 231 and playing the content, the playback item 234 correlated with the file specifying reproduction section (playlist) 231 has a point of playback start a and a playback end point b in the crop 241, and also the reproduction item 235 has a reproduction start point c and a reproduction end point d in the crop 241, such that the selection of the file that specifies reproduction section (playlist) 231 executes the contents, reproduces the particular data regions aabycad of the current file AV 261, which is the content in the cutout 241. The application (A) 210 is set as a layer having a combination of application index files 211 and 212 that include content tiles displayed in the display, where the reprod ucción content is going to run. and reproduction programs 221 and 222, or a combination of application execution files 213 and 214 such as game contents, web or network contents and the like, and reproduction programs 223 and 224. The user can determine the object of reproduction, when choosing the titles included in the application index files 211 and 212. Each title is correlated with a reproduction program (for example, film object) of the reproduction programs 221 to 224, and when the user selects a title, reproduction processing is initiated based on the reproduction program corresponding to the selected title. The application index files 211 and 212 indicated as Title 1 and Title 2 in the drawing, include presentation programs that display titles and menus that are automatically reproduced at the time of adjusting and initiating the information recording medium. The application index files 211 and 2121 and the application execution fields 213 and 214 may include application resource files used to run the application, in some cases. There are also cases, where various data files can be obtained from information recording medium or network connection servers, for example image files 225 such as JPEG, PNG, BMP, and so on, audio files 226 such as compressed audio PCM and the like, various types of data files 227 such as text and databases, are applied as application resource files. Playback programs (e.g., movie objects) 221 through 224 are content reproduction processing programs to provide programmably, functions necessary to present playback contents (HD movie content), such as, in addition to the file that specifies the reproduction section (playlist) to be reproduced, responds as to operation information pertaining to the feed processing of the user's content playback, skipping between titles, branching playback sequences and so on. The reproduction programs 221 to 224 allow one to jump from one to another, with a reproduction program that is currently executed following the user feeds of a predetermined program, and reproduction contents of the cuts 240 are chosen by the file specifying the section of playback (play list) 230 that specifies the selected playback program and plays. The main content 200 is managed in a hierarchical configuration following the format of the Blu-ray Disc ROM standard, as data from the Blu-ray Disc ROM standard for example, as shown in the drawings, with content management units (CPS units) that are adjusted with respect to this hierarchical configuration script, and administration of content use is done in increments of content management units (CPS units). Details of the content management units (CPS units) will be described later. Sub-contents 300 are also stored in the information recording medium together with the main content 200. The sub-contents 300, are contents stored in a certain AV format, for example in an arbitrary format that does not follow the format of the standard ROM of Blu-ray disc. Sub-contents 300 for example are game programs that serve as service data, image files, audio files, text data and so forth and a group of multiple data files is established as a data group. Figure 3 illustrates the data groups 1, 311, through the data group N, 312. These data groups can also be adjusted as content of use management object, and in the case of being set as the contents of the administration object. of use, content management units (CPS units) are established in increments of the data groups, so that administration of use is made in increments of data groups. [3. Configuring Usage Management and Encryption for Stored Content] Next, a content management configuration for sectioning the contents stored in the information recording medium in the content management units (CPS units) and performing different usage control for each unit will be described with reference to Figure 4 and the following drawings. As previously described with reference to Figure 2, a unit key is assigned to each content management unit (CPS unit) as a different encryption key. The increment in which a unit key is assigned is a content management unit (CPS unit). It should be noted that a unitary key is a key that can be generated based on a recording seed corresponding to the unit. Each of the unit keys is applied to encryption contents belonging to each unit, and at the time of using the contents, a unit key assigned to each unit is obtained for reproduction. Each unit key can be administered individually, such as, for example, a unit key assigned to a certain unit A, is set as a key that can be obtained from an information recording medium. Also, a unitary key to be assigned to a unit B is a key that can be obtained under the condition that a server connected by network has had access and the user has executed predetermined procedures and so on.; in this way, the configurations for obtaining and managing cores corresponding to the units can have independent forms for each unit key.
The form of adjustment of an increment for assigning a key, i.e. a content management unit (CPS unit), will be described with reference to Figure 4. First, it will be description with respect to the setting configuration of a management unit of content (CPS unit) on the main content side 200. On the main content side 200, the CPS units are adjusted including application index files 211 or 212 including one or more titles, or application execution files 213 or 214 , included in the application (A) 210, or similar. The CPS unit 1, 401 shown in Figure 4 is a unit with respect to which application execution files, playback program files, playlists and a group of AV stream files serve as current data of the contents, have adjusted as a single unit. Also, the CPS unit 2, 402 is a unit with respect to which an application execution file, playback program file, playlist and a group of AV stream files serve as current contents data, have been adjusted as a single unit.
Also, the CPS unit 3, 403 is a unit with respect to which the application index files, a playback program file and various data files that can be obtained from an information recording medium or a connection server network, have been adjusted as a single unit. These units are individually encrypted with the same keys (CPS unit keys: Kul, Ku2, and Ku3 keys in Figure 4) and stored in the information recording medium. In Figure 4, the content management unit (CPS unit) 1, 401 and the content management unit (CPS unit) 2, 402, are configured units of upper layer (A) applications and files that specify section of Lower layer reproduction (B) (playlists) + cutouts (C) (content data files), and the content management unit (CPS unit) 3, 403, is a configured unit of upper layer (A) applications and various data files that can be obtained from an information recording medium. or a network connection server, ie image file 225, audio file 226, data file 227, and so forth, not including files that specify lower layer reproduction section (B) (playlists) + clippings (C) (content data files). The content management unit (CPS unit) 1, 401, includes the title 1, 211 and the title 2, 212, reproduction programs 221 and 222, playlists 231 and 232, and clipping 241 and clipping 242, and the AV current data file 261 and 262 which are the current data of the contents in the two cut-outs 241 and 242 are encrypted by applying the unit key: Kul, which is an encryption key correlated with the content management unit (CPS unit) ) 1, 401. The content management unit (CPS unit) 2, 402 includes the application file 213 configured of game contents, network contents, or the like, playback program 223, playlist 233, and clipping 243 , and the AV current data file 263 which is the current data of the contents in the cutout 243, is encrypted by applying the unit key: Ku2, which is an encryption key correlated with the content management unit (CPS unit). 2, 402. In addition, Application 213 can also be made an encrypted file to which the unitary key: Ku2 has been applied. The content management unit (CPS unit) 3, 403 is set as a unit including the application files 214 and 215 included in the upper layer application layer (A), playback program 224, and additional various data files , for example image files 225 such as JPEG, PNG, BMP, and so on, audio files 226 such as compressed audio and the like, various types of data files 227 such as text and databases, which can be obtained from an information recording medium or a network connection server by the playback program 224. The content management unit (CPS unit) 3, 403 is encrypted by applying the unit key: Ku3, which is an encryption key correlated with the content management unit (CPS unit) 3, 403. For example, in order for the user to execute an application file or content reproduction processing correlated with the administration unit of content 1, 401, there is a need to obtain the unitary key: Kul, by encryption processing that applies the Vul recording seed that is established in a correlated manner with the content management unit (CPS unit) 1, 401, and executes the content decryption processing sequence that applies the obtained Kul unitary key, and following the execution of encryption processing, the application program can be executed to reproduce the contents. For example, in order to perform processing of use of application files correlated with the content management unit 3, 403, or image files 225, audio files 226 such as PCM or compressed audio, and various data files 227 such as text and databases and the like, correlated with the playback program 224, there is a need to obtain the unitary key: Ku3, which serves as an encryption key correlated with the content management unit (CPS unit) 3, 403, and executes the processing sequence for content decryption which applies the obtained Ku3 unit key, and following the execution of the encryption processing, the application program can be executed or the various files can be executed. An example of directory configuration for storing the contents and information management such as key information of the contents corresponding to the various previously described types of content management units (CPS units), will be described with reference to Fig. 5. The directory configuration shown in Fig. 5 is a configuration wherein a main content data portion 502, sub-content data portion 503, and content management data portion 501 corresponding to the main content and sub content are established. -contents. The BDMV directory shown in the main content data portion 502 adjusts a directory for the contents and applications according to the Blu-ray Disc ROM format. The main content that follows the Blu-ray Disc ROM format has a hierarchical configuration of titles, objects, playlists, clipping information, AV currents and so on as described above with reference to Fig. 3 and Fig. .4, and data files that constitute them, are established in the BDMV directory. The data directory in the sub-content data portion 503 is established as a directory to have the contents and applications for each group with a format that does not follow the Blu-ray disc ROM format. The DataGroup portion. inf in the sub-content data 503 is a file that stores the information of the sub-content group. The administration data portion 501 stores management files correlated with both contents of the main contents and the sub-contents. For example, the CPS unit management table is adjusted which correlates the CPS unit IDs for each content management unit (CPS unit) and recording, see information shown in Fig. 2 as described above, and also, store control information of reproduction of the established contents corresponding to each unit, and control information of copies. The content playback control information and the copy control information are set as individual information for each CPS unit. For example, individual content usage control information is established for each CPS unit stored in the information recording medium such as [CPS Unit 1] Number of copies allowed to the recording medium: sometimes, number of reproductions allowed: b times, remote playback allowed / not-allowed: allowed ... [CPS 2 unit] Number of copies allowed to the recording medium: 0 times, number of reproductions allowed: c times, remote playback allowed / not allowed: allowed ... and so on. [4. Administration Configuration for Newly Generated Data or Obtained Data] As described above, the contents stored in the information recording medium are sectioned into CPS units, and CPS unit keys that serve as encryption keys corresponding to each CPS unit, can be used when obtaining application recording seeds. The management processing will be described with respect to data other than the content already stored in the information recording medium, such as data generated by following a program stored in the information recording medium, specifically partial information or character data generated when executing a program. of game, or data obtained from a server or similar through a network; or the data recently generated or obtained by some kind of user processing. Fig. 6 illustrates an example of generating and obtaining data processing with respect to contents that are already stored in the information recording medium. Fig. 6 illustrates an information processing device 600 such as a PC or the like, for example to execute the reproduction processing of the information recording medium. The information processing device 600 has a control unit 601 as a program execution function such as a UPC (CPU) for example of executing content reproduction processing, a data storage unit 602, configured from a hard disk or similar, an interface of recording medium 603 for performing data entry / exit to recording medium, memory 604 configured of ROM and RAM, used as program execution regions, parameter storage regions and the like and a communication interface 605 to execute communication through a network. It should be noted that the configuration of the information processing device 600 shown in Fig. 6 is a minimum configuration for describing the new data that generates and obtains processing and that an exemplary specific hardware configuration of an information processing device, it will be described later. The information processing device 600 reads sectioned contents in CPS units stored in the information recording medium 100 via the recording medium interface 603 of the information recording medium 100, and performs content reproduction processing under the control of the unit control 601. The information recording medium 100 has stored contents that have been recorded based on the Blu-ray Disc ROM standard as described with reference to Fig. 3 and Fig. 4, for example. Each of the contents is divided into CPS units and subjected to encryption processing. The information processing device 600 generates CPS unit keys, based on the recording seeds corresponding to the CPS units and reproduces the contents. The contents include, for example, games, various types of programs such as AV current reproduction programs, AV current data and so on. There are the following two ways in which the information processing device 600 generates or obtains new data based on reading the information recording medium 100. The first is a case of reading information that is analyzed by the information processing device. 600 information from the information recording medium 100, and obtains or generates new data based on the information read. An example is a case where the URL information corresponding to obtaining an objective of new data is described in the information recording medium 100, with the information recording medium 100 that obtains this URL information, to have access to a server 611 that specified by the URL through a 605 communication IF and network using a viewer, and download the data such as new content or similar corresponding to the URL. In addition to downloading contents, there are cases where new data is generated within the information processing device 600 based on information read from the information recording medium 100. The second is a case with an application program recorded in the recording medium. 100. For example, there are cases where a program that is read from the information recording medium 100, is executed in the information processing device 600, a certain server 611 has access through communication 605 IF and network, following the program for downloading the contents, or new data are generated in the information processing device 600 when executing the program. Data generated or obtained by this processing is not data that belongs to the CPS units, which are content management sections recorded in the information recording medium 100, but with the configuration of the present invention, these new data are managed as data belonging to certain CPS units. Specifically, new data generated or obtained based on contents corresponding to CPS units stored in the information recording medium 100, are administered as data belonging to the same CPS unit. Or, a new CPS unit is defined again and the new data is managed by the new CPS unit. Fig. 7 illustrates a processing sequence for obtaining new data from an external server, based on the contents stored in the information recording medium. In step S101, the information processing device reads the contents managed by the CPS units from the information recording medium. For example, let's say that the contents that belong to a CPS A unit have been read. The information processing device reads the downloaded data specification information, a URL or the like, for example, of the information recording medium, obtains the ID of the CPS unit that serves as the identifier of the CPS unit corresponding to the contents read, and in step S102 it sends the data, i.e., the CPS unit ID and the download data specification information to the server. The server executes the authentication processing as to whether the ID of the CPS unit or has not been obtained from an authorized information recording medium, by performing a predetermined authentication sequence, verifies the 'authenticity of the data request and in In the case that the authenticity has been configured, in the step S103 the requested download data is transmitted to the information processing device. For example, the download data can be voice over audio data of an AV stream, subtitling data, a player program for particular or similar contents. In step S104, the information processing device stores the download data obtained from the server in an information recording medium and a storage unit such as a hard disk or the like within the information processing device. In any case, the data is stored and managed as data belonging to the same CPS unit A identified by the CPS unit ID, and encrypted and stored using encryption processing by applying the CPS unit key Ku (a) generated by applying the recording seed Vu (a) that conforms to the CPS unit A. With the sequence described with reference to Figure 7, at the time that the information processing device requests download data from the server, the processing device information transmits the CPS unit ID and downloads data that specifies information, its reason is because the next administration is activated due to transmitting the CPS unit ID. (1) The server can manage the data downloaded by each CPS unit. (2) In the case that permission is granted / no download permission, billing processing, etc. For each CPS unit, a CPS unit that has been released to download once, can have the download started for the next time, simply by transmitting the ID of the CPS unit. (3) In the case of encryption of data downloaded using a key (unit key) defined by each CPS unit in the information recording medium, the server wants the CPS unit ID to perform encryption processing. Secure data transmission can be achieved by the server that contains the CPS drive key corresponding to the unit ID, and transmit encrypted data by applying the CPS drive key that it has. It should be noted that in addition to information such as URLs and the like, download data specification information may include for example the study ID, the ID the package, ID the title, movie object ID, playlist ID, playback section information (start point and start point date stamps) and so on determined in Blu-ray Disc ROM standards ray and the like, and in addition, values not determined in Blu-ray Disc ROM and the like, can also be used as information and download data specification. Various types of data can be used as information and download data specification, provided that the server side can identify the download data, such as user ID, user related information such as billing status, date-and-time information, administration data generated on the information device side, when the content is played, such as number of times reproduced, interval reproduced, game results, playback path information for multiple floors, and so on. Next, a specific example of data generated or obtained by the information processing device will be described with reference to Figure 8 and Figure 9. Figure 8 illustrates an example of generating or obtaining a part of data following the standard format Blu-ray disc ROM, as new data. As previously described with reference to Figure 3 and Figure 4, contents stored in the information recording medium following the format of the Blu-ray Disc ROM standard, have a hierarchical configuration and content reproduction processing, of a AV current for example, is allowed with the data and programs in each correlated hierarchical layer. The information recording medium 621 shown in Figure 8 has CPS units 1, 2, and 3 correlated with three titles [title 1], [title 2] and [title 3], as contents that follow the format of the ROM standard of Blu-ray disc. Of the three CPS units, the CPS 1 unit and the CPS 2 unit that correlate with the two titles [Title 1] and [Title 2] store movie objects 1 and 2 as reproduction programs corresponding to the titles, and the user you can set the media to record information on the device or information processing and specify either [Title 1] or [Title 2], thus executing one of another of the movie objects 1 and 2 that are playback programs, in this way reproducing the some clipping of the sections specified by the playlists, ie the AV current data. However, there is a need to extract the recording seeds corresponding to the respective CPS units of the administration data to generate the CPS unit keys and decrypt the encrypted data such as AV currents and the like. However, the CPS 3 unit does not store a movie object 3 that serves as a reproduction program corresponding to the title 3, and accordingly can not reproduce the clip file contained in the CPS unit, ie the current data AV. In this case, the information processing device generates or obtains a film object 3 as new data 622 when executing the generation or obtaining processing of the film object 3 as a reproduction program corresponding to the title 3. The generated film 3 object u obtained is handled as configuration data of the CPS unit 3. Figure 9 is a diagram illustrating another specific example of data that is recently generated or obtained by the information processing device. The information processing device 600 reproduces an information recording medium 100 that stores content managed by multiple CPS units. For example, a CPS unit A 640 is a content management unit that includes a game program, and before the information processing device 600 that executes game programs, new data 641 and 642, such as end information, are generated. partial of the game, information of game results and similar. This data is subjected to processing for adjustment as configuration data of the CPS unit A 640 in the information processing device 600, and information 100 or a storage unit is stored in the information processing device 600 in the information processing device 600. , such as a hard drive or the like. Also, the CPS unit B 650 is a content management unit including AV current contents such as moving images or the like of a movie or the like, wherein the training processing device 600 obtains new data 651 constituted by sub data. - Titles corresponding to the AV current content of the server 611 and perform the reproduction. The obtained sub-title data 651 is subjected to processing to fit as configuration data of the CPS unit B 650 in the information processing device 600 and is stored in the recording information medium 100 or a storage unit within the information processing device 600 such as a hard disk or the like. It should be noted that in any case, an array may be used where a new CPS unit is adjusted for the newly generated or obtained data, and stored in the information recording medium 100 or the storage unit within the information processing device 600. , such as hard disk or similar as configuration data of the new CPS unit adjusted. CPS units corresponding to the new data briefly described with reference to Figure 2 are adjusted correlated to these units. A Vu recording seed corresponding to each CPS unit is stored in advance in the information recording medium, with the recording seeds that are applied to generate CPS unit keys when executing a predetermined decryption processing sequence and the CPS unit keys generated are applied to execute encryption of the generated data or data obtained, which are stored in the information recording medium 100 or a storage unit inside the information processing device 600 such as a hard disk or the like. It should be noted that the Vu recording seed corresponding to the recently adjusted CPS units can be taken from an external server. However, preferably the predetermined authentication processing should be executed between the server providing the recording seed Vu and the information processing device, to avoid obtaining unauthorized recording seeds. Now, the recording seed Vu obtained includes obtaining in administration tables increments as illustrated in Figure 2. Forms of encryption and management of newly generated data or obtained data will be described with reference to Figure 10. Figure 10 illustrates a example of a decrypted method of data in the case of recording, inside the information recording medium or externally, data generated or obtained corresponding to reproduction processing of contents stored in the information recording medium. In Figure 10, the data region on the left side is data that has already been stored in the information recording medium, ie data of ROM region 660 and the data region on the right side are new data 670 that are generated recently. or obtained data. The data obtained or newly generated is stored in a data writing region of the information recording medium, or on a hard disk, or in external storage means such as portable memory or the like. Figure 10 illustrates two examples of adjustment examples of the CPS unit with respect to the newly generated or obtained data. (Example of Setting 1) As can be seen from the CPS unit 3, 681, shown in Figure 10, this is an example of processing integrating the new data 671 into CPS units that have already been set in the information recording medium. . The CPS 3 unit681 comprises data already stored in the information recording medium, ie the CPS unit 3 that has already been adjusted in the data region 660, and has a configuration in which the new data 671 that has already been obtained or generated recently all are integrated into the CPS 3, 681 unit to form a single unit. In this case, the new data 671 or data contained in the new treatments 671 are encrypted using the unit key Ku3 generated by applying the adjusted recording seed Vu3 corresponding to the CPS 3 unit and stored in the recording information medium or a unit storage such as a hard drive. This configuration example is of a configuration in which the generated data is encrypted using the same key as the unit key corresponding to the CPS unit already defined in the ROM region of the information recording medium, such that at the time of processing reproduction, the same key as the data included in the CPS unit already defined in the ROM region of the information recording medium, can be applied to execute decryption processing of the new data 671, thus allowing reproduction without joining without needing to switch keys (Example of Setting 2) As can be seen from the CPS unit 4, 682, shown in Figure 10, this is an example of processing to fit a new CPS unit different from the CPS units that have already been set on the recording medium of information and managing the new data 672 there. In this manner, a CPS unit 4, 682 is defined for the new data 672 and the data encryption contained in the new data 672 is made using a corresponding key. The CPS unit 4, 682 'is administered independently of the data recorded in the information recording medium. In this case, there is a need to separately adjust and record information, to assign a CPS unit to the new data 672 and information to generate a unitary key, such as administration information. An example of adjusting copy / playback control information as management data corresponding to newly generated or newly obtained data will be described with reference to Figure 11. Figure 11 illustrates a directory A corresponding to a management unit configuration CPS stored in the information recording medium 100 in advance, and a directory B corresponding to new data that has been recently generated or obtained. In the example shown in Figure 11 various data are set in a [BDMV] directory as contents that follow the standard ROM format Blu-ray disc in any case, and various types of management data are stored in directories [CPS] . For the recording method of the copy / playback control information, one of the following two adjustment examples applies. (Example of Setting 1) Existing copy / playback control information is applied as the copy / playback control information for the new data. Here, the data [01001.m2ts] 715 of the CPS unit 001 stored in the information recording medium 100 in advance, are applied without change as the copy / reproduction control information corresponding to the newly obtained or newly generated data [01003] .m2ts] 712. In this case, there is no need to generate again the information corresponding to the new data [01003.m2tsl 712, in such a way that the copy / reproduction control information [CPSUnitOOl. cci] 713 of the CPS unit 001 is set for copy / playback control information to apply both the existing data [01001.m2ts] 715 and the new data [01003.m2ts]. (Adjustment Example 2) Copy / playback control information for newly generated data. As illustrated in Figure 11, this is an example of generating new copy / playback control information [CPSUnit002. cci] 714, as copy / reproduction information corresponding to the new data [01002.m2ts] 711, and taking this as administration data. The case of (Adjustment Example 1) is a suitable method for downloading and obtaining subtitling data not registered in the ROM region of the information recording medium 100, for example and reproducing this with the image and audio data recorded in the ROM region. In this case, it would be natural to perform processing considering that the data recorded in the ROM region and the downloaded data belong to a single CPS unit. Also, the case of (Adjustment Example 2) is suitable to allow data generated when executing an application program that is read from the information recording medium 100 to be shared / copied with a number of multiple users. While data recorded in the ROM region, such as running applications and AV streams can not be copied, data generated by running applications (send game results information, map information, or similar to other users and information to check on portable devices ), may be subject to copy / reproduction control that differs from the ROM region. Figure 12 is a diagram illustrating an adjustment example for encryption key, ie generate information for unit keys corresponding to each CPS unit. As with the case of Figure 11, a directory A corresponding to a CPS management unit configuration stored in the information recording medium 100 in advance, and a directory B corresponding to new data as recently generated or obtained, they are illustrated. In the example shown in Figure 12, various data are set in a [BDMV] directory as contents following the ROM format of the Blu-ray disc in any case, and various types of management data are stored in the [CPS] directories. As previously described with reference to Figure 2, recording seeds are correlated with CPS unit identifiers (CPS unit IDs) in the CPS unit management table, and thus are handled. The encryption key information [Unit_Key-Gen-Value. inf] 721 shown in Figure 12, that a CPS unit management table stored in the information recording medium 100. For the recording seed adjustment method corresponding to the CPS unit setting corresponding to the new data, it is applies one of the following two new adjustment examples.
(Example of Setting 1) A new data recording seed set in advance in the CPS unit management table is used as the recording seed that serves as the encryption key that generates information for the new data. This is a configuration where a recording seed that has been adjusted in the new data fields 121 (see Figure 2) in the CPS unit management table previously described with reference to Figure 2, is used as the recording seed for the new data, to serve as the information to generate encryption keys. The recording seed already set to the new data field 121 (see Figure 2) of the encryption key information [Unit_Key-Gen-Value.ini] 721 which are management table data stored in the information recording medium 100 , they correlate with the new data [01003. m2ts] 724 in Figure 2. In this adjustment example, a new CPS unit can be defined, with an already adjusted recording seed that is applied to the new data field 121 (Figure 2). (Example of Adjustment 2) A newly obtained or generated recording seed is used as the recording seed that serves as information for generation of encryption key for the new data. In Figure 12, the encryption key information [Unit-Key_Gen-Value.ini] 722 is set as new management table data corresponding to the new data [01002.m2ts] 723, where the CPS unit identifier has recently adjusted and the recording seed generated or obtained, are stored as new entries in a correlated form. It should be noted that in the case where recording seeds are allowed to be generated, the information processing device generates new recording seeds in the data processing unit within the information processing device, when generating random numbers as for example. In this adjustment example, unlimited CPS units can be adjusted and recording seeds can be generated with respect to new data. Also, while the adjustment of a new CPS unit requires administration correlation corresponding to the newly adjusted CPS unit, i.e. of copy / reproduction control information, to which one or the other of the two techniques in the Figure is applied. 11 described above, ie correlate existing copy / reproduction control information or adjustment and correlation of copy / reproduction control information. [5. Encryption and tamper-proof configuration of navigation file]. With the examples described with reference to Figure 11 and Figure 12, an encryption configuration of only the AV current data file within the new data has been described. These are examples of configuration where for example the AV data stream such as the new data [01002.m2ts] 711 and the new data [01003.m2ts] 712, are encrypted and stored in a region of data writing in the middle of recording information or on a hard drive or on external storage media such as portable memory or the like. However, the new data is not restrictive to AV stream data and also includes files such as title indexes, movie objects, playlist files, clipping information files and so on. It is preferable a configuration in which these files are equally accessible are application software with authorized reproduction, with access from various external applications that operate PCs, for example deleted. Also, a configuration that allows for tamper-proof and tamper-proof files including AV current data is preferred. It should be noted that files other than AV stream files, ie title indexes, movie objects, playlist files and clipping information files are collectively referred to as browsing files. The encryption storage configuration of these navigation files and tamper evidence when providing electronic signature data, will be described with reference to Figure 13 and Figure 14. Figure 13 is a diagram to describe an example of individual encryption and storage configuration of each file of AV current data files and also different files to AV current files , that is, indexes of titles, movie objects, playlist files, and clipping information files, which are navigation files. The storage means 750 shown in Figure 13 are equivalent to the data writing region in the information recording medium or external storage media or hard disk such as portable memory or the like, for storing new data. Examples of new data stored in the storage means 750 include, in addition to the AV 755 stream files shown in the drawing, title index files 751, movie object files 752, playlist files 753 and information files of clipping 754, which serve as navigation files other than AV data streams. All browsing files and AV stream data files are encrypted and stored in file increments. The playlist files 753 and cutout information files 754, are set as with the individual files for each CPS unit, as with the AV 755 current data files and the encryption is executed in file increments. The preference setting allows the encryption key to be applied for encryption processing to be generated or obtained only by production application software that has an authorized license. For example, information can be obtained that only the production application software has an authorized license, if used as the encryption key, or an encryption key is generated based on this restricted information. A specific example is a configuration in which the unit keys corresponding to the CPS units are applied as encryption keys. The AV 755 stream files shown in Figure 13 as well as the 751 title index file, 752 movie object file, 753 playlist files, and 754 clip information files that are different navigation files than AV streams , each is submitted to encryption by applying unit keys correlated with the CPS units to which the files belong and stored. In addition, a configuration can be performed where unit keys corresponding to CPS units are not used, with other information that is used as key generating information. However, a configuration in which the generation of encryption key by other applications besides authorized reproduction applications that have permission to reproduce data files of the CPS units, is undesirable. Accordingly, information obtained only by reproduction application software having the authorized license is adjusted as the key generation information. An example of information that is only obtained by the playback application software that has an authorized license is a device ID. A device ID is an adjusted ID corresponding to production application software that has an authorized license, and is generated based on setting identification information in physical equipment, which is a device where the playback application has been installed in valid form. The device ID can only be obtained by a program registered in the authorized player application software, which has been installed in a valid way. Accordingly, the device ID is data that can only be obtained or generated by software from the playback application that has an authorized license, and obtained by other applications with a PC where various types of application software are installed. for example, It is eliminated. In the case of generating or obtaining new data, a valid playback application obtains the device ID and executes processing to generate the encryption key to generate an encryption key, and applies the generated encryption key to encrypt each of the files AV stream 755 as well as the title index file 751, movie object file 752, playlist files 753, and clip information files 754, which are different navigation files than the AV streams, and stores each one in storage means 750. An example of an algorithm for generating encryption key is the algorithm for generating AES encryption key or the like. Specifically, a configuration where block encryption is performed in increments of 6 KB is used for AV 755 stream files that have large amounts of data and block encryption is done in increments of 2 KB for the other navigation files. In the case of decrypting an encrypted file, the device ID is obtained by the valid reproduction application software, an encryption key is generated and decryption processing of the encrypted file is executed using the generated encryption key. It should be noted that the configuration is not restricted to the device ID previously described, and can generate encryption keys when combining other information, such as for example a study ID that serves as an identifier of an editing study of the stored contents of the information recording medium that stores CPS unit management content, a packet ID that serves as a packet identifier as an information recording medium manufacturing unit, and a volume ID with the device ID. It should be noted that in the case that files referring to different studies (entities that provide content) are arranged in the directory setting for the new file, the study IDs corresponding to each of the files are preferably applied. This is valid for applying packet IDs and volume IDs equally. In the case of applying these various IDs as encrypted key assertion information, a configuration is needed that is able to distinguish which study ID, packet ID and volume ID, a key, which is applied to the new file setting in the directory has been generated. While a configuration can be made where the study ID or the like used as assertion information for the encryption key for the new data file, is used as a directory name or file name without change, these settings may possibly allow that the name of the study and the like are at the time of content reproduction, and in accordance with this, the information of generation of the encryption key can be prevented analogically from the found data. In order to avoid this, a configuration is preferably implemented where the directory name, the file name are determined using random numbers or numbers assigned separately with the correlation between the encryption key assertion information such as study ID and similar that is saved as a separate table. In addition, in order to avoid tampering with data and allow tampering verification of the AV 755 stream files, and also the 751 title index file, 752 movie object file, 753 playlist file and clip information 754, which are navigation files other than AV streams, a hash value is calculated for all new data, or new data divided into certain sizes (eg 64 KB), while storing new ones data, and the hash value generated with the encryption key described above is encrypted and stored. This hash value calculation processing and encryption processing are also executed by the replay application that has an authorized license. As with the encryption described above for file number, encryption of the hash value is done by applying the corresponding unit key setting to the CPS unit, or an encryption key generated based on the device ID or a combination of the device ID and at least one of the study ID , Package ID and volume ID. At the time of reproducing data, the hash value obtained by deciphering the encrypted hash value, and the hash value re-calculated based on the file to be reproduced, are matched and in the case that both hash values coincide, a determination is made that there has not been tampering with the file. Under the condition that there is no tampering of the file, file usage and the use of new files and new data are allowed. It should be noted that these are processed by software for valid playback application. Next, description will be made with reference to Fig. 14 with respect to an example configuration where, from the new data, only AV current data files and the title index file, film object, file are encrypted of playlist and clipping information files that are other browsing files, are not encrypted but are stored as a file to which a signature has been set for verification and tampering proof. The storage means 770 shown in Fig. 14 are equivalent to the data writing region in the information recording medium or a hard disk or external storage means such as portable memory or the like, for storing the new data. New data stored on the storage means 770 includes, in addition to the AV 775 stream files shown in the drawing, a title index file 771, 772 movie object file, 773 playlist files and scrap information files 774, which serve as navigation files other than AV streams. With the example shown in Fig. 14, only the AV 775 current data files are encrypted in file increments. The applied encryption key is the adjusted unit key corresponding to the CPS unit or an encryption key generated based on the device ID or a combination of the device ID and at least one of the study ID, package ID and Volume ID as with the description made with reference to Fig. 13. Title index file 771, movie object file 772, playlist files 773 and clip information files 774, which are navigation files Unlike the AV 775 current data files, they are not encrypted. However, these navigation files are connected with an electronic signature that allows verification of tampering and proof of tampering with data and store. In the case of having these new data when downloading from an external server, such as a server managed by a study for example, these are obtained as data that has been provided with a signature on the server beforehand. In this case, a signature verification key is either obtained together or is obtained separately. 0, a configuration can be performed where an electronic signature is generated in an application executed by the data processing unit of the information processing device, in terms of downloaded data or new data generated by itself. The signature generating key and the signature verification key may be the adjusted unit key corresponding to the CPS unit, or have a key configuration generated based on the device ID or a combination of the device ID and at least a study ID, package ID, and volume ID as with the encryption key described above. Or, a configuration can be performed where a pair of a secret key and a public key that follow the public key encryption method are applied as the signature generating key and the verification key, respectively. In the case of using a file that is provided with a signature, signature verification processing of the file that has been provided with a signature is performed, in this way determining whether or not the file data has been tampered with. Use of files is allowed under the condition that there is no tampering of files. It should be noted that these are processed by valid playback application software. In this way, the information processing device according to the present invention executes valid application software in the data processing unit, and executes encryption processing of the AV current data files, including new data, and information control or navigation files including programs to be applied to reproduction processing of AV current data, which are stored in storage media. 0, these are stored on storage media as files correlated to tampering verification data such as hash value or electronic signature data. At the time of using these files, verification of tampering is performed and the files are used under the condition that confirmation has been made that there is no tampering of data. According to the present configuration, the use of data files and navigation files corresponding to CPS units, use of unauthorized content such as modification data and tampering processing, using applications other than license applications in a device capable of using various types of application software such as a PC for example, can be avoided, and unauthorized use of data corresponding to CPS units, including browsing files, can be eliminated. [6. Processing of Storage of New Data Generated or Obtained by Information Processing Devices] Next, the processing sequence of storing new data that has been generated or obtained by the information processing device, will be described with reference to the flow diagram shown in Fig. 15. The objective or target of storing the new data that has generated or obtained the information processing device is one or the other of the data writing region established in the information recording medium, which stores the data. CPS unit management data or an external storage region.An external storage region of the information recording medium for example is a hard disk constructed in the information processing device, portable means such as a memory card or the like. The storage region within the information recording medium is processing in the case of applying an information recording medium having a data writing region such as the case that the information recording medium is a Blu-ray disc by example and is a partial ROM disk that has two regions, a single-play region (ROM) and a write-only region. In the case of applying an information recording medium that has one. data writing region, with a partial ROM disk, the storage target or target can be selected from both of the information recording medium or an external storage region, but in the case of not applying a information recording medium of information that has a data writing region, the generated data is stored in a storage region other than the information recording medium as a natural result. The processing sequence for storing new data that the information processing device has generated or obtained is described with reference to the flow chart shown in Fig. 15. In step S201, new data is generated or obtained, following data or a program that has read the information processing device, from the information recording medium. A determination is made in step S202 as to whether data recording is executed or not. This determination processing is performed by user feeding from data feeding means, for example. 0 automatic determination processing can be executed, based on the predetermined information. In the case of not recording data, the processing ends without recording processing. In the case of performing data recording, the flow proceeds to step S203, and determination is made as to whether the information recording medium or not mounted in the information processing device is an information recording medium having a region. of data writing such as a partial ROM disk. In the event that the information recording medium does not have a data writing region, the flow proceeds to step S205, and the data generated or obtained is stored in a medium of different storage to the information recording medium, such as data of CPS unit configuration correlated with that data. It should be noted that in this data storage processing, copy / playback control information and a recording seed in the CPS unit management table, which serves as CPS unit management information corresponding to the stored data, correlate . The configuration of this correlation will be described later. In step S203, in the case that determination is made that the information recording medium mounted on the information processing device is an information recording medium having a data writing region as with a partial ROM disk , the flow proceeds to step S204, and the determination is made as to whether or not to write data in the information recording medium. This will be executed as determination processing, based on user power information for example. Or, this can be executed as an automatic determination processing based on predetermined information. In the event that data writing is not performed in the information recording medium, the flow proceeds to step S205 and the data is stored in the storage means other than the information recording medium, such as data corresponding to the CPS unit correlated with the data generated or obtained. In the case of writing data in the information recording medium, the flow proceeds to step S206 and the data generated or obtained is stored in the information recording medium, as data corresponding to the CPS unit. It should be noted that in this data storage processing, copy / playback control information and a recording seed in the CPS unit management table, which serves as CPS unit management information corresponding to the stored data, are correlated . [7. Configuration to correlate data of Configuration of CPS Unit in a Registration Means of Information and Configuration Data of CPS Unit Stored Outside a Means of Information Registration] As described above, new data that is not stored as original data in the information recording medium that stores the contents managed by the CPS units, is stored in the information recording medium or on a hard disk or the like. In order to handle this new data as managed data from the CPS management data in the information recording medium, the new data stored in the information recording medium or the hard disk or similar must be identifiable as managed data of the CPS administration data in the information recording medium. The following is a description of this identification configuration. Figure 16 is a diagram illustrating a new data correlation configuration and a CPS unit in a configuration where new data is stored in the storage means other than the information recording medium that the original CPS units have, for example a hard disk of the information processing device, for example. In the case of recording new data in the storage means other than the information recording medium that the original CPS units have, as shown in Figure 16, the new data corresponding to different information recording means 801 and 802, each one has CPS units, they are stored in a single storage means 803 such as a hard disk. In this case, the various types of new data stored in the storage means 803, need to be distinguished as to which information recording means 801 and 802 correspond to each new data.
As previously described with reference to Figure 1, the information recording means 801 and 802 have stored a study ID that serves as an identifier of an editing study of the stored contents of the information recording medium 100, and a Package ID that serves as a package identifier as a manufacturing unit of the information recording medium 100. As shown in Figure 16, the study ID, the package ID, and additional CPS unit IDs are left. to the various new data 804, 805 and 806, stored in the storage means 803, to serve as identification data, with a hierarchical directory structure that is established in the order of study ID, package ID and unit ID CPS, and data are stored and managed based on this hierarchical directory structure. The generated data can be saved in an arbitrary format within the directory assigned to each CPS unit ID. For example, in the case of data generated by an execution application such as Java or the like / it is sufficient that the data be in a format that can be interpreted by the execution application such as Java at the time of reproduction and are not linked to any particular format.
In the case of stipulating this directory hierarchy, the reference to processing performed in the case of requesting the data recorded in the storage means other than the information recording medium that the original CPS units of the execution program such as Java or the like have , can be executed as to process to request based on the name of the space (namespace), directory and file name, as shown in Figure 17 for example. That is, the name of the space (namespace) in the data writing region of the information recording medium that the original CPS units have, is defined as [Partial-ROM: //], and for the hard disk as [Local-HDD: //], and each storage file for new data can be determined by space name (namespace), address and file name, allowing processing such as reading, update and rewrite the file data. Next, the configuration for correlating new data and CPS units in the case of writing new data to the data writing region of an information recording medium having the original CPS units, will be described with reference to Figure 18. In In the case of writing new data in the data writing region of an information recording medium having the original CPS units, there is no need to manage the data generated on multiple packets as described with reference to Figure 16. According to this, there is no need for directory administration using the study ID and package ID and as illustrated in Figure 18, the new data 811 and 812, are managed as identifiable data by the CPS unit ID. [8. Processing Configuration that Restricts Program Execution Conditions] Next, a configuration will be described to avoid use of unauthorized content and copying of content, stipulating that the information recording medium be a means of recording information that the CPS unit has original or of a particular type of information recording medium, such as conditions for executing a program, such as a Java application program or the like, readable from the information recording medium that stores content managed by the CPS unit. A processing sequence for program execution under the condition that the information recording medium is an information recording medium having the original CPS unit, will be described with reference to Figure 19. This processing is processing executed on the device of information processing at the time of mounting an information recording medium that stores content managed by the CPS unit. In step S301, the information processing device to which the information recording medium which stores the contents administered by the CPS unit is mounted, activates the reading of the program of the information recording medium and in the step S302, executes the reading of the program of the information recording medium. determination of disk type as configuration processing for program execution condition. This is executed based on disc type identification information 106 (see Figure 1) recorded in the physical medium of the information recording medium, for example. In step S303, determination is made as to whether or not the disk type is partial ROM. In the event that the disk type is not partial ROM, the flow proceeds to step S306 and the execution of the program is canceled and the processing is finished. In the case that the disk type is partial ROM, the flow proceeds to step S304 and the program is executed. Following the configuration of the end of the program in step S305, the processing ends.
Figure 20 is a diagram for describing an example of allowed / non-allowed execution adjustment for a program corresponding to the type of specific information recording medium. The information processing device obtains disc type identification information from an information recording medium of the physical region of the mounted information recording medium 820. This type of information includes information comprising the type of disk, such as disk Partial ROM, RW disk for writing data or R disk, or so on, for example. At the time of starting the execution of a program (for example Java) that is read from the information recording medium 820, the information processing device determines the type of the information recording medium 820 and only in the case that the type be partial ROM, allows execution of the program, while the execution of the program is canceled in the event that the disk is another RW disk or R disk or similar. Due to this processing, in case the partial ROM 821 is mounted on the information processing device as shown in the drawing, programs read from the partial ROM 821 are executed, but in the event that the disk is another RW 822 disk or R 823 disk, execution of the read program is not allowed, even if the same program has been written there. Accordingly, in the event that the information recording medium having the original CPS unit is a partial ROM 821 and the data copying is executed to generate an RW 822 disk or an R 823 disk, the program execution, in this way avoiding the use of content copy. Now, while the processing example described above is an example to determine whether or not execution of programs is allowed based on the type of information recording medium, this can be done as a configuration to restrict the objective to write new data equally. Also, while the processing example described above is an example described as processing that applies a partial ROM disk, the same processing can be performed in a case of equally applying a ROM disk. In the case that the information recording medium is a partial ROM, the new data can be written to the data writing region of the partial ROM, but in the case of executing a program read from the partial ROM, the objective or target of writing new data such as data generated or data obtained based on the execution of the program, is stipulated based on the program. That is, the writing goal of the data generated or obtained based on execution of the read program of the partial ROM, is restricted to only the data writing region of the same partial ROM. This is achieved by adjusting write conditions to the program. Due to this configuration, restriction on the use of data that the user has recently generated or obtained can also be achieved. [9. Example of Configuration of Information Processing Device] Next, an example of configuration of an information processing device for performing recording and reproducing processing in the information recording medium that stores contents administered by the CPS units described above will be described. . An information processing device 900 shown in Figure 21 directs an information recording medium 910 and has a unit 909 for input / output of data reproduction / reproduction signals, a UPC (CPU) 907 serves as a means of control to execute data processing following various programs, ROM 906 and memory 908 that serve as a storage region for programs. parameters and the like, an I / F input / output 902 for power / output of digital signals, a 1 / F input / output 903 for power / output analog signals and having an A / D converter, D / A 904, an MPEG code 921 to encode and decode MPEG data, TS processing means. PS 922 to execute transport stream processing (TS = Transport Stream). Program stream (PS = Program Stream) encryption processing means 905 for executing various types of encryption processing and storage means 930 such as a hard disk, with each of the blocks being connected by a bus 901. In the case of reproducing AV current data constituted by MPEG-TS data of the information recording medium 910, data read from the information recording medium 910 in the unit 909, are decrypted as necessary in the encryption processing means 905 and separate in various video, audio, subtitle data and so on, by the processing means TS-PS 922. In addition, the digital data decoded in the codec MPEG 921 are converted into analog signals by the D / A 904 converter within of input / output IF 903 and output. Also, in the case of performing digital output, the MPEG-TS data deciphered in the encryption processing means 905 is output as digital data by the input / output IF 902. Output in this case is performed to a digital interface such as, for example, IEEE 1394, an Ethernet cable, a wireless LAN or the like. In the case of handling network connection functions, the input / output IF 902 has the functions of network connection. Also, in the case of performing data conversion in the information processing device 900 to a format that the destination destination device can receive, the separate video, audio, sub-titles and so on separated once in the media processing TS • PS 922, are subject to speed conversion and codec conversion processing in the MPEG 921 codec and multiplejan in MPEG-TS or MPEG-TS in the TS.PS 922 processing media again and this data is sent from output from I / F digital input / output 902. Also conversion to files with codee other than MPEG, can be done under control of the UPC (CPU) 907 and I / F output digital input / output 902. The table CPS unit administration (see Figure 2) that serves as CPS unit management information, and administration data such as copy / playback control information corresponding to CPS units and so on, are read from the means of recording information 910 and then kept in memory 908. Key information for each CPS unit, necessary to perform reproduction, can be obtained from data stored in the memory. Next, the actions of the information processing device 900 will be described at the time of recording data that is new data such as generated data or obtained data. Two cases can be designed for data to be recorded: digital signal power and analog signal power. In the case of digital signal feed, data fed from I / F digital signal input / output 902, and subjected to encryption processing by encryption processing means 905 as necessary, are stored in the recording medium 910. Also, in the case of converting the data format of the digital feed signals to be saved, conversion is made to the storage data format by the MPEG 921 codec and TS • PS 922 processing means and then subjected to encryption processing suitable for the encryption processing means 905 and stored in the recording medium 910. In the case of analog signals, analog signals fed to I / F input / output 903 are converted into digital signals by the A / D converter 904 and they convert into a codec used by the MPEG 921 codec at the time of recording. Subsequently, conversion is made by the TS.PS processing means into AV data which is the recorded data format, and then subjected to appropriate encryption processing by the encryption processing means 905 and saved in the recording medium 910. It should be noted that the content management information is also created at the time of recording and saved in the recording medium 910. In the case of obtaining necessary information by external network with the information processing device 900, the data obtained is stored in the memory 908 in the information processing device 900. The information stored includes key information necessary to reproduce content, data such as subtitles to be reproduced together at the time of reproducing the contents, audio, still images and the like , content management information, usage rules for the playback device corresponding to the content management information and so on. It should be noted that programs for executing playback processing and recording processing are stored in ROM 906, and memory 908 is used as necessary to store data while it is being processed. Generating, obtaining and processing new data recording will be described. Execution programs or analysable data are read from the information recording medium 910 in the device 909 to the memory 908 and maintained, and the program is executed, or the data is analyzed, under the control of the UPC (CPU) 907. newly generated or obtained are temporarily held in the memory 908 and stored in the information recording medium 910 or the storage means 930 such as a hard disk or the like, following user selection or a predetermined control sequence. It should be noted that programs for executing playback processing and recording processing are maintained in ROM 906 and during program execution processing, memory 908 is used as necessary to maintain or retain parameters and data, and as a region of work. While Figure 21 has been described with respect to a device configuration capable of recording and reproducing data, a configuration can be made with a device with only the playback functions or a device with only the recording functions, and the present invention is applicable to these devices equally. The present invention has been described in detail with reference to particular embodiments. However, it is self-evident that a person skilled in the art can make various modifications and substitutions to the modalities without departing from the essence of the present invention. That is, the present invention has been described in exemplary form, and will not be interpreted restrictively. The determination of the essence of the present invention should be made based on the claims set forth at the beginning. The processing arrays described in the present description may be executed with a configuration of hardware or software or a combination thereof. In the case of executing processing with software, a program that stores the processing sequence can be installed in the memory of the computer built in dedicated hardware and executed or a program can be installed in a general-purpose computer, where various computer can be executed types of processing, and run.
For example, the program can be recorded in advance on a hard disk or in ROM (Read Only Memory) that serves as a recording medium. Alternatively, the program can be stored (stored) temporarily or permanently in a removable recording medium such as a floppy disk, Compact Disc Read Only Memory, Compact Disc Read Only Memory, Optical Magneto Disk (MO = Magneto Optical), Digital Versatile Disk (DVD = Digital Versatile Disc), magnetic disk or semiconductor memory. These removable recording media can be provided as a so-called packaged software. In addition to installing the program on the computer of the removable recording medium described above, the program can be wirelessly transferred to the computer from a download site, or it can be transferred by cable to the computer through a network such as a Local Area Network (LAN = Local Area Network) or Internet, and the computer can receive the transferred program in a way and install the program on a recording medium such as an internal hard drive. The diverse processing illustrated herein in the present description is not restricted to running in time sequence according to the description, and may be executed in parallel or individually according to the processing capability of the device to execute the processing, or as required . Also, the system as used in the present description refers to a logical group of multiple devices and is not limited to the various configurations in a circumscribed unit. Industrial Aplicality As described above, according to the configuration of the present invention, new data such as information that a user has generated or information that has recently been downloaded in relation to content information in increments of units stored in a recording medium of information, in the form of encrypted data to which a unit key corresponding to a content management unit or a unit key corresponding to a new content management unit has been applied, such as configuration data of the content management unit , in such a way that data management and usage management is achieved for recently generated data in the same way as with the original unit correlated data. Accordingly, applying the configuration of the present invention in a configuration in which the generation or obtaining of new data is done, allows the administration of the use of new data to be carried out effectively. Furthermore, according to the configuration of the present invention, when executing a program included in information that is read from an information recording medium, the type of information recording medium from which the program has been read is determined and the program it is executed under the condition that the type is established in advance with permission to execute the program, so that the execution of the program using a disc copied from the content for example, will be rejected and the unauthorized use of copied disks can be avoided. Further, in accordance with the configuration of the present invention, apart from AV current data files, navigation files are likewise encrypted or adjusted with tampering verification data and stored, such that a data file AV stream compatible with CPS drive or a navigation file that has applications other than licensed application, or perform processing such as modifying data or the like in a device capable of using various applications such as a PC or the like, for example, may be avoided, and the unauthorized use of data compatible with CPS unit including navigation files, can be deleted.

Claims (35)

  1. CLAIMS 1. An information processing device, characterized in that it comprises: a recording medium interface for executing data reading of an information recording medium; and a data processing unit for executing processing of recording new data, either generated or obtained by applying information obtained from the information recording medium; wherein the information recording medium is an information recording medium that stores data recorded in increments of content management units including encrypted data, encrypted by unit keys each of which is set as different encryption keys; and wherein the data processing unit obtains a unitary key corresponding to a content management unit in which the information obtained belongs to or a unit key corresponding to a new content management unit, executes encryption processing of the new ones data applying the obtained unit key, and executes recording processing with the encrypted data generated as data that configure the content management unit. The information processing device according to claim 1, characterized in that the data processing unit is configured to fit a content management unit corresponding to the new data and also executes adjustment processing for an encryption key, which serves as administration information corresponding to the content management including the new data. The information processing device according to claim 1, characterized in that the data processing unit is configured to fit a content management unit corresponding to the new data, and also executes adjustment processing for control information of use that serves as administration information corresponding to the content management unit including the new data. The information processing device according to claim 1, characterized in that the data processing unit is configured to execute write processing of the new data in a region stipulated by a program included in the information obtained from the recording medium. of information. The information processing device according to claim 1, characterized in that the data processing unit is configured to, in the case of storing the new data in storage means other than an information recording medium of which information has been obtained, execute processing- to store the new correlated data with identification information of the recording medium of information from which the information has been obtained. The information processing device according to claim 1, characterized in that the data processing unit is configured to execute encryption processing of an AV current data file including new data and a navigation file including information of control or a program to apply for playback processing of the AV data stream and execute processing of recording new data in storage media. The information processing device according to claim 6, characterized in that the data processing unit is configured to apply a corresponding unitary key to a content management unit as an encryption key to be applied to the encryption processing. 8. The information processing device according to claim 6, characterized in that the data processing unit is configured to execute encryption processing by applying, such as an encryption key or encryption key generation information, information that can only be obtained by licensed application to execute processing with respect to the content management unit. 9. The information processing device according to claim 8, characterized in that the information that can only be obtained by a licensed application, is information that includes a device ID as a unique identifier for the device where the application is installed . The information processing device according to claim 1, characterized in that the data processing unit is configured to generate a hash value for tampering verification with respect to at least one of an AV current data file including new ones. data and a navigation file that includes control information or a program to be applied for reproduction processing of the AV current data and to register the hash value in the storage medium. The information processing device according to claim 10, characterized in that the data processing unit is configured to execute tampering verification processing of data, based on the hash value set for a current data file. AV including new data or a navigation file at the time of using the file, and executes processing of use of the files under the condition that there is no tampering. The information processing device according to claim 1, characterized in that the data processing unit is configured to execute recording processing of a navigation file, including control information or a program to apply to reproduction processing of AV current data including new data, in storage media, such as a file to which is added an electronic form for verification of tampering. The information processing device according to claim 12, characterized in that the data processing unit is configured to execute processing for tampering of data based on the electronic signature established for the AV current data file. including new data or the navigation file, at the time of using the file, and executes processing of use of the files under the condition that there is no tampering. 14. An information processing device, characterized in that it comprises: a recording medium interface for executing data reading of a recording information medium; and a data processing unit for executing processing of a program included in information that is read from the information recording medium; wherein the data processing unit is configured to determine the type of information recording medium from which the program has been read and to execute the program under the condition that the program is of a type with respect to which it has been established. beforehand the execution permit. 15. An information processing device according to claim 14, characterized in that the data processing unit is configured to obtain, from information read from the information recording medium, information type of the information recording medium with respect to which Program execution is allowed, and to execute program execution determination allowed / not allowed, according to the information obtained. 16. An information processing method characterized in that it comprises: a data reading stage for reading data from an information recording medium; and a data processing step for executing recording processing of new data, either generated or obtained by applying information obtained from the information recording medium; wherein the information recording medium is a means of recording information that stores data recorded in increments of content management units including encrypted data, encrypted with unit keys, each of which is established as different encryption keys; and wherein the data processing step includes a step of obtaining, to obtain a unit key corresponding to a content management unit to which the information obtained belongs or a unit key corresponding to a new content management unit; a step to execute encryption processing of the new data by applying the obtained unit key, and a step to execute recording processing with the encrypted data generated as data that configure the content management unit. The information processing method according to claim 16, characterized in that the data processing step includes a step for adjusting a content management unit corresponding to the new data, and also executing adjustment processing for a data processing key. encryption that serves as a management information corresponding to the content management unit including the new data. The information processing method according to claim 16, characterized in that the data processing step includes a step for adjusting a content management unit corresponding to the new data, and also executes adjustment processing for control information of content use, which serves as administration information corresponding to the content management unit including the new data. 19. The information processing method according to claim 16, characterized in that the data processing stage includes a step to execute write processing of the new data in a region stipulated by a program included in the information obtained from the means of recording information. 20. The information processing method according to claim 16, characterized in that in the case of storing the new data in storage means other than a recording medium of information from which the information has been obtained, the processing step of data executes processing to store the new correlated data with identification information of the recording medium of information from which the information has been obtained. 21. The information processing method according to claim 16, characterized in that it also comprises a recording processing stage of encrypted processing of an AV current data file including new data and a navigation file that includes control information or a program to be applied for processing of AV current data reproduction. and execute recording processing of new data in storage media. 22. The information processing method according to claim 21, characterized in that the encryption recording processing step is a step to execute encryption processing, applying a corresponding unitary key to a content management unit as a key of encryption to apply to encryption processing. 23. The information processing method according to claim 21, characterized in that the encryption recording processing step is a step to execute encryption processing, applying, as an encryption key or encryption key generation information, Information that can only be obtained by a licensed application to execute processing with respect to the content management unit. 24. The information processing method according to claim 23, characterized in that the information that can only be obtained by a licensed application is information that includes a device ID as a unique identifier for the device where the application is installed. 25. The information processing method according to claim 16, characterized in that it further comprises a step to generate a hash value for tampering verification with respect to at least one of an AV stream data file including new data, and a navigation file that includes control information or a program to be applied to reproduction processing of the AV data stream and recording the hash value in storage media. 26. The information processing method according to claim 25, characterized in that it further comprises a step of executing processing for tampering of data based on the hash value established for the AV current data file, including new data in the navigation file, at the time of using the file, and execute processing of use of the files under the condition that there is no tampering. 27. The information processing method according to claim 16, characterized in that it further comprises a step to execute recording processing of a navigation file, which includes control information or a program to apply to stream data reproduction processing. AV including new data, in storage media as a file to which an electronic signature has been added for verification of tampering. 28. The information processing method according to claim 27, characterized in that it further comprises a step of executing data tampering verification processing based on the electronic signature established for the AV current data file including new data or the file of navigation, at the time of using the file and executing processing of use of the files under the condition that there is no undue manipulation. 29. A method for processing information characterized in that it comprises: a data reading stage, for reading data from an information recording medium; and a data processing step for executing processing of a program included in information that is read from the information recording medium; wherein the data processing step includes a step to determine the type of information recording medium from which the program has been read and execute the program under the condition that the program is of a type with respect to which the execution permission It has been established in advance. 30. An information processing method according to claim 29, characterized in that the data processing step, the type of information of the information recording medium with respect to which the execution of the program is allowed, is obtained from the information that is it reads from the information recording medium, and execution execution of the allowed / not allowed program is executed according to the information obtained. 31. A computer program for executing an information processing method, characterized in that it comprises: a data reading stage for reading data from an information recording medium; and a data processing step for executing recording processing of new data, either generated or obtained by applying information obtained from the information recording medium; wherein the information recording medium is a means of recording information that stores recorded data in increments of content management units, including encrypted data, encrypted with unit keys each of which is set as different encryption keys; and wherein the data processing step includes a step of obtaining a unit key corresponding to a content management unit to which the obtained information belongs or a corresponding unitary key to a new content management unit, a step for execute encryption processing of the new data by applying the obtained unit key, and a step to execute recording processing with the encrypted data generated as data that configure the content management unit. 32. The computer program according to claim 31, further characterized in that it comprises an encryption recording processing step, for executing encryption processing of an AV stream data file including new data, and a navigation file including control information or a program to be applied to AV stream data reproduction processing including new data, and recording on recording media. 33. The computer program according to claim 31, further characterized in that it comprises a step for recording, in storage means, tampering verification data with respect to at least one of an AV current data file that includes new data. , and a navigation file that includes control information or a program to be applied to playback processing of AV current data including new data and recording on recording media. 34. The computer program according to claim 31, further characterized in that it comprises a step to execute tampering verification processing of data based on the tampering verification data established for the AV stream data file including new data or the navigation file, at the time of using the file and executing processing of use of the files under the condition that there is no tampering. 35. A computer program for executing an information processing method, characterized in that it comprises: a data reading stage, for reading data from an information recording medium; and a data processing step to execute processing of a program included in the information that is read from the information recording medium; wherein the data processing step includes a step to determine the type of information recording medium from which the program has been read and execute the program under the condition that the program is of a type with respect to which it has been established. advance execution permit.
MXPA/A/2006/007122A 2004-01-29 2006-06-21 Information processing device and method MXPA06007122A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2004-020827 2004-01-29

Publications (1)

Publication Number Publication Date
MXPA06007122A true MXPA06007122A (en) 2006-12-13

Family

ID=

Similar Documents

Publication Publication Date Title
US8073143B2 (en) Information processing device and method
US8095790B2 (en) Information processing apparatus and method, and computer program
JP4649865B2 (en) Information processing apparatus, information recording medium, information processing method, and computer program
US8583660B2 (en) Information processing apparatus, information processing method, and computer program
US8291502B2 (en) Information processing apparatus and method, information recording medium, and computer program
JP4626221B2 (en) Information processing apparatus, information recording medium, information processing method, and computer program
AU2006200487B2 (en) Information processing apparatus and method, content management system, information recording medium, and computer program
JP2007128584A (en) Information processing apparatus, information recording medium, information processing method, and computer program
MXPA06007122A (en) Information processing device and method