WO1999041910A1 - Unite de transmission de donnees audiovideo (av) numeriques, unite de reception de donnees numeriques av, unite de transmission/reception de donnees av et support - Google Patents
Unite de transmission de donnees audiovideo (av) numeriques, unite de reception de donnees numeriques av, unite de transmission/reception de donnees av et support Download PDFInfo
- Publication number
- WO1999041910A1 WO1999041910A1 PCT/JP1999/000533 JP9900533W WO9941910A1 WO 1999041910 A1 WO1999041910 A1 WO 1999041910A1 JP 9900533 W JP9900533 W JP 9900533W WO 9941910 A1 WO9941910 A1 WO 9941910A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- unit
- data
- digital
- rule
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/09—Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
- H04H60/14—Arrangements for conditional access to broadcast information or to broadcast-related services
- H04H60/23—Arrangements for conditional access to broadcast information or to broadcast-related services using cryptography, e.g. encryption, authentication, key distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/09—Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
- H04H60/13—Arrangements for device control affected by the broadcast information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
Definitions
- Digital AV data transmission unit digital AV data reception unit, digital AV data transmission / reception system, media
- the present invention relates to an AV system having a function of performing authentication between AV devices.
- FIG. 1 A conventional system for performing authentication between AV devices will be described with reference to FIGS. 2 and 3.
- FIG. 2 A conventional system for performing authentication between AV devices will be described with reference to FIGS. 2 and 3.
- FIG. 2 A conventional system for performing authentication between AV devices will be described with reference to FIGS. 2 and 3.
- the digital AV data transmission unit STB 18 includes a public key and a secret key 20, an authentication unit 19, a digital interface D-I / F 22 and an encryption unit 19 .
- the public and private keys 20 are connected to the digital interface D—IZF 22 via the authentication means 19.
- the encryption means 19 can refer to the public key and the secret key 20 and is connected to the digital interface 22.
- the digital AV data receiving unit TV 23 also includes a public key and a secret key 26, an authentication unit 25, a digital interface D-I / F 24, and a decryption unit 27.
- the public key and the secret key 26 are connected to the digital interface D—I / F 24 via the authentication means 25.
- the decryption means 27 can refer to the public key and the private key 26, and is connected to the digital interface D-I / F 24.
- digital interface D-I / ⁇ 22 and digital interface D-I / F 24 is configured to be able to exchange data with each other.
- the digital AV data receiving unit TV 23 issues an authentication request. Then, the authentication request arrives at the digital interface D-I / F 22 which forms the digital AV data transmission unit STB 18 through the digital interface D-I / ⁇ 24. Digital interface D—IZF 22 receives the authentication request and authenticates with authentication means 19 with reference to the public key and the secret key 20. If the authentication is performed by the digital AV data transmission unit STB 18, the data is decrypted by the encryption means 21 and the encrypted data is not transmitted via the digital interface D-IZF 22. This is decrypted by the decryption means 27 via the digital interface D-IZF 24 with reference to the public key and the secret key 26.
- the digital AV transmission unit STB 28 includes a common key 30, an authentication unit 29, a digital interface D-IZF 32, and an encryption unit 31.
- the common key 30 is connected to the digital interface D—I / F 32 via the authentication means 29.
- the encryption means 31 can refer to the common key 30 and connect to the digital interface 32.
- the digital AV data receiving unit TV 33 also includes a common key 36, an authentication means 35, a digital interface 34, and a decrypting means 37.
- the common key 36 is connected to the digital interface 34 via the authentication means 35.
- the decryption means 37 can refer to the common key 36 and is connected to the digital interface 34.
- the digital interface 32 and the digital interface 34 are configured to exchange data with each other.
- the digital AV receiving unit TV 33 issues an authentication request. Then, the authentication request arrives at the digital interface D-I / ⁇ 32 constituting the digital AV transmission unit STB28 via the digital interface D-I / ⁇ 34. Upon receiving the authentication request, the digital interface D—IZF 32 authenticates by the authentication means 29 with reference to the common key 30. If the authentication is performed by the digital AV transmission unit STB 28, the data is encrypted by the encryption means 31, and the encrypted data is transmitted via the digital interface D-IZF 32. This is decrypted by the digital decoding means 37 with reference to the common key 36 via the digital interface DI / F 34.
- the present invention has a problem that authentication of insignificant data takes a lot of time, a problem that the authentication of important data is vulnerable to forgery or tampering even though the data is important.
- Units and systems that can transmit and receive data using an appropriate authentication method, taking into account issues such as the different strictness required for authentication, and considering the importance of data and the type of authentication method of the partner device. It is intended to provide a stem or the like.
- the present invention of claim 1 Data importance judging means for judging the importance of data, transmitting-side multiple authentication rule storage means storing multiple types of authentication rules, and receiving an authentication request and transmitting based on the judgment result of the data importance judging means.
- a digital AV data transmission unit including at least a sender authentication selecting unit that selects one type of rule from the side multiple authentication rule storage unit and a sender authentication unit that performs authentication based on the selected authentication rule. is there.
- the present invention of claim 2 includes a data importance determining means for determining the importance of digital AV data, a transmitting-side multiple authentication rule storing means storing a plurality of types of authentication rules, At least the sender-side authentication selecting unit that selects one type of rule from the sender-side multiple-authentication-rule storage unit based on the determination result of the determining unit, and the sender-side authentication unit that performs authentication based on the selected authentication rule.
- Authentication request means for making a request for authentication with the digital AV data transmission unit having the same as a communication target, a receiving-side multiple authentication rule storing means storing the same plural types of authentication rules as the transmitting-side multiple authentication rule storing means, and transmitting.
- Receiving-side authentication selecting means for selecting the same authentication rule as the predetermined authentication rule selected by the side-authentication selecting means from the receiving-side multiple authentication rule storage means
- a digital AV data receiving unit comprising at least a receiving-side authentication means for performing authentication based on an authentication rule selected on the receiving side.
- a data importance judging means for judging the importance of digital AV data
- a transmitting side plural authentication rule storing means storing plural kinds of authentication rules
- a transmitting-side authentication selecting unit that selects one type of rule from the transmitting-side multiple-authentication-rule storing unit based on the determination result of the determining unit; and a transmitting-side authentication unit that performs authentication based on the selected authentication rule.
- a digital AV transmission unit having at least: an authentication requesting unit for requesting authentication; a receiving-side multiple authentication rule storing unit storing a plurality of types of authentication rules same as the transmitting-side multiple authentication rule storing unit; a transmitting-side authentication A receiving-side authentication selecting unit that selects the same authentication rule as the predetermined authentication rule selected by the selecting unit from a plurality of receiving-side authentication rule storage units, and a receiving side that performs authentication based on the authentication rule selected by the receiving side. And a digital AV data receiving unit having at least authentication means.
- a data importance judging means for judging the importance of digital AV data
- a management standard storing means for storing a predetermined management standard, and receiving an authentication request.
- a management criteria reference determining means for determining whether or not the management criteria of the management criteria storage means should be referenced based on the determination result of the data importance determination means, and referring to the management criteria in accordance with the determined result and performing certification in accordance therewith.
- a digital AV data transmission unit comprising at least authentication determining means for determining the power or the type of authentication, and authentication means for performing authentication based on a predetermined authentication rule in accordance with the determination of the authentication determining means.
- the invention according to claim 5 is the digital AV data transmission / reception system according to claim 3, wherein the transmission unit has each function of the reception unit, and the reception unit has each function of the transmission unit.
- the digital communication system according to the fifth aspect, wherein three or more transmission units each having a function of a reception unit or three or more reception units each having a function of a transmission unit are connected to each other so that digital AV data can be exchanged with each other.
- AV data transmission / reception system there is provided a transmitting-side multiple-authentication-rule storing means storing a plurality of types of authentication rules, and receiving unit-authentication-rule information for receiving information on one type of authentication rule of the digital AV data receiving unit.
- the digital AV transmission unit includes at least a transmitting-side authentication unit for performing authentication based on the digital AV transmission unit.
- a transmitting-side multiple-authentication-rule storing means storing a plurality of types of authentication rules, and receiving unit-authentication-rule information for receiving information on one type of authentication rule of the digital AV data receiving unit.
- the communication target is a digital AV transmission unit that has at least a sender authentication unit that performs authentication based on it, and an authentication request unit that makes an authentication request, and a receiver authentication rule storage that stores one type of authentication rule of itself.
- a transmitter-side multiple authentication rule storage unit storing a plurality of types of authentication rules, and a unit authentication rule information receiving unit for receiving information on one type of authentication rule of the digital AV data receiving unit.
- the transmitting-side authentication rule extracting means for extracting the authentication rules of the digital AV data receiving unit from the plurality of transmitting-side authentication rule storage means, and
- a digital AV transmission unit having at least a sender-side authentication means for performing authentication based on authentication, an authentication requesting means for making an authentication request, a receiving-side authentication rule storage means for storing its own type of authentication rule, and an authentication rule.
- a digital AV data transmission / reception system comprising: an authentication rule information transmitting unit for transmitting the above information; and a digital AV data receiving unit having at least a receiving-side authentication unit for performing authentication with the transmitting unit using an authentication rule.
- a management standard storage unit storing a predetermined management standard, an authentication request received from a digital AV data receiving unit, and the type or importance of the digital AV data receiving unit
- the management criteria reference determining means for determining whether to refer to the management criteria in the management criteria storage means, and referring to the management criteria according to the determined result and determining whether to certify or determine the type of certification
- a digital AV transmission unit comprising at least authentication determining means for performing authentication and authentication means for performing authentication based on a predetermined authentication rule in accordance with the determination of the authentication determining means.
- the management standard is a reference list (CRL) capable of identifying an unauthorized or valid digital AV data receiving unit.
- AV transmission unit a reference list
- the present invention according to claim 12 is the digital AV data transmitting / receiving system according to claim 9, wherein two or more receiving units are connected to the transmitting unit, and digital AV data can be exchanged with the transmitting unit.
- the present invention according to claim 13 is a transmission side plural authentication rule storing means storing plural kinds of authentication rules, a data importance judging means for judging the importance of digital AV data, and a data importance judging means.
- the sender-side authentication selection unit that selects one type of authentication rule from the sender-side multiple authentication rule storage unit, and the information about one type of authentication rule that the single-authentication digital AV data reception unit has Based on the information about the unit authentication rule information receiving means to be received and the authentication rules received by the unit authentication rule information receiving means, the authentication rules of the single authentication digital AV data receiving unit are stored in a plurality of sender-side authentication rules.
- the authentication method obtained by the sender-side authentication extraction means and the sender-side authentication selection means or the sender-side authentication extraction means Ru digital AV data transmitting Yunitto der comprising at least a transmitting-side authenticating means for Hazuki authentication.
- the present invention of claim 14 is a transmission side plural authentication rule storing means storing a plurality of types of authentication rules, a data importance judging means for judging the importance of digital AV data, and a data importance judging means.
- the sender-side authentication selection unit that selects one type of authentication rule from the sender-side multiple authentication rule storage unit, and the information about one type of authentication rule that the single-authentication digital AV data reception unit has
- the authentication rules of the single authentication digital AV data receiving unit are transmitted to a plurality of senders.
- a digital AV data transmission unit having at least a transmission-side authentication means for performing authentication
- Multi-authentication digital AV having at least a receiving-side authentication selecting means for selecting the same authentication rule from the receiving-side plural-authentication-rule storage means, and a receiving-side authentication means for performing authentication based on the authentication rule selected by the receiving side.
- a data receiving unit an authentication requesting unit for requesting authentication, a receiving-side single authentication rule storing unit for storing one kind of authentication rule of itself, an authentication rule information transmitting unit for transmitting information about the authentication rule,
- a single authentication digital AV data reception unit having at least a receiving-side authentication unit for performing authentication with the digital AV data transmission unit using an authentication rule. Is a digital AV data transmitting and receiving system with and.
- the multi-authentication digital AV data reception unit has each function of a digital AV data transmission unit, and the digital AV data transmission unit has each function of a multi-authentication digital AV data reception unit. 14.
- the present invention of claim 16 provides a digital AV data transmission unit having each function of a multi-authentication digital AV data reception unit, or two multi-authentication digital AV data reception units having a function of digital AV data transmission unit.
- a digital AV data transmission unit having each function of a multi-authentication digital AV data reception unit, or two multi-authentication digital AV data reception units having a function of digital AV data transmission unit.
- the present invention of claim 17 is an encryption means for encrypting digital AV data at a plurality of levels according to the importance of the data, and an encrypted digital AV data.
- decryption In response to a request for decryption information for decrypting the obtained digital AV data, decryption that transmits all or part of decryption information at a level equal to or lower than the determined authentication level to the receiving unit
- the invention according to claim 18 provides an authentication level necessary for decrypting encrypted data received from a transmission unit that transmits digital AV data encrypted at a plurality of levels according to the importance of the data.
- Level determining means for determining the authentication level, authentication means for requesting authentication of the determined authentication level to the transmitting unit, and after decryption by the transmitting unit, decryption information for encrypted data having a level equal to or lower than the authentication level.
- a decryption information requesting means for requesting the transmission unit for all or a part of the transmission unit.
- the present invention according to claim 19 is characterized in that an encrypting means for encrypting digital AV data at a plurality of levels according to the importance of the data, and a receiving unit for receiving the encrypted digital AV data.
- An authentication means for performing authentication of a requested authentication level, a level determination means for determining an authentication level authenticated by the authentication means, and after authentication, decrypting encrypted digital AV data from the receiving unit.
- a decryption information selecting means for transmitting, to a receiving unit, all or part of decryption information having a level equal to or lower than the determined authentication level in response to a request for decryption information for performing And a level determining means for determining an authentication level necessary for decrypting the encrypted data received from the transmission unit, and transmitting the authentication of the determined authentication level to the transmission unit.
- Authentication required And a receiving unit having, after authentication by the transmitting unit, means for requesting, from the transmitting unit, all or part of decryption information at a level equal to or lower than the authentication level. It is an AV data transmission and reception system.
- the present invention is an encryption means for encrypting digital AV data at a level of t number according to the importance of the data, and a receiving means for receiving the encrypted digital AV data.
- Authentication means for authenticating the authentication level requested by the unit, level determining means for determining the authentication level authenticated by the authentication means, and, after authentication, encrypted digital AV data from the receiving unit.
- Decryption information selecting means for transmitting decryption information at a level equivalent to the determined authentication level to the receiving unit in response to a request for decryption information for decrypting the decryption information, the decryption information selection means comprising: When the receiving unit requests decryption information from the receiving unit and the request is decryption information of a level equal to or lower than the determined authentication level, the authentication procedure is omitted and the requested decryption information is received. The transmission unit to send to the unit.
- the present invention provides an authentication necessary for decrypting encrypted data received from a transmission unit that transmits digital AV data that has been decoded at a plurality of levels according to the importance of the data.
- Level determination means for determining the level, authentication means for requesting the transmission unit to perform authentication of the determined authentication level, and decryption information for encrypted data at a level equivalent to the authentication level after authentication by the transmission unit
- Decryption information requesting means for requesting the transmission unit to send the decryption information to the transmission unit at a level equal to or lower than the level of authentication.
- Request for decryption information It is Shinunit.
- the present invention is an encryption unit for encrypting digital AV data at a plurality of levels according to the importance of the data, and a receiving unit for receiving the encrypted digital AV data.
- An authentication means for authenticating the requested authentication level, a level judgment means for judging the authentication level authenticated by the authentication means, and after authentication, decrypting the encrypted digital AV data from the receiving unit.
- decryption information selection means for transmitting decryption information at a level equivalent to the determined authentication level to the receiving unit, wherein the decryption information selection means If a request for decryption information is received from the receiving unit and the request is at a level equal to or lower than the determined authentication level, the authentication procedure is omitted and the requested decryption information is omitted.
- Authentication means for requesting, after authentication by the sending unit, decoding information request means for requesting the sending unit for decoding information at the same level as the authentication level, wherein the decoding information request means is equivalent to the authentication level.
- a digital AV data transmission / reception system including a receiving unit having a function of requesting decryption information without requesting authentication when requesting decryption information of a lower level or lower from the transmission unit.
- the present invention according to claim 25 is a transmitter-side multiple authentication rule storage unit that stores a plurality of types of authentication rules, and a transmitter-side authentication selection unit that selects one type of authentication rule from the transmitter-side multiple authentication rule storage unit.
- Digital AV data transmission including at least a sender-side authentication means for performing authentication based on the selected authentication rule.
- a unit that makes an authentication request selects one type of authentication rule from the receiving-side multiple-authentication-rule storage unit that stores the same type of authentication rule as the sending-side multiple-authentication-rule storage unit, and selects the selected authentication rule.
- the selection of an authentication rule for a digital AV data receiving unit or a sending unit that performs authentication based on the authentication rules that have been performed is based on the result of determining the importance of the data, and the unit that has determined the importance determines the importance of the data.
- the unit that sends the information about the selected authentication rule to the unit that does not make the judgment and does not make the judgment of importance is the digital AV data transmission unit that selects the same authentication rule based on the information.
- the present invention according to claim 28 is a transmitter-side multiple authentication rule storage unit that stores a plurality of types of authentication rules, performs an authentication request, determines the importance of digital AV data, and, based on each determination result, Digital AV data that selects one type of authentication rule from the receiving-side multiple-authentication-rule storage unit that stores the same multiple types of authentication rules as the sending-side multiple-authentication-rule storage unit, and performs authentication based on the selected authentication rule.
- Sender authentication selecting means for selecting the same rule as the authentication rule selected by the receiving unit from the sender's multiple authentication rule storage means, and sender authentication means for performing authentication based on the selected authentication rule.
- This is a digital AV data transmission unit that has at least
- Claim 31 of the present invention provides an authentication means for performing authentication by selecting one type of authentication rule from a plurality of types of authentication rules, a management standard storage means storing a predetermined management standard for a reception unit, and a reception unit.
- a digital AV data transmission unit that includes an authentication determination unit that receives an authentication request from the client and determines whether or not to perform authentication by referring to stored management criteria, and that performs an authentication request. Authenticates only with less important authentication rules that have no management criteria When the receiving unit has only the function, the receiving unit is provided with identification information for the management standard corresponding to the receiving unit from an external management center. This is a digital AV data transmission unit that receives identification information and cancels authentication when the identification information becomes invalid.
- the present invention stores a program for realizing all or a part of the function of each component or step included in the unit or the system or the transmission method according to any one of claims 1 to 42.
- FIG. 1 is a schematic diagram of the first embodiment of the present invention.
- FIG. 2 is a schematic diagram showing a conventional technique.
- FIG. 3 is a schematic diagram showing a conventional technique.
- FIG. 4 is a block diagram relating to an authentication method according to the embodiment of the present invention.
- FIG. 5 is a block diagram relating to an authentication method according to the embodiment of the present invention.
- FIG. 6 is a schematic diagram of the second embodiment of the present invention.
- FIG. 7 is a schematic diagram of the third embodiment of the present invention.
- FIG. 8 is a schematic diagram of the fourth embodiment of the present invention.
- FIG. 9 is a schematic diagram of the fourth embodiment of the present invention.
- FIG. 10 is a schematic diagram of the fifth embodiment of the present invention.
- FIG. 11 is a diagram showing an example of a procedure method according to the fifth embodiment.
- FIG. 12 is a diagram showing another example of the procedure method in the fifth embodiment.
- FIG. 13 is a schematic diagram of the sixth embodiment of the present invention.
- FIG. 14 is a diagram illustrating an example of a procedure method according to the sixth embodiment.
- FIG. 15 is a diagram illustrating an example of a procedure method when CRL checking is performed on both the transmitting side and the receiving side.
- Sender-side multiple authentication rule storage unit Unit authentication rule information receiving unit Sender-side authentication unit
- Receiving-side authentication rule storage means Authentication and certification rule information transmitting means Receiving-side authentication means
- Sender authentication rule retrieval means Sender authentication selection means
- Unit authentication rule information receiving means Sender authentication means
- Receiving side multiple authentication rule storage means 69 Receiving-side authentication selection means 70 Receiving-side authentication means
- Receiving-side authentication rule storage means 75
- Receiving-side authentication rule storage means 76
- Authentication-rule information transmitting means 77
- the digital AV data transmission unit STB 1 is composed of data significance determination means 3, encryption means 4, transmission side plural authentication rule storage means 5, transmission side authentication selection means 6, transmission side authentication means 7, and digital interface D—.
- the data importance determination means 3 is means for classifying the importance of data 2 into a plurality of types according to the importance. The significance of this data is expressed in CGMS. This CGMS exists in the data sent from the broadcasting station or in the header.
- the encryption means 4 is means for encrypting the data 2 with a secret key Kcol 6 created in the course of authentication. The authentication method for generating the work key Kcol 6 will be described later.
- the sender-side multiple authentication rule storage means 5 is a means having multiple types of authentication rules.
- the transmission-side authentication selection means 6 is a means for selecting one type of authentication rule from a plurality of types of authentication rules of the transmission-side multiple authentication rule storage means 5. At this time, the result of the judgment by the data significance judgment means 3 is referred to.
- an authentication rule using a public key and a secret key is selected as an authentication rule that takes time but is resistant to forgery or tampering depending on whether the importance is high or low.
- the transmission-side authentication means 7 is a means for actually performing authentication with the digital AV data receiving unit TV 9 according to the selected authentication rule.
- Digital interface D—I / F 8 is a digital AV data receiving unit. A means for exchanging AV data and signals with V9.
- the digital AV data receiving unit TV 9 includes a digital interface D-IZF 10, decryption means 11, authentication request means 12, reception-side authentication means 13, and reception-side multiple authentication rule storage means 1. 4. It has receiver authentication selection means 15
- the authentication request means 12 is a means for issuing an authentication request to the digital AV data transmission unit STB1.
- the receiving-side multiple-authentication-rule storage unit 14 is a unit that has a plurality of authentication rules of the same type as the plurality of authentication rules stored in the transmitting-side multiple-authentication-rule storage unit 5. Therefore, the present embodiment has an authentication rule using a public key and a secret key and an authentication rule using a common key.
- the receiving-side authentication selecting means 15 is means for selecting the same authentication rule as the authentication rule selected by the transmitting-side authentication selecting means 6 from the receiving-side plural authentication rule storage means 14 described above.
- the receiving-side authentication means 13 is a means for actually exchanging authentication with the digital AV data transmission unit STB 1 using the selected authentication rule, that is, the authentication rule selected in the digital AV data transmission unit STB 1. is there.
- the decryption means 11 is means for decrypting the digital AV data encrypted and transmitted by the digital AV data transmission unit STB 1 using the work key Kcol 7.
- the work key Kcol 7 is generated in the receiving-side authentication process, and a method for generating the work key Kcol 7 will be described later together with a method for generating the work key Kcol 6.
- the digital interface D-I / ⁇ 10 is a means for exchanging the AV unit data with the transmission unit STB1.
- the authentication request means 1 constituting the digital AV data receiving unit TV 9 1 2 power digital interface D—I ZF 10 Issue an authentication request to the data transmission unit STB 1 including its own ID. Of course, it also issues a request to transmit AV data.
- the digital AV data transmission unit STB1 receives the authentication request via the digital interface D-IZF8.
- the digital AV data transmitting unit STB 1 first determines the importance of the AV data 2 to be transmitted by the data importance determining means 3 and classifies them. In other words, if the value of CGMS is 11, the importance is high, the data can only be displayed, and copying is prohibited. Also, if the CGMS value is 10, you can only copy once
- the selection information is sent to the transmitting-side authentication means 7 and sent to the digital AV receiving unit TV 9 via the digital interface D-I / F 8.
- the receiving-side authentication selecting means 15 was selected by the digital AV data transmitting unit STB 1 using the selection information, and the receiving-side multiple authentication rule storing means 14 Select the same authentication rule as the authentication rule. Therefore, the selected authentication level is the same on the transmitting side and the receiving side.
- the receiver authentication The means 13 and the transmitting-side authentication means 7 mutually authenticate each other via the digital interface D-IZF 10 and the digital interface D-I / F 8. If the authentication is successful, a work key Kcol 6 is generated on the transmitting side and a work key Kcol 7 is generated on the receiving side as described later.
- the data 2 to be transmitted is encrypted by the encryption means 4 using the generated peak key Kcol 6. After that, it is transmitted as encrypted data to the digital AV data receiving unit TV 9 via the digital interface D-I / F 8.
- the data encrypted via the digital interface D—I ZF 10 is decrypted by the decryption means 11 using the work key Kcol 7 to become data 101. This is the same data as the data 2, which means that the data has been transmitted to the digital AV data receiving unit TV 9 and the digital AV data transmitting unit STB 1.
- the digital AV data receiving unit TV 9 displays the data on the screen of the display device.
- authentication means that is strong against forgery and falsification is used.
- the importance of data is low, it does not take long, but forgery or falsification is used. Weak authentication rules are used.
- FIGS. an embodiment in which a work key Kco is generated is shown in FIGS.
- the receiving side has a secret key Sb and a public key Pb.
- the sender has a secret key S a and a public key P a.
- the receiving side generates a random number B.
- the receiving side encrypts IDb, which is its own identification number, and random number B with its own secret key Sb.
- the sender obtains the public key P of the receiver by searching from the identification number I Db of the receiver. Decrypt the symbol S b (B) with the public key P b obtained in step 8. As a result, a random number B is obtained as in step 9. Further, the transmitting side generates a random number A as in step 10.
- the random numbers A and B are encrypted with the sender's secret key Sa to generate a ciphertext S a (A, B).
- the transmitting side transmits the ciphertext S a (A, B) and its own identification number IDa to the receiving side.
- the receiving side receives the cipher text S a (A, B) and the identification number I Da of the transmitting side.
- the receiver obtains the sender's public key Pa by searching from the sender's identification number IDa, and decrypts the ciphertext S a (A, B) with Pa as in step 2.
- the receiving side obtains the random number B exactly the same as the random number B sent in step 1 from the ciphertext S a (A, B) power, and the receiving side knows that no forgery or tampering has been performed. If the two random numbers are different, it indicates that forgery or tampering has been performed, and that there is an unauthorized party. However, in this case, it is assumed that the public keys Pa and Pb can be obtained only by authorized persons.
- step 3 the receiver encrypts the random number A with the receiver's secret key Sb to create a ciphertext Sb (A).
- S b (A) is sent to the sender, and decrypts the ciphertext S b (A) with the receiver's public key P b that the sender already has, as in step 11. If the random number B generated in step 10 and the random number B decrypted in step 11 are exactly the same, the transmitting side knows that no forgery or tampering has been performed. If the two random numbers are different, it indicates that forgery or tampering has been performed and that there is an unauthorized party.
- random numbers A and B exchanged between the receiving side and the transmitting side have not been forged or falsified, random numbers A and B are secret random numbers to third parties other than the receiving side and the transmitting side. is there.
- a key Ka is created using the random numbers A and B as in step 12.
- the key K ab is created on the receiving side using the random numbers A and B as in step 4.
- the two Kabs are exactly the same and are a common key.
- a key Kex is created on the transmitting side as in step 13. This is encrypted with the common key Kab, and an encrypted text Kab (Kex) is created and sent to the receiving side.
- the receiving side decrypts the ciphertext K ab (Kex) with the common key K ab to obtain Kex as in step 5, and as a result, the key Kex obtained by the receiving side and the key Kex on the transmitting side are exactly the same, and the common It is key.
- a key Kco is created on the transmitting side as in step 14.
- the key Kco is encrypted with the common key Kex and sent to the receiver as ciphertext Kex (Kco).
- the receiving side decrypts the ciphertext Kex (Kco) with the common key Kex as in step 6, and obtains Kco as in step 7.
- the key Kco on the transmitting side and the Kco on the receiving side are exactly the same and are common keys.
- the above is the work key Kco obtained in the authentication process using the public key and the private key.
- the sender and the receiver have a common key S.
- This common key is given only to a legitimate person.
- the receiving side generates two random numbers A1 and A2 as in step 15, encrypts them with the common key S, creates a ciphertext S (A1A2), and sends it to the transmitting side.
- the transmitting side decrypts the ciphertext S (A 1 A 2) with the common key S as in step 20.
- a random number A 1 and a random number A 2 are obtained as in step 21.
- the sender sends the random number A2 to the receiver.
- the receiving side has two random numbers A 1 and A 2 as in step 16.
- the transmitting side generates random numbers B1 and B2 as in step 22 and encrypts them, and sends the ciphertext S (B1B2) to the receiving side.
- the receiving side decrypts the ciphertext S (B1B2) using the common key S as in step 17.
- random numbers B 1 and B 2 are obtained as in step 18.
- the receiving side sends the random number B2 to the transmitting side.
- the sender has random numbers B1 and B2 as in step 23. If the random number generated in step 22 and the random number B2 received from the receiving side in step 23 are the same, the receiving side knows that no forgery or tampering has been performed, and the authentication succeeds. If the above two random numbers are different, forgery or tampering has been performed, and the authentication fails.
- the random numbers A 1 and B 1 are random numbers that are secret to third parties other than the sender and receiver.
- the transmitting side generates a key Kco from the random number A 1 and the random number B 1 in step 24.
- the receiving side generates a key Kco from the random number A 1 and the random number B 1 as in step 19.
- the key Kc 0 on the transmitting side and the key Kco on the receiving side are exactly the same and are common keys. The above is the work key Kco obtained in the authentication process using the common key.
- the types of authentication rules to be selected are not limited to the two types of the public key, the secret key, and the common key, but may be other types, and further, three or more types of different authentication rules may be used. It may be.
- the digital AV data transmission unit 1 has the same function as the digital AV reception unit 9, and the digital AV data reception unit 9 has the same function as the digital AV transmission unit 1. May be provided. After that, these units are referred to as digital AV data Called Shinunit. Also, three or more of these transmission / reception units may be connected to each other.
- the authentication rules are changed according to the importance of data in the first embodiment, but the authentication rules are changed depending on the types of authentication rules of the digital AV data receiving unit VTR 45. The point of choosing is the difference.
- the digital AV data transmission unit STB 38 has transmission side multiple authentication rule storage means 41 and the like.
- the sender-side multiple authentication rule storage means 41 is a means having a plurality of types of authentication rules. As described in the first embodiment, this is, for example, an authentication rule using a public key and a secret key, and an authentication rule using a common key. Here, it is assumed that an authentication rule using a public key and a secret key and an authentication rule using a common key are stored.
- the unit authentication rule information receiving means 42 is a means for receiving information related to the authentication rule sent from the digital AV data receiving unit VTR 45.
- the sender authentication retrieval means 53 retrieves a predetermined authentication rule from the sender plural authentication rule storage means 41 based on the information related to the authentication rule, and passes it to the sender authentication means 43. is there.
- the transmitting-side authentication means 43 is means for mutually authenticating with the digital AV receiving unit VTR 45.
- the encryption means 40 is means for encrypting the data 39 with the work key Kco 53 generated as a result of the authentication.
- Digital interface D—UZF44 is a means for exchanging data and signals with the digital AV data receiving unit VTR45.
- the digital AV data receiving unit VTR 45 has a receiving side authentication rule storing means 49 and the like.
- the receiving-side authentication rule storage unit 49 is a unit that stores only one type of authentication rule, unlike the case described in the first embodiment. For example, there is an authentication rule using a public key and a secret key, or an authentication rule using a common key.
- the authentication rules stored in the receiving-side authentication rule storage means 49 are predetermined in accordance with the characteristics or importance of the device of the digital AV data receiving unit VTR 45.
- units such as TVs that do not plan to reuse data take time, but are vulnerable to forgery or tampering, have authentication rules stored, and are units such as VTRs that are supposed to copy data. Stores authentication rules that take less time but are vulnerable to forgery or tampering. This protects the copyright of the AV data.
- the authentication rule information transmitting means 50 is means for transmitting information related to an authentication rule using a common key that the digital AV data receiving unit VTR 45 has in the receiving-side authentication rule storage means 49.
- the receiving-side authentication means 51 is means for mutually authenticating with the digital AV transmission unit STB 38.
- the decryption means 47 is a means for decrypting the encrypted data using the work key Kco 54 generated as a result of the authentication.
- the authentication request means 48 constituting the digital AV data receiving unit VTR 45 is connected to the digital A via the digital interface D-I / F 46. Issue a certification request to the V data transmission unit STB 38.
- the digital AV data transmission unit STB 38 receives the authentication request via the digital interface DI / ⁇ 44.
- the authentication rule information transmitting unit 50 refers to the receiving-side authentication rule storage unit 49 and extracts the stored authentication rules, that is, information on the authentication rules using the common key. For example, an identifier indicating an authentication rule using the common key is sent to the digital AV data transmission unit STB 38 via the digital interface D-I / F 46.
- the unit authentication rule information receiving means 42 transmits the information on the authentication rule sent from the digital AV data receiving unit VTR 45, that is, the identifier of the authentication knowledge using the common key to the digital interface D-IZF 44. Through the receive. Further, the identifier of the authentication rule is passed to the sender-side authentication rule extracting means 55, and from the sender-side plural authentication rule storage means 41, the authentication rule corresponding to the information on the authentication rule, that is, the authentication rule using the common key, Take out. After that, the authentication rule using the extracted common key is passed to the transmission-side authentication means 43. Thereafter, the transmitting-side authenticating means 43 and the receiving-side authenticating means 51 exchange authentication with each other via the digital interface D-I / F 44 and D-I / F 46.
- a work key Kco53 is generated on the transmission side and a work key Kco54 is generated on the reception side.
- the data 39 is encrypted by the encryption means 40 from the secret key Kco 53.
- the data is sent to the digital AV receiving unit VTR 45 via the digital interface D-I / ⁇ 44.
- the data encrypted via the digital interface D-I / F 46 is sent to the decryption means 47 and decrypted using the peak key Kco54, and the data 52 is obtained.
- the type of the authentication rule on the transmitting side is not limited to the common key, but may be a public key and a secret key, or another type. Further, three or more different authentication rules are used. You may.
- digital AV data receiving units there are two digital AV data receiving units, one of which may have only an authentication rule using a common key, and the other may have only a public key and a private key. Further, three or more digital AV data receiving units may be used.
- the first embodiment changes the authentication rule according to the importance of the data
- the second embodiment changes the authentication rule according to the type of the digital AV data receiving unit.
- the present embodiment is characterized in that an authentication rule is determined based on both the importance of data and the type of digital AV receiving unit.
- the digital AV data transmission unit STB 556 is a unit for transmitting data to the multi-authentication digital AV data reception unit TV 65 and the single authentication digital AV data reception unit VTR 72.
- the digital AV data transmission unit STB 56 selects a plurality of types of authentication rules according to the importance of the data and transmits the data.
- the single-authentication digital AV data receiving unit VTR 72 uses one authentication rule of Kira to authenticate with the digital AV data transmitting unit STB 56. It is a unit to perform.
- the digital AV data transmission unit STB 56 has a data significance determination means 57. This is a means of classifying the importance of the data 82 into a plurality of types according to the degree of importance. This importance is expressed in CGMS as described in the first embodiment. This CGMS exists inside the data sent from the broadcasting station or in the header.
- the encryption means 64 is means for encrypting the data 82 with the work key Kco 79 created during the authentication process. The process of generating the work key K co79 has been described in the first embodiment.
- the sender-side multiple authentication rule storage means 63 has multiple types of authentication rules. For example, an authentication rule using a public key and a secret key, and an authentication rule using a common key.
- the transmission-side authentication selection means 59 is a means for selecting one type of authentication rule from a plurality of types of authentication rules of the transmission-side multiple authentication rule storage means 63. At this time, the result of the case classification of the data significance judgment means 57 is referred to.
- an authentication rule using a public key and a secret key is used as an authentication rule that takes time but is resistant to forgery or tampering depending on whether the importance is high or low. Select, and select an authentication rule that uses a common key as an authentication rule that does not take much time but is vulnerable to forgery or tampering.
- the unit authentication rule information receiving means 60 is a means for receiving the information on the authentication rule sent from the single authentication digital AV data receiving unit VTR 72.
- the transmitting-side authentication rule extracting means 58 is a means for extracting a predetermined authentication rule from the transmitting-side plural authentication rule storage means 63 based on information related to the authentication rule, and passing it to the transmitting-side authentication means 61.
- the sender authentication means 6 1 This is a means for actually performing authentication with the multi-authentication digital AV data reception unit TV 65 and the single authentication digital AV data reception unit VTR 72.
- the digital interface DI / I / 62 is a means for exchanging AV data and signals with the multi-authentication digital AV data reception unit TV 65 and the single authentication digital AV data reception unit VTR 72.
- the multi-authentication digital AV data receiving unit TV 65 has authentication request means 67. This is a means of issuing an authentication request to the digital AV data transmission unit STB 56.
- the receiving-side multiple authentication rule storage unit 68 has the same multiple types of authentication rules as the transmitting-side multiple authentication rule storage unit 63. Therefore, in the case of the present embodiment, there are an authentication rule using a public key and a secret key and an authentication rule using a common key.
- the receiving-side authentication selecting means 69 is a means for selecting the same authentication rule as the authentication rule selected by the transmitting-side authentication selecting means 59, as well as the receiving-side plural-authentication-rule storing means 68.
- the receiving-side authentication unit 70 is a unit for actually exchanging authentication with the digital AV data transmission unit STB 56 using the selected authentication rule, that is, the authentication rule selected by the digital AV data transmission unit STB 56. .
- the decryption means 66 is means for decrypting the digital AV data encrypted by the digital AV data transmission unit STB 56 using the work key Kco80.
- the work key Kco80 is generated in the authentication process, and the method of generating the work key Kco80 has been described in the first embodiment together with the work key Kco79.
- the digital interface D-IZF 71 is a means for exchanging AV data and signals with the digital AV data transmission unit STB 56.
- Single authentication digital AV data reception unit VTR 72 It has file storage means 75. This is a means to store only one type of authentication rule as described above. For example, there are authentication rules using a public key and a secret key, or authentication rules using a common key.
- the authentication rules stored in the receiving-side authentication rule storage means 75 are determined in advance according to the type and importance of the device of the single authentication digital AV data receiving unit VTR 72.
- the description will be made assuming that the receiving-side authentication rule storage unit 75 has a common key.
- the authentication rule information transmitting means 76 is means for transmitting the information related to the authentication rule using the common key which the single authentication digital AV data receiving unit VTR 72 has in the receiving side authentication rule storing means 75.
- Receiving-side authentication means 77 is means for mutually authenticating with digital AV data transmission unit STB 56.
- the decryption means 73 is means for decrypting the decrypted data using the work key Kco 81 generated as a result of the authentication.
- the multi-authentication digital AV data receiving unit TV 65 or the single authenticating digital AV data receiving unit 72 issues an authentication request.
- the digital AV data transmission unit STB 56 determines from which unit the authentication request has been sent.
- the authentication request means 67 constituting the multi-authentication digital AV data receiving unit TV 65 is a digital interface D-I / F. 7 Via 1, issue an authentication request to digital AV data transmission unit STB 56, including its own ID.
- the digital AV data transmission unit STB 56 receives the authentication request via a digital interface DI / F 62. Then, the digital AV data transmission unit STB 56 first determines the importance of the data 82 to be transmitted by the data importance determination means 57, and separates the cases. This result is sent to the sender-side authentication selecting means 59, and the optimum authentication rule is selected from the sender-side multiple authentication rule storage means 63.
- the selection information is sent to the transmitting-side authentication means 61, and is sent to the multi-authentication / authentication digital AV data receiving unit TV 65 via the digital interface DI / F 62.
- the receiving-side authentication selecting unit 69 uses the selection information to transmit the digital AV data transmitting unit STB 56 from the receiving-side multiple authentication rule storage unit 68. Select the same authentication rule as the selected authentication rule. Therefore, the selected authentication rule is the same for the sender and the receiver.
- the receiving-side authenticating means 70 and the transmitting-side authenticating means 61 authenticate each other via the digital interface D-I / ⁇ 71 and the digital interface D-IF62. If the authentication is successful, a work key Kco 79 is generated on the transmitting side and a work key Kco 80 is generated on the receiving side, as described in detail in the first embodiment.
- the data to be transmitted 82 is encrypted by the encryption means 64 using the generated work key Kco 79. After that, it is transmitted as encrypted data to the digital AV data receiving unit TV 65 through the digital interface D-I / ⁇ 62. Digital The data decrypted via the interface D-I / F 71 is decrypted by the decryption means 66 using the peak key Kco80 to become data 83.
- the authentication requesting means 74 constituting the single authentication digital AV data reception unit VTR 72 issues an authentication request to the digital AV data transmission unit STB 56 via the digital interface D-IZF 78.
- the digital AV data transmission unit STB 56 receives the authentication request via the digital interface D—IZF 62.
- the authentication rule information transmitting means 76 refers to the receiving-side authentication rule storing means 75 and extracts the stored authentication rules, that is, information on the authentication rules using the common key. For example, an identifier indicating an authentication rule using the common key is sent to the digital AV data transmission unit STB 56 via the digital interface D-I / F 78.
- the unit authentication rule information receiving means 60 transmits the information on the authentication rule sent from the single authentication digital AV data receiving unit VTR72, that is, the identifier of the authentication rule using the common key, to the digital interface D—IZF 62.
- the received authentication rule identifier is passed to the sender-side authentication rule retrieval means 58.
- Sender authentication rule collection The output unit 58 extracts an authentication rule corresponding to the information on the authentication rule, that is, an authentication rule using a common key, from the transmission-side plural authentication rule storage unit 63, and passes it to the transmission-side authentication unit 61.
- the transmitting-side authenticating means 61 and the receiving-side authenticating means 77 exchange authentication with each other via digital interfaces D—I ZF 62 and D—I / ⁇ 78.
- a work key Kco79 is generated on the transmitting side and a secret key Kco81 is generated on the receiving side, as described in detail in the first embodiment.
- the process of generating a work key as a result of authentication has been described in detail in the first embodiment.
- the data 82 is encrypted by the encryption means 64 with the work key Kco79.
- the encrypted data is sent to the single authentication digital AV data receiving unit VTR 72 via the digital interface D-I / F 62.
- the decrypted data received via the digital interface D-I ZF 78 is sent to the decryption means 73 and decrypted using the work key Kco81 to obtain data 84.
- This is the same data as the data 82, which means that the data has been transmitted from the digital AV data transmission unit STB 56 to the single authentication digital AV data reception unit VTR 72.
- a management standard created by checking whether a digital AV data receiving unit is legitimate or illegal is used.
- a method of creating the CRL for example, a method of creating a CRL based on a registration card issued by a store purchased by the consumer can be considered.
- FIG. 8 shows whether or not to refer to the management criterion according to the importance of digital AV data sent from a broadcasting station.
- the digital AV transmission unit STB 93 has a data importance determining means 86 for determining the importance of data according to the importance of digital AV data transmitted from a broadcasting station. Further, it has a management reference reference determining means 87 for determining whether to refer to the management reference information (CRL) stored in the management reference storage means 88 according to the importance of the data.
- CTL management reference information
- an authentication determination unit 89 for determining whether or not to perform authentication according to the determination result.
- it has an authentication means 90 for actually performing authentication with the digital AV data receiving unit TV 92.
- the authentication means 90 is connected to a digital AV data receiving unit TV 92 via a digital interface DI / F 91.
- the importance of the digital AV data 85 sent from the broadcasting station is determined by the data importance determination means 86.
- the result is passed to the management standard reference determining means 87, and it is determined whether to refer to the information stored in the management standard storage means 88. For example, it is important in the case of a new movie, so it is decided to refer to the management standard information. In the case of news, etc., it is not important, so it is decided not to refer to the management standard information.
- the authentication determining means 89 determines whether or not to authenticate in accordance with the determination made by the management standard reference determining means 87.
- the digital AV data receiving unit TV 92 is used to determine whether the device is legitimate or invalid for receiving the digital AV data 85 based on the management standard information stored in the management standard storage unit 88. You. If it is determined to be valid, the next authentication means 90 performs authentication with the digital AV receiving unit TV 92 via the digital interface D-I / F 91. If it is determined to be improper, at that point, authentication with the digital AV data reception unit TV 92 is not exchanged, and data 85 is not transmitted. On the other hand, FIG. 9 determines whether or not to refer to the above management criteria according to the type or importance of the device of the digital AV data receiving unit.
- the digital AV data transmission unit STB 94 determines whether or not to refer to the management standard storage means 96 according to the type or importance of the device of the digital AV data receiving unit VTR 100. It has reference determining means 95.
- the authentication determining means 97 determines whether to perform authentication.
- the management standard storage means 96 stores information as to whether the digital AV data receiving unit VTR 100 is a valid device or a valid device for receiving the digital AV data.
- the authentication means 98 performs authentication with the digital AV data receiving unit VTR 100 via the digital interface D-IZF 99.
- the device information is sent to the management standard reference determining means 95 via the digital AV data receiving unit VTR 100 digital interface D-I / F 99.
- the management criterion reference determining means 95 determines whether to refer to the information stored in the management criterion storage means 96. If it is determined to refer to the management reference storage means 96, the authentication determining means 97 first refers to the management reference storage means 96 to determine whether the digital AV data receiving unit is authorized to receive data. Or unauthorized device. Here, if it is determined that the device is valid, the next authentication means 98 starts authentication with the digital AV data receiving unit via the digital interface DI / F 99. If the digital AV data receiving unit is determined to be an invalid device to receive data, no authentication is performed and no data is transmitted.
- the VTR is a transmission unit when reproducing data recorded by a VTR.
- the CGMS input is “copy once”, it is rewritten to “copy impossible” and output.
- the importance of the data should be considered as the importance at the time of the original input, and the same authentication rule as “one time copy allowed” can be used.
- the above-mentioned non-existent CGMS value 01 is assigned to distinguish the former. You can also.
- FIG. 10 is a schematic diagram of the fifth embodiment of the present invention.
- the digital AV data transmission / reception system includes a transmission unit 111 and a reception unit 130 connected thereto.
- the transmission unit 111 includes encryption means A, B 112, 113 for encrypting data A, B having different contents importance with different symbol keys Kco, respectively.
- Authentication means 1 2 1, level determination means 1 2 2 for performing processing such as determining the authenticated level of the reception unit 1 30, and a seed request from the reception unit 1 30 It comprises a seed request command responding means 120 for responding, and a digital interface (D-IZF) 123 for transmitting and receiving data.
- the seed request command responding means 120 and a part of the authentication means 122 constitute the decryption
- the receiving unit 130 requests the digital interface (D-I / ⁇ ) 131 for transmitting and receiving data according to the importance of the content of the received encrypted digital AV data.
- Request level determination means 1 3 4 for determining the level of authentication to be performed, and authentication means 1 3 3 for requesting the transmission unit 1 11 1 for authentication at the determined request level and obtaining the necessary encryption key Kex, Kex storage means 13 7 for storing the obtained Kex, seed request command issuing means 13 5 for issuing a seed request command and obtaining the seed from the transmission unit 11 1, and the obtained seed and Kex
- the seed request command issuing means 135 and a part of the authentication means 133 constitute the decryption information request means.
- the request level determining means 134 determines the required authentication level based on the content importance of the received data, and passes it to the authenticating means 133.
- the authentication means 13 3 issues an authentication request to the transmitting unit via D-I / F 13 1. Here, it is assumed that the highest level of authentication is required.
- the transmission unit 1 1 1 performs an authentication process based on the authentication request received via the D-IZF 1 2 3.
- the authentication method can be performed by, for example, the method described in the above-described embodiment. At this time, a common key Kab shared by both the transmitting unit and the receiving unit is obtained. Also, the authenticated level at this time is passed to the level determination means 122.
- the authenticating means 133 sends all levels to the sending unit 111 because the authentication level is the highest.
- Request a Kex there are three levels of Kex: a high-level M page, for copy-never (Kexl);
- the level determination means 122 determines the request level received from the authentication means 122 based on the authenticated level, and determines whether or not the request can be passed.
- the Kex (in this case, Kexl, Kex2, Kex3) is encrypted with the Kab shared by both parties, and transmitted to the receiving unit 130 through the authentication means 121.
- the authentication means 133 decrypts the encrypted Kab (Kexl, Kex2, Kex3) with its own Kab and stores it in the Kex storage means 1337.
- the Kex of each level where the Kex generation means 1 1 5 has occurred that is, Kexl , Kex2, and Kex3 are stored in the Kex storage means 116, and the seeds generated by the seed generation means 117 are stored in the seed storage means 118.
- the Kco calculating means 119 is used for each Kco, that is, for copy_never (Kcol ), Copy one once (Kco2) and no one more one for copy (Kco3) are calculated and stored in the Kco storage means 114.
- the encrypting means A, B 112, 113 encrypt the digital AV data using Kco corresponding to the importance of the content of each data and transmit it to the receiving unit 130.
- the seed request command issuing means 135 sends the seed request command to the transmission unit 111. Then, in the transmission unit 111, the seed request command response means 120 retrieves the seed from the seed storage means 118 and transmits it to the reception unit 130.
- the seed storage means 1 18 in the figure includes the current seed and the next seed because the Kco for encryption is constantly changing.
- the seed request command issuing means 135 receives the seed received from the sending unit 111 and the Kex corresponding to the level of the data to be decrypted stored in the Kex storage means.
- the Kco calculation means 1336 uses the same function as the sending unit 111 (this function is assumed to be available to the sending unit and the receiving unit in advance and cannot be obtained by a third party)
- C Decryption means 1332 decrypts the encrypted digital AV data into normal digital AV data using the calculated Kco.
- the data to be used changes or changes from data 1 with high content importance (for example, a movie) to data 2 with low content (for example, a sports program, etc.)
- Select the required Kex from among them and calculate and use Kco There is no need to request Kex as well as new authentication procedures.
- the above-mentioned method is to acquire all available Kex at once following the certification procedure. However, a method as shown in Fig. 12 may be used.
- the request level determining means 134 determines the required authentication level based on the content importance of the received data, and passes it to the authenticating means 133.
- the authentication means 13 3 issues an authentication request to the transmitting unit via D-I / F 13 1. Here, it is assumed that the highest level of authentication is required.
- the transmission unit 1 1 1 performs an authentication process based on the authentication request received via the D-I / F 1 2 3.
- the authentication method can be performed by, for example, the method described in the above-described embodiment. At this time, a common key Kab shared by both the transmitting unit and the receiving unit is obtained. Also, the authenticated level at this time is passed to the level determination means 122.
- the authentication means 133 requests the transmission unit 111 for the Kex having the highest authentication level.
- three levels of Kex are used in descending order: for copy—neVer (exl), for coy-onece (Kex2), and for no-more-copy (Kex3).
- the level determination means 122 determines the request level received from the authentication means 122 based on the authenticated level, and determines whether or not the request can be passed.
- the Kex (in this case, Kexl) is encrypted with the Kab shared by both parties, and transmitted to the receiving unit 130 via the authentication means 122.
- the authentication means 133 decrypts the encrypted Kab (Kex 1) with its own Kab and stores it in the Kex storage means 13 37.
- the seed request command issuing means 135 sends the seed request command to the sending unit 111.
- the seed request command responding means 120 retrieves the seed from the seed storage means 118 and transmits it to the receiving unit 130.
- the seed request command issuing means 13 5 receives the seed from the sending unit 11 1 and the Kex (Kex) corresponding to the level of the data to be decrypted stored in the Kex storage means.
- the Kco calculation means 1 3 6 uses the same function as the transmitting unit 1 1 1 (this function is provided in advance by the transmitting unit and the receiving unit and cannot be obtained by a third party) ) To calculate Kco (Kcol).
- the decryption means 13 2 decrypts the encrypted digital AV data into normal digital AV data using the calculated Kcol.
- the level determination means 122 determines the requested Kex level via the authentication means 122 based on the authenticated level, and the same level as the authenticated level, or If the request is at a lower level, the requested Kex (Kex2) is encrypted with Kab and transmitted to the receiving unit 130.
- the authenticated level (the highest level among the authenticated and authenticated levels may be stored) is stored.
- the desired Kex can be obtained without authentication from the stored authenticated level, for example, it can be obtained by determining with authentication means 13 3 If you ask for Kex Good. At this time, if it is not available, a new high-level authentication may be performed. Therefore, if the request level determined by the request level determining means 1 3 4 based on the content importance of the digital AV data is equal to or lower than the past certified level recorded in the memory, In this case, the desired Kex is requested from the authentication means 1 3 3.
- the sending unit 111 if there is no authentication request and there is a request for Kex, and it is determined that the requested Kex cannot be sent, information indicating that new authentication is required is sent.
- a method of notifying the receiving unit 130 may be used.
- the authentication means 133 decrypts Kab (Kex2) and stores it in the Kex storage means 133, and the Kco calculating means 133 calculates Kco2 using the Kex2 and the seed. To decrypt the data.
- this method once certification at a certain level has been completed, if a Kex of the same level or lower is obtained, there is no need to perform a new certification procedure. The number of such authentication procedures will be reduced.
- the level of the authentication procedure is set to two levels.
- the present invention is not limited to this.
- the content has three levels of importance.
- the present invention is not limited to this.
- c 0 py — fr e e (contents that can be recorded as many times as possible) may be added to four types, or more types.
- the configuration is realized by a method of calculating a key for encryption by a function using a seed and a No. key, but the present invention is not limited to this, and other embodiments may be used. You may apply to the structure using the method demonstrated.
- the type of Kex to be requested is determined by looking at the importance of the data being received, but all the Kex that may be received by the user are acquired in advance. You may leave.
- the receiving unit requests the Kex, but the present invention is not limited to this.
- the sending unit for the type of Kex that you want to receive, and when the authentication is completed, the sending unit automatically sends the requested Kex to the receiving unit. May be sent.
- the encryption key is changed according to the importance of data.
- the encryption key may be changed according to the type of data. Les ,. In this case, it is necessary to make the authentication level correspond to the type of data (that is, encryption key).
- FIG. 13 is a schematic view of the sixth embodiment of the present invention.
- the digital AV data transmission unit 140 having the functions of Fu 11 authentication and Restricted authentication (hereinafter abbreviated as Rest authentication) has a digital AV data receiving unit 150 having only the Rest authentication function.
- Rest authentication is a high-level authentication method using, for example, a public key and a private key
- Rest authentication is, for example, a normal authentication method using a common key. .
- the digital AV data transmission unit 140 includes encryption means 141 for encrypting data, Fu 11 authentication storing means 143 for storing rules for Fu 11 authentication, and rules for Rest authentication.
- CRL Content Revocation List: unauthorized device list for elimination of unauthorized devices
- CRL storage means 144 for storing CRLs as management criteria.
- Sender-side authentication selection means 147 which selects an authentication rule in response to an authentication request
- a switching means 148 which switches between Fu 1 ⁇ authentication and Rest authentication according to the selection result of the sender-side authentication selection means 1 47
- Authentication means 146 for authenticating with the receiving unit according to the selected authentication rule, and for exchanging information such as an encrypted data authentication request with the receiving unit D—I / ⁇ (digital interface And it is configured from the scan) 145.
- the CRL is added to the input data and updated as needed with new contents.
- the digital AV data receiving unit 150 exchanges information such as encrypted data and an authentication request with the transmitting unit.
- D—I / F 151 decrypts the encrypted data received from the transmitting unit.
- Decryption means 1 52 transmission It comprises an authentication requesting unit 153 for making an authentication request to the unit and an authentication unit 154 for performing authentication by the Rest authentication rule.
- the digital AV data receiving unit 160 exchanges information such as encrypted data and an authentication request with the transmitting unit.
- the digital AV data receiving unit 160 receives the digital AV data from the transmitting unit, and decrypts the encrypted data received from the transmitting unit.
- the above-mentioned CRL is sent from the management center, but to obtain it, use the function of Fu 11 authentication. For this reason, CRLs cannot be obtained from devices that have only the Rest authentication function. Therefore, devices that have only the Rest authentication function cannot exclude devices by CRL checking.
- a procedure using the CRL check will be described for a case where both the transmitting unit and the receiving unit have the Fu11 authentication function and the Rest authentication function.
- FIG. 15 is a diagram obtained by adding a CRL check to the authentication method using the public key and the secret key shown in FIG.
- the sender sends the IDa for identifying the unit and the signature A for that IDa from the management center (license facility) to the sender, and the receiver sends the ID of the unit from the management center to the receiver. It is assumed that the ID b for identification and the signature B for the IDb have been sent. Also, in this case, the receiver It has Sb and public key Pb. The sender has a secret key S a and a public key P a.
- the receiving side generates a random number B.
- the receiving side sends the IDb and signature B, which are its own identification number, and the ciphertext Sb (B), which is a random number B encrypted with its own secret key Sb, to the transmitting side.
- the sender retrieves the receiver's public key Pb by searching from the receiver's identification number IDb.
- the ciphertext S b (B) is decrypted with the obtained public key P.
- a random number B is obtained as in step 50.
- the transmitting side performs a CRL check on the IDb of the receiving side. That is, it is checked whether or not ID b is in CRL. If not, a random number A is generated in step 52. If it is in the CRL, the authentication is stopped as an unauthorized device.
- the random numbers A and B are encrypted with the sender's secret key Sa to create a ciphertext S a (A, B).
- the transmitting side transmits the ciphertext S a (A, B) and its own identification number I Da to the receiving side.
- the receiver receives the ciphertext S a (A, B) and the sender's identification number IDa, retrieves the sender's identification number IDa to obtain the sender's public key Pa, and proceeds to step 42.
- the ciphertext S a (A, B) is decrypted with Pa.
- a random number B exactly identical to the random number B sent in step 41 is obtained on the receiving side, and the receiving side knows that no forgery or tampering has been performed.
- step 43 the receiving side encrypts the random number A with the receiving side's secret key Sb to create a ciphertext Sb (A).
- S b (A) is sent to the sender, and decrypts the ciphertext S b (A) with the receiver's public key P b that the sender already has, as in step 53.
- the receiving side performs a CRL check on IDa of the transmitting side in step 44. If the IDa is in the CRL, the authentication is stopped. Otherwise, the process proceeds to the next step.
- the third party other than the receiving side and the transmitting side is assumed.
- random numbers A and B are secret random numbers. Therefore, on the transmitting side, as in step 54, a key Kab is created using random numbers A and B. Similarly, the key K a b is created on the receiving side using the random numbers A and B, as in step 45.
- the two K abs are exactly the same and are a common key.
- the sender creates a key Kex as in step 55. This is encrypted with the common key Kab, and the ciphertext Kab (Kex) is created and sent to the receiver.
- the receiver decrypts the ciphertext K ab (Kex) with the common key K ab to obtain Kex, as shown in step 46.As a result, the key Kex obtained by the receiver and the key Kex at the sender are identical. Yes, it is a common key.
- a key Kco is created on the transmitting side as in step 56. The key Kco is encrypted with the common key Kex and sent to the receiver as ciphertext Kex (Kco).
- the receiving side decrypts the ciphertext Kex (Kco) with the common key Kex as in step 47, and obtains Kco as in step 48.
- Kco ciphertext Kex
- the key Kco on the transmitting side and the Kco on the receiving side are exactly the same and are common keys. The above is the work key Kco obtained in the authentication process using the public key and the private key.
- the CRL check is performed before the generation of the random number A in step 52, but may be performed anywhere after receiving IDb. Create a KAB according to the standard After step 54.
- the receiving side is given the IDb and the signature B of the receiving unit from the management center, and the transmitting side and the receiving side have the common key S.
- This symmetric key is given only to authorized persons.
- the receiving side generates two random numbers A 1 and A 2 as in step 30, encrypts it with the common key S, creates a ciphertext S (A1A2), and sends it to the transmitting side along with I Db and signature B.
- the transmitting side decrypts the ciphertext S (A1 A2) with the common key S as in step 35.
- CRL check is performed on IDb on the receiving side. Also check signature B. At this time, if there is an abnormality in either the CRL check or the signature B check, cancel the authentication.
- a random number A1 and a random number A2 are obtained as in step 37.
- the sender sends the random number A2 to the receiver.
- the receiver has two random numbers A1 and A2 as in step 31. If the random number A2 generated in step 30 and the random number A2 received from the transmitting side in step 31 are exactly the same, it is known that forgery or tampering has not been performed on the transmitting side. If the two random numbers are different, forgery or tampering has been performed, and authentication will fail.
- the sender generates random numbers B1 and B2 as in step 38, encrypts them, and sends the ciphertext S (B1B2) to the receiver.
- the receiving side decrypts the ciphertext S (B1B2) using the common key S as in step 32. Then, as in step 33, random number B 1 and B 2 are obtained.
- the receiving side sends the random number B2 to the transmitting side.
- the sender has random numbers B1 and B2 as in step 39. If the random number B 2 generated in step 38 is the same as the random number B 2 received from the receiving side in step 39, the receiving side knows that forgery or tampering has not been performed, and the authentication succeeds. If the above two random numbers are different, forgery or tampering has been performed, and the authentication fails.
- random numbers A1 and B1 are random numbers that are secret to third parties other than the sender and receiver.
- the transmitting side generates the key Kco from the IDb, the random number A1, and the random number B1 in step 40.
- a key Kco is created from I Db and the random number A1 and the random number B1 as in step 34 ⁇
- the key Kco on the transmitting side and the key Kco on the receiving side are exactly the same and serve as a common key. I have.
- the above is the work key Kco obtained in the authentication process using the common key. According to this method, since IDb and signature B correspond, even if IDb is stolen and the CRL check on the transmitting side passes, illegal use can be prevented by checking with signature B.
- the ID for the CRL for example, a 40-bit device ID is used. This means that all 1394 C P devices have a 40-bit device ID, regardless of Full or Rest authentication.
- the signature is created at the management center using the ID, but this ID is arbitrarily determined by the management center. Furthermore, in order to enhance safety, a NU ID, which is a device-specific identifier that is embedded in each device in advance when the device is manufactured, is used. That is, the receiver informs the NU ID of the device when applying to the management center, and the management center sends the NU ID A signature is created using the CRL ID and the CRL ID, and the CRL ID and signature are given to the receiver.
- F u11 and Rest two types of authentication rules are used: F u11 and Rest.
- the types of authentication rules are not limited to this. If the device side does not have a CRL, the same applies as above.
- each component of the present invention may be realized by a dedicated hardware circuit or device for realizing each function, or may be realized by software using a computer.
- the present invention does not require much time for authentication of non-essential data.
- the authentication is resistant to forgery or tampering, and the authentication is required by the unit.
- the strictness it is possible to provide a unit, a system, and the like that can transmit and receive data by an appropriate authentication method in consideration of the importance of data and the type of authentication method of the partner device.
- the present invention has the advantage that the number of authentications can be reduced when obtaining a plurality of types of decryption information according to the importance of the content.
- the present invention can be applied to a receiving device that does not have an exclusion function. Can be eliminated.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
- Communication Control (AREA)
- Computer And Data Communications (AREA)
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/403,071 US7106861B1 (en) | 1998-02-13 | 1999-02-08 | Digital AV data transmitting unit, digital AV data receiving unit, digital AV data transmitting/receiving unit, and medium |
EP99902852A EP0977436A4 (en) | 1998-02-13 | 1999-02-08 | DIGITAL AUDIOVIDEO (AV) DATA TRANSMISSION UNIT, AV DIGITAL DATA RECEIVING UNIT, AV DATA TRANSMISSION / RECEIVING UNIT AND MEDIUM |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP10/31847 | 1998-02-13 | ||
JP3184798 | 1998-02-13 | ||
JP10/151586 | 1998-06-01 | ||
JP15158698 | 1998-06-01 | ||
JP10/224825 | 1998-08-07 | ||
JP10224825A JP2000059323A (ja) | 1998-02-13 | 1998-08-07 | デジタルavデータ送信ユニット、デジタルavデータ受信ユニット及び、デジタルavデータ送受信システム、媒体 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999041910A1 true WO1999041910A1 (fr) | 1999-08-19 |
Family
ID=27287495
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP1999/000533 WO1999041910A1 (fr) | 1998-02-13 | 1999-02-08 | Unite de transmission de donnees audiovideo (av) numeriques, unite de reception de donnees numeriques av, unite de transmission/reception de donnees av et support |
Country Status (5)
Country | Link |
---|---|
US (1) | US7106861B1 (ja) |
EP (1) | EP0977436A4 (ja) |
JP (1) | JP2000059323A (ja) |
CN (1) | CN1175614C (ja) |
WO (1) | WO1999041910A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8458458B2 (en) | 1999-08-20 | 2013-06-04 | Sony Corporation | Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
MY132414A (en) | 1998-04-14 | 2007-10-31 | Hitachi Ltd | Reproducing apparatus, recording apparatus and display apparatus |
JP3984749B2 (ja) * | 1998-04-14 | 2007-10-03 | 株式会社日立製作所 | 認証方法、データ処理装置 |
US7607022B1 (en) * | 1999-06-11 | 2009-10-20 | General Instrument Corporation | Configurable encryption/decryption for multiple services support |
JP2001308849A (ja) * | 2000-02-14 | 2001-11-02 | Victor Co Of Japan Ltd | コンテンツ伝送システム、認証機器、コンテンツ取扱装置、データ伝送方法、伝送媒体、信頼度判定装置、信頼度被判定装置、記録媒体 |
EP2290944B1 (en) | 2000-04-04 | 2014-08-13 | Sony Corporation | Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transfer |
JP4538909B2 (ja) * | 2000-06-15 | 2010-09-08 | ソニー株式会社 | データ記憶装置および情報処理装置 |
JP5464084B2 (ja) * | 2000-07-06 | 2014-04-09 | ソニー株式会社 | 送信装置、送信方法、受信装置、受信方法、記録媒体および通信システム |
JP4973899B2 (ja) | 2000-07-06 | 2012-07-11 | ソニー株式会社 | 送信装置、送信方法、受信装置、受信方法、記録媒体、および通信システム |
WO2002037493A1 (en) | 2000-10-31 | 2002-05-10 | Sony Corporation | Apparatus and method for recording/reproducing audio data embedded with additive information |
US20030236985A1 (en) * | 2000-11-24 | 2003-12-25 | Nokia Corporation | Transaction security in electronic commerce |
JP4174191B2 (ja) * | 2001-04-19 | 2008-10-29 | 日本電気株式会社 | 著作権保護システム及びその方法 |
JPWO2003013068A1 (ja) * | 2001-07-30 | 2004-11-25 | ソニー株式会社 | 無線通信システム、無線通信制御装置及び無線通信制御方法、記憶媒体、並びにコンピュータ・プログラム |
HUP0401720A2 (hu) * | 2001-09-27 | 2005-07-28 | Matsushita Electric Industrial Co., Ltd. | Kódoló, dekódoló, és titkos kulcsot képző eszközé és eljárás, valamint eszközkészlet szerzői jog védelmére és távközlési eszköz titkosított összeköttetés létesítésére |
JP3617500B2 (ja) | 2002-03-15 | 2005-02-02 | セイコーエプソン株式会社 | ネットワークを介した印刷 |
US7392375B2 (en) * | 2002-09-18 | 2008-06-24 | Colligo Networks, Inc. | Peer-to-peer authentication for real-time collaboration |
JP4275629B2 (ja) * | 2003-01-14 | 2009-06-10 | パナソニック株式会社 | データ送受信装置、画像処理装置、及び、画像処理方法 |
JP4300832B2 (ja) | 2003-03-14 | 2009-07-22 | ソニー株式会社 | データ処理装置、その方法およびそのプログラム |
US20040252973A1 (en) * | 2003-06-10 | 2004-12-16 | Samsung Electronics Co., Ltd. | System and method for audio/video data copy protection |
CN1601958B (zh) * | 2003-09-26 | 2010-05-12 | 北京三星通信技术研究有限公司 | 基于cave算法的hrpd网络接入认证方法 |
JP4580871B2 (ja) * | 2003-12-11 | 2010-11-17 | パナソニック株式会社 | パケット送信装置 |
EP1637957A1 (en) * | 2004-09-21 | 2006-03-22 | Deutsche Thomson-Brandt Gmbh | Method and apparatus for accessing protected data |
JP4763368B2 (ja) * | 2005-07-12 | 2011-08-31 | パナソニック株式会社 | 通信カード、機密情報処理システム、機密情報転送方法およびプログラム |
JP4894254B2 (ja) * | 2005-07-14 | 2012-03-14 | ソニー株式会社 | 認証システム、認証装置、認証方法及び認証プログラム |
US7917142B2 (en) * | 2006-03-03 | 2011-03-29 | Samsung Electronics Co., Ltd. | Comprehensive registration method for wireless communication system |
JP2008131557A (ja) * | 2006-11-24 | 2008-06-05 | Matsushita Electric Ind Co Ltd | 映像音声出力機器、認証処理方法及び映像音声処理システム |
JP4953850B2 (ja) * | 2007-02-09 | 2012-06-13 | シャープ株式会社 | コンテンツ出力システム、携帯通信端末およびコンテンツ出力装置 |
JP4603570B2 (ja) * | 2007-09-03 | 2010-12-22 | 富士通株式会社 | 通信システムおよび通信方法 |
JP4791521B2 (ja) * | 2008-12-08 | 2011-10-12 | 富士通株式会社 | 受信機および受信機により実行される方法 |
JP4791583B2 (ja) * | 2010-03-26 | 2011-10-12 | 富士通株式会社 | 通信システム |
JP5129834B2 (ja) * | 2010-03-26 | 2013-01-30 | 富士通株式会社 | 送信機及び送信機により実行される方法 |
JP4791584B2 (ja) * | 2010-03-26 | 2011-10-12 | 富士通株式会社 | 受信機 |
JP4843729B2 (ja) * | 2010-09-06 | 2011-12-21 | 富士通株式会社 | 通信システム |
JP2012054979A (ja) * | 2011-10-12 | 2012-03-15 | Fujitsu Ltd | 送信機及び送信機により実行される方法 |
CN104902324A (zh) * | 2015-06-26 | 2015-09-09 | 深圳市九洲电器有限公司 | 个人视频录制文件保护方法及系统 |
JP6288219B1 (ja) * | 2016-11-18 | 2018-03-07 | Kddi株式会社 | 通信システム |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS59210782A (ja) * | 1983-05-13 | 1984-11-29 | Matsushita Electric Ind Co Ltd | テレビジヨン装置 |
JPH06276188A (ja) * | 1993-03-22 | 1994-09-30 | Toshiba Corp | 電子通信装置 |
JPH08214090A (ja) * | 1995-02-07 | 1996-08-20 | Ekushingu:Kk | 情報提供システム |
JPH09107350A (ja) * | 1995-10-09 | 1997-04-22 | Matsushita Electric Ind Co Ltd | 機器間通信保護装置 |
JPH10224752A (ja) * | 1997-02-10 | 1998-08-21 | Sony Corp | オーディオ・ビデオ信号の送信装置、受信装置、送受信装置及び伝送装置、並びに、オーディオ・ビデオ信号の送信方法、受信方法、送受信方法及び伝送方法 |
JPH10302393A (ja) * | 1997-04-24 | 1998-11-13 | Toshiba Corp | 不正コピーを防止する方法、及びその半導体装置並びにディジタル記録再生システム |
JPH10304333A (ja) * | 1997-02-28 | 1998-11-13 | Matsushita Electric Ind Co Ltd | デジタル著作物の著作権保護のための暗号技術利用プロトコルを複数から選択して使用する情報機器 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5144664A (en) * | 1990-11-16 | 1992-09-01 | General Instrument Corporation | Apparatus and method for upgrading terminals to maintain a secure communication network |
US5655077A (en) * | 1994-12-13 | 1997-08-05 | Microsoft Corporation | Method and system for authenticating access to heterogeneous computing services |
JPH08297638A (ja) | 1995-04-26 | 1996-11-12 | Nippon Telegr & Teleph Corp <Ntt> | 利用者認証方式 |
US5724423A (en) * | 1995-09-18 | 1998-03-03 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for user authentication |
KR100254029B1 (ko) * | 1995-10-09 | 2000-04-15 | 모리시타 요이찌 | 데이터 전송장치 및 데이터전송방법 |
EP0880840A4 (en) * | 1996-01-11 | 2002-10-23 | Mrj Inc | DEVICE FOR CONTROLLING ACCESS AND DISTRIBUTION OF DIGITAL PROPERTY |
EP0860823A4 (en) * | 1996-07-15 | 2001-05-02 | Toshiba Kk | DEVICE WITH DIGITAL INTERFACE, NETWORK SYSTEM WITH THIS DEVICE AND COPY PROTECTION PROCEDURE |
US6182215B1 (en) * | 1997-02-28 | 2001-01-30 | Matsushita Electric Industrial Co., Ltd. | Information devices which select and use one out of plurality of encryption utilization protocols for protecting copyrights of digital productions |
US5948136A (en) * | 1997-07-30 | 1999-09-07 | Sony Corporation | Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network |
-
1998
- 1998-08-07 JP JP10224825A patent/JP2000059323A/ja active Pending
-
1999
- 1999-02-08 US US09/403,071 patent/US7106861B1/en not_active Expired - Fee Related
- 1999-02-08 WO PCT/JP1999/000533 patent/WO1999041910A1/ja active Application Filing
- 1999-02-08 CN CNB998004820A patent/CN1175614C/zh not_active Expired - Lifetime
- 1999-02-08 EP EP99902852A patent/EP0977436A4/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS59210782A (ja) * | 1983-05-13 | 1984-11-29 | Matsushita Electric Ind Co Ltd | テレビジヨン装置 |
JPH06276188A (ja) * | 1993-03-22 | 1994-09-30 | Toshiba Corp | 電子通信装置 |
JPH08214090A (ja) * | 1995-02-07 | 1996-08-20 | Ekushingu:Kk | 情報提供システム |
JPH09107350A (ja) * | 1995-10-09 | 1997-04-22 | Matsushita Electric Ind Co Ltd | 機器間通信保護装置 |
JPH10224752A (ja) * | 1997-02-10 | 1998-08-21 | Sony Corp | オーディオ・ビデオ信号の送信装置、受信装置、送受信装置及び伝送装置、並びに、オーディオ・ビデオ信号の送信方法、受信方法、送受信方法及び伝送方法 |
JPH10304333A (ja) * | 1997-02-28 | 1998-11-13 | Matsushita Electric Ind Co Ltd | デジタル著作物の著作権保護のための暗号技術利用プロトコルを複数から選択して使用する情報機器 |
JPH10302393A (ja) * | 1997-04-24 | 1998-11-13 | Toshiba Corp | 不正コピーを防止する方法、及びその半導体装置並びにディジタル記録再生システム |
Non-Patent Citations (3)
Title |
---|
ENDOH N: "DIGITAL TRANSMISSION CONTENT PROTECTION FOR IEEE1394 HIGH SPEED SERIAL BUS", COMPUTER SECURITY SYMPOSIUM, XX, XX, vol. 98, no. 12, 1 January 1998 (1998-01-01), XX, pages 119 - 124, XP002925190 * |
NIKKEI ELECTRONICS, NIKKEI BUSINESS PUBLICATIONS, TOKYO, JP, no. 696, 1 August 1997 (1997-08-01), JP, pages 20, XP002925189, ISSN: 0385-1680 * |
See also references of EP0977436A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8458458B2 (en) | 1999-08-20 | 2013-06-04 | Sony Corporation | Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method |
US9390254B2 (en) | 1999-08-20 | 2016-07-12 | Sony Corporation | Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method |
Also Published As
Publication number | Publication date |
---|---|
CN1175614C (zh) | 2004-11-10 |
CN1263669A (zh) | 2000-08-16 |
US7106861B1 (en) | 2006-09-12 |
EP0977436A1 (en) | 2000-02-02 |
JP2000059323A (ja) | 2000-02-25 |
EP0977436A4 (en) | 2000-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1999041910A1 (fr) | Unite de transmission de donnees audiovideo (av) numeriques, unite de reception de donnees numeriques av, unite de transmission/reception de donnees av et support | |
US5557765A (en) | System and method for data recovery | |
JP3526521B2 (ja) | 機器認証システム | |
US5949877A (en) | Content protection for transmission systems | |
US6842523B1 (en) | Encryption apparatus, cryptographic communication system, key recovery system, and storage medium | |
US7139918B2 (en) | Multiple secure socket layer keyfiles for client login support | |
EP0755598B1 (en) | Computer network cryptographic key distribution system | |
US6542610B2 (en) | Content protection for digital transmission systems | |
US7996322B2 (en) | Method of creating domain based on public key cryptography | |
EP0930556A2 (en) | Information processing apparatus, methods and systems and providing media | |
US7574602B2 (en) | Information-processing device, information-processing method, and information-processing program product | |
JPH1056448A (ja) | 情報伝達方法、通信装置、及び記憶媒体 | |
JP2004533194A (ja) | データを交換するように構成されたデバイスおよび認証の方法 | |
US20020118838A1 (en) | Copy protection method and system for digital media | |
WO1995027355A1 (en) | Electronic proof of receipt | |
TW200541285A (en) | A secure key authentication and ladder system | |
US20060106721A1 (en) | Method for retransmitting or restoring contents key for decrypting encrypted contents data | |
US6396929B1 (en) | Apparatus, method, and computer program product for high-availability multi-agent cryptographic key recovery | |
JP2005506770A (ja) | スクランブルされたデータに対するアクセスを制御するためのリモート管理用対話型プロトコル | |
US20020169973A1 (en) | Copy protection method and system for digital media | |
JP2009505243A (ja) | 取り消し情報管理 | |
KR101020342B1 (ko) | 디지털 컨텐츠 분배 시스템 | |
KR100927920B1 (ko) | 제1 도메인의 암호화 데이터를 제2 도메인에 속하는네트워크에서 수신하여 처리하기 위한 방법 | |
JPH1032568A (ja) | 暗号化伝送方法 | |
US6877092B2 (en) | Apparatus, method, and computer program product for achieving interoperability between cryptographic key recovery enabled and unaware systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99800482.0 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999902852 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 09403071 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1999902852 Country of ref document: EP |