WO1997025711A1 - Procede et appareil de doublage de commande - Google Patents
Procede et appareil de doublage de commande Download PDFInfo
- Publication number
- WO1997025711A1 WO1997025711A1 PCT/JP1996/003608 JP9603608W WO9725711A1 WO 1997025711 A1 WO1997025711 A1 WO 1997025711A1 JP 9603608 W JP9603608 W JP 9603608W WO 9725711 A1 WO9725711 A1 WO 9725711A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- key
- drive
- reproducing
- key information
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00536—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein encrypted content data is subjected to a further, iterated encryption, e.g. interwoven encryption
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00557—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein further management data is encrypted, e.g. sector headers, TOC or the lead-in or lead-out areas
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00681—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access
- G11B20/00688—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access said measures preventing that a usable copy of recorded data can be made on another medium
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
- G11B20/00768—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91321—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy protection control signal, e.g. a record inhibit signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91328—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy management signal, e.g. a copy generation management signal [CGMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
Definitions
- the present invention relates to a copy control method and a copy control apparatus applied to an information processing system having a function of reproducing provided information for reproducing and outputting information (referred to as provided information) such as movie music compressed by MPEG 2 or the like. .
- the present invention relates to the reproduction and use of copy information when recording and reproducing information recorded on a large-capacity recording medium such as a CD-R0M or a DVD (Digital Video Disc) as the copy information.
- the present invention relates to a duplication control method and a duplication control device that can be controlled by specific control information recorded in a copy control device.
- the present invention is directed to a communication system having a function of receiving provided information such as a movie and music via communication means and reproducing and outputting the provided information.
- the present invention relates to a copy control method and a copy control device.
- the information provided with high added value as described above In a system that reproduces and outputs data by a single process, it is not copy protection technology that is released by the computer process, but has high reliability that can reliably prevent unauthorized duplication. It is indispensable to establish a new copy protection technology.
- illegal copy prevention information is also recorded on a recording medium, such as a CD-R0M, on which the provided information is recorded, and this illegal copy prevention information is combined with the provided information.
- the information is transmitted to an unauthorized duplication prevention device, and the provided information is subjected to duplication prevention to prevent illegal duplication.
- the present invention has been made in view of the above circumstances, and has a high capacity recording medium. It is an object of the present invention to provide a highly reliable copy control method and a copy control device which can surely prevent unauthorized duplication even in a system in which a computer intervenes in the transfer of information provided by the system. I do.
- the computer device performs encryption and decryption processing.
- a copy control method and a copy control device capable of arbitrarily controlling the use of copy for each provided information on the medium side without showing the key information to be used, and providing a highly reliable and always valid use of the provided information by valid copying. The purpose is to provide.
- the present invention relates to a system in which a device such as a computer capable of performing a copy process intervenes in the transfer of information provided by a large-capacity recording medium, a communication medium, or the like. Since the information read from the medium is encrypted with a specific key, it is possible to arbitrarily control whether or not the copy information can be reproduced.
- the present invention relates to a system such as a computer capable of performing a duplication process in a system in which a device capable of a duplication process such as a computer intervenes in the transfer of information provided by a large-capacity recording medium or a communication medium.
- a device capable of a duplication process such as a computer intervenes in the transfer of information provided by a large-capacity recording medium or a communication medium.
- the present invention provides a copy control method and a copy control device capable of utilizing the information provided by the system.
- a large capacity The process of temporarily recording information provided by a recording medium, a communication medium, and the like in a storage device, and reading and reproducing the information is called “reproduction of duplicate information”.
- the present invention provides a drive for reading information recorded on a large-capacity recording medium, an information reproducing device for receiving and reproducing and outputting information read from the drive via information transmitting means, and transmitting the information to an information transmitting means.
- the information passed from the drive to the information transmitting means is encrypted using the key information generated by the information reproducing apparatus. Only the information reproducing apparatus having the key information used for the encryption processing can reproduce the duplicated information (that is, one generation copy is permitted).
- each of the drive and the information reproducing apparatus individually generates key information related to each other based on random information, and the drive uses the key information generated by itself to transmit information.
- the information reproducing device decrypts the information received from the information transmitting means by using the self-generated secondary key information, so that the key information used for the encryption process and the decryption process can be used as information. It is characterized in that the reproduction of only the information reproducing device having the relevant key information is permitted and the reproduction of the duplicated information is disabled without passing to the transmission means.
- the duplication permission level is recognized, and the reproduction level of the duplication information is permitted.
- information read from the drive is not If the information is passed to the information transmission means and the level of reproduction of the duplicated information is permitted only by the specific information reproducing device, the information read from the drive is transmitted from the drive using the key information generated by the reproducing information reproducing device. After the read information is encrypted, it is passed to the information transmission means, and when the level is at a level that prohibits the reproduction of the duplicated information, the drive and the information reproducing apparatus use the random information to exchange the related key information. Only the information reproducing device that has been temporarily generated and has the relevant key information can reproduce the information read from the drive, and the reproduction information of all the information reproducing devices including the information reproducing device having the relevant key information can be reproduced. The feature is that playback is disabled.
- the present invention provides an information providing apparatus for providing information via communication means, an information reproducing apparatus for receiving and reproducing information from the information providing apparatus via communication means, and an information reproducing apparatus for supplying information to the information reproducing apparatus via communication means.
- Information providing device receives key information from the information reproducing device, and provides the information reproducing device with the key information based on the key information. In this case, only the information reproducing apparatus having the key information used in the encryption processing can reproduce the duplicated information.
- each of the information providing device and the information reproducing device individually generates key information related to each other based on the random information, and the information providing device generates the encryption key by itself.
- the information provided to the information reproducing apparatus is encrypted using the information, and the information received from the information providing apparatus is decrypted by using the decryption key information generated by the information reproducing apparatus, so that the communication means can be improved.
- the reproduction of the information received via the network is enabled, and the reproduction of the duplicated information is disabled.
- the information providing device sends copy permission information designating a permission level of the copy information to the information reproducing device, and the information reproducing device uses the copy permission information received from the information providing device. Recognizing the permission level of duplication of the provided information, and if the permission level allows reproduction of the duplicated information, the provided information is passed to the information reproducing apparatus via the communication means without encryption. If the reproduction of the duplicated information is at a permission level that can be performed only by the specific information reproducing apparatus, the key information is received from the information reproducing apparatus, and the provided information encrypted based on the key information is transmitted through the communication means.
- the information providing device and the information reproducing device When the permission level is passed to the information reproducing device and the reproduction of the duplicated information is prohibited, the information providing device and the information reproducing device temporarily generate key information related to each other using random information. It is characterized in that the provided information encrypted based on the key information is transferred to the information reproducing apparatus via the communication means.
- FIG. 1 is a block diagram showing a basic system configuration according to a first embodiment of the present invention.
- FIG. 2 is a block diagram showing a system configuration according to a second embodiment of the present invention.
- FIG. 3 is a flowchart showing a processing procedure in a second embodiment of the present invention.
- FIG. 4 is a flowchart showing a processing procedure in the second embodiment of the present invention.
- FIG. 5 is a flowchart showing a processing procedure in a second embodiment of the present invention.
- FIG. 6 is a flowchart showing a processing procedure in a second embodiment of the present invention.
- FIG. 7 is an information format for explaining copy permission information (CGMS) in the media file management information block recorded on the information recording medium 20 according to the embodiment of the present invention.
- CGMS copy permission information
- FIG. 8 is a conceptual diagram showing the exchange of various data for encryption and decryption between a drive unit, a CPU, and a playback device in a third embodiment of the present invention
- FIG. 9 is a system block diagram according to a third embodiment of the present invention.
- FIG. 10 is a flowchart showing exchange of various data for encryption and decryption between a drive unit, a CPU, and a playback device in a third embodiment of the present invention.
- FIG. 1 is a block diagram showing a basic system configuration according to a first embodiment of the present invention.
- DVD 2 provided information such as movies and music is protected from duplication, and the provided information passed from the drive (DVD drive 4) to the information transmission means (PC 1) is reproduced.
- PC 1 information transmission means
- reference numeral 1 denotes a computer device (PC) serving as an information transmission means for transferring provided information read by a drive to an information reproducing apparatus.
- PC computer device
- provided copy-permitted provided information read by a drive is provided.
- an external storage device 3 such as an HDD, DVD-RAM, etc. to enable editing, proofreading, etc.
- Reference numeral 2 denotes a DVD disc that records information such as movies and music to be controlled by duplication.
- the provided information is compressed and recorded by, for example, MPEG2, and a part of the media file management information block corresponding to the provided information is recorded. Then, the copy permission information (CGM S) as shown in FIG. 7 is recorded.
- CGM S copy permission information
- the DV drive 4 is a drive device for reading the information of DVD 2, where Is called a D VD drive.
- the DV drive 4 has a function of receiving key information generated in the information reproducing apparatus and encrypting the provided information read from the DVD 2 using the key information. A specific configuration example of this function is shown in FIG.
- Reference numeral 6 denotes an information reproducing device that receives the information provided by the DVD drive 4 via the computer device (PC) 1 and performs reproduction and output processing, and is referred to as an MPEG board here.
- the MPEG board 6 is equipped with an MPEG2 decoder and decodes the provided information received via the computer device (PC) 1 and compressed by the MPEG2 to obtain reproduction output information. Further, the MPEG board 6 has a function of generating key information, transmitting the key information to the DVD drive 4, and decoding the provided information by using the key information.
- Fig. 2 shows a specific configuration example of this function.
- the MPEG board 6 issues the key information generated by the board 6 to the DVD drive 4 and holds the key information as a decryption key.
- the DVD drive 4 generates an encryption key using the above key information, encrypts the provided information read from the DVD 2 using the key, and then encrypts the computer device (PC) 1. Send to MPEG board 6 via
- the MPEG board 6 receives the provided information encrypted from the DVD drive 4 via the computer (PC) 1 and performs decryption processing using the decryption key generated by the board.
- the key information sent from the MPEG board 6 to the DVD drive 4 is subjected to encryption processing.
- the exclusive control of duplication according to the above-described embodiment is selectively enabled by the above-described duplication permission information (C GMS).
- C GMS duplication permission information
- FIG. 2 is a block diagram showing a system configuration according to the second embodiment of the present invention.
- data is read from a drive in accordance with copy permission information (CGMS) recorded on a large-capacity recording medium.
- CGMS copy permission information
- the copy permission level of the copy free that enables all the information reproducing devices to reproduce the duplicate information once the provided information is recorded, and the reproduction of the duplicate information only by the specific information reproducing device. This realizes a system having a function of selectively switching between a permission level that enables the permission and a permission level that is not permitted for all of the information reproducing apparatuses that reproduce the above-mentioned duplicated information.
- 10 and 1 OA are the computers shown in FIG.
- the device (PC) is equivalent to 1
- 10 is the CPU of the computer itself that controls the entire system
- 1 OA is the system bus.
- the duplication control processing as shown in FIGS. 3 to 6 is executed.
- the CPU 10 selectively takes in the copy-permitted provided information read from the information recording medium 20 by the drive device 40, stores the information in the storage device 30, and enables processing such as editing and proofreading.
- Reference numeral 20 denotes an information recording medium corresponding to DVD 2 shown in FIG. 1, which is compressed and recorded by MPEG 2 and has media * file management information corresponding to the provided information.
- Copy permission information (CGMS) as shown in Fig. 7 is recorded in a part of the block.
- Reference numeral 30 denotes a storage device corresponding to the external storage device 3 shown in FIG. 1, which is used for storing, editing, and calibrating duplicate information.
- Numeral 40 denotes a drive device corresponding to the DVD drive 4 shown in FIG. 1 and reads information from the information recording medium 20.
- the cryptographic generator 41 generates a cryptographic key (1) based on a random value using a random number generator.
- the register 42 holds the encryption key (1) generated by the encryption generator 41.
- the register 43 holds the encryption key (2) received from the playback device 60 via the system bus 1OA.
- the encryption generation device 44 uses the encryption key (1) and the encryption key (2). Generate an encryption key (3) using Register 45 holds the encryption key (3) generated by the encryption generator 44.
- the reading device 46 reads information recorded on the information recording medium 20.
- provided information such as a movie and music to be subjected to copy control and copy permission information (CGMS) as shown in FIG. 7 indicating a copy permission level of the provided information are read.
- CGMS copy control and copy permission information
- the encryption device 47 encrypts the provided information read from the information recording medium 20 in accordance with the copy permission information (CGMS) and encrypts the provided key stored in the register 45 or the provided information stored in the register 51 in accordance with the CGMS.
- the encryption processing is performed using the key (5), or the data is transmitted to the playback device 60 via the system bus 1 OA without performing the encryption processing.
- the register 48 holds the copy permission information (CGMS) read from the information recording medium 20.
- the encryption device 49 encrypts the copy permission information (CGMS) stored in the register 48 and sends it to the playback device 60 via the system bus 1OA.
- the decryption device 50 decrypts the encrypted device-specific provided information encryption key (5) received from the playback device 60.
- the register 51 holds the encryption key (5) decrypted by the decryption device 50.
- Reference numeral 60 denotes a playback device for the provided information corresponding to the MPEG board 6 shown in FIG. 1, which is provided with an MPEG decoder and provided via the system bus 1 OA and compressed by the MPEG2. To obtain playback output information.
- the encryption generator 61 generates an encryption key (2) based on a random value using a random number generator.
- the register 62 holds the encryption key (1) received from the drive unit 40 via the system bus 10A.
- the register 63 holds the encryption key (2) generated by the encryption generation device 61.
- the encryption generation device 64 generates an encryption key (4) using the encryption key (1) and the encryption key (2).
- the register 65 holds the encryption key (4) generated by the encryption generator 64.
- the decryption device 66 decrypts the encrypted copy permission information (CGMS) received from the drive device 40 via the system bus 10A of the computer body.
- CGMS encrypted copy permission information
- the decryption device 67 registers the information received from the drive device 40 via the system bus 1 OA of the computer in accordance with the copy permission information (CGMS) stored in the register 71 and registers it.
- MP EG 2 is decrypted using the encryption key (4) stored in the evening 65 or the provided information decryption key (6) stored in the register 72, or is not subjected to decryption processing.
- the MPEG2 decoder 68 decodes the provided information decoded by the decoding device 67 and sends the provided information that can be reproduced and output to the display controller 80.
- the register 69 holds a device-specific provided information encryption key (5).
- the encryption device 70 is the device specific stored in register 69.
- the provided information encryption key (5) is encrypted and sent to the drive device 40.
- the register 71 holds the copy permission information (CGMS) decrypted by the decryption device 66.
- the register 72 holds the provided information decryption key (6) which is paired (for example, has a common value) with the device-specific provided information encryption key (5) stored in the register 69.
- Reference numeral 80 denotes a display controller for displaying and outputting the provided information output from the MPEG2 decoder 68 to the display device 81.
- the key values of the registers 45 and 65 are cleared and rewritten at least at the start or end of playback. Further, the key values of the registers 69 and 72 are not limited to fixed values, and may be rewritten at the start of reproduction, for example.
- FIGS. 3 to 6 are flowcharts showing the processing procedure in the second embodiment of the present invention, and FIGS. 3 and 4 show various key information for encryption and decryption processing, respectively.
- 5 and 6 are flow charts showing the copy control processing procedure when reading the provided information.
- FIG. 7 is a diagram showing an information format for explaining copy permission information (CGMS) in the media file management information block recorded on the information recording medium 2 ⁇ .
- CGMS copy permission information
- the CGMS has the b0, bl force and “OCT”
- all the playback devices 60 are permitted to reproduce the copy information
- the b b, b1 force is “01”.
- the encryption generator 41 of the drive unit 40 generates an encryption key (1) based on a random value (step 40a in FIG. 3).
- the encryption key (1) generated by the encryption generation device 41 is stored in the register 42 and set in the register 62 of the playback device 60 under the control of the CPU 10 (see FIG. 3). 10a, Figure 4 Step 60a).
- the encryption generation device 61 of the playback device 60 generates the encryption key (2) based on the random value (step 60b in FIG. 4).
- the encryption key (2) generated by the encryption generation device 61 is held in the register 63 and set in the register 43 of the drive device 40 under the control of the CPU 10 ( Figure 3 Step 10b, 40b).
- the cryptographic generation device 44 of the drive device 40 generates the cryptographic key (3) using the cryptographic key (1) stored in the register 42 and the cryptographic key (2) stored in the register 43, and registers the cryptographic key (3). Set to 5 (step 40c in Fig. 3). Also, the encryption generation device 64 of the playback device 60 generates an encryption key (4) using the encryption key (1) stored in the register 62 and the encryption key (2) stored in the register 63, and Set to 65 (Fig. 4, step 60c).
- the reading device 46 of the drive device 40 reads the copy permission information (CGMS) from the information recording medium 20 and sets it in the register 48 (FIG. 3, step 40d).
- CGMS copy permission information
- the encryption device 49 uses the encryption key (3) stored in the register 45 to encrypt the copy permission information (CGMS) set in the register 48 (step 40e in FIG. 3).
- the encrypted copy permission information (CGMS) is passed to the decryption device 66 of the playback device 60 under the control of the CPU 10 (FIG. 3, step 10c).
- the decryption device 66 uses the encryption key (4) stored in the register 65 to decrypt the encrypted copy permission information (C GMS) received from the drive device 40, and to register 7 Set to 1 (Step 60d in Fig. 4).
- the control device (not shown) in the playback device 60 determines the content of the copy permission information (CGMS) stored in the register 71, and outputs b 0, b 1, “0” of the copy permission information (CGMS). Then, when it is recognized that only the reproducing device used at the time of reading the provided information is permitted to reproduce the exclusive copy information, the encrypting device 70 is started (FIG. 4, step 60e (Yes): ).
- the encryption device 70 is fixedly stored in the register 69 using the encryption key (4) stored in the register 65. Encrypt the provided information encryption key (5) unique to the device (step 60g in Fig. 4) 0
- the CPU 10 transfers the provided device-specific information encryption key (5) or the dummy data in place of it to the decryption device 50 in the drive device 40 (FIG. 3, step 10d).
- the decryption device 50 decrypts the encrypted device-specific provided information encryption key (5) received from the playback device 60 and sets it in the register 51.
- the CPU 10 gives an instruction to read out the provided information to the drive device 40 (step S 1 in FIG. 5).
- the read device 46 When a control device (not shown) in the drive device 40 receives a read instruction from the CPU 10, the read device 46 is activated.
- the reading device 46 controls the drive of the information recording medium 20 and reads the provided information (MPEG 2 data) and the copy permission information (CGMS) from the information recording medium 20 (FIG. 5, step S2).
- the copy permission information (CGMS) read from the information recording medium 20 is stored in the register 48 and then supplied to the encryption device 47.
- the encryption device 47 determines the content of the copy permission information (C GMS) stored in the register 48 and determines the bO, 1 ⁇
- the information to be provided is not encrypted and output (pass-through) as it is.
- the value is "01”
- the provided information encryption key (5) unique to the device stored in the register 51 is used.
- the provided information is encrypted by using the encryption key (3) stored in the register 45 when it is "1 1" (Fig. 5, steps S3 to S7). ) 0
- the provided information (MPEG2 data) output from the encryption device 47 is transferred to the decryption device 67 in the playback device 60 via the system bus 1OA (step S8 in FIG. 5).
- the decryption device 67 of the playback device 60 When the decryption device 67 of the playback device 60 receives the provided information (MPEG2 data) from the encryption device 47 in the drive device 40, it decrypts the contents of the copy permission information (CGMS) stored in the register 71. Judgment, when the bO, bl power of CGMS is "00", the provided information is output (pass-through) as it is without decryption processing,
- the provided information is decrypted using the provided information encryption key (6) unique to the device stored in the register 72,
- the provided information is decrypted using (4) (steps S11 to S16 in FIG. 5).
- the provided information (MP EG2 data) output from the decoding device 67 is decoded by the MPEG2 decoder 68, sent to the display controller 80, and displayed on the display device 81. ( Figure 5 Step S II).
- the CPU 10 fetches the provided information (MPEG2 data) into the storage device 30 when bO, 1) 1 ⁇ 1 of the copy permission information (CGMS) is “00”.
- the reproduced information can be arbitrarily reproduced and output without specifying the reproducing device.
- the provided information MP EG 2 data
- the playback device 60 having the provided information encryption key (6) of the device-specific provided information encryption key (5) that is paired with the key can reproduce the duplicated information.
- the information provider can encrypt each provided information (per movie or music title), and cannot read the information easily with a computer.
- the replication control of the provided information which is high and highly used by computer processing is established.
- the CPU 10 sends a “START AUTHENTIC AT ION” command to the drive device 90 (step S41).
- the RAN ID generation device in the drive device 90 outputs “S In response to the "TART AUTHENT ICATI ON” command, a random number is generated by the random generator, and the generated random number is transmitted to the CPU 10 as a RAN ID (step S21). , S23)
- This RAN ID is an ID for specifying one MPEG board, for example, when there are a plurality of MPEG boards that are playback devices, and the CPU 10 acquires the RAN ID from the drive device 90. And sends it to the playback device 120.
- the playback device 120 encrypts the RAN ID using the algorithm A by the C HK EY 1 generation device 121 and uses the CHKEY 1 Is generated and stored and sent to CPU 10 (steps S71 and S73).
- O CHKEY is a key for recognizing the MPEG board or the disk drive device. is there.
- the CPU 10 acquires CHKEYl from the playback device 120 and transfers it to the drive device 90 (step S43).
- Drive device 90 encrypts C HKEYl using algorithm B by means of encryption generation device 95, generates KEY 1 and holds it, and sends it to CPU 10 (steps S25, S27) 0
- CPU 10 obtains KEY 1 from the drive device 90 and transfers it to the playback device 120.
- the playback device 120 generates the KEY 1 by encrypting the stored C HKEY1 with the algorithm B by the encryption generation device 123 and compares it with the KEY 1 obtained from the CPU. As a result of this comparison, if a match is obtained, it means that the authentication of the drive device by the playback device has been completed normally.
- the drive device 90 uses the encryption generating device 99 to encrypt the held KEY 1 with the algorithm C to generate and hold the CHKEY 2 and send it to the CPU (step S29).
- CPU 10 obtains CHKEY 2 from drive device 90 and transfers it to playback device 120. If a match is obtained as a result of the comparison in step S75, the playback device 120 encrypts the CHKEY 2 sent from the CPU by the encryption generation device 1 39 with algorithm D, generates KEY 2, and generates KEY 2. When held, it is sent to CPU 10.
- the CPU 10 acquires KEY 2 from the playback device 120 and transfers it to the drive device (step S49).
- Drive device is retained by the cryptographic generator 101 KEY 2 is generated by encrypting using the obtained KEY 2 algorithm D, and is compared with KEY 2 obtained from the CPU by the comparison circuit 105 (steps S 29 and S 31). As a result of the comparison, if a match is found, the playback device has been successfully authenticated by the drive device. As a result, the mutual recognition of the drive device and the playback device has been completed.
- the drive device encrypts the DISKKEY and TITLEKEY using the KEY1, KEY2 and the algorithm by the encryption device 113, and sends it to the CPU (step S33).
- the CPU obtains the encrypted DISKKEY and TITLEKEY from the drive device and sends it to the playback device (step S51).
- the playback device decrypts the DISKKEY and TITLEKEY encrypted by the decryption device 137 using KEY 1 and KEY 2. Algorithm E. Note that the copy permission information is the same as in the second embodiment, and a description thereof will not be repeated.
- a large-capacity disk such as a DVD or a CD-ROM that requires a drive device is taken as an example of the information providing medium.
- the present invention can be applied to an external system configuration in the same manner as in the above embodiment.
- all the components except for the reading device 46 in the drive device 40 shown in FIG. 2 are provided in an external information providing device as a communication destination, and the signal path shown by a broken line in FIG. It can be easily realized by replacing.
- the copy permission information (CGMS) and the device-specific provided information encryption key (5) are encrypted and transferred, respectively.
- the encryption processing is not necessarily required. It is possible to omit the encryption process according to the required reliability.
- each of the drive device 40 and the information reproducing device 60 is configured to generate primary key information based on random information.
- the present invention is not limited to this.
- at least one of the drive device 40 and the playback device 60 generates primary key information based on random information, and the drive device 40 and the playback device are generated based on the key information.
- any configuration may be used as long as the drive and the information reproducing apparatus temporarily generate the related key information using the random information. .
- the device-specific provided information encryption key (5) and the device-specific provided information decryption key (6) are provided independently of each other.
- the present invention is not limited to this, and the same key information may be used for the provided information encryption key (5) and the decryption key (6) unique to the device.
- the playback device 60 In order to decrypt the provided information, it is only necessary to be able to grasp the encryption method and the contents of the encryption key of the provided provided information.
- the playback device 6 having the device-specific provided information encryption key (6) paired with the device-specific provided information encryption key (5) used for the encryption process. It is configured to selectively use a copy control mechanism that allows only one generation copy to be able to reproduce a copy by only 0, and a copy control mechanism that disables reproduction of the copy in all the playback devices. For example, a configuration in which a copy permission mode of a copy free and a copy permission mode in which reproduction of a copy is disabled in all playback devices are selected, or a copy permission mode of a copy free, Arbitrary combinations of copy permission modes are possible, such as a configuration that selects one-generation copy copy permission mode.
- a system in which a computer intervenes in the delivery of information provided by a large-capacity recording medium, a communication medium, and the like is targeted, but regardless of the system configuration, Even in a system configuration in which a computer does not directly intervene in the delivery of provided information, a drive that reads provided information from a recording medium such as an MD, CD-ROM, or DVD, or a communication medium that has a function to transmit provided information, An arbitrary copy control mechanism described in the above embodiment can be applied to an inter-use portion between devices capable of copying provided information between the device and the device that reproduces the read data.
- provided information such as a movie and music compressed by MPEG 2 is taken as an example, but the present invention is not limited to this.
- the present invention can be applied to a system configuration in which data to be reproduced includes data compressed by PEG 1 or MPEG 4 or the like.
- the provided information recorded on the recording medium is raw data, but all the provided information may be encrypted and recorded, or only a part of the provided information may be encrypted. It may be recorded.
- a copy-capable device such as a computer intervenes in the delivery of information provided by a large-capacity recording medium or communication medium
- encryption is performed on a computer or other device capable of copy-processing.
- the media can freely control the use of the copy for each piece of information provided, and it is possible to use the information provided by a reliable and always valid copy.
- a copy control method and a copy control device can be provided.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019970702109A KR100311563B1 (ko) | 1996-01-08 | 1996-12-11 | 카피제어방법및카피제어장치 |
DE69619654T DE69619654T2 (de) | 1996-01-08 | 1996-12-11 | Verfahren und gerät zur überspielungssteuerung |
US08/817,903 US6347846B1 (en) | 1996-01-08 | 1996-12-11 | Method and an apparatus to control copying from a data providing device to a data receiving device |
CA002199241A CA2199241C (en) | 1996-01-08 | 1996-12-11 | Copy control method and copy control apparatus |
AU11099/97A AU686058B2 (en) | 1996-01-08 | 1996-12-11 | Method and apparatus for dubbing control |
EP96941827A EP0814474B1 (en) | 1996-01-08 | 1996-12-11 | Method and apparatus for dubbing control |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP00098596A JP3176030B2 (ja) | 1996-01-08 | 1996-01-08 | 複製制御方法及び複製制御装置 |
JP8/985 | 1996-01-08 |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/817,903 A-371-Of-International US6347846B1 (en) | 1996-01-08 | 1996-12-11 | Method and an apparatus to control copying from a data providing device to a data receiving device |
US08817903 A-371-Of-International | 1996-12-11 | ||
US10/051,142 Continuation US6842521B2 (en) | 1996-01-08 | 2002-01-22 | Method and apparatus to control copying from a drive device to a data reproducing device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1997025711A1 true WO1997025711A1 (fr) | 1997-07-17 |
Family
ID=11488902
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP1996/003608 WO1997025711A1 (fr) | 1996-01-08 | 1996-12-11 | Procede et appareil de doublage de commande |
Country Status (10)
Country | Link |
---|---|
US (2) | US6347846B1 (ja) |
EP (1) | EP0814474B1 (ja) |
JP (1) | JP3176030B2 (ja) |
KR (1) | KR100311563B1 (ja) |
CN (1) | CN1132373C (ja) |
AU (1) | AU686058B2 (ja) |
CA (1) | CA2199241C (ja) |
DE (1) | DE69619654T2 (ja) |
TW (1) | TW316301B (ja) |
WO (1) | WO1997025711A1 (ja) |
Families Citing this family (61)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3176030B2 (ja) * | 1996-01-08 | 2001-06-11 | 株式会社東芝 | 複製制御方法及び複製制御装置 |
EP0880840A4 (en) * | 1996-01-11 | 2002-10-23 | Mrj Inc | DEVICE FOR CONTROLLING ACCESS AND DISTRIBUTION OF DIGITAL PROPERTY |
TW346571B (en) * | 1996-02-06 | 1998-12-01 | Matsushita Electric Ind Co Ltd | Data reception apparatus, data transmission apparatus, information processing system, data reception method |
US6606450B1 (en) * | 1997-06-16 | 2003-08-12 | Ati International Srl | Method and apparatus for processing video signals having associated access restriction data |
US6356704B1 (en) | 1997-06-16 | 2002-03-12 | Ati Technologies, Inc. | Method and apparatus for detecting protection of audio and video signals |
EP0899733B1 (en) * | 1997-08-28 | 2001-03-21 | Sony DADC Austria AG | Optical disc copy management system |
JPH11176091A (ja) * | 1997-12-15 | 1999-07-02 | Hitachi Ltd | ディジタル情報入出力装置、受信装置、記録装置、および再生装置 |
TW425543B (en) | 1998-04-14 | 2001-03-11 | Hitachi Ltd | Data reproduction method and device, data scrambling method, data recording method and device, recorded data reproduction device and the verification method thereof, and semiconductor chip |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
JP2995034B2 (ja) | 1998-04-30 | 1999-12-27 | 三洋電機株式会社 | ディジタル記録/再生システム |
JP3835655B2 (ja) * | 1998-06-09 | 2006-10-18 | ソニー株式会社 | 情報信号再生装置、情報信号処理装置、情報信号再生方法および情報信号出力方法 |
JP3819160B2 (ja) | 1998-09-18 | 2006-09-06 | 富士通株式会社 | 情報管理方法および情報管理装置 |
US6976265B1 (en) * | 1998-10-08 | 2005-12-13 | Ati International Srl | Method and apparatus for controlling display of content signals |
JP4356178B2 (ja) * | 1999-03-09 | 2009-11-04 | ソニー株式会社 | 再生装置 |
EP1045585A1 (en) * | 1999-04-13 | 2000-10-18 | CANAL+ Société Anonyme | Method of and apparatus for providing secure communication of digital data between devices |
US6690880B1 (en) | 1999-05-21 | 2004-02-10 | Ati International, Srl | Method and apparatus for copy protection detection in a video signal |
JP4011792B2 (ja) * | 1999-06-16 | 2007-11-21 | 株式会社東芝 | 記録方法、再生方法、記録装置、再生装置及び記録媒体 |
JP4127587B2 (ja) | 1999-07-09 | 2008-07-30 | 株式会社東芝 | コンテンツ管理方法およびコンテンツ管理装置および記録媒体 |
US7380137B2 (en) * | 1999-07-20 | 2008-05-27 | International Business Machines Corporation | Content guard system for copy protection of recordable media |
US7120251B1 (en) * | 1999-08-20 | 2006-10-10 | Matsushita Electric Industrial Co., Ltd. | Data player, digital contents player, playback system, data embedding apparatus, and embedded data detection apparatus |
EP2104100A3 (en) * | 1999-09-30 | 2012-02-22 | Panasonic Corporation | Information recording medium for recording a scrambled part of content information, and method and apparatus for reproducing information recorded therein |
WO2001031461A1 (fr) * | 1999-10-25 | 2001-05-03 | Sony Corporation | Systeme fournisseur de contenu |
EP1256950A4 (en) * | 1999-12-28 | 2011-03-16 | Panasonic Corp | RECORDING APPARATUS, REPRODUCING APPARATUS, DATA PROCESSING APPARATUS, RECORDING / REPRODUCING APPARATUS, AND DATA TRANSMITTING APPARATUS |
US7249105B1 (en) * | 2000-03-14 | 2007-07-24 | Microsoft Corporation | BORE-resistant digital goods configuration and distribution methods and arrangements |
JP2001307427A (ja) * | 2000-04-26 | 2001-11-02 | Pioneer Electronic Corp | 情報配信装置、情報配信方法並びに情報記録媒体及び情報記録装置 |
US20020037081A1 (en) * | 2000-04-28 | 2002-03-28 | David Rogoff | Cryptographic key distribution system and method for digital video systems |
EP1279283A2 (en) * | 2000-04-28 | 2003-01-29 | Broadcom Corporation | Cryptographic key distribution system and method for digital video systems |
JP4156188B2 (ja) * | 2000-10-20 | 2008-09-24 | パイオニア株式会社 | 情報出力装置及び情報出力方法、情報記録装置及び情報記録方法、情報出力記録システム及び情報出力記録方法並びに情報記録媒体 |
US6959090B1 (en) * | 2000-11-20 | 2005-10-25 | Nokia Corporation | Content Protection scheme for a digital recording device |
KR100763144B1 (ko) * | 2000-12-29 | 2007-10-08 | 주식회사 엘지이아이 | 연료전지 구동형 에어컨 |
US7058284B2 (en) * | 2001-03-29 | 2006-06-06 | Matsushita Electric Industrial Co., Ltd. | Universal multimedia optic disc player and its application for revocable copy protection |
DE60202568T8 (de) * | 2001-08-08 | 2005-10-20 | Matsushita Electric Industrial Co., Ltd., Kadoma | Urheberrechtschutzsystem, Aufzeichungsvorrichtung, und Wiedergabevorrichtung |
EP1454449A4 (en) * | 2001-12-13 | 2006-10-25 | Sony Computer Entertainment Inc | PROCESS AND DEVICES FOR SAFE DISTRIBUTION OF PROGRAM CONTENT |
WO2003055132A1 (en) * | 2001-12-21 | 2003-07-03 | Sony Computer Entertainment Inc. | Methods and apparatus for secure distribution of program content |
JP3941513B2 (ja) * | 2002-01-11 | 2007-07-04 | ソニー株式会社 | 記録方法、記録装置、再生方法及び再生装置 |
WO2003073295A1 (fr) * | 2002-02-27 | 2003-09-04 | Matsushita Electric Industrial Co., Ltd. | Dispositif hote |
DE602004029555D1 (de) * | 2003-01-15 | 2010-11-25 | Panasonic Corp | Inhaltsschutzsystem, endgerät, endgerätmethode und speichermedium |
CN100542084C (zh) * | 2003-01-15 | 2009-09-16 | 索尼株式会社 | 信号处理系统、记录方法、程序、记录介质、再现装置和信息处理装置 |
FR2850826B1 (fr) * | 2003-02-04 | 2005-04-01 | Medialive | Procede et dispositif de protection pour la diffusion securisee d'oeuvres audiovisuelles |
US7835520B2 (en) * | 2003-02-20 | 2010-11-16 | Zoran Corporation | Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders |
US20060179305A1 (en) * | 2004-03-11 | 2006-08-10 | Junbiao Zhang | WLAN session management techniques with secure rekeying and logoff |
US7506377B2 (en) | 2003-06-11 | 2009-03-17 | Hewlett-Packard Development Company, L.P. | Method and apparatus for playing content |
JP4578366B2 (ja) * | 2004-09-20 | 2010-11-10 | 株式会社ソニー・コンピュータエンタテインメント | ソフトウエアアプリケーションを配布する方法および装置 |
US8504849B2 (en) * | 2004-12-21 | 2013-08-06 | Sandisk Technologies Inc. | Method for versatile content control |
US20070168292A1 (en) * | 2004-12-21 | 2007-07-19 | Fabrice Jogand-Coulomb | Memory system with versatile content control |
WO2006078029A1 (ja) * | 2005-01-24 | 2006-07-27 | Pioneer Corporation | 配信装置及び方法、受信装置及び方法、配信システム、並びにコンピュータプログラム |
US8639939B2 (en) * | 2006-07-07 | 2014-01-28 | Sandisk Technologies Inc. | Control method using identity objects |
US8613103B2 (en) * | 2006-07-07 | 2013-12-17 | Sandisk Technologies Inc. | Content control method using versatile control structure |
US20100138652A1 (en) * | 2006-07-07 | 2010-06-03 | Rotem Sela | Content control method using certificate revocation lists |
US8122501B2 (en) * | 2008-06-20 | 2012-02-21 | International Business Machines Corporation | Traitor detection for multilevel assignment |
US8108928B2 (en) * | 2008-06-20 | 2012-01-31 | International Business Machines Corporation | Adaptive traitor tracing |
US8422684B2 (en) * | 2008-08-15 | 2013-04-16 | International Business Machines Corporation | Security classes in a media key block |
JP4686583B2 (ja) * | 2008-09-12 | 2011-05-25 | 日立コンシューマエレクトロニクス株式会社 | ディジタル情報記録再生装置およびディジタル情報記録再生方法 |
JP4686584B2 (ja) * | 2008-09-12 | 2011-05-25 | 日立コンシューマエレクトロニクス株式会社 | ディジタル情報記録再生装置およびディジタル情報記録再生方法 |
US9104618B2 (en) * | 2008-12-18 | 2015-08-11 | Sandisk Technologies Inc. | Managing access to an address range in a storage device |
US8571209B2 (en) | 2009-01-19 | 2013-10-29 | International Business Machines | Recording keys in a broadcast-encryption-based system |
JP4686632B2 (ja) * | 2009-12-16 | 2011-05-25 | 日立コンシューマエレクトロニクス株式会社 | ディジタル情報記録再生装置、ディジタル情報記録再生方法 |
JP4686641B2 (ja) * | 2010-04-19 | 2011-05-25 | 日立コンシューマエレクトロニクス株式会社 | ディジタル放送受信装置、およびディジタル放送受信方法 |
WO2015145211A1 (en) * | 2014-03-27 | 2015-10-01 | Kam Fu Chan | Token key infrastructure and method for cloud services |
KR101565929B1 (ko) * | 2015-05-06 | 2015-11-04 | 서대프랜트(주) | 물 침투를 방지하는 이중연도 |
CN112487502B (zh) * | 2020-12-15 | 2024-09-10 | 深圳平安智慧医健科技有限公司 | 设备鉴权方法、装置、电子设备及存储介质 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH03187067A (ja) * | 1989-12-15 | 1991-08-15 | Tokyo Electric Co Ltd | 磁気記録再生システムの照合方法及びその照合方法を使用した商品販売管理システム |
JPH07235131A (ja) * | 1994-02-22 | 1995-09-05 | Victor Co Of Japan Ltd | 再生プロテクト方法及びプロテクト再生装置 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US4644493A (en) | 1984-09-14 | 1987-02-17 | International Business Machines Corporation | Implementing a shared higher level of privilege on personal computers for copy protection of software |
NZ237080A (en) * | 1990-03-07 | 1993-05-26 | Ericsson Telefon Ab L M | Continuous synchronisation for duplex encrypted digital cellular telephony |
US5081676A (en) | 1990-10-04 | 1992-01-14 | Chou Wayne W | Method and apparatus for protecting multiple copies of computer software from unauthorized use |
US5222137A (en) * | 1991-04-03 | 1993-06-22 | Motorola, Inc. | Dynamic encryption key selection for encrypted radio transmissions |
EP0545472B1 (en) * | 1991-12-02 | 1999-10-20 | Koninklijke Philips Electronics N.V. | Closed information system with physical copy protection |
JPH064026A (ja) | 1992-06-17 | 1994-01-14 | Matsushita Electric Ind Co Ltd | 許可情報記述方法およびコピーガード付きデータ生成装置 |
JP3010930B2 (ja) * | 1992-09-24 | 2000-02-21 | 松下電器産業株式会社 | 記録再生装置 |
JPH06124539A (ja) | 1992-10-08 | 1994-05-06 | Sony Corp | ディジタルvtr |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
JPH06181044A (ja) | 1992-12-15 | 1994-06-28 | Nikon Corp | 荷電粒子顕微鏡 |
US5337357A (en) | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5398285A (en) | 1993-12-30 | 1995-03-14 | Motorola, Inc. | Method for generating a password using public key cryptography |
JPH07221751A (ja) | 1994-02-07 | 1995-08-18 | Nippon Telegr & Teleph Corp <Ntt> | ディジタル情報複製方法及びその装置 |
FI95756C (fi) * | 1994-03-21 | 1996-03-11 | Nokia Technology Gmbh | Menetelmä digitaalista informaatiota sisältävän bittivirran salaamiseksi ja salauksen purkamiseksi |
US5416842A (en) * | 1994-06-10 | 1995-05-16 | Sun Microsystems, Inc. | Method and apparatus for key-management scheme for use with internet protocols at site firewalls |
US5513260A (en) | 1994-06-29 | 1996-04-30 | Macrovision Corporation | Method and apparatus for copy protection for various recording media |
US5719938A (en) | 1994-08-01 | 1998-02-17 | Lucent Technologies Inc. | Methods for providing secure access to shared information |
US5604800A (en) | 1995-02-13 | 1997-02-18 | Eta Technologies Corporation | Personal access management system |
US5615264A (en) | 1995-06-08 | 1997-03-25 | Wave Systems Corp. | Encrypted data package record for use in remote transaction metered data system |
US5719937A (en) * | 1995-12-06 | 1998-02-17 | Solana Technology Develpment Corporation | Multi-media copy management system |
JP3176030B2 (ja) * | 1996-01-08 | 2001-06-11 | 株式会社東芝 | 複製制御方法及び複製制御装置 |
US5784460A (en) | 1996-10-10 | 1998-07-21 | Protocall Technolgies, Inc. | Secured electronic information delivery system having a three-tier structure |
US5923754A (en) | 1997-05-02 | 1999-07-13 | Compaq Computer Corporation | Copy protection for recorded media |
-
1996
- 1996-01-08 JP JP00098596A patent/JP3176030B2/ja not_active Expired - Fee Related
- 1996-12-11 WO PCT/JP1996/003608 patent/WO1997025711A1/ja active IP Right Grant
- 1996-12-11 CA CA002199241A patent/CA2199241C/en not_active Expired - Fee Related
- 1996-12-11 EP EP96941827A patent/EP0814474B1/en not_active Expired - Lifetime
- 1996-12-11 DE DE69619654T patent/DE69619654T2/de not_active Expired - Fee Related
- 1996-12-11 AU AU11099/97A patent/AU686058B2/en not_active Ceased
- 1996-12-11 CN CN96190847A patent/CN1132373C/zh not_active Expired - Fee Related
- 1996-12-11 US US08/817,903 patent/US6347846B1/en not_active Expired - Fee Related
- 1996-12-11 KR KR1019970702109A patent/KR100311563B1/ko not_active IP Right Cessation
- 1996-12-30 TW TW085116288A patent/TW316301B/zh active
-
2002
- 2002-01-22 US US10/051,142 patent/US6842521B2/en not_active Expired - Lifetime
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH03187067A (ja) * | 1989-12-15 | 1991-08-15 | Tokyo Electric Co Ltd | 磁気記録再生システムの照合方法及びその照合方法を使用した商品販売管理システム |
JPH07235131A (ja) * | 1994-02-22 | 1995-09-05 | Victor Co Of Japan Ltd | 再生プロテクト方法及びプロテクト再生装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP0814474A4 * |
Also Published As
Publication number | Publication date |
---|---|
CN1176014A (zh) | 1998-03-11 |
JP3176030B2 (ja) | 2001-06-11 |
CA2199241C (en) | 2001-02-20 |
EP0814474B1 (en) | 2002-03-06 |
US6842521B2 (en) | 2005-01-11 |
US20020061105A1 (en) | 2002-05-23 |
US6347846B1 (en) | 2002-02-19 |
AU686058B2 (en) | 1998-01-29 |
EP0814474A4 (en) | 2000-11-22 |
CN1132373C (zh) | 2003-12-24 |
KR100311563B1 (ko) | 2002-04-17 |
EP0814474A1 (en) | 1997-12-29 |
AU1109997A (en) | 1997-08-01 |
DE69619654T2 (de) | 2002-11-07 |
DE69619654D1 (de) | 2002-04-11 |
TW316301B (ja) | 1997-09-21 |
CA2199241A1 (en) | 1997-07-09 |
JPH09190667A (ja) | 1997-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1997025711A1 (fr) | Procede et appareil de doublage de commande | |
US7324974B1 (en) | Digital data file encryption apparatus and method | |
CN1319002C (zh) | 数据传输系统、装置和方法 | |
WO2004064317A1 (ja) | 相互認証方法、再生装置及び情報処理装置 | |
JP4710211B2 (ja) | 情報記録装置、情報再生装置、情報記録再生装置、情報記録方法、情報再生方法、情報記録再生方法並びに記録媒体 | |
WO2002054666A1 (fr) | Dispositif et procede de transmission de donnees de contenu et dispositif d'enregistrement/lecture | |
WO2004064314A1 (ja) | 信号処理システム | |
JP4585460B2 (ja) | 同一コンテンツから派生した形式の異なるコンテンツを複数個所で同時に利用することを防ぐ記憶装置、システム及び方法 | |
JP2000330871A (ja) | コンテンツ情報記録方法及びコンテンツ情報記録装置 | |
US20040268128A1 (en) | Information recording medium drive device, information processing apparatus, data replay control system, data replay control method, and computer program | |
JP2004030882A (ja) | レンダリング装置、コピー制御方法及びプログラム | |
JP2000003559A (ja) | デ―タ再生方泡デ―タ再生装置、デ―タ符号化方泡デ―タ記録方泡デ―タ記録装置、認証方法及び半導体チップ | |
JP2007287268A (ja) | 記録装置 | |
JP3588593B2 (ja) | 複製制御方法及び複製制御装置 | |
JP2007286938A (ja) | 情報処理装置および方法、プログラム、並びに記録媒体 | |
JP2006506762A (ja) | セキュアなローカルコピープロテクション | |
JP4379241B2 (ja) | 録画再生機器 | |
JP4783023B2 (ja) | 記録媒体、再生装置、及びコンテンツ再生方法 | |
JP2001166999A (ja) | 情報記録読取方法ならびに装置 | |
JP2007510998A (ja) | Avストリームコピー方法、装置及びavコンテンツコピー方法 | |
JP2002093045A (ja) | 情報記録再生装置および記録媒体 | |
WO2004053699A2 (ja) | 記録再生装置、データ処理装置および記録再生処理システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 96190847.5 Country of ref document: CN |
|
ENP | Entry into the national phase |
Ref document number: 2199241 Country of ref document: CA Ref document number: 2199241 Country of ref document: CA Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1996941827 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 08817903 Country of ref document: US Ref document number: 1019970702109 Country of ref document: KR |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CA CN KR US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): DE FR GB IT |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1019970702109 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 1996941827 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1019970702109 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 1996941827 Country of ref document: EP |