US20070204161A1 - Transmitter, receiver, and transmitting method - Google Patents

Transmitter, receiver, and transmitting method Download PDF

Info

Publication number
US20070204161A1
US20070204161A1 US11/710,467 US71046707A US2007204161A1 US 20070204161 A1 US20070204161 A1 US 20070204161A1 US 71046707 A US71046707 A US 71046707A US 2007204161 A1 US2007204161 A1 US 2007204161A1
Authority
US
United States
Prior art keywords
key
content
transmitter
receivers
transmitting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/710,467
Other languages
English (en)
Inventor
Hiroshi Isozaki
Hiroyuki Chaki
Kazunobu Konda
Takashi Kokubo
Hideki Ohkita
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Assigned to KABUSHIKI KAISHA TOSHIBA reassignment KABUSHIKI KAISHA TOSHIBA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KOKUBO, TAKASHI, KONDA, KAZUNOBU, OHKITA, HIDEKI, CHAKI, HIROYUKI, ISOZAKI, HIROSHI
Publication of US20070204161A1 publication Critical patent/US20070204161A1/en
Priority to US13/914,392 priority Critical patent/US9112835B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • H04N21/26609Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM] using retrofitting techniques, e.g. by re-encrypting the control words used for pre-encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4623Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/65Transmission of management data between client and server
    • H04N21/658Transmission by the client directed to the server
    • H04N21/6582Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed

Definitions

  • One embodiment of the invention relates to a transmitter, a receiver, and a transmitting method which transmits or receives a variety of contents requiring copyright protection.
  • digital household electric appliance With the spread of a computer network, such as a broadband and a wireless LAN, and with the progress of a digital technique, a product called digital information appliance (hereinafter referred to as digital household electric appliance) with a communication function has become widely used.
  • digital household electric appliance As a terrestrial digital broadcasting has started, in the future, more diffusion of television receivers, set top boxes, DVD recorders, etc., corresponding to a digital broadcasting are predicted.
  • Connecting a plurality of digital household electric appliances allows a user to enjoy content via a network and put the appliances to good use.
  • contents include a variety of items of digital data, for instance, motion image data and audio data such as MPEG-2 and MPEG-4, and document data such as text data and image data.
  • the content including the digital data of this type has an advantage in that it can be easily copied without any deterioration, it has to be paid attention in regard to copyright thereof.
  • the content the copyright of which should be protected is moved from a transmitter to a receiver.
  • the content requiring its copyright protection it is desirable for the content which has transmitted to the receiver to be moved without being remained in the transmitter, and without being copied in a plain text on a communication path to any device other than the receiver.
  • a means for preventing copying the content on the communication path includes a method of sharing a key between the transmitter and receiver, and encrypting the content with the key to transmit it (refer to DTCP-IP specifications “DTCP. Volume 1, Supplement E, Mapping DTCP to Ip (Information Version)” (http://www.dtcp.com).
  • contents are further efficient to be encrypted with the same key for a model in a multicast or broadcast to simultaneously distribute the identical contents from the transmitter to a plurality of receivers. Therefore, a situation in which the plurality of receivers share the same key occurs.
  • moving the contents with the keys distributed to the plurality of receivers allows the plurality of receivers to decode the contents to be moved, so that the moving of the contents is not performed normally.
  • FIG. 1 is an exemplary block diagram depicting a schematic configuration of a transmitter regarding a first embodiment
  • FIG. 2 is an exemplary block diagram depicting a state of sharing a key between the transmitter and a receiver according to the first embodiment
  • FIG. 3 is an exemplary block diagram depicting a schematic configuration of the receiver according to the first embodiment
  • FIG. 4 is an exemplary flowchart depicting a whole process procedure of a content transmitting and receiving system according to the first embodiment
  • FIG. 5A and FIG. 5B are, respectively, exemplary flowcharts depicting process procedures related to authentication and key exchanges of the content transmitting and receiving systems according to the first embodiment
  • FIG. 6A and FIG. 6B are, respectively, another exemplary flowcharts depicting the process procedures related to the authentication and key exchanges of the content transmitting and receiving systems according to the first embodiment
  • FIG. 7 is an exemplary view depicting an example of a transfer format when the transmitter transfers an encrypted content to the receiver
  • FIG. 8 is an exemplary view depicting an example of a flowchart of the transmitter according to the first embodiment
  • FIG. 9 is an exemplary view depicting an example of a flowchart of the receiver according to the first embodiment.
  • FIG. 10 is an exemplary block diagram depicting a schematic configuration of a transmitter regarding a second embodiment
  • FIG. 11 is an exemplary block diagram depicting a schematic configuration of a receiver according to the second embodiment
  • FIG. 12 is an exemplary flowchart depicting a whole process procedure of a content transmitting and receiving system according to the second embodiment
  • FIG. 13 is an exemplary view depicting an example of a flowchart of a transmitter according to the second embodiment.
  • FIG. 14 is an exemplary view depicting an example of a flowchart of a receiver according to the second embodiment.
  • a transmitting method for transmitting a content from a transmitter to at least one of receivers comprises transmitting a start request for an authentication and key exchange from the at least one of receivers to the transmitter, performing an authentication and key exchange for at least one of a first key common to the receivers and a second key peculiar to the at least one of the receivers, and encrypting the content by using a key shared by the transmitter and the at least one of the receivers to transmit the encrypted content to the at least one of the receivers.
  • the embodiment relates to a content transmitting and receiving system which moves a content from the content transmitter (hereinafter referred to as transmitter) to a content receiver (hereinafter referred to as receiver), or conducts rendering/copying the contents.
  • the moving makes the content void (erases) on a transmission side after transmitting the content, but the rendering/copying does not makes the content void.
  • the copying makes a plurality of identical contents in a system.
  • the rendering makes the receiver display the content stored in the transmitter, and plural identical contents do not exist in the system.
  • purporting to be only rendering includes both copying and rendering.
  • the transmitter having stored the content is called a source.
  • the receiver is called a sink.
  • the first embodiment is an example to request moving or rendering of a content from the receiver to the transmitter side, and a user being present at the receiver side, the receiver and the transmitter are also referred to as a client and a server, respectively.
  • the second embodiment is an example to request moving or rendering from the transmitter to the receiver side, and the user being present at the transmitter side, the transmitter and the receiver are also referred to as a client and a server, respectively.
  • FIG. 1 is a block diagram illustrating a schematic configuration of a transmitter 100 according to the first embodiment.
  • the transmitter 100 comprises a content supplying unit 12 , an authentication and key exchange processing unit 14 , a content list management unit 16 , a key selection processing unit 18 , an encryption processing unit 20 , a network interface processing unit 22 , a connection management unit 24 for content transmission, a connection management unit 26 for content management, and a connection management unit 28 for an authentication and key exchange.
  • the content supplying unit 12 stores contents and a list thereof.
  • the authentication and key exchange processing unit 14 performs an authentication and a key exchange between the transmitter 100 and a receiver.
  • the first embodiment as shown in FIG. 2 , allows existence of a plurality of receivers A, B and C (or D, and E) for one transmitter X (or Y). If authentication and key exchange have completed successfully with respect to the receivers, the authentication and key exchange processing unit 14 generates private keys encrypting contents to be transmitted to each receiver. In the first embodiment, using separate private keys encrypts the contents for the rendering and moving.
  • the private key used for encrypting a content for rendering is referred to as a common key Kx
  • the private key used for encrypting the content for moving is referred to as a move key Kmx.
  • the key shared between the transmitter and the receiver encrypts the common key Kx and the move key Kmx generated by the authentication and key exchange processing unit 14 to transmit them to the receivers.
  • the common key Kx and move key Kmx are put with a common key label and a move key label, respectively, to be stored in the authentication and key exchange processing unit 14 .
  • a plurality of keys (common key and move key) having been allowed to exist, the common key label and the move key label are identification information to distinguish each key.
  • the transmitters share an identical common key Kx for all receivers which have completed successfully the authentication and key exchange processes. That is, only one common key Kx exists for each transmitter. From the point of view of communication efficiency, it is preferable for a model of a multicast or a broadcast to simultaneously deliver the identical contents from the transmitter to the plurality of receivers to encrypt the contents with the identical key. Accordingly, the transmitter transmits the identical common key Kx for the plurality of receivers.
  • the transmitter shares the move key Kxm differing from the common key Kx with each receiver.
  • the transmitter may hold a plurality of move keys Kxms for each receiver if the transmitter moves the contents to a plurality of receivers.
  • the authentication and key exchange process includes a process to generate a common key when the transmitters and receivers mutually authenticate that they are devices which are correctly licensed from a license agency and can confirm that they are responsible devices.
  • a method of authentication for instance, a heretofore known method, such as, ISO/IEC 9798-3 and ISO/IEC 9798-2 has been presented.
  • the content list management unit 16 manages a list of contents stored in the supplying unit 12 , and presents a list of stored contents in response to a content retrieval request from the receiver.
  • the key selection processing unit 18 determines whether to encrypt the content with the common key Kx or with move key Kmx in response to the fact that the content request received form the receiver is a rendering request or a move request.
  • the selection processing unit 18 selects an appropriate key from among keys, stored in the authentication and key exchange processing unit 14 and shared with the receiver, to supply it to the encryption processing unit 20 .
  • the encryption processing unit 20 encrypts the content by using the key supplied from the selection processing unit 18 .
  • a commonly known method such as an AES, is presented as an encryption algorithm to encrypt and decrypt data.
  • the network interface processing unit 22 executes a physical layer process, a data link layer process, and a network layer/transport layer process to make communications with the receiver.
  • the physical layer and the link layer may assume various forms such as a wireless LAN compliant with IEEE 802.11, Ethernet (registered trade mark), and IEEE 1394.
  • the network layer may be IPv4 or IPv6 when Internet protocol (hereinafter referred to as IP merely) is put in use.
  • the connection management unit 24 for content transmission manages a connection for a content transmission.
  • the connection management unit 26 for content management presents a content list in response to a request from the receiver, and manages a connection to present a URL of the content.
  • a method for presenting the content list to the receiver utilizes, for instance, a protocol such as a universal plug and play (UPnP).
  • UPN universal plug and play
  • a means for displaying a location of a content for example, a URL is used.
  • connection management unit 28 for authentication and key exchange manages a connection for an authentication and key exchange.
  • FIG. 3 is a block diagram illustrating a schematic configuration of the receiver 102 in the first embodiment.
  • the receiver 102 has a content processing unit 32 , an authentication and key exchange unit 34 , a content selecting unit 36 , a key selection processing unit 38 , an encryption processing unit 40 , a network interface unit 42 , a connection management unit 44 for content transmission, a connection management unit 46 for content management; and a connection management unit 48 for authentication and key exchange.
  • connection management unit 44 for content transmission connection management unit 46 for content management and management unit 48 for authentication and key exchange each have the same function as those of the corresponding blocks in the transmitter, and may be configured by means of similar blocks, respectively.
  • the content processing unit 32 outputs the received content to a display device, etc., and stores the content in a not shown storage unit.
  • the authentication and key exchange processing unit 34 performs an authentication and key exchange process between the transmitter 100 and the receiver 102 . If the authentication and key exchange have completed successfully, the authentication and key exchange processing unit 34 receives the common key Kx and move key Kxm that are the private keys to be used for decrypting the content from the transmitter and labels to store them therein.
  • the content selecting unit 36 communicates with the transmitter 100 , retrieves the contents stored in the content supplying unit 12 of the transmitter 100 , and manages the list of the retrieval result and the locations of the respective contents on the network.
  • Means for acquiring the list of the contents stored in the transmitter 100 from the transmitter or the equipment on the network includes a means, such as a UPnP.
  • a means for specifying the locations of the contents on the network for instance, a means such as a URL is used.
  • the contents for moving and for rendering may be distinguished with URL, respectively.
  • the key selection processing unit 38 determines whether the content request from the content selecting unit 36 is the move request or the rendering request, and if it is the move request, the selection processing unit 18 transmits a content request to the transmitter with specifying a move key label. On the contrary, if it is the rendering request, it transmits the content request without labeling anything. That is, in acquiring the content from the transmitter, the selection processing unit 38 acquires the URL of the corresponding content from the content selecting unit 36 , transmits a GET request, for example, through an HTTP protocol to the corresponding URL, and acquires the content from the transmitter.
  • the encryption processing unit 40 decrypts the content through use of the common key or the move key.
  • FIG. 4 is a sequence view depicting a process procedure of a content transmitting and receiving system according to the first embodiment.
  • three communication connections A, B and C are disposed between the transmitter 100 and the receiver 102 .
  • the connection A is used for content management
  • the connection B is used for an authentication and key exchange
  • the connection C is used for a content transmission.
  • the receiver 102 firstly requests the content retrieval by using the connection A (# 2 ). Before this content retrieval, in retrieving an IP address of the transmitter 100 on the network, or specifying a transmission destination IP address or a port number of a message to conduct the content retrieval, a well known method such as the UPnP is utilized.
  • the transmitter 100 presents the list of the contents and the URLs thereof as the results of the content retrieval (# 4 ). At this moment, if the transmitter 100 distinguishes the content for moving and content for rendering by URL, the receiver 102 may come to know movable content.
  • a method defined in a UPnP content directory service may be available.
  • the IP address and TCP port number of the transmitter aimed to make the receiver and transmitter conduct the authentication and key exchange therebetween may be added as additional information of the URLs indicating the locations of the contents.
  • the transmitter 100 may list the address for rendering and the address for moving by distinguishing them from each other.
  • Means for distinguishing the address for moving and the address for rendering may include (a) a method for adding additional information indicating the fact of the address for moving to the address of the content, (b) a method for labeling a move key label to the address of the content.
  • the receiver 102 selects a desired content from the list of contents. Here, it is presumed that the receiver 102 selects the content for moving.
  • the receiver 102 obtains the address and port number of the transmitter 100 to conduct the authentication and key exchange process from the additional information of the location of the content to request a start of an authentication and key exchange process for moving to the transmitter 100 by using the connection B (# 6 ). If the authentication and key exchange process has completed successfully, the transmitter 100 generates the common key Kx and move key Kxm that are the private keys used for encrypting the contents between the transmitter and each of the receivers to transmit the keys KX and Kxm to the receivers together with the label information (# 8 ).
  • the authentication and key exchange processing unit 34 To assure security, it is preferable for the authentication and key exchange processing unit 34 to generate different values as the move key Kxm for each time, and transmit the generated move key Kxm only one time on the network regardless of whether the receivers are the same ones.
  • the authentication and key exchange processing unit 34 may transmit the identical move key Kxm, but it is important not to transfer the identical move key Kxm to different receivers. Thereby, the contents encrypted with the move key Kxm can be assured to be encrypted only by one of the receivers.
  • the transmitter X shown in FIG. 2 receives a move request of a content “a” from a receiver A and receives a rendering request of a content “b” from a receiver B
  • the transmitter X encrypts the content “a” by using a move key Kxm 1 transmitted to the receiver A to transmit the encrypted content “a” thereto
  • the transmissions in this manner sometimes makes the content “b” for rendering to be decrypted in the case in which the receivers A and C having the common key Kx 1 other than the receiver B receive the corresponding content by some kind or another means.
  • the receiver A with the move key Kxm 1 can decrypt the content “a” for moving, but the receivers B and C with no move key Kxm 1 cannot decrypt it although they can receive it. Therefore, it is prevented for the content “a” to be moved from being decrypted by two or more of the receivers.
  • the transmitter 100 being possible to simultaneously accept the rendering request and the move request for the different contents, it can improve both the security and the usability of the user. Even when the transmitter 100 receives the move requests of different contents from a plurality of receivers, since individual contents may only be encrypted with keys transmitted to each of the receivers 102 , a plurality of moving transmissions can be achieved simultaneously.
  • Move key labels each include label information corresponding to each move key Kxm, they are used for distinguishing each move key when the transmitter (for instance, transmitter X in FIG. 2 ) has a plurality of move keys (for instance, Kxm 1 , Kxm 2 and Kxm 3 ) determining that which transmitter should exchange the authentication and key for moving, which move key is held, and which move key should be used for decryption when the receiver 102 moves the contents from a plurality of transmitters 100 .
  • the transmitter 100 transmits the move key Kmx by encrypting with the common key Kx in the authentication and key exchange process, but the move key label itself not being a secret value, the move key may be transmitted as a plain text.
  • the following examples are thought as means for the receiver 102 to request the move key Kxm to the transmitter 100 .
  • the receiver 102 requests the authentication and key exchange for receiving the move key ( FIG. 5B ).
  • the receiver 102 After requesting the authentication and key exchange for receiving the common key and receiving the common key once, the receiver 102 transmits the move key request to the transmitter 100 and receives the move key encrypted with the same key as that encrypts the common key ( FIG. 6A ).
  • the transmitter 100 transmits both the common key and the move key on the basis of the authentication and key exchange request for receiving the common key ( FIG. 6B ).
  • the receiver 102 and the transmitter 100 may confirm mutual functions in advance, before the receiver 102 transmits the move key request in the case of FIG. 6A , and before the transmitter 100 transmits the common key and move key in the case of FIG. 6B .
  • the receiver 102 may inquire to the transmitter 100 .
  • the inquiry includes the move key label, and the transmitter 100 retrieves whether or not the move key label is stored in its own unit and may return the retrieved result to the receiver 102 .
  • the receiver 102 transmits the move request of the content to the transmitter 100 by using the connection C (# 10 ).
  • the move request includes the move key labels indicating which move key makes the contents encrypted to be receivable by the corresponding receiver.
  • An example of the move request (GET request) in the HTTP protocol is shown as follows. The fifth line shows the move key label.
  • the transmitter 100 checks the move key labels included in the move request, determines which move key has to be used for encrypting the content, and encrypts the content by using the move key matching to the move key label to transmit the encrypted content to the receiver 102 (# 12 ).
  • FIG. 7 depicts a format of the content to be transmitted.
  • the content is transmitted in a pack form including a header section 52 and an encrypted content section 54 .
  • the header section 52 includes a move key label 58 .
  • the header section 52 may include content copy control information 56 related to copy-inhibition, copy-permission only for one generation, moving, move/copy-permission, etc., information related to a length (content length) 60 of the content section before encryption, and so on.
  • the transmitter 100 does not transmit a content and returns an error.
  • the receiver 102 may adds the additional information, to be transmitted to the transmitter 100 , to the control request, wherein the additional information distinguishes whether the content request is the move request or the rendering request.
  • the additional information may be an argument of the URL, and a request header may be newly defined to be inserted as its parameter.
  • the transmitter 100 After completing the transmission of contents, the transmitter 100 deletes the moving-transmitted content or brings it into a state of being disabled for use (invalid).
  • the receiver 102 compares the move key label 58 included in the header section 52 of the content with the move key label stored in the authentication and key exchange processing unit 34 , and if their values coincide with each other, the receiver 102 starts content-decryption. If they do not coincide with each other, the receiver 102 suspends receiving the content. Differing the values of the move key labels from each another means that the value of the move key used for encrypting the content by the transmitter 100 differs from the value of the move key owned by the receiver 102 . In the case of moving, the transmitter 100 deleting the content or bringing the content into a use-impossible state (invalid), if the receiver 102 cannot decrypt the content correctly, the content is disappeared. To avoid this situation, the move key label 58 is inserted into the header section 52 of the content to determine whether or not the receiver 102 can decrypt the content correctly.
  • the transmitter 100 may transmit a content response to respond to the content request before transmitting the content, and may include the move key label in its content response.
  • the receiver 102 determines whether or not the move key label in the content response coincides with the move key label owned by its own unit. If the content request has been made in the GET request of the HTTP protocol, the move key label may be included in an HTTP response header.
  • the receiver 102 is capable of determining whether the content can be decrypted by means of the content response. If the content is one impossible to be received, the receiver 102 disconnects the connection before receiving the content and the transmitter 100 is possible to disconnect the connection before transmitting the content. Thus, an useless transmission may be avoided and disappearing the content can be prevented.
  • FIG. 8 is a flowchart depicting an operation procedure of the transmitter 100 .
  • the first embodiment is a model in which the receiver 102 selects which content in the transmitter 100 should be moved.
  • the transmitter 100 firstly receives the content retrieval request from the receiver 102 through the connection A (S 2 ), and transmits the content list as its response (S 4 ).
  • the transmitter 100 receives the authentication and key exchange request for moving through the connection B from the receiver 102 (S 6 ), conducts the authentication and key exchange process with respect to the receiver 102 .
  • the transmitter 100 determines whether or not the authentication and key exchange process has succeeded in S 8 . If the authentication and key exchange has failed, the transmitter 100 performs an error process (transmit a message notifying the fact to receiver 100 ) (S 10 ), and does not conduct any process after this.
  • the transmitter 100 encrypts the move key by using the key shared by the receiver 102 through the authentication and key exchange, and transmits the encrypted move key to the receiver 102 through the connection B with being labeled (S 12 ).
  • the transmitter 100 receives the move request (including move key label) to move the content from the receiver 102 though the connection C (S 14 ), and retrieves whether or not the move key specified by the move key label included in the move request is present in its own unit (S 16 ).
  • the transmitter 100 performs an error process (transmits message notifying the fact to receiver 102 ) (S 10 ) and doest not transmits the content.
  • the transmitter 100 encrypts the content by using the move key (S 20 ), and transmits the encrypted content through the connection C to the receiver 102 (S 22 ).
  • FIG. 9 is a flowchart illustrating an operation procedure of the receiver 102 .
  • the receiver 102 transmits a content retrieval request to the transmitter 100 through the connection A (S 32 ), and receives a content list (S 34 ) transmitted as its response from the transmitter (S 4 in FIG. 8 ).
  • the receiver 102 receives the encrypted move key and the move key label transmitted from the transmitter 100 (S 12 in FIG. 8 ) through the connection B (S 42 ).
  • the receiver 102 decrypts the received encrypted move key by using the key shared though the authentication and key exchange to store the decrypted move key together with the move key label.
  • the receiver 102 selects a moving target content from among the content list (S 44 ), and transmits the move request together with the move key label corresponding to the move key shared with the transmitter 100 thereto though the connection C (S 46 ).
  • the receiver 102 then receives the encrypted content as the response for the move request (S 48 ) transmitted from the transmitter 100 (S 22 in FIG. 8 ), and confirms whether or not the move key label included in the header section 52 of the content coincides with the move key label possessed by its own unit (S 50 ).
  • the receiver 102 disconnects a connection for receiving content (S 52 ), performs (S 40 ) an error process (transmits message notifying the fact to transmitter 100 ), and does not proceed the following processes.
  • the receiver 102 uses the move key possessed in its own unit to decrypt the encrypted content received from the transmitter 100 through the connection C (S 54 ).
  • the content transmitting/receiving system distinguishes the rendering key from the move key to distribute the identical rendering key to a plurality of receivers, but to distribute different move keys to the receivers, so that the system can surely prevent illegal use of a content, also perform moving and rendering at the same time, and achieve effective use of the content.
  • the transmitter distributes the identical key only one time, the system can improve security.
  • the system on moving the content, the system becomes possible to limit the number of the receivable receivers to one, and also the transmitter becomes possible to transmit other contents to other receivers during moving a certain content. Therefore, the system can achieve effective use of the content as well as it can surely prevent the illegal use of the content.
  • the system connects and uses separately the connections for content transmitting/receiving, content managing, and key transmitting/receiving. Therefore, the security in transmission to and from the transmitter and receiver is kept high.
  • the receiver determines whether or not it stores the move key necessary for decrypting the content before receiving the content to move, and if it does not store the move key, it stop receiving the content.
  • the transmitter deletes or disables the content after transmitting it. Therefore, the system can prevent the disappearance of content which has been moved erroneously.
  • the transmitter transmits the key and key label to specify the key to the receiver, and the transmitter encrypts the content by using the key when the receiver made a request for specifying the key by the key label. Therefore, the whole of the system can allow the existence of a plurality of keys, increase use aspects of the content, and results in achieving effective use of the content.
  • the first embodiment is a model in which the receiver transmits the request in order to move and transmit the content to the transmitter side.
  • a second embodiment is a model in which the transmitter requests so that the receiver receives the moved content.
  • FIG. 10 is a block diagram illustrating a schematic configuration of a transmitter 200 according to the second embodiment.
  • the transmitter 200 comprises the content supplying unit 12 , authentication and key exchange processing unit 14 , a content selecting unit 66 , the key selection processing unit 18 , encryption processing unit 20 , network interface processing unit 22 , connection management unit 24 for content transmission, connection management unit 26 for content management, and connection management unit 28 for authentication and key exchange.
  • the content supplying unit 12 , authentication and key exchange processing unit 14 , encryption processing unit 20 , network interface processing unit 22 , connection management unit 24 , connection management unit 26 , and connection management unit 28 have the same functions and configurations as those of FIG. 1 .
  • the content selecting unit 66 has a function to specify the content to move, and a function to transmit a message to instruct a receiver so as to prepare for receiving a content.
  • FIG. 11 is a block diagram illustrating a schematic configuration of a receiver 202 according to the second embodiment.
  • the receiver 202 includes the content processing unit 32 , authentication and key exchange processing unit 34 , a content storing management unit 68 , the key selection processing unit 38 , encryption processing unit 40 , network interface unit 42 , connection management unit 44 for content transmission, connection management unit 46 for content management, and connection management unit 48 for authentication and key exchange.
  • the content processing unit 32 , authentication and key exchange processing unit 34 , encryption processing unit 40 , network interface processing unit 42 , connection management unit 44 , connection management unit 46 , and connection management unit 48 have the similar functions and configurations to those of FIG. 3 .
  • the content storing management unit 68 has a function to receive a message instructing so as to prepare for receiving a content from the transmitter 200 , and a function to transmit a URL for storing the content as its response to the transmitter 200 .
  • FIG. 12 is a flowchart illustrating a process (here, moving process) procedure of a content transmitting/receiving system according to the second embodiment.
  • three communication connections A, B and C are disposed between the transmitter 200 and the receiver 202 , the connection A is used for content management, the connection B is used for an authentication and key exchange, and the connection C is used for a content transmission.
  • the transmitter 200 transmits a message (content receiving request) to instruct the receiver 202 so as to receive a content though the connection A (# 22 ).
  • the message may include information indicating that the data to be transmitted is an encrypted content, and information indicating the type of a content before encryption, such as, an IP address, TCP port number, and MIME-Type of the transmitter so that the receiver 202 and the transmitter 200 conducts the authentication and key exchange therebetween.
  • a means for retrieving receivers from a network and a well known method, such as, UPnP for deciding the IP address and port number to transmit the message are used.
  • the receiver 202 After completing the authentication and key exchange, the receiver 202 returns a content reception acknowledgement message showing the completion of preparing to receive the content to the transmitter 200 through the connection B (# 28 ). At this moment, the receiver 202 includes in the content reception acknowledgement message address information showing which of the addresses the transmitter 200 should return the content to, and the move key label received by the receiver 202 from transmitter 200 as a result of the authentication and key exchange process.
  • the address information may indicate, for example, in a URL form.
  • the transmitter 200 starts a transmission of a content to an address specified with a content reception acknowledgement message (# 30 , # 32 ).
  • the transmitter 200 brings the transmitted content into a sate of deleting it or a state of disabling it.
  • the transmitter 200 uses the move key corresponding to the move key label included in the acknowledgement message.
  • the transmitter 200 transmits an error message to the receiver 202 .
  • the format shown in FIG. 7 is available. That is, the transmitter 200 sets the move key label 58 in the header section 52 of the content, and encrypts it with the move key corresponding to the move key label 58 .
  • the transmitter 200 uses a POST request of the HTTP protocol. At this moment, the transmitter 200 may set the move key label in the POST request to transmit it as HTTP header information.
  • the receiver 202 compares whether the value of the move key label defined by the header section 52 of the content or by the HTTP header in the POST request coincides with the value of the move key label transmitted from the transmitter 200 and stored in its own unit as an authentication and key exchange process result. In the case of coincidence, the receiver 202 decrypts the content with the move key corresponding to the move key label. In the case of non-coincidence, the receiver 202 suspends receiving the content to disconnect the connection C for content transmitting/receiving.
  • the case of difference in the value of the move key label includes the case in which the value of the move key which has used for encrypting the content by the transmitter 200 differs from the value of the move key possessed by the receiver 202 .
  • the receiver 202 may avoid the disappearance of the content carelessly by confirming that both keys coincide with each other in the use of the move key labels.
  • the transmitter 200 performs the process to select the content to be moved. It is desirable, from a view point of a user interface, for a selection right of the content to be moved to belong to a side storing the content, namely, to a transmitter side.
  • a receiver starts an authentication and key exchange, and a transmitter cannot start the exchange.
  • starting the authentication and key exchange process depending on the content receiving request as a trigger by a receiver side solves the problem. Further, preventing the content impossible to be decrypted from being moved in the use of the move key label enables preventing the careless disappearance of the content.
  • FIG. 13 is a flowchart depicting an operation procedure of the transmitter 200 .
  • the transmitter 200 selects a content to be moved (S 52 ).
  • the transmitter 200 transmits the content receiving request through the connection A (S 54 ).
  • the transmitter 200 receives the authentication and key exchange request transmitted from the receiver 202 (S 56 ) to conduct the authentication and key exchange process with regard to the receiver 202 .
  • the transmitter 200 can transmit the move request and encrypted content just after receiving the content reception acknowledgement, and start transmitting the content without needing a waiting time (authentication and key exchange).
  • the transmitter 200 determines whether or not the authentication and key exchange process has succeeded in S 58 . If the authentication and key exchange process has completed unsuccessfully, the transmitter 200 conducts an error process (transmits a message notifying the fact to the receiver 202 ) (S 60 ) then does not perform any following process.
  • the transmitter 200 generates the move key which has been encrypted by using the key shared in the authentication and key exchange, labels the move key label on the encrypted move key, and transmits the encrypted and labeled move key to the receiver 202 through the connection B (S 62 ).
  • the transmitter 200 receives the content reception acknowledgement as a response message corresponding to the content receiving request from the receiver 202 (S 64 ).
  • the response message includes address information of a destination (of connection C) to transmit the content and the move key label possessed by the receiver 202 .
  • the transmitter 200 retrieves whether or not the move key, specified with the move key label included in its response message, is present in its own unit (S 66 ).
  • the transmitter 200 transmits the message notifying the fact to the receiver 202 , conducts an error process (transmit a message notifying the fact to the receiver 202 ) (S 60 ), and does not transmit the content. Otherwise stated, the transmitter 200 encrypts the content with its move key (S 70 ) to transmit the encrypted content to the receiver 202 (S 72 ).
  • FIG. 14 is a flowchart depicting an operation procedure in the receiver 202 .
  • the receiver 202 receives the content receiving request, transmitted from the transmitter 200 (S 54 in FIG. 13 ), through the connection A (S 82 ).
  • the receiver 202 determines whether or not it has already shared the move key with the transmitter 200 (S 84 ).
  • the receiver 202 If the receiver 202 has already shared the move key with the transmitter 200 , the receiver 202 transmits the content reception acknowledgement as the response message for the content receiving request (S 94 ). If the receiver 202 has not shared the move key with the transmitter 200 , the receiver 202 transmits the authentication and key exchange request through the connection B (S 86 ) to start the authentication and key exchange process.
  • the receiver 202 determines whether or not the authentication and key exchange process has succeeded (S 88 ). If the authentication and key exchange process has not succeeded, the receiver 202 performs the error process (transmit a message notifying the fact to the transmitter 200 ) (S 90 ) then does not perform subsequent processes.
  • the receiver 202 receives the encrypted move key and the move key label, transmitted from the transmitter 200 (S 62 in FIG. 13 ), through the connection B (S 92 ).
  • the receiver 202 decrypts the encrypted move key by using the common key shared in the authentication and key exchange to store the move key together with the move key label in the authentication and key exchange processing unit 34 .
  • the receiver 202 then transmits the content reception acknowledgement as the response message for the content receiving request (S 94 ).
  • the receiver 202 receives the move request, for the address indicated in the content reception acknowledgement, from the transmitter 200 (S 96 ).
  • the move request includes the move key label.
  • the receiver 202 confirms whether or not this move key label, or the move key label including in the header section 52 of the content followed by the content move request and received coincides with the move key label possessed by its own unit (S 100 ).
  • the receiver 202 disconnects the connection C for content receiving to suspend receiving the content (S 104 ), conducts the error process (S 90 ), and does not progress to the sequence processes. Otherwise stated, the receiver 202 decrypts the content through the use of the move key (S 102 ).
  • the second embodiment produces satisfactory results that it may grant the selection right of the content to the transmitter storing the content and make the transmitter be a client.
  • the transmitter After transmitting the content receiving request, starting the authentication and key exchange and receiving the content reception acknowledgement after completing the authentication and key exchange without having to wait the acknowledgement of the transmission of the content receiving request enables the transmitter to transmit the move request and encrypted content immediately after the reception of the content reception acknowledgement and start the transmission of the content without any waiting time (authentication and key exchange).
  • the transmitter and receiver given in the first and second embodiments may be configured by hardware, or software.
  • a program achieving at least a part of functions of an information processing unit may be stored in a recording medium, such as a floppy disk and a CD-ROM, and read in a computer to run it.
  • the recording medium is not limited to a portable one, such as a magnetic disk and an optical disk, and it may be a fixed-type recording medium, such as a hard disk drive and a memory.
  • Program achieving at least a part of functions of the transmitter and receiver may be distributed via a communication line (also including wireless communication), such as the Internet.
  • the program may be distributed via a cable line or radio line, such as the Internet, or distributed by storing it in a recording medium.
  • a cable line or radio line such as the Internet
  • the foregoing operation concerned with the moving may be read as the meaning of the operation for the rendering.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Graphics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Mobile Radio Communication Systems (AREA)
US11/710,467 2006-02-27 2007-02-26 Transmitter, receiver, and transmitting method Abandoned US20070204161A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/914,392 US9112835B2 (en) 2006-02-27 2013-06-10 Transmitter, receiver, and transmitting method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2006051200A JP4350714B2 (ja) 2006-02-27 2006-02-27 送信装置、受信装置及び送信方法
JP2006-051200 2006-02-27

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/914,392 Continuation US9112835B2 (en) 2006-02-27 2013-06-10 Transmitter, receiver, and transmitting method

Publications (1)

Publication Number Publication Date
US20070204161A1 true US20070204161A1 (en) 2007-08-30

Family

ID=38445420

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/710,467 Abandoned US20070204161A1 (en) 2006-02-27 2007-02-26 Transmitter, receiver, and transmitting method
US13/914,392 Active 2027-11-02 US9112835B2 (en) 2006-02-27 2013-06-10 Transmitter, receiver, and transmitting method

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/914,392 Active 2027-11-02 US9112835B2 (en) 2006-02-27 2013-06-10 Transmitter, receiver, and transmitting method

Country Status (4)

Country Link
US (2) US20070204161A1 (ja)
JP (1) JP4350714B2 (ja)
KR (1) KR100880704B1 (ja)
CN (1) CN101031066B (ja)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090144549A1 (en) * 2007-11-30 2009-06-04 Kazuhiro Matsuyama Copyright protection processing apparatus and copyright protection processing method
US20090177885A1 (en) * 2008-01-07 2009-07-09 Akihiro Kubota Method and apparatus for encrypted authentication
US20100125916A1 (en) * 2008-11-18 2010-05-20 Samsung Electronics Co., Ltd. Apparatus and method for controlling content
WO2012053005A1 (en) * 2010-10-19 2012-04-26 Sling Media Pvt. Ltd. Authenticated broadcast transmission utilizing a content retransmitter
US20130298257A1 (en) * 2010-07-27 2013-11-07 Fasoo.Com Co., Ltd Device for right managing web data, recording medium for performing method for right managing web data on computer, and device and method for providing right management information
US9203813B2 (en) 2013-03-15 2015-12-01 Panasonic Intellectual Property Management Co., Ltd. Content distribution method, content distribution system, source device, and sink device
US11172359B2 (en) * 2017-08-09 2021-11-09 Lenovo (Singapore) Pte. Ltd. Method and apparatus for attach procedure with security key exchange for restricted services for unauthenticated user equipment

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5297783B2 (ja) * 2008-12-15 2013-09-25 Takusu株式会社 緊急地震通報システム
JP2010258795A (ja) * 2009-04-24 2010-11-11 Toshiba Corp 送信装置、受信装置及びコンテンツ送受信方法
US11030618B1 (en) 2016-09-30 2021-06-08 Winkk, Inc. Authentication and personal data sharing for partner services using out-of-band optical mark recognition
WO2020018454A1 (en) 2018-07-16 2020-01-23 Islamov Rustam Cryptography operations for secure post-quantum communications
US11657140B2 (en) 2019-12-10 2023-05-23 Winkk, Inc. Device handoff identification proofing using behavioral analytics
US11574045B2 (en) 2019-12-10 2023-02-07 Winkk, Inc. Automated ID proofing using a random multitude of real-time behavioral biometric samplings
US11588794B2 (en) * 2019-12-10 2023-02-21 Winkk, Inc. Method and apparatus for secure application framework and platform
US11936787B2 (en) 2019-12-10 2024-03-19 Winkk, Inc. User identification proofing using a combination of user responses to system turing tests using biometric methods
US11328042B2 (en) 2019-12-10 2022-05-10 Winkk, Inc. Automated transparent login without saved credentials or passwords
US11652815B2 (en) 2019-12-10 2023-05-16 Winkk, Inc. Security platform architecture
US11928193B2 (en) 2019-12-10 2024-03-12 Winkk, Inc. Multi-factor authentication using behavior and machine learning
US11553337B2 (en) 2019-12-10 2023-01-10 Winkk, Inc. Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel
US11843943B2 (en) * 2021-06-04 2023-12-12 Winkk, Inc. Dynamic key exchange for moving target
US11824999B2 (en) 2021-08-13 2023-11-21 Winkk, Inc. Chosen-plaintext secure cryptosystem and authentication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020114462A1 (en) * 2001-02-16 2002-08-22 Hitachi, Ltd. Recording and playback apparatus for stream data and transmission method for stream data
US20040078066A1 (en) * 2002-08-28 2004-04-22 Yuusaku Ohta Key delivery apparatus, terminal apparatus, recording medium, and key delivery system
US6940977B1 (en) * 1998-09-30 2005-09-06 Nec Corporation Digital video and audio data encryption, decryption and system authentication
US20060271786A1 (en) * 2005-05-31 2006-11-30 Kabushiki Kaisha Toshiba Data transmission apparatus, data reception apparatus, data transmission method, and data reception method
US20070071234A1 (en) * 2005-01-06 2007-03-29 Canon Europa Nv Methods for the storage and reading of a content, of the type implementing a content protection protocol, corresponding source, storage and sink devices

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6052466A (en) 1997-08-28 2000-04-18 Telefonaktiebolaget L M Ericsson (Publ) Encryption of data packets using a sequence of private keys generated from a public key exchange
DE69834396T2 (de) * 1998-09-01 2007-02-22 Irdeto Access B.V. Sicheres Datensignalübertragungssystem
JP3749817B2 (ja) 2000-03-30 2006-03-01 株式会社東芝 送信装置およびその送信方法
KR20030061512A (ko) * 2002-01-14 2003-07-22 (주)디가디언 데이터 보안 시스템 및 방법
WO2004023341A1 (ja) * 2002-09-03 2004-03-18 Fujitsu Limited 検索処理システム、その検索サーバ、クライアント、検索処理方法、プログラム、及び記録媒体
JP3821775B2 (ja) 2002-11-29 2006-09-13 株式会社東芝 コンテンツ送受信システム、コンテンツ送信装置及びコンテンツ受信装置
JP4268969B2 (ja) 2003-01-20 2009-05-27 エスケーテレコム株式会社 無線通信網を介したメディアメッセージアップロード制御方法
JP4458764B2 (ja) 2003-04-04 2010-04-28 株式会社日立製作所 データ伝送装置、データ伝送装置の識別情報管理装置、データ伝送装置の管理システム、及びデータ伝送装置の管理方法
JP4385099B2 (ja) 2003-12-03 2009-12-16 株式会社日立製作所 放送受信装置及びストリーム出力装置
JP4636791B2 (ja) 2003-12-09 2011-02-23 シャープ株式会社 暗号化データを送受信するデータ送信装置とデータ受信装置
WO2005057865A1 (ja) * 2003-12-11 2005-06-23 Matsushita Electric Industrial Co., Ltd. パケット送信装置
CN1627682A (zh) * 2003-12-12 2005-06-15 华为技术有限公司 网络传输中建立连接时动态密码的创建方法
KR100547829B1 (ko) * 2003-12-18 2006-01-31 삼성전자주식회사 암호화 키 교환을 통해 데이터를 안정적으로 전송할 수있는 기가비트 이더넷 기반의 수동 광가입자망 및 이를이용한 데이터 암호화 방법
CN100583732C (zh) * 2004-05-18 2010-01-20 株式会社东芝 信息处理设备,信息处理方法和信息处理程序
KR20070003292A (ko) * 2005-07-01 2007-01-05 주식회사 아이킨 타원곡선 알고리즘을 이용한 원격제어 방법
JP2007049468A (ja) 2005-08-10 2007-02-22 Nec Electronics Corp データ送信装置及びデータ送信方法
EP1926039A4 (en) 2005-09-15 2010-01-20 Panasonic Corp CONTENT MANAGEMENT SYSTEM AND CONTENT MANAGEMENT DEVICE

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6940977B1 (en) * 1998-09-30 2005-09-06 Nec Corporation Digital video and audio data encryption, decryption and system authentication
US20020114462A1 (en) * 2001-02-16 2002-08-22 Hitachi, Ltd. Recording and playback apparatus for stream data and transmission method for stream data
US20040078066A1 (en) * 2002-08-28 2004-04-22 Yuusaku Ohta Key delivery apparatus, terminal apparatus, recording medium, and key delivery system
US20070071234A1 (en) * 2005-01-06 2007-03-29 Canon Europa Nv Methods for the storage and reading of a content, of the type implementing a content protection protocol, corresponding source, storage and sink devices
US20060271786A1 (en) * 2005-05-31 2006-11-30 Kabushiki Kaisha Toshiba Data transmission apparatus, data reception apparatus, data transmission method, and data reception method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090144549A1 (en) * 2007-11-30 2009-06-04 Kazuhiro Matsuyama Copyright protection processing apparatus and copyright protection processing method
US20090177885A1 (en) * 2008-01-07 2009-07-09 Akihiro Kubota Method and apparatus for encrypted authentication
US8200973B2 (en) * 2008-01-07 2012-06-12 Alpine Electronics Inc. Method and apparatus for encrypted authentication
US20100125916A1 (en) * 2008-11-18 2010-05-20 Samsung Electronics Co., Ltd. Apparatus and method for controlling content
US20130298257A1 (en) * 2010-07-27 2013-11-07 Fasoo.Com Co., Ltd Device for right managing web data, recording medium for performing method for right managing web data on computer, and device and method for providing right management information
US9027152B2 (en) * 2010-07-27 2015-05-05 Fasoo.Com Co., Ltd Device for right managing web data, recording medium for performing method for right managing web data on computer, and device and method for providing right management information
WO2012053005A1 (en) * 2010-10-19 2012-04-26 Sling Media Pvt. Ltd. Authenticated broadcast transmission utilizing a content retransmitter
US8635657B2 (en) 2010-10-19 2014-01-21 Sling Media Pvt Ltd Authenticated broadcast transmission utilizing a content retransmitter
US9203813B2 (en) 2013-03-15 2015-12-01 Panasonic Intellectual Property Management Co., Ltd. Content distribution method, content distribution system, source device, and sink device
US9509668B2 (en) 2013-03-15 2016-11-29 Panasonic Intellectual Property Management Co., Ltd. Content distribution method, content distribution system, source device, and sink device
US11172359B2 (en) * 2017-08-09 2021-11-09 Lenovo (Singapore) Pte. Ltd. Method and apparatus for attach procedure with security key exchange for restricted services for unauthenticated user equipment

Also Published As

Publication number Publication date
JP2007235246A (ja) 2007-09-13
KR20070089067A (ko) 2007-08-30
KR100880704B1 (ko) 2009-02-02
US20130275759A1 (en) 2013-10-17
CN101031066B (zh) 2012-07-11
JP4350714B2 (ja) 2009-10-21
US9112835B2 (en) 2015-08-18
CN101031066A (zh) 2007-09-05

Similar Documents

Publication Publication Date Title
US9112835B2 (en) Transmitter, receiver, and transmitting method
US8074290B2 (en) System, apparatus, method and computer program for transferring content
CN101174946B (zh) 内容发送装置、内容接收装置和内容加密方法
JP4853930B2 (ja) プログラム・コンテンツを安全に通信するための技術
CN100566341C (zh) 信息处理设备及信息处理方法
US20060085644A1 (en) Information processing apparatus and information processing method
KR20070070157A (ko) 트러스트 도메인에서 프로그램밍 재료저장과 안전통신을위한 기술
US8306226B2 (en) Transmitting apparatus, receiving apparatus, and content transmitting method
US8892902B2 (en) Information processing apparatus and information processing method
JP2008054348A (ja) 情報処理装置
KR100927920B1 (ko) 제1 도메인의 암호화 데이터를 제2 도메인에 속하는네트워크에서 수신하여 처리하기 위한 방법
KR101346623B1 (ko) 브로드캐스트암호화를 이용한 컨텐츠 서비스 제공 방법 및기기간 인증 방법 그리고 재생기기 및 저자원 디바이스
JP4883199B2 (ja) コンテンツ伝送システム、コンテンツ伝送装置及びコンテンツ伝送方法、並びにコンピュータ・プログラム
JP2010258795A (ja) 送信装置、受信装置及びコンテンツ送受信方法
US20050278524A1 (en) Local digital network, methods for installing new devices and data broadcast and reception methods in such a network
JP2009134617A (ja) 著作権保護処理装置および著作権保護処理方法
JP4843686B2 (ja) 送信装置、受信装置及び送信方法
JP4736603B2 (ja) 情報通信装置及び情報通信方法、並びにコンピュータ・プログラム
JP2001251290A (ja) データ放送システムとコンテンツの配信、蓄積、再生方法

Legal Events

Date Code Title Description
AS Assignment

Owner name: KABUSHIKI KAISHA TOSHIBA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ISOZAKI, HIROSHI;CHAKI, HIROYUKI;KONDA, KAZUNOBU;AND OTHERS;REEL/FRAME:019220/0115;SIGNING DATES FROM 20070215 TO 20070228

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION