WO2004070612A1 - 端末装置及びそれを備えたデータ保護システム - Google Patents
端末装置及びそれを備えたデータ保護システム Download PDFInfo
- Publication number
- WO2004070612A1 WO2004070612A1 PCT/JP2004/001011 JP2004001011W WO2004070612A1 WO 2004070612 A1 WO2004070612 A1 WO 2004070612A1 JP 2004001011 W JP2004001011 W JP 2004001011W WO 2004070612 A1 WO2004070612 A1 WO 2004070612A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- domain
- terminal device
- key
- encrypted
- Prior art date
Links
- 238000012545 processing Methods 0.000 claims abstract description 173
- 238000003860 storage Methods 0.000 claims abstract description 173
- 238000000034 method Methods 0.000 claims description 98
- 238000004891 communication Methods 0.000 claims description 72
- 238000013500 data storage Methods 0.000 claims description 30
- 238000012986 modification Methods 0.000 claims description 21
- 230000004048 modification Effects 0.000 claims description 21
- 230000004044 response Effects 0.000 claims description 9
- 230000010076 replication Effects 0.000 claims 7
- 230000003362 replicative effect Effects 0.000 claims 3
- 238000007726 management method Methods 0.000 description 104
- 230000008569 process Effects 0.000 description 70
- 230000005540 biological transmission Effects 0.000 description 34
- 238000010586 diagram Methods 0.000 description 31
- 230000000295 complement effect Effects 0.000 description 24
- 239000013589 supplement Substances 0.000 description 22
- 238000013523 data management Methods 0.000 description 14
- 238000011084 recovery Methods 0.000 description 13
- 239000000284 extract Substances 0.000 description 7
- 230000033458 reproduction Effects 0.000 description 7
- 238000012384 transportation and delivery Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000014759 maintenance of location Effects 0.000 description 3
- 238000012856 packing Methods 0.000 description 3
- 238000005192 partition Methods 0.000 description 3
- 239000009261 D 400 Substances 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000010926 purge Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/108—Transfer of content, software, digital rights or licenses
- G06F21/1082—Backup or restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
Definitions
- the present invention relates to a terminal device for protecting data and a data protection system, and more particularly to a terminal device and data protection system for protecting data by backup.
- the terminal device acquires the encrypted backup data and the encrypted backup key from the external storage medium and transmits the data to the server device.
- the server device performs decryption processing of the encrypted backup key and decryption processing of the encrypted packed up data, and transmits the data restored by the processing to the terminal device. That is, in the above conventional data protection system, the key of the terminal device is encrypted using the public key of the server device in order to construct a mechanism which does not permit the above-mentioned third party to restore the data.
- the server backup process is required to restore encrypted backup data.
- the server device authenticates the terminal device that has requested the processing, and if the terminal device is a legitimate terminal device, the above-mentioned right protection and privacy protection are achieved by preventing unauthorized restoration by accepting the request. .
- the terminal device duplicates the data, encrypts it using the first domain key, and stores the result as encrypted duplicate data in the storage medium, so that the encrypted duplicate stored in the storage medium is stored. It is possible to prevent data from being illegally restored by a device that does not belong to the terminal's first domain. Ru. Furthermore, when the terminal device restores the encrypted copy data, it can decrypt the encrypted copy data with the domain key used for encryption, and restores it, as in the conventional example. You can restore without That is, even if the terminal device is in an offline environment, it can be restored, and the processing load on the server device and the communication load on the network can be reduced.
- the data storage means stores the encrypted copy data generated by the encryption means in a storage medium
- the first or second data used for encrypting the encrypted copy data is added to the encrypted and decrypted data and stored in the storage medium, and the decryption unit decrypts the encrypted copy data stored in the storage medium.
- the first or second domain key specified in the first or second domain key used to encrypt the encrypted copy data is identified based on the identifier attached to the encrypted copy data, and the first or second domain key identified Said encrypted copy using Decode data.
- the copying unit deletes a part of the copied data according to the content of the copied copied data
- the encrypting unit encrypts the remaining copied data that has been deleted and encrypts the encrypted copied data. It may be characterized by generating duplicate data.
- the data shared by each of the first and second domains indicates a content key necessary to use content that is a digital work and the condition of the use, and the copying unit In the duplicate data for data, delete the part that indicates the content key.
- the content key portion of the duplicate data is deleted, and only the usage condition portion is backed up, so that unauthorized restoration of the content key, which is important data, can be reliably prevented.
- the terminal device further performs communication with an external device via a communication line, thereby removing the part deleted by the copying means with respect to the data re-decoded by the decoding means. It may be characterized by providing a complementing means for complementing the external device.
- the decoding means may be a server apparatus connected via a communication line
- the decryption of the encrypted copy data may be performed when the decryption of the encrypted copy data is received, the decryption of the encrypted copy data may be performed.
- the decryption unit decrypts the encrypted copy data
- an inquiry is made to the server apparatus as to whether decryption is possible, and when a response indicating that the decryption is possible is received, the encrypted copy data Perform decryption.
- the server device needs to be authorized, so that unauthorized data recovery can be reliably prevented.
- the present invention can also be realized as a data protection system provided with the above terminal device, a data protection method, and a program. Brief description of the drawings
- FIG. 1 is a diagram showing an overall schematic configuration of a data protection system according to a first embodiment of the present invention.
- FIG. 2 is a functional block diagram showing a detailed configuration of the domain management server, the network storage, and the terminal device of the same.
- FIG. 3 is a diagram showing the data structure of the domain management table held by the domain information storage unit of the domain management server of the above.
- Figure 5 (a) is a diagram showing the data structure of the data management table held by the data storage unit of the network storage same as above, and (b) is the data management table held by the data storage unit of the terminal device. Is a diagram showing the data structure of.
- FIG. 6 shows the data structure of the above license.
- FIG. 16 is a diagram showing the contents of a message in a communication message transmitted and received in communication with a terminal device.
- FIG. 8 is a diagram showing a configuration of a message of a communication message sent to the domain management server when the above-mentioned terminal device requests the domain management server for the domain key.
- FIG. 9 is a view showing a configuration of a message main body of a communication message transmitted from the domain management server when the domain management server of the same embodiment passes the domain key to the terminal device 300.
- Figure 10 is a flow chart showing the domain key acquisition process of the same as above.
- FIG. 11 shows the configuration of the message body of a backup request message sent when the above-mentioned terminal device requests the network storage to store the encrypted backup data.
- FIG. 12 is a diagram showing a configuration of a message body of a back-up request reply message that the network stripe sends back to the terminal device in response to a request from the above-mentioned terminal device.
- FIG. 13 is a flow chart showing backup processing of the same.
- FIG. 14 is a diagram showing the configuration of the message body of a backup data acquisition request message sent by the above-mentioned terminal device to acquire encrypted backup data stored in network storage.
- FIG. 15 is a diagram showing a configuration of a message body of a backup data transmission message in which the network storage sends back to the terminal device in response to an acquisition request from the above-mentioned terminal device.
- FIG. 16 is a flowchart showing the reference processing of the same.
- FIG. 17 is a flow chart showing restoration processing of the encrypted backup data of the same.
- FIG. 18 is a content display diagram showing the contents of the control information list of the above.
- FIG. 19 is a data configuration diagram showing the data configuration of the control information of the same.
- FIG. 20 is a configuration diagram showing a configuration of a data protection system according to a second embodiment of the present invention.
- FIG. 21 shows the contents of the use condition management table of the same.
- FIG. 22 is a diagram showing the contents of the above-mentioned content key management table.
- FIG. 23 is a flow chart showing backup processing of the same.
- FIG. 24 is a diagram showing the data structure of the message main body of the data restoration request message sent when the above-mentioned terminal device requests the data supplement server 400 to supplement the data. .
- FIG. 25 is a diagram showing the data structure of the message body of the restored data transmission message transmitted from the data supplement server to the terminal device of the same.
- FIG. 26 is a flow chart showing the data restoration processing of the same.
- FIG. 1 is a diagram showing an overall schematic configuration of a data protection system S according to a first embodiment of the present invention.
- This data protection system S is a system that protects data as much as possible when data held by the terminal device is damaged and lost, and it performs encryption of domain management server 100 that performs domain management. It consists of a single network storage 200 for storing backup data, terminal devices 300a to 300c for holding data to be backed up, and a transmission path N for interconnecting them. It is done.
- the domain in the present invention will be defined.
- a data delivery service when there are terminals capable of sharing and moving data mutually, those terminals can be logically grouped.
- the unit to which the grouped terminal devices belong is defined as a domain.
- it is not permitted to move or share data between terminals belonging to different domains.
- the viewpoint of privacy protection of the user and the unit to set up the domain from are determined as a subscriber of data distribution service. It is typical to set up a domain for each user.
- one terminal device may form a domain to which only one terminal device belongs, or one terminal device may belong to two or more domains.
- the domain management server 100 manages terminal devices 3 0 0 a-3 0 0 c belonging to the domain, and generates and manages domain keys set for each domain.
- the terminal devices 3 0 0 a to 3 0 It is a server device that sends the domain key to 0 c.
- the domain management server 100 manages the domain and the domain key, and based on the request from the terminal devices 300a to 300c, through the transmission path N, the domain key Is transmitted to the terminal device 3 0 0 a to 3 OO c. Also, such a domain management server 100 is realized by a single station or the like.
- the domain key is an encryption key of the common key cryptosystem shared by terminals belonging to the same domain, and is used for encryption at the time of data backup or decryption at the time of data recovery.
- the domain key may be used for data sharing permitted within the same domain, or for processing such as transfer or authentication.
- S S L (S e c r e S e s s s s k o k t L a y e r) or T I _ S T s s s s s s s s a s t s r o s e r s e s e s u r i can be used.
- the network storage 200 stores encrypted backup data received from the terminal devices 3 0 0 a to 3 0 0 c through the transmission path N, and the terminal devices 3 0 0 a to 3 0 0 c The encrypted pack-up data is transmitted to the terminals 3 0 0 a to 3 0 0 c according to the request. Also, such network storage is realized by a workstation or the like.
- the network storage 200 has a storage medium such as a hard disk drive (HDD), and the storage medium can be used to back up data with tape or to use RAID (redundant array). D isks) It is configured to be excellent in crash resistance.
- HDD hard disk drive
- RAID redundant array
- the transmission path N is a network that mutually connects the domain management server 100, the network management 2 0 0, and the terminal devices 3 0 0 a to 3 0 0 c.
- the transmission path N is a communication network such as an internet, a digital broadcast, or a network in which these are combined.
- the terminal devices 300 a to 300 c have a function of connecting to the transmission line N, and the user can use data such as content on one monitor screen or hold data for each domain. It is a device that backs up data and restores data.
- the terminal devices 300a to 300c are STBs (SetTopBox) for receiving digital broadcasts, digital TVs, It is a content display device such as a DVD (D igita IV ersati I e D isc) recorder, an HDD (Hard D isk D rive) recorder, a PC (P terona IC omputer), other recorders, or a composite device of these.
- STBs SetTopBox
- TVs digital TVs
- It is a content display device such as a DVD (D igita IV ersati I e D isc) recorder, an HDD (Hard D isk D rive) recorder, a PC (P terona IC omputer), other recorders, or a composite device of these.
- the domain identifier is information for uniquely identifying a domain in the data protection system S.
- the terminal identifier is information for uniquely identifying a terminal device in the data protection system S.
- the terminal identifier of the terminal device 300a will be described as "TERM I N A L-I D-0 0 0 1". Also, it is assumed that the terminal identifier is stored in the ROM of each of the terminal devices 300a to 300c.
- FIG. 2 is a functional block diagram showing the detailed configuration of the domain management server 100, the network storage unit 200, and the terminal devices 300a to 300c shown in FIG.
- the functional configuration of the terminal devices 3 0 0 a to 3 0 0 c is illustrated with the terminal device 3 0 0 a as a terminal device 3 0 0 0 as a representative thereof.
- the domain management server 100 is a communication unit 1 that communicates with a domain information storage unit 1 1 1 that stores domain information, a domain key storage unit 1 1 2 that stores domain keys, and a terminal device 3 0 0. 0 1, domain information storage section 1 1 1 1 1 Register domain information in domain information storage section 1 0 2, Domain judgment section 1 0 3 which determines the domain to which terminal device 3 0 0 belongs, Domain key Domain key acquisition part 1 0 4 that acquires' main key from storage part 1 1 2 and domain And a domain key generation unit 1 0 5 for generating a key.
- Network storage 200 is a data storage unit 21 1 for storing data, a communication unit 2 0 “I communicating with a terminal device 3 0 0, and a data storage unit 2 1 1 for data.
- a data acquisition and storage unit 202 is provided which performs registration, acquisition of data via the communication unit 201, and acquisition of data from the data storage unit 21 1.
- the terminal device 300 stores the domain key storage unit 3101, which stores the domain key acquired from the domain management server 1000, and the data stored by the terminal device 300, for each domain.
- a domain management server 1 0 generates a domain key request message and a communication unit 3 0 1 that communicates with the storage unit 3 1 2, the domain management server 1 0 0, and the network storage 2 0 0.
- the domain key request unit 3 02 which requests domain key acquisition to 0, and backup data are generated, and encrypted backup data in which backup data is encrypted is added to the network 2 0 0.
- the backup processing unit 300 that sends the data
- the data recovery unit 300 that obtains the encrypted backup data from the network storage 200 and restores the encrypted backup data
- the networks A backup data reference unit 3 0 5 that obtains encrypted pack-up data from the disk 200 and presents the contents of backup data to the user, and encryption for encrypting the pack-up data and decrypting the encrypted backup data ⁇ Decryption It has a part 3 0 6
- the domain information storage unit 1 1 1 is a database holding a domain management table D 3 0 0 for managing information on domains, and this domain management table D 3 0 0 is a domain, and terminals belonging to the domain. Associate device 300 with one another. Specifically, the domain information storage unit 1 1 1 has the domain management table D 3 0 0 shown in FIG. 3 and manages the domain identifier D 3 0 1 and the terminal identifier D 3 0 2 .
- the domain management unit D 3 0 0 is as follows: domain identifier D 3 0 1 is “DOMAIN_ID—0 0 0 1 J, terminal identifier D 3 0 2 is“ TERMINAL — ID-0 0 0 1 J Indicates that the terminal device 3 0 0 a belongs. Also, for this domain management table D 3 0 0, the domain identifier D 3 0 1 is ⁇ DOMAIN — ID — 0 0 0 2 J For the terminal identifier D 3 0 2 “TERMINAL— ID-1 0 0 1 ", TERMINAL-ID-1 0 0 2" indicates that two terminal devices 3 0 0 0 belong.
- this domain management integration D 3 0 0 0, “terminal ID D 3 0 2 2 in the domain of DOMAIN-ID-0 0 0 3 J, — TERMINAL 1 ID — 0 0 0 1”, “ TERMINAL-ID-3 3 3 3 3 J indicates that the two terminal devices 3 0 0 0 belong, and the terminal identifier D 3 0 2 is “TERMINAL-ID 0 0 0 1 J terminal device 3 0 0 a indicates that the domain identifier D 3 0 1 is “domain-ID-0 0 0 1 J domain, and the domain identifier D 3 0 1 is“ domain— ID 0 0 0 3 J domain It shows that it belongs to the
- FIG. 4 is a diagram showing the data structure of the domain key management table held by the domain key storage unit 112.
- the domain key storage unit 112 is a database that holds a domain key management table D 400 for managing a domain key used for encryption processing of backup data and decryption processing of encrypted backup data.
- This domain key management table D 400 corresponds to the terminal identifier included in the domain key acquisition request when the domain key is transmitted in response to the domain key acquisition request from the terminal device 300. Used to obtain the domain key of the domain.
- the domain key storage unit 1 1 2 has a domain key management table D 4 0 0 shown in FIG. 4 and manages the domain identifier D 4 0 1 and the domain key D 4 0 2 doing.
- the domain key management table D 4 0 0 shown in FIG. 4 belongs to a domain whose domain identifier D 4 0 1 is “DOMAIN-ID— 0 0 0 1”. It indicates that the domain key used for the terminal device 300 to be executed is "DOMAIN-KEY-0 0 0 1 J.
- the data registration in domain information storage unit 1 1 1 and domain key storage unit 1 2 2 2 is performed by the user who owns terminal device 300 via the transmission path N by the operator of the data distribution service. It connects to Web site (domain management server 100) and is done online by domain registration screen.
- the data registration may be done off-line, such as using a postcard for registration.
- the terminal device 300 notifies the operator (domain management server 100) of the terminal identifier D302 either online or offline. Therefore, the domain information registration unit 110 of the domain management server 100 Associates the domain identifier D 3 0 1 with the terminal identifier D 3 0 2 and registers it in the domain management table D 3 0 0 of the domain information storage unit 1 1 1. As a result of the domain new registration processing as described above, the domain management table D 3 0 0 of the domain information storage unit 11 1 is constructed.
- the user connects to the web site of the business (the domain management server 100), and a terminal device addition screen is displayed.
- the domain identifier of the domain and the terminal identifier of the terminal device 300 to be added are sent.
- the domain information registration unit 1 02 can manage the domain information storage unit 1 1 1 This is realized by adding the terminal identifier transmitted as described above to the terminal identifier D 3 0 2 corresponding to the domain identifier D 3 0 1 of the table D 3 0 0.
- the data storage unit 2 1 1 holds a data management table D 500 shown in (a) of FIG. 5 and the data management unit D 500 is a domain identifier D 5 0 1 And storage data D 5 0 2 are associated with each other.
- data management table D 500 shown in (a) of Fig. 5 is used as encrypted backup data in a domain whose domain identifier D 5 0 1 is "DOMAIN-ID-0 0 0 1 J. It indicates that stored data D 5 0 2 of DATA— 0 0 0 1 ”is stored.
- FIG. 5 is a diagram showing a data structure of a data management table held by the data storage unit 32 of the terminal device 300.
- the data storage unit 32 12 is a database for managing data held by the terminal device 300 for each domain, and is a data management table D 51 shown in FIG. 5 (b). Hold 0.
- the data management table D510 has associated the domain identifier D511, the data identifier D512, and the stored data D513.
- the data identifier D 5 1 2 is information that can uniquely identify data in combination with the domain identifier D 5 1 1.
- the domain identifier D51 1 is ⁇ DOMAIN-ID-0 0 0 1 J and the data identifier D 51 2 is “DATA— It indicates that “DATA — 0 0 0 1 J is stored as the stored data D 5 1 3 corresponding to the ID— 0 0 0 1 J.
- data registration to the data storage unit 32 may be acquired from the server apparatus through the transmission path N, acquired from the package media, etc.
- the description is omitted because it is not the essence of the present invention.
- data must be stored for each domain, and when data is stored in data storage unit 312, the data must be stored as data belonging to at least one of the domains. It does not. It should be noted that to which domain the data belongs: at the time of data request when the terminal device 300 requests data, at the time of data distribution at the data distribution side, at the time of data acquisition when the terminal device 300 acquires data, etc. It may be determined at any timing. For the above reasons, the terminal device 300 manages data for each domain, performs data backup processing, and data restoration processing for each domain as well.
- a license which is an example of data to be backed up, which is held in data storage unit 32 and a data structure of the license will be described.
- a license is one of the data used in a content delivery system that is a typical example of a data delivery system. Here, we briefly explain the content delivery system.
- copyright protection technology is a technology for securely controlling the use of content such as a user reproducing content or copying it to a recording medium using encryption technology or the like.
- a server device may have a resource including a usage condition such as the number of times of playback of content available on the terminal device, and a content key for decrypting the encrypted content.
- a system that generates a sense and distributes it to a terminal device, and the terminal device decrypts separately acquired encrypted content with the content key of the license, and controls the use of the content based on usage conditions.
- content keys and licenses are granted on a per content basis and are associated with content identifiers.
- the content identifier is information for uniquely identifying the content in the content delivery system.
- the license will be described as being granted on a content basis.
- FIG. 6 shows the data structure of the license.
- the license 600 consists of a use condition 601 consisting of available information of content, and a content key 602 for decrypting encrypted content corresponding to the license 600.
- the terms and conditions of use are the number of times the content corresponding to the license 600 is available, for example ⁇ 10 times J, and the available period, for example ⁇ 20 0 1 1 1 ⁇ February 2003 3rd class J, and so on.
- the license 600 needs to be associated with the content identifier in the processing relating to the data storage unit 32 and the license 600.
- the content identifier may be included in the license 600 in advance.
- the terminal device 300 in order to protect the data, it is necessary to back up data held by the terminal device 300 and to perform data restoration processing based on the backed up data. Further, in the present invention, it is necessary to obtain the domain key in advance at the time of backup processing and data restoration processing. It is also assumed that processing to refer to the data content of backed up data is required. For example, if the data to be protected is a license, it is assumed that the usage conditions of the license being backed up are presented to the user.
- FIG. 16 is a diagram showing the contents of a message format of a communication message transmitted and received in communication between 0 0 and a terminal device 300.
- the communication message M 700 shown in FIG. 7 consists of a message header M 7 0 1 and a message main body M 7 0 2.
- FIG. 8 shows the communication message M 700 sent to the domain management server 100 when the terminal device 300 requests a domain key from the domain management server 100.
- FIG. 2 is a diagram showing a configuration of 2;
- FIG. 18 is a diagram showing the configuration of a message body M 7 0 2 of a communication message M 7 0 0 transmitted from the domain management server 1 0 0 at the time of delivery.
- the message body M 720 is configured as a domain key transmission message body M 900.
- the domain key transmission message body M 900 is a domain. It consists of an identifier M901 and a domain key M902.
- Figure 10 is a flow chart showing domain key acquisition processing.
- the terminal device 300 starts domain key acquisition processing according to the domain key acquisition instruction to the terminal application of the user. That is, the terminal application that has received the domain key acquisition instruction instructs the domain key request unit 302 to acquire the domain key.
- the domain key request unit 3002 uses the message body M702 as a communication message M700 (domain key request message) including the domain key request message body M800. It is generated and sent to the domain management server 100 through the communication unit 3 0 1 (step S 1 9 3 1).
- the terminal identifier M 8 0 1 contained in the domain key request message body M 8 0 0 is the R of the terminal device 3 0 0
- the communication device M 7 0 0 (reply message) including the message main body M 7 0 2 that the message does not belong to the domain is used as the terminal device 3 0 Send to 0
- the terminal device 300 receives the reply message (step S 1 932)
- the terminal device 300 notifies the user to that effect, and ends the process.
- the subsequent processing (the processing from step S1913) is performed for each domain identifier.
- the communication message M 700 domain key transmission message
- the terminal device 3 Send a communication message M 7 0 0 (reply message) containing multiple domain identifiers hit 0 0 in the message body M 7 0 2, and let the user select one domain identifier,
- the subsequent process (the process from step S1913) may be performed.
- the domain key acquisition unit 104 transmits the domain identifier acquired in step S 1 9 1 3 and the domain key acquired in step S 1 9 1 4 to a message.
- Main body M 70 2 Include.
- the domain key acquisition unit 1 0 4 adds a message header M 7 0 1 to the message body M 7 0 2 to generate a communication message M 7 0 0 (domain key transmission message). It is transmitted to the terminal device 300 through the communication unit 1 0 1 (Step S 1 9 1 5).
- the terminal device 300 acquires the domain key corresponding to the domain selected by the user from the domain management server 100,
- the acquired domain key may be associated with the domain identifier of the above-mentioned domain and stored in the domain key storage unit 3 1 1.
- the terminal device 300 transmits the domain identifier to the domain management server 100 by storing the domain identifier of the domain selected by the user in the domain key request message. Temporarily store the identifier. Then, the terminal device 300 associates the domain identifier acquired from the domain management server 100 with the domain identifier temporarily stored as described above.
- Figure 1 1 shows the communication message M 700 sent (backup request message) sent when the terminal device 300 requests storage of the backup data to the network storage 200. It is a figure which shows the structure of message main body M702.
- this message body M702 is configured as a backup request message body M1000, and this backup request message body M1000 is Backup data consists of encrypted backup data M 1 0 0 1 and domain identifier M 1 0 0 2
- FIG. 12 shows the communication message M 700 0 (backup request reply message) in which the network storage device 200 replies to the terminal device 300 in response to a request from the terminal device 300
- FIG. 18 is a diagram showing the configuration of a message main body M702.
- this message body M702 is configured as a backup request reply message body Ml1 0 0, and this backup request reply message body M l 1 0 0 is a terminal It consists of processing result M 1 0 1 1 which shows the result of processing performed by network storage 2 0 0 for the request from device 3 0 0.
- FIG. 13 is a flow chart showing backup processing.
- the terminal device 300 opens a backup process of data held by the terminal device 300 according to a backup instruction to the user's terminal application. Start. That is, the terminal application that has received a backup instruction from the user issues a backup instruction to the backup processing unit 303.
- the terminal device 300 belongs to two or more domains
- the user inputs information specifying which domain the data to be backed up corresponds to.
- the domain identifier is input.
- you want to back up only part of the data corresponding to the domain enter information that further limits the data.
- the above domain identifiers and information for limiting data are put together as backup target data limited information.
- the backup processing unit 33 based on the backup target data restriction information, the backup processing unit 33 identifies and copies the backup target data from the data stored in the data storage unit 32 and generates backup data. It will (Step S 2 0 3 1).
- the search processing unit 3 0 3 obtains the domain key from the domain key storage unit 3 1 1 (step S 2 0 3 2).
- the domain key is specified and acquired using the above-mentioned domain identifier as a key. Even if there is only one domain key in the domain key storage unit 3 1 1, the backup processing unit 3 0 3 may perform verification using the above-mentioned domain identifier. Also, if the domain key is not stored in the domain key storage unit 31 1, the terminal device 300 acquires the domain key according to the flow of domain key acquisition processing described above.
- the backup processing unit 3 0 3 sends the backup data generated in step S 2 0 3 1 and the domain key obtained in step S 2 0 3 2 to the decryption unit 3 decryption unit.
- Encryption ⁇ Decryption unit 3 0 6 uses received backup data as domain key Encrypt and generate encrypted backup data (step S 2 0 3 3) and send it to the upload processing unit 3 0 3.
- the backup processor 303 generates the above-mentioned backup request message and transmits it to the network storage 200 via the communication unit 301 (step S203).
- the domain identifier M 1 0 0 2 contained in the backup request message body M 1 0 0 0 is a domain identifier corresponding to the domain key obtained in step S 2 0 3 2.
- the network integration database 200 receives the above-mentioned backup request message through the communication unit 201 (step S 200 1).
- the data acquisition 'storage unit 202 extracts the domain identifier Ml 0 0 2 from the request message body M 1 0 0 0 2, and the data management table D 5 0 of the data storage unit 2 1 1 Search the domain identifier M 1 0 0 2 from 0, and confirm the existence of stored data D 5 0 2 that is encrypted backup data of the domain corresponding to the domain identifier M 1 0 0 2 (step S If 2 0 2 2) c domain Lee emissions identifier M 1 0 0 2 corresponding to the domain Lee down the encrypted backup data is not present, the data acquisition 'storage unit 2 0 2, the new record one de Create and store encrypted backup data M 1 0 0 1 (Step S 2 0 2 3), and if encrypted backup data of the domain corresponding to domain identifier M 1 0 0 2 exists, Encrypted backup to existing encrypted backup records Overwrite data M
- the storage unit 202 creates a backup request reply message including the processing result M 1 0 1 1 indicating that the backup processing is completed, and sends it to the terminal device 300 ( Step S 2 0 2 5). Also, if the backup process is not completed for some reason, a backup request reply message including the processing result M 1 1 0 1 that indicates abnormal termination Is sent to the terminal device 300.
- the terminal device 300 receives the backup request reply message (step S 2 0 3 5), for example, presents the user with the content of the received processing result M 1 1 0 1.
- the terminal device 300 encrypts the backup data and stores it in the network storage 200 as described above, the following processing may be performed.
- the terminal device 300 adds additional data to the encrypted backup data.
- This additional data indicates information related to control of restoration availability, and for example, a restoration expiration date indicating a restoration possible period, a backup processing time indicating a backed up time, a data backup data backup data
- a restoration expiration date indicating a restoration possible period
- a backup processing time indicating a backed up time
- the terminal device 300 If the additional data indicates the restoration expiration date, the terminal device 300 generates the additional data indicating the restoration expiration date based on an instruction from the server of the provider operating the data distribution service, for example, and performs encrypted backup. Append to data.
- the terminal device 300 may generate additional data indicating the longest or the shortest among the restoration expiration dates of the plurality of licenses.
- the license for the restoration expiration date is "valid until 2 0 0 3/2/1 3", the license for "2 0 0 3/3/1 4" and "2 0 0 3 Z 3 2 If the terminal device 300 backs up the license with “valid up to 5”,
- the list 300 is the shortest restoration expiration date "Add data showing 2 0 0 3 2/1 3 J, or the longest restoration expiration date" 2 0 0 3 3 2 5 "Addition data Generate
- the terminal device 300 When the additional data indicates the backup processing time, the terminal device 300 encrypts the backup data to specify the time when the encrypted backup data is generated, and uses that time as the above-mentioned backup processing time. And add the additional data to the encrypted backup data. If the additional data indicates a data partition, the terminal device 300 counts the number of times of generation of the encrypted backup data, generates the additional data using the count value as a data partition, and the additional data Is added to the encrypted backup data.
- the terminal device 300 When the additional data indicates the reference-only data, the terminal device 300 generates the additional data as the above-mentioned reference-only data, for example, the contents of the usage condition of the backup data represented in plain text, and encrypts the additional data. Append to backup data.
- the terminal device 300 is used to generate encrypted backup data, for example, AES (Advanced Encryption Stdard ⁇ ⁇ ⁇ ⁇ rip rip I e DES (D ata An identifier indicating a common key encryption algorithm such as E ncryption (Standard) etc. is generated as the above encryption algorithm identifier, and additional data is generated, and the additional data is added to the encrypted backup data.
- AES Advanced Encryption Stdard ⁇ ⁇ ⁇ ⁇ ⁇ rip rip I e DES
- Common key encryption algorithms such as AES, Triple DES, etc.
- the data protection system S supports multiple encryption algorithms, the encryption algorithm in which encrypted backup data is encrypted is used. Information needs to be added.
- the terminal device 300 reads the terminal identifier stored in the ROM held by itself, generates additional data indicating the terminal identifier, and adds the additional data to the encrypted backup data.
- the terminal device 300 sends the server identifier (for example, URL (uniform resource) from the server serving as the source of the original data of the backup data, that is, the server distributing the data. (locator) and position information etc. are acquired in advance.
- the terminal device 300 When the terminal device 300 generates encrypted backup data from the data, the terminal device 300 generates additional data indicating the server identifier and adds it to the encrypted backup data.
- step S 20 24 in FIG. 13 if encrypted backup data corresponding to the domain identifier M 100 2 is described as being overwritten, it is described that additional data is added to the existing encrypted backup data. As long as data partition or backup processing time is added, new encrypted backup data M 1 00 1 to which the same additional data is added may be additionally stored without being overwritten.
- the terminal device 300 acquires data held by other terminal devices 300 belonging to the same domain, and encrypts the acquired data based on the acquired data. Generate backup data.
- terminal 300 holds data DA, DB, DC, and the other end If the terminal device 300 holds the data DB, DC, DD, the terminal device 300 acquires the data DB, DC, DD from the other terminal device 300 and Generate encrypted database upload data for DB, DC, DD. Alternatively, the terminal device 300 generates encrypted backup data of overlapping data DB and DC between data acquired from another terminal device 300 and data held by itself.
- data duplicates means that the content identifiers corresponding to each license are the same. Then, when a plurality of licenses overlap, that is, the content identifiers corresponding to the plurality of licenses are the same, the terminal device 200 may use any license as backup data.
- the terminal device 300 can use a predetermined control rule. Select one of the licenses as backup data according to.
- the predetermined control rules mentioned above are, for example, (1) ⁇ ⁇ Selecting a license advantageous to the user under the usage conditions, or (2) selecting an license advantageous to the business operator.
- such a control rule is set to the terminal device 300 at the time of shipment of the terminal device 300 or is set to the terminal device 300 by transmission from the server of the provider.
- the terminal device 300 stores the generated encrypted backup data in different network storages 200 according to the data type. That is, the data protection system S includes a plurality of network storages 200 having different security levels, and the terminal device 300 divides the license, which is the backup data, into the usage conditions and the content key. When encryption is performed, encrypted backup data indicating usage conditions is stored in the low security level network tray 200, and encrypted backup data indicating the content key is networked on the high security level. Store in storage 2 0 0. Also, the terminal device 300 may divide one encrypted backup data regardless of the data type, and distribute and store it in a plurality of network stripes. If encrypted backup data is distributed and stored in this way, it is impossible to restore the original backup data if any one of the distributed data can not be acquired. .
- the terminal device 300 duplicates that data by the number of domains, and corresponds each backup data to each domain. Encrypt with domain key to generate multiple encrypted backup data.
- the terminal device 300 copies the data only one, and the backup data is transmitted to any one of the plurality of domains. Encrypt with one domain key corresponding to one domain, one encrypted backup data It may be generated. In such a case, the terminal device 300 identifies a domain corresponding to the user operation from among a plurality of domains, or identifies a domain based on control from the domain management server 100, and the domain The domain key corresponding to is used for the above encryption.
- the usage condition is encrypted with the domain key and the content key is encrypted with the public key of the domain management server 100
- the content reference of the usage condition can be freely made if the terminal device in the domain is 300.
- the content key needs to be protected because the data itself needs to be encrypted, but the usage conditions are considered to be the operation J, which is not falsified. In that case, it is used during backup processing.
- the condition is not encryption but may be a signature as a method of falsification detection
- the key to be signed is a secret key of public key cryptosystem set for each domain, or every terminal device 300 Secret key of the public key cryptosystem set in the The secret key of the public key cryptosystem set in the finn management server 100 is assumed.
- Figure 14 shows the communication message M 700 (backup data acquisition request message) sent by the terminal device 300 to acquire the encrypted backup data stored in the network storage 200. It is a figure which shows the structure of message main body M702.
- this message body M702 is configured as a message data acquisition request message body M1200, and the message data acquisition request message body M12 0 0 consists of domain identifier M 1 2 0 1
- Figure 15 shows the communication message M 700 (backup data transmission message) in which the network storage 2 0 0 replies to the terminal 3 0 0 in response to an acquisition request from the terminal 3 0 0 It is a figure which shows the structure of main body M702.
- this message body M702 is configured as a backup data transmission message body M1300, and this backup data transmission message body M1300 is an encrypted message.
- Backup data It consists of M 1 3 0 1 and a domain identifier M 1 3 0 2.
- FIG. 16 is a flow chart showing reference processing.
- the terminal device 300 starts reference processing of the contents of the encrypted backup data stored in the network storage 200 according to the backup data content reference instruction to the user's terminal application. That is, the terminal application that has received the content reference instruction from the user gives the content reference instruction to the back-up data reference unit 305.
- the user inputs the domain identifier corresponding to the encrypted backup data to be referred to.
- the backup data reference unit 305 generates the above-mentioned backup data acquisition request message and transmits it to the network storage unit 200 via the communication unit 301 (step S 215).
- the domain identifier M 1 2 0 1 contained in the backup data acquisition request message body M 1 2 0 0 is a domain identifier corresponding to the encrypted backup data to be subjected to content reference.
- the network storage unit 200 receives the backup data acquisition request message through the communication unit 201 (step S 21 120).
- Data acquisition ⁇ The storage unit 202 extracts the domain identifier Ml 2 0 1 from the backup data acquisition request message body M 120 0, and the data management table D 5 0 of the data storage unit 21 1 Search domain identifier M 1 2 0 1 from 0.
- the data acquisition 'storage unit 202' is a stored data which is encrypted backup data of the domain corresponding to the domain identifier M1201. Identify and obtain the tag D 502 (step S 2 1 2 2). If encrypted backup data of the domain corresponding to domain identifier M 1201 does not exist, data acquisition ⁇ Storage unit 202 indicates that the encrypted backup data does not exist. Sends the communication message M 7 0 0 (reply message) contained in 0 2 to the terminal device 3 0 0.
- the data acquisition unit 2 02 stores a message including the stored data D 5 0 2, which is the encrypted backup data, and the domain identifier M 1 2 0 1 Add message header M701 to the message body M702 to create a communication message M700 (backup data transmission message), and send the terminal device 3 through the communication unit 201 Send to 0 0 (Step S 2 1 2 3).
- the backup data reference unit 3 0 5 receives the backup data transmission message through the communication unit 3 0 1 (step S 2 1 3 2).
- the additional data reference unit 3 0 5 extracts the domain identifier M 1 3 0 2 from the backup data transmission message, and the domain key storage unit 3 1 1 uses the domain identifier M 1 3 0 2 as a key. Identify the domain key and get it.
- the network storage 200 may not include the domain identifier M1302 in the backup data transmission message body M1300.
- the terminal device 300 temporarily stores the domain identifier M 1 2 0 1 included in the backup data acquisition request message, and corresponds to the stored domain identifier 1 2 0 1 Identify the domain key from the domain key storage unit 3 1 1 and acquire it.
- the terminal device 300 acquires the domain key according to the process flow of domain key acquisition described above.
- Backup data reference section 3 0 5 is encrypted backup data M 1 3 0 1 and the domain key are encrypted.
- ⁇ Decryption unit 3 0 6 is sent.
- the encryption and decryption unit 306 decrypts the received encrypted backup data M 1 0 3 1 (step S 2 1 3 3), and the decrypted backup data is sent to the backup data reference unit 3 0 Send to 5
- the backup data reference unit 305 presents the user with the contents of the data that the user wishes to refer among the received backup data (step S 215).
- the content that the user wants to confirm is the license usage condition.
- the user may input information specifying the data to be referred to, and the terminal device 300 may change the data content presented to the user according to the information.
- the terminal device 300 Display the contents to inform the user.
- the terminal device 300 When additional data indicating the above-mentioned reference-only data is added to the encrypted backup data stored in the network storage 200, the terminal device 300 reads the contents of the reference data. Display and let users know. If the encrypted backup data is a license and the reference-dedicated data is a use condition, the terminal device 300 does not require decryption processing when referring to the use condition, so the process can be simplified. This reference-only data is used for reference only and is not used for restoration processing. In addition, when the encrypted backup data is signed, the terminal device 300 performs tampering detection by signature verification, and displays the contents of the encrypted backup data only when it is not tampered with. You may make them known.
- the terminal device The process of acquiring the encrypted backup data from the network strain database 300 and presenting the contents to the user has been described. Next, a process when the terminal device 300 restores the encrypted backup data stored in the network storage 200 will be described with reference to the drawings.
- the data structure of the communication message related to the process at the time of data restoration is the same as the data structure of the communication message at the time of content reference mentioned above.
- Figure 17 is a flow chart showing restoration processing of encrypted backup data.
- the terminal device 300 starts restoration processing of the encrypted backup data stored in the network storage 200 according to the data restoration instruction to the user's terminal application. That is, the terminal application that has received the data recovery instruction from the user issues a data recovery instruction to the data recovery unit 304.
- the user inputs the domain identifier corresponding to the encrypted backup data to be restored.
- step S 2 2 1 to S 2 2 3, and step S 2 2 2 2 2 1 to step S 2 2 2 3) are the processing of the backup data reference unit 3 0 5 when referring to the above-mentioned backup data (step S 2 1 3 to step S 2 1 3 3 of FIG. Since the process is the same as step S 2 1 2 1 to step S 2 1 2 3), the description is omitted.
- the data recovery unit 304 associates the decoded backup data with the domain identifier M 1 0 3 0 2 and stores it in the data storage unit 3 1 2 (step S 2 2 3 4).
- the data restoration unit 304 deletes the original data corresponding to the same domain identifier as the backup data.
- the original data may be deleted in advance before starting the restoration process.
- the data restoring unit 304 may delete only the duplicate original data.
- the terminal apparatus 300 may perform the following processing.
- the terminal device 300 performs processing according to the contents indicated by the additional data.
- the terminal device 300 obtains the encrypted backup data to which the additional data is added from the network storage range 200, and the additional data indicates Recovery expiration date Check. When the terminal device 300 determines that the current date and time has passed the restoration expiration date, it does not restore the encrypted backup data, and the restoration expiration date has not passed. When determined, restore encrypted backup data.
- the terminal device 300 is added with additional data indicating the latest backup processing time from the encrypted backup data stored in the network storage unit 200. Select encrypted backup data, get the encrypted backup data and restore it. That is, when the terminal device 300 performs backup processing multiple times, the network storage 200 stores a plurality of encrypted backup data generated by the processing. Then, since the above-mentioned additional data is added to the encrypted backup data, the terminal device 300 performs a restoration process on the encrypted backup data which has been subjected to the backup process recently. is there. In addition, the terminal device 300 cancels the restoration process for encrypted backup data that has passed its restoration expiration date, with the restoration expiration date as the restoration expiration date with a fixed time added from the backup processing time. Also good.
- the terminal device 300 is added with the additional data indicating the latest data version from the encrypted backup data stored in the network tray 200.
- Select encrypted backup data get the encrypted backup data, and restore it.
- the network storage 200 may select the encrypted backup data according to a predetermined control rule. For example, if “select the latest encrypted backup data” is set to network tray 2 0 0 as the predetermined control rule, net storage 2 0 0 is Data version and backup process Select the latest encrypted backup data from time. Then, the network storage system 200 delivers the selected encrypted backup data to the terminal device 300.
- the terminal device 300 acquires encrypted backup data from the network storage 200, and then indicates the additional data added to the encrypted backup data.
- the cryptographic algorithm is identified from the cryptographic algorithm identifier. Then, the terminal device 300 performs restoration processing on the encrypted backup data according to the specified encryption algorithm.
- the terminal device 300 communicates with the other terminal device or server to encrypt the encryption algorithm. An algorithm may be obtained.
- the terminal device 300 obtains the encrypted backup data from the network connection database 200, and then adds the additional data added to the encrypted pack-up data. Identify the terminal device from the terminal identifier indicated by. If the specified terminal device is not itself, the terminal device 300 inquires the specified terminal device whether or not the acquired encrypted backup data may be restored. Here, when permission for restoration is obtained from another terminal device, the terminal device 300 performs restoration processing for the encrypted backup data, and when permission is not obtained, restoration processing for the encrypted backup data is performed. Cancel
- the terminal device 300 manages the list in which the terminal identifiers of the terminal devices for which restoration is permitted are registered, in order to determine whether or not to allow another terminal device for restoration. doing. That is, the other terminal device is the terminal device 300 When making an inquiry for restoration to other terminals, the other terminals notify their own terminal identifiers. Then, the terminal device 300 that has received the notification searches for the terminal identifier indicated by the notification from the above list, and if the terminal identifier exists in the list, the terminal device that has made the inquiry is referred to For the restoration, if the terminal identifier is not found in the list, the terminal device making the inquiry is not permitted to restore.
- the terminal device 300 has the terminal identifier in the list, if the terminal device having the terminal identifier has already been permitted to restore the predetermined number of times, the terminal device 300 is not permitted to the terminal device. You do not have to allow restoration.
- the terminal device 300 obtains the encrypted backup data from the network fax database 200, and then the additional data added to the encrypted backup data. Identify the server from the server identifier indicated by. The terminal device 300 inquires the identified server whether or not the acquired encrypted backup data may be restored. Here, when the server permits the restoration, the terminal device 300 executes the restoration process for the encrypted backup data, and when the permission is not obtained, the restoration process for the encrypted backup data is performed. Discontinue. In addition, the terminal device 300 may inquire of the server in advance whether or not the encrypted backup data can be restored.
- the number of times the terminal device 300 or the user has permitted restoration so far (the number of times of data restoration) Manage That is, when the terminal device inquires of the server whether or not to restore the server, it notifies the server of its own terminal identifier. The server indicated in the notification If the inquired terminal device 300 or its user is specified from the identified terminal identifier, and the number of times of data restoration for the terminal device 300 or the user is equal to or less than a predetermined number of times, If the number of data restorations exceeds the predetermined number, the terminal device 300 is not permitted to restore. In the above description, the terminal device 300 inquires whether or not the server indicated by the additional data may be restored, but the server uniquely identified from the service or the terminal device 300 is unique. You may query the server specified in.
- data managed for each domain changes with time due to data acquisition or data consumption processing of the terminal device 300 included in the domain.
- the terminal device 300 communicates between the terminal devices 300 contained in the domain and performs integrity check of the data held as the domain. good. For example, after the terminal device 300a restores the encrypted backup data, if it is determined that the original data corresponding to the restored backup data is stored in the terminal device 300b, Check the integrity of the backup data and the data of the terminal device 300 b. As a result of the check, if there is no consistency and the backup data is newer, the terminal device 300a leaves the backup data and discards the data of the terminal device 300b. If the data of the terminal device 300b is newer, the terminal device 300a leaves the data and discards the backup data.
- the terminal device 300a invalidates the backup data as described above since there is a high possibility that an unauthorized process has been performed.
- the terminal device 300a determines that there is no consistency, it determines that the illegal processing has been performed as described above, deletes the original data, and can not use the original data. You may perform processing such as.
- the terminal device 300a first restored the encrypted backup data in order to check the integrity, the integrity may be checked from additional data added to the encrypted backup data. If it can, the terminal device 300a first checks the integrity without restoring the encrypted backup data, and if there is no integrity, the restoration process is aborted. Also good.
- the terminal device 300 has accumulated the usage history of the license.
- the terminal device 300 reads The process of acquiring encrypted backup data from the fixed storage database 200 and restoring the encrypted backup data has been described.
- encryption / decryption of backup data is performed using a domain key that is a key of the common key cryptosystem set for each domain, but encryption / decryption is performed using a key such as the following May be
- Domain management server 100 generates a key pair of domain public key and domain private key.
- the terminal device 300 acquires and securely manages the domain secret key in the same manner as the domain key.
- the domain public key is published by the domain management server.
- backup data is encrypted with the domain public key at the time of backup, and encrypted backup data is decrypted with the domain secret key at the time of data restoration.
- the key used for encryption processing during backup is set for each domain so that data can be shared within the domain.
- the key used for encryption processing during backup is the terminal device It may be set every 3 0 0. In this case, only the terminal device 300 that has performed the encryption process can perform the restoration process of the encrypted backup data.
- a key of the common key cryptosystem or a key pair of the public key cryptosystem can be considered.
- the key acquisition method and the encryption and decryption method for backup data are the same as when keys are set for each domain.
- a key for encrypting backup data a key of the domain management server common key cryptosystem or a key pair of public key cryptosystem can be considered.
- the terminal device 300 holds the public key of the domain management server 100 and the domain key, and the terminal device 300 does not control the domain management server 100 to restore the encrypted backup data. If it is free to do so, the terminal device 300 encrypts the backup data with the domain key.
- the terminal device 300 is encrypted with the backup data using the domain management server 100 public key. It may be done.
- the terminal device 300 needs to request the domain management server 100 to decrypt encrypted backup data at the time of data restoration. That is, the domain management server 100 can control whether or not to recover encrypted pack-up data.
- the domain management server 100 may decide which key to use for encryption of backup data, or the terminal device 300 may decide.
- the terminal device 300 When the terminal device 300 according to this modification performs backup processing on data acquired from the data distribution server, restoration processing of encrypted backup data, and reference processing of encrypted backup data, etc. Perform processing according to the data type set in the data or encrypted backup data.
- the data type is set for each data by the data distribution server.
- the terminal device 300 acquires data in which the data type is set from the data distribution server, duplicates the data in which the data type is set, and generates backup data.
- the terminal device 300 when the terminal device 300 backs up data, Use an encryption key, an encryption method, or a signature method according to the data type of the data. That is, the terminal device 300 switches the encryption key according to the data type.
- the terminal device 300 identifies the level of security and privacy protection required from the data type, and according to the identified level, a plurality of encryption keys, encryption methods, and You may combine and use the signature method.
- the terminal device 300 specifies the type (additional data type) such as the data purge of the above-mentioned additional data or the packing processing time from the data type set in the data.
- the additional data of the specified additional data type is added to the encrypted backup data.
- the terminal device 300 determines whether or not the backup data can be restored from the data type set in the encrypted backup data. The terminal device 300 performs restoration processing when it is determined that restoration is possible, and cancels restoration processing when it is determined that restoration is not possible.
- the terminal device 300 when the terminal device 300 performs backup data reference processing, it is set to the encrypted backup data from among the contents of the additional data added to the encrypted backup data. Select the content corresponding to the data type. Then, the terminal device 300 acquires and displays the selected contents (for example, usage conditions).
- the network storage 200 stores encrypted backup data from the terminal device 300 in order to store the encrypted backup data from the terminal device 300 in a limited storage capacity.
- the encrypted backup data already stored for example, the oldest Backup backup data.
- the network storage 200 is configured to store the encrypted pack-up data stored therein based on the request from the terminal 300.
- the network storage system 200 deletes the encrypted backup data according to the content of the additional data. Do. That is, when the additional data indicates the restoration expiration date, the network storage system 200 determines whether the current date and time has passed the additional data restoration expiration date. Then, if the restoration expiration date has passed, the network storage 200 deletes the encrypted backup data corresponding to the additional data.
- the network stripe 200 periodically deletes the stored encrypted backup data in order from, for example, the oldest one.
- the terminal device 300 controls the backup processing, the restoration processing, the data reference processing, etc. based on the control information distributed from the domain management server 100 or the data distribution server. Do.
- control information indicating the type of encryption key, encryption method, or signature method is distributed to the terminal device 300 for backup processing
- the terminal device 300 performs backup according to the type.
- control information indicating the type of additional data such as data purge / back-up processing time
- the terminal device 300 is configured to encrypt encrypted backup data. Adds additional data according to the additional data type to.
- control information indicating the longest or shortest type of restoration expiration time is distributed to the terminal device 300 for backup processing.
- the terminal device 300 is enabled to restore the type (longest or shortest) indicated by the control information among the restoration expiration dates given to each license. Add additional data to indicate the deadline.
- the terminal device 300 transmits the additional data added to the encrypted backup data.
- the additional data type indicated by the control information is specified from the included data version, packing processing time, restoration expiration date, etc. For example, if the specified additional data type is the restoration expiration date, the terminal device 300 determines whether the current date and time has passed the restoration expiration date. Then, when the restoration expiration date has passed, the terminal device 300 determines that the encrypted backup data can not be restored.
- control information indicating a type such as usage conditions and restoration expiration date for data reference processing
- the terminal device 300 transmits the reference data thereof. Display the contents such as usage conditions and restoration expiration date corresponding to the type.
- the domain management server 100 or data distribution server has a control information list for generating such control information.
- FIG. 18 is a content display diagram showing the contents of the control information list.
- Such control information list C d 1 includes processing types such as backup processing and restoration processing, items that need to be included in control information such as control unit and control target for each processing type, and each item The data content for and is recorded.
- FIG. 19 is a data configuration diagram showing a data configuration of control information.
- Control information C i 1 is a process consisting of a control unit, process type and control content And separate control information.
- the domain management server 100 or the data distribution server stores, for example, a terminal identifier of a predetermined terminal device 300 as a control unit when controlling backup processing for each terminal device 300.
- the backup process is stored as the process type, and the control object, the cryptographic algorithm type, the signature method, the process type, and the additional data type are stored as the control content.
- the domain management server 100 or data distribution server stores “condition of use” as the control target, stores “DES” as the encryption algorithm type, and stores “no signature” as the signature method.
- control information C i 1 When performing backup processing, encrypt only the terms of use included in the license with “DES” to generate encrypted backup data, and add additional data indicating the restoration expiration date to the encrypted backup data. Also, in the control information C i 1, an edit enable / disable flag is stored for each item such as the control target and the encryption algorithm type. The edit enable / disable flag indicates whether the edit is possible based on the operation of the user of the terminal device 300.
- the domain management server 100 or data distribution server controls the restoration process for each terminal device 300, for example, stores the terminal identifier of the terminal device as a control unit, and Stores the number of possible times J, etc., stores information such as "3 times J" as the possibility judgment information according to the number of possible restoration times, and stores "no complementary data” as the complementary data type, and "request destination” as the complement request destination Store “None”.
- the terminal device 300 having acquired such control information C i 1 specifies the number of recoverable times of the encrypted backup data, and the specified number of times is the above-mentioned “3. If it is less than If it is "3 times" or more, the process ends without performing restoration.
- the user may input the control information C i 1 as described above to the terminal device 300.
- the control information C i 1 indicates the use condition as the reference data type
- the terminal device 300 displays the use condition of the encrypted backup data at the time of data reference processing.
- the encrypted backup data is transmitted and stored in the network storage 200, it may be stored in an external storage medium directly connected to the terminal device 300.
- network restoration may limit license restoration or renew licenses based on the contents of the license, which is encrypted backup data, during restoration processing.
- Network Storage 200 will not transmit the license whose term of validity has expired to the terminal device 300, or the contents of the terms of use. Change and send to terminal device 300. Also, if there are multiple licenses for encrypted backup data, and some licenses have expired, then Network Storage 200 is only for those licenses that have expired. The above processing may be performed, or the above processing may be performed on all the licenses.
- FIG. 20 is a configuration diagram showing a configuration of a data protection system according to a second embodiment of the present invention.
- the data protection system of this embodiment comprises the components of the data protection system S shown in FIG. 1 and a data supplement server 400.
- Detailed configurations of the domain management server 100, the network storage 200, and the terminal device 300 are the same as in the first embodiment, and thus the description thereof is omitted.
- the detailed configuration of the data interpolation server 400 having a different configuration from that of the first embodiment will be described. Since all of the terminal devices 3 0 0 a to 3 0 0 c have the same configuration as in the first embodiment, any one of the terminal devices 3 0 0 a to 3 0 0 c is a terminal. It is shown in Fig. 20 as the device 300.
- the terminal device 300 When backing up data, the terminal device 300 according to the present embodiment deletes a part of the backup data according to the content of the data, and encrypts the remaining backup data. That is, even if the terminal device 300 simply decrypts the encrypted pack-up data, the encrypted backup data is not restored to the original data.
- the data supplement server 400 receives from the terminal device 300 the backup data obtained by decrypting the encrypted backup data, and supplements the information missing from the backup data. To restore the original data. Then, the data supplement server 400 transmits the restored data to the terminal device 300.
- the data complement server 400 manages a domain identifier, a content identifier and usage conditions, and a content identifier and content key, and based on the data restoration request from the terminal device 300 , And distributes the restored data to the terminal devices 3 0 0 a to 3 0 0 c through the transmission path N.
- data is restored from the decoding process and the complementing process.
- the data supplement server 400 delivers data to the terminal device 300 It is considered to be the same as the data distribution server performed.
- the data supplement server 400 has a use condition storage unit 4 1 1 for storing use conditions, a content key storage unit 4 1 2 for storing content keys, and a communication unit 4 0 1 for communicating with a terminal device 300. And a data complementing unit 402 that acquires data from the usage condition storage unit 41 1 and content key storage unit 42 2, complements the data, and generates restored data.
- the use condition storage unit 41 is a database having a use condition management table for managing use conditions, and the use condition management table is an association between information for identifying the use conditions and the use conditions. Indicates
- FIG. 21 shows the contents of the above-mentioned usage condition management table.
- the use condition storage unit 4 1 1 has a use condition management table D 1 5 0 0 shown in FIG. 2 1 and includes a domain identifier D 1 5 0 1 and a content identifier D as information for identifying the use conditions. It manages 1502 as well as the term of validity D1253 of the license as a condition of use and the number of times of content availability D1504.
- the usage condition management table D 1 500 has a domain identifier D 1 5 0 1 “domain ID D 0 0 0 1 J and a content identifier D 1 5 0 2
- the usage condition with the term “ID – 0 0 0 1 J” is the term “valid period D 1 5 0 3 is valid up to 0 2 0 0 3 Z 3 1” and the number of available times D 1 5 0 4 Ka Indicates that it is "10 times".
- the content key storage unit 4 1 2 is a database having a content key management table for managing content keys, and the content keys
- the management table indicates the association between the content identifier and the content key.
- FIG. 22 is a diagram showing the contents of the above-mentioned content key management table.
- the content key storage unit 42 1 has a content key management tape D 1 600 shown in FIG. 22 and manages the content identifier D 1 6 0 1 and the content key D 1 6 0 2.
- the content key management table D 1 6 0 0 has the content key D 1 6 0 2 of the content corresponding to the content identifier D 1 6 0 1 of r CONTENT— ID ⁇ 0 0 0 1 J ONTENT-Indicates that KEY-0 0 0 1 J.
- the first embodiment has described a method of backing up by encrypting or signing both the use condition and the content key that constitute the license that is the data to be backed up.
- a method will be described in which only one of the usage conditions and the content key constituting a license is backed up, and data is restored using the data supplement server 400 during restoration processing.
- the data structure of communication message M 700 related to backup processing is the same as that of communication message M 700 related to backup processing of the first embodiment, and thus the description thereof is omitted.
- FIG. 23 is a flow chart showing backup processing.
- the terminal device 300 starts backup processing of the data held by the terminal device 300 according to the backup instruction to the user's terminal application. That is, the terminal application that has received a backup instruction from the user issues a backup instruction to the backup processing unit 303.
- the user inputs data to be subjected to packing object data restriction.
- the backup processing unit 303 identifies data to be backed up, that is, a license group, from the data stored in the data storage unit 32 based on the backup target data restriction information, and copies it. By doing this, backup data is generated (step S 2 3 1).
- the backup processing unit 303 securely deletes the content key of each license from the backup data (step S 2 33 2).
- to securely delete content key is to delete the content key data without being intercepted by a third party.
- the backup processing unit 303 associates the content identifier corresponding to each license included therein with the backup data from which the content key has been deleted.
- the backup processing unit 303 executes steps S2333 to S2336 using the backup data generated in this way, and First, the processing of steps S 2 3 1 to S 2 3 5 5 is performed.
- step S2333 to step S2336 processing from backup processing unit 303 to obtain domain key until backup target data is backed up (step S2333 to step S2336), and network processing
- the process performed by the 0 0 0 is the process described in the backup process of the first embodiment (step S 2 0 3 2 to step 2 in FIG. The description is omitted because it is the same as S 2 0 3 5 and step S 2 0 2 1 to step S 2 0 2 5).
- the terminal device 300 duplicates and encrypts data as described above and backs up to the network storage 200
- additional data is added to the encrypted backup data as in the first embodiment.
- the additional data in the present modification may be a complement server identifier for identifying the data complement server 400 in addition to the restoration expiration date and the like.
- the user issues a backup instruction, and the terminal device 300 deletes the content key from the license group backup data and stores the encrypted backup data encrypted in the network storage 200.
- the process of Next a process when the terminal device 300 restores data using the encrypted backup data stored in the network storage 200 will be described with reference to the drawings.
- Figure 24 shows the communication message M 700 sent when the terminal device 300 requests the data complement server 400 to supplement the data. (The figure shows the data structure of the message body M702 of the original request message)
- the message body M720 is configured as a data restoration request message body M1700, and this data restoration request message body M1700 Is composed of one or more restoration data M 1 70 1 to M 1 7 0 3.
- Each of the restoration data M 1 7 0 1 to M 1 7 0 3 consists of usage conditions M 1 7 1 1 and a content identifier M 1 7 1 2.
- Figure 25 shows the data structure of the message body of the communication message M 7 0 0 (decompression data transmission message) sent from the data supplement server 400 to the terminal device 3 0 0. It is.
- the message body M 720 is configured as a restored data transmission message body M 1 800, and this restored data transmission message body M 1 800 is , One or more restored data M 1 8 0 1 to M 1 0 3.
- Each restoration data M 1 8 0 “! To M 1 8 0 3 consists of usage conditions M 1 8 1 1 and a content identifier M 1 8 1 2.
- FIG. 26 is a flow chart showing data restoration processing.
- Steps S 2 4 3 1 to S 2 4 3 3 and S 2 4 2 1 to S 2 4 2 3) are the processes shown in FIG. 2 2 of the first embodiment (Step S 2 2 3 1 to step S 2 2 3 3 and step S 2 2 2 1 to step S 2 2 2 3), and therefore the description will be omitted.
- the data recovery unit 304 generates the above-described data recovery request message, and transmits the message to the data complement server 400 via the communication unit 301 (step S2344).
- the use condition M 1 7 1 1 included in the data restoration request message body M 1 7 0 0 is the use condition of the decrypted backup data
- the content identifier M 1 7 1 2 is This is a content identifier associated with the usage condition in the backup data.
- the data supplement server 400 receives the data restoration request message through the communication unit 401 (step S 2401).
- the data complementing unit 402 extracts the content identifier M 1 1 1 2 of the data M 1 7 0 1 for restoration from the data restoration request message, and the content key storage unit 4 1 2 Identify content key D 1 0 2 0 2 with content identifier M 1 1 2 2 as key and acquire it. Then, the data complement unit 402 generates restored data M “! 80 1 from the usage condition M 1 7 1 1 and the content key D 1 6 0 2, that is, by complementing the content key
- the above data restoration process is repeated for each of the restoration data M 1 7 0 1 to restore the data (step S 2 4 4 2).
- a data transmission message is generated and transmitted to the terminal device 300 through the communication unit 401 (step S 2 4 4 3)
- Restoration data transmission message body M 1 8 0 0 Containing restoration data M 1 8 0 1 is the data restored in step S 2 4 2.
- the data recovery unit 3 0 4 transmits the recovered data via the communication unit 3 0 1. Receive the message (step S 2 4 3 5).
- the data restoration unit 304 extracts the restoration data from the restoration data transmission message, and associates the data with the domain identifier M 1 3 0 2 contained in the knock-up data transmission message body M 1 3 0 0 Store in storage unit 3 1 2 (Step S 2 4 3 6).
- the terminal device 300 transmits the use condition and the content identifier to the data interpolation server 400 and the data interpolation server 400 restores the data.
- 0 may transmit only the content identifier to the data supplement server 400 to obtain the corresponding content key, and the data restoration unit 304 of the terminal device 300 may perform data restoration, ⁇ Modification of restoration processing: additional data>
- the terminal device 300 when additional data is added to the encrypted backup data, the terminal device 300 according to the present modification is processed according to the content indicated by the additional data. I do.
- the terminal device 300 requests the data complementary server 400 indicated by the complementary server identifier to restore the data.
- the terminal device 300 of the present embodiment displays the content of the encrypted backup data, and when additional data is added to the encrypted backup data, Display the contents of the additional data. For example, when the additional data indicates a complementary server identifier, the complementary server identifier or the name of the data complementary server 400 corresponding to the complementary server identifier is displayed.
- the terminal apparatus 300 is based on the control information distributed from the domain management server 100 or the data distribution server. Perform control such as reference processing.
- the terminal device 300 complements the data according to the control information. Determine if it is possible to request 400. As a result, if the terminal device 300 determines that it can not make a request, it does not make the request, but if it makes a determination that it can make a request, it requests the data complement server 400 to complete the data. .
- the terminal device 300 includes the pack-up processing for data acquired from the data distribution server, the restoration processing of the encrypted backup data, and the backup data.
- processing is performed according to the data type set in the data or pack-up data.
- the terminal device 300 uses an encryption key, an encryption method, or a signature method according to the data type of the data.
- the terminal device 300 identifies the level of security and privacy protection required from the data type, and according to the identified level, a plurality of encryption keys, encryption methods, and signature methods are specified. It may be used in combination.
- the terminal device 300 when restoring the encrypted backup data, the terminal device 300 starts with the data type set in the encrypted backup data. It is determined whether the data can be restored. When it is determined that the terminal device 300 can be restored, the terminal device 300 performs restoration processing, and when it is determined that restoration can not be performed, the terminal device 300 cancels the restoration processing.
- the terminal device 300 when requesting the data supplement server 400 to supplement data, the terminal device 300 first determines whether the request can be made according to the data type of the backup data. As a result, if the terminal device 300 determines that it can not make a request, it does not make the request, but if it makes a determination that it can make a request, it makes a data complement request to the data complement server 400.
- the data supplement server 400 may update the license, which restricts the restoration of data, based on the contents of the license which is the encrypted pack-up data at the time of data restoration. For example, the data supplement server 400 does not supplement the data of the license whose validity period has expired when the data usage condition of the license has expired, and the data of the terminal device is not completed. Send to 3 0 0. Alternatively, the data supplement server 400 may not transmit the restored backup data to the terminal device 300 or may change the contents of the use conditions and transmit it to the terminal device 300. In addition, if there are multiple licenses as backup data and some licenses have expired, the data complement server 400 will be against the licenses for which some of them have expired. Only the above process may be performed, or the above process may be performed for all licenses.
- encrypted backup data is transmitted to and stored in the network storage unit 200, it may be stored in an external storage medium directly connected to the terminal unit 300.
- the content key is deleted, but the usage conditions may be deleted.
- the encrypted content key is stored as encrypted backup data in the Internet connection database 200, and at the time of data restoration, the data complement server 400 uses the content key as its content key. Complement the condition.
- the data supplement server 400 in order to restore data, the data supplement server 400 must hold a use condition management table D1 500 in which information for specifying the use condition is associated with the content key.
- this usage condition management table D 1 500 is used instead of the combination of the domain identifier D 1 5 0 1 and the content identifier D 1 5 0 2 of the usage condition management tape D 1 5 0 0 described in FIG. And hold information to identify usage conditions.
- the terminal device can restore the data backed up by suppressing the dependency on the server device while preventing the restoration of the encrypted and backed up data from being performed illegally. It is suitable for terminal devices such as data distribution systems that handle it.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04707320.0A EP1603044B1 (en) | 2003-02-07 | 2004-02-02 | Terminal device and data protection system using the same |
CA002502605A CA2502605A1 (en) | 2003-02-07 | 2004-02-02 | Terminal device and data protection system using the same |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003-030841 | 2003-02-07 | ||
JP2003030841 | 2003-02-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004070612A1 true WO2004070612A1 (ja) | 2004-08-19 |
Family
ID=32844277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/001011 WO2004070612A1 (ja) | 2003-02-07 | 2004-02-02 | 端末装置及びそれを備えたデータ保護システム |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1603044B1 (ja) |
KR (1) | KR20050101163A (ja) |
CN (1) | CN100481031C (ja) |
CA (1) | CA2502605A1 (ja) |
WO (1) | WO2004070612A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006115364A1 (en) * | 2005-04-25 | 2006-11-02 | Samsung Electronics Co., Ltd. | Method and apparatus for managing digital content |
WO2006115362A1 (en) * | 2005-04-25 | 2006-11-02 | Samsung Electronics Co., Ltd. | Domain management method and apparatus |
KR100739779B1 (ko) | 2005-12-23 | 2007-07-13 | 삼성전자주식회사 | 디지털 컨텐츠의 관리 방법 및 이를 위한 장치 |
US8161296B2 (en) | 2005-04-25 | 2012-04-17 | Samsung Electronics Co., Ltd. | Method and apparatus for managing digital content |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007034487A (ja) | 2005-07-25 | 2007-02-08 | Canon Inc | 情報処理装置及びその制御方法、コンピュータプログラム |
JP5117748B2 (ja) | 2007-03-29 | 2013-01-16 | 株式会社日立製作所 | 暗号化機能を備えたストレージ仮想化装置 |
RU2452007C2 (ru) * | 2007-08-17 | 2012-05-27 | Фраунхофер-Гезелльшафт цур Фёрдерунг дер ангевандтен | Устройство и способ резервирования объектов прав |
JP4919944B2 (ja) | 2007-12-10 | 2012-04-18 | 富士通株式会社 | 情報処理装置及びライセンス配信システム |
CN101257681B (zh) * | 2008-03-26 | 2011-05-18 | 宇龙计算机通信科技(深圳)有限公司 | 私密数据保护装置、移动终端、私密数据存储及读取方法 |
EP2476077B1 (en) * | 2009-09-11 | 2018-03-28 | Koninklijke Philips N.V. | Method and system for restoring domain management |
CN103020536A (zh) * | 2012-12-20 | 2013-04-03 | 曙光云计算技术有限公司 | 一种终端设备 |
JP6645225B2 (ja) | 2016-02-04 | 2020-02-14 | 株式会社デンソー | データ保全装置 |
CN106325775B (zh) * | 2016-08-24 | 2019-03-22 | 北京中科开迪软件有限公司 | 一种数据冗余/加密的光存储硬件设备和方法 |
DE112017007431T5 (de) * | 2017-04-14 | 2020-01-09 | Mitsubishi Electric Corporation | Schlüsselverwaltungssystem, Kommunikationsvorrichtung und Schlüsselteilungsverfahren |
CN107295069B (zh) * | 2017-05-27 | 2020-06-02 | Oppo广东移动通信有限公司 | 数据备份方法、装置、存储介质及服务器 |
CN115001673A (zh) * | 2022-05-23 | 2022-09-02 | 孔雪曼 | 基于统一多域标识的密钥处理方法、装置及系统 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05347616A (ja) * | 1992-06-15 | 1993-12-27 | Hitachi Ltd | グループ暗号通信方法およびグループ暗号通信システム |
JPH08263438A (ja) * | 1994-11-23 | 1996-10-11 | Xerox Corp | ディジタルワークの配給及び使用制御システム並びにディジタルワークへのアクセス制御方法 |
JPH11239127A (ja) * | 1998-02-19 | 1999-08-31 | Kodo Ido Tsushin Security Gijutsu Kenkyusho:Kk | グループ暗号通信装置 |
JP2002351747A (ja) * | 2001-05-30 | 2002-12-06 | Hitachi Ltd | ストレージシステムにおけるストレージ内データのバックアップ管理方法およびこの管理方法を実施する手段を備えたストレージシステム |
JP2002351722A (ja) * | 2001-05-29 | 2002-12-06 | Pro Saido Kk | データ貸金庫システム |
JP2002366438A (ja) * | 2001-06-11 | 2002-12-20 | Sharp Corp | ディジタル情報提供取得システムおよびディジタル情報配信方法 |
JP2002366913A (ja) * | 2001-06-05 | 2002-12-20 | Dainippon Printing Co Ltd | Icカード及びicカードプログラム |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5940507A (en) * | 1997-02-11 | 1999-08-17 | Connected Corporation | Secure file archive through encryption key management |
FI19991811A (fi) * | 1999-08-25 | 2001-02-26 | Nokia Networks Oy | Menetelmä ja järjestelmä varmuuskopiointiin |
US7096268B1 (en) * | 1999-09-01 | 2006-08-22 | Matsushita Electric Industrial Co., Ltd. | Copyrighted data processing method and apparatus |
CN100414864C (zh) * | 2000-03-09 | 2008-08-27 | 松下电器产业株式会社 | 具有编辑装置和记录媒体的音频数据重放管理系统及方法 |
WO2003009112A1 (en) * | 2001-07-17 | 2003-01-30 | Matsushita Electric Industrial Co., Ltd. | Content usage device and network system, and license information acquisition method |
-
2004
- 2004-02-02 KR KR1020057011851A patent/KR20050101163A/ko not_active Application Discontinuation
- 2004-02-02 WO PCT/JP2004/001011 patent/WO2004070612A1/ja active Application Filing
- 2004-02-02 EP EP04707320.0A patent/EP1603044B1/en not_active Expired - Lifetime
- 2004-02-02 CN CNB200480003734XA patent/CN100481031C/zh not_active Expired - Lifetime
- 2004-02-02 CA CA002502605A patent/CA2502605A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05347616A (ja) * | 1992-06-15 | 1993-12-27 | Hitachi Ltd | グループ暗号通信方法およびグループ暗号通信システム |
JPH08263438A (ja) * | 1994-11-23 | 1996-10-11 | Xerox Corp | ディジタルワークの配給及び使用制御システム並びにディジタルワークへのアクセス制御方法 |
JPH11239127A (ja) * | 1998-02-19 | 1999-08-31 | Kodo Ido Tsushin Security Gijutsu Kenkyusho:Kk | グループ暗号通信装置 |
JP2002351722A (ja) * | 2001-05-29 | 2002-12-06 | Pro Saido Kk | データ貸金庫システム |
JP2002351747A (ja) * | 2001-05-30 | 2002-12-06 | Hitachi Ltd | ストレージシステムにおけるストレージ内データのバックアップ管理方法およびこの管理方法を実施する手段を備えたストレージシステム |
JP2002366913A (ja) * | 2001-06-05 | 2002-12-20 | Dainippon Printing Co Ltd | Icカード及びicカードプログラム |
JP2002366438A (ja) * | 2001-06-11 | 2002-12-20 | Sharp Corp | ディジタル情報提供取得システムおよびディジタル情報配信方法 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006115364A1 (en) * | 2005-04-25 | 2006-11-02 | Samsung Electronics Co., Ltd. | Method and apparatus for managing digital content |
WO2006115362A1 (en) * | 2005-04-25 | 2006-11-02 | Samsung Electronics Co., Ltd. | Domain management method and apparatus |
CN101167070B (zh) * | 2005-04-25 | 2010-05-19 | 三星电子株式会社 | 域管理的方法和设备 |
US8161296B2 (en) | 2005-04-25 | 2012-04-17 | Samsung Electronics Co., Ltd. | Method and apparatus for managing digital content |
KR100739779B1 (ko) | 2005-12-23 | 2007-07-13 | 삼성전자주식회사 | 디지털 컨텐츠의 관리 방법 및 이를 위한 장치 |
Also Published As
Publication number | Publication date |
---|---|
CA2502605A1 (en) | 2004-08-19 |
KR20050101163A (ko) | 2005-10-20 |
EP1603044A1 (en) | 2005-12-07 |
CN100481031C (zh) | 2009-04-22 |
CN1748206A (zh) | 2006-03-15 |
EP1603044B1 (en) | 2016-05-04 |
EP1603044A4 (en) | 2013-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10769252B2 (en) | Method and apparatus for watermarking of digital content, method for extracting information | |
US20190272513A1 (en) | Use of media storage structure with multiple pieces of content in a content-distribution system | |
JP4663992B2 (ja) | 端末装置及びそれを備えたデータ保護システム | |
US8099369B2 (en) | Method and system for securing content in media systems | |
US6118874A (en) | Encrypted data recovery method using split storage key and system thereof | |
JP4976492B2 (ja) | ライセンスをバックアップおよび復元するための方法とシステム | |
JP3625983B2 (ja) | データ管理システム | |
CN1650559B (zh) | 用于内容的受控复制和移动的系统和方法 | |
US20060149683A1 (en) | User terminal for receiving license | |
US20060031175A1 (en) | Multiple party content distribution system and method with rights management features | |
WO2004070612A1 (ja) | 端末装置及びそれを備えたデータ保護システム | |
US8595492B2 (en) | On-demand protection and authorization of playback of media assets | |
JP5204553B2 (ja) | グループ従属端末、グループ管理端末、サーバ、鍵更新システム及びその鍵更新方法 | |
KR20050086552A (ko) | 복제가 제어되는 저장 디바이스를 위한 기록 시스템 및방법 | |
CN110352413A (zh) | 一种基于策略的实时数据文件访问控制方法与系统 | |
CN1745393B (zh) | 一种终端装置、服务器装置、数字内容分发系统及事项处理方法 | |
EP4028923A1 (en) | Method and system for securely sharing a digital file | |
JP2004185500A (ja) | データ保護制御装置及びデータバックアップ装置及びデータバックアップシステム | |
JP4473556B2 (ja) | 記録再生装置 | |
WO2023119554A1 (ja) | 制御方法、情報処理装置および制御プログラム | |
JP4125454B2 (ja) | オブジェクト連携装置 | |
WO2001001223A1 (en) | Two-layer encryption of databases | |
JPH07162410A (ja) | ディジタル情報複製装置 | |
JP2006164014A (ja) | 特典サービス付のコンテンツ配信システム | |
AU2005226064A1 (en) | Digital license sharing system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004707320 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2502605 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020057011851 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1817/CHENP/2005 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004803734X Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 1020057011851 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2004707320 Country of ref document: EP |