WO2000049510A1 - Dispositif et procede de traitement de l'information et support de memorisation de programme - Google Patents
Dispositif et procede de traitement de l'information et support de memorisation de programme Download PDFInfo
- Publication number
- WO2000049510A1 WO2000049510A1 PCT/JP2000/000904 JP0000904W WO0049510A1 WO 2000049510 A1 WO2000049510 A1 WO 2000049510A1 JP 0000904 W JP0000904 W JP 0000904W WO 0049510 A1 WO0049510 A1 WO 0049510A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- storage
- content
- program
- key
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 236
- 230000010365 information processing Effects 0.000 title claims description 69
- 239000004065 semiconductor Substances 0.000 claims abstract description 15
- 238000012545 processing Methods 0.000 claims description 171
- 230000008569 process Effects 0.000 claims description 169
- 238000004891 communication Methods 0.000 claims description 76
- 238000004364 calculation method Methods 0.000 claims description 63
- 230000006835 compression Effects 0.000 claims description 54
- 238000007906 compression Methods 0.000 claims description 51
- 238000009825 accumulation Methods 0.000 claims description 46
- 238000012546 transfer Methods 0.000 claims description 46
- 238000007726 management method Methods 0.000 claims description 37
- 230000006870 function Effects 0.000 claims description 28
- 238000003672 processing method Methods 0.000 claims description 15
- 238000006243 chemical reaction Methods 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000013500 data storage Methods 0.000 claims description 2
- 238000012937 correction Methods 0.000 claims 19
- 238000012790 confirmation Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 20
- 230000004044 response Effects 0.000 description 17
- 230000005236 sound signal Effects 0.000 description 6
- 238000013478 data encryption standard Methods 0.000 description 5
- XAGFODPZIPBFFR-UHFFFAOYSA-N aluminium Chemical compound [Al] XAGFODPZIPBFFR-UHFFFAOYSA-N 0.000 description 4
- 229910052782 aluminium Inorganic materials 0.000 description 4
- 238000013523 data management Methods 0.000 description 4
- 230000006837 decompression Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000010355 oscillation Effects 0.000 description 4
- 239000013078 crystal Substances 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- 230000003071 parasitic effect Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 230000003321 amplification Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000014759 maintenance of location Effects 0.000 description 2
- 238000003199 nucleic acid amplification method Methods 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 230000001681 protective effect Effects 0.000 description 2
- 230000005855 radiation Effects 0.000 description 2
- 239000000523 sample Substances 0.000 description 2
- 241000282326 Felis catus Species 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 244000309464 bull Species 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 229940048662 kwai Drugs 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/02—Digital computers in general; Data processing equipment in general manually operated with input through keyboard and computation using a built-in program, e.g. pocket calculators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/40—Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
- G06F16/48—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/489—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using time information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9014—Indexing; Data structures therefor; Storage structures hash tables
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/109—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
- G11B20/00181—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software using a content identifier, e.g. an international standard recording code [ISRC] or a digital object identifier [DOI]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00789—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of functional copies, which can be accessed at a time, e.g. electronic bookshelf concept, virtual library, video rentals or check-in/check out
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00797—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of times a content can be reproduced, e.g. using playback counters
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/0084—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific time or date
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00855—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00007—Time or data compression or expansion
- G11B2020/00014—Time or data compression or expansion the compressed signal being an audio signal
- G11B2020/00043—Adaptive transform acoustic coding [ATRAC]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00007—Time or data compression or expansion
- G11B2020/00014—Time or data compression or expansion the compressed signal being an audio signal
- G11B2020/00057—MPEG-1 or MPEG-2 audio layer III [MP3]
Definitions
- the present invention relates to an information processing apparatus, method, and program storage medium, and in particular, to prevent tampering and suppress unauthorized duplication.
- the present invention has been made in view of such a situation, and it is possible to reliably prevent a large number of illegal copies from being generated by analyzing and falsifying software-to-air. To make it possible.
- An information processing apparatus includes a storage unit for storing content data, a control unit including software for controlling storage or reading of the content data to and from the storage unit, and an encryption supplied from the control unit.
- An execution means provided on hardware independent of the control means for decoding and executing the program and supplying a result of the execution to the control means, wherein the control means, based on the execution result of the execution means, Controls the storage or readout of content to storage means It is characterized by doing.
- the storage means provided on hardware independent of the control means for decoding and executing the program and supplying a result of the execution to the control means, wherein the control means, based on the execution result of the execution means, Controls the storage or readout of content to storage means It is characterized by doing.
- the storage means is characterized by doing.
- control means can cause the execution means to execute a predetermined calculation based on the management information.
- control means may be a CPU
- the storage means may be a hard disk
- the execution means may be a CPU incorporated in a semiconductor IC separate from the CPU as the control means.
- control means includes a control step of controlling the accumulation or reading of the content data in the accumulation means based on the execution result of the execution means.
- a program stored in a program storage medium includes a control step of controlling storage or reading of content data in a storage unit based on an execution result of the execution unit.
- the information processing apparatus includes: an input unit for inputting content data; a storage unit for storing the data input by the input unit; Compression means for compressing the data stored in the storage means, encryption means for encrypting the data stored in the storage means by a predetermined method, and the data compressed by the compression means and encrypted by the encryption means. Control means for controlling storage or reading of the storage means.
- the information processing method includes an input step of inputting data, an accumulation step of accumulating data inputted by the processing of the input step, and a data step of accumulating data in the processing of the step.
- the program storage medium includes: an inputting step of inputting data; an accumulating step of accumulating data input by the input step processing; A compression method of compressing the data stored in the storage step by a predetermined method, an encryption step of encrypting the data stored in the storage step by a predetermined method, and a processing of the encryption step. And a control step for controlling the storage or reading of the data encrypted by the computer.
- the information processing comprises: input means for inputting the content data; storage means for storing the data input by the input means; and management information of the data stored in the storage means.
- Holding means for holding, a calculating means for performing a predetermined calculation based on the management information held in the holding means, a storing means for storing a calculation result of the calculating means, a calculation result of the calculating means, And a control means for comparing the result of the past operation stored in the storage means and controlling the use of the data stored in the storage means in accordance with the result of the comparison.
- the input step of inputting the data, the storage step of storing the data input by the processing of the input step, and the data stored in the processing of the storage step A holding step of holding the management information of the day and a calculating step of performing a predetermined calculation based on the management information held in the processing of the holding step; A storage step of storing the calculation result in the calculation step; comparing the calculation result in the calculation step with the past calculation result stored in the processing of the storage step; and storing the result in accordance with the comparison result.
- the program storage medium includes: an input step for inputting data; a storage step for storing the data input by the processing of the input step; and a data storage step for storing the data input in the processing of the storage step.
- a computer-readable program that causes the information processing apparatus to execute the processing including the step.
- the information processing apparatus includes: an exchange unit for exchanging data with another device; a holding unit for holding a predetermined fixed key and a storage key; When exchanging data with the other device, the authentication device generates a communication key by performing a mutual authentication process with the other device using the fixed key held in the holding device; and An encryption unit for encrypting a key with the storage key; and the communication key encrypted by the encryption unit, the data received by the exchange unit being encrypted by the communication key. And storage means for storing the data in association with.
- the information processing method may further include: a transmitting / receiving step of receiving data with another device; a holding step of holding a predetermined fixed key and a storage key; An authentication step of performing a mutual authentication process with the other device using the fixed key held in the processing of the holding step to generate a communication key; Encrypting with the storage key, and encrypting the data encrypted with the communication key received in the processing of the sending and receiving step, in the processing of the encryption step. And a storage step of storing the communication key in association with the communication key.
- the program storage medium includes: a sending / receiving step for sending / receiving data to / from another device; a holding step for holding a predetermined fixed key and a storage key; An authentication step of performing a mutual authentication process with the other device using the fixed key held in the processing of the holding step to generate a communication key; An encryption step of encrypting a communication key with the storage key, and the data encrypted with the communication key received in the processing of the transmitting and receiving step is encrypted in the processing of the encryption step.
- a computer-readable program for causing an information processing apparatus to execute a process including an accumulation step of accumulating the communication key and the communication key is stored.
- the information processing apparatus includes: a storage unit for storing data; a storage unit for storing a condition at the time of using the data stored in the storage unit; and a storage unit for storing the data.
- a determination unit that determines whether the other device can satisfy the conditions at the time of using the data; and a determination result of the determination unit.
- Transfer means for transferring the data stored in the storage means to the other device together with conditions for using the data stored in the storage means, based on the result.
- the information processing method may further comprise: an accumulation step of accumulating data; a retention step of retaining a condition at the time of using the data accumulated in the processing of the accumulation step; When transferring the data accumulated in the process to another device, a determining step of determining whether the other device can satisfy the condition for using the data overnight; a determination result in the determining step A transfer step of transferring the data stored in the storage step to the other device together with the conditions for using the data stored in the storage step based on the data stored in the storage step. It is characterized by.
- the program storage medium includes: an accumulation step of accumulating data; a retention step of retaining conditions for using the data accumulated in the processing of the accumulation step; and a processing of the accumulation step.
- Con Pugh is executed devices evening is characterized by storing the readable program (
- FIGURES M1 is a diagram showing an embodiment of the content overnight management system according to the present invention.
- FIG. 2 is a diagram illustrating a configuration of a personal computer in the content data management system.
- FIG. 3 is a diagram illustrating the configuration of a portable device in the content data management system.
- FIG. 4 is a pictorial diagram illustrating the functional configuration of the personal computer.
- FIG. 5 is a diagram showing an example of the display operation instruction window.
- FIG. 6 is a diagram illustrating an example of a window displayed on the display by the recording program.
- FIG. 7 is a flowchart illustrating a process when copying content from a compact disc to an HDD.
- FIG. 8 is a flowchart illustrating the deadline-based check process of step S12 in the flowchart of FIG.
- FIG. 9 is a diagram showing an example based on a deadline.
- FIG. 10 is a diagram illustrating a war mark.
- FIG. 11 is a diagram showing an example of a music database.
- FIG. 12 is a flowchart for explaining the operation of moving content from the HDD to the portable device.
- FIG. 13 is a flowchart illustrating an operation of moving content from the HDD to the portable device.
- FIG. 14 is a flowchart illustrating an operation of moving content from the HDD to the portable device.
- FIG. 15 is a flowchart for explaining the check processing such as the reproduction condition of the selected content in step S55 in the flowchart of FIG.
- FIG. 16 is a diagram for explaining playback conditions managed by the portable device.
- FIG. 17 is a flowchart for explaining the details of the format conversion processing in step S58 in the flowchart of FIG.
- FIG. 18 is a flowchart for explaining the operation when copying content from an HDD to a portable device.
- FIG. 19 is a flowchart for explaining the operation in the case of copying content from an HDD to a portable device.
- FIG. 20 is a flowchart for explaining the operation in the case of copying content from an HDD to a portable device.
- FIG. 21 is a flowchart for explaining the operation when content is moved from the portable device to the HDD.
- FIG. 22 is a flowchart for explaining the operation when copying content from the portable device to the HDD.
- FIG. 23 is a flowchart illustrating a process when copying content from the EMD server to the HDD.
- FIG. 24 is a flowchart for explaining the details of the process related to charging in step S204 in the flowchart of FIG.
- FIG. 25 is a diagram for explaining a charging log.
- FIG. 26 is a flowchart describing the process when copying content from the IEC60958 terminal to the HDD at the personal convenience.
- FIG. 27 is a flowchart illustrating a process of copying content from the IEC 60958 terminal of the personal computer to H to DD.
- FIG. 28 is a flowchart illustrating an operation when content is output from the HDD to the IEC 60958 terminal.
- FIG. 29 is a flowchart illustrating an operation when content is output from the HDD to the IEC 60958 terminal.
- FIG. 30 is a flowchart illustrating the check processing of the reproduction condition and the like in step S275 in the flowchart of FIG.
- FIG. 31 is a flowchart for explaining the operation when the content is output from the HDD via the portable device.
- FIG. 32 is a flowchart illustrating an operation when outputting content from the HDD via a portable device.
- FIG. 33 is a diagram for explaining the function of the nonvolatile memory.
- FIG. 34 is a flowchart illustrating the operation of the adapter.
- FIG. 35 is a diagram showing the internal configuration of the adapter.
- FIG. 36A and FIG. 36B are diagrams illustrating an example of the internal configuration of the nonvolatile memory.
- FIG. 37 is a diagram showing an example of the internal configuration of the nonvolatile memory.
- FIG. 1 is a diagram showing an embodiment of a content data management system according to the present invention.
- the personal computer 1 is connected to a network 2 composed of a local area network or an Internet network.
- the personal computer 1 transmits a musical tone data (hereinafter, referred to as content) received from an EMD (Electrical Music Distribution) server 4-1 to 4-3 or read from a CD (Compact Disc) described later.
- the data is converted into a predetermined compression method (for example, ATR AC3 (trademark)) and is encrypted and recorded by an encryption method such as DES (Data Encryption Standard).
- a predetermined compression method for example, ATR AC3 (trademark)
- DES Data Encryption Standard
- the personal computer 1 records use condition data indicating the use condition of the content, corresponding to the content that has been encrypted and recorded.
- the number of portable devices (Portable Devices (also referred to as PDs)) that can simultaneously use the content corresponding to the usage condition data (so-called The number of PDs that can be checked out).
- the personal computer 1 can reproduce the content even when the content is checked out by the number indicated in the overnight of the use condition. Or, it indicates that the usage condition data can be copied.
- the personal computer 1 can reproduce the recorded content.
- the number of times that content can be stored in the portable devices 6-1 to 6-3 may be limited. In this case, the number of copies that can be made does not increase.
- Portable device 6 — 1 to 6— 3J After moving the contents, the contents recorded by Personal Combination 1 become unusable (contents are deleted or usage conditions are changed and cannot be used) .
- the personal computer 1 connects the encrypted recorded content together with the data related to the content (for example, song title or playback conditions) via a USB (Universal Sirial Bus) cable 7-1.
- a USB Universal Sirial Bus
- checkout In addition to storing the information in the stored device 6-1 and updating the data of the usage conditions corresponding to the stored content in response to the storage in the device 6-1 ( Hereinafter, this is referred to as checkout). More specifically, when the user checks out, the number of times that the personal computer 1 can check-out the data of the usage conditions corresponding to the content is reduced by one. If the number of checkouts is 0, the corresponding content cannot be checked out.
- the personal computer 1 stores the encrypted recorded content together with the data related to the content in the connected portable device 6-2 via the USB cable 7-2, and Updates the usage conditions corresponding to the stored content in response to the information stored in the overnight device 6-2.
- the personal computer 1 stores the encrypted and recorded content in the connected portable device 6-3 via the USB cable 7-3 together with the data related to the content, and the portable computer.
- Update the usage condition data corresponding to the stored content In response to memorizing in Device 6-3, Update the usage condition data corresponding to the stored content.
- the personal computer 1 erases the content checked out by the personal computer 1 to the portable device 6-1 connected to the portable device 6-1 via the USB cable 7-1 to the portable device 6-1. Then (or make it unusable), update the usage conditions corresponding to the deleted content (hereinafter, referred to as check-in). More specifically, when check-in is performed, the number of times that the personal computer 1 can check out the usage conditions of the corresponding content in a night is incremented by one.
- the personal computer 1 causes the portable device 6-2 connected via the USB cable 7-2 to delete the content checked out by the personal computer 1 to the portable device 6-2 (or to use the portable device 6-2). Update the usage conditions corresponding to the deleted content.
- the personal computer 1 causes the portable device 6-3 to delete the contents checked out by the portable device 6-3 to the portable device 6-3 via the USB cable 7-3 (or Update the usage condition data corresponding to the deleted content.
- the personal computer 1 cannot check in the content checked by another personal computer (not shown) on the portable device 6-1.
- the personal computer 1 cannot check in the content checked by another personal computer to the portable device 6-2.
- Personal computer 1 is a portable device 6-3 I cannot check in the checked out content.
- the EMD registration server 3 responds to the request of the personal computer 1 via the network 2 in response to the request of the personal computer 1. 1 transmits an authentication key required for mutual authentication between the EMD server 4-1 to 4-3 to the personal computer 1 and a program for connecting to the EMD server 4-1 to 4-3. Send to personal computer 1.
- the EMD server 411 sends the content to the personal computer 1 along with data related to the content (for example, a song title or playback restriction) via the network 2.
- the EMD server 4-2 supplies the content to the personal computer 1 via the network 2 together with the data related to the content in response to the request from the personal computer 1.
- the EMD server 413 supplies the content to the personal computer 1 via the network 2 together with the data related to the content in response to the request of the personal computer—evening 1.
- the content supplied by each of the EMD servers 4-1 to 4-3 is compressed by the same or different compression method.
- the content supplied by each of the EMD servers 4-1 to 4-3 is encrypted by the same or different encryption method.
- the WWW (World Wide Web) server 5-1 responds to the request of the personal computer 1 by sending a CD (for example, CD album name or CD sales) via the network 2 to the contents. Company And the like (for example, a song title or a composer name) corresponding to the content read from the CD.
- the WWW server 5-2 supplies the personal computer 1 with data corresponding to the CD from which the content has been read and the content read from the CD via the network 2.
- the portable device 6-1 stores the content supplied from the personal computer 1 (that is, the checked-out content) together with data related to the content (for example, a song name or a playback restriction).
- the portable device 6-1 reproduces the stored content based on the data related to the content and outputs the content to a headphone or the like (not shown).
- the portable device 6-1 stops playback of the corresponding content.
- the portable device 6-1 stops playing the corresponding content.
- the user removes the portable device 6-1 storing the content from the personal computer 1, carries it around, plays back the stored content, and listens to music corresponding to the content on a headphone or the like. Can be.
- the portable device 6-2 stores the content supplied from the personal computer 1 together with the data related to the content.
- Portable device 6—2 is a device related to content. Based on, the stored content is reproduced and output to a headphone (not shown) or the like. The user can remove the portable device 6-2 storing the content from the personal computer 1, carry it around, play back the stored content, and listen to music corresponding to the content on a headphone or the like. it can.
- the portable device 6-3 stores the contents supplied from the personal computer 1 together with the contents related to the contents.
- the portable device 6-3 reproduces the stored content based on the data related to the content and outputs the content to a headphone (not shown).
- the user can remove the portable device 6-3 storing the content from the personal computer 1, carry it around, play back the stored content, and listen to music corresponding to the content on a headphone or the like. .
- portable devices 6-1 to 6-3 are simply referred to as portable devices 6.
- FIG. 2 is a diagram illustrating the configuration of the personal computer 1.
- the CPU (Central Processing Unit) 11 actually executes various application programs (details will be described later) and an OS (Operating System).
- a ROM (Read-only Memory) 12 stores basically fixed data among programs used by the CPU 11 and parameters for calculation.
- a RAM (Random Access Memory) 13 stores a program used in the execution of the CPU 11 and parameters that change as appropriate in the execution.
- a host bus 14 composed of a CPU bus and the like.
- the host bus 14 is connected via a page 15 to an external bus 16 such as a PCI (Peripheral Component Interconnect / Interface) bus.
- PCI Peripheral Component Interconnect / Interface
- the keyboard 18 is operated by a user when inputting various commands to the CPU 11.
- the mouse 19 is operated by the user when indicating or selecting a point on the screen of the display 20.
- the display 20 is composed of a liquid crystal display device or a CRT (Cathode Ray Tube), and displays various information in text or images.
- An HDD (Hard Disk Drive) 21 drives a hard disk and records or reproduces a program or information to be executed by the CPU 11 on the hard disk.
- the drive 22 reads data or programs recorded on the mounted magnetic disk 41, optical disk 42 (including CD), magneto-optical disk 43, or semiconductor memory 44, and reads the data or program. , An external bus 16, a bridge 15, and a RAM 13 connected via a host bus 14.
- a portable device 6-1 is connected via a USB cable 7-1.
- the USB port 23-1 is connected to the data supplied from the HDD 21, the CPU 11, or the RAM 13 via the interface 17, the external bus 16, the bridge 15, or the host bus 14 (for example, Content or the command of portable device 6-1) to portable device 6-1.
- USB port 23-2 is connected to a portable device 6-2 via a USB cable 7-2.
- USB port 23_2 Data supplied from the HDD 21, CPU 11, or RAM 13 via the interface 17, external bus 16, bridge 15, or host node 14 (for example, Content or the command of portable device 6-2) to portable device 6-2.
- a portable device 6-3 is connected to the USB port 23-3 via a USB cable 7-3.
- USB port 23-3 is supplied from HDD 21, CPU 11, or RAM 13 via interface 17, external bus 16, bridge 15, or host bus 14. Output the data (for example, including the content or the command of the portable device 63) to the portable device 6-3.
- An I / O interface 24 having an IEC (International Electrotechnical Commission) 60095 terminal 24a executes digital audio input / output or analog audio input / output interface processing.
- the speaker 45 outputs a predetermined sound corresponding to the content based on the sound signal supplied from the sound input / output interface 24.
- interface 17 is connected to external bus 16, bridge 15 and host bus. It is connected to CPU 11 via 14.
- the communication unit 25 is connected to the network 2 and transmits the data (for example, a registration request or a content transmission request) supplied from the CPU 11 or the HDD 21 in a predetermined format. Stored in a packet of In addition to transmitting via the network 2, the data (for example, the authentication key or the content) stored in the said packet is transmitted via the network 2 to the CPU 11, the RAMI 3, or the HDD 21. Output to
- the CPU 32 of the adapter 26 integrally formed as a semiconductor IC and attached to the personal computer 1 cooperates with the CPU 11 of the personal computer 1 via the external bus 16, the page 15, and the host bus 14. Execute various processes.
- the RAM 33 stores programs and programs necessary for the CPU 32 to execute various processes.
- the non-volatile memory 34 stores data that needs to be retained even after the personal computer 1 is turned off.
- the ROM 36 stores a program for decrypting an encrypted program when it is transmitted from the personal computer 1.
- An RTC (Real Time Clock) 35 performs a clocking operation and provides time information.
- the communication unit 25 and the adapter 26 are connected to the CPU 11 via the external bus 16, the bridge 15, and the host bus 14.
- USB ports 23 when it is not necessary to distinguish the USB ports 23-1 to 23-3 individually, they are simply referred to as USB ports 23.
- USB cables 7-1 to 7.3 when it is not necessary to individually distinguish the USB cables 7-1 to 7.3, they are simply referred to as USB cables 7.
- the power supply circuit 52 drives the entire portable device 6 by converting a power supply voltage supplied from the dry cell 51 into internal power of a predetermined voltage and supplying the internal power to the CPU 53 to the display unit 67.
- the USB controller 57 When the USB controller 57 is connected to the personal computer 1 via the USB connector 56 via the USB connector 56 and the USB cable 7, the USB controller 57 transmits the data including the content transferred from the personal computer 1 to the internal bus 58. Via CPU 53
- the data transferred from the personal computer 1 consists of 64 bytes of data per packet, and is transferred from the personal computer 1 at a transfer rate of 12 Mbit / sec.
- the data transferred to the portable device 6 is composed of a header and content.
- the header stores the content ID, file name, header size, content key, file size, codec ID, file information, etc., as well as playback restriction data required for playback restriction processing, start date and time, end date and time, and frequency limit. And the number of playback times are stored.
- the content is encoded and encoded using an encoding method such as ATRAC3.
- the header size indicates the length of the header (eg, 33 bytes, etc.), and the file size indicates the length of the content (eg, 33, 636, 138 bytes, etc.).
- the content key is a key for decrypting the encrypted content, and is encrypted based on the session key (temporary key) generated in the mutual authentication process between the personal computer 1 and the portable device 6. Is transmitted from the personal computer 1 to the portable device 6.
- the mutual authentication process is, for example, a challenge-response authentication process.
- the DSP 59 of the portable device 6 executes a decryption (decryption) process when performing the challenge response type authentication process.
- the challenge-response method refers to, for example, a value (challenge) generated by the personal computer 1 using a secret key shared by the portable device 6 with the personal computer 1 (response). ).
- the value generated by the personal computer 1 changes every time the authentication process is performed.For example, the value generated by using the secret key output from the portable device 6 Is read out, and so-called spoofing attacks are performed, the personal computer 1 can detect fraud in the following mutual authentication processing because the values used for mutual authentication are different.
- the content ID is an ID for identifying the content corresponding to the content.
- the codec ID is an ID corresponding to the content encoding method.
- the codec ID "1" corresponds to ATRAC 3, and the codec IDs "0," are MP3 (MPEG). (Moving Picture Experts Gro up) Audio Layer-3).
- the file name is data obtained by converting a content file (described later) recorded on the personal computer 1 corresponding to the content into ASCII (American National Standard Code for Information Interchange) code, and the file information is included in the content.
- ASCII American National Standard Code for Information Interchange
- the playback restriction data is a data that indicates whether a period during which the content can be reproduced (that is, the start date and time or the end date and time) or a frequency limit (a restriction on the number of times of reproduction) is set. During the playback limit, "1" is assigned when the number of times limit is set, and “2" is assigned when the period during which playback is possible is set. If no period is set (so-called purchase), "0" is assigned.
- the start date and time and the end date and time are data indicating the range of the reproducible period when the reproduction limit is “2”. For example, if the start date and time is "0 0040 F" and the end date and time is "000070 F", the corresponding content can be played from April 15, 2000 to July 15, 2000. is there.
- the number of times limit and the number of times of reproduction are, when the number of times of reproduction restriction is "1" or "2", the number of times of reproduction is a predetermined number of times of reproduction corresponding to the content.
- the number of times of reproduction count indicates the number of times the content has been reproduced, which is updated by the CPU 53 when the process of reproducing the content is executed. For example, when the number of times limit is "02", the number of times that the content can be played is two, and when the number of plays count is "01", the number of times that the content is played is one. is there.
- the playback limit is “2”
- the start date and time is “00040F”
- the end date and time is “000070F”
- the number of times is “02”
- 6 means that the corresponding content will be available from April 15, 2000 to July 15, 2000. In addition, it can be played twice a day repeatedly.
- the playback limit data is "1”
- the start date and time is “0000 00”
- the end date and time is “000000”
- the count limit is "0a”
- the playback count is "05”.
- the corresponding content has no limit on the period during which it can be played, and the number of times that it can be played is 10 times, and the number of times it is played is 5 times.
- the CPU that executes the main program read from the ROM 55 to the RAM 54 is executed.
- the flash memory 61 has a storage capacity of about 64 Mbytes and stores contents.
- the flash memory 61 stores in advance a reproduction code for decompressing a content compressed by a predetermined compression method.
- the flash memory 61 can be detachably attached to the portable device 6 as a memory card.
- the DSP 59 uses the CRC (Cyclic Redundancy Check) method for content based on the playback code transferred from the flash memory 61. After detecting an error in, the playback was performed.
- CRC Cyclic Redundancy Check
- the DSP 59 is integrally formed with a transmitting circuit (not shown) provided inside, and reproduces content based on a master clock MCLK from a transmitter 59A made of an external crystal.
- An operation clock LR comprising a bit clock BC LK of a predetermined frequency generated by an internal oscillation circuit based on the clock MCLK and the master clock MC LK, and an L channel clock LCLK and an R channel clock RCLK in frame units CLK is supplied to the digital / analog conversion circuit 63.
- the DSP 59 supplies the operation clock described above to the digital-to-analog conversion circuit 63 according to the reproduction code when reproducing the content, and when the content is not reproduced, the operation clock according to the reproduction code.
- the supply is stopped, and the digital-to-analog conversion circuit 63 is stopped to reduce the power consumption of the entire portable device 6.
- the CPU 53 and the USB controller 57 are also provided with a crystal oscillator 53 A or 57 A, respectively, and perform predetermined processing based on the master clock MCLK supplied from the oscillator 53 A or 57 A, respectively. Execute.
- the portable device 6 does not require a clock generation module for supplying a clock to each circuit block such as the CPU 53, the DSP 59, and the USB controller 57. Can be simplified and downsized.
- the digital-to-analog conversion circuit 63 converts the reproduced content into an analog audio signal and supplies the analog audio signal to the amplification circuit 64. amplification The circuit 64 amplifies the audio signal and supplies the audio signal to a headphone (not shown) via the headphone jack 65.
- the portable device 6 reproduces the content stored in the flash memory 61 under the control of the CPU 53, and reproduces the content during the reproduction. Stops playback of the content when the / stop button is pressed.
- the portable device 6 When the play / stop button is pressed again after the stop, the portable device 6 restarts the playback of the content from the stopped position based on the control of the CPU 53.
- the play / stop button stops playback by a pressing operation and a few seconds elapse without any operation being applied, the portable device 6 automatically turns off the power and reduces power consumption.
- the portable device 6 does not play the content from the previous stop position, but plays from the first song.
- the CPU 53 of the portable device 6 controls the LCD controller 68 to display the playback mode state (for example, rebeat playback, intro playback, etc.), the equalizer adjustment (ie, the audio signal) on the display unit 67. Adjustment of the gain corresponding to the frequency band of), song number, playing time, playback, stop, fast forward, fast reverse, etc. status, volume and remaining battery 51 information are displayed.
- the playback mode state for example, rebeat playback, intro playback, etc.
- the equalizer adjustment ie, the audio signal
- the portable device 6 stores the so-called FAT (FAT) information such as the number of contents written in the flash memory 80 in the EEPROM 68, the block position of the flash memory 61 in which the respective contents are written, and various other memory storage information.
- FAT FAT
- ile A llo cat i on Table is stored.
- 64 KB of content is treated as one block, and a block position corresponding to one piece of content is stored in the FAT.
- the FAT is stored in the flash memory 61
- the block position corresponding to the content of the first music is written to the flash memory 61 as FAT.
- the block position corresponding to the content of the second music is written as FAT in the flash memory 61 (the same area as the first music).
- the FAT is rewritten each time content is written to the flash memory 61, and furthermore, the same data is double-written for reserve to protect the data overnight.
- the portable device 6 stores the FAT in the EEPROM 68 to reduce the frequency of rewriting the flash memory 61 corresponding to one content write.
- the portable device 6 can write the content more times than when the FAT is stored in the flash memory 61. Can be increased several times or more. Further, since the CPU 53 writes the FAT to the EEPROM 68 so that the FAT is added, the frequency of rewriting the same area of the EEPROM 68 is reduced, and the EEPROM 68 becomes unable to be rewritten in a short time. To prevent
- USB connection When the portable device 6 is connected to the personal computer 1 via the USB cable ((hereinafter referred to as “USB connection”), the device 6 is based on an interrupt signal supplied from the USB controller 57 to the CPU 53. Recognize that the USB connection has been established.
- the portable device 6 When the portable device 6 recognizes that the USB connection has been made, the portable device 6 receives external power of a specified current value from the personal computer 1 via the USB cable 7 and controls the power supply circuit 52 so that the power from the dry cell 51 is supplied. Supply of water is stopped.
- the CPU 53 stops the process of reproducing the content of the DSP 59. As a result, the CPU 53 prevents the external power supplied from the personal computer 1 from exceeding the specified current value, and controls so that the external power having the specified current value can be always received.
- the CPU 53 when the CPU 53 is connected to the USB, the CPU 53 switches from the power supplied from the dry cell 51 to the power supplied from the personal computer 1, so that the external power from the personal computer 1 with a low unit price is used, The power consumption of the dry battery 51 having a high unit price is reduced, and thus the life of the dry battery 51 can be extended.
- the CPU 53 When receiving the external power from the personal convenience 1 via the USB cable 7, the CPU 53 stops the reproduction process of the DSP 59, thereby reducing the radiation from the DSP 59, So As a result, the radiation of the entire system including the personal computer 1 is further reduced.
- FIG. 4 is a block diagram illustrating a configuration of functions of the personal computer 1 realized by executing a predetermined program of the CPU 11 or the like.
- the content management program 111 is an EMD selection program 131, a check-in / check-out management program 132, an encryption method conversion program 135, a compression method conversion program 136, an encryption program 137, a usage condition conversion program 139, and usage condition management. It consists of a number of programs, including a program 140, an authentication program 141, a decryption program 142, a dryino 143 for PD, a purchase program 144, and a purchase program 145.
- the content management program 1 1 1 is described, for example, with shuffled instructions or encrypted instructions, concealing the contents of the processing from the outside, making it difficult to read the contents of the processing (For example, even if the user directly reads out the content management program 111, it is not possible to specify the instruction, etc.).
- the EMD selection program 131 When the content management program 111 is installed in the personal computer 1, the EMD selection program 131 is not included in the content management program 111, and is registered via the network 2 in the EMD registration process described later. Received from EMD registration server 3. The EMD selection program 131 selects a connection with any one of the EMD servers 4-1 to 4-1-3, and sends it to the purchasing application 115 or the purchasing program 144 or 142 to provide the EMD servers 4-1 to 4-2. Communication with any of the (E.g., when downloading content, etc.).
- the check-in / check-out management program 1 3 2 is based on the check-in or check-out settings and the use condition files 1 6 2—1 to 1 6 2—N recorded in the content 1 1 4
- the check-in / check-out management program 1 32 in response to check-in or check-out processing, uses the use condition files 16 2—1 to 16 2—N recorded in the content server 1 14 Updates the usage conditions stored in.
- the copy management program 13 based on the use condition files 16 2-1 to 16 2-N recorded in the content data base 1 14, creates content files 16 1-1 to 1 6 Copy the content stored in 1-N to any of the portable devices 6-1 to 6-3, or transfer the content from the portable device 6-1 to 6-3 to the content database. Copy to 1 1 4
- the transfer management program 13 based on the use condition files 16 2-1 to 16 2-N recorded in the content data base 1 14, is based on the content files 16 1-1 to 16 1 Move the content stored in N to one of the portable devices 6-1 to 6-3, or transfer the content from the portable device 6-1 to 6-3 to the content device. Go to evening 1 1 4
- the encryption method conversion program 135 is purchased via the network 2.
- the content encryption method of the content received from the EMD server 4-3 by the content database 16 is stored in the content files 161-1-1 to 161-N stored in the content database 114. Is converted to the same encryption method as.
- the encryption method conversion program 13.5 when checking out content to the portable device 6-1 or 6-3, converts the content to be checked out into an encryption method that can be used by the portable device 6-1 or 6-3. Convert to
- the compression method conversion program 13 6 is a method for compressing the content received by the purchasing application program 115 from the EMD server 41 via the network 2
- the purchasing program 144 is a method for compressing the content received from the EMD server 41.
- the compression format conversion program 13 6 can use the content to be checked out when the content is checked out to the portable device 6 1 1 or 6-3. To the appropriate compression method.
- the encryption program 13 7 is read, for example, from a CD and the content (unencrypted) supplied by the recording program 13 Is encrypted using the same encryption method as the content stored in the content files 161_1 to 161-N recorded on the content server 114.
- the compression / decompression program 138 converts the content (uncompressed) read from, for example, a CD and supplied from the recording program 113 into content files 161-1 to 161-N recorded in the content database 114. Encode using the same encoding method as the stored content.
- the compression / decompression program 138 decompresses (decodes) the encoded content.
- the usage condition conversion program 139 is a data (so-called “usage rule”) purchase program 144 indicating the usage conditions of the content received by the purchasing application program 115 from the EMD server 4-1 via the network 2.
- the content database 1 14 receives the data indicating the usage conditions of the content received from the EMD server 4-2 or the data indicating the usage conditions of the content received from the EMD server 4-3 by the purchasing program 145. Is converted to the same format as the use condition data stored in the use condition files 162-1 to 162-N recorded by.
- the usage condition conversion program 139 converts the usage conditions corresponding to the content to be checked out into the portable device 6-1 or 6-3. Is converted to data of usage conditions that can be used.
- the usage condition management program 140 executes the content copy, move, check-in, or check-out process before executing the content. Terms and Conditions ii Based on the hash value (to be described later) corresponding to the usage rule data stored in the usage rule file 1 6 2 1 1 to 1 62-N recorded in 4 Tampering is detected.
- the usage condition management program 140 uses the usage condition files 16 2 _ 1 to 16 recorded in the content database 114 when copying, moving, checking in, or checking out content.
- the hash value corresponding to the use condition data is updated in accordance with the update of the use condition data stored in 2-N.
- the authentication program 1411 handles the mutual authentication between the content management program 111 and the purchase application program 115 and the mutual authentication between the content management program 111 and the purchase program 144. Execute. In addition, the authentication program 14 1 processes mutual authentication between the EMD server 4-1 and the purchase application program 1 15, and processes mutual authentication between the EMD server 4-2 and the purchase program 14 4 And the authentication key used in the mutual authentication process between the EMD server 413 and the purchase program 145.
- the authentication key used by the authentication program 141 in the mutual authentication process is not stored in the authentication program 141, and the display operation is not performed.
- the registration program is supplied from the EMD registration server 3 and stored in the authentication program 14 1.
- the decryption program 1442 executes Decrypt the content.
- the portable device 6- -2 supplies the content or the portable device 6-2 with the command to execute the specified processing.
- the PD driver 14 3 checks out predetermined content to the portable device 6-1 or checks in predetermined content from the portable device 6-1
- the content of the device driver 1 16-1 is Alternatively, supply a command to execute the specified processing to the device dryino.
- the device driver 1 16- 2 is supplied with a content or a command to cause the device dryino 1 16-2 to execute the specified processing.
- the purchasing program 144 is a so-called plug-in program, which is installed together with the content management program 111, supplied from the EMD registration server 3 via the network 2, or recorded on a predetermined CD. Supplied.
- the purchase program 144 is installed in the personal computer 1, the purchase program 144 is communicated with the content management program 111 via a predetermined format interface provided by the content management program 111. Send and receive overnight.
- the purchase program 144 may be, for example, a shuffled instruction or an encrypted instruction. It is written so as to conceal the processing contents from the outside and make it difficult to read the processing contents (for example, even if the user directly reads the purchase program 144, the instruction cannot be specified). ing.
- the purchasing program 144 requests the EMD server 4-2 to transmit predetermined content via the network 2, and receives the content from the EMD server 412. Further, the purchase program 144 executes a charge process when receiving the content from the EMD server 4-2.
- the purchase program 145 is a program that is installed together with the content management program 111.
- the purchase program 145 requests the EMD server 4-3 to transmit predetermined content via the network 2, and sends the EMD server 4-3. Receive content from. Further, the purchase program 145 executes a billing process when receiving the content from the EMD server 4-3.
- the display operation instruction program 112 is specified in the display 20 based on the file data file 181, the display file 182, the image file 183-1 to 183-K, or the history file 184. Then, based on the operation of the keyboard 18 or the mouse 19, the content management program 111 is instructed to execute a check-in or check-out process.
- the filtering data file 181 stores data for weighting each of the contents stored in the content files 161-1 to 161 recorded in the content database 114, Recorded on HDD 21.
- the display data file 182 stores data corresponding to the content stored in the content file 161-1 to 161 -N recorded in the content data 114 on the HD, and stores the data in the HDD. 21 recorded.
- the image files 183-1 through 183-K store images corresponding to the content files 161-1 through 161-1N recorded in the content database 114 or images corresponding to packages described later. Recorded on the HDD 21.
- image files 183-1 to 183-K are simply referred to as image files 183.
- the history data file 184 indicates the number of times the content stored in the content files 161_1 to 161-N recorded in the content data base 114 has been checked out, the number of times the content has been checked in, The history data such as the date is stored and recorded in the HDD 21.
- the display operation instruction program 112 transmits the ID of the content management program 111 stored in advance to the EMD registration server 3 via the network 2 during the registration process, It receives the authentication key and the EMD selection program 131 from the registration server 3 and supplies the authentication key and the EMD selection program 131 to the content management program 111.
- the recording program 113 displays an image in a predetermined window, and, based on an operation on the keyboard 18 or the mouse 19, decodes data such as a recording time of contents from a CD, which is an optical disk 42 mounted on the drive 22. Read out the evening.
- the recording program 113 sends the data (eg, album name, album name, etc.) corresponding to the CD to the WWW server 5-1 or 5-2 via the network 2 based on the recording time of the content recorded on the CD. Or the name of an artist) or the transmission of data corresponding to the content recorded on the CD (for example, the title of the song), and the data corresponding to the CD from the WWW server 5-1 or 5-2.
- receive the evening corresponding to the content recorded on the CD receive the evening corresponding to the content recorded on the CD.
- the recording program 113 supplies the display operation instruction program 112 with the data corresponding to the received CD or the data corresponding to the content recorded on the CD.
- the recording program 113 When a recording instruction is input, the recording program 113 reads the content from the CD, which is the optical disk 42 mounted on the drive 22, and outputs the content to the content management program 111.
- the content database 114 stores, in one of the content files 161-1 to 161-N, content compressed by a predetermined method and encrypted by a predetermined method supplied from the content management program 111. Yes (Record on HDD 21).
- the content database 114 stores the usage conditions corresponding to the content stored in the content files 161-1 to 161-1N in the content files 161-1 to 161-1N in which the content is stored. It is stored in any of the corresponding use condition files 162-1 to 162-N (recorded on the HDD 21).
- the content database 114 may record the content files 161-1 to 161-N or the use condition files 162-1 to 162-N as records.
- use condition data corresponding to the content stored in the content file 161-1-1 is stored in the use condition file 162-1-1.
- the use condition data corresponding to the content stored in the content file 161-N is stored in the use condition file 162-N.
- the data recorded in the use condition files 162-1—1 through 162-2—N are the data recorded in the time limit database or the song data recorded in the expiration date database described later.
- the content database 114 is configured so as to include a deadline database and a song database, which will be described later.
- the purchase application program 115 is supplied from the EMD registration server 3 via the network 2 or recorded in a predetermined CD-ROM and supplied.
- the purchase application program 115 requests the EMD server 4-1 to transmit predetermined content via the network 2, receives the content from the EMD server 411, and executes the content management program. Supply 1 1 1
- the purchase application program 115 executes a billing process when receiving the content from the EMD server 4-1.
- Content stored in any of the content files 161-1-1 to 161-N belongs to a predetermined package. More specifically, the package is either an original package, a my select package, or a package.
- the original package belongs to one or more contents, and corresponds to the content classification (for example, corresponding to an album) or one CD in the EMD servers 4-1 to 413.
- Content belongs to one of the original packages and cannot belong to more than one original package.
- the original package to which the content belongs cannot be changed.
- the user can edit a part of the information corresponding to the original package (addition of information or change of added information).
- the MySelect package contains one or more contents arbitrarily selected by the user.
- the user can arbitrarily edit which content belongs to the MySelect package.
- Content can belong to one or more MySelect packages simultaneously. Also, the content does not have to belong to any of the MySelect packages.
- the content selected based on the file set stored in the file set file 18 1 belongs to the file set.
- Filing data is supplied from the EMD server 41 to 4-3 or the WWW server 5-1 or 5-2 via the network 2, or is recorded on a predetermined CD and supplied.
- the user can edit the file stored in the file 181.
- the filtering process is a criterion for selecting a predetermined content or calculating a weight corresponding to the content. For example, this week's J
- the filtering data file 181 is a file that selects content in descending order of the length of time that was checked out in the past month, a content that has been checked out frequently in the past six months To select content, or to select content that includes the word "love" in the song title.
- the contents of the content ring package include the content display data corresponding to the content 2 2 1 (including the data set by the user in the content display data—user 2 21), or the history data 1 8 4 and so on are selected in correspondence with the Filing Ring de Isamu.
- the driver 117 drives the audio input / output interface 24 under the control of the content management program 111, etc., and inputs the content, which is an externally supplied digital file.
- An analog signal corresponding to the content supplied from the content server 1 1 4 via the content output 1 1 1 is output.
- FIG. 5 shows that when the display operation instruction program 1 1 2 is started
- FIG. 8 is a diagram showing an example of a display operation instruction ⁇ 7 window displayed on the display 20 by the instruction program 1 12.
- buttons 201 for starting the recording program 113 the button 202 for starting the EMD selection program 131, check-in or check-word processing Buttons 203 for displaying a field, buttons 204 for displaying a field for editing a MySelect package, and the like are arranged.
- field 211 displays the data corresponding to the original package.
- button 206 is selected, a field corresponding to the MySelect package is displayed in the field 211.
- button 207 is selected, a field corresponding to the file ring package is displayed in the field 211.
- the data displayed in the field 211 is data related to the package, such as a package name or a party name.
- the package name "first” and the artist name "Ataro”, the package name "second”, and the artist name “Ataro” are displayed in the field 211.
- the data corresponding to the content belonging to the package selected in the field 2 1 1 is displayed.
- the date displayed in the field 2 12 is, for example, the title of the song, the playing time, or the number of checks that can be performed.
- the package name "second" Package name is selected, the package name "second”& the song name "South Bar” corresponding to the content belonging to the corresponding package and the number of checkouts (for example, one of the eighth notes is checked out 1 Equivalent to the number of times, two eighth notes indicate two checkpoints), and the song title "Northern Graveyard” and the number of checkpoints allowed (one eighth note indicates one checkout) are fields. Displayed in 2 1 2
- the rest displayed as the number of possible checkouts displayed in field 2 12 indicates that the corresponding content cannot be checked out. (The number of possible checkouts is 0. )) Indicates that Also, the treble clef as the number of possible check-outs displayed in the field 2 12 indicates that there is no limit to the number of check-outs of the corresponding content (they can be checked out any number of times). .
- the number of checkouts allowed may be indicated not only by the number of predetermined figures (for example, a circle, a star, a month, etc.) as shown in FIG. 5, but also by a number.
- the display operation instruction window displays an image (corresponding to one of the image files 183-1-1 to 183-K in FIG. 4) associated with the selected package or content.
- a field 208 is arranged.
- Button 209 plays the selected content (audio corresponding to the content is output to speaker 4). Click to output to 5).
- the display operation instruction program 112 transmits the predetermined content stored in the content management program 111 corresponding to the selected song title to the content database 111. Let it be erased.
- a button (button 25, described later) of the window displayed by the recording program 113 is selected (activated), the content read from the CD is recorded in the content database 114.
- the display operation instruction program 1 1 2 displays the display operation instruction window in a field 2 1 for displaying the music title of the content stored in any of the portable devices 6-1 to 6-13 specified in advance. Display 3.
- step 111 the content read from the CD recorded in the content database 114 is checked out to any of the portable devices 6-1 to 6-3 specified in advance.
- a symbol indicating whether or not the content can be checked into the personal computer 1 is displayed at the leftmost of the field 2 13 corresponding to the title of the content. For example, " ⁇ " at the leftmost of field 2 13 This indicates that the corresponding content is checked in to the personal computer 1 (that is, checked out from the personal computer 1).
- the "X" located at the leftmost of field 2 13 indicates that the content corresponding to the song title of the content cannot be checked in to personal computer 1 (that is, it has not been checked out from personal computer 1; for example, Checked from another personal computer).
- the display operation instruction program 1 1 2 displays the field 2 1 3 in the display operation instruction window
- the display operation instruction program 1 1 2 displays the portable device 6 —
- the name of the package (the package to which the content stored in any of the portable devices 6-1 to 6-3 belongs) to which the content stored in any of the portable devices 1 to 6-3 belongs.
- a button 215 for closing the field 213, and a button 215 for executing the check-in or check-out are displayed.
- the display operation instruction program 1 1 2 displays the field 2 1 3 in the display operation instruction window
- the display operation instruction program 1 1 2 displays the field 2 1 2 in the display operation instruction window.
- Button 2 1 6 for setting the corresponding content check mark
- Button 2 17 for setting the content check-in corresponding to the song name selected in field 2 13 3, corresponding to the content name displayed in field 2 13
- Buttons 218 to set check-in of all contents to be checked and 219 to cancel check-in or check-out setting.
- the personal convenience 1 does not execute the check-in or check-out process only by setting the check-in or check-out by operating the buttons 216 to 219.
- the display operation instruction program 1 1 2 is checked in by the content management program 1 1 1.
- the process of the checkout is executed. That is, when the button 215 is clicked, the display operation instruction program 112 sends any of the portable devices 6-1 to 6-3 to the content management program 111 based on the check-in or check-out setting. Or a predetermined command corresponding to the check-in (for example, a command for erasing a predetermined content stored in any of the portable devices 6-1 to 6-3).
- a predetermined command corresponding to the check-in for example, a command for erasing a predetermined content stored in any of the portable devices 6-1 to 6-3.
- the data of the use condition stored in the use condition file 162 corresponding to the transmitted content or command is updated.
- the display / operation instruction program 112 reads the history data stored in the history data file 184 in accordance with the transmitted content or the transmitted command. Update.
- the history data includes information identifying the checked-in or checked-out content, or the date on which the content was checked in or checked out, the name of the portable device 6-1 to 6-3 from which the content was checked out, etc. Consists of
- Checkin or checkout setting process can be executed in a short time. Therefore, the user can quickly know the execution status of the check-in or check-out process, and reduce the number of time-consuming check-in or check-out processes to reduce the time required for the check-in or check-out process. The whole (including setting and execution) can be shortened.
- FIG. 6 is a diagram illustrating an example of a window displayed by the recording program 113 on the display 20.
- the recording program 113 displays the title of the CD such as "asynchronized" in the field 251.
- the recording program 113 displays an artist name such as, for example,,,, in the field 252.
- the recording program 113 Based on the information on the CD received from the WWW server 5-2, the recording program 113 displays the song title in the field 253, for example, "Hea small”, “Blanette”, “Black” , “Seoul” etc. are displayed. Similarly, the recording program 113 displays an artist name such as "Kwai” in the field displaying the artist of the field 253.
- the recording program 113 After the recording program 113 receives the predetermined CD information, the recording program 113 stores the CD information in a predetermined directory of the HDD 21.
- the recording program 113 When the user clicks on the button 254 or the like and receives an instruction to acquire information on the CD, the recording program 113 first searches the HDD 21 for a predetermined directory. The recording program 113, when CD information is stored in that directory, displays a dialog box (not shown). Display the box and ask the user to select whether or not to use the CD M stored in the directory.
- the recording program 1 1 3 When the button 2 5 6 is clicked to start recording the content placed in the window displayed by the recording program 1 1 3, the recording program 1 1 3 will load the content from the CD stored in the drive 2 2 And supplies the content read from the CD to the content management program 111 along with the information of the CD.
- the compression / expansion program 13 8 of the content management program 11 1 compresses the content supplied from the recording program 11 3 by a predetermined compression method, and the encryption program 13 7 compresses the compressed content. Is encrypted.
- the use condition conversion program 139 generates use condition data corresponding to the compressed and encrypted content.
- the content management program 111 supplies the compressed and encrypted content to the content database 114 along with the usage conditions.
- the content database 1 1 4 generates a content file 1 6 1 and a use condition file 1 6 2 corresponding to the content received from the content management program 1 1 1, and stores the content in the content file 1 6 1 At the same time, store the usage conditions in the usage condition file 16 2.
- the display operation instruction program 111 is stored in the display data file 182 based on the usage conditions database and CD information corresponding to the content stored in the content database 114 during the recording process. Generate a display for display.
- buttons 255 for setting whether or not to check any of 1 to 6-3 are arranged.
- recording program 113 displays a pull-down menu showing a list of portable devices 6-1 through 6-3.
- the personal computer 1 displays the selected portable device 6-1 to 6-3 on the selected portable device 6-1 to 6-3. Automatically check out recorded content from CD. If the user selects "Don't check out" from the pull-down menu, Personal Consumer Night 1 will not check out when recording content from CD.
- the CPU 11 executes the content management program 111, the display operation instruction program 112, the recording program 113, and the content database 114.
- a process for transferring content reproduced from a CD mounted on the drive 22 to the HDD 21 and copying the content will be described.
- the user operates the keyboard 18 or the mouse 19 to transfer the content reproduced from a CD (not shown) mounted on the drive 22 to the HDD 21 via the interface 17 to the CPU 11.
- the recording program 113 selects a content to be copied to the display 20 via the interface 17 in step S11. 0 to display the Graphic al User Interfac
- the recording program 113 reads the TOC (Table Of Contents) of the CD mounted on the drive 22, and reads the TOC (Table Of Contents).
- the content information contained in D is obtained and displayed on the display 20.
- the recording program 113 reads an International Standard Recording Code (ISRC) for each content included in the CD, obtains information on the content, and causes the display 20 to display the information.
- ISRC International Standard Recording Code
- the recording program 113 accesses the WWW server 5-1 or 5-2 via the network 2 and obtains information on the contents of the CD using the T0C.
- the title of the song corresponding to the content is displayed in the field 253.
- the user operates the keyboard 18 or the mouse 19 using the GUI of the display 20, and selects the song title displayed in the field 253. Click the check box corresponding to and select the unit to copy.
- step S12 the recording program 113 sends the usage condition management program 140 to the expiration date database (stored in the content database 114 shown in FIG. 162—1 to 162—corresponds to N). Details of the deadline-based overnight check process are shown in the flowchart of FIG.
- step S31 the use condition management program 140 calculates the hash value of the entire deadline based on the deadline, in cooperation with the CPU 32 of the adapter 26, and in step S32, calculates the calculated value and Compare with the previously stored hash value.
- the use condition management program 140 does not calculate the hash value when no data is recorded in the time limit database.
- a time limit database is formed in the HDD 21, and as shown in FIG. 9, the time limit database records in the past as management information for managing the content (content) recorded in the HDD 21, as shown in FIG.
- the ISRC of the content that has been copied and the copy date and time are stored in correspondence.
- the ISRC and the copy date and time of each of the three items, item 1 to item 3, are stored.
- the CPU value of the adapter 26 in step S38 is based on the ISR C of all the content recorded based on the expiration date and the date and time of the copy. It is calculated by 32 and stored in the non-volatile memory 34.
- a hash function is applied to the hash value over time.
- a hash function is a one-way function that generally maps a long variable length into a short fixed length value, and has the property that collisions between hash values are unlikely to occur.
- hash functions include SHA (Secure Hash Algorithm) and MD (Message Digest) 5.
- the use condition management program 140 calculates a hash value in step S31 in the same manner as that executed by the CPU 32. Then, in step S32, the use condition management program 140 requests the CPU 32 to read the hash value stored in the non-volatile memory 34, and receives the transferred hash value and the hash value. At step S31, the hash value is compared with the hash value calculated by itself.
- step S33 the use condition management program 140 matches the hash value calculated in step S31 with the hash value of the previous term database stored in the non-volatile memory 34. It is determined whether or not they match, and if they do not match, it is determined that the expiration date database has been tampered with. The message could not be copied because the data was tampered with. ”The message was output to the display 20 via the interface 17 and displayed, and then the processing was terminated. That is, in this case, the process of reproducing the content recorded on the CD and copying the content to the HDD 21 is prohibited.
- step S31 If the hash value calculated in step S31 matches the previous hash value, the process proceeds to step S35, where the usage condition management program 140 sends the recording program 113 to the recording program 113, and proceeds to step S1.
- the content selected as the content to copy specified in 1 (the selected Content) I SRC from CD. If the I SRC is not recorded on the CD, the terms of use management program 140 causes the recording program 113 to read the T ⁇ C data of the CD and apply a hash function to the data overnight. Then, for example, a data of an appropriate length such as 58 bits is obtained, and this is used in place of the ISRC.
- step S36 the usage condition management program 140 determines whether or not the ISRC (that is, the selected content) acquired in step S35 is registered in the time limit database (FIG. 9). If the ISRC is not registered in the expiration date database, the content has not been recorded on the HDD 21 yet, so the process proceeds to step S37, and the usage condition management program 140 sends the content to the ISR C of the content. And the current date and time are registered in the term database.
- the usage condition management program 140 uses the value output from the RTC 35 of the adapter 26, which is transferred from the CPU 32, as the current date and time.
- step S38 the use condition management program 140 reads out the data of the time limit database at that time and transfers it to the CPU 32 of the adapter 26.
- the CPU 32 calculates a hash value of the transferred data and stores the calculated hash value in the nonvolatile memory 34. As described above, the hash value stored in this way is used as the previously stored hash value in step S32.
- step S39 the usage condition management program 140 sets an unregistered flag indicating that the selected content has not been registered on the expiration date basis. This flag indicates that the selected content is not expired in step S13 of FIG. It is used when determining whether or not it is registered in the base. If it is determined in step S36 that the ISRC of the selected content is registered on an expiration date basis, the selected content is a content that has been registered in the HDD 21 at least once. That means there is. Therefore, in this case, the process proceeds to step S40, and the usage condition management program 140 determines the current date and time (the adapter 26: RTC35 of the adapter 26) from the registration date and time of the selected content registered on the expiration date basis.
- the current date and time the adapter 26: RTC35 of the adapter 26
- step S41 judges whether the current output date and time has passed 48 hours or more. If the current time is more than 48 hours after the registration date, it has been recorded on HDD 21 at least once, but since it has already been more than 48 hours since then, Even if the content is copied again, it is practically impossible to copy a large amount of the content. In this case, copying to the HDD 21 is permitted. Then, the process proceeds to step S41, and the usage condition management program 140 changes the date and time of the time limit database from the past registration date and time to the current date and time (date and time output by the RTC 35).
- the usage condition management program 140 again causes the CPU 32 to calculate the hash value of the entire expiration date base, store the hash value in the non-volatile memory 34, and in step S39, Set an unregistered flag for the content.
- step S40 determines whether the current time has not passed for 48 hours or more from the registration date and time, copying of the selected content to the HDD 21 is prohibited. Therefore, in this case, the process proceeds to step S42, and the usage condition management program 140 A registered flag is set corresponding to the selected content. Due to the processing of step S40, a new copy of the content cannot be generated until a predetermined time has elapsed, so that the generation of a copy of the content for non-illegal normal use is not unduly hindered. For example, it is virtually impossible to generate a large amount of content copy required for illegal sale or distribution.
- the criterion for the determination was 48 hours or more. However, the determination is not limited to 48 hours, and may be any time from 12 hours to 16 hours. No.
- the flag indicating whether the selected content is registered in the HDD 21 is set by the time limit database check process.
- step S13 the copy management program 133 determines from the flag described above whether or not the selected content has already been registered on a time limit basis. If the selected content has already been registered, the process proceeds to step S 14, and the copy management program 13 3 instructs the recording program 1 13, for example, “This song has been copied once and is Cannot copy because more than 8 hours have elapsed "on the display 20. This allows the user to know why the content cannot be copied to the HDD 21.
- step S13 If it is determined in step S13 that the selected content is not registered in the expiration date, the process proceeds to step S15, where the recording program 113 controls the drive 22 and there.
- step S16 the recording program 113 extracts the word code included in the content and determines whether or not the mark code indicates copy prohibition. The determination is made in S17. If the watermark code indicates that copying is prohibited, the process proceeds to step S. 18 and the recording program 1 13 is added to the recording program 1 13 such as “copying is prohibited”. The message is displayed on the display 20 via the interface 17 and the copy process is terminated.
- step S 17 if it is determined in step S 17 that the war mark does not indicate “combi—prohibition”, the process proceeds to step S 19, where the recording program 1 13 executes the compression / decompression program 1.
- step 38 for example, compression is performed by software processing using a method such as ATRAC (Adaptive Transform Acoustic Coding) 3 (trademark).
- step S20 the recording program 113 uses the encryption key stored in the memory 13 in advance in the encryption program 133, for example, using a DES (Data Encryption Standard) method, Encrypt contents using an encryption method such as the FEAL (Fast Encripherment Algotithm) method.
- DES Data Encryption Standard
- the encryption key for example, a random number generated by software or a random number generated based on a random number generated by the CPU 32 of the adapter 26 can be used.
- the recording program 113 transfers the encrypted data to the content database 114, and stores the file on the HDD 21 with a file name as one file (as the content file 161). .
- the position information of the file name (for example, the number of bytes from the head) may be given and saved as a part of one file.
- This storage processing and the above-described compression encoding processing and encryption processing may be performed separately, or may be performed simultaneously and in parallel.
- step S22 the recording program 113 uses the storage program stored in the predetermined non-volatile memory 34 for the encryption program 137 to store the above-mentioned DES system and FEAL system.
- the encryption key obtained by encrypting the content is encrypted and stored in the music database of the HDD 21 (corresponding to the use condition files 162-1 to 162-N of the content database 114 shown in FIG. 4).
- step S23 the recording program 113 combines the stored file information, the encrypted encryption key, the content information, and the song name information input by the user through the GUI to form an HD Register it in the song database of D21 (record as usage condition files 162-1 to 162-N). Then, in step S24, the recording program 113 causes the CPU 32 to calculate the hash value of the entire song data base and store it in the nonvolatile memory 34.
- a song database as shown in FIG. 11 is registered on the HDD 21.
- items 1 through Item 3 file name, encrypted encryption key, song name, length, playback conditions (start date / time, end date / time, count limit), playback count, playback billing conditions, copy conditions (number of times), number of copies Counter and copy conditions (SCMS) are recorded.
- the number of times that the content can be checked out corresponding to the content copied from a CD is set to three times.
- the content can be copied again, so it can be copied several times, which is considered to be the scope of personal use of the user Becomes On the other hand, going beyond personal use, for example, trying to duplicate in large quantities would require enormous amounts of time, making it practically impossible. Also, for example, even if the personal computer 1 breaks down and the content recorded on the HDD 21 is erased, after a certain period of time, the erased content is copied again and recorded on the HDD 21. I can do it.
- the contents of the time limit database recorded on the HDD 21 via the network 2 can be shared.
- step S51 the movement management program 134 causes the use condition management program 140 to calculate the hash value of the entire music data base, and in step S52, the movement management program 134 Calculate and compare with the hash value stored in nonvolatile memory 34. If the two do not match, the movement management program 13 4 proceeds to step S 53, and displays a message such as “the song database may have been tampered” in the display operation instruction program 112. After displaying in 20, the process is terminated.
- the processing in this case is the same as the processing in steps S31 to S34 in FIG. In this case, the transfer of the content from the HDD 21 to the portable device 6 is not executed.
- step S54 the mobility management program 134 is registered there from the song data base (included in the content database 114) formed on the HDD 21.
- the information of the content being read is read and displayed on the display 20 as a GUI for selection by the display operation instruction program 112. Based on the GUI for this selection, the user clicks on the content to be moved from HDD 21 to portable device 6, such as the song name and button 2 16 displayed in field 2 12 in FIG. And select.
- the movement management program 134 determines the playback conditions, copy conditions, and playback time of the selected content selected in step S54. / 49510
- step S56 mutual authentication processing is performed between the authentication program 141 of the personal convenience 1 and the CPU 53 of the portable device 6, and the communication key is shared.
- the master key KM is stored in advance in the flash memory 61 (or EEPROM 68) of the portable device 6, and the individual key is stored in the RAM 13 (or a predetermined file of the HDD 21) of the personal computer 1
- KP and ID are stored in advance.
- the CPU 53 receives a supply of the ID stored in the RAMI 3 in advance from the authentication program 141, applies a hash function to the ID and the key KM possessed by itself, and stores the hash function in the RAM 13.
- the same key as the individual key of the personal computer 1 is generated. In this way, a common individual key is shared by both the personal convenience device 1 and the portable device 6. Using this individual key, a temporary communication key can be generated.
- the ID and the mass key KMP are stored in the RAMI 3 of the personal convenience 1 in advance, and the ID of the portable device 6 and the mass key KMM are also stored in the flash memory 61 of the portable device 6.
- the other applies a hash function to the ID and the master key transmitted from one, and generates the other individual key. Then, a temporary communication key is generated from the individual key.
- the authentication method is, for example, I 0 S (International Org anization for Standardization) 9 7 9 8—2 can be used.
- step S57 the mobility management program 1334 selects the content database 114 as the selected content.
- the file name of the obtained content is read from the song data base, and the content of the file name (for example, encrypted in the process of step S20 in FIG. 7) is read from the HDD 21.
- step S 58 the mobility management program 13 4 executes the compression encoding method (the processing in step S 19) and the encryption method (the processing in step S 19) of the content that is the digital data read out in step S 57. 20), and a process of converting a format (for example, a header format) into that of the portable device 6. The details of this conversion processing will be described later with reference to the flowchart of FIG.
- step S59 the mobility management program 134 causes the PD dryino 144 to transfer the content converted in step S58 to the portable device 6 via the USB port 23.
- step S60 when the CPU 53 of the portable device 6 receives the transmitted content via the USB connector 56, the CPU 53 stores the content as it is in the flash memory 61.
- step S61 the movement management program 1334 further transmits, to the use condition conversion program 1339, the reproduction conditions (start date / time, end date / time, number-of-times limit) of the selected content registered in the song database. ) Into a format managed by the portable device 6.
- step S62 the mobility management program 1 3 4 Further, it causes the usage condition conversion program 139 to convert the S CMS information in the copy conditions registered in the song content of the selected content into a format managed by the portable device 6. Then, in step S63, the movement management program 134 sends the playback conditions converted in step S61 and the SCMS information converted in step S62 to the PD driver 143. Transfer to 6.
- the CPU 53 of the portable device 6 stores the transferred playback conditions and the SCMS information in the flash memory 61.
- the mobility management program 134 also stores, in the dryino 143 for PD, the playback conditions, charging conditions for playback, copy conditions, and the like registered during the song data base of the selected content in the CPU. 11 Transfer the data to the portable device 6 and save it to the flash memory 61 as it is in the format that 1 handles in the music database.
- the mobility management program 134 causes the contention base 114 to read the encrypted encryption key of the selected content from the music database, and in step S66, decrypts it.
- the program 142 causes the encryption key to be decrypted with the storage key stored in the RAM 13 and causes the encryption program 137 to encrypt with the communication key.
- the mobility management program 134 causes the PD dryino “143” to transfer the encryption key encrypted with the communication key to the portable device 6.
- step S67 the CPU 53 of the portable device 6 decrypts the encryption key transferred from the personal computer 1 using the communication key shared in the mutual authentication process, and uses the own storage key. Flash memory 6 1 To save.
- the CPU 53 notifies the personal computer 1 of the storage of the encryption key in step S68.
- the mobility management program 13 4 of the personal computer 1 causes the content database 114 to delete the content file 16 1 corresponding to the content in step S69, Delete the set of elements of the content (that is, the usage condition file 162) from the song data base. In other words, this means that a move (moving) is performed instead of copying.
- the movement management program 1 34 transfers the data of the music data base to the CPU 32 of the adapter 26, calculates the entire hash value, and stores the data in the nonvolatile memory. 3 Save to 4. This hash value is used as the previously stored hash value in step S52 described above.
- the process of checking the content from the personal computer 1 to the portable device 6 is the same as the process of moving the content from the personal computer 1 to the portable device 6 in FIGS.
- the check-out process is executed by the check-in / check-out management program 132 on the personal computer 1, and the song data is deleted instead of the process for deleting the content in step S69 in FIG.
- the number of times the checked out content is checked out on an overnight basis (or The process is basically the same as the process in the case of movement except that the process of updating the number of times that the check can be performed is performed, and therefore the detailed description of the process is omitted.
- step S81 the mobility management program 134 causes the content database 114 to read out various conditions from the music data overnight pace.
- step S82 the movement management program 134 determines whether or not the copy count has exceeded the copy count limit among the various conditions read in step S81. If the copy count has already exceeded the copy limit count, it is not possible to permit more copies, so the process proceeds to step S83, where the movement management program 1 3 4 executes the display operation instruction program 1 12. A message such as “The number of copies has already reached the copy limit number” is displayed on the display 20 and the process is terminated.
- step S84 it is determined whether or not the current date and time is after the reproduction end date and time.
- the date and time output from the RTC 35 of the adapter 26 is used as the current date and time. This prevents the user from intentionally correcting the current time of the personal computer 1 to a past value.
- the movement management program 13 4 receives the current date and time from the CPU 32 and makes the judgment of step S84 itself, or, in step S81, the playback condition read from the song database is transferred to the adapter 2 6 of It is supplied to the CPU 32, and the CPU 32 performs the determination processing in step S84.
- step S85 the movement management program 1 34 causes the content server 1 14 to delete the selected content from the HDD 21 and Then, the information of the selected content is deleted from the music database.
- step S86 the movement management program 134 causes the CPU 32 to calculate the hash value of the music data pace and store it in the nonvolatile memory 34. Thereafter, the process ends. Therefore, in this case, the content is not moved.
- step S84 If it is determined in step S84 that the current date and time is not after the reproduction end date and time, the process proceeds to step S87, and the movement management program 134 executes the playback content charging condition (for example, it is determined whether or not the fee per playback) is registered in the music database. If the playback charging condition is registered, the mobile management program 134 causes the PD dryino 144 to communicate with the portable device 6 and the portable device 6 in step S88. It is determined whether a billing function exists. If the portable device 6 does not have a billing function, the selected content cannot be transferred to the portable device 6, and therefore, in step S89, the movement management program 1 34 sends the display operation instruction. In the program 112, for example, a message such as "The transfer destination does not have a billing function" is displayed on the display 20, and the content moving process is terminated.
- the playback content charging condition For example, it is determined whether or not the fee per playback
- the mobile management program 134 causes the PD dryino 144 to communicate with the portable device
- step S87 it is determined that the playback charging condition is not registered. If it is determined, or if it is determined in step S88 that there is a billing function in the portable device 6, the process proceeds to step S90, and the mobility management program 1334 executes For example, it is determined whether or not other reproduction conditions such as the number of times of reproduction are registered. If other playback conditions have been registered, the process proceeds to step S91, and the mobility management program 1 34 determines whether or not the portable device 6 has a function to observe the playback conditions. . If the portable device 6 does not have a function of observing the playback conditions, the process proceeds to step S92, and the movement management program 1 34 sends the display operation instruction program 1 12 The device does not have the function to observe the playback conditions. "On the display 20 and terminate the process.
- step S90 If it is determined in step S90 that the playback condition is not registered, or if it is determined in step S91 that the portable device 6 has a function of complying with the playback condition, the playback condition, etc. Is completed, and the process returns to step S56 in FIG.
- FIG. 16 shows an example of playback conditions managed (can be protected) by the portable device 6.
- the playback information shown in FIG. 16 is stored, for example, in the EEPROM 68.
- the playback start date and time and the playback end date and time are registered for each content of items 1 to 3, but the number of playbacks is registered only for item 2 and for item 1 and item 3 Is not registered. Therefore, if the content of item 2 is selected, the playback condition of the number of playbacks can be maintained, but the content of item 1 or item 3 is selected. If this happens, the number of views will not be met.
- the CPU 11 executing the content management program 1 1 1 executes step S 5 in FIG.
- step S 101 the mobility management program 13 4
- step S 102 the mobility management program 1 3 4 sets the destination device (in this case, the portable device
- step S106 the movement management program 134 checks in step S102 the conditions that can be set for the destination device among the format conditions registered in the music data pace. Determined based on conditions.
- step S104 the mobility management program 134 determines whether there is a condition that can be set, and if there is no condition that can be set, the process proceeds to step S105. Prohibit the process of moving content to portable device 6. In other words, in this case, the portable device 6 cannot keep the conditions registered in the music database, so that moving the content to such portable device 6 is prohibited. It is done.
- step S104 If it is determined in step S104 that there is a condition that can be set, the flow advances to step S106, and the mobility management program 134 sends the condition to the use condition Four It is converted to the condition of the mat (for example, the condition stored in the profile when transferring to the portable device 6). Then, in step S107, the mobility management program 134 sets the converted conditions in the partner device. As a result, the portable device 6 can reproduce the content according to the set conditions (observing the conditions).
- the CPU 11 executing the content management program 11 and the CPU 53 executing the main program are used to transfer data from the HDD 21 to the portable device 6.
- a process for copying content to a server will be described.
- the processing of steps S111 to S127 in FIGS. 18 to 20 is executed by the copy management program 1333, and the process is executed from the HDD 21 in FIGS. 12 to 14.
- This is the same processing as the processing from step S51 to step S67 when the content is moved to the bull device 6. That is, also in this case, after the alteration based on the music data is checked, a check process with the reproduction condition of the selected content is performed.
- the content is transferred from the HDD 21 of the personal computer 1 to the flash memory 61 of the portable device 6 and stored. .
- the copy management program 1333 increments the number of counts by one by one based on the music data.
- the copy management program 133 causes the CPU 32 to calculate the hash value of the entire music data base, and stores the calculated value in the nonvolatile memory 34.
- step S161 the mobility management program 134 requests the CPU 53 of the portable device 6 to read the content information stored in the flash memory 61.
- the CPU 53 transmits the information of the content stored in the flash memory 61 to the personal computer 1 in response to this request.
- the movement management program 134 causes the display 20 to display a GUI for selecting a content stored in the flash memory 61 based on this information.
- the user operates the keyboard 18 or the mouse 19 to specify the content to be moved from the portable device 6 to the HDD 21 (content overnight base 114) based on the GUI.
- step S162 the mobility management program 134 causes the authentication program 141 to execute a mutual authentication process with the CPU 53 and share a communication key. This process is similar to the process in step S56 in FIG.
- step S163 the CPU 53 reads the encrypted selected content stored in the flash memory 61 and transfers it to the personal computer 1.
- the mobility management program 134 saves the content transferred from the portable device 6 as a single file with a file name on the content overnight base 114 (HDD 21). Exist. This save can be done, for example, as part of a single file
- step S165 the CPU 53 reads the encrypted key of the selected content stored in the flash memory 61, decrypts it with its own storage key, and further communicates. After being encrypted with the private key, it is transferred to the personal computer 1.
- This encryption key has been stored in the brush memory 61 in the process of step S67 in FIG. 14, for example.
- step S166 the mobility management program 134 receives the transfer of the encryption key from the portable device 6, and causes the decryption program 142 to decrypt it with the communication key, and the encryption program 133 7. Encrypt with your own storage key.
- step S166 the mobility management program 134 sends the content file name saved in step S164, the information of the content, and the user via the GUI to the content data base 114. Then, the song name entered in step S166 and the encryption key encrypted in step S166 are registered in the song data base of HDD 21.
- step S168 the movement management program 134 causes the use condition management program 140 to calculate the hash value of the entire music database in the CPU 32 and store it in the nonvolatile memory 34.
- step S169 the mobility management program 134 notifies the portable device 6 that the encryption key has been stored, and requests that the content be deleted.
- the CPU 53 when requested to delete the content from the personal computer—Even 1,
- step S170 the content stored in the flash memory 61 is deleted.
- the process of checking in content from the portable device 6 to the personal computer 1 is the same as the process of moving content from the portable device 6 to the personal computer 1 in FIG. That is, the check-in process is executed by the check-in / check-out management program 132 in the personal computer 1, and the processes of steps S162 to S166 of FIG. 21 are omitted. Also, the personal computer 1 executes a process of updating the number of times that the checked-in content can be checked out in the song database in step S167 of FIG. After the process in step S170, the process is basically the same as the process in the case of moving except that the deletion of the content file is confirmed, so that the detailed description of the process is omitted.
- the personal computer 1 executes the mutual authentication process of step S 16 2 in FIG. 21 in the check-in process. I do.
- step S181 to step S188 shown in FIG. This processing is the same as the processing of steps S161 to S168 in the process of moving contents from the evening device 6 to the HDD 21.
- the copy process is executed by the copy management program 133, and the process in the case of movement is basically the same as that of the move except that the processes of steps S169 and S170 in FIG. 21 are omitted. Since the processing is the same as described above, the description is omitted.
- step S2 ⁇ 1 the purchasing program 144 controls the communication unit 25 when the button 202 shown in FIG. 5 is clicked and the user instructs access to the EMD server 4, and Access EMD server 4 via network 2.
- the EMD server 4 transfers information such as the song number, song title, and information of the content held by itself to the personal computer 1 via the network 2.
- the purchase program 144 acquires this information via the communication section 25, the purchase program 144 causes the display / operation instruction program 112 to display it on the display 20 via the interface 1 #.
- step S202 The user uses the GUI displayed on the display 20 to specify the content desired to be copied in step S202. This designation information is transferred to the EMD server 4 via the network 2.
- step S203 the purchase program 144 performs mutual authentication processing with the EMD server 4 via the network 2 and shares the communication key.
- the mutual authentication process performed between the personal computer 1 and the EMD server 4 can be performed using, for example, a public key and a secret key defined in ISO 9798-3.
- the personal computer 1 has its own private key and the public key of the EMD server 4 in advance, and the EMD server 4 has its own private key and performs mutual authentication processing. .
- the public key of the personal computer 1 is transferred from the EMD server 4 or a certificate distributed in advance to the personal combination 1 is transferred from the personal combination 1 to the EMD server 4, and the certificate May be confirmed by the EMD server 4 to obtain the public key.
- the purchase program 144 executes a process related to charging with the EMD server 4. The details of this accounting process will be described later with reference to the flowchart of FIG.
- step S205 the EMD server 4 transfers the encrypted content specified in step S202 to the personal computer 1 via the network 2 to the personal computer 1. I do. At this time, the time information is also transferred appropriately.
- step S206 the purchase program 144 causes the HDD 21 to save the transferred content as one content file 161 with a file name at the content database 114.
- step S207 the EMD server 4 further encrypts the content encryption key using the communication key shared with the personal computer 1 in step S203, and transfers the encrypted content key to the personal computer 1.
- step S208 the purchase program 144
- the encryption key transferred from the EMD server 4 is decrypted by itself or in cooperation with the CPU 32 of the adapter 26 using the communication key, and the encrypted program 137 decrypts the encrypted key. Encrypt the key with your own storage key.
- step S209 the purchase program 144 sets the content file name, content information, the song name input by the user, and the encrypted encryption key in the content The song will be registered to the song base. Further, in step S210, the purchase program 144 causes the CPU 32 to calculate the hash value of the entire music piece overnight, and stores the hash value in the nonvolatile memory.
- step S205 the EMD server 4 transmits the time data to the personal computer 1 together with the content. This time data is transferred from the personal computer 1 to the adapter 26.
- the CPU 32 of the adapter 26 receives the time data transmitted from the personal computer 1, the CPU 32 corrects the time of the RTC 35 in step S 211. In this way, the time information of the RTC 35 of the adapter 26 is corrected based on the time information obtained from the external device recognized as the correct device as a result of the mutual authentication. It is possible to hold correct time information.
- step S221 the purchase program 144 transmits the price information transmitted from the EMD server 4 in step S201. From among them, the price information of the selected content specified in step S202 is read, and this is written to the charging log on the HDD 21.
- Figure 25 shows an example of such a billing log.
- the user has copied items 1 to 3 from the EMD server 4, the area of item 1 and item 2 is set at 50 yen, and the charge of item 3 is set at 60 yen. I have.
- the hash value of the charging log at that time is also calculated by the CPU 32 and registered in the nonvolatile memory 34.
- step S222 the purchase program 144 reads the accounting port written in step S221 from the HDD 21 and transfers it to the EMD server 4 via the network 2.
- step S223 the EMD server 4 executes a charging calculation process based on the charging log transferred from the personal computer 1. That is, the EMD server 4 additionally updates the charging log transmitted from the user of the personal computer 1 to the built-in data base.
- step S224 the EMD server 4 determines whether or not to make an immediate decision on the billing log. If the decision is made immediately, the process proceeds to step S225, where the EMD server 4 determines the product necessary for the decision. The name, amount, etc. are transferred to the approval server (not shown).
- step S226 the decision making server executes a decision making process for the user of the personal convenience store. If it is determined in step S224 that the decision is not made immediately, the processing of steps S225 and S226 is skipped. That is, this process is performed periodically thereafter, for example, once a month.
- step S241 the user connects the IE C60958 output terminal of the CD player to the IE C60958 terminal 24a of the audio input / output interface 24 of the personal computer 1.
- step S242 the user operates the keyboard 18 or the mouse 19 to input the title of the content to be copied from the CD player (or the number corresponding to the content).
- step S243 the user operates a button of the CD player to start reproduction of the CD player. If a line for sending and receiving control signals is connected between the CD player and the personal computer 1, a playback start command is input via the keyboard 18 or the mouse 19 of the personal computer 1 to It is also possible to have a CD player start playing a CD.
- step S When the CD player starts playing the CD, step S
- step S245 the copy management program 1
- S CMS Serial Copy Management System
- This S CMS data includes copy information such as copy prohibition, copy only once, and copy free. Therefore, in step S246, the CPU 11 determines whether or not the S CMS data indicates copy prohibition. Proceeding to step S247, the copy management program 133 causes the display operation instruction program 112 to display a message such as "copy is prohibited" on the display 20, and terminates the copy processing. That is, in this case, copying to the HDD 21 is prohibited.
- step S246 determines in step S246 that the S CMS information read in step S245 does not indicate that copying is prohibited
- step S248 reads the watermark code, and reads the watermark code. It is determined in step S249 whether the mark indicates that copying is prohibited. If the watermark code indicates that copying is prohibited, the process proceeds to step S247, where a predetermined message is displayed as in the case described above, and the copying process ends.
- step S249 If it is determined in step S249 that the war mark does not indicate that copying is prohibited, the process proceeds to step S250, where a deadline data pace check process is performed. If the selected content has already been registered as a result of the expiration date database check, the process is terminated in the processes of steps S251 and S252. This processing is similar to the processing in steps S13 and S14 in FIG.
- step S 253 to S258 the registration process is executed in steps S253 to S258.
- the processing in steps S 253 to S 258 is the same as that in step S 19 in FIG. 7, except that the S CMS information supplied from the IEC 60958 terminal 24 a is also registered in the music database in step S 257. Or the same processing as the processing of step S24 Therefore, the description is omitted.
- steps S271 to S2733 the hash value of the entire song data is calculated as in steps S111 to S113 of FIG. It is determined whether or not the hash value matches the previously set hash value, and a check process for altering the music data is performed.
- step S274 the display operation instruction program 1 1 2 transmits the content data via the content management program 1 1 1 1 1 4
- the user accesses the song list on the HDD 21, reads the information of the song registered therein, and displays the information on the display 20.
- the user looks at the display and operates the keyboard 18 or the mouse 19 as appropriate to select the content to be reproduced and output.
- step S275 the display operation instruction program 112 executes a check process such as a reproduction condition of the selected content. Details of the check processing such as the reproduction condition will be described later with reference to the flowchart of FIG.
- step S276 the display / operation instruction program 112 sends the content selected in step S274 to the content database 114 via the content management program 111. Is read from the song data base and the decryption program 142 decrypts it with the storage key.
- step S277 the display operation instruction program 111 is transmitted through the content management program 111.
- the content data base 114 reads the SMS information of the selected content from the song data base, and outputs the S CMS information output from the IEC 60958 terminal 24a according to the rules of the SCM S system. Determined according to For example, when there is a limit on the number of times of reproduction, the number of times of reproduction is incremented by 1 to be new SCMS information.
- step S278 the display operation instruction program 112 further reads out the ISRC of the selected content from the song data base to the content overnight base 114 via the content management program 111. Let it.
- step S279 the display operation instruction program 112 adds the content file name selected from the song data base to the content database 114 via the content management program 111. And reads the content from the HDD 21 based on the file name.
- the display operation instruction program 112 further causes the content database 114 to read the encryption key corresponding to the content from the song database via the content management program 111, and to execute the decryption program.
- step 142 the content is decrypted using the storage key, and the encrypted content is decrypted using the decrypted encryption key.
- the compression / decompression program 138 further decodes (decompresses) the compression code of the content.
- step S280 the display / operation instruction program 112 adds the digital content data decoded in step S279 to the dryino 117, the S CMS information determined in step S277, and the step S278.
- the display operation instruction program The RAM 112 operates, for example, a program such as a real player (trademark) (not shown) to convert digital contents into an analog signal, and an analog output of the audio input / output interface 24. Output from terminal.
- step S 281 the display operation instruction program 1 1 1 2, via the content management program 1 1. 1, enters the content number 1 1 4 into the content number 1 1 4 Is incremented by one. Then, in step S282, it is determined whether or not a playback charging condition is added to the selected content. If the playback charging condition has been added, the process proceeds to step S283, where the display operation instruction program 1 1 2 transmits the content data 1 1 4 via the content management program 1 1 1. In step S 2 84, the display operation instructing program 1 1 2 calculates the hash value of the entire song database to the CPU 3 2. And store it in the non-volatile memory 34.
- step S282 When it is determined in step S282 that the playback charging condition has not been added to the selected content, the processing in step S283 and step S284 is skipped.
- step S301 the display / operation instruction program 112 causes the content management server 111 to read various conditions of the music data management server via the content management program 111.
- step S302 the use condition management program 140 sets out of the read conditions It is determined whether or not the number of times of reproduction has exceeded the limit number.
- step S303 the process proceeds to step S303, and the content is selected by the content database 1114 via the content management program 111. Deleted content from HDD 21 and also delete the information of the selected content from the song database.
- step S304 the display operation instruction program 112 further causes the use condition management program 140 to calculate a new hash value based on the song data and the CPU 32, and stores the hash value in a non-volatile manner. Store them in memory 34. In this case, playback output is prohibited.
- step S302 If it is determined in step S302 that the number of playbacks has not exceeded the limit number, the process proceeds to step S305, and the usage condition management program 1442 determines that the playback end date and time has passed the current date and time. Judge whether or not there is. If the playback end date and time has passed the current date and time, the selected content is deleted from the HDD 21 and also deleted from the song database in step S303 as in the case described above. Then, in step S304, the hash value of the new song data is calculated and stored. Also in this case, reproduction output is prohibited.
- step S305 If it is determined in step S305 that the playback end date and time is not after the current date and time, the process proceeds to step S306, and the CPU 32 sets the playback charging condition for the selected content. Determine whether or not it has been added. If the playback charging condition has been added, the process proceeds to step S307, and the display operation instruction program 1 12 sends a message indicating that the playback charging condition has been added and the fee to the display 20. To be displayed. In step S306, the billing conditions for playback If it is determined that is not added, the process of step S307 is skipped.
- step S321 to S325 a music data alteration check, a specification of the selected content, and a check process such as a reproduction condition of the selected content are performed.
- This processing is the same as the processing from step S271 to step S2755 in FIG. 28, and a description thereof will be omitted.
- step S3226 mutual authentication processing is executed between portable device 6 and personal convenience 1, and a communication key is shared between the devices.
- the display operation instruction program 112 instructs the portable device 6 to reproduce the encrypted content to be transmitted.
- the display operation instruction program 112, in step S324, sends the specified selected content to the content database 114 via the content management program 111.
- the file name is read from the song data base, and the content of the file name is read from the HDD 21.
- step S32 the display operation instruction program 112 converts the content compression encoding, encryption, format, and the like into the content management program 111 in the format of the portable device 6 in step S329. Is performed.
- the display / operation instruction program 1 1 2 causess the encryption program 1337 to encrypt the content converted in step S329 with the communication key, and transmits the content to the portable device 6.
- step S331 the CPU 53 of the portable device 6 responds to the instruction transferred from the personal computer 1 in step S327, and the The evening is decrypted with the communication key and reproduced and output.
- step S3332 the display / operation instruction program 1 1 2 increments the playback count based on the song data 1 by 1 to the content overnight 1 4 via the content management program 1 1 1. .
- step S333 the display operation instruction program 112 determines whether or not the playback content charging condition has been added to the selected content. 3 3 4 In the content management program
- step S 335 the CPU 32 is made to newly calculate and store the hash value of the entire music database. If the playback content billing condition has not been added to the selected content, the processing in steps S334 and S335 is skipped.
- various measures have been devised in order to prevent the contents from being illegally copied. For example, a program for operating CPU 11 is so-called tamper-resistant software in which the execution order changes every time.
- the hash value based on song data is
- the non-volatile memory 34 stores the hash values corresponding to the information of the contents A and the contents B.
- the recording data including the contents A and B of the HDD 21 is backed up to another recording medium 271.
- the hash value of the nonvolatile memory 34 is also changed to the hash value corresponding to the content B.
- the non-volatile memory 34 Stores a hash value calculated from the information of the content B, and does not store a hash value calculated from the information of the content A and the content B.
- the hash value based on the content A and the content B stored in the HDD 21 does not match the past hash value stored in the nonvolatile memory 34, and It is detected that the database has been altered. As a result, the use of the content A and the content B stored in the HDD 21 is restricted thereafter.
- the adapter 26 has a built-in RTC 35, and the value of the RTC 35 is the time data transferred from another device (for example, the EMD server 4) for which a correct authentication result was obtained. Correct the time information based on the evening.
- the current date and time is not managed by the personal computer 1 but is output by the RTC 35. Therefore, the user cannot deliberately correct the current time of the personal computer 1 to a past time and cannot escape determination of the reproduction end date and time as the reproduction condition.
- the security of the adapter 26 is further improved by configuring the adapter 26 to decrypt and execute the program transferred in accordance with the program stored in the ROM 36 in advance.
- step S351 the personal computer 1
- the program to be executed by the program 26 is encrypted by using an encryption key stored in the RAM 13 in advance and transferred to the adapter 26.
- the ROM 36 of the adapter 26 a program for decrypting and executing the encrypted program transferred from the personal computer 1 is stored in advance.
- the CPU 32 decrypts the encrypted program transferred from the personal computer 1 in step S352 according to the program stored in the ROM 36.
- step S313 the CPU 32 loads the decrypted program in the RAM 33, and executes the program in step S354.
- the CPU 11 of the personal computer 1 when the CPU 11 of the personal computer 1 causes the adapter 26 to calculate the hash value of the music database of the HDD 21, the CPU 11 encrypts the music data based on the music data with the encryption key and uses the encryption key. Transfer to CPU 32 of 26.
- the CPU 32 calculates a hash value by applying a hash function to the transferred music-based data. Then, the calculated hash value is stored in the nonvolatile memory 34. Alternatively, the CPU 32 compares the hash value with a previously stored hash value, and transfers the comparison result to the CPU 11 of the personal computer 1.
- FIG. 35 shows a more specific configuration inside the adapter 26.
- Adapter 26 is formed as a semiconductor IC.
- the adapter 26 has a RAM controller 301 that controls writing and reading to and from the RAM 33.
- a logic circuit 302 is provided.
- the logic circuit 302 is, for example, After decrypting the encrypted content, the decrypted
- the interfaces 31 to ROM 36, the RAM controller 301, and the logic circuit 302 are integrally incorporated in the semiconductor IC, and are configured so that they cannot be disassembled from the outside.
- the crystal oscillator 311 is used when the adapter 26 generates a reference clock when executing various processes.
- the oscillation circuit 312 is an oscillation circuit for operating the RTC 35.
- the battery 313 supplies a backup power to the oscillation circuit 312, the nonvolatile memory 34, and the RTC 35.
- the other circuits of the adapter 26 are supplied with power from the power supply circuit 3 2 1 of the personal computer 1.
- the nonvolatile memory 34 can be configured by a writable and erasable ROM. However, when the nonvolatile memory 34 is configured by a RAM that is backed up by a backup power supply from the battery 31, for example, FIG. As shown in FIG. 3A and FIG. 36B, a protective aluminum layer 351 is formed on the nonvolatile memory 34, and the nonvolatile aluminum layer 351 is formed on the same plane as the protective aluminum layer 351.
- the power supply pattern 352 for supplying the electric power from the battery 313 to the volatile memory 34 can be formed.
- non-volatile memory 34 is falsified, and if the protection aluminum layer 35 1 is to be deleted, the power supply pattern 35 2 on the same plane is also deleted, the non-volatile memory 34 The power supply to is cut off, and the data stored inside is erased. With such a configuration, it is possible to further enhance the tamper resistance. Further, as shown in FIG. 37, wirings 410-1 to 41-1-3 for writing or reading data to / from the nonvolatile memory 34 are arranged at corresponding positions in the vertical (depth) direction. It is formed so that it may overlap.
- the wirings 410-1 to 401-13 can be formed redundantly.
- the wirings 410-1 to 410-1-3 formed inside the nonvolatile memory 34 couple elements such as transistors constituting the nonvolatile memory 34, the path is, for example, Even if the connection can be made linearly, it is not formed linearly but formed to have a predetermined length. In this way, the length of the wires 401-1 through 401-3 is longer than the length required for the wire, and compared to the shortest wire required. Therefore, it has a large parasitic capacitance.
- a dedicated circuit built-in the adapter 26 as a semiconductor IC designed to read data from the non-volatile memory 34 is designed by setting an impedance that matches the parasitic capacitance.
- the data stored in the nonvolatile memory 34 can be read normally.
- the probe is connected to the wirings 41-1-1 to 41-1-3 to read the data stored in the non-volatile memory 34, the parasitic capacitance and the combined capacitance of the probe will have an effect. As a result, it is difficult to read the data normally.
- the portable device 6 was used as the recording medium.
- the present invention can be applied to a case where data is transferred or copied to another recording medium.
- the content may be music data or music data such as audio data, image data or other data.
- the hash value of the data is calculated and stored, so that it is easy to prevent data-based tampering.
- a song database is provided in the HDD 21 and the entire hash value is checked every time, so the contents of the HDD 21 are moved. Backup immediately before the move, and backup the data immediately after the move
- I SRC is used to determine the identity of songs, and when I SRC cannot be obtained, TOC is used.Thus, even if I SRC cannot be obtained, it is necessary to determine the identity of songs. Becomes possible.
- the processing executed by the adapter 26 may be executed by the CPU 11 using a secure program.
- the storage key having the same value is generated by the content management program 111 when the storage key becomes necessary.
- hash values are hidden and stored by the content management program 1 1 1 Is done.
- the personal computer 1 replaces the current time supplied by the RTC 35 of the adapter 26 with a network connection. Download the current time from a specific server (for example, EMD registration server 3) connected to the server 2 and execute the judgment process based on the current time. In this case, the personal computer 1 stores the current time at a predetermined time interval, displays an error when a time earlier than the stored time is set, and does not accept the time setting. You may do so.
- a specific server for example, EMD registration server 3
- the above-described series of processing can be executed by hardware, but can also be executed by software.
- the programs that make up the software are installed on a computer that is built into dedicated hardware, or by installing various programs, and various types of programs are installed. It is installed from a program storage medium, for example, at a general-purpose personal computer or the like that can execute the functions described above.
- the program storage medium that stores programs installed on the computer and made executable by the computer includes a magnetic disk 41 (including a floppy disk), an optical disk 42 (CD-R0M (Including Compact Disc-Read Only Memory) DVD (Digital Versatile Disc), magneto-optical disk 43 (including MD (Mini-Disc)), or package media including semiconductor memory 44, or It is composed of ROM 12 in which programs are temporarily or permanently stored, and HDD 21.
- Program case The storage of the program in the storage medium is performed via an interface such as the communication unit 25, as necessary, via a network such as the mouth-to-mouth communication network or the internet network 2, or via a digital satellite broadcast. Alternatively, it is performed using a wireless communication medium.
- the steps of describing a program stored in a program storage medium are not only performed in a chronological order according to the described order, but are not necessarily performed in a chronological order. It also includes processes that are executed individually or individually.
- a system refers to an entire device configured by a plurality of devices.
- the storage or reading of the content data in the storage unit is performed based on the execution result of the execution unit provided in the hardware. Based on this, control is performed by control means composed of software, so that it is possible to reliably prevent unauthorized duplication of data by analyzing and falsifying the software.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Library & Information Science (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020007011451A KR100632495B1 (ko) | 1999-02-17 | 2000-02-17 | 정보처리장치 및 방법과 프로그램 격납매체 |
AU25731/00A AU768421B2 (en) | 1999-02-17 | 2000-02-17 | Information processing device and method, and program storage medium |
EP00904011A EP1096388A4 (en) | 1999-02-17 | 2000-02-17 | INFORMATION PROCESSING APPARATUS AND METHOD, AND PROGRAM MEMORY |
CA2328932A CA2328932C (en) | 1999-02-17 | 2000-02-17 | Information processing device and method, and program storage medium |
US09/647,378 US7266202B1 (en) | 1999-02-17 | 2000-02-17 | Information processing device and method, and program storage medium |
US11/252,750 US7437768B2 (en) | 1999-02-17 | 2005-10-19 | Information processing apparatus and method, and program storage medium |
US11/560,235 US7516497B2 (en) | 1999-02-17 | 2006-11-15 | Information processing apparatus and method, and program storage medium |
US11/742,908 US20070204172A1 (en) | 1999-02-17 | 2007-05-01 | Information processing apparatus and method, and program storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP11/39218 | 1999-02-17 | ||
JP3921899 | 1999-02-17 |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/647,378 A-371-Of-International US7266202B1 (en) | 1999-02-17 | 2000-02-17 | Information processing device and method, and program storage medium |
US11/252,750 Continuation US7437768B2 (en) | 1999-02-17 | 2005-10-19 | Information processing apparatus and method, and program storage medium |
US11/560,235 Continuation US7516497B2 (en) | 1999-02-17 | 2006-11-15 | Information processing apparatus and method, and program storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000049510A1 true WO2000049510A1 (fr) | 2000-08-24 |
Family
ID=12547012
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2000/000904 WO2000049510A1 (fr) | 1999-02-17 | 2000-02-17 | Dispositif et procede de traitement de l'information et support de memorisation de programme |
Country Status (7)
Country | Link |
---|---|
US (4) | US7266202B1 (ja) |
EP (1) | EP1096388A4 (ja) |
KR (1) | KR100632495B1 (ja) |
CN (4) | CN1293491C (ja) |
AU (1) | AU768421B2 (ja) |
CA (1) | CA2328932C (ja) |
WO (1) | WO2000049510A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009272033A (ja) * | 2009-08-12 | 2009-11-19 | Sony Corp | 情報処理装置および方法 |
Families Citing this family (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100632495B1 (ko) * | 1999-02-17 | 2006-10-09 | 소니 가부시끼 가이샤 | 정보처리장치 및 방법과 프로그램 격납매체 |
JP4683442B2 (ja) * | 2000-07-13 | 2011-05-18 | 富士通フロンテック株式会社 | 処理装置および集積回路 |
JP4029569B2 (ja) | 2000-12-13 | 2008-01-09 | 株式会社日立製作所 | ディジタル情報記録再生装置、記録装置、受信装置および送信装置 |
US20020095680A1 (en) * | 2001-01-12 | 2002-07-18 | Davidson Robert J. | Personal movie storage module |
JP4465577B2 (ja) * | 2001-04-19 | 2010-05-19 | ソニー株式会社 | 情報処理装置および方法、情報処理システム、記録媒体、並びにプログラム |
US7424747B2 (en) * | 2001-04-24 | 2008-09-09 | Microsoft Corporation | Method and system for detecting pirated content |
JP3932476B2 (ja) * | 2001-06-28 | 2007-06-20 | ソニー株式会社 | 情報提供システム、情報処理装置および方法、記録媒体、並びにプログラム |
JP4831890B2 (ja) * | 2001-07-06 | 2011-12-07 | パナソニック株式会社 | コンテンツ管理方法及びコンテンツ管理装置 |
US20040117309A1 (en) * | 2001-07-09 | 2004-06-17 | Ryuji Inoue | Content management system and information recording medium |
EP1428214A2 (en) * | 2001-07-09 | 2004-06-16 | Matsushita Electric Industrial Co., Ltd. | Content reading apparatus |
JP4292736B2 (ja) * | 2001-11-15 | 2009-07-08 | ソニー株式会社 | 伝送システム、伝送方法 |
US20030120932A1 (en) * | 2001-12-21 | 2003-06-26 | Koninklijke Philips Electronics N.V. | Synchronizing source and destination systems via parallel hash value determinations |
NZ534192A (en) * | 2001-12-25 | 2005-05-27 | Ntt Docomo Inc | Device and method for restricting content access and storage |
JP4139114B2 (ja) * | 2002-02-04 | 2008-08-27 | 松下電器産業株式会社 | デジタルコンテンツ管理装置およびデジタルコンテンツ管理プログラム |
JP3881942B2 (ja) * | 2002-09-04 | 2007-02-14 | 松下電器産業株式会社 | 暗号化部を有する半導体装置 |
JP2004118327A (ja) * | 2002-09-24 | 2004-04-15 | Sony Corp | コンテンツ使用制御装置及びコンテンツ使用制御方法、並びにコンピュータ・プログラム |
KR100978183B1 (ko) * | 2002-10-16 | 2010-08-25 | 톰슨 라이센싱 | 글로벌 카피 보호 시스템으로부터 로컬 카피 보호시스템으로의 보안 유출 |
KR100513297B1 (ko) * | 2003-01-24 | 2005-09-09 | 삼성전자주식회사 | 인트라넷에서의 멀티미디어 컨텐츠 관리 시스템 및 방법 |
BRPI0406198A (pt) * | 2003-07-28 | 2005-08-09 | Sony Corp | Aparelho e método de processamento de informação, meio de gravação gravando um programa legìvel por um computador, e, programa para fazer um computador executar um processo |
JP4230892B2 (ja) * | 2003-11-28 | 2009-02-25 | 株式会社東芝 | 映像信号記録再生装置及び映像信号記録再生方法 |
JP4431374B2 (ja) * | 2003-12-04 | 2010-03-10 | 株式会社日立製作所 | 記録方法、記録装置及び受信装置 |
US8112400B2 (en) * | 2003-12-23 | 2012-02-07 | Texas Instruments Incorporated | Method for collecting data from semiconductor equipment |
EP1555592A3 (en) * | 2004-01-13 | 2014-05-07 | Yamaha Corporation | Contents data management apparatus |
US7698743B2 (en) * | 2004-01-16 | 2010-04-13 | Panasonic Corporation | Authentication server, method and system for detecting unauthorized terminal |
FR2869745A1 (fr) * | 2004-04-28 | 2005-11-04 | France Telecom | Systeme et procede d'acces securise de terminaux visiteurs a un reseau de type ip |
JP4333494B2 (ja) * | 2004-06-17 | 2009-09-16 | ソニー株式会社 | コンテンツ再生装置,コンテンツ再生方法,コンテンツ管理装置,コンテンツ管理方法およびコンピュータプログラム。 |
US8646107B1 (en) * | 2004-06-25 | 2014-02-04 | Altera Corporation | Implementing usage limited systems |
US20060064394A1 (en) * | 2004-09-17 | 2006-03-23 | International Business Machines Corporation | Method for handling changing and disappearing online references to research information |
US8307446B2 (en) * | 2004-10-19 | 2012-11-06 | Victor Company Of Japan, Ltd. | Data using apparatus |
JP2006134146A (ja) * | 2004-11-08 | 2006-05-25 | Fujitsu Ltd | データ処理装置,情報処理システム,選択プログラムおよび同プログラムを記録したコンピュータ読取可能な記録媒体 |
JP4131964B2 (ja) * | 2004-12-10 | 2008-08-13 | 株式会社東芝 | 情報端末装置 |
JP4692003B2 (ja) * | 2005-02-10 | 2011-06-01 | ソニー株式会社 | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム |
US20060282500A1 (en) * | 2005-06-13 | 2006-12-14 | Yutaka Kiuchi | Information management method using a managing symbol and information management server |
JP2007179276A (ja) * | 2005-12-27 | 2007-07-12 | Internatl Business Mach Corp <Ibm> | 適合判定方法、装置、およびプログラム |
DE102006060307A1 (de) * | 2006-12-20 | 2008-06-26 | Robert Bosch Gmbh | Verfahren zum Betreiben einer Abschalteinrichtung für eine Vorrichtung, insbesondere eine Brennkraftmaschine und/oder eine elektrische Maschine, sowie Abschalteinrichtung |
US7840537B2 (en) * | 2006-12-22 | 2010-11-23 | Commvault Systems, Inc. | System and method for storing redundant information |
US20090158443A1 (en) * | 2007-12-17 | 2009-06-18 | Verizon Business Network Services Inc. | Piracy prevention, detection, and content management |
JP2010134578A (ja) * | 2008-12-03 | 2010-06-17 | Fujitsu Microelectronics Ltd | 情報処理装置、およびコンテンツ保護方法 |
US8401996B2 (en) | 2009-03-30 | 2013-03-19 | Commvault Systems, Inc. | Storing a variable number of instances of data objects |
US8578120B2 (en) | 2009-05-22 | 2013-11-05 | Commvault Systems, Inc. | Block-level single instancing |
WO2011111213A1 (ja) * | 2010-03-11 | 2011-09-15 | 株式会社 東芝 | コンテンツ配信システム、配信サーバ、及びユーザ端末 |
WO2012045023A2 (en) | 2010-09-30 | 2012-04-05 | Commvault Systems, Inc. | Archiving data objects using secondary copies |
KR20130046236A (ko) * | 2011-10-27 | 2013-05-07 | 도시바삼성스토리지테크놀러지코리아 주식회사 | 디지털 컨텐츠의 원격 관리 방법 및 이를 적용하는 시스템 |
US9020890B2 (en) | 2012-03-30 | 2015-04-28 | Commvault Systems, Inc. | Smart archiving and data previewing for mobile devices |
JP2014103590A (ja) * | 2012-11-21 | 2014-06-05 | Toshiba Corp | 通信装置、通信方法、システム及びプログラム |
US9633022B2 (en) | 2012-12-28 | 2017-04-25 | Commvault Systems, Inc. | Backup and restoration for a deduplicated file system |
CN104183243A (zh) * | 2013-05-24 | 2014-12-03 | 上海航天测控通信研究所 | 音频编解码系统 |
US10324897B2 (en) | 2014-01-27 | 2019-06-18 | Commvault Systems, Inc. | Techniques for serving archived electronic mail |
US20150288659A1 (en) * | 2014-04-03 | 2015-10-08 | Bitdefender IPR Management Ltd. | Systems and Methods for Mutual Integrity Attestation Between A Network Endpoint And A Network Appliance |
US10691838B2 (en) * | 2014-06-20 | 2020-06-23 | Cypress Semiconductor Corporation | Encryption for XIP and MMIO external memories |
CA2874277C (en) * | 2014-10-04 | 2015-08-18 | 2381371 Ontario Inc. | Tamper-evident network messaging method and system, and device configured therefor |
CA2981363A1 (en) * | 2015-03-30 | 2016-10-06 | Irdeto B.V. | Data protection |
US10324914B2 (en) | 2015-05-20 | 2019-06-18 | Commvalut Systems, Inc. | Handling user queries against production and archive storage systems, such as for enterprise customers having large and/or numerous files |
TWI606394B (zh) | 2016-05-26 | 2017-11-21 | 鴻海精密工業股份有限公司 | 燒錄系統及燒錄方法 |
CN110555304A (zh) * | 2018-05-31 | 2019-12-10 | 武汉安天信息技术有限责任公司 | 恶意包名检测方法、恶意应用检测方法及相应装置 |
KR102111854B1 (ko) * | 2018-06-27 | 2020-05-15 | 주식회사 블루비즈 | 센서 게이트웨이 장치를 이용한 생산설비 관리 시스템 |
US11403386B2 (en) * | 2018-08-31 | 2022-08-02 | Bausch Health Ireland Limited | Encrypted memory device |
CN109963104B (zh) * | 2019-04-22 | 2021-02-09 | 东南大学 | 一种安全拍摄设备的回显限制实现方法及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10269289A (ja) * | 1997-03-26 | 1998-10-09 | Sony Corp | ディジタルコンテンツ配付管理方法、ディジタルコンテンツ再生方法及び装置 |
JPH10283270A (ja) * | 1997-04-09 | 1998-10-23 | Fujitsu Ltd | 再生許可方法、記録方法及び記録媒体 |
JPH10302008A (ja) * | 1997-04-30 | 1998-11-13 | Mitsubishi Corp | データコンテンツ流通システム |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US4644493A (en) * | 1984-09-14 | 1987-02-17 | International Business Machines Corporation | Implementing a shared higher level of privilege on personal computers for copy protection of software |
JP3276021B2 (ja) | 1993-11-04 | 2002-04-22 | 日本電信電話株式会社 | ディジタル情報保護方法及びその処理装置 |
US5584023A (en) * | 1993-12-27 | 1996-12-10 | Hsu; Mike S. C. | Computer system including a transparent and secure file transform mechanism |
JPH07295800A (ja) * | 1994-04-22 | 1995-11-10 | Advance Co Ltd | ソフトウエアプロテクト方式 |
JPH08120190A (ja) * | 1994-08-31 | 1996-05-14 | Fuji Xerox Co Ltd | クロロガリウムフタロシアニン結晶の製造方法 |
JP3542088B2 (ja) * | 1994-09-09 | 2004-07-14 | 富士通株式会社 | データコンテンツ利用システム |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
MY112755A (en) * | 1995-06-06 | 2001-08-30 | Sony Corp | Information data reproducing system, reproducing apparatus, reproducing method, data forming apparatus and data record medium |
US5999629A (en) * | 1995-10-31 | 1999-12-07 | Lucent Technologies Inc. | Data encryption security module |
WO1997043761A2 (en) * | 1996-05-15 | 1997-11-20 | Intertrust Technologies Corp. | Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances |
JPH103745A (ja) * | 1996-06-12 | 1998-01-06 | Sony Corp | 記録媒体、デジタルコピー管理方法、再生装置、及び記録装置 |
JPH1027123A (ja) * | 1996-07-11 | 1998-01-27 | Toshiba Corp | コンピュータソフトウェアのコピープロテクト方法 |
CN1482542A (zh) * | 1997-01-27 | 2004-03-17 | �ʼҷ����ֵ�������˾ | 传递内容信息和与其相关的附加信息的方法和系统 |
JP3898322B2 (ja) | 1997-02-14 | 2007-03-28 | 富士通株式会社 | 電子情報の認証を行う認証システムおよび方法 |
CN1102774C (zh) * | 1997-04-23 | 2003-03-05 | 宏碁股份有限公司 | 具有隐藏程序功能的数据处理系统 |
JP3588536B2 (ja) * | 1997-07-11 | 2004-11-10 | 株式会社東芝 | 不正データコピー防止装置及び方法 |
JP3799757B2 (ja) | 1997-07-18 | 2006-07-19 | 富士ゼロックス株式会社 | 被検証データ生成装置、及び被検証データ生成プログラムを記録したコンピュータ読み取り可能な記録媒体 |
US7809138B2 (en) * | 1999-03-16 | 2010-10-05 | Intertrust Technologies Corporation | Methods and apparatus for persistent control and protection of content |
JP2000083502A (ja) | 1998-09-17 | 2000-03-28 | Taki Chem Co Ltd | 家畜用床敷材及びその連続的製造方法 |
US6741608B1 (en) * | 1999-01-29 | 2004-05-25 | Avaya Technology Corp. | Dynamically configurable system and method for transcoding streaming data and telecommunications infrastructure the same |
KR100632495B1 (ko) * | 1999-02-17 | 2006-10-09 | 소니 가부시끼 가이샤 | 정보처리장치 및 방법과 프로그램 격납매체 |
-
2000
- 2000-02-17 KR KR1020007011451A patent/KR100632495B1/ko not_active IP Right Cessation
- 2000-02-17 CN CNB03101500XA patent/CN1293491C/zh not_active Expired - Fee Related
- 2000-02-17 US US09/647,378 patent/US7266202B1/en not_active Expired - Fee Related
- 2000-02-17 CN CNB008005060A patent/CN1189827C/zh not_active Expired - Fee Related
- 2000-02-17 CN CNB031031013A patent/CN1316395C/zh not_active Expired - Fee Related
- 2000-02-17 AU AU25731/00A patent/AU768421B2/en not_active Ceased
- 2000-02-17 WO PCT/JP2000/000904 patent/WO2000049510A1/ja active IP Right Grant
- 2000-02-17 EP EP00904011A patent/EP1096388A4/en not_active Ceased
- 2000-02-17 CA CA2328932A patent/CA2328932C/en not_active Expired - Fee Related
- 2000-02-17 CN CNB2004100566805A patent/CN100359513C/zh not_active Expired - Fee Related
-
2005
- 2005-10-19 US US11/252,750 patent/US7437768B2/en not_active Expired - Fee Related
-
2006
- 2006-11-15 US US11/560,235 patent/US7516497B2/en not_active Expired - Fee Related
-
2007
- 2007-05-01 US US11/742,908 patent/US20070204172A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10269289A (ja) * | 1997-03-26 | 1998-10-09 | Sony Corp | ディジタルコンテンツ配付管理方法、ディジタルコンテンツ再生方法及び装置 |
JPH10283270A (ja) * | 1997-04-09 | 1998-10-23 | Fujitsu Ltd | 再生許可方法、記録方法及び記録媒体 |
JPH10302008A (ja) * | 1997-04-30 | 1998-11-13 | Mitsubishi Corp | データコンテンツ流通システム |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009272033A (ja) * | 2009-08-12 | 2009-11-19 | Sony Corp | 情報処理装置および方法 |
Also Published As
Publication number | Publication date |
---|---|
CN1567308A (zh) | 2005-01-19 |
CA2328932A1 (en) | 2000-08-24 |
KR20010042728A (ko) | 2001-05-25 |
EP1096388A1 (en) | 2001-05-02 |
CN1293491C (zh) | 2007-01-03 |
US20070204172A1 (en) | 2007-08-30 |
US7437768B2 (en) | 2008-10-14 |
AU2573100A (en) | 2000-09-04 |
KR100632495B1 (ko) | 2006-10-09 |
CN1189827C (zh) | 2005-02-16 |
CN1529251A (zh) | 2004-09-15 |
CN1447252A (zh) | 2003-10-08 |
EP1096388A4 (en) | 2007-08-22 |
CA2328932C (en) | 2011-04-05 |
US7516497B2 (en) | 2009-04-07 |
CN1316395C (zh) | 2007-05-16 |
CN100359513C (zh) | 2008-01-02 |
US20060047978A1 (en) | 2006-03-02 |
US7266202B1 (en) | 2007-09-04 |
AU768421B2 (en) | 2003-12-11 |
US20070074051A1 (en) | 2007-03-29 |
CN1300398A (zh) | 2001-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2000049510A1 (fr) | Dispositif et procede de traitement de l'information et support de memorisation de programme | |
KR100862371B1 (ko) | 정보처리 시스템 | |
KR100654879B1 (ko) | 정보 처리 장치 및 방법, 및 프로그램 저장 매체 | |
KR100633588B1 (ko) | 반도체 ic, 정보처리방법, 정보처리장치 및 프로그램 기록매체 | |
JP4568933B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000305846A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
KR20050041980A (ko) | 데이터 재생 장치, 정보 처리 장치 및 정보 처리 방법,콘텐츠 관리 시스템, 및 프로그램 | |
JP4556277B2 (ja) | 情報処理装置および方法、情報処理システム、並びにプログラム格納媒体 | |
JP4379653B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP4300442B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000347852A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP4304819B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000306006A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000349751A (ja) | 情報処理装置および方法、認証方法、並びにプログラム格納媒体 | |
JP2000348105A (ja) | 情報提供装置および方法、並びにプログラム格納媒体 | |
JP2000347851A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000347847A (ja) | 情報処理装置および方法、半導体ic、情報処理システム、並びにプログラム格納媒体 | |
JP2000305855A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
AU2003257706B2 (en) | Information processing apparatus and method, and program storage medium | |
JP2000347848A (ja) | 半導体ic、情報処理方法、情報処理装置、並びにプログラム格納媒体 | |
JP2000307568A (ja) | 半導体ic、情報処理方法、情報処理装置、並びにプログラム格納媒体 | |
JP2000347849A (ja) | 情報提供装置および方法、並びにプログラム格納媒体 | |
JP2000347850A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
AU2003262490A1 (en) | Information processing system | |
MXPA00010101A (en) | Information processing device and method, and program storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 00800506.0 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 25731/00 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: IN/PCT/2000/00452/MU Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020007011451 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2000/010101 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 2328932 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000904011 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 09647378 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2000904011 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007011451 Country of ref document: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWG | Wipo information: grant in national office |
Ref document number: 25731/00 Country of ref document: AU |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020007011451 Country of ref document: KR |