TW514776B - Content memory device and content reading device - Google Patents

Content memory device and content reading device Download PDF

Info

Publication number
TW514776B
TW514776B TW089126271A TW89126271A TW514776B TW 514776 B TW514776 B TW 514776B TW 089126271 A TW089126271 A TW 089126271A TW 89126271 A TW89126271 A TW 89126271A TW 514776 B TW514776 B TW 514776B
Authority
TW
Taiwan
Prior art keywords
content
key
data
storage device
aforementioned
Prior art date
Application number
TW089126271A
Other languages
Chinese (zh)
Inventor
Takashi Tsunehiro
Kunihiro Katayama
Nagamasa Mizushima
Motoyasu Tsunoda
Kazuhisa Shiraishi
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Application granted granted Critical
Publication of TW514776B publication Critical patent/TW514776B/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00166Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Television Signal Processing For Recording (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention relates to a technology that allows only the authorized users to have the access to content data, such as audio data and video data. In particular, it relates to a content memory device and a content reading device suitable for processing a large volume of content data. The present invention is a type of content reproduction device including a content memory device for storing encrypted content data, a key storing device for storing keys for decoding the encrypted content data or the content data prepared for each data lot, and a data reproduction device. By means of encryption communication, the key storing device reads the transmission key that should be transmitted to the data reproduction device. The encrypted content data can be read from the content memory device by pressing a collection key on the data reproduction device before using key decoding to read the content data. Furthermore, the content reproduction device can also memorize the memory card concatenated to the key by-pass card concatenation device so that key change is allowed between the key storing device and the memory card.

Description

514776514776

經濟部智慧財產局員工消費合作社印製 五、發明說明(1 ) 技術領域 本發明係關於只對正當之權利者許可音頻資料(audl0 data )或視頻資料(vldeo data)等之內容資料之利用的技術 ’特別是關於適合於處理大量之內容資料之內容記憶裝置 及內容讀取裝置。 背景技術 近年來,進行透過網路於傳送音頻資料或視頻資料等 之內容資料之嘗試。例如,準備專用之記憶體卡,將其裝 置於被設置在販賣店等之專用終端,利用線上系統(online system ),將所期望之內容資料下載於前述記憶體卡。或 將專用之記憶體卡裝置於行動電話等之個人用終端,利用 網際網路,由內容傳送中心下載於前述記憶體卡內。於再 生內容資料之情形,將儲存內容資料之前述記憶體卡裝置 於專用之再生裝置而再生。 發明之揭示 且說在上述之專用記憶體卡,由於內容資料之複製容 易之故,需要設置複製防止機能等以謀求內容著作者等之 保護。 但是,在記憶體卡由於容量有限度之故,無法保存大 量之內容資料。使用者即使是現在沒有利用之內容資料’ 也有想要收集留置之情形。在此情形’如於記憶體卡附加 複製防止機能,使用者在記憶體卡因內容資料而滿載之情 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------Iml 裳--------訂--------- (請先閱讀背面之注意事項再填寫本頁) -4- 經濟部智慧財產局員工消費合作社印製 514776 A7 B7__ 五、發明說明(2 ) 況,必須購入新的記憶體卡’經濟負擔大。 本發明係有鑑於上述情形者,本發明之目的在於提供 :能夠一面謀求內容著作者等之保護,一面可以處理大量 之內容資料之內容記憶裝置及內容讀取裝置。 本發明係一種爲了解決上述課題之內容再生裝置,包 含:儲存被加密之內容資料之內容記憶裝置;以及儲存解 碼被加密之內容資料或每一該資料之群組被準備之內容資 料用之鍵之鍵儲存裝置;以及資料再生裝置。鍵儲存裝置 係利用加密通訊,讀出傳送應傳送於前述資料再生裝置之 鍵,前述資料再生裝置一領取鍵,由前述內容記憶裝置讀 出被加密之內容資料,使用鍵解碼讀出之內容資料。內容 再生裝置進而具有記憶前述鍵透過卡接續裝置被接續之記 憶體卡,在鍵儲存裝置與記憶體卡之間,鍵可以移動。 實施發明用之最好形態 以下,說明本發明之1實施形態。 (1 )系統構成 圖1係顯示本發明之1實施形態被適用之內容再生裝 置之槪略構成圖。 於圖1中,被加密之音頻資料或視頻資料等之內容資 料被與其之內容名稱、或內容ID賦予對應而被儲存在內容 儲存裝置10。又,解碼每一內容被準備、被加密之內容資 料用之鍵(以下,稱爲授權鍵)被儲存著。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) ϋ ϋ I ϋ ϋ n ·ϋ 一s°4« an n I I ϋ I » -5- 514776 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(3 ) CPU 1 1統括控制內容再生裝置之各部。記憶體1 2係由 ROM以及RAM構成。CPU1 1統括控制本內容再生裝置之各 部用之程式被儲存在ROM。RAM作用爲CPU1 1之工作區域 〇 通信裝置1 5接續於行動電話機或安置型電話機,被使 用於透過線上系統或網際網路等之網路,例如存取傳送被 加密之內容資料或授權鍵之內容傳送中心(未圖示出),以取 得被加密之內容資料或授權鍵。 輸入裝置16例如由各種按鈕或觸控面板構成,接受由 使用者來之再生指示或內容資料、授權鍵之取得指示。 顯示裝置1 7例如由液晶面板構成,顯示被儲存在內容 儲存裝置10之被加密之內容資料之內容名稱之淸單(list )、顯示再生對象之被加密之內容資料之內容名稱。 音頻再生裝置18由內容儲存裝置10之中讀出再生對象 之被加密之音頻資料,使用與此對應之授權鍵,解碼再生 ,獲得音頻信號。而且,將音頻信號輸出於被接續於本內 容再生裝置之立體音響。視頻再生裝置19由內容儲存裝置 1 0之中讀出再生對象之被加密之視頻資料,使用與此對應 之授權鍵、解碼再生,獲得視頻信號。而且,將視頻信號 輸出於被接續於本內容再生裝置之監視器。 卡接續裝置20接續記憶體卡30,由該記憶體卡30取 得授權鍵或被加密之內容資料,對該記憶體卡20傳送授權 鍵或被加密之內容資料。 介面2 1係職司CPU 1 1或記憶體1 2與構成本內容再生裝 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------裝--------訂--- (請先閱讀背面之注意事項再填寫本頁) 禮- -6- 514776 A7 B7 五、發明說明(4 ) 置之其它裝置之間之資料傳送接收。 (請先閱讀背面之注意事項再填寫本頁) 接著,於構成本內容再生裝置之各裝置之中,就內容 儲存裝置10、苜頻再生裝置18以及視頻再生裝置更詳細加 以說明。 首先,說明內容儲存裝置10。 圖2係顯示內容儲存裝置10之槪略構成圖。 如圖示般地,內容儲存裝置10係具備:硬碟裝置106 、及鍵儲存裝置101、及硬碟裝置106以及鍵儲存裝置101 透過介面21與本內容再生裝置之各部進行資料傳送接收用 之I/O電路107而構成。 被加密之音頻資料或視頻資料等之內容資料被與該內 容名稱或/及內容ID賦予對應被儲存在硬碟裝置1〇。 鍵儲存裝置101具有:CPU102、及記憶體104、及不 揮發性記憶體103、及與I/O電路107之介面之I/O電路105 〇 經濟部智慧財產局員工消費合作社印製 CPU102統括控制鍵儲存裝置101之各部。又,CPU102 具有認證機能與加密解碼機能。爲了認證機能與加密解碼 機能,也可以有別於CPU另外設置專用之處理器( Cyptograhpy Engine :加密引擎)。記憶體104係由ROM以 及RAM構成。CPU102統括控制鍵儲存裝置101之各部用之 程式以及實現認證機能以及加密解碼機能用之程式被儲存 在ROM。RAM作用爲CPU 102之工作區域。授權鍵被與解 碼對象之內容之內容名稱或內容ID賦予對應被儲存在不揮 發性記憶體1 03。不揮發性記憶體1 03可以儲存複數之授權 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 514776 A7 B7 _ 五、發明說明(5 ) 鍵。此處,授權鍵爲了更強化安全性,可以儲存在所謂之 耐搗區域(TRM:Tamper Resistant Module )。又,不揮發 性記憶體103可以使用快閃記憶體、FRAM或EEPROM等。 構成圖2所示之鍵儲存裝置1 0 1之各部例如做在1晶 片上,或以複數晶片構成亦可。在以複數晶片構成之情形 ,以施行不會由鍵儲存裝置1 0 1之外部盜取晶片間之信號 之工夫爲佳 ° 又,構成圖2所示之鍵儲存裝置1 0 1之各部例如被做 在1晶片上。 於圖1、圖2中,音頻再生裝置18、視頻再生裝置19 、記憶體卡30、鍵儲存裝置101在製造階段或出貨階段獲 得認證局(C A : C e r 11 f i c a t e A u t h 〇 r i t y )之認證。該認證資料 被使用於授權鍵之傳送接收時,由傳送對手來之認證。 記憶體卡30也可以使用鍵儲存裝置1 0 1進行 MMCA(Multi Media Card Association :多媒體卡協會)之規 格化之記憶體卡。 接著,說明音頻再生裝置1 8。 圖3係顯示音頻再生裝置18之槪略構成圖。 如圖示般地,音頻再生裝置18具有:加密解碼電路 181、及解碼器電路182、及透過介面21與本內容再生裝置 之各部進行資料傳送接收用之I/O電路184。 加密解碼電路181由內容儲存裝置10之鍵儲存裝置101 取得對應再生對象之被加密之音頻資料之授權鍵’使用此 鍵,解碼由內容儲存裝置10之硬碟裝置106被讀出之再生 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Invention Description (1) Technical Field The present invention relates to the use of content data such as audio data (audl0 data) or video data (vldeo data) only to legitimate rights holders. Technology 'particularly relates to a content storage device and a content reading device suitable for processing a large amount of content data. BACKGROUND ART In recent years, attempts have been made to transmit content data such as audio data or video data through a network. For example, a dedicated memory card is prepared and placed in a dedicated terminal installed in a retail store or the like, and an online system is used to download desired content data to the aforementioned memory card. Or, a dedicated memory card is installed in a personal terminal such as a mobile phone, and is downloaded from the content transmission center to the aforementioned memory card using the Internet. When the content data is reproduced, the aforementioned memory card device storing the content data is reproduced by a dedicated reproduction device. Disclosure of the Invention In addition, since the above-mentioned dedicated memory card is easy to copy content data, it is necessary to set a copy prevention function and the like to protect the content author and the like. However, due to the limited capacity of the memory card, a large amount of content data cannot be stored. Even if the user does not use the content data ', he may want to collect the lien. In this case, 'if the copy prevention function is added to the memory card, and the user is full of memory card due to the content data, this paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ---- ------- Iml clothes -------- Order --------- (Please read the notes on the back before filling in this page) -4- Consumption by Employees of Intellectual Property Bureau, Ministry of Economic Affairs Cooperative printed 514776 A7 B7__ V. Description of the invention (2) In the case, a new memory card must be purchased. 'The economic burden is large. The present invention has been made in view of the above circumstances, and an object of the present invention is to provide a content storage device and a content reading device capable of processing a large amount of content data while seeking protection of content authors and the like. The present invention is a content reproduction device for solving the above-mentioned problems, comprising: a content memory device storing encrypted content data; and a key for storing and decoding the encrypted content data or content data prepared for each group of the data Key storage device; and data reproduction device. The key storage device uses encrypted communication to read and transmit the keys that should be transmitted to the aforementioned data reproduction device. The aforementioned data reproduction device receives a key, the encrypted content data is read by the aforementioned content storage device, and the read content data is decoded using the key. . The content reproduction device further has a memory card that memorizes the aforementioned keys that are connected through the card connection device. The keys can be moved between the key storage device and the memory card. Best Mode for Carrying Out the Invention A first embodiment of the present invention will be described below. (1) System configuration FIG. 1 is a schematic configuration diagram showing a content reproduction device to which an embodiment of the present invention is applied. In FIG. 1, content data such as encrypted audio data or video data is stored in the content storage device 10 in correspondence with its content name or content ID. In addition, a key (hereinafter, referred to as an authorization key) for decoding the prepared and encrypted content data for each content is stored. This paper size is in accordance with China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling out this page) ϋ ϋ I ϋ ϋ n · ϋ s ° 4 «an n II ϋ I »-5- 514776 A7 B7 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the Invention (3) The CPU 1 1 controls the various parts that control the content reproduction device. The memory 12 is composed of a ROM and a RAM. The CPU 11 stores programs for controlling the various parts of the content reproduction device in the ROM. The RAM is used as the working area of the CPU1 1. The communication device 15 is connected to a mobile phone or a placement-type phone, and is used to access the network through the online system or the Internet, such as access to encrypted content data or authorized keys. Content delivery center (not shown) to obtain encrypted content data or authorization keys. The input device 16 is composed of, for example, various buttons or a touch panel, and receives a reproduction instruction, content data, and an authorization key acquisition instruction from a user. The display device 17 is composed of, for example, a liquid crystal panel, and displays a list of content names of the encrypted content data stored in the content storage device 10, and displays the content names of the encrypted content data to be reproduced. The audio reproduction device 18 reads the encrypted audio data of the reproduction object from the content storage device 10, decodes the reproduction using the corresponding authorization key, and obtains an audio signal. Furthermore, the audio signal is output to a stereo sound connected to the content reproduction device. The video playback device 19 reads the encrypted video data of the playback target from the content storage device 10, decodes the playback using the corresponding authorization key, and obtains a video signal. The video signal is output to a monitor connected to the content reproduction device. The card connection device 20 is connected to the memory card 30. The memory card 30 obtains the authorization key or the encrypted content data, and transmits the authorization key or the encrypted content data to the memory card 20. Interface 2 1 Department of CPU 1 1 or Memory 1 2 and the size of the paper used for the reproduction of this content. Applicable to China National Standard (CNS) A4 (210 X 297 mm) ----------- -Install -------- Order --- (Please read the precautions on the back before filling this page) Li- -6-514776 A7 B7 V. Description of the invention (4) Information between other devices Send and receive. (Please read the precautions on the back before filling out this page.) Next, among the devices constituting this content playback device, the content storage device 10, alfalfa playback device 18, and video playback device will be described in more detail. First, the content storage device 10 will be described. FIG. 2 is a schematic configuration diagram of the content storage device 10. As shown in the figure, the content storage device 10 is provided with a hard disk device 106 and a key storage device 101, and a hard disk device 106 and a key storage device 101 for transmitting and receiving data to and from each part of the content reproduction device through the interface 21. The I / O circuit 107 is configured. Content data such as encrypted audio data or video data is stored in the hard disk device 10 in correspondence with the content name or / and content ID. The key storage device 101 has a CPU 102, a memory 104, a non-volatile memory 103, and an I / O circuit 105 with an interface with the I / O circuit 107. The CPU 102 is printed and controlled by the employee's consumer cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. Each part of the key storage device 101. The CPU 102 has an authentication function and an encryption / decryption function. For authentication and encryption / decryption functions, a dedicated processor (Cyptograhpy Engine) can be set separately from the CPU. The memory 104 is composed of a ROM and a RAM. The CPU 102 collectively stores programs used by the various parts of the control key storage device 101 and programs used to implement the authentication function and the encryption / decryption function are stored in the ROM. The RAM functions as a work area of the CPU 102. The authorization key is assigned to the content name or content ID of the content to be decoded and stored in the non-volatile memory 103. Non-volatile memory 103 can store multiple authorizations. The paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) 514776 A7 B7 _ V. Description of the invention (5) key. Here, the authorization key can be stored in a so-called Tamper Resistant Module (TRM) for enhanced security. As the non-volatile memory 103, flash memory, FRAM, EEPROM, or the like can be used. Each part constituting the key storage device 1101 shown in Fig. 2 may be formed on, for example, one wafer, or may be constituted by a plurality of wafers. In the case of a plurality of wafers, it is better to execute a signal that does not steal the signals between the wafers from the outside of the key storage device 1 01. Further, each part constituting the key storage device 1 0 1 shown in FIG. 2 is, for example, Made on 1 wafer. In Figures 1 and 2, the audio reproduction device 18, video reproduction device 19, memory card 30, and key storage device 101 have obtained the certification authority (CA: Cer 11 ficate A uth 〇rity) in the manufacturing stage or shipping stage. Certified. When the authentication data is used for the transmission and reception of the authorization key, the authentication by the transmission opponent. The memory card 30 may also use the key storage device 101 to perform a standardized memory card of the MMCA (Multi Media Card Association). Next, the audio playback device 18 will be described. FIG. 3 is a schematic configuration diagram showing the audio reproduction device 18. As shown in the figure, the audio reproduction device 18 includes an encryption decoding circuit 181, a decoder circuit 182, and an I / O circuit 184 for transmitting and receiving data to and from each part of the content reproduction device through the interface 21. The encryption / decryption circuit 181 obtains the authorized key corresponding to the encrypted audio data to be reproduced from the key storage device 101 of the content storage device 10. Use this key to decode the reproduced paper read by the hard disk device 106 of the content storage device 10. Dimensions are applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page)

tj、- ^1J · · I ϋ· Bn eMmmm i ^ ^ 1 ^1· tmmmm BB_^i ·1 I 經濟部智慧財產局員工消費合作社印製 -8- 514776 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(6 ) 對象之被加密之音頻資料。解碼器電路1 82將在加密解碼 電路181被解碼之音頻資料因應需要延長、再生,獲得音 頻信號。而且,將音頻信號輸出於立體音響。此處,構成 圖3所示之音頻再生裝置1 8之各部例如被製作在1晶片上 〇 接著,說明視頻再生裝置19。 圖4係顯示視頻再生裝置1 9之槪略構成圖。 如圖示般地,視頻再生裝置19具有加密解碼電路191 、及解碼器電路192、及訊框緩衝器193、及透過介面21 與本內容再生裝置之各部進行資料傳送接收用之I/O電路 194 ° 加密解碼電路1 9 1由內容儲存裝置1 〇之鍵儲存裝置1 〇 1 取得對應再生對象之被加密之視頻資料之授權鍵,使用此 鍵,解碼由內容儲存裝置_10之硬碟裝置106被讀出之再生 對象之被加密之視頻資料。解碼器電路1 92利用訊框緩衝 器193,將在加密解碼電路191被解碼之視頻資料因應需要 延長、再生,獲得視頻信號。而且,將視頻信號輸出於監 視器。此處,構成圖4所示之視頻再生裝置1 9之各部例如 被製作在1晶片上。 接著,說明被裝置在本內容再生裝置使用之記憶體卡 30 ° 記憶體卡30之槪略構成係與圖2所示之內容儲存裝置 10之鍵儲存裝置101相同。但是,不單是授權鍵,被加密 之內容資料也被儲存在記憶體卡30。即,此記憶體卡30可 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) -9- 經濟部智慧財產局員工消費合作社印製 514776 A7 B7 _ _ 五、發明說明(7 ) 以使用爲例如被裝置於被設置在販賣店等之專用終端,使 用者利用線上系統,取得所期望之被加密之內容資料或該 授權鍵,或被裝置於行動電話等之個人用終端,使用者利 用線上系統,由內容傳送中心取得所期望之被加密之內容 資料或該授權鍵。 此處,圖5顯示本實施形態被適用之內容再生裝置之 槪觀之一例。此例之內容再生裝置爲適合在家庭內享受內 容之安置型而且一體型之形狀。此處,標號41係由再生按 鈕、停止按鈕、再生內容選擇按鈕、以及將內容資料或授 權鍵寫入內容儲存裝置10之硬碟裝置106或鍵儲存裝置101 、往被接續於卡接續裝置30之記憶體卡20移動用之各種設 定按鈕等構成之操作面板。標號42係接受由與操作面板41 相同具備各種按鈕之遠端控制器50來之指示用之接收部。 標號43係顯示面板,顯示被儲存在內容儲存裝置10之硬碟 裝置106之內容資料之內容名稱之淸單、顯示再生對象之 被加密之內容資料之內容名稱。而且,標號44係裝置記憶 體卡30用之插槽。雖然未圖示出,但是在本內容裝置之背 面設置接續監視器51或立體音響52或行動電話機53或電 話機用之端子。 接著,圖6顯示內容儲存裝置1 〇之槪觀之一例。本例 係內容儲存裝置1 0與內容再生裝置之其它部份分離之情形 。內容儲存裝置10爲裝置鍵儲存裝置101用之插槽被設置 於硬碟裝置106之形狀。標號45係裝置鍵儲存裝置101用 之插槽。鍵儲存裝置1 0 1例如可以使用與記憶體卡3 0相同 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) — — — — — — — — — II ·1111111 « — — — — — —I — (請先閱讀背面之注意事項再填寫本頁) -10- 514776 A7 B7_____ 五、發明說明(8 ) 構成者。此處,標號46係將本內容儲存裝置1 0接續於內容 再生裝置之纜線47用之連接器,依據內容再生裝置採用之 (請先閱讀背面之注意事項再填寫本頁) 介面。 藉由可以插拔鍵儲存裝置1 0 1,例如在家中與車中具 有複數之內容再生裝置之情形,藉由移動鍵儲存裝置101 ,即使在任何一個之內容再生裝置都可以進行內容之再生 〇 又,在例示於圖5之內容再生裝置中,將內容儲存裝 置10內藏於筐體內部,使用者本身無法插拔鍵儲存裝置 101。但是,也可以使使用者本身可以插拔內容儲存裝置10 之鍵儲存裝置10 1地,使內容儲存裝置1 〇之插槽45來到內 容再生裝置之筐體之面上。或爲了使可以插拔內容儲存裝 置10本身,於內容再生裝置設置裝置內容儲存裝置10用之 插槽亦可。 藉由使內容儲存裝置10可以插拔,使用複數之內容儲 存裝置,可以增加保存之內容數,每一使用者可以使用個 別之內容儲存裝置。 經濟部智慧財產局員工消費合作社印製 又,在例示於圖6之內容儲存裝置1〇中’雖然可以插 拔鍵儲存裝置1 〇 1地設置插槽45 ’但是例如將鍵儲存裝置 1 0 1組入內容儲存裝置1 〇之內部,使之不能插拔亦可。例 如,使鍵儲存裝置101爲與1C或LSI相同形狀者’將其安 裝於設置在內容儲存裝置10內部之基板上之插座(socket )亦可。或也可以將其直接銲接於內容儲存裝置10內部之 基板。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -11 - 514776 A7 ____B7_ 五、發明說明(9 ) 內容再生裝置也可以組裝於音頻裝置或個人電腦。 (請先閱讀背面之注意事項再填寫本頁) (2 )內容之記憶 內容在被加密之狀態透過網路或不透過網路被免費分 發。另一方面,授權鍵係以收費被分發。授權鍵之分發方 法有各種方式。在本實施例中,內容係被記憶在記憶體卡 30或內容儲存裝置1〇之硬碟裝置106。內容由記憶體卡30 被往硬碟裝置106轉送或複製亦可。授權鍵被記憶在記憶 體卡30或鍵儲存裝置1 〇 1。授權鍵一旦被記憶在記憶體卡 30’被往內容儲存裝置1〇之鍵.儲存裝置1〇1轉送亦可。 經濟部智慧財產局員工消費合作社印製 利用被接續於通信裝置1 5之行動電話機/安置型電話 機’透過線上系統或網際網路等之網路,由內容傳送中心( 未圖示出)取得授權鍵之情形的動作一般可以爲與透過網路 之資料下載相同。但是,爲了使只有具有正當權利者可以 藉由下載取得授權鍵之故,在內容儲存裝置1〇之鍵儲存裝 置1 〇 1與內容傳送中心之間進行認證處理,內容傳送中心 只在認證鍵儲存裝置101之情形,使之許可授權鍵之下載 。又’內容資料之對內容儲存裝置10之硬碟裝置106之下 載例如可以複製被儲存在記憶體卡30之內容資料,儲存在 硬碟裝置106,或利用被接續於通信裝置15之行動電話機 /安置型電話機,透過線上系統或網際網路等網路,由內 容傳送中心(未圖示出)取得,儲存在硬碟裝置106。總 之’內谷資料被加密’如沒有對應之授權鍵’無法解碼、 再生。 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 X 297公爱) ' -12- 514776tj,-^ 1J · · I ϋ · Bn eMmmm i ^ ^ 1 ^ 1 · tmmmm BB_ ^ i · 1 I Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs-8- 514776 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention (6) The encrypted audio data of the object. The decoder circuit 182 will extend and reproduce the audio data decoded by the encryption and decoding circuit 181 as needed to obtain an audio signal. Then, the audio signal is output to a stereo. Here, each part constituting the audio reproduction device 18 shown in FIG. 3 is produced on, for example, one wafer. Next, the video reproduction device 19 will be described. FIG. 4 is a schematic configuration diagram showing a video reproduction device 19. As shown in the figure, the video reproduction device 19 includes an encryption and decoding circuit 191, a decoder circuit 192, a frame buffer 193, and an I / O circuit for transmitting and receiving data to and from each part of the content reproduction device through the interface 21. 194 ° Encryption and decoding circuit 1 9 1 Content storage device 1 〇 Key storage device 1 〇1 Obtains the authorized key corresponding to the encrypted video data of the playback object. Use this key to decode the hard disk device from content storage device _10 106 The encrypted video data of the read-out reproduction object. The decoder circuit 192 uses the frame buffer 193 to extend and reproduce the video data decoded by the encryption decoding circuit 191 as needed to obtain a video signal. The video signal is output to a monitor. Here, each part constituting the video reproduction device 19 shown in Fig. 4 is fabricated on, for example, one wafer. Next, the memory card 30 used by the device in the content reproduction device will be described. The outline of the memory card 30 is the same as the key storage device 101 of the content storage device 10 shown in FIG. However, not only the authorization key, the encrypted content data is also stored in the memory card 30. That is to say, this memory card 30 can be adapted to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) at this paper size. ------- (Please read the notes on the back before filling in this page) -9- Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 514776 A7 B7 _ _ V. Description of the Invention (7) The use is for example The device is installed in a dedicated terminal installed in a retail store, etc. The user uses the online system to obtain the desired encrypted content data or the authorization key, or is installed in a personal terminal such as a mobile phone. The user uses the online system. The content delivery center obtains the desired encrypted content data or the authorization key. Here, Fig. 5 shows an example of a view of a content reproduction device to which this embodiment is applied. The content reproduction device of this example is a placement type and an integrated shape suitable for enjoying contents in a home. Here, reference numeral 41 denotes a playback button, a stop button, a playback content selection button, and a hard disk device 106 or a key storage device 101 that writes content data or an authorization key to the content storage device 10, and is connected to the card connection device 30. An operation panel including various setting buttons for moving the memory card 20 and the like. Reference numeral 42 is a receiving section for receiving instructions from a remote controller 50 having various buttons similar to the operation panel 41. Reference numeral 43 is a display panel that displays a list of content names of the content data stored in the hard disk device 106 of the content storage device 10, and displays the content name of the encrypted content data to be reproduced. Further, reference numeral 44 denotes a slot for the device memory card 30. Although not shown, a terminal for connecting the monitor 51 or the stereo 52 or the mobile phone 53 or the telephone is provided on the back of the content device. Next, FIG. 6 shows an example of a view of the content storage device 10. This example is a case where the content storage device 10 is separated from the other parts of the content reproduction device. The content storage device 10 has a shape in which a slot for the device key storage device 101 is provided in the hard disk device 106. Reference numeral 45 denotes a slot for the device key storage device 101. The key storage device 1 0 1 can use, for example, the same as the memory card 30. The paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) — — — — — — — — — II · 1111111 «— — — — — —I — (Please read the notes on the back before filling out this page) -10- 514776 A7 B7_____ V. Description of the invention (8) The creator. Here, reference numeral 46 is a connector for connecting the content storage device 10 to the content reproduction device cable 47, which is based on the interface used by the content reproduction device (please read the precautions on the back before filling this page). The key storage device 101 can be inserted and removed, for example, when there is a plurality of content playback devices at home and in the car, and by moving the key storage device 101, the content can be played back in any content playback device. In the content reproduction device illustrated in FIG. 5, the content storage device 10 is built in the casing, and the user cannot insert or remove the key storage device 101 by himself. However, the user can also insert and remove the key storage device 101 of the content storage device 10, and the slot 45 of the content storage device 10 can come to the surface of the housing of the content reproduction device. Or, in order to insert and remove the content storage device 10 itself, a slot for the content storage device 10 may be provided in the content reproduction device. By making the content storage device 10 pluggable, and using a plurality of content storage devices, the number of stored content can be increased, and each user can use a separate content storage device. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, and shown in the content storage device 10 illustrated in FIG. 6 'Although the key storage device 1 can be inserted and inserted into the slot 45', the key storage device 1 0 1 It may be incorporated into the content storage device 10 so that it cannot be inserted or removed. For example, a key storage device 101 having the same shape as 1C or LSI 'may be mounted on a socket provided on a substrate provided inside the content storage device 10. Alternatively, it may be directly soldered to the substrate inside the content storage device 10. This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -11-514776 A7 ____B7_ V. Description of the invention (9) The content reproduction device can also be assembled in audio devices or personal computers. (Please read the precautions on the back before filling this page) (2) Memory of the content The content is encrypted for free distribution via the network or not through the network. Authorization keys, on the other hand, are distributed at a charge. There are various ways to distribute the authorization keys. In this embodiment, the content is stored in the memory card 30 or the hard disk device 106 of the content storage device 10. The content may be transferred from the memory card 30 to the hard disk device 106 or copied. The authorization key is stored in the memory card 30 or the key storage device 101. Once the authorization key is stored in the memory card 30 ', it is transferred to the content storage device 10 key. The storage device 101 may be transferred. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, using mobile phones / placement phones connected to communication devices 15 through a network such as an online system or the Internet, authorized by a content delivery center (not shown) The action of the key can be the same as the data download via the Internet. However, in order that only authorized persons can obtain the authorization key by downloading, the authentication processing is performed between the key storage device 10 of the content storage device 10 and the content delivery center, and the content delivery center stores only the authentication key. In the case of the device 101, it is permitted to download the authorization key. Also, the downloading of content data to the hard disk device 106 of the content storage device 10 can, for example, copy the content data stored in the memory card 30, store it in the hard disk device 106, or use a mobile phone connected to the communication device 15 / The placement-type telephone is obtained from a content delivery center (not shown) through an online system or the Internet and stored in a hard disk device 106. In short, "Inner Valley data is encrypted", and it cannot be decoded and reproduced without the corresponding authorized key. This paper size applies to China National Standard (CNS) A4 (21〇 X 297 public love) '' -12- 514776

五、發明說明(1〇 ) (3 )內容之再生 接著,說明本實施形態之內容再生裝置之動作。 (請先閱讀背面之注意事項再填寫本頁) 首先,說明再生內容資料之情形的動作。內容係以被 加密之狀態被記憶之故,只能以授權鍵解碼再生。 圖7係說明將被儲存在內容儲存裝置10之硬碟裝置 1 06之內容使用被記憶在鍵儲存裝置1 0 1之授權鍵加以解碼 之內容再生裝置之再生動作用之流程圖。(由記憶體卡30 往鍵儲存裝置1 〇 1移動授權鍵之方法後述)。此流程例如 使用者使用輸入裝置16,被顯示於顯示裝置17。由被儲存 在內容儲存裝置10之硬碟裝置106之內容資料之內容名稱 之淸單,選擇再生對象之內容,一輸入再生指示被開始。 首先,CPU11將由使用者透過輸入裝置16接受之內容 資料之再生指示傳送於再生該內容資料之種類(音頻資料 /視頻資料)之音頻再生裝置18 /視頻再生裝置19 ( S1001 )。 經濟部智慧財產局員工消費合作社印製 藉由CPU1 1接受再生指示之音頻再生裝置18 /視頻再 生裝置1 9之加密解碼電路1 8 1 / 1 9 1將包含由認證局被給 予之本身之認證資料與再生對象之被加密之內容資料之識 別資訊(例如,內容名稱)之該內容資料再生用之授權鍵 傳送指示傳送於內容儲存裝置1〇之鍵儲存裝置101 ( s 1002 )° 鍵儲存裝置101之CPU102如接受內容再生用之授權鍵 傳送指示,使用被包含在該指示之認證資料,進行驗證( 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -13- 514776 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(11 ) S 1 003 )。例如,調查是否顯示認證資料被登錄在本鍵儲存 裝置101之音頻/視頻再生裝置。而且,如認證該指示之 傳送源爲音頻再生裝置18 /視頻再生裝置19 ( S 1004爲 Yes之情形),調查藉由被包含在該指示之識別資訊而被特 定之內容資料之授權鍵是否被儲存在不揮發性記憶體1 03 (S 1 005 )。如被儲存(S 1006爲Yes之情形),由記憶體 1 03讀出該授權鍵,利用加密通訊,傳送於該指示之傳送源 之音頻再生裝置18/視頻再生裝置19 ( S1 008 )。 又,於S 1004中,在無法認證指示之傳送源爲音頻再生 裝置1 8 /視頻再生裝置1 9之情形,以及於S 1 006中,所期 望之授權鍵未被儲存在不揮發性記憶體103之情形,鍵儲 存裝置101之CPU 102將該旨意傳達於CPU11。接受此, CPU11於顯示裝置17進行錯誤顯示等,進行指定之錯誤處 理(S1007 )。 且說傳送內容資料再生用之授權鍵傳送指示之音頻再 生裝置1 8 /視頻再生裝置1 9之加密解碼電路1 8 1 / 1 9 1由 內容儲存裝置10之鍵儲存裝置101 —接受授權鍵,由內容 儲存裝置10之硬碟裝置106讀出再生對象之被加密之內容 資料(S 1009 )。而且,將此以授權鍵解碼,傳遞於解碼器 電路1 82 / 1 92。解碼器電路1 82 / 1 92將由加密解碼電路 181/ 191接受之內容資料因應需要延長、再生,獲得音頻 /視頻資料,輸出於立體音響/監視器(S1010)。 接著,說明圖7所示之鍵儲存裝置1〇1以及音頻再生 裝置1 8 /視頻再生裝置1 9間之資料之交換之其之一例。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ---------------I I 丨訂 (請先閱讀背面之注意事項再填寫本頁) -14- 514776 A7 B7 五、發明說明(12 ) (請先閱讀背面之注意事項再填寫本頁) 圖8係說明圖7所示之鍵儲存裝置1 〇丨以及音頻再生 裝置1 8 /視頻再生裝置1 9間之資料之交換之一例用之順序 圖。於順序圖中,E ( K、D )係表不將資訊D以鍵K加 密之結果,A | | B係表示資訊A與資訊B之連結( concatenation )之資訊 ° 音頻再生裝置18 /視頻再生裝置19之加密解碼電路 181 / 191於圖7之S 1 002中,製作包含:本身之認證資料 、及再生對象之被加密之內容資料之識別資訊、及與預先 保持之媒體等級密碼鍵Κρμ。成對之媒體等級公開鍵K〇Me之 授權鍵傳送指示,將此傳送於內容儲存裝置10之鍵儲存裝 置 101 ( T1001 )。 此處,所謂媒體等級係再生裝置1 8、1 9等之群組( lot ),在不同種類之硬體被分配不同之媒體等級。所謂媒 體等級密碼鍵、公開鍵係被賦予該媒體等級之公開鍵加密 法之鍵。 經濟部智慧財產局員工消費合作社印製 接受此,鍵儲存裝置101之CPU 102於圖7之 S 1 004〜S 1 007中,進行音頻再生裝置18/視頻再生裝置19 之認證、以及被要求之授權鍵被儲存在不揮發性記憶體103 之確認(T 1 002 )。此後,CPU 102產生對話時間(session) 鍵KS1 ( T 1 003 ),將其以被包含於預約鍵傳送指示之媒體 等級公開鍵KQMC加密,傳送於該指示之傳送源之音頻再生 裝置18 /視頻再生裝置19 ( T1004 )。 此處,所謂預約鍵係每一通訊之對話時間所產生之暫 時之共通鍵加密法之鍵。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 15- 經濟部智慧財產局員工消費合作社印製 514776 B7 五、發明說明(13 ) 接受此,音頻再生裝置1 8 /視頻再生裝置1 9之加密解 碼電路1 8 1 / 1 9 1將被加密之對話時間鍵KS1以預先保持之 媒體等級加密鍵Κρμ。解碼,獲得對話時間鍵KS1(T 1005)。之 後’產生隨機數Κυ(Τ1006),將此以及與預先保持之媒體固 有加密鍵KPM成對之媒體固有公開鍵Κομ以對話時間鍵KS1 加密,傳送於內容儲存裝置10之鍵儲存裝置101 ( T10Q7 )° 此處,所謂媒體固有加密鍵、公開鍵係個別被給予各 裝置之公開鍵加密法之鍵。 接受此,鍵儲存裝置101之CPU 102將被加密之隨機數 Ks2與媒體固有公開鍵Κ〇Μ以對話時間鍵Ksi解碼,獲得隨機 數Ks2與媒體固有公開鍵K〇m(T1008)。而且,將被要求傳送 之授權鍵Kc以媒體固有公開鍵K〇M加密,進而,將此以隨 機數KS2加密,傳送於授權鍵傳送指示之傳送源之音頻再生 裝置18 /視頻再生裝置19 ( T1009 )。 接受此,音頻再生裝置18 /視頻再生裝置19之加密解 碼電路1 8 1 / 1 9 1將被加密之授權鍵Kc使用隨機數KS2與媒 體固有加密鍵Kpm解碼,獲得授權鍵Kc(TlOlO)。 以上,說明再生內容資料之情形的動作。 (4 )授權鍵之管理 接著,說明由記憶體卡30取得授權鍵之情形,即,由 記憶體卡30對內容儲存裝置之鍵儲存裝置1 〇 1移動授權鍵 之動作。爲了再生內容,需要在鍵儲存裝置101存在對應 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------I----------訂---------· (請先閱讀背面之注意事項再填寫本頁) -16- 514776 A7 B7 五、發明說明(14 ) 內容之授權鍵。 圖9係說明由被接續於本實施形態被適用之內容再生 裝置之記憶體卡30取得授權鍵之圖9係說明由被接續於本 實施形態被適用之內容再生裝置之記憶體卡30取得授權鍵 之情形之動作用之流程圖。此流程例如在記憶體卡30被裝 置於本內容再生裝置之狀態,使用者使用輸入裝置1 6,由 被顯示於顯示裝置17之對應被儲存在記億體卡30之授權鍵 之內容名稱之淸單中,選擇對應取得對象之授權鍵之內容 ,一輸入授權鍵取得指示而被開始。 首先,CPU11由使用者透過輸入裝置16—接受授權鍵 取得指示,將該旨意傳送於內容儲存裝置之鍵儲存裝置101 (S2001 )。 藉由CPU11接受授權鍵取得指示之鍵儲存裝置101之 CPU 1 02將包含本身之認證資料與取得對象之授權鍵之識別 資訊(例如,以該鍵可以解碼之內容名稱)之該授權鍵取 得用之授權鍵傳送指示傳送於被接續在卡接續裝置20之記 憶體卡 30 ( S2002 )。 記憶體卡30之CPU如接受授權鍵取得用之授權鍵傳送 指示,使用被包含於該指示之認證資料進行驗證(S2003 ) 。例如,調查是否顯示認證資料預先被登錄在記憶體卡30 之鍵儲存裝置。而且,如認證該指示之傳送源爲鍵儲存裝 置101 ( S2004中爲Yes之情形),調查藉由被包含在該指 示之識別資訊而被特定之授權鍵是否被儲存在記憶體卡3〇 內(S2005 )。如被儲存(S2006中爲Yes之情形),讀出 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----------·裝 (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製V. Description of the invention (10) (3) Content reproduction Next, the operation of the content reproduction device of this embodiment will be described. (Please read the precautions on the back before filling out this page.) First, explain how to reproduce content data. Because the content is memorized in an encrypted state, it can only be decoded and reproduced with an authorized key. FIG. 7 is a flowchart illustrating a reproduction operation of a content reproduction device that decodes the content stored in the hard disk device 106 of the content storage device 10 using an authorized key stored in the key storage device 101. (The method of moving the authorization key from the memory card 30 to the key storage device 101 will be described later). This flow is, for example, displayed on the display device 17 by the user using the input device 16. From the list of content names of the content data stored in the hard disk device 106 of the content storage device 10, the content to be reproduced is selected, and an input of a reproduction instruction is started. First, the CPU 11 transmits a reproduction instruction of the content data received by the user through the input device 16 to the audio reproduction device 18 / video reproduction device 19 that reproduces the type of the content data (audio data / video data) (S1001). Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, the audio reproduction device 18 / video reproduction device 19 that receives the reproduction instruction by the CPU1 1 and the encryption and decoding circuit 1 8 1/1 9 1 will include its own certification given by the certification authority Data and identification information of the encrypted content data to be reproduced (for example, content name) Authorized key transmission instruction for reproduction of the content data is transmitted to the content storage device 10 key storage device 101 (s 1002) ° key storage device If the CPU 102 of 101 accepts the authorization key transmission instruction for content reproduction, it uses the certification information included in the instruction for verification (this paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -13- 514776 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Invention Description (11) S 1 003). For example, it is investigated whether the authentication data is registered in the audio / video reproduction device of the key storage device 101. Furthermore, if the transmission source of the instruction is authenticated as audio reproduction device 18 / video reproduction device 19 (in the case of S 1004 being Yes), it is investigated whether the authorization key of the specific content data has been identified by the identification information included in the instruction. Stored in non-volatile memory 1 03 (S 1 005). If it is stored (when S 1006 is Yes), the authorization key is read out from the memory 103, and the encrypted reproduction is transmitted to the audio reproduction device 18 / video reproduction device 19 of the instruction transmission source (S1 008). Further, in S 1004, when the transmission source that cannot be authenticated is the audio reproduction device 18 / video reproduction device 19, and in S 1 006, the desired authorization key is not stored in the non-volatile memory. In the case of 103, the CPU 102 of the key storage device 101 conveys this intention to the CPU 11. In response to this, the CPU 11 performs an error display or the like on the display device 17 and performs designated error processing (S1007). Let ’s say that the encryption key for transmitting the reproduction instruction of the content data is transmitted to the audio reproduction device 1 8 / the video reproduction device 19 is the encryption decoding circuit 1 8 1/1 9 1 by the content storage device 10 ’s key storage device 101 — the authorization key is accepted by The hard disk device 106 of the content storage device 10 reads the encrypted content data of the reproduction target (S 1009). This is decoded with the authorization key and passed to the decoder circuit 1 82/192. The decoder circuit 1 82/1 92 will extend and reproduce the content data accepted by the encryption decoding circuit 181/191 as needed to obtain audio / video data and output it to the stereo / monitor (S1010). Next, an example of data exchange between the key storage device 101 and the audio reproduction device 18 / video reproduction device 19 shown in FIG. 7 will be described. This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) --------------- II 丨 Order (Please read the precautions on the back before filling this page) -14- 514776 A7 B7 V. Description of the invention (12) (Please read the precautions on the back before filling out this page) Figure 8 illustrates the key storage device 1 〇 丨 and audio playback device 18 / video playback shown in Figure 7 An example sequence diagram for the exchange of data between devices 19. In the sequence diagram, E (K, D) is the result of not encrypting the information D with the key K, and A | | B is the information representing the concatenation of the information A and the information. ° Audio reproduction device 18 / Video reproduction The encryption and decoding circuit 181/191 of the device 19 in S 1 002 of FIG. 7 produces identification information including the authentication data itself and the encrypted content data of the reproduction target, and the media level password key κρμ held in advance. The authorized key transmission instruction of the paired media-level public key KOMe is transmitted to the key storage device 101 (T1001) of the content storage device 10. Here, the so-called media levels are groups (lots) such as playback devices 18, 19, etc., and different media levels are assigned to different types of hardware. The so-called media-level cryptographic key and public key are keys of the public-key encryption method assigned to the media level. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, the CPU 102 of the key storage device 101 performs the authentication of the audio reproduction device 18 / video reproduction device 19 in S 1 004 to S 1 007 in FIG. 7 and is required to Confirmation that the authorization key is stored in the non-volatile memory 103 (T 1 002). Thereafter, the CPU 102 generates a session key KS1 (T 1 003), encrypts it with the media-level public key KQMC included in the reservation key transmission instruction, and transmits the audio reproduction device 18 / video of the transmission source of the instruction Regeneration device 19 (T1004). Here, the so-called reserved key is a temporary common key encryption method key generated by the conversation time of each communication. This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 15- Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 514776 B7 V. Description of the invention (13) Accept this, audio reproduction device 1 8 / video The encryption / decryption circuit 1 8 1/1 9 1 of the playback device 19 encrypts the encrypted session time key KS1 with the media level encryption key Kρμ held in advance. Decode to get the conversation time key KS1 (T 1005). Afterwards, a random number Κυ (Τ1006) is generated, and this and the media-specific public key Κομ, which is paired with the media-specific encryption key KPM held in advance, are encrypted with the conversation time key KS1 and transmitted to the key storage device 101 (T10Q7 of the content storage device 10 ) ° Here, the so-called media-specific encryption keys and public keys are the keys of the public key encryption method given to each device individually. Accepting this, the CPU 102 of the key storage device 101 decodes the encrypted random number Ks2 and the media-specific public key KOM with the conversation time key Ksi to obtain the random number Ks2 and the media-specific public key Kom (T1008). Furthermore, the authorized key Kc to be transmitted is encrypted with the media-specific public key KOM, and this is further encrypted with a random number KS2 and transmitted to the audio reproduction device 18 / video reproduction device 19 of the transmission source of the authorization key transmission instruction ( T1009). Accepting this, the encryption / decryption circuit 1 8 1/1 9 1 of the audio reproduction device 18 / video reproduction device 19 decodes the encrypted authorization key Kc using the random number KS2 and the media-specific encryption key Kpm to obtain the authorization key Kc (TlOlO). The operation in the case where content data is reproduced has been described above. (4) Management of the authorization key Next, the case where the authorization key is obtained by the memory card 30, that is, the operation of moving the authorization key by the memory card 30 to the key storage device 101 of the content storage device. In order to reproduce the content, it is necessary to exist in the key storage device 101 corresponding to the paper size and apply the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -------- I ---------- Order --------- · (Please read the precautions on the back before filling this page) -16- 514776 A7 B7 V. Authorization key of the content of the invention description (14). FIG. 9 illustrates the authorization key obtained from the memory card 30 connected to the content reproduction device to which the present embodiment is applied. The flowchart of the action of the key case. This flow is, for example, in a state where the memory card 30 is installed in the content reproduction device, and the user uses the input device 16 to display the content name corresponding to the authorization key stored in the memory card 30 stored on the display device 17 In the list, select the content of the authorization key corresponding to the acquisition target, and enter the authorization key acquisition instruction to start. First, the CPU 11 receives an authorization key acquisition instruction from the input device 16 through the user, and transmits the intention to the key storage device 101 of the content storage device (S2001). The CPU 10 of the key storage device 101 that accepts the authorization key acquisition instruction by the CPU 11 will acquire the authorization key including the authentication data of itself and the identification information of the authorization key of the acquisition target (for example, the content name that can be decoded by the key). The authorization key transmission instruction is transmitted to the memory card 30 (S2002) connected to the card connection device 20. If the CPU of the memory card 30 accepts the authorization key transmission instruction for the authorization key acquisition, it uses the authentication data included in the instruction for verification (S2003). For example, it is checked whether the authentication data is registered in the key storage device of the memory card 30 in advance. Furthermore, if it is authenticated that the transmission source of the instruction is the key storage device 101 (in the case of Yes in S2004), it is investigated whether a specific authorized key is stored in the memory card 30 by the identification information included in the instruction. (S2005). If it is stored (the case of Yes in S2006), read out the size of this paper to apply the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ----------- · installed (please read first Note on the back, please fill in this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

-17- 514776 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(15 ) 該授權鍵,利用加密通訊,傳送於該指示之傳送源之內容 儲存裝置10之鍵儲存裝置101 ( S2008 )。之後,將傳送 之授權鍵由記憶體卡30內消除(S2009 )。 又,於S2004中,無法認證指示之傳送源爲鍵儲存裝置 101之情形,以及於S2006中,所期望之授權鍵未被儲存在 記憶體卡30內之情形,記憶體卡30之CPU將該旨意傳達於 CPU11。接受此,CPU11於顯示裝置17進行錯誤顯示等’ 進行指定之錯誤處理(S2007 )。 且說傳送授權鍵取得用之授權鍵傳送指示之鍵儲存裝 置101之CPU 102如由被接續於卡接續裝置20之記憶體卡30 接受授權鍵,將此對例如以該鍵可以解碼之內容資料之內 容名稱賦予對應,儲存在不揮發性記憶體103 ( S2010 ) ° 接著,說明圖9所示之鍵儲存裝置1 0 1以及記憶體卡 3 0間之資料之交換之其之一例。 圖1 0係說明圖9所示之流程之鍵儲存裝置1 〇 1以及記 憶體卡30間之資料之交換之一例用之順序圖。媒體加密鍵 、公開鍵、對話時間鍵、媒體固有公開鍵、加密鍵、圖中 之標號之意義與圖8相同。 內容儲存裝置10之鍵儲存裝置101之CPU 102於圖9之 S2002中,製作包含:本身之認證資料、及取得對象之授權 鍵之識別資訊、及與預先保持之媒體等級密碼鍵K’PMC成對 之媒體等級公開鍵Κ’ομ。之授權鍵傳送指示,將此傳送於記 憶體卡 30 ( T2001 )。 接受此,記憶體卡30之CPU於圖9之S2004〜S2007中 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) ------------裝--------訂--- (請先閱讀背面之注意事項再填寫本頁) -18- 514776 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(16 ) ’進行鍵儲存裝置1 01之認證以及被要求之授權鍵被儲存 在記憶體卡30內之確認(T2002 )。之後,記憶體卡30之 CPU產生對話時間鍵KS1 ( T2003 ),將此以被包含在授權 鍵傳送指示之媒體等級公開鍵K’OMC加密,傳送於該指示之 傳送源之內容儲存裝置10之鍵儲存裝置101 (T2004 )。 接受此,鍵儲存裝置101之CPU102將被加密之對話時 間鍵KS1以預先保持之媒體等級加密鍵K’PMC解碼,獲得對 話時間鍵KS1(T2005)。之後,產生隨機數KS2(T2006),將此 以及與預先保持之媒體固有加密鍵K’PM成對之媒體固有公 開鍵K’〇M以對話時間鍵KS1加密,傳送於記憶體卡30 ( T2007 ) 〇 接受此,記憶體卡30之CPU將被加密之隨機數KS2與 媒體固有公開鍵K’QM以對話時間鍵KS1解碼,獲得隨機數 KS2與媒體固有公開鍵K’cm(T2008)。而且,將被要求傳送之 授權鍵Kc以媒體固有公開鍵K’OM加密,進而,將此以隨機 數KS2加密,傳送於授權鍵傳送指示之傳送源之內容儲存裝 置10之鍵儲存裝置101 ( T2009 )。 接受此,鍵儲存裝置101之CPU102將被加密之授權鍵 K。使用隨機數KS2與媒體固有加密鍵K’PM解碼,獲得授權鍵 Kc(T2010)。 以上,說明由記憶體卡30取得授權鍵之情形的動作。 接著,說明將被儲存在內容儲存裝置1 〇之鍵儲存裝置 101之授權鍵往記憶體卡30移動之情形的動作。此動作在 將授權鍵借給他人之情形,或以不同之內容再生裝置再生 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------------·裝--------訂--- (請先閱讀背面之注意事項再填寫本頁) 者丨 -19- 514776 A7 B7 五、發明說明(17 ) 內容之情形進行。 圖11係說明由本實施形態被適用之內容再生裝置之內 容儲存裝置10之鍵儲存裝置101往被接續於本內容再生裝 置之記憶體卡30移動授權鍵之情形的動作用之流程圖。此 流程例如在記憶體卡30被裝置於本內容再生裝置之狀態, 使用者利用輸入裝置16,由被顯示於顯示裝置17之對應被 儲存在內容儲存裝置10之鍵儲存裝置101之授權鍵之內容 名稱之淸單中,選擇對應移動對象之授權鍵之內容,一輸 入授權鍵移動指示而被開始。 首先,CPU11由使用者透過輸入裝置16—接受授權鍵 取得指示,將該旨意傳送於記憶體卡30 ( S300 1 )。 藉由CPU11接受授權鍵取得指示之記憶體卡30之CPU 將包含本身之認證資料與移動對象之授權鍵之識別資訊( 例如,以該鍵可以解碼之內容名稱)之該授權鍵移動用之 授權鍵傳送指示傳送於內容儲存裝置1 〇之鍵儲存裝置1 〇 1 (S3002 )。 鍵儲存裝置101之CPU102如接受授權鍵移動用之授權 鍵傳送指示,使用被包含於該指示之認證資料進行驗證( S3 003 )。例如,調查是否顯示認證資料預先被登錄在本鍵 儲存裝置1 0 1之記億體卡。而且,如認證該指示之傳送源 爲記憶體卡30 ( S3004中爲Yes之情形)’調查藉由被包 含在該指示之識別資訊而被特定之授權鍵是否被儲存在不 揮發性記憶體1 0 3內(S 3 0 0 5 )。如被儲存(S 3 0 0 6中爲 Yes之情形),讀出該授權鍵’利用加密通訊,傳送於該指 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) ϋ ϋ ϋ emm! I n 一-ot _ am· ΙΒΙΜ BIB — . 經濟部智慧財產局員工消費合作社印製 -20- 514776 A7 B7 五、發明說明(18 ) 示之傳送源之記億體卡30 ( S3008 )。之後,將傳送之授 權鍵由不揮發性記憶體103內消除(S3009 )。 (請先閱讀背面之注意事項再填寫本頁) 又,於S3004中,在無法認證指示之傳送源爲記憶體卡 3〇之情形,以及於S3006中,所期望之授權鍵未被儲存在 不揮發性記憶體103內之情形,鍵儲存裝置101之CPU1 02 將該旨意傳達於CPU1 1。接受此,CPU1 1於顯示裝置17進 行錯誤顯示等,進行指定之錯誤處理(S3007 )。 且說傳送授權鍵移動用之授權鍵傳送指示之記憶體卡 30之CPU如由鍵儲存裝置101接受授權鍵,將此與例如以 該鍵可以解碼之內容資料之內容名稱賦予對應,儲存在記 憶體卡3 0內(S 3 0 1 0 )。 又,顯示於圖1 1之流程之鍵儲存裝置1 〇 1以及記憶 體卡30之間之資料交換係成爲於圖1 0所示之順序圖中,相 互交換鍵儲存裝置101以及記憶體卡30之動作者。 以上,說明對記憶體卡30移動授權鍵之情形的動作。 以上,說明本發明之1實施形態。 經濟部智慧財產局員工消費合作社印製 於本實施形態中,被儲存在內容儲存裝置10之硬碟裝 置1 06之內容資料被加密之故,如無對應之授權鍵,無法 解碼再生。因此,不須於硬碟裝置106設置複製防止機能 之特別的機能之故,硬碟裝置1 06可以使用一般被市售之 大容量的硬碟,可以儲存大量之內容資料。 又,在解碼被儲存於內容儲存裝置10之硬碟裝置1〇6 之內容資料需要對應之授權鍵之故,此授權鍵如未被儲存 在內容儲存裝置10之鍵儲存裝置101,無法再生該內容資 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -21 - 514776 B7 ___ 五、發明說明(19 ) 料。因此’可以只對正當之權利者(具有對應之授權鍵者 )許可內容資料之再生,能夠謀求內容著作者等之保護。 (請先閱讀背面之注意事項再填寫本頁) 進而,在本實施形態中,將被加密之內容資料之解碼 於進行內容之再生之音頻再生裝置18 /視頻再生裝置19進 行。而且,內容儲存裝置10之鍵儲存裝置101在認證授權 鍵之傳送對手爲音頻再生裝置1 8 /視頻再生裝置1 9之情形 ’利用加密通訊將該授權鍵傳送於音頻再生裝置1 8 /視頻 再生裝置1 9。如此,可以使授權鍵洩漏於外部之可能性降 低,能夠提升安全性。 除此之外,於本實施形態中,內容儲存裝置10之鍵儲 存裝置1 0 1在授權鍵之傳送對手爲記憶體卡30之情形,將 傳送之授權鍵由鍵儲存裝置101之記憶內容消除。即,於 鍵儲存裝置101設置授權鍵之複製防止機能。藉由如此, 可以減少授權鍵被不正當複製之可能性。 經濟部智慧財產局員工消費合作社印製 又,一般鍵之資料大小與被加密之內容資料之資料大 小相比,顯著地小。因此,即使將鍵儲存裝置101之記憶 部以快閃記憶體103構成之情形,於該不揮發性記憶體103 可以儲存多數之授權鍵。因此,可以提供適合在家中享受 內容資料之再生之安置型之內容再生裝置。 產業上之利用可能性 又,本發明並不限定於上述之實施形態’在不脫離其 要旨之範圍內,有種種之變形可能。 例如,在上述之實施形態中’以被加密之內容資料被 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -22- 514776 A7 B7 五、發明說明(20 ) (請先閱讀背面之注意事項再填寫本頁) 儲存在內容儲存裝置10之硬碟裝置106之情形爲例而做說 明。但是,本發明並不限定於此。也可以以被加密之內容 資料被儲存在具有CD等之可搬性之記憶媒體之形態被提供 者。在此情形,於本實施形態中,代替內容儲存裝置1 0之 硬碟裝置1 06,設置由具有前述可搬性之記憶媒體讀取被 加密之內容資料之讀取裝置即可。 又,在上述之實施形態中,雖然依據每一被加密之內 容資料準備授權鍵,但是本發明並不限定於此。例如,也 可以使複數之被加密之內容資料成爲一組,每一組準備解 碼屬於該組之被加密之內容資料用之授權鍵。 圖面之簡單說明 圖1係顯示本發明之1實施形態被適用之內容再生裝 置之槪略構成圖。 圖2係顯示圖1所示之內容儲存裝置10之槪略構成圖 〇 圖3係顯示圖1所示之音頻再生裝置18之槪略構成圖 〇 經濟部智慧財產局員工消費合作社印製 圖4係顯示圖1所示之視頻再生裝置1 9之槪略構成圖 〇 圖5係顯示本發明之1實施形態被適用之內容再生裝 置之槪觀之一例圖。 圖6係顯示圖2所示之內容儲存裝置1〇之槪觀之一例 圖。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -23- 514776 A7 B7_____ 五、發明說明(21 ) 圖7係說明本發明之1實施形態被適用之內容再生裝 置之再生動作用之流程圖。 (請先閱讀背面之注意事項再填寫本頁) 圖8係說明圖7所示之流程之內容儲存裝置1〇之鍵儲 存裝置101以及音頻再生裝置18/視頻再生裝置19間之資 料之交換之一例用之順序圖。 圖9係說明由被接續於本發明之第1實施形態被適用 之內容再生裝置之記憶體卡30取得授權鍵之情形之動作用 之流程圖。 圖10係說明圖9所示之流程之內容儲存裝置10之鍵儲 存裝置101以及記憶體卡30間之資料交換之一例用之順序 圖。 圖1 1係說明由本發明之1實施形態被適用之內容再 生裝置之內容儲存裝置10之鍵儲存裝置101往被接續於本 內容再生裝置之記憶體卡30移動授權鍵之情形之動作用之 流程圖。 經濟部智慧財產局員工消費合作社印製 主要元件對照表 10 內容儲存裝置 12 記憶體 15 通訊裝置 16 輸入裝置 17 顯示裝置 18 音頻再生裝置 19 視頻再生裝置 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -24- 514776 A7 B7 五、發明說明(22 ) 經濟部智慧財產局員工消費合作社印製 2 〇 卡 接 續 裝 置 2 1 介 面 3 〇 記 憶 體 卡 1 〇 1 鍵 儲 存 裝 置 1 〇 3 不 揮 發 性 記 憶 1 〇 4 記 憶 體 1 〇 5 I / 〇 電 路 1 〇 6 硬 碟 裝 置 1 〇 7 I / 〇 電 路 1 8 1 加 密 解 碼 電 路 1 8 2 解 碼 器 電 路 1 8 4 I / 〇 電 路 1 9 1 加 密 解 碼 電 路 1 9 2 解 碼 器 電 路 1 9 4 I / 〇 電 路 ------------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -25--17- 514776 Printed by A7 B7, Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (15) The authorized key is transmitted to the content storage device 10 of the transmission source of the instruction by means of encrypted communication 101 key storage device 101 (S2008 ). After that, the transferred authorization key is deleted from the memory card 30 (S2009). Also, in S2004, the case where the transmission source of the authentication instruction cannot be the key storage device 101, and in S2006, the expected authorized key is not stored in the memory card 30, the CPU of the memory card 30 will The intention is conveyed to the CPU11. In response to this, the CPU 11 performs an error display or the like on the display device 17 and performs designated error processing (S2007). It is said that if the CPU 102 of the key storage device 101 for transmitting the authorization key transmission instruction for obtaining the authorization key receives the authorization key from the memory card 30 connected to the card connection device 20, this pair, for example, the content data that can be decoded by the key Content names are assigned and stored in the non-volatile memory 103 (S2010). Next, an example of data exchange between the key storage device 101 and the memory card 300 shown in FIG. 9 will be described. Fig. 10 is a sequence diagram illustrating an example of data exchange between the key storage device 101 and the memory card 30 in the flow shown in Fig. 9. The meanings of the media encryption key, the public key, the conversation time key, the media-specific public key, the encryption key, and the symbols in the figure are the same as those in FIG. 8. The CPU 102 of the key storage device 101 of the content storage device 10 in S2002 of FIG. 9 includes: the authentication information of itself and the identification information of the authorized key of the acquisition target, and the media level password key K'PMC which is held in advance. The key K′ομ is disclosed for the media level. The authorization key transmission instruction is transmitted to the memory card 30 (T2001). Accept this, the CPU of the memory card 30 in S2004 ~ S2007 in Figure 9 is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 public love) ------------ installed- ------- Order --- (Please read the precautions on the back before filling this page) -18- 514776 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of Invention (16) The authentication of the storage device 101 and the confirmation that the requested authorization key is stored in the memory card 30 (T2002). After that, the CPU of the memory card 30 generates a conversation time key KS1 (T2003), encrypts it with the media level public key K'OMC included in the authorization key transmission instruction, and transmits it to the content storage device 10 of the transmission source of the instruction. Key storage device 101 (T2004). Accepting this, the CPU 102 of the key storage device 101 decodes the encrypted conversation time key KS1 with the media level encryption key K'PMC held in advance to obtain the conversation time key KS1 (T2005). After that, a random number KS2 (T2006) is generated, and this and the media-specific public key K'OM, which is paired with the media-specific encryption key K'PM held in advance, are encrypted with the conversation time key KS1 and transmitted to the memory card 30 (T2007 ) ○ Accepting this, the CPU of the memory card 30 decodes the encrypted random number KS2 and the media-specific public key K'QM with the conversation time key KS1 to obtain the random number KS2 and the media-specific public key K'cm (T2008). Further, the authorized key Kc to be transmitted is encrypted with the media-specific public key K'OM, and further, this is encrypted with a random number KS2 and transmitted to the key storage device 101 of the content storage device 10 of the transmission source of the authorized key transmission instruction ( T2009). Accepting this, the CPU 102 of the key storage device 101 will be encrypted with the authorized key K. The random number KS2 and the media-specific encryption key K'PM are used for decoding to obtain the authorization key Kc (T2010). The operation of obtaining the authorization key from the memory card 30 has been described above. Next, an operation in a case where the authorization key stored in the key storage device 101 of the content storage device 10 is moved to the memory card 30 will be described. This action is in the case of lending the authorization key to others, or using a different content reproduction device to reproduce this paper. The size of the paper is applicable to China National Standard (CNS) A4 (210 X 297 mm) ----------- -· Install -------- order --- (please read the precautions on the back before filling this page) by 丨 -19- 514776 A7 B7 V. The description of the invention (17) will be carried out. Fig. 11 is a flowchart for explaining the operation of moving the authorization key from the key storage device 101 of the content storage device 10 of the content reproduction device to which this embodiment is applied to the memory card 30 connected to the content reproduction device. This flow is, for example, in a state where the memory card 30 is installed in the content reproduction device, and the user uses the input device 16 to display the corresponding authorized key of the key storage device 101 stored in the content storage device 10 from the display device 17 corresponding to the key storage device 101. In the list of content names, select the content of the authorization key corresponding to the moving object, and start by entering the authorization key movement instruction. First, the CPU 11 obtains an instruction from the user through the input device 16—accepting the authorization key, and transmits the intention to the memory card 30 (S3001). When the CPU 11 accepts the authorization key to obtain the instruction of the memory card 30, the CPU will include its own authentication data and the identification information of the authorization key of the moving object (for example, the name of the content that can be decoded by the key). The key transmission instruction is transmitted to the key storage device 10 of the content storage device 10 (S3002). If the CPU 102 of the key storage device 101 accepts the authorized key transfer instruction for authorizing the key movement, it uses the authentication data included in the instruction for verification (S3 003). For example, it is investigated whether the authentication data is registered in the key memory card 101 of the key memory device 101 in advance. Furthermore, if it is authenticated that the transmission source of the instruction is the memory card 30 (in the case of Yes in S3004), it is investigated whether a specific authorized key is stored in the nonvolatile memory by the identification information included in the instruction 1 Within 0 3 (S 3 0 0 5). If it is stored (Yes in S 3 0 06), read the authorization key 'use encrypted communication and transmit it to the finger. The paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ( Please read the precautions on the back before filling this page) ϋ ϋ ϋ emm! I n a-ot _ am · ΙΒΙΜ BIB —. Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs-20- 514776 A7 B7 V. Description of the invention ( 18) The transmission source of the record billion card 30 (S3008). After that, the transmitted authorization key is deleted from the non-volatile memory 103 (S3009). (Please read the precautions on the back before filling this page) Also, in S3004, if the transmission source of the authentication instruction cannot be the memory card 30, and in S3006, the desired authorization key is not stored in In the case of the volatile memory 103, the CPU 101 of the key storage device 101 conveys this intention to the CPU 101. In response to this, the CPU 11 performs error display on the display device 17 and performs designated error processing (S3007). It is said that if the CPU of the memory card 30 that transmits the authorization key transmission instruction for the authorization key transfer receives the authorization key from the key storage device 101, this corresponds to the content name of the content data that can be decoded by the key, and is stored in the memory Card 30 (S 3 0 1 0). In addition, the data exchange between the key storage device 10 and the memory card 30 shown in the flow chart of FIG. 11 becomes the sequence diagram shown in FIG. 10, and the key storage device 101 and the memory card 30 are exchanged with each other. Actor. The operation of moving the authorization key to the memory card 30 has been described above. The above is a description of one embodiment of the present invention. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs In this embodiment, the content data stored in the hard disk device 106 of the content storage device 10 is encrypted. Without the corresponding authorization key, it cannot be decoded and reproduced. Therefore, it is not necessary to set a special function of the copy prevention function in the hard disk device 106, and the hard disk device 106 can use a large-capacity hard disk generally commercially available, and can store a large amount of content data. In addition, in order to decode the content data of the hard disk device 106 stored in the content storage device 10, a corresponding authorization key is required. If this authorization key is not stored in the key storage device 101 of the content storage device 10, it cannot be reproduced. The content capital paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -21-514776 B7 ___ V. Description of the invention (19). Therefore, the reproduction of content data can be permitted only to legitimate rights holders (those with corresponding authorized keys), and protection of content authors can be sought. (Please read the precautions on the back before filling in this page.) Furthermore, in this embodiment, the encrypted content data is decoded by the audio reproduction device 18 / video reproduction device 19 that reproduces the content. Further, in the case where the key storage device 101 of the content storage device 10 authenticates that the opponent of the authorized key transmission is the audio reproduction device 18 / video reproduction device 19, the encrypted key is transmitted to the audio reproduction device 18 / video reproduction using encrypted communication. Device 1 9. In this way, the possibility of the authorization key leaking to the outside can be reduced, and security can be improved. In addition, in this embodiment, the key storage device 10 of the content storage device 10 deletes the authorized key transmitted from the memory content of the key storage device 101 when the transfer key of the authorized key is the memory card 30. . That is, the key storage device 101 is provided with a copy prevention function of the authorized key. By doing so, it is possible to reduce the possibility that the authorization key is copied improperly. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. Also, the size of the general key data is significantly smaller than the size of the encrypted content data. Therefore, even if the memory portion of the key storage device 101 is constituted by the flash memory 103, a large number of authorized keys can be stored in the non-volatile memory 103. Therefore, it is possible to provide a placement-type content reproduction device suitable for enjoying reproduction of content data at home. INDUSTRIAL APPLICABILITY Furthermore, the present invention is not limited to the above-mentioned embodiments, and various modifications are possible without departing from the gist thereof. For example, in the above-mentioned embodiment, the Chinese National Standard (CNS) A4 specification (210 X 297 mm) is applied to the paper content as encrypted content data. -22- 514776 A7 B7 V. Description of the invention (20) (Please (Please read the precautions on the back before filling this page) The case of the hard disk device 106 stored in the content storage device 10 will be described as an example. However, the present invention is not limited to this. It can also be provided in the form of encrypted content data stored in a removable storage medium such as a CD. In this case, in this embodiment, instead of the hard disk device 106 of the content storage device 10, a reading device that reads encrypted content data from a storage medium having the aforementioned portability may be provided. Also, in the above-mentioned embodiment, although the authorization key is prepared for each encrypted content data, the present invention is not limited to this. For example, it is also possible to make a plurality of encrypted content data into one group, and each group is prepared to decode an authorization key for the encrypted content data belonging to the group. Brief Description of the Drawings Fig. 1 is a schematic configuration diagram showing a content reproduction device to which an embodiment of the present invention is applied. Fig. 2 is a diagram showing a schematic structure of the content storage device 10 shown in Fig. 1; Fig. 3 is a diagram showing a schematic structure of the audio reproduction device 18 shown in Fig. 1; FIG. 5 is a diagram showing a schematic configuration of the video playback device 19 shown in FIG. 1. FIG. 5 is a diagram showing an example of a content playback device to which the first embodiment of the present invention is applied. FIG. 6 is a diagram showing an example of a view of the content storage device 10 shown in FIG. This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -23- 514776 A7 B7_____ V. Description of the invention (21) Figure 7 illustrates the reproduction of a content reproduction device to which the first embodiment of the present invention is applicable Flowchart of action. (Please read the precautions on the back before filling this page) Figure 8 illustrates the data exchange between the key storage device 101 and the audio reproduction device 18 / video reproduction device 19 of the content storage device 10 and the flow shown in FIG. 7 An example is used in the sequence diagram. Fig. 9 is a flowchart for explaining an operation of obtaining an authorization key from the memory card 30 of the content reproduction device to which the first embodiment of the present invention is applied. Fig. 10 is a sequence diagram illustrating an example of data exchange between the key storage device 101 and the memory card 30 of the content storage device 10 in the flow shown in Fig. 9. FIG. 1 is a flow chart explaining the operation of moving the authorization key from the key storage device 101 of the content storage device 10 of the content reproduction device to which the first embodiment of the present invention is applied to the memory card 30 connected to the content reproduction device Illustration. Comparison table of the main components printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 10 Content storage device 12 Memory 15 Communication device 16 Input device 17 Display device 18 Audio reproduction device 19 Video reproduction device (210 X 297 mm) -24- 514776 A7 B7 V. Description of the invention (22) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 2 Card connection device 2 1 Interface 3 〇 Memory card 1 〇 Key storage device 1 〇3 Non-volatile memory 1 〇4 Memory 1 〇5 I / 〇 circuit 1 〇6 Hard disk device 1 〇7 I / 〇 circuit 1 8 1 Encryption decoding circuit 1 8 2 Decoder circuit 1 8 4 I / 〇 circuit 1 9 1 Encryption decoding circuit 1 9 2 Decoder circuit 1 9 4 I / 〇 circuit ------------ install -------- order --------- (Please read the precautions on the back before filling this page) This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) -25-

Claims (1)

514776 A8 B8 C8 D8 六、申請專利範圍 經濟部智慧財>ΐ^ρ'工消費合作社印製 1 · 一種內容再生裝置,其特徵爲: 包含:儲存被加密之內容資料之內容記憶手段;以及 儲存解碼被加密之內容資料或每一該資料之群組被準 備之內容資料用之鍵之鍵儲存手段;以及 資料再生手段;以及 一種記憶前述鍵之記憶體卡,係透過卡接續手段被接 續之記憶體卡; 前述鍵儲存裝置係利用加密通訊,讀出傳送應傳送於 前述資料再生手段之鍵, 前述資料再生手段一領取鍵,由前述內容記憶手段讀 出被加密之內容資料,使用鍵解碼讀出之內容資料。 2 ·如申請專利範圍第1項記載之內容再生裝置,其中 前述鍵儲存手段、前述資料再生手段、前述記憶體卡係接 受認證局之認證。 3 ·如申請專利範圍第2項記載之內容再生裝置,其中 前述鍵儲存手段係具有認證通訊對手之認證手段,在認證 爲正當之通訊對手之情形,進行鍵之傳送。 4 ·如申請專利範圍第3項記載之內容再生裝置,其中 前述認證手段在將資料再生裝置認證爲通訊對手之情形, 利用加密通訊,對該資料再生裝置傳送對應再生對象之被 加密之內容資料之鍵, 前述認證手段在將其它之記憶裝置認證爲通訊對手之 情形,利用加密通訊,讀出應傳送於其它之記憶裝置之鍵 ’傳送於其它之記憶裝置之同時,將傳送之鍵由記憶內容 請 先 閱 讀 背 ιέ 5 ί 事 項 裝 訂 線 本紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公釐) -26- 514776 A8 B8 C8 D8 六、申請專利範圍 消除。 -----------.裝 — Μ (請先閱讀背面之注意事項再lim本育) 5 .如申請專利範圍第2項記載之內容再生裝置,其中 前述記憶體卡具有認證通訊對手之認證手段,在認證爲正 當之通訊對手之情形,進行鍵之傳送。 6 ·如申請專利範圍第5項記載之內容再生裝置,其中 前述記憶體卡利用加密通訊,透過前述卡接續手段,讀出 傳送應傳送於前述鍵儲存手段之鍵,消除傳送之鍵。 7 ·如申請專利範圍第1項記載之內容再生裝置,其中 前述內容記憶手段與前述鍵儲存手段可以與其它部份切離 〇 8 .如申請專利範圍第1項記載之內容再生裝置,其中 前述鍵儲存手段可以與其它部份切離。 9 ·如申請專利範圍第1項記載之內容再生裝置,其中 進而具有與網路之通訊手段。 10 · —種內容儲存裝置,其特徵爲: 線 經濟部智慧財/4/^¾工消費合作社印製 包含:儲存被加密之內容資料之內容記憶手段;以及 儲存解碼被加密之內容資料或每一該資料之群組被準 備之內容資料用之鍵之鍵儲存手段; 在接收鍵傳送指示之情形,前述鍵儲存手段利用加密 通訊,讀出傳送應傳送於外部之鍵,在傳送對手爲其它之 記憶裝置之情形,傳送後消除鍵。 11 · 一種內容再生方法,其係包含鍵儲存手段、內容 記憶手段、資料再生手段之內容再生裝置之內容再生方法 ,其特徵爲包含: 本紙張尺度適用中國國家標率(CNS ) A4規格(210X297公釐) •27- 514776 A8 B8 C8 D8 六、申請專利範圍 因應使用者來之內容再生指示,鍵儲存手段認證資料 再生手段, 鍵儲存手段一認證資料再生手段,利用加密通訊,讀 出傳送應傳送於前述媒體再生手段之鍵, 前述資料再生手段一領取鍵,由前述內容記憶手段言賣 出被加密之內容資料,使用鍵解碼內容資料之步,驟° (請先閱讀背面之注意事項 -装· 訂 線 經濟部智慧財是¾¾工消費合作社印製 衣紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) -28 -514776 A8 B8 C8 D8 VI. Patent Application Scope Smart Assets of the Ministry of Economic Affairs > ΐ ^ ρ 'Printed by Industrial and Consumer Cooperatives1. A content reproduction device characterized by: including: a content memory means for storing encrypted content data; and Key storage means for storing keys for decoding encrypted content data or prepared content data for each group of the data; and data reproduction means; and a memory card storing the aforementioned keys, which are connected through card connection means The aforementioned key storage device uses encrypted communication to read and transmit the keys that should be transmitted to the aforementioned data reproduction means. The aforementioned data reproduction means receives a key, and the aforementioned content storage means reads the encrypted content data, using the key. Decode the read content data. 2. The content reproduction device described in item 1 of the scope of the patent application, wherein the key storage means, the data reproduction means, and the memory card are authenticated by a certification authority. 3. The content reproduction device described in item 2 of the scope of patent application, wherein the aforementioned key storage means has authentication means for authenticating the counterparty, and transmits the key when the authenticating counterparty is authenticated. 4. If the content reproduction device described in item 3 of the scope of patent application, wherein the aforementioned authentication means authenticates the data reproduction device as a counterparty, the encrypted content is transmitted to the data reproduction device with encrypted content data corresponding to the object to be reproduced. In the case where the aforementioned authentication means authenticates another memory device as a counterparty, encrypted communication is used to read out the keys that should be transmitted to other memory devices' while transmitting to other memory devices, and to transfer the transmitted keys from the memory. Please read the contents first. 5 Binding matters The paper size of this paper applies the Chinese National Standard (CNS) Α4 specification (210X297 mm) -26- 514776 A8 B8 C8 D8 6. The scope of patent application is eliminated. -----------. Installation — Μ (Please read the precautions on the back before limming this education) 5. If the content reproduction device described in item 2 of the patent application scope, the aforementioned memory card has certification The counterparty's authentication means transmits the key when it is authenticated as a legitimate counterparty. 6. The content reproduction device described in item 5 of the scope of patent application, wherein the memory card uses encrypted communication to read out and transmit the key to be transmitted to the key storage means through the card connection means, and eliminate the key for transmission. 7 · The content reproduction device described in item 1 of the scope of patent application, wherein the aforementioned content memory means and the aforementioned key storage means can be separated from other parts. 8 As the content reproduction device described in item 1 of the scope of patent application, where the aforementioned The key storage means can be cut off from other parts. 9 · The content reproduction device described in item 1 of the scope of patent application, which further has communication means with the Internet. 10 · — A content storage device, characterized by: printed by the Ministry of Online Economy, Smart Money / 4 / ^ ¾ Industrial and Consumer Cooperatives, including: a content memory means for storing encrypted content data; and storing and decoding encrypted content data or each A key storage means for the key of the prepared content data for the group of the data; In the case of receiving the key transmission instruction, the aforementioned key storage means uses encrypted communication to read out the key that should be transmitted to the outside, and for the transmission opponent to other In the case of a memory device, the key is erased after transmission. 11 · A content reproduction method, which is a content reproduction method of a content reproduction device including a key storage method, a content memory method, and a data reproduction method, which is characterized by: The paper size is applicable to China National Standard (CNS) A4 specification (210X297) (Mm) • 27- 514776 A8 B8 C8 D8 6. The scope of the patent application is based on the content reproduction instructions from the user, key storage means authentication data regeneration means, key storage means authentication data regeneration means, encrypted communication, and read transmission. The key transmitted to the aforementioned media reproduction means, the aforementioned data reproduction means receives a key, and the aforementioned content memory means sells the encrypted content data, and the steps of using the key to decode the content data are as follows: The smart money of the Ministry of Economics of Assembling and Threading is the standard for printing paper for garments produced by the Industrial and Consumer Cooperatives in accordance with the Chinese National Standard (CNS) A4 (210X297 mm) -28-
TW089126271A 2000-03-14 2000-12-08 Content memory device and content reading device TW514776B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2000070671A JP2001257670A (en) 2000-03-14 2000-03-14 Contents storage device and contents reader

Publications (1)

Publication Number Publication Date
TW514776B true TW514776B (en) 2002-12-21

Family

ID=18589373

Family Applications (1)

Application Number Title Priority Date Filing Date
TW089126271A TW514776B (en) 2000-03-14 2000-12-08 Content memory device and content reading device

Country Status (3)

Country Link
JP (1) JP2001257670A (en)
TW (1) TW514776B (en)
WO (1) WO2001069844A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100440179C (en) * 2003-08-14 2008-12-03 索尼株式会社 Information processing device, information recording medium, information processing method, and computer program

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3485911B2 (en) * 2001-12-17 2004-01-13 シャープ株式会社 Data usage restriction setting method, data usage restriction setting device, data usage restriction setting program, and recording medium recording the program
DE10310351A1 (en) 2003-03-10 2004-09-23 Giesecke & Devrient Gmbh Loading of media data into a portable data carrier, e.g. a smart card, whereby data is transferred via a secure data transfer channel formed between a secure content server and the data carrier via an operating unit, e.g. a PC
JP3931869B2 (en) * 2003-08-14 2007-06-20 ソニー株式会社 Information processing apparatus, information recording medium, information processing method, and computer program
JP4649865B2 (en) 2003-11-06 2011-03-16 ソニー株式会社 Information processing apparatus, information recording medium, information processing method, and computer program
JP4516972B2 (en) * 2004-01-06 2010-08-04 トムソン ライセンシング Method and device for safely porting information between devices
KR101254209B1 (en) 2004-03-22 2013-04-23 삼성전자주식회사 Apparatus and method for moving and copying right objects between device and portable storage device
KR20050096040A (en) * 2004-03-29 2005-10-05 삼성전자주식회사 Method for playbacking content using portable storage by digital rights management, and portable storage for the same
JP4784131B2 (en) * 2005-04-11 2011-10-05 ソニー株式会社 Information processing apparatus, information processing method, and computer program
JP2008077791A (en) * 2006-09-22 2008-04-03 Victor Co Of Japan Ltd Content recording/reproducing system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09307543A (en) * 1996-05-14 1997-11-28 Matsushita Electric Ind Co Ltd Book data reproduction method and device
JPH1040172A (en) * 1996-07-25 1998-02-13 Toshiba Corp Computer system and data transfer method
JPH11250571A (en) * 1998-03-04 1999-09-17 Matsushita Electric Ind Co Ltd Information distributing device, terminal device and information distributing system
JPH1125595A (en) * 1998-04-28 1999-01-29 Sony Corp Receiving device and dubbing device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100440179C (en) * 2003-08-14 2008-12-03 索尼株式会社 Information processing device, information recording medium, information processing method, and computer program

Also Published As

Publication number Publication date
JP2001257670A (en) 2001-09-21
WO2001069844A1 (en) 2001-09-20

Similar Documents

Publication Publication Date Title
TW515950B (en) Content regeneration device
JP5200204B2 (en) A federated digital rights management mechanism including a trusted system
US7570762B2 (en) Content delivery service providing apparatus and content delivery service terminal unit
US7296147B2 (en) Authentication system and key registration apparatus
TWI335166B (en) Secure storage digital kiosk distribution
TW479166B (en) Storage medium and contents protection method using the storage medium
CN100541508C (en) Equipment, messaging device, management method and information processing method
US20070276760A1 (en) Digital Copyright Management Using Secure Device
KR100828370B1 (en) Method and apparatus for providing DRM contents and license, and method and apparatus for using DRM contents
JP4477835B2 (en) Authentication system, key registration apparatus and method
US20040010467A1 (en) Content data storage
KR100867033B1 (en) Device and method for selectively supplying access to a service encrypted using a control word, and smart card
US20090268906A1 (en) Method and System for Authorized Decryption of Encrypted Data
KR20050123105A (en) Data protection management apparatus and data protection management method
JP2004362547A (en) Method for constituting home domain through device authentication using smart card, and smart card for constituting home domain
US20030009667A1 (en) Data terminal device that can easily obtain content data again, a program executed in such terminal device, and recording medium recorded with such program
JP2000122539A (en) Book protection system
TW514776B (en) Content memory device and content reading device
JP2004133654A (en) Storage device, terminal device, and server system
JP4765574B2 (en) Content distribution system, content receiving apparatus and program thereof
JP2006508563A (en) How to check the validity of a digital home network key
JP4201566B2 (en) Storage device and server device
JP3788572B2 (en) Rental content distribution system and method
KR20090003420A (en) A method and an apparatus for obtaining right objects of contents in a mobile terminal
JP2005276085A (en) Recording medium for preventing unauthorized copy, content reproducing device, method for preventing unauthorized copy, and program

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees