WO2001031461A1 - Systeme fournisseur de contenu - Google Patents
Systeme fournisseur de contenu Download PDFInfo
- Publication number
- WO2001031461A1 WO2001031461A1 PCT/JP2000/007473 JP0007473W WO0131461A1 WO 2001031461 A1 WO2001031461 A1 WO 2001031461A1 JP 0007473 W JP0007473 W JP 0007473W WO 0131461 A1 WO0131461 A1 WO 0131461A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- key
- generation
- program
- playback
- Prior art date
Links
- 238000000034 method Methods 0.000 claims description 118
- 238000012545 processing Methods 0.000 claims description 57
- 238000007726 management method Methods 0.000 description 104
- 238000010586 diagram Methods 0.000 description 34
- 230000008569 process Effects 0.000 description 33
- 238000012546 transfer Methods 0.000 description 29
- 238000007906 compression Methods 0.000 description 25
- 230000006835 compression Effects 0.000 description 25
- 238000001914 filtration Methods 0.000 description 17
- 230000006870 function Effects 0.000 description 15
- 230000007704 transition Effects 0.000 description 14
- 238000006243 chemical reaction Methods 0.000 description 11
- 230000004044 response Effects 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 6
- 230000005236 sound signal Effects 0.000 description 5
- 238000012795 verification Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 239000004065 semiconductor Substances 0.000 description 4
- 206010048669 Terminal state Diseases 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000003213 activating effect Effects 0.000 description 2
- 239000013078 crystal Substances 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000006837 decompression Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 230000005855 radiation Effects 0.000 description 2
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 1
- 101150107341 RERE gene Proteins 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 150000001768 cations Chemical class 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000000881 depressing effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000010355 oscillation Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Definitions
- the present invention relates to a content providing system and a content providing method for providing content data to a portable reproducing apparatus using a semiconductor memory / memory card or the like as a storage medium.
- the content distributor when distributing music content via a network, the content distributor provides the music content on the Web, for example.
- a user using this music distribution system uses his / her personal personal computer to access a web site or the like provided by a content distributor and download desired music content.
- the user plays back the acquired music content using, for example, a player application in the personal computer, or a portable device connectable to the personal computer.
- the content provider must manage the copyright of the content. For this reason, the content distributor recognizes the user who has accessed the Web via the Internet with the ID information authentication number, etc., and encrypts the music copy only for the legitimate user. Distribute content.
- the music content is stored on a hard disk in a personal computer in a state where key management is performed using an encryption key that cannot be freely referred to by a user.
- the music content is transferred to a storage medium of the portable device after performing authentication processing between the player application and the portable device. Is stored.
- music content distributed from a network but also music content from a media such as a CD can be copied to a portable device.
- the method of authentication between a portable device and a personal computer has been a player application that handles music content downloaded from a network, which would be a player application that handles only music content copied from a medium such as a CD. Although it was an application, it was performed without any particular distinction.
- the billing generally ends when the media is sold, but music content distributed via a network is, for example, played back or copied. In some cases, billing may be charged depending on the number of times that the key is used, and stronger key management is desired. Disclosure of the invention
- An object of the present invention is to provide a content providing system and a content providing method capable of improving the security of content data distributed via a network.
- a content providing system includes a data processing device having a playback program for playing back content data, a portable playback device for storing content data provided from the data processing device in a storage medium and playing back the content data,
- a content providing system including a content server that distributes the content data to the data processing device via a network
- the data processing device performs the following after the reproduction program is installed.
- the first master key and the first authentication key are provided to the playback program, and the content data stored in the external storage medium connected to the device is acquired and stored using the first master key,
- the playback program authenticates with the portable playback device by using the provided first authentication key and first master key.
- the second program different from the above-mentioned first master key is used.
- a master key and a second authentication key different from the first authentication key are provided via a network, and the content data provided from the content server is obtained using the provided second master key. Then, using the provided second authentication key and second master key, authentication with the portable playback device is performed to transmit and receive content data.
- the content providing system when the playback program handles only the content data stored in the external storage medium, the content data stored in the external storage medium is used by using the first authentication key and the first master key. Storage and authentication with the portable playback device.
- the playback program When the playback program handles the content data provided via the network, the playback program uses the first authentication key and the first master key to transfer the content data stored in the external storage medium. Performs authentication with storage and portable playback devices.
- the second authentication key and the second master key are provided to the playback program via a network, and are different from the first authentication key and the first master key.
- the content providing method includes a data processing device having a playback program for playing back content data, and a portable playback device for storing content data provided from the data processing device in a storage medium and playing back the content data.
- a content providing method including a content server for providing content data to a user, a first master key and a first authentication key are provided to the playback program after the playback program is installed, and the first The content data stored in the external storage medium connected to the device is acquired and stored using the master key, and the playback program uses the provided first authentication key and first master key to store the content data. Authentication is performed with the portable playback device to transmit and receive content data.
- a second master key different from the first master key and a second authentication key different from the first authentication key are used. Provided over the network and uses the provided second master key. And obtains and stores the content data provided from the content server, and authenticates with the portable playback device using the provided second authentication key and second master key to transmit and receive the content data. Communication.
- the playback program when the playback program handles only the content data stored in the external storage medium, the content stored in the external storage medium is used by using the first authentication key and the first master key. Stores data and authenticates with portable playback device.
- the playback program uses the first authentication key and the first master key to transfer the content data stored in the external storage medium. Performs authentication with the storage and portable playback device
- the second authentication key and the second master key are provided to the playback program via the network, and the first authentication key and the first master are provided. The key is different from the key.
- FIG. 1 is a diagram showing a configuration of a music content distribution system according to an embodiment of the present invention.
- FIG. 2 is a diagram showing a configuration of a personal computer in the music content distribution system.
- FIG. 3 is a diagram showing a configuration of a portable device in the music content distribution system.
- FIG. 4 is a diagram illustrating functions of the personal computer.
- FIG. 5 is a diagram illustrating an example of the display operation instruction window.
- FIG. 6 is a diagram showing a display example of the recording program displaying on the display.
- FIG. 7 is a diagram for explaining the unified handling of content having different formats for each distributor in the music content distribution system.
- FIG. 8 is a diagram for explaining the relationship between the unified transfer protocol layer and the application layer.
- FIGS. 9A and 9B are diagrams illustrating the format of commonly used usage condition information.
- FIG. 10 is a diagram for explaining files constituting the unified use condition information used in the comprehensive management unit.
- FIG. 11 is a diagram for explaining the structure of the automaton file of the unified usage condition information.
- FIG. 12 is a diagram for explaining an example of the automaton showing the transition of the operation of the music content described in the automaton description section of the automaton file.
- FIG. 13 is a diagram in which the above automaton shown in FIG. 12 is represented by a tu p 1 e column.
- FIG. 14 is a diagram for explaining the configuration of the automaton description section.
- FIG. 15 is a diagram showing events and commands defined by DTD defined based on the XML specification.
- FIG. 16 is a diagram showing a first description example of the automaton description section.
- FIG. 17 is a state transition diagram of the first description example.
- FIG. 18 is a diagram showing a second description example of the above automaton description section. You.
- FIG. 19 is a state transition diagram of the second description example.
- FIG. 20 is a diagram illustrating a third description example of the automaton description section.
- FIG. 21 is a state transition diagram of the third description example.
- FIG. 22 is a diagram illustrating a fourth description example of the automaton description section.
- FIG. 23 is a diagram illustrating the configuration of a parameter file of the unified usage condition information.
- FIG. 24 is a diagram illustrating a configuration when the parameter file is updated.
- FIG. 25 is a diagram for explaining the configuration of the parameter description section of the parameter file.
- FIG. 26 is a diagram for explaining a content management method using the comprehensive management unit.
- FIG. 27 is a diagram for explaining a processing procedure when the comprehensive management unit is installed from CD-ROM.
- FIG. 30 is a diagram for describing a first example of a procedure for updating the EMD key.
- FIG. 31 is a diagram illustrating a second example of the procedure for updating the EMD key.
- This music content distribution system is a system that downloads from a server to a personal computer or portable device via a network, and also manages downloaded music content and music content read from CDs. It is.
- FIG. 1 is a diagram showing an overall configuration of a music content distribution system to which the present invention is applied.
- This music content distribution system includes a personal computer 1, a network 2 such as the Internet and a low-speed network, a registration server 3, and a plurality of EMDs (multiple EMDs) for distributing music data (hereinafter referred to as contents).
- Electrical Music Distribution) Server 4 (4-1, 4-2, 4-3) and WWW server 5 (5-1, 5-2).
- a storage medium such as a memory card is stored in the personal computer 1 via the USB cable 7 (7-1, 7-2, 7-3), and the content is reproduced.
- a portable device 6 (6-1, 6-2, 6-3), which is a portable music player, is connected.
- the personal computer 1 is connected via the network 2 to the EMD registration server 3, the EMD server 4 (4-1, 4-2, 4-3), the WWW (World Wide Web) server 5 (5_1, 5--). 2) is connected.
- the personal computer 1 has an EMD server 4 (4-1, 4-2, From 4-3), receive the content compressed by the predetermined compression method, encrypt it by the predetermined encryption method, and record it.
- the personal computer 1 compresses the content read from a CD (Compact Disc) or the like by a predetermined compression method, encrypts the content by a predetermined encryption method, and records it.
- a method such as ATRAC (Adaptive Transform Acoustic Coding) 3 (trademark) or MP3 (MPEG Audio Layer-3) is used.
- DES Data Encryption Standard
- the personal computer 1 When receiving the distribution of the content, the personal computer 1 also receives the usage condition information indicating the usage condition of the content, and records the distribution. When recording the content read from a CD or the like, the personal computer 1 generates usage condition information in accordance with the reproduction condition of the content and records it. In addition, the personal computer 1 transmits the encrypted and recorded content together with the use condition information and the related information such as the song title and the performer through the USB cable 7 (7-1, 7-2, 7-3). Then, it records it in portable device 6 (6-1, 6-2, 6-3) and updates the usage condition information in accordance with the storage. This process is called checkout. The usage condition information, when checked out, reduces the number of times the content can be checked out recorded by the personal computer 1 by one.
- the personal computer 1 transmits the content stored in the portable device 6 (6-1, 6-2, 6-3) via the USB cable 7 (7-1, 7-2, 7-3). , Erase (or use The usage condition information is updated in accordance with the deletion. This erasing process is called check-in. At the time of check-in, the number of times that the content can be checked by the personal computer 1 is incremented by one.
- the personal computer 1 cannot check in the content checked out to the portable device 6 by another personal computer. In other words, the personal computer 1 itself cannot check in the content and check out the content.
- the EMD registration server 3 When the personal computer 1 starts acquiring contents from the EMD server 4 (4-1, 4-2, 4-3), the EMD registration server 3 responds to the request of the personal computer 1 and responds to the request of the personal computer 1.
- the authentication key necessary for mutual authentication between the personal computer 1 and the EMD server 4 (4-1, 4-2, 4-3) is transmitted to the personal computer 1 via the EMD server 4 (4 1, 4—2, 4—1) Send the program to connect to the personal computer 1).
- the EMD server 4 (4-1, 4-2, 4-1-3) responds to the request of the personal computer 1 via the network 2 to use condition information and content-related data (for example, song title or The content is supplied to the personal computer 1 together with the performer.
- the content delivered by each EMD server 4 (4-1, 4-2, 4-3) is compressed by a predetermined compression method.
- the compression method may be different for each server.
- the content supplied by each EMD server 4 (4-1, 4-2, 4-3) is encrypted by a predetermined encryption method. And distributed.
- the encryption method may be different for each server.
- the WWW server 5 (5-1, 5-2) responds to the request of the personal computer 1 by reading a content (for example, a CD album name or a CD sales company) via the network 2 in response to a request from the personal computer 1.
- a content for example, a CD album name or a CD sales company
- data e.g., Song, or composer's name, etc.
- c portable device 6 (6-1 supplies to the personal computer 1 corresponding to the content read from the CD, 6- 2, 6 - 3), the This is a device that plays back the content supplied from the personal computer 1 (that is, the checked-out content) and outputs it to a headphone or the like (not shown).
- Each portable device 6 (6-1, 6-2, 6-3) has a storage medium for storing content.
- the storage medium for example, a non-removable IC memory mounted on an internal substrate of the device, a removable memory card, or the like is used.
- the portable device 6 (6-1, 6-2, 6-3) communicates with the personal computer 1 via a physical interface 7 (7-1, 7-2, 7-3) such as USB. Connected and content is transferred. At this time, the content is transferred in an encrypted and compressed state, and usage condition information is also added.
- Each portable device 6 (6-1, 6-2, 6-3) is normally used in a state where the connection with the personal computer 1 is disconnected, and when a playback command is given by the user in this state, encryption is performed. The read content is read from the storage medium and played. Each portable device 6 (6-1, 6-2, 6-3) is attached to each content. Based on the usage condition information that has been set, restrictions on playback, control of deletion of content, etc., and updating of usage condition information, etc. are performed as necessary.
- portable devices 6_1, 6-2, and 6-3 are simply referred to as portable devices 6.
- the CPU (Central Processing Unit) 11 1 actually executes various application programs (details will be described later) and OS (Operating System).
- the ROM (Read-only Memory) 12 generally stores basically fixed data of the program and calculation parameters used by the CPU 11.
- RAM (Randotn Access Memory) 13f Up to execution of CPU 11 [Stores programs to be used repeatedly and parameters that change as appropriate during the execution. These are interconnected by a host bus 14 composed of a CPU bus or the like.
- the host bus 14 is connected to an external node 16 such as a PCI (Periphera 1 Component Interconnect / Interface) node via a bridge 15.
- an external node 16 such as a PCI (Periphera 1 Component Interconnect / Interface) node via a bridge 15.
- the keyboard 18 is operated by the user when inputting various commands to the CPU 11.
- the mouse 19 is operated by the user when indicating or selecting a point on the screen of the display 20.
- the display 20 is composed of a liquid crystal display device or a CRT (cathode ray tube), and displays various information in text or images.
- HD D (Hard Disk Drive) 2 1 Record or reproduce programs and information executed by PU 11
- the drive 22 reads data or programs recorded on the mounted magnetic disk 41, optical disk 42 (including CD), magneto-optical disk 43, or semiconductor memory 44, and reads the data or program.
- USB port 23 (23-1, 23-2, 23-3) is connected to the portable device 6 (6-3) via the USB cable 7 (7-1, 7-2, 7-3). 1, 6-2, 6-3) are connected. USB port 23 is supplied from HDD 21, CPU 11, or RAM 13 via interface 17, external bus 16, bridge 15, or host bus 14 The data (for example, including contents or commands of the portable device 6) is output to the portable device 6 (6-1, 6-2, 6-3).
- the audio input / output interface 24 having the terminal 0a8 executes digital audio input / output or analog audio input / output interface processing.
- the speaker 45 outputs a predetermined sound corresponding to the content based on the sound signal supplied from the sound input / output interface 24.
- keyboard 18, mouse 19, display 20, HDD 21, drive 22, USB port 23, audio input / output interface 24 are connected to interface 17, and interface Ace 17 is connected to CPU 11 via external bus 16, bridge 15 and host bus 14.
- the communication unit 25 is connected to the network 2 and transmits data (for example, a registration request or a content transmission request) supplied from the CPU 11 or the HDD 21 in a predetermined format packet. And sends the data (for example, an authentication key or content) stored in the packet received via the network 2 to the CPU 11 and RAM. Output to I3 or HDD 21.
- data for example, a registration request or a content transmission request
- the communication unit 25 is connected to the network 2 and transmits data (for example, a registration request or a content transmission request) supplied from the CPU 11 or the HDD 21 in a predetermined format packet. And sends the data (for example, an authentication key or content) stored in the packet received via the network 2 to the CPU 11 and RAM. Output to I3 or HDD 21.
- the RAM 33 stores data and programs necessary for the CPU 32 to execute various processes.
- the non-volatile memory 34 stores data that needs to be retained even after the personal computer 1 is turned off.
- the ROM 36 stores a program for decrypting an encrypted program transmitted from the personal computer 1.
- the RTC (Real Time Clock) 35 performs a timekeeping operation and provides time information.
- Semiconductor ICs are designed in a secure environment and are resistant to malicious external access. Note that this function may be configured by a software program.
- the communication unit 25 and the adapter 26 are connected to the CPU 11 via the external bus 16, the bridge 15 and the host bus 14.
- the c power supply circuit 52 which describes the configuration of the portable device 6, converts the power supply voltage supplied from the dry cell 51 into internal power of a predetermined voltage, The entire portable device 6 is driven by supplying it to 3 to the display unit 67.
- USB controller 57 When the USB controller 57 is connected to the personal computer 1 via the USB connector 56 via the USB connector 56, the data including the content transferred from the personal computer 1 is transferred to the internal bus 58. Supply to CPU 53 via
- the data transferred from the personal computer 1 is composed of 64 bytes of data per packet, and is transferred from the personal computer 1 at a transfer rate of 12 MbitZsec.
- the data transferred to the portable device 6 is composed of a header and content.
- the header stores the content ID, file name, header size, content key, finale size, codec ID, file information, etc., as well as usage condition information necessary for playback restriction processing, etc. .
- the content is encoded and encoded using an encoding method such as ATRAC3.
- the header size indicates the data length of the header (eg, 33 bytes, etc.), and the file size indicates the data length of the content (eg, 33, 636, 138 bytes, etc.).
- the content key is a key for decrypting the encrypted content, and is encrypted based on the session key (temporary key) generated in the mutual authentication process between the personal computer 1 and the portable device 6. In this state, it is transmitted from the personal computer 1 to the portable device 6.
- This mutual authentication process is, for example, a challenge-response authentication process.
- the DSP 59 of the portable device 6 executes the decoding (decryption) process of the ⁇ signal when performing the authentication process of the challenge response method.
- the challenge-response method is, for example, a value (response) generated by the portable device 6 using a secret key shared with the personal computer 1 for a certain value (challenge) generated by the personal computer 1.
- This is a method of responding.
- the value generated by the personal computer 1 changes every time the authentication process is performed. For example, the value generated by using the secret key output by the portable device 6 Is read out, and so-called spoofing attacks are performed, the personal computer 1 can detect fraud in the following mutual authentication processing because the values used for mutual authentication are different.
- the content ID is an ID for identifying the content corresponding to the content.
- the codec ID is an ID corresponding to the content encoding method.
- the codec ID “1” corresponds to ATRAC 3
- the codec ID “0” is MP3 (MPEG (Moving Pi cture Experts Group) Corresponds to Audio Layer-3).
- the file name is obtained by converting the content file (described later) recorded by the personal computer 1 corresponding to the content to ASCII (A American National Standard Code for Information Interchange)
- the file information is the data of the song, artist, lyricist, or composer corresponding to the content converted to ASCII code.
- the CPU 53 that executes the main program read from the RAM 54 or ROM 55 receives the write command and receives the write command.
- the controller 60 is controlled so that the content received from the personal computer 1 is written in the flash memory 61.
- the flash memory 61 has a storage capacity of about 64 MB yte and stores contents.
- the flash memory 61 stores in advance a reproduction code for expanding the content compressed by a predetermined compression method.
- the flash memory 61 may be made removable from the portable device 6 as a memory card.
- the DSP 59 detects the error in the playback code transferred from the flash memory 61 using the CRC (Cyclic Redundancy Check) method, and then plays back the data ( Figure 3).
- D 1) is supplied to the digital-Z analog conversion circuit 63.
- the DSP 59 is integrally formed with an internal oscillator circuit, and plays back the content based on the master clock MC LK from the external oscillator 59 A made of crystal, as well as the master clock.
- MC LK Master clock An operation clock consisting of a bit clock BCLK of a predetermined frequency generated by the internal oscillation circuit based on the MC LK, and an L channel clock LCL ⁇ and an R channel clock RCLK in frame units.
- LRCLK is supplied to the digital-to-analog conversion circuit 63.
- the DSP 59 supplies the above operation clock to the digital-to-analog conversion circuit 63 according to the reproduction code when reproducing the content, and supplies the operation clock according to the reproduction code when the content is not reproduced. Then, the digital-analog conversion circuit 63 is stopped to reduce the power consumption of the portable device 6 as a whole.
- the CPU 53 and the USB controller 57 also have a crystal oscillator 53 A or 57 A externally attached, respectively, and the master clock MC supplied from the oscillator 53 A or 57 A respectively. Performs predetermined processing based on LK.
- the portable device 6 does not require a clock generation module for supplying a clock to each circuit block such as the CPU 53, the DSP 59, and the USB controller 57.
- the circuit configuration can be simplified and the size can be reduced.
- the digital-to-analog conversion circuit 63 converts the reproduced content into an analog audio signal, and supplies this to the amplifier circuit 64.
- the amplifier circuit 64 amplifies the audio signal and supplies the audio signal to the headphone via the headphone jack 65.
- the portable device 6 plays the content stored in the flash memory 61 based on the control of the CPU 53, and plays the content during playback.
- the button is pressed, c portable device 6 to stop playing the Konten', when again play Z sTOP button after stop is pressed, the position child Nten' was stopped based on the control of the C PU 5 3 Resume playback.
- the portable device 6 When the play / stop button stops playback by a pressing operation and a few seconds elapse without any operation being applied, the portable device 6 automatically turns off the power and reduces power consumption. By the way, when the playback stop button is pressed after the power is turned off, the portable device 6 does not play the content from the previous stop position, but plays from the first song.
- the CPU 53 of the portable device 6 controls the LCD controller 68 to display a playback mode state (for example, repeat playback, intro playback, etc.), an equalizer adjustment (ie, Information such as the adjustment of the gain corresponding to the frequency band of the audio signal), song number, playing time, playback, stop, fast forward, fast reverse, etc., volume and remaining battery 51 are displayed.
- a playback mode state for example, repeat playback, intro playback, etc.
- an equalizer adjustment ie, Information such as the adjustment of the gain corresponding to the frequency band of the audio signal
- the portable device 6 stores, in the EEPROM 68, the number of contents written in the flash memory 80, the block position of the flash memory 61 in which each content is written, and various other types of stored information.
- the content is treated as 64 KB yte as one block, and a block corresponding to the content of one song is used. Is stored in FAT.
- the FAT When the FAT is stored in the flash memory 61, for example, when the content of the first music is written to the flash memory 61 under the control of the CPU 53, the block position corresponding to the content of the first music is set to FAT. Then, when the content of the second song is written to the flash memory 61, the block position corresponding to the content of the second song is set to FAT as the flash memory 61 (the same as the first song). Area).
- the FAT is rewritten each time content is written to the flash memory 61, and furthermore, the same data is double-written for reserve for data protection.
- the flash memory 61 When the FAT is written to the flash memory 61, the same area of the flash memory 61 is rewritten twice in response to one content write, so that the flash memory 61 If the number of rewrites specified in (1) has been reached, the flash memory 61 cannot be rewritten.
- the portable device 6 stores the FAT in the EEPROM 68 to reduce the frequency of rewriting the flash memory 61 corresponding to one-time content writing.
- the portable device 6 can increase the number of times that the content can be written by several tens of times compared to storing the FAT in the flash memory 61. Can be. Further, since the CPU 53 writes the FAT to the EEPROM 68 so as to add the FAT, the frequency of rewriting the same area of the EEPROM 68 is reduced, and the EEPROM 53 Prevent 6 8 from becoming unrewritable in a short time.
- the portable device 6 When the portable device 6 is connected to the personal computer 1 via the USB cable 7 (hereinafter, this is referred to as a USB connection), the portable device 6 is controlled based on an interrupt signal supplied from the USB controller 57 to the CPU 53. , Recognize that the USB connection.
- the portable device 6 When the portable device 6 recognizes that the USB connection has been made, the portable device 6 receives external power of a specified current value from the personal computer 1 via the USB cable 7 and controls the power supply circuit 52 to receive the power from the dry battery 51. Stop supplying power.
- the CPU 53 When the CPU 53 is connected to the USB, the CPU 53 stops the reproduction of the content of the DSP 59. Thus, the CPU 53 prevents the external power supplied from the personal computer 1 from exceeding the specified current value, and controls so that the external power having the specified current value can always be received.
- the CPU 53 when the CPU 53 is connected to the USB, the CPU 53 switches from the power supplied from the dry cell 51 to the power supplied from the personal computer 1, so that the external power from the personal computer 1 with a low unit price is used.
- the power consumption of the dry battery 51 having a high power unit price is reduced, and thus the life of the dry battery 51 can be extended.
- the CPU 53 stops the reproduction processing of the DSP 59, thereby reducing the radiation from the DSP 59. As a result, the radiation of the entire system including the personal computer 1 is further reduced.
- FIG. 4 is a diagram showing a configuration of functions of the personal computer 1 realized by executing a predetermined program or the like.
- Content management program 1 1 1 is EMD selection program 13 1, check-in Z check-out management program 13 2, copy management program 13 3, movement management program 1 34, encryption method conversion program 13 5, compression method Conversion program 13 6, encryption program 13 7, usage condition conversion program 13 9, usage condition management program 14 0, authentication program 14 1, decryption program 14 2, PD driver 14 3, It consists of a plurality of programs such as a purchase program 144 and a purchase program 144.
- the content management program 111 is described in, for example, a shuffled instruction or an encrypted instruction, and conceals the processing content from outside, making it difficult to read the processing content. (For example, if the user directly reads the content management program 111, the user cannot identify the instruction).
- the EMD selection program 1 3 1 is not included in the content management program 1 11 when the content management program 1 1 1 is installed on the personal computer 1, but is registered via the network 2 when registering the EMD. Received from the EMD registration server 3.
- the EMD selection program 1 3 1 selects the connection with the EMD server 4 (4-1, 4-2, 4-13) and purchases the application 1 1 5 or the purchase program 1 4 4 1 4 5: EMD server 4 (4-1, 4-2, 4-1 3) Communication (for example, downloading content when purchasing content) is performed.
- the check-in Z check-out management program 1332 is based on the check-in or check-out settings and the usage condition files 16 2 _ 1 to 16 2 _N recorded in the content database 1 14. Check the contents stored in the portable device 6 to the portable device 6 or check in the contents stored in the portable device 6.
- the check-in Z check-out management program 13 2 uses the check-in or check-out processing, and the use condition file 16 2 — 1 to 16 2 recorded in the content database 114 in response to the check-in processing. 1. Update the usage condition information stored in N.
- the copy management program 1 3 3 uses the usage condition file 1 6 2— :! recorded in the content database 1 1 4 ⁇ 16 2— Based on N, content file 1 6 1— :! 1 16 1—N Copy contents stored in portable device 6 to portable device 6 or copy contents from portable device 6 to content database 114.
- the movement management program 134 generates a content file 16 1—1 to 16 1—N based on the use condition file 16 2 _ :! to 16 2—N recorded in the content database 114. Move the content stored in the portable device 6 to the portable device 6, or move the content from the portable device 6 to the content database 114.
- the encryption method conversion program 135 is a method for encrypting the content received from the EMD server 4-1 by the purchase application program 115 via the network 2, and the purchase program 144 is the EMD
- the content encryption method used to decode the content received from the server 4-2 is the same as the content stored in the content file 1611-1-16-1N stored in the content database 114. It is converted to the method of conversion.
- the compression method conversion program 13 6 is a method for compressing the content received from the EMD server 4-1 by the purchasing application program 11 5 via the network 2, and the purchasing program 1 44 is an EMD server 4 -Convert the compression format of the content received from 2 to the same compression format as the content stored in the content files 16 1—1 to 16 1—N recorded in the content database 114 I do.
- the encryption program 13 7 reads the content (unencrypted) read from the CD and supplied from the recording program 113, and stores the content in the content database 16 stored in the content database 114. 1—1 to 16 1 Encrypt using the same encryption method as the content stored in 1—N.
- the compression / decompression program 13 8 is, for example, a content file 16 1 which is read from a CD and stores the content (uncompressed) supplied from the recording program 113 in the content database 114. — 1 to 16 Encode using the same encoding method as the content stored in 1-N.
- the compression Z decompression program 138 decompresses (decodes) the encoded content.
- the use condition conversion program 13 9 is used by the purchase application program 1 15 via the network 2 for use condition information of content received from the EMD server 4-1 (so-called usage rule 1 e).
- the use condition information of the content received from the EMD server 4-2 by the purchase program 144 is stored in the use condition file 16 2—1 to 1 6 2—N recorded in the content database 114. Is converted to the same format as the usage condition information.
- the usage condition management program 140 uses the usage condition files 16 2 _ 1 to 14 recorded in the content database 114 before executing the process of copying, moving, checking in, or checking out the content.
- the falsification of the usage condition information is detected based on the hash value corresponding to the usage condition information stored in 162_N.
- the usage condition management program 140 uses the usage condition files 16 2—1 to 16 2 recorded in the content database 114 in connection with content copy, move, check-in, or check processing. — Update the hash value corresponding to the usage condition information in response to updating the usage condition information stored in N.
- the authentication program 14 1 executes the process of mutual authentication between the content management program 11 1 and the purchase application program 11 5 and the process of mutual authentication between the content management program 11 1 and the purchase program 14 4. I do.
- the authentication program 141 stores an authentication key used in the mutual authentication processing between the EMD server 413 and the purchase program 144.
- the authentication key used by the authentication program 14 1 in the mutual authentication process is stored in the personal computer 1 by the content management program 111. When it is installed, it is not stored in the authentication program 14 1.
- the registration processing is executed normally by the display operation instruction program 1 12, it is supplied from the EMD registration server 3 and the authentication program 14 1 Is stored.
- the decryption program 14 2 decrypts the content when the personal computer 1 reproduces the content stored in the content file 16 1-1 to 16 1 -N recorded in the content database 114. I do.
- the PD driver 1443 performs the predetermined processing to the portable device 6 or the predetermined processing to the portable device 6. Supply a command to execute
- the purchase program 144 is installed together with the content management program 111 and supplied via the network 2 from the EMD registration server 3 or recorded on a predetermined CD and supplied.
- the purchase program 144 transmits and receives data to and from the content management program 111 via a predetermined format interface of the content management program 111.
- the purchasing program 144 is described in, for example, shuffled instructions or encrypted instructions, concealing the processing contents from the outside, making it difficult to read the processing contents (For example, if the user directly reads the purchase program 144, but cannot identify the instruction) It is configured.
- the purchase program 144 requests the EMD server 42 to transmit predetermined content via the network 2 and receives the content from the EMD server 4_2. Further, the purchase program 144 executes a charge process when receiving the content from the EMD server 4_2.
- the purchase program 145 is a program that is installed together with the content management program 111, which requests the EMD server 403 to send predetermined content via the network 2 and sends the specified content to the EMD server 143. 4. Receive content from 3. In addition, the purchase program 145 executes a billing process when receiving the content from the EMD server 4-3.
- the display operation instruction program 1 1 2 is based on the filtering data file 18 1, display data file 18 2, image file 18 3-1 to 18 3 _K, or the history data file 184 based on the display.
- An image of a predetermined window is displayed on 20, and based on an operation on the keyboard 18 or the mouse 19, the content management program 111 is instructed to execute a process such as check-in or check-out.
- the filtering data file 18 1 is the content file 1 6 1— recorded in the content database 1 14:!
- the data for weighting each of the contents stored in the storage area is stored in the HDD 21.
- the display data file 18 2 is the content file 16 1— recorded in the content database 114.
- ⁇ 1 6 1 Store the data corresponding to the content stored in N and store it in HDD 21 Has been recorded.
- the image file 1 8 3— 1 to 1 8 3—K is the image corresponding to the content content 16 1—1 to 16 1 N recorded in the content database 1 14 or described later.
- the image corresponding to the package to be stored is stored in the HDD 21.
- image files 18 3—1 to 18 3—K individually are simply referred to as image files 18 3.
- the history data file 184 is the number of times that the content files stored in the content database 114 are checked-in and the number of times that the content stored in the content files 161-N is checked.
- the history data such as the date is stored in the HDD 21.
- the display operation instruction program 111 sends the ID of the content management program 111 stored in advance to the EMD registration server 3 via the network 2 at the time of the registration processing, It receives the authentication key and the EMD selection program 13 1 from the EMD registration server 3 and supplies the authentication key and the EMD selection program 13 1 to the content management program 1 11.
- the recording program 1 13 displays the image of the specified window, and based on the operation of the keyboard 18 or the mouse 19, the recording time of the content from the CD which is the optical disc 42 mounted on the drive 22.
- Read data such as
- the recording program 113 sends the data corresponding to the CD (eg, album name) to the WWW server 5-1 or 5-2 via the network 2 based on the recording time of the content recorded on the CD. , Or a Request the transmission of data corresponding to the content recorded on the CD (such as the title of the song), and record the data corresponding to the CD or the CD from the WWW server 5-1 or 5-2. The data corresponding to the content being received is received.
- the CD eg, album name
- the recording program 113 sends the data corresponding to the CD (eg, album name) to the WWW server 5-1 or 5-2 via the network 2 based on the recording time of the content recorded on the CD. , Or a Request the transmission of data corresponding to the content recorded on the CD (such as the title of the song), and record the data corresponding to the CD or the CD from the WWW server 5-1 or 5-2.
- the data corresponding to the content being received is received.
- the recording program 113 supplies the received data corresponding to the CD or the data corresponding to the content recorded in the CD to the display operation instruction program 112.
- the recording program 113 When a recording instruction is input, the recording program 113 reads the content from the CD, which is the optical disc 42 mounted on the drive 22, and outputs the content to the content management program 111.
- the content database 114 compresses the content supplied by the content management program 111 in a predetermined format and encrypted in a predetermined format, and converts the content into a content file 16 1—1 to 16 1 — Store in any of N (Record on HDD 21).
- the content database 114 contains the usage condition information corresponding to the content stored in each of the content files 161-1 to 161 -N, and the content file 161 -1 in which the content is stored.
- the content database 114 may record the content file 161-1 to 161 -N or the usage condition file 162-1 to 162 -N as a record.
- the usage condition information corresponding to the content stored in the content file 161-1-1 is stored in the usage condition file 162-1-1.
- Content file 1 6 1 1 The usage rule information corresponding to the content is stored in the usage rule file 162-N.
- the purchase application program 115 is supplied from the EMD registration server 3 via the network 2 or supplied after being recorded in a predetermined CD-ROM.
- the purchase application program 115 requests the EMD server 4-1 via the network 2 to transmit predetermined content, receives the content from the EMD server 411, and executes the content management program. Supply 1 1 1 Further, the purchase application program 115 executes a billing process when receiving the content from the EMD server 4-1.
- the content stored in any of the content files 16 1—1 to 1611-N belongs to a predetermined package.
- the package is more specifically either an original package, a myselect package, or a filtering package.
- the original package belongs to one or more contents, and corresponds to the classification of the contents on the EMD server 4 (for example, corresponding to a so-called album) or a single CD.
- Content belongs to one of the original packages and belongs to multiple original packages Can not be. Also, the original package to which the content belongs cannot be changed.
- the user can edit part of the information corresponding to the original package (addition of information or change of added information).
- the MySelect package contains one or more contents arbitrarily selected by the user.
- the user can arbitrarily edit which content belongs to the MySelect package.
- Content, also c may belong simultaneously to one or more Maisereku DOO package, the content may also not belong to any of Maisereku bets package.
- the content selected based on the filtering data stored in the filtering data file 18 1 belongs to the filtering package.
- the filtering data is supplied from the EMD server 4 or the WWW server 5 via the network 2, or is recorded on a predetermined CD and supplied.
- the user can edit the filtering data stored in the filtering data file 18 1.
- the filtering data is a reference for selecting a predetermined content or calculating a weight corresponding to the content. For example, if you use the filtering data corresponding to this week's J-POP (Japanese Pops) Bestten, Personal Computer 1 will find that this week's book's pops top 1 content-this week's Japanese pops 10 top cont. Can be specified.
- J-POP Japanese Pops
- the filtering data file 181 is a file that selects content in descending order of the checked-out period during the past month. It includes filtering data, filtering data that selects content that has been checked out frequently in the past six months, or filtering data that selects content that includes the word “love” in the song title.
- the contents of the finaling package are composed of the content display data 22 1 (including the data set by the user in the content display data 22 1) corresponding to the content, or the history data 18 4 Are selected in correspondence with the filtering data.
- the driver 1 17 drives the audio input / output interface 24 under the control of the content management program 1 1 1 and the like, and inputs the content, which is digital data supplied from the outside, to input the content management program 1 1
- An analog signal corresponding to the content supplied from the database 114 is output.
- FIG. 5 is a diagram showing an example of a display operation instruction window that the operation instruction program 112 displays on the display 20 when the display operation instruction program 112 is activated.
- buttons 203 for displaying a field buttons 204 for displaying a field for editing a MySelect package, and the like are arranged.
- button 205 When button 205 is selected, field 211 displays data corresponding to the original package.
- button 206 When button 206 is selected, field 211 displays the data corresponding to the MySelect package.
- button 207 When button 207 is selected, field 211 displays the data corresponding to the filtering package.
- the data displayed in the field 211 is data relating to a package, for example, a package name or an artist name.
- the package name "first” and the artist name "Ataro”, the package name "second” and the artist name “Ataro” are displayed in the field 211.
- Field 2 1 2 displays data corresponding to the content belonging to the package selected in field 2 1 1.
- the data displayed in the fields 2 12 are, for example, the title of the music, the playing time, or the number of times the check can be performed.
- the rest as the number of possible checkouts displayed in field 2 12 indicates that the corresponding content cannot be checked out (the number of possible checkouts is 0. (However, personal computer 1 plays that content.) )) Indicates that In addition, the treble clef as the number of possible checkouts displayed in the field 212 indicates that the number of checkouts of the corresponding content is unlimited (can be checked out any number of times). I have.
- the number of checkouts allowed may be indicated not only by the number of predetermined figures (for example, a circle, a star, a month, etc.) as shown in FIG. 5 but also by a number.
- the display operation instruction window displays an image (corresponding to one of the image files 183-1-1 to 183-K in FIG. 4) associated with the selected package or content.
- the field to be made is located.
- the button 209 is clicked to reproduce the selected content (output the sound corresponding to the content to the speaker 45).
- buttons displayed by the recording program 1 1 3 (described later) If the button 2 5 5) is selected (activated), the display operation instruction program 1 1 2 will be displayed in the display operation instruction window when the content read from the CD is recorded in the content database 114.
- the CD When the read content is recorded in the content database 1 14, the display operation instruction program 1 1 2.
- the content management program 1 1 1, and the content read from the CD recorded in the content database 1 1 4 The specified portable device 6 is checked out.
- a symbol indicating whether or not the content can be checked in to the personal computer 1 is displayed at the far left of the finale 2 13 corresponding to the title of the content in the finale 2 13.
- " ⁇ " located at the leftmost of the field 2 13 indicates that the content corresponding to the title of the content can be checked in to the personal computer 1 (that is, checked out from the personal computer 1). Is shown.
- the "X" located at the leftmost of field 2 13 indicates that the content corresponding to the song title of the content cannot be checked in to personal computer 1 (ie, has not been checked out of personal computer 1, for example, Checked out from the personal computer).
- the display operation instruction program 1 1 2 displays the field 2 1 3 in the display operation instruction window
- the display operation instruction program 1 1 2 displays the portable device specified in advance in the display operation instruction window.
- Field 2 1 4 to display the name of the package (the package to which the content stored in the portable device 6 belongs), Button 2 10 to close the field 2 13 and Button 2 15 to execute check-in or check-out Is displayed.
- the display operation instruction program 1 1 2 displays the field 2 1 3 in the display operation instruction window
- the display operation instruction program 1 1 2 displays the song name selected in the field 2 1 2 in the display operation instruction window.
- Button 2 16 to set the content check-point corresponding to the button 2 1 7
- Button 218 to set the check-in of the content corresponding to the song name selected in the field 2 13 3
- Content name displayed in the field 2 13 Button 218 to set check-in of all content corresponding to, and button 219 to cancel check-in or check-out setting.
- the personal computer 1 does not execute the check-in or check-out process only by setting the check-in or check-out by operating the buttons 21 to 21.
- the display Operation instruction program 1 1 2 is displayed as content management program 1 1 1.
- Send or send a predetermined command corresponding to check-in for example, (For example, a command to delete predetermined content stored in the portable device 6) and update the usage rule information stored in the usage rule file 162 corresponding to the transmitted content or command. .
- the display / operation instruction program 112 executes the history data stored in the history data file 184 corresponding to the transmitted content or the transmitted command. To update.
- the history data includes information specifying the content that has been checked in or checked out, or the date on which the content has been checked in or checked out, the name of the portable device 6 whose content has been checked out, and the like.
- the check-in or check-out setting process can be executed in a short time, so that the user can quickly know the status after the check-in or check-out process has been executed, and the time-consuming check-in or check-out process can be performed.
- the overall time required for checkin or checkout can be reduced.
- FIG. 6 is a diagram illustrating an example of a window displayed by the recording program 113 on the display 20.
- the recording program 113 displays the title of the CD, such as "N / A", in the field 251. Based on the CD information received from the WWW server 5-2, the recording program 113 displays the artist name, for example, “Quie” in the field 252.
- the ram 1 13 displays the title of the song such as "Heat”, “Planet”, “Black”, “Soul”, etc. in the field 25 3 displaying the title of the song.
- the recording program 113 displays an artist name such as "Quie” in the field displaying the artist in the field 253.
- the recording program 113 After the recording program 113 receives the predetermined CD information, the recording program 113 stores the CD information in a predetermined directory of the HDD 21.
- the recording program 113 When a button 254 or the like is clicked to receive an instruction to acquire CD information, the recording program 113 first searches a predetermined directory of the HDD 211. When the CD information is stored in the directory, the recording program 113 displays a not-shown die exit box and informs the user of the information of the CD stored in the directory. To use or not.
- the recording program 1 1 1 3 When the button 2 5 6 to start recording content, which is located in the window displayed by the recording program 1 1 3, is clicked, the recording program 1 1 3 And the content read from the CD is supplied to the content management program 111 along with the information of the CD.
- the content management program 1 1 1's compression Z expansion program 1 3 8 compresses the content supplied from the recording program 1 1 3 by a predetermined compression method, and the encryption program 1 3 7 Is encrypted.
- the use condition conversion program 139 generates use condition information corresponding to the compressed and encrypted content.
- Content management programs 1 1 1 are compressed and encrypted The content is supplied to the content database 114 along with the usage condition information.
- the content database 1 14 generates a content file 16 1 and a usage condition file 16 2 corresponding to the content received from the content management program 11 1, and stores the content in the content file 16 1, Use condition information is stored in the use condition file 16 2.
- the content management program 111 displays and displays the CD information and the usage condition information received from the recording program 113.
- the display operation instruction program 112 is for display stored in the display data file 182 based on usage condition information and CD information corresponding to the content stored in the content database 114 during the recording process. Generate data for
- buttons 2 5 5 for setting up are arranged.
- recording program 113 displays a pull-down menu indicating portable device 6.
- the content recorded from the CD is automatically checked out to the selected portable device 6.
- the user When "Do not check out" is selected from the pull-down menu, the personal computer 1 does not check out when recording content from a CD.
- the personal computer 1 can cause the portable device 6 specified in advance to check the content read from the CD.
- the content having a different format for each distributor is uniformly handled on the personal computer 1 as described above.
- the plurality of EMD servers connected to the network 2 distribute, for example, an EMD server (A) 4-1 that distributes music content provided by the music provider A, and a music content provided by the music provider B.
- EMD server (X) 4-2 that distributes music content provided by music provider X.
- Each EMD server 4 (4-1, 4-2, 4-3) provides the music contents, which have their own lineup, to the personal computer 1 owned by the user via the network 2.
- each EMD server 4 (4-1, 4-2, 4-3) uses the encryption method of music content, the format of usage rule information, the compression method of music content, and the charging of music content. Each company's own method is adopted, and music contents are distributed using different methods.
- the personal computer 1 has a playback application (A) that purchases, manages, and plays back music content from the EMD server (A) 4-1 as application software for playing and managing music content.
- A EMD server
- B EMD server
- 4-2 power, playback application for purchasing, managing and playing music content
- the playback applications 311 and 312 shown in FIG. 7 correspond to the purchase application program 115 and the driver 117 shown in FIG.
- the personal computer 1 has a comprehensive management unit (X) 315 for comprehensively managing all music contents stored in the HDD 21 installed therein.
- the comprehensive management unit (X) 315 further includes an EMD reception interface 316, an EMD transmission interface 317, and a PD driver 318.
- the portable device (A) 6_1 is a dedicated device corresponding to the music provider A
- the portable device (B) 6-2 is a dedicated device corresponding to the music provider B
- the portable device (X) 6-3 is a dedicated device corresponding to the music provider X.
- the music content stored in the memory card is encrypted by an encryption method unique to each music provider, and the compression method and the format of the usage condition information are different. Therefore, for example, it is assumed that music content cannot be transferred by directly connecting to other device drivers.
- the application for playback (A) 311 1 performs the process of connecting to the EMD server, the process of uploading log files, etc., the process of downloading music content, content keys and usage condition information, etc. c
- This playback application (A) 311 performs connection processing only for the corresponding EMD server.
- the playback application (A) 311 1 performs processing corresponding to the EMD server (A) 4 _ 1, and cannot perform connection processing to another EMD server.
- the playback application (A) 311 performs authentication processing when connected to the EMD server (A) 4-1; authentication processing when connected to the portable device (A) 6-1; Stored in Performs encryption / decryption processing of music content and usage condition information.
- the playback application (A) 311 encrypts the music content downloaded from the EMD server (A) 4-1 and its usage condition information with a content key, and encrypts the content key with a session key. And store it in the HDD 21. Note that each playback application uses its own encryption method. Therefore, the same HD D in the personal computer 1
- the playback application (A) 311 also manages usage condition information added to each music content. For example, if the playback application (A) 311 1 contains a limit on the number of playbacks in the usage condition information and the number of playbacks of the content is restricted, each time playback or copying is performed, Performs processing such as decrementing the limit value of the number of times of reproduction and duplication for one time.
- the music content and usage condition information managed above are transmitted to the EMD reception interface 3 16 of the comprehensive management unit (X) 3 15.
- the playback application (B) 312 performs connection processing with the EMD server, uploads log files, etc., downloads music content, content keys, usage condition information, etc. c
- This playback application (B) 312 performs connection processing only for the corresponding EMD server.
- the playback application (B) 312 performs processing corresponding to the EMD server (B) 4-2, and cannot perform connection processing to other EMD servers.
- the playback application (B) 3 12 can perform authentication processing when connected to the EMD server (B) 4_2, authentication processing when connected to the portable device (B) 6_2, and HDD 2 1 Performs encryption / decryption processing of music content and usage condition information stored in.
- the playback application (B) 312 also manages usage condition information added to each music content. For example, when the playback application (B) 312 is used, the playback condition limit value is described in the usage condition information, and the content playback frequency is restricted, every time playback or copying is performed, Performs processing such as decrementing the limit value of the number of times of reproduction and duplication for one time.
- the playback application (B) 312 transmits the music contents and usage condition information managed by itself to the HDD 21 by the comprehensive management unit (X) 3 15 EMD reception interface 3. Send to 16.
- the device driver (A) 313 is an application software to transfer music contents to the portable device (A) 6-1.
- the device driver (A) 313 transfers the music content to the portable device (A) 6-1.
- Device Dryno (B) 3 1 4 is a portable device (B) 6 It is an application software that transfers music content to the Internet.
- the device driver (B) 314 transfers the music content to the portable device (B) 6_2.
- Comprehensive management unit (X) 315 is application software dedicated to music provider X, which receives music content from EMD server (X) 4-3.
- Device driver (A) 313 and device driver (A) 313 By transferring music content and usage condition information between the device driver (B) 3 14 and the playback application (A) 3 11 and the playback application (B) 3 12 It is also a management software that comprehensively manages music content in Utah 1.
- music content managed by the user can be transferred to a dedicated portable device (X) 6-3, which is a portable music playback device.
- the comprehensive management unit (X) 115 performs processing corresponding to the content management program 111 shown in FIG.
- the PD driver 318 is an interface module for connection to the portable device (X) 6-3.
- (X) Perform authentication processing and encryption processing with 6_3.
- the PD driver 318 transmits music via the device driver (A) 313 or the device driver (B) 314. Transfer the content and usage condition information.
- the reception interface for EMD 3 16 receives music content and usage condition information from the playback application (A) 3 11 and playback application (B) 3 12, and the EMD server (X) 4—3 It receives the music content and usage condition information transferred from the network 2 via the network 2, and transmits and receives music content and usage condition information to and from the PD driver 318.
- the reception interface for EMD 3 16 uses the mutual authentication process when music content and usage condition information are received from the playback application (A) 3 11 and the playback application (B) 3 12. It performs conversion of the encryption method, conversion of the format of usage condition information added to the music content to be transferred, and conversion of the compression method of the music content to be transferred.
- the conversion of the encryption method, usage condition information, and compression method is performed using the comprehensive management unit (X), based on the method used by the playback application (A) 311 and the playback application (B) 312. ) Converted to the method used by 3 15.
- the method used by the comprehensive management unit (X) 315 is hereinafter referred to as a unified transfer protocol.
- the reception interface for EMD 316 transmits the music content and the usage condition information converted into the unified transfer protocol in this way to the device driver (A) 313 via the PD driver 318. Send it to the device driver (B) 314.
- the EMD receiving interface 316 transmits the music content and the usage condition information converted into the unified transfer protocol to the portable device (X) 6-3 via the PD driver 318.
- the reception interface for EMD 316 has the functions of copying (copying), moving (moving), checking in, and checking music content.
- the EMD receiving interface 316 is controlled by, for example, the playback application (A) 311 or the playback application (B) 312 according to a copy command and a move command from the user. Music content that has been copied or moved to the comprehensive management unit (X) 315. At this time, the reception interface for EMD 316 converts the description format of the encryption method and compression method of the music content, and the usage conditions, and makes it a unified transfer protocol.
- music content stored on external media such as a compact disk or portable device 6 (6-1, 6-2, 6-3) can be read according to a CD ripping instruction or check-in instruction from the user.
- the reception interface for EMD 316 performs these conversions if the description format of the encryption method and compression method and the use condition of the music content is not defined as the unified transfer protocol. Use the unified transfer protocol.
- the music content managed by the comprehensive management unit (X) 315 is recorded on the portable device (X) 6-3.
- EMD If the description format of the encryption and compression schemes and usage conditions of the music content is not defined as a unified transfer protocol, these interfaces are converted to the unified transfer protocol. I do. At this time, the number of usable check-out conditions is reduced by one.
- the comprehensive management unit (X) 315 provides a unified transfer protocol in the lower layer of the application layer, and performs data transfer with other playback applications in this layer. I have.
- the Comprehensive Management Tool (X) 315 uses the EMD server (X) 4-3 as the htt ⁇ (hiper Text Transfer Protocol) as the lower layer of this unified transfer protocol. Sending and receiving.
- the music content distributed from the EMD server (A) 4-1 and the EMD server (B) 4.2.2 are integrated into the comprehensive management unit (X) 31 5 are acquired and played and managed.
- the music content distributed from the EMD server (X) 4-3, EMD server (A) 4-1 and EMD server (B) 4-2 can be transferred to the portable device (X) 6-3. ing.
- the encryption method of the music content to be transferred is converted and transferred between the respective playback applications and the device driver, centering on the comprehensive management unit (X) 315.
- the format of the usage condition information added to the music content is converted, the compression method of the music content to be transferred is converted, and the music content is transferred using the unified transfer protocol. That
- the music content downloaded from the playback application (A) 311 and the music content downloaded from the server (A) 4-1 and the playback application (B) 312 can be used as the EMD server B 4-2
- the music content downloaded from 2 is managed by the comprehensive management unit (X) 3 1
- the music content of the artist provided only by the music provider A can be transferred to the portable device (X) 6-3.
- the encryption method of music content, the format of usage condition information, the compression method of music content, and the like are converted into a unified transfer protocol.
- Music content of various formats stored in the PC can be played back by the comprehensive management unit (X) 315 or the portable device (X) 6-3.
- the encryption method and usage condition information are converted at the time of transfer, so that the copyright of the music content is protected and the degree of freedom in using the music content is increased. be able to.
- the music content distribution system at least the encryption method and the usage condition information are converted between the playback applications for playing and controlling the music content, and the music content and the usage condition information are transferred.
- This allows the music content distribution system to freely move music content stored in, for example, the HDD 21 in the personal computer 1 even if there are a plurality of playback applications. Content can be managed.
- usage condition information is transferred together with music content, usage conditions are duplicated for one music content. The copyright of the music content can be protected without fail.
- the reproduction application (A) 311 uses, for example, usage condition information described in a table format as shown in FIG. 9A.
- the left column of the table describes the usage policy in the column direction, and the right column describes specific values of each policy.
- playback start possible S (fr om), playback end date (to), price per playback (pay Zp 1 ay), and the like are described.
- Such usage condition information is delivered from the EMD server (A) 4-1 in a state where it is added to each music content as shown in FIG. 9B.
- the playback application (A) 311 controls the music content according to the described policy and its value.
- the playback start date (from) is 99/25/99
- the playback end date (to) is 99/1/01/24
- the price for one playback (pay / play) is written as yes Z 10 yen.
- the music content can be played from October 25, 1999, and the playback is prohibited even if the user issues a playback command before then.
- the music content can be played until January 24, 1997, after which the music content is deleted.
- the music content is set so that a fee of 10 yen is charged each time it is played back. For example, the number of times the user played back is separately recorded as log information. The log information is stored and uploaded to the EMD server (A) 4-1 to charge the viewing user for the number of viewings.
- the usage condition information used by the comprehensive management unit (X) 315 will be described.
- the usage condition information described below is added to the music content downloaded from the EMD server (X) 4-3, and the comprehensive management unit (X) 315 controls the music content. Used for In addition, this usage condition information is stored between the playback application (A) 311 and the comprehensive management unit (X) 3 15, and the playback application (B) 3 112 and the comprehensive management unit. It is used as a unified format when transferring music content to and from the nit (X) 315.
- this use condition information is referred to as unified use condition information.
- the unified usage condition information is composed of an index file 331, an automaton file 33, a parameter file 33 3 and a history file 3 34.
- Each file is described in the XML language (XML Extensible Markup Language).
- the index file 331 describes reference information of each file.
- the automaton file 332 contains an automaton description part 341 in which usage conditions are described in automaton, and an authentication and authentication code (MAC: Message Authentication Code) using a content key.
- MAC Message Authentication Code
- the content provider's signature (Sig) 3 4 3 the content provider's signature 3 4 3
- a certificate (Cert) 344 for verifying this signature are added.
- Kc be the content key
- K and K be the private key and public key of the content provider who created the content, respectively.
- the automaton description section 341 the operation state of the music content is described by the Extended State Machine described in the tuple column.
- the set of the current operation state of the music content is Q
- the set of input symbols representing the events of the music content is ⁇
- the music content after the state transition is performed.
- the set of states Q 'after the state transition is represented as d.
- This d is defined by a function ⁇ with variables q and ⁇ .
- q indicates one operation state in a set Q of operation states of music contents.
- ⁇ indicates one event in the set of events ⁇ .
- the function ⁇ is the mapping of Q and the set of powers of ⁇ to Q.
- each tuple is
- ⁇ represents playback (Play), copy (copy), payment amount (pay Y), playback start date / time (from YMD), playback end date / time (to YMD), available number (in Ddays), null
- An event such as an event ( ⁇ ) is described as follows.
- ⁇ ⁇ Play, copy, pay Y, from YMD, to YMD, in Ddays, ⁇
- the automaton description part 341 is described as described above.
- FIG. 13 shows a description example of a tuple sequence of a tomaton indicating the transition of the operation of music content as shown in FIG.
- This automaton makes a state transition as described below.
- the state transits from the initial state q0 to the state q1 and the state q5.
- State q1 and state q5 and later operate in parallel.
- this automaton indicates that music content can be reproduced without any restriction on the number of payments, if the payment of ⁇ 100 is made.
- a payment event (payl OX n) of n times the amount of one playback (for example, 10 yen) occurs in the state ql
- the state transits to the state q4.
- a play event (p 1 ay) occurs after the transition to the state q 4
- the state transits to the state q 4 again.
- n play events have occurred in this state q4
- the state transits to state q1.
- State q 9 is a terminal state in which no state is transitioned and no event can occur.
- this automaton Indicates that the music content can be copied to another device without restriction on the number of payments of ⁇ 2,000.
- this automaton shows that the copied music content can be played any number of times, but cannot be played if copied to another device.
- automaton description section 341 may describe parallel composition of operation states in order to update the operation of music content.
- action a The parallel composition of and operation a is represented by the tuple sequence as follows. ⁇ q 0, a, a o .q o)
- automaton description section 341 may describe a function associated with a state transition.
- an action is represented by a tuple as follows:
- a variable consists of ID, scope, and initial value.
- the scope has classes such as music content, albums, and the entire system.
- An example of the automaton description section 341 in which the action for the variable is described in this way is shown below.
- the above-described automaton description section 341 includes an entry ID 345, a content ID 346, version information 347, and variable information 344. And a tuple sequence 349.
- an entry ID 345 a content ID 346, version information 347, and variable information 344.
- a tuple sequence 349 A specific example of the automaton description section 341 in which the description format is determined as described above will be described.
- DTD Document Type Definition
- playback operation play
- copy operation copy
- purchase of reproduction right purchase of reproduction right
- reproduction right purchase of reproduction right
- album reproduction right pay-for-al bum-play
- anolen ⁇ ⁇ Purchase of copyright (pay-for-album-copy) ⁇ Available date (from), end date (to), null operation (null) as events , Defined by DTD.
- Figure 16 shows a description example of the automaton description part 341 in XML language, which indicates that music content can be played from September 1, 1999.
- the description shown in FIG. 16 becomes an automaton as shown in FIG.
- This automaton is composed of an initial state q 1 and a state q 2.
- the state transits to state q2.
- the music content Regenerate and transit to state q2 again. In this way, the automaton controls the music content so that it can be reproduced from September 1, 1969.
- Figure 18 shows a description example of the automaton description section 341 in XML language, which indicates that music content can be played until October 31, 1999.
- the description shown in FIG. 18 is an automaton as shown in FIG. This automaton is composed of an initial state q 1 and a terminal state e n d.
- a playback event p lay
- music content is played back and the state transits to state q 2 again.
- state 2 when the end of use S (t o) is reached on October 31, 1999, the state transits to state end. When the state becomes end, there is no transition to any state and no event occurs. In this way, this automaton controls music content so that it can be played back until October 31, 1999.
- Figure 20 shows that the playable period of the music content is from September 1, 1999 to October 31, 1999, and the number of playable times is 16 times.
- This is a description example of the automaton description part 341 in XML language, which indicates that there is.
- the description shown in FIG. 20 is an automaton as shown in FIG.
- the automaton is composed of an initial state q 1, a state q 2, and a terminal state end.
- state q1 when the usable start date (from) reaches September 1, 1999, the state transits to state q2. Then, when a playback event (play) occurs in state q2, the music content is played back, and the state transits to state q2 again.
- state 2 when the end-of-use date (to) is set to 1/99 1/1991, or when a regeneration event (p 1 ay X 16) occurs 16 times, the state changes to state end. I do. When the state reaches end, no transition occurs to any state and no event occurs. In this way, the automaton sets the playback period of the music content to September 1, 1999, until October 31, 1999, and the number of playbacks is one. It is controlled to 6 times.
- FIG. 22 is a description example of the automaton description section 341 in the XML language indicating that the number of times the music content is reproduced is limited to 16 times.
- the parameter file 3 3 3 contains a parameter description section 3 51, an authentication code 3 52 using a content key, a signature 3 5 3 of the content provider, and a Certificate 3 5 4 is added.
- the content key is K c
- the private key and public key of the content provider who created the content are K, respectively.
- Nono 0 La meter file 3 3 3 another content provider and the O Tomah tonnes file 3 3 2 content provider who created the (For example, Konten' retailers and content intermediaries such secondary provider) Can be rewritten.
- the rewritten parameter file 33 3 is added with a unique entity ID 55 given to each provider or intermediate company.
- K 'c is the content key of the secondary provider
- K' C H (Kc, Entity D).
- H is a one-way hash function.
- the content key c of the secondary provider is created from the content key Kc of the primary provider.
- the primary provider and the secondary provider are distinguished by their certificates.
- As a method of verifying the parameter file 333 if the content key has been obtained, perform it with the MAC. If the content key cannot be obtained due to security or the like, verify it with the signature and certificate.
- the protocol verified by MAC is as follows. Let S be the primary provider of content, A be the secondary provider, and B be the terminal. S ⁇ A indicates transmission from S to A, S ⁇ B indicates transmission from S to B, and A ⁇ B indicates transmission from A to B. IDA indicates ID of device A.
- the coefficient of a function for changing the value described in the automaton section 41 of the automaton file 31 is described.
- the price of the music content may be a function as follows.
- f 1 (n) 0.9 n
- the primary provider can determine the default value of the price, and the secondary provider can change the price by rewriting the parameter file 333.
- the parameter description section 351 includes an entry ID 356, a content ID 357, and coefficient information 358.
- the history file 334 is a file that describes the trajectory of the operation of the music content that operates based on the description in the automaton description section 341.
- the status and variables in the tuple of the automaton description 41 are recorded. For example, in the example shown in FIG. 13 described above, when reproduction is performed twice,
- the user's payment amount can be calculated.
- the degree of freedom in describing the use condition of the content can be increased.
- the comprehensive management unit (X) 315 stores the music contents C1, C2, C3-... Cn in the HDD 21 in the personal computer 1.
- the content keys Kc1, Kc2, ⁇ c3, and -Ken corresponding to the content CIs, C2, C3,..., Cn are also stored.
- the content key K c has a one-to-one relationship with the music content C.
- Each music content C1, C2, C3,... Cn has a content ID for identification. These content IDs are assumed to be CID 1, CID 2, CID 3 ⁇ -CID n.
- the music contents C l, C 2, C 3- ⁇ 'C n are encrypted by the content keys K c 1, K c 2, K c 3 ⁇ ' K en, and E (K c 1, C 1), E (Kc2, C2), E (Kc3, C3)... ⁇ (Kcn, C ⁇ ) are recorded in the HDD 21 of the personal computer 1.
- E (K, C) indicates that the content C is encrypted with the key K.
- the content ID is recorded in a header of the music content C and is encoded together with the music content C, or the MAC is added to the music content C. And cannot be separated.
- the content keys K c 1, K c 2, K c 3 ⁇ 'K en are encrypted by the storage ⁇ KS, and E (KS, K c 1), E (KS, K c 2), E (KS, Kc3) c
- This storage key KS recorded on the HDD 21 of the personal computer 1 in a state of (KS, Ken) has a so-called tamper resistance.
- the comprehensive management unit (X) 315 in which key management is performed as described above c stored in a recording area that cannot be referenced by ordinary users, for example, music content C 1
- the storage key KS is used to decrypt the content key Kc1.
- the content key K c 1 is used to decrypt the music content C 1.
- the comprehensive management unit (X) 315 can reproduce the music content C1.
- the comprehensive management unit (X) 315 where key management is performed as described above, for example, when the music content C 1 is moved (MOVE) from the HDD 21 to the portable device (X) 6 _ 3
- mutual authentication is performed with the portable device (X) 6-3, and when the authentication is completed, the content key Kc1 is decrypted using the storage key KS. Then, the content key Kc1 is encrypted, and the encrypted content key Kc1 and the encrypted music content C1 are transferred to the portable device (X) 6-3. Then, both the content key K c 1 and the music content C 1 are deleted from the HDD 21.
- the comprehensive management unit (X) 315 stores the encrypted music content C and the backup data of the content key Kc in the HDD 21 or another recording medium. Keep it.
- the comprehensive management unit (X) 315 stores purchase records of music content downloaded from the EMD server (X) 4-3 and all music content stored in the HDD 21.
- the list of content IDs is managed as usage log information.
- This log information is used to download music content from the EMD server (X) 4-3.
- the content is updated.
- the log information is stored in another area of the HDD 21 or another recording medium.
- the comprehensive management unit (X) 315 uploads this log information to the EMD server (X) 4-3 periodically or each time it is accessed.
- the comprehensive management unit (X) 315 first accesses the EMD server (X) 4-3 to perform user authentication.
- the EMD server (X) 4-3 refers to the usage log information of the comprehensive management unit (X) 315 from the user ID of the authenticated user, and checks the consistency verification value I CV (Integrity Check Value) Generate
- H (K, D a t a) is a one-way hash function whose value changes depending on the key.
- the EMD server (X) 4-3 sends the generated consistency verification value I CV to the comprehensive management unit (X) 315.
- the Comprehensive Management Unit (X) 3 15 If the content key Kc has been backed up, the backup data is restored, and the music content C or the content key Kc is stored in the HDD 21. If the music content C or the content key Kc has not been backed up, the EMD server (X) 4-3 will redistribute the destroyed music content C or the content key Kc. At this time, the EMD server (X) 4-3 refers to the user's purchase history and does not perform the charging process if the content has been purchased before.
- the comprehensive management unit (X) 315 checks the CID of the music content using the matching verification value ICV. So that thus, by checking the restored music content C or content key Kc using the matching verification value I CV, for example, a certain music content C i is moved to the portable device (X) 6-3 and the 2 1 If it is deleted from the top, even if the malicious user remembers and restores the encrypted music content C i, E (K ci, C i), even if the data is restored, Cannot play or control movement.
- the music content distribution system even if the music content is destroyed due to, for example, a hard disk crash, it can be restored while protecting the copyright. For example, if the music content was purchased legally, it can be restored for free.
- (X) 3 15 stores the decrypted music content in the HDD 21 of the personal computer 1 and the portable device
- (X) 6-3 saves the encrypted music content on a storage medium such as an internal memory card. Therefore, when music content is transmitted from the comprehensive management unit (X) 315 to the portable device (X) 6-3, the music content on the HDD 21 of the personal computer 1 is transmitted to the portable device (X). ) Memory power attached to 6-3 Will be transferred to the server. Also, when music content is transmitted from the portable device (X) 6-3 to the comprehensive management unit (X) 315, the music content on the memory card attached to the portable device (X) 6-3 is transmitted. The data is transferred to the HDD 21 of the personal computer 1.
- the portable device (X) 6-3 contains ID information (MG-ID), authentication keys for multiple generations (MG-IK), and master keys for multiple generations.
- (X) 6_3 is the 100th generation authentication key from the 0th generation to the 99th generation
- the comprehensive management unit (X) 315 holds the master key (OMG-MK), so that music content can be transferred from the compact disk for audio etc. to the personal computer 1 and stored. it can.
- the comprehensive management unit (X) 315 downloads music content from the EMD server (X) 4-3 by holding the master key (OMG—MK), and the personal It can be stored in Nore Computer 1.
- Master key (OMG—MK) a key that can transfer music content from a compact disc but cannot download music content from the EMD server (X) 4-3 is also called a dedicated key for ritting.
- a key that can transfer music content from the disk to the EMD server (X) 4-3 is also called an EMD key.
- the master key of the 0th generation (OMG-K [0]) is a dedicated key for revoking, and the master keys of the first and subsequent generations (OMG-MK [1 to 99]) are used. It is an EMD key.
- the c comprehensive management unit (X) 3 1 5 illustrating the procedure of processing using a re Bbingu private key is installed from CD- R OM, as shown in FIG. 2 7, inclusive
- a portable device (X) 6-3 and a floppy disk 362 are sold together with the CD-ROM 361 containing the installation software of the management unit (X) 315.
- the floppy disk 362 contains the portable device (X) 6-3 ID information (MG-ID), the 0th generation authentication key (MG-IK [0]), and the 0th generation master key (OMG- MK [0]) is stored.
- sold portable devices (X) 6 _ 3 etc. can be used First, the CD-ROM 361 is mounted on the personal computer 1 (step S11). Subsequently, the comprehensive management unit (X) 315 is installed on the personal computer 1 from the CD-ROM 361 (step S12). Then, the comprehensive management unit (X) 315 is stored in the hard disk of the personal computer 1 (step S13). Next, the portable device (X) 6-3 ID information (MG-ID) stored on the floppy disk 3 62 and the 0th generation authentication key (MG-IK
- the comprehensive management unit (X) 315 can store the music contents provided by the music CD 363, etc. in the hard disk of the personal computer 1 (Step S). 1 5).
- the 0th generation master key (OMG-MK) OMG-MK
- [0]) is a dedicated key, so that music content cannot be downloaded from the EMD server (X) 4-3.
- the portable device (X) 6-3 holds an authentication key and a master key for 100 generations that have not been updated in the generation, but the 0th generation is initially set. Therefore, the comprehensive management unit (X) 3 1 5 holding the authentication key and master key of the zeroth generation, c thus mutual authentication with the portable device (X) 6- 3 is enabled, the music CD Music content provided by 366, etc. can be stored in the memory card of the portable device (X) 6.3 (step S16).
- step S2 In order to use the sold portable device (X) 6-3, etc., first access the EMD registration server 3 on the network using the user ID and password (step S2 1) c Subsequently, the EMD registration server 3 authenticates the user ID and the password (step S 2 2). Next, if there is no problem in the authentication, the EMD registration server 3 installs the comprehensive management unit (X) 315 installation software and the portable device (X) 6-3 ID information (MG-ID). ), The 0th generation authentication key (MG—IK [0]) and the 0th generation master key (OMG-MK [0]) are transmitted to the personal computer 1 (step S23). ).
- the personal computer 1 starts the installation software of the comprehensive management unit (X) 315, installs the comprehensive management unit (X) 315, and installs the portable device ( X)
- the ID information of 6—3 (MG—ID), the 0th generation authentication key (MG_IK [0]), and the 0th generation master key (OMG—MK [0]) are stored in HDD 21. Save (step S24).
- the comprehensive management unit (X) 315 is stored in the hard disk (step S25).
- the comprehensive management unit (X) 315 can store the music content provided by the music CD 363 or the like in the HDD 21 of the personal computer 1 ( Step S26).
- the 0th generation master key (OMG-MK [0]) is a dedicated key for the Riving, so music from the EMD server (X) 4-3 Content cannot be downloaded.
- the portable device (X) 6-3 holds the authentication key and master key for 100 generations that are not updated, but it is 0th generation by default. . Therefore, a comprehensive management unit (X) 31 that holds the 0th generation authentication key and master key
- the method is not limited to the methods shown in FIGS. 27 and 28, and the comprehensive management unit (X) 315 and the 0th generation master key (OMG-MK [0]) dedicated to rubbing are used. It is stored in the CD-ROM 361, and the ID for authentication with the portable device (X) 6-3 and the 0th generation authentication key (MG-IDZIK) are provided via the network. Also good.
- the comprehensive management unit (X) 315 is provided via a network such as a removable media internet such as a CD-ROM by the procedure shown in FIG. 27 or FIG. Installed on HDD 21 in Computer 1. At this time, the comprehensive management unit (X) 315 is composed of a 0th generation master key (OMG-MK [0]) dedicated to ritving, an authentication ID and a 0th generation authentication key (MG -ID / IK [0]) The (X) 6-3 key generation remains the default.
- OMG-MK [0] 0th generation master key
- MG -ID / IK [0] 0th generation authentication key
- the personal computer 1 accesses the EMD registration server 3 on the network using the user ID and the password (step S31). Subsequently, the EMD registration server 3 authenticates the user ID and the password (step S32). Next, if there is no problem in the authentication, the EMD registration server 3 registers the ID information (QMG-ID) of the personal computer 1, and the comprehensive management unit (X) 315 enters the EMD server (X).
- the EMD registration server 3 registers the ID information (QMG-ID) of the personal computer 1, and the comprehensive management unit (X) 315 enters the EMD server (X).
- the EMD registration server 3 sends the portable device (X) 6-3 ID information (MG-ID), the i-th authentication key (MG-I K
- the comprehensive management unit (X) 315 of the personal computer 1 receives the received ID information (MG—ID), the i-th authentication key (MG—I K)
- the comprehensive management unit (X) 315 can store the music contents provided by the music CD 363 and the like in the hard disk of the personal computer 1 and can store the contents on the EMD server ( X) Music content downloaded from 4_3 can be stored in the HDD 21 of the personal computer 1.
- the Comprehensive Management Unit (X) 315 consists of an i-th master key (OM G-MK [i]), an ID for authentication, and a 0-th authentication key (MG-IDZ IK [i]). And the key generation of the portable device (X) 6-3 is also the i-th generation.
- the EMD registration server 3 authenticates the ID of the comprehensive management unit (X) 315. Then, the (i + k) th generation authentication key (MG_IK [i + k]) and the (i + k) th generation master key (OMG-MK [i + k]) are transmitted to the personal computer 1 ( Step S41)). Subsequently, the comprehensive management unit (X) 315 of the personal computer 1 updates the received authentication key and master key to the (i + k) th generation (step S42). Subsequently, the comprehensive management unit (X) 315 authenticates with the portable device (X) 6-3 (step S43). When the portable device (X) 6-3 is authenticated, it updates its key generation from the i-th generation to the (i + k) -th generation (step S44).
- the generation of the authentication key and the like used by the portable device (X) 6-3 is the (i + k) th generation
- the generation of the authentication key and the like held by the comprehensive management unit (X) 315 is the i-th generation
- the portable device (X) 6-3 and the comprehensive management unit (X) 31 When the authentication with 5 is performed, the authentication fails (step S51). If authentication fails, the Comprehensive Management Unit
- (X) 315 makes a key request to the EMD registration server 3 (step S52).
- the EMD registration server 3 authenticates the ID of the comprehensive management unit (X) 315, and generates an (i + k) -generation authentication key (MG—IK [i + k] ) And the (i + k) th generation master key (OMG-MK [i + k]) is transmitted (step S53).
- the comprehensive management unit (X) 315 updates the received authentication key and master key to the (i + k) th generation (step S54).
- the comprehensive management unit (X) 315 authenticates with the portable device (X) 6-3 (step S555).
- the comprehensive management unit (X) 315 can store the music contents provided by the music CD 363 and the like in the hard disk of the personal computer 1 and can store the contents on the EMD server ( X)
- the music content downloaded from 4-3 can be stored in the HDD 21 of the personal computer 1 (step S38).
- the master key and the authentication key used by the comprehensive management unit (X) 315 and the portable device (X) 6 _ 3 are connected to the ring-specific key and the server connection.
- the server connection key is downloaded over the network. For this reason, in the music content distribution system, the security of the music content distributed from the server is enhanced. Even if the key dedicated to the riving is broken, the music content downloaded from the server cannot be broken.
- the master key and the authentication key used by the comprehensive management unit (X) 315 and the portable device (X) 6.3 are updated and used. Further, in the comprehensive management unit (X) 3 15, the master key and the authentication key are supplied via the network, and the generation is updated. This enhances the security of music content. Industrial applicability
- the first authentication key and the first master key are used. Stores the content data stored in the external storage medium and authenticates with the portable playback device.
- the first authentication key and the first master key are used to store and transport the content data stored in the external storage medium. Performs authentication with the playback device.
- the second authentication key and the second master key are provided to the playback program via the network, and are different from the first authentication key and the first master key.
- the security of the content data distributed via the network can be improved.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00970073A EP1158417A1 (en) | 1999-10-25 | 2000-10-25 | Contents providing system |
US09/857,218 US7266691B1 (en) | 1999-10-25 | 2000-10-25 | Contents providing system |
CA002355636A CA2355636A1 (en) | 1999-10-25 | 2000-10-25 | Contents providing system |
KR1020017007994A KR20010089680A (ko) | 1999-10-25 | 2000-10-25 | 콘텐츠제공시스템 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP11/303142 | 1999-10-25 | ||
JP30314299 | 1999-10-25 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001031461A1 true WO2001031461A1 (fr) | 2001-05-03 |
WO2001031461B1 WO2001031461B1 (fr) | 2001-10-18 |
Family
ID=17917394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2000/007473 WO2001031461A1 (fr) | 1999-10-25 | 2000-10-25 | Systeme fournisseur de contenu |
Country Status (6)
Country | Link |
---|---|
US (1) | US7266691B1 (ja) |
EP (1) | EP1158417A1 (ja) |
KR (1) | KR20010089680A (ja) |
CN (1) | CN1327560A (ja) |
CA (1) | CA2355636A1 (ja) |
WO (1) | WO2001031461A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100356723C (zh) * | 2001-08-27 | 2007-12-19 | 索尼株式会社 | 信息提供系统、信息提供装置与方法及信息处理装置与方法 |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE60239003D1 (de) * | 2001-10-19 | 2011-03-03 | Pioneer Corp | Steuersystem und Verfahren für elektronische Einrichtungen, und Steuervorrichtung |
AU2003253715A1 (en) * | 2002-03-18 | 2003-09-29 | Koninklijke Philips Electronics N.V. | Method and system for controlling access to content |
JP3862074B2 (ja) * | 2002-06-20 | 2006-12-27 | ソニー株式会社 | データ通信システム、情報処理装置および方法、並びにプログラム |
US20050005146A1 (en) * | 2003-07-03 | 2005-01-06 | Maui X-Tream, Inc. | Methods, data structures, and systems for authenticating media stream recipients |
CN1607589A (zh) * | 2003-10-13 | 2005-04-20 | 皇家飞利浦电子股份有限公司 | 光盘、播放光盘的播放器及其播放方法 |
JP2005128637A (ja) * | 2003-10-21 | 2005-05-19 | Toshiba Corp | ドライブ検査方法、及びドライブ検査プログラム |
JP4613487B2 (ja) * | 2003-11-07 | 2011-01-19 | ソニー株式会社 | 電子機器、情報処理システム、情報処理装置および方法、プログラム、並びに記録媒体 |
DE10358987A1 (de) * | 2003-11-11 | 2005-06-16 | Siemens Ag | Verfahren zur Sicherung des Datenverkehrs zwischen einem ersten Endgerät und einem ersten Netz sowie einem zweiten Endgerät und einem zweiten Netz |
JP2007528525A (ja) * | 2004-01-08 | 2007-10-11 | 松下電器産業株式会社 | コンテンツ管理装置 |
US8307446B2 (en) * | 2004-10-19 | 2012-11-06 | Victor Company Of Japan, Ltd. | Data using apparatus |
JP2006209689A (ja) * | 2005-01-31 | 2006-08-10 | Sony Corp | データ処理回路 |
JP2008065664A (ja) * | 2006-09-08 | 2008-03-21 | Victor Co Of Japan Ltd | コンテンツデータ利用システム、データ利用装置、利用履歴情報管理装置、及びコンテンツデータ配信装置 |
CN100440782C (zh) * | 2006-02-22 | 2008-12-03 | 迈世亚(北京)科技有限公司 | 数据推送的方法 |
US7769176B2 (en) | 2006-06-30 | 2010-08-03 | Verint Americas Inc. | Systems and methods for a secure recording environment |
US7848524B2 (en) | 2006-06-30 | 2010-12-07 | Verint Americas Inc. | Systems and methods for a secure recording environment |
US7853800B2 (en) * | 2006-06-30 | 2010-12-14 | Verint Americas Inc. | Systems and methods for a secure recording environment |
US8837722B2 (en) * | 2007-10-16 | 2014-09-16 | Microsoft Corporation | Secure content distribution with distributed hardware |
JP4766350B2 (ja) * | 2009-01-06 | 2011-09-07 | ソニー株式会社 | ディスク再生装置および方法、プログラム、並びに記録媒体 |
US11681781B2 (en) | 2018-02-21 | 2023-06-20 | Comcast Cable Communications, Llc | Systems and methods for content security |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0994404A1 (en) * | 1998-10-16 | 2000-04-19 | Matsushita Electric Industrial Co., Ltd. | Production protection system dealing with contents that are digital production |
EP1001419A1 (en) * | 1998-11-09 | 2000-05-17 | Matsushita Electric Industrial Co., Ltd. | Data conversion apparatus and method in copyright protecting system |
JP2000269950A (ja) * | 1999-03-12 | 2000-09-29 | Matsushita Electric Ind Co Ltd | 著作物保護システム |
JP2000357201A (ja) * | 1999-04-14 | 2000-12-26 | Matsushita Electric Ind Co Ltd | データ管理装置、データ管理方法及びデータ管理プログラムを記録している記録媒体 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997014147A1 (fr) * | 1995-10-09 | 1997-04-17 | Matsushita Electric Industrial Co., Ltd. | Support, appareil et procede d'enregistrement d'informations |
JP3176030B2 (ja) * | 1996-01-08 | 2001-06-11 | 株式会社東芝 | 複製制御方法及び複製制御装置 |
JPH09297798A (ja) * | 1996-05-08 | 1997-11-18 | Matsushita Electric Ind Co Ltd | マルチメディア機器のコピー防止装置 |
JPH1021144A (ja) * | 1996-07-03 | 1998-01-23 | Hitachi Ltd | ディジタル著作物配布システム及び不正な複製物の検出方法 |
US6542610B2 (en) * | 1997-01-30 | 2003-04-01 | Intel Corporation | Content protection for digital transmission systems |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
US6684199B1 (en) * | 1998-05-20 | 2004-01-27 | Recording Industry Association Of America | Method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs, and system and data media for same |
US20040117644A1 (en) * | 1998-06-04 | 2004-06-17 | Z4 Technologies, Inc. | Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content |
US6438235B2 (en) * | 1998-08-05 | 2002-08-20 | Hewlett-Packard Company | Media content protection utilizing public key cryptography |
EP0984346A1 (en) * | 1998-09-02 | 2000-03-08 | Hitachi Europe Limited | Copy protection apparatus and method |
KR100484209B1 (ko) * | 1998-09-24 | 2005-09-30 | 삼성전자주식회사 | 디지털컨텐트암호화/해독화장치및그방법 |
US6550008B1 (en) * | 1999-02-26 | 2003-04-15 | Intel Corporation | Protection of information transmitted over communications channels |
US6367019B1 (en) * | 1999-03-26 | 2002-04-02 | Liquid Audio, Inc. | Copy security for portable music players |
WO2000063905A1 (fr) * | 1999-04-16 | 2000-10-26 | Sony Corporation | Systeme de traitement de donnees, procede de traitement de donnees et processeur de donnees |
US7111172B1 (en) * | 1999-07-19 | 2006-09-19 | Rsa Security Inc. | System and methods for maintaining and distributing personal security devices |
-
2000
- 2000-10-25 WO PCT/JP2000/007473 patent/WO2001031461A1/ja not_active Application Discontinuation
- 2000-10-25 CA CA002355636A patent/CA2355636A1/en not_active Abandoned
- 2000-10-25 EP EP00970073A patent/EP1158417A1/en not_active Withdrawn
- 2000-10-25 US US09/857,218 patent/US7266691B1/en not_active Expired - Fee Related
- 2000-10-25 KR KR1020017007994A patent/KR20010089680A/ko not_active Application Discontinuation
- 2000-10-25 CN CN00802347A patent/CN1327560A/zh active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0994404A1 (en) * | 1998-10-16 | 2000-04-19 | Matsushita Electric Industrial Co., Ltd. | Production protection system dealing with contents that are digital production |
EP1001419A1 (en) * | 1998-11-09 | 2000-05-17 | Matsushita Electric Industrial Co., Ltd. | Data conversion apparatus and method in copyright protecting system |
JP2000269950A (ja) * | 1999-03-12 | 2000-09-29 | Matsushita Electric Ind Co Ltd | 著作物保護システム |
JP2000357201A (ja) * | 1999-04-14 | 2000-12-26 | Matsushita Electric Ind Co Ltd | データ管理装置、データ管理方法及びデータ管理プログラムを記録している記録媒体 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100356723C (zh) * | 2001-08-27 | 2007-12-19 | 索尼株式会社 | 信息提供系统、信息提供装置与方法及信息处理装置与方法 |
Also Published As
Publication number | Publication date |
---|---|
CN1327560A (zh) | 2001-12-19 |
WO2001031461B1 (fr) | 2001-10-18 |
EP1158417A1 (en) | 2001-11-28 |
CA2355636A1 (en) | 2001-05-03 |
KR20010089680A (ko) | 2001-10-08 |
US7266691B1 (en) | 2007-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100737972B1 (ko) | 콘텐츠 제공시스템 | |
WO2001031461A1 (fr) | Systeme fournisseur de contenu | |
WO2000058827A1 (fr) | Systeme de traitement d'informations | |
WO2000049510A1 (fr) | Dispositif et procede de traitement de l'information et support de memorisation de programme | |
JP4329258B2 (ja) | コンテンツデータの制御装置及び方法、並びに、記憶媒体 | |
WO2000049511A1 (fr) | Circuit integre a semi-conducteur, procede de traitement de l'information, dispositif de traitement de l'information et dispositif de memorisation de programme | |
KR100729836B1 (ko) | 콘텐츠 데이터 관리방법 | |
JP4360026B2 (ja) | データ処理装置、コンテンツ管理方法及び記憶媒体 | |
JP4655470B2 (ja) | コンテンツデータ処理装置及びコンテンツデータ処理方法、並びにコンテンツデータ管理システム及びコンテンツデータ管理方法 | |
JP2001051906A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP4581219B2 (ja) | コンテンツ提供システム、コンテンツ配信方法、記憶媒体及びデータ処理装置 | |
JP4379653B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP4300442B2 (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
JP2000306006A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
EP1158418A1 (en) | System for controlling information on condition of contents use | |
JP2001195077A (ja) | コンテンツデータの送信装置及び方法、コンテンツデータの制御装置及び方法、並びに、記憶媒体 | |
JP2001195076A (ja) | コンテンツ提供システム及びコンテンツ提供方法 | |
JP2000305855A (ja) | 情報処理装置および方法、並びにプログラム格納媒体 | |
MXPA01006370A (en) | Method for managing content data | |
JP2000347849A (ja) | 情報提供装置および方法、並びにプログラム格納媒体 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 00802347.6 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA CN KR US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
ENP | Entry into the national phase |
Ref document number: 2355636 Country of ref document: CA Ref document number: 2355636 Country of ref document: CA Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09857218 Country of ref document: US Ref document number: 1020017007994 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000970073 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1020017007994 Country of ref document: KR |
|
AK | Designated states |
Kind code of ref document: B1 Designated state(s): CA CN KR US |
|
AL | Designated countries for regional patents |
Kind code of ref document: B1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
B | Later publication of amended claims | ||
WWP | Wipo information: published in national office |
Ref document number: 2000970073 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000970073 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1020017007994 Country of ref document: KR |