WO2004082202A1 - コンテンツの不正利用を防止することのできるコンテンツ記録装置 - Google Patents
コンテンツの不正利用を防止することのできるコンテンツ記録装置 Download PDFInfo
- Publication number
- WO2004082202A1 WO2004082202A1 PCT/JP2004/002910 JP2004002910W WO2004082202A1 WO 2004082202 A1 WO2004082202 A1 WO 2004082202A1 JP 2004002910 W JP2004002910 W JP 2004002910W WO 2004082202 A1 WO2004082202 A1 WO 2004082202A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- identifier
- key
- encrypted
- storage medium
- Prior art date
Links
- 238000003860 storage Methods 0.000 claims description 186
- 238000000034 method Methods 0.000 claims description 121
- 238000000926 separation method Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 description 97
- 238000010586 diagram Methods 0.000 description 17
- 238000004891 communication Methods 0.000 description 16
- 230000006870 function Effects 0.000 description 11
- 238000006243 chemical reaction Methods 0.000 description 8
- 238000004364 calculation method Methods 0.000 description 4
- WCUXLLCKKVVCTQ-UHFFFAOYSA-M Potassium chloride Chemical compound [Cl-].[K+] WCUXLLCKKVVCTQ-UHFFFAOYSA-M 0.000 description 3
- 238000007796 conventional method Methods 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 3
- 238000003672 processing method Methods 0.000 description 3
- 230000005236 sound signal Effects 0.000 description 2
- 239000002131 composite material Substances 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- Content recording device capable of preventing illegal use of content
- the present invention relates to a content recording device, a content using device, a content recording method, a content using method, a content recording program product, and a content using program product.
- the present invention relates to a content recording device capable of preventing illegal use of content, and content use.
- the present invention relates to an apparatus, a content recording method, a content using method, a content recording program product, and a content using program product.
- recording media such as CD-ROMs (Compact Disc-Read Only Memory) and DVDs (Digital Video Discs) on which content has been recorded have been purchased, and downloaded to recording media from terminals installed at stations and other stations.
- content utilization devices that can use content data such as music, images, videos, and e-books by downloading or acquiring them from a server and reproducing them. Examples of such a content utilization device include a portable information terminal, a mobile phone or a portable player, or a computer having a playback program / playback device.
- these content use devices are provided with a slot connector for connecting an external storage device, and the content data recorded in the storage device in the content use device can be moved to the external storage device and copied.
- a slot connector for connecting an external storage device, and the content data recorded in the storage device in the content use device can be moved to the external storage device and copied.
- the copied content data can be freely reproduced on any content using device. This often involves copyright issues with the content. Therefore, when moving or copying content data stored in another storage device from the storage device where the content is recorded, unauthorized use is prevented. Therefore, there is a case where the content data is associated with this ID in advance by using the ID of the recording medium, and the association with the content data is checked by using the ID of the recording medium at the time of use. . As a result, the ID of the storage device changes when it is moved or copied to another storage device, and the content associated with the original ID cannot be played. A specific example of such a method will be described with reference to FIG.
- content recording device 11 including content server 10 storing the content receives a request for distribution of the content stored in content server 10. This request may be made in a manner determined by the content distributor or in a manner desired by the user. Further, the content server 10 may be outside the recording device 11 and connected to the content recording device 11. Upon receiving the request, the content recording device 11 acquires the requested specific content from the content server 10 and records it on the media A (12) or the media B (13), which is an external recording device.
- each of the media A (1 2) and the media B (13) has a unique rewritable ID (unique ID).
- the content recording device 11 acquires a specific content from the content server 10, associates the specific content with the ID unique to each media, and stores them in the media A (1 2) and the media B (1 3), respectively.
- the content is encrypted with the unique IDs of the media A (1 2) and the media B (13).
- the content distributor distributes these media A (12) and media B (13) to users.
- the user plays the content stored in the media A (12) and the media B (13) using the content using device.
- the content use device may be a dedicated device or a device whose functions are realized by software incorporated in a general-purpose computer. Furthermore, the content utilization device has an input device for acquiring data from the media. By inserting a media into this input device, data can be obtained from the media.
- the input device of the content use device 14 (shown in FIG. Suppose that media A (1 2) is connected. At this time, the content use device 14 reads the content data stored in the media A (1 2) and the unique ID of the media A (1 2) with the media A (1 2) attached, and Can be decrypted using the unique ID of media A (1 2), and the content can be played back. Similarly, the content using device 16 can read the content data and the unique ID of the media B (13) from the inserted media B (13) and reproduce the content.
- the content use device 15 shown in FIG. 10 inserts the medium A (12) into the input device, and temporarily stores the content data in the internal storage 18 of the content use device 15. At this time, the content data stored in the storage device 18 remains encrypted. Then, the content use device 15 receives the media A (1
- this content data is encrypted using the unique ID of the media A (1 2). Since the unique ID of A (1 2) cannot be obtained, the encrypted content data cannot be decrypted.
- the content use device 17 shown in FIG. 10 copies the content data stored in the media B (13) to the media C (19), and copies this media C (19). It shall be inserted into the input device and reproduced.
- the content using device 17 since the content data stored in the media C (19) is encrypted by the unique ID of the media B (13), the content using device 17 uses the media B (1
- encryption can be considered as one of the methods to associate the ID with the content.
- an external storage medium such as a recording medium has an ID
- the content data is encrypted using the ID of the external storage medium, and the content is transmitted from the external storage medium.
- Read data When importing, there is a method of decrypting the content data using the ID of the external storage medium.
- the above-described encryption processing and decryption processing are performed outside the external storage medium. Normally, a dedicated reading device or writing device is used, and the decoding function is built in, for example, a portable player.
- any playback device having a built-in decryption function can play back the content data written on the external storage medium.
- the ID of the external storage medium is different. It cannot be decoded and played back correctly.
- the conventional technique for associating the ID with the content as described above has the following first problem. That is, the first problem will be described with reference to FIG.
- FIG. 11 is a diagram showing a flow of processing when content is encrypted using a unique ID in the content storage device and the content is decrypted by the content use device.
- arrows indicate data flows, and triangles indicate encryption or decryption processing.
- the content storage device encrypts content Co using a media-specific ID. That is, when the content is stored in the media 1 (media ID: M1), the content storage device encrypts the content Co using the media ID (Ml) as a key, and calculates the encrypted content El (Co, Ml). .
- Encrypted content E 1 (Co, Ml) must be content data that has been encrypted with encryption method E 1 using data (media ID) Ml as an encryption key for data (content) Co Is shown.
- the content use device decrypts the encrypted content E 1 (Co, Ml) read from the media 1 using the media ID (Ml) as a decryption key to obtain the content Co.
- the content storage device When saving content Co to media 2 (media ID: M2) Then, the content storage device performs the above-described encryption processing as in the case of storing the content in the medium 1 (media ID: M1), and calculates the encrypted content El (Co, M2). Similarly, each time the content storage device saves the content on the media, the content storage device performs an encryption process on the content using the media ID of the media.
- a content recording device employing a conventional method as disclosed in Japanese Patent Application Laid-Open No. 2000-243026 requires that when recording content on a storage medium, the content must be encrypted for each storage medium. There's a problem. In general, the content size is large, so when distributing large amounts of data, this processing time cannot be ignored.
- a method of sharing a key for encrypting contents and encrypting and distributing the encryption key using a unique ID of a medium may be considered. This method will be described with reference to FIGS.
- the content (Co) is previously encrypted using the content key (Kc) corresponding to the content, and the encrypted content E 2 (Co, Kc) is calculated. Then, the content server stores the content key Kc and the encrypted content E 2 (Co, Kc) in association with each other.
- the content creator Kc at this time may be arbitrarily determined by the content creator, but usually uses data having a data size much smaller than the data size of the content Co.
- the content recording device obtains the unique ID (Ml) of the medium 1, and encrypts the content key Kc using the unique ID (Ml) of the medium. Furthermore, when recording the content key Kc, the content recording device calculates an encrypted content key E 3 (Kc, Ml).
- the content recording device encrypts the content key Kc using the unique ID (M2) of the media 2 and further encrypts the encrypted content E 3 (Kc , M2).
- the processing when media 1 is played back on the content utilization device is as shown in Fig.13. That is, referring to FIG. 13, the content using apparatus obtains the unique ID (Ml) of the medium 1 and the encrypted content key E 3 (Kc, Ml) from the medium 1, and obtains the unique ID (l ) To encrypt the content key E 3 (K c, Ml). Thereby, the content key Kc can be obtained. Further, the content use device obtains the content E2 (Co, Kc) from the media 1 and decrypts the encrypted content E2 (Co, Kc) using the content key Kc. This makes it possible to acquire and play back the content Co.
- the content recording apparatus performs only the content key Kc with a small data size on the content recording apparatus, and the time for encrypting the content Co with the large data size is not required. It is possible to solve the first problem described above.
- FIG. 14 shows a conventional example in which a plurality of contents are recorded on a medium in a content recording device and the content is reproduced on a content using device by the same method as that described in FIGS. 12 and 13. .
- the content recording device records the encrypted content 1 E 2 (Col, Kcl) recorded on the content server on the medium 1. Further, the content recording device obtains the unique ID (Ml) of the medium 1 and encrypts the content key Kc 1 using the unique ID (Ml) of the media 1 to calculate the encrypted content key 1 E 3 Record (Kc l, Ml) on the media.
- the encryption method E3 used here is not necessarily a secret method, and may use a known method. Therefore, if the media ID (Ml) is leaked, there is a problem that all other encrypted content keys recorded on the same recording medium, Media 1, may be decrypted. Also, media-specific IDs are not always secure and can be analyzed. In other words, there is a problem that if the encryption method E3 is known, there is a possibility that the content key can be obtained illegally.
- the present invention has been made in view of such a problem, and a content recording device, a content using device, a content recording method, a content using method, and a content recording device capable of effectively preventing illegal use of content.
- the purpose is to provide program products and content utilization program products. Disclosure of the invention
- a content recording device includes: an identifier acquiring unit that acquires, from a storage medium, an unrewritable identifier unique to the storage medium; and an identifier unique to the acquired storage medium. And a content identifier unique to the content and a personalization key generation unit for generating a personalization key, and encrypting the content key used for encrypting the content using the generated personalization key.
- An encrypted content key generation unit that generates an encrypted content key, a content that is at least partially encrypted using the content key, a content identifier, and the generated encrypted content key are stored.
- a data recording unit for recording on a medium is stored.
- a content recording device encrypts content.
- the content key used for the encryption is encrypted using a content identifier unique to the content, and the encrypted content key generation unit that generates the encrypted content key is combined with the generated encrypted content key and the content identifier.
- a data combining unit for creating combined data an identifier acquiring unit for acquiring a non-rewritable identifier unique to the storage medium from the storage medium, and encrypting the created combined data using an identifier unique to the acquired storage medium.
- an encrypted combined data generating unit is an encrypted combined data generating unit.
- a content using device for encrypting, from a storage medium, encrypted content recorded on a storage medium, a content identifier unique to the content, and content.
- Data acquisition unit for acquiring the encrypted content key as a content key
- an identifier acquisition unit for acquiring a non-rewritable identifier unique to the storage medium from the storage medium, and an identifier unique to the acquired storage medium
- a personalization key generation unit that generates a personalization key from the obtained content identifier, and an encrypted content chain decryption unit that decrypts the obtained encrypted content key using the generated personalization key.
- a content decryption unit that decrypts the obtained encrypted content using the decrypted content key.
- a content use device includes: a storage medium; an encrypted content recorded on a storage medium; and a content key used for encrypting the content.
- a data acquisition unit that acquires encrypted combined data in which an encrypted content key and a content identifier unique to the content are combined, and an identifier that acquires a non-rewritable identifier unique to the storage medium from the storage medium
- a combined data acquisition unit that decrypts the acquired combined data using the identifier unique to the acquired storage medium to generate combined data, and an encrypted data that is encrypted from the generated combined data.
- a data separating unit that obtains the content key and the content identifier, and the obtained encrypted content key is obtained by using the obtained content identifier. It comprises an encrypted content key decryption unit for decrypting, and a content decryption unit for decrypting the acquired encrypted content using the decrypted content key.
- a content recording method is a content recording method of recording content on a storage medium having a non-rewritable unique identifier, and an identifier obtaining step of obtaining an identifier from the storage medium.
- Encrypting and generating an encrypted content key for generating an encrypted content key storing the content at least partially encrypted using the content key; a content identifier; and the generated encrypted content key.
- a content recording method is a content recording method for recording content on a storage medium having a unique identifier that cannot be rewritten, and the content recording method used for encrypting the content.
- An encrypted content key generation step for generating an encrypted content key by encrypting the content using a content identifier unique to the content, and combining the generated encrypted content key and the content identifier to generate combined data
- an identifier acquiring step of acquiring an identifier unique to the storage medium from the storage medium, and an encrypted combined data generating step of encrypting the generated combined data using the acquired identifier unique to the storage medium.
- a method of using content is a method of using content recorded on a storage medium having a non-rewritable unique identifier, wherein the content is recorded from the storage medium to the storage medium.
- a data acquisition step for acquiring the encrypted content, a content identifier unique to the content, and a content key used for encrypting the content and encrypted, and a storage medium Obtaining an identifier unique to the storage medium from the following: an individualization key generation step of generating an individualization key from the obtained identifier unique to the storage medium and the obtained content identifier; and the obtained encryption And an encrypted content key decryption step for decrypting the encrypted content key using the generated personalization key. And a content decryption step of decrypting the encrypted content using the decrypted content key.
- a method of using content is a method of using content recorded on a storage medium having a non-rewritable unique identifier, wherein the content is recorded from the storage medium to the storage medium.
- a data acquisition step for acquiring encrypted content data which is a content key used to decrypt the content, wherein the encrypted content key is combined with a content identifier unique to the content; Acquiring an identifier unique to the storage medium from the storage medium; and decrypting the encrypted combined data acquired using the acquired identifier unique to the storage medium to generate combined data.
- Data acquisition step a data separation step for acquiring an encrypted content key and a content identifier from the generated combined data, and a decryption of the acquired encrypted content key using the acquired content identifier.
- a content recording program product is a program product for causing a computer to execute a content recording method of recording content on a storage medium having a unique identifier that cannot be rewritten.
- An identifier acquiring step for acquiring an identifier; an identifier unique to the acquired storage medium; and a content identifier unique to the content; a personalization key generating step for generating an individualization key; Encrypting the used content key by using the generated personalization key, and generating an encrypted content key by generating an encrypted content key; and The content, the content identifier, and the generated encrypted content key are recorded on the storage medium.
- a data recording step to be performed.
- a content recording program product is a program product for causing a computer to execute a content recording method of recording content on a storage medium having a unique identifier that is not rewritable.
- Encrypting the content key used to perform the encryption using a content identifier unique to the content and combining the generated encrypted content key and the content identifier with an encrypted content key generating step of generating an encrypted content key.
- a content using program product is a program product for causing a computer to execute a content using method of using content recorded on a storage medium having a unique identifier that cannot be rewritten.
- Encryption key generation step and the obtained encrypted content key And encryption Konten' key decryption step for decrypting with the key, the acquired ⁇ Goka content, to execute the content decryption step of decrypting using the decrypted content key.
- a content using program product is a program product for causing a computer to execute a content using method of using content recorded on a storage medium having a unique identifier that cannot be rewritten. From the medium, the encrypted content recorded on the storage medium, the content key used to encrypt the content, and the encrypted content key combined with the content identifier unique to the content A data acquisition step of acquiring the encrypted composite data, an identifier acquisition step of acquiring an identifier unique to the storage medium from the storage medium, and an encrypted acquisition acquired using the identifier unique to the acquired storage medium.
- FIGS. 1A and 1B show a specific example of the configuration of the content recording device 301 and a specific example of the configuration of the content using device 314 according to the first embodiment of the present invention. It is a block diagram.
- FIG. 2 is a diagram showing a specific example of another mode of the content recording device 310.
- FIG. 3 is a block diagram showing a specific example of a hardware configuration of the content use device 3 14.
- FIG. 4 is a diagram showing a specific example of the appearance of the data utilization device 3 14.
- FIG. 5 is a diagram showing a flow of data when the content recording device 301 and the content using device 314 according to the first embodiment perform encryption processing and decryption processing.
- FIGS. 6A and 6B are block diagrams showing specific examples of the configuration of the content recording device 500 and the content using device 506 according to the second embodiment of the present invention.
- FIG. 7A and FIG. 7B are diagrams showing specific examples of data before combination and combination data.
- FIG. 8 is a diagram showing a data flow when the content recording device 500 in the second embodiment performs an encryption process.
- FIG. 9 is a diagram showing a flow of data when a decoding process is performed by the content using device 506 in the second embodiment.
- FIG. 10 is a diagram showing a specific example of a conventional method for preventing unauthorized use of content.
- FIG. 11 is a diagram showing a data flow when encrypting and decrypting content in a conventional content recording device and a conventional content using device.
- FIG. 12 is a diagram showing a data flow when performing a cryptographic process in a conventional content recording apparatus.
- FIG. 13 is a diagram showing a data flow when decryption processing is performed by a conventional content using apparatus.
- FIG. 14 is a diagram showing the flow of data when the content is encrypted and decrypted by the conventional content recording device and content using device.
- FIGS. 1A and 1B show a specific example of the configuration of a content recording device 301 for preventing unauthorized use of content and the content usage device 3 14 according to the first embodiment of the present invention. It is a block diagram showing a specific example of a configuration.
- the content recording device 301 in the present embodiment is a device for recording the content stored in the recording device 302 on a removable recording medium 310, and FIG. 1A and FIG. This indicates that the content recorded on the recording medium 310 is to be used in the content use device 314.
- “recording” is a process of writing data to a recording medium.
- data is moved outside a content recording device (for example, to a network destination or an external storage device) or copied. And the like.
- “Usage” refers to the process of reading and writing data. For example, referencing, playing, and executing data, and moving or copying data outside the data utilization device (for example, to a network destination or external storage device). Is included.
- Removable means that the data-using device and the ID information device can be physically integrated or separated, but basically, ID information can be read. Is the criterion for “removal”.
- a content recording device 301 includes a storage device 302, a media identifier reading unit 300, an individualized key generation unit 300, and a content key encryption unit 310. And a recording processing unit 309.
- the content managed by the content recording device 301 is encrypted using a content key 304 determined in advance for each content, and the storage device 302 has a content identifier for identifying the content. 3 0 3 Content key 3 4 And encrypted content 305, which is encrypted content, is stored as one set.
- the content managed by the content recording device 301 can be any type of data.
- the main data to be targeted are data that we want to prevent unauthorized use, that is, data with copyright, etc., and charged data.
- data such as music, images, moving images, and e-books, or programs that can be executed in a content-using device are applicable.
- encryption refers to the conversion of ordinary unencrypted data (plaintext) in accordance with prescribed rules, and data (ciphertext) that as it is unknown to a third party is unknown. ).
- decryption process that can restore the ciphertext to the original plaintext according to a predetermined rule (which may not be the same as the first rule).
- a predetermined rule which may not be the same as the first rule.
- Common encryption methods include DES (Data Encryption Standard) and AES (Advanced Encryption Standard), and public key encryption methods include RSA encryption and E1gama1 ⁇ .
- the key method is not limited, and any of these methods may be used.
- the description will be made using common key encryption.
- the above-mentioned content key 304 is arbitrary data that can be used in the encryption method, and is data that is assigned one each time encryption is performed.
- the content key 304 is 64 bits long data.
- the content key 304 may be data that can calculate a key used in the encryption method by a predetermined conversion process.
- the encrypted content 304 is a content generated using the content key 304.
- This encrypted content 3 05 does not need to be encrypted as a whole, and is encrypted to such an extent that it is not used in the content use device 3 14 without the content 3 304. Just fine.
- the “encryption” may be performed using hardware such as an encryption chip, or may be performed by software.
- the above-mentioned content identifier 303 is data for identifying the content. This data is determined by the content creator at the time of content creation, and is data that can uniquely determine the content.
- the data type of the content identifier 303 may be a character string, a number, or binary data, and the type is not limited as long as the data can uniquely determine the content. Also, even if the creator does not decide, it may be decided automatically using the time when the content is created. Further, in FIG. 1A, the content identifier 303 is not included in the encrypted content 305, but the content identifier 303 is not encrypted in the encrypted content 305. It may be embedded in the region.
- the content recording device 301 includes a device (not shown) such as an interface connected to an external storage device (hereinafter referred to as a medium 5) 310 to input / output data to / from the media 310. .
- a device such as an interface connected to an external storage device (hereinafter referred to as a medium 5) 310 to input / output data to / from the media 310.
- Any storage medium can be used as the medium 310 described above.
- FD Flexible Disk
- CD Compact Disc
- CD — R CD-Recordable
- DVD Digital Video Disc
- MD Mini Disc
- Compact Flash R
- SmartMedia R
- a memory card such as a multimedia card (R), and a removable hard disk.
- the method of connecting the media 310 to the content recording device 301 includes a method of physically connecting the media 310 by inserting the media 310 into the content recording device 301, for example, Alternatively, there is a method of performing communication by some communication means to establish communication connection independent of the content recording device 301. Note that if data can be read from the media 310 and it can be removed, the connection method between the media 310 and the content recording device 301 is not limited to the above-mentioned method. Contact type using wireless, non-contact type using wireless or electromagnetic waves, etc. It may be a continuation method.
- the medium 310 includes an area in which a non-rewritable medium identifier 311 is recorded in advance.
- the media identifier 311 recorded on the medium 310 is information indicating the identity of the medium 310, and generally includes data such as a unique value and a character string.
- This media identifier 311 is created at the time of manufacture, and generally no other media has the same identifier. Note that it is not guaranteed that the media identifier 3 1 1 will never be the same as the media identifier of other media, but the probability that the media identifier will be the same is very small, so there is almost no problem in practical use. In this case, it may be considered that the other media does not record the same media identifier 311 as the corresponding media 310. Specifically, when media identifiers 311 are dynamically generated individually on each media 310 without centrally managing the media identifiers, there may be cases where the above may be considered. .
- the media identifier reading unit 303 reads the media identifier 311 recorded on the medium 310 described above.
- some kind of communication procedure such as authentication processing may be required between the content recording device 301 and the medium 310.
- the media identifier 311 is decrypted and needs to be decrypted on the content recording device 301.
- the media identifier 311 obtained from the media 310 is not used as it is, and another identifier information is obtained based on the media identifier 311 obtained from the media 310. Also, the case where the generated identifier is used and the generated identifier is used is regarded as equivalent to the case where the media identifier 311 in the media 310 is used.
- the media identifier 311 of the media 310 is subjected to arithmetic processing such as a hash function, etc. There is a way to do that.
- the generation of the identifier may be performed not by the inside of the content recording device 301 but by an external device or the like.
- the media identifier 311 may be sent from the content recording device 301 to an external server to generate a new identifier on the external server, and the media identifier generated from the external server may be obtained. .
- the media identifier reading unit 303 reads out the read media identifiers 311 Pass it to the separate key generation unit 307.
- the personalization key generation unit 3007 uses the content identifier 303 recorded in the storage device 302 and the media identifier 310 received from the media identifier reading unit 303 to generate the personalization key. Generate The personalization key is data calculated from the content identifier 303 and the media identifier 311 by a predetermined method. For example, data obtained by encrypting the content identifier 303 with the media identifier 311 as a key can be considered. Then, the individualized key generation unit 307 passes the generated individualized key to the content key decoding unit 308.
- the content key encryption unit 308 encrypts the content key 304 recorded in the storage device 302 using the individualization key generated by the individualization key generation unit 307 as a key. And generates an individualized content key 3 1 2. Then, content key decoding section 308 passes generated personalized content key 312 to recording processing section 309.
- the recording processing unit 309 is configured to store the content identifier 300 stored in the recording device 302, the encrypted content 305, and the individualized content key 31 passed from the content key encryption unit 308. Save 2 to media 310.
- the content recording device 301 of the present embodiment stores the created encrypted content 300 in the storage device 302, and when recording the content on the medium 310, The encrypted content 3 05 is recorded as it is.
- the encryption processing time increases as the size of the data to be encrypted increases.
- the content is larger than the data size of the content identifier and the content key. Therefore, when recording the same content on a plurality of media, the content recording device 3 ⁇ 1 of the present embodiment can save time without encoding and recording the content many times as in the above-described conventional example. It does not take.
- the content key 304 is subjected to encryption processing in the content key encrypting section 308 every time it is recorded on the medium 310, but the data size of the content key 304 is changed. Since is very small compared to the data size of contents, the processing time for encryption can be ignored. Therefore, the content recording device 301 of the present embodiment can greatly reduce the processing time for recording content on the medium 310.
- the storage device 302 is provided inside the content recording device 301, but is not necessarily included in the content recording device 301. For example, a configuration as shown in FIG. That is, it includes a storage device 302 connected via a network and a plurality of content recording devices 310 A to 301 C (here, these are referred to as content recording devices 301).
- the storage device 302 can acquire the data read from the medium by the data input / output unit 320 of the content recording device 301 via the network. Further, the content stored in the storage device 302 can be recorded on a plurality of media via the network by the data input / output units 320 of the plurality of content recording devices 301. Thus, if there is one storage device 302, it becomes possible to record the content in a plurality of content recording devices 301. Even in such a case as shown in FIG. 2, the content recording device 301 and the storage device 302 are referred to as a “content recording device”.
- the content use device 3 14 includes a media identifier reading unit 303, an individualized key generation unit 300, a content key decryption unit 315, and a content decryption processing unit 3 1 6 and a reproduction processing unit 3 17. Furthermore, the content use device 3 14 is connected to the media 310 to input and output data to and from the media 310, and is a device such as an interface (not shown) similar to the device included in the content recording device 301. ). However, it is assumed that a plurality of content use devices 3 14 capable of reading the media identifier 3 11 from one medium 3 10 cannot exist at the same time.
- the media identifier reading unit 303 and the individualized key generation unit 307 included in the content use device 314 have the same functions as those included in the content recording device 301. That is, the media identifier reading unit 310 The key identifier 310 is read and passed to the individualized key generation unit 307.
- the individualized key generation unit 3007 In 01 Based on the media identifier 310 passed from the media identifier reading unit 303 and the content identifier 303 read from the media 310, the individualized key generation unit 3007 In 01, the same content of the same media 310 can generate the same personalization key as the generated personalization key. Then, the individualized key generation unit 307 passes the generated individualized key to the content key decryption unit 315. The content key decryption unit 315 decrypts the individualized content key 321 stored in the medium 310 using the individualized key passed from the individualized key generation unit 307 as a key. To generate the content ⁇ .
- decryption refers to processing for returning data converted by encryption processing to data before conversion using a key. Restoring the ⁇ ⁇ -processed data to the original data without using a key is a very difficult conversion method.
- the decryption method is determined in accordance with the encryption method, so that the content use device 314 uses the encryption method used in the content recording device 301.
- the encrypted data is decrypted using a decryption processing method corresponding to the processing method.
- Such a decoding process may be executed using hardware such as a decoding chip, or may be executed by software.
- the content key decryption unit 315 transfers the generated content key to the content decryption processing unit 316.
- the content decryption processing unit 316 decrypts the encrypted encrypted content 3105 stored in the medium 310 using the content key passed from the content key decryption unit 315.
- a decryption method a decryption method corresponding to the encryption method used when the content recording device 301 stores the content in the storage device 302 is used. Note that the decryption method may be the same as or different from the method by which the content key decryption section 315 decrypts the content key. Then, the content decryption processing unit 316 converts the decrypted encrypted content 305 into a reproduction processing unit.
- the reproduction processing unit 317 processes the decrypted content passed from the content decryption processing unit 316 according to the processing method determined by the content. Specifically, When the content is music data, the sound is reproduced by the speaker 23 (see Fig. 3), and when the content is image data, the image is displayed on the display 21 (see Fig. 3).
- FIG. 3 is a block diagram showing a specific example of a hardware configuration for making the respective sections 303 to 317 of the content utilization device 314 shown in FIG. 1B function.
- the content use devices 3 1 and 4 are connected to a CPU (Central Processing Unit) 20, a display 21, a keyboard 22, a speed 23 and a storage device 24, which are connected by a bus 29. It consists of external storage device 25, mouse 26, button 28, and communication device 27, and controls the entire device with COU 20
- the program executed by the CPU 20 is stored in the storage device 24, the external storage device 25, or a network destination via the communication device 27.
- the CPU 20 acquires the program stored in the storage device 24 and the like, and the display 21, the keyboard 22, the speaker 23, the storage device 24, and the external storage device 25 interconnected via the bus 29. Control data while exchanging data with the mouse 26, communication device 27, and button 28.
- the exchange of data between the CPU 20 and other units may be performed not only via the bus 29 but also via a communication cable or a wireless communication device such as a wireless communication device capable of transmitting and receiving data.
- the display 21 is usually realized in combination with a graphic chip, a VRAM (Video Random Access Memory) and the like. That is, the data on the VRAM is converted into a display signal, and the display signal is displayed on the display 21 as an image.
- the keyboard 22, the mouse 26, and the button 28 are means for inputting user instructions. That is, the keyboard 22 is configured to include a mechanical or electronic switch for detecting a pressed key.
- the mouse 26 is configured to include a mechanical or electronic switch for detecting a pressed state of a mouse button, and a mechanical or electronic sensor for detecting a relative vertical and horizontal movement distance of the mouse.
- the button 28 includes a mechanical or electronic switch or the like.
- the user's instruction input from these input means is passed to the CPU 20 via the bus 29 as an instruction signal.
- the input means included in the content use device 3 14 is not limited to these, but may be other various operation devices or microphones. It may be a voice input or the like.
- the storage device 24 usually includes a memory device such as a dynamic random access memory (DRAM) or a flash memory.
- DRAM dynamic random access memory
- the memory and the registers included in the CPU 20 may also be included in the storage device 24.
- the external storage device 25 is a hard disk drive (HDD) or a personal computer (PC).
- HDD hard disk drive
- PC personal computer
- a storage device or an external storage device attached to another network device wired or wirelessly connected to the CPU 20 via a network can be used as the external storage device 25.
- the communication device 27 is realized by a network interface card or the like, and exchanges data with another network device connected by wireless or wired communication.
- the speaker 23 interprets the audio data transmitted via the bus 29 or the like as an audio signal and outputs it as audio.
- the output voice can be a simple single-wavelength sound, or it can be complex, such as music or human voice. If the audio to be output is predetermined, the transmitted data may be a simple on / off operation control signal instead of an audio signal.
- FIG. 4 shows a specific example of the appearance of the above-described data utilization device 3 14.
- FIG. 4 shows a specific example of the appearance when the data use device 3 14 is a portable terminal, but the form of the data use device 3 14 is not limited to the form shown in FIG. However, as long as the device can use data, the device may be a computer, a dedicated player, a game device, a mobile phone, or another type of device such as a PDA (Personal Digital Assistants).
- PDA Personal Digital Assistants
- the data utilization device 3 14 is provided with a display unit 41, a speaker 44, a microphone 46, and a plurality of buttons 4 7, 4 for performing various operations in front of the main body 40. 8 will be deployed.
- An antenna 45 is provided above the main body 40.
- a memory card slot 43 to which a memory card 42 is connected is provided on a side surface of the main body 40.
- the function of the display unit 41 corresponds to the playback processing unit 317 shown in FIG. 1B and the like, and the hardware corresponds to the display 21 shown in FIG.
- a user interface screen corresponding to a user operation or a A usage screen (for example, video or image) is displayed.
- the memory card 42 corresponds to the media 310 shown in FIG. 1B, and the hardware corresponds to the external storage device 25 shown in FIG.
- the function of the speed power 4 4 corresponds to, for example, the reproduction processing unit 3 17 shown in FIG. 1B when using music data or the like, and the hardware is the speaker 2 3 shown in FIG. And so on.
- the microphone 46 is not shown in FIG. 1B or FIG. 3, but is usually used when the data use device 3 14 is a mobile phone and the telephone function of the data use device 3 14 is used. Function. In some cases, it may be a part of the recorded data utilization means as an operation instruction input means. For example, this is the case where voice recognition means is incorporated in the data use device 314 and is used for instructing a game.
- the hardware of the antenna 45 corresponds to the communication device 27 shown in FIG. Although an antenna is shown in FIG. 4 as a part of a communication device when the data using device 314 performs wireless communication, the data using device 314 may perform wired communication or the like.
- buttons 47, 48 on the front of the main unit 40 corresponds to the mouse 26, the button 28, and the keyboard 22 shown in FIG.
- Various instructions can be input by operating a button 47 or the like according to the content displayed on the display section 41.
- a menu screen can be displayed, and operations such as selecting a menu using the four-direction keys of buttons 47 can be performed.
- various input devices such as a joystick, a jog dial, and a tablet may be provided as a means for inputting an instruction.
- the data utilization device 314 is not limited to a dedicated device and may be a general-purpose device that also serves another purpose. For example, this corresponds to a case where a content usage program runs on a general personal computer or a mobile phone.
- This process is the encryption process shown on the left side of FIG.
- the content distributor saves content Co to be distributed in storage device 302 of content recording device 301.
- the content C o is encrypted with the content key K c and an encrypted content El (C o, K c) is generated (S 101).
- l (C o, Kc) represents the result of encrypting the content C o with the encryption method E 1 using the content key K c as a key.
- This process of encrypting the content C o may be performed by an encryption processing unit (not shown) of the content recording device 301, or may be performed by another encryption device, and the encrypted content E l (C o, Kc) may be input to the content recording device 301.
- the storage device 302 stores the encrypted content E 1 (Co, Kc).
- the media identifier reading unit 306 of the content recording device 301 acquires a media identifier Mid which is a unique ID of the media 310 in which the encrypted content El (Co, Kc) is to be recorded. (S103).
- the individualized key generation unit 307 of the content recording device 301 includes a content identifier Cid stored in the storage device 302 and a media identifier Mid acquired from the media 310 by the media identifier reading unit 306. Based on this, the individualized chain Km is calculated (S105).
- the calculation method of the personalization key Km in the personalization key generation unit 307 is a predetermined method. If the content identifier Cid and the media identifier Mid are determined, the personalization key Km is determined at will. Is the way. Also, the method of calculating the individualization key K m is such that if the value of the content identifier C id and the value of the media identifier M id change, the value of the individualization key Km also changes.
- the calculation method is such that the content identifier C id and the media identifier M id cannot be predicted.
- a method of encrypting the content identifier Cid with the media identifier Mid as a key can be considered.
- the content key encryption unit 308 performs an encryption process on the content key Kc used when creating the encrypted content using the personalization key Km as a key, and the personalization content key E 2 (Kc, Km ) Is calculated (S107).
- the encryption method E2 used here may be the same method as the encryption method E1 described above, or may be a different method.
- the recording processing unit 309 stores the content identifier C id, the encrypted content El (Co, Kc), and the individualized content key E 2 (Kc, Km) in the medium 310 (S109).
- This process is a decoding process shown on the right side of FIG.
- the media identifier acquisition unit 306 of the content use device 314 acquires the media identifier Mid of the connected medium 310 (S131).
- the individualized key generation unit 307 of the content using device 314 acquires the content identifier C id stored in the medium 310 (S133), and the media identifier M id acquired by the media identifier acquisition unit 306 and the content.
- An individualization key Km is generated based on the identifier Cid (S135).
- the processing here is the same as that of the individualization key generation unit 307 of the content recording device 301, and the same individualization key Km is generated from the same media identifier Mid and content identifier Cid. Is done.
- the content key decryption unit 315 obtains the individualized content key E 2 (Kc, Km) from the medium 310 (S 137), and uses the individualized key Km generated by the individualized key generation unit 3 ⁇ 7 as a key. To obtain the content key Kc (S139).
- the decryption process in the content key decryption unit 315 is a conversion process that undoes the encryption process. If the same key as the key used for the encryption process is used, the content key Kc can be obtained correctly, and the encryption process is performed. If a key different from the key used for the key is used, the result will be different, and the content key Kc cannot be obtained.
- the content decryption processing unit 316 acquires the encrypted content E 1 (Co, Kc) from the medium 310 (S 141), and decrypts the content with the content key decryption unit 315.
- the content Co is obtained by decrypting using the content key Kc obtained by the above (S144).
- the reproduction processing unit 317 can process and reproduce the content Co.
- the content recording device 301 and the content use device 314 in the first embodiment perform the above-described encryption processing and decryption processing, and are thus stored in the medium 310.
- the media identifier of the medium 310b Is different from the media identifier 311 unique to the media 310, the personalized key generated by the personalized key generation unit 307 of the content use device 3 This is a value Km2 different from the individualization key Km used when performing the encryption processing.
- the personalized content key 312 copied to the medium 310b is to be decrypted using the personalized key Km2 generated from the media identifier of the media 310b.
- the content key Kc used at the time of performing the encryption processing in the recording device 301 cannot be obtained. For this reason, even if another medium 310 b that has copied data stored in the medium 310 is connected to the content use device 3 14, it is stored in the media 310 on the content use device 3 14. Content C o cannot be obtained.
- the content key is encrypted using the identifier unique to the medium. Otherwise, the content cannot be decrypted correctly, and the use of content illegally copied to other media can be prohibited.
- FIGS. 6A and 6B show a specific example of the configuration of the content recording device 500 and a specific example of the configuration of the content using device 506 according to the second embodiment of the present invention. This is shown in the drawing.
- a content recording apparatus 500 includes a storage device 302, a content key encrypting unit 501, a combined data generating unit 502, and a media identifier reading unit 300. And a combined data encryption processing unit 503 and a recording processing unit 309.
- the storage device 302 described above is the same as that shown in FIG. 1A of the first embodiment, and includes a content identifier 303 for identifying the content, a content key 304, and an encryption key. Encrypted content 3 05 is stored as one set.
- the storage device 302 is not necessarily included in the content recording device 500 as in the first embodiment, but is provided outside the content recording device 500 and is connected to the content recording device 500.
- the recording device 500 may be configured to acquire data from an external storage device 302 via a network.
- the components of the content recording device 500 in the second embodiment shown in FIG. 6A the components of the content recording device 301 in the first embodiment shown in FIG.
- the media identifier reading unit 303 and the recording processing unit 310 assigned with the same symbols are the same as the components included in the content recording device 301 described above.
- the content key encryption unit 501 executes an encryption process on the content key 304 using the value calculated from the content identifier 303 as a key.
- the encryption method in the content key encryption unit 501 may be any method as long as it is the encryption method described in the first embodiment. That is, a method using the content identifier 303 as it is may be used, or a result calculated from the content identifier 303 by a predetermined method may be used as a key. Then, the content key encrypting unit 501 transfers the content key 304 obtained by the decoding to the combined data generating unit 502.
- the combined data generating unit 502 is configured to generate the combined data based on the encrypted content ⁇ passed from the content key encrypting unit 501 and the content identifier 300 stored in the storage device 302. Is calculated and generated.
- the combined data generated in the combined data generation unit 502 is data obtained by converting two data into one data by a predetermined calculation method, and further includes the combined data. There is a conversion method that returns data to the original two data. A specific example will be described with reference to FIGS. 7A and 7B.
- data A and data B shown in FIG. 7A are data before combining.
- the data A and the data B are converted into one data by a predetermined calculation method to obtain combined data.
- this combined data consists of adding the data size of each of data A and B to the beginning of the data with a fixed data length, followed by data A and data B. Can be considered.
- the combined data is data as shown in FIG. 7B
- the combined data may be any form of data that has been subjected to reversible conversion that can be restored to the original data.
- the combined data generating unit 502 passes the generated combined data to the combined data encryption processing unit 503.
- the combined data encryption processing unit 503 converts the combined data passed from the combined data generation unit 502 into the media identifier 311 of the medium 310 passed from the media identifier reading unit 303. Is used as a key, and the individualized combined data 505 is calculated. That is, the individualized combined data refers to data obtained by encrypting the combined data using the media identifier 311 as a key.
- the combined data generated by the combined data generation unit 502 is data generated from the content key and the content identifier, the data size is smaller than the data size of the content. Therefore, the time required to encrypt the combined data is shorter than the time required to encrypt the content. Then, the combined data No. processing unit 503 transfers the calculated individualized combined data 505 to the recording processing unit 309.
- the recording processing unit 309 stores the personalized combined data 505 passed from the combined data signal processing unit 503 and the encrypted content stored in the storage device 302 into a medium. Record in 3 10.
- the recording processing unit 309 may add the individualized combined data to the encrypted content and record it.
- the content device 506 includes a media identifier reading unit 303, a combined data decryption processing unit 507, a content key decryption unit 508, and a content decryption processing unit 316. And a reproduction processing unit 3 17.
- the media identifier reading unit 3006 is the same as that shown in FIG. 1A of the first embodiment, and acquires the media identifier 311 of the connected media 310. Also, among the content use devices 506 in the second embodiment shown in FIG. 6 6, the same symbols as those of the content use device 3 14 in the first embodiment shown in FIG. 1 ⁇ are used.
- the content decryption processing unit 316 and the reproduction processing unit 317 marked with are the same as the components included in the content use device 314 described above.
- the combined data decryption processing unit 507 obtains the individualized combined data 505 from the medium 310, and the medium identifier reading unit 306 decodes using the media identifier 311 obtained from the medium 310. And generate combined data.
- As the decryption method in the combined data decryption processing section 507 a method corresponding to the encryption method of the encryption processing in the combined data encryption processing section 503 of the content recording device 500 is used. Then, the combined data decryption processing unit 507 transfers the combined data generated by decryption to the content key decryption unit 508.
- the content key decryption unit 508 separates the encrypted content key and the content identifier 303 from the combined data passed from the combined data decryption processing unit 507, and converts the encrypted content key into the content identifier 300.
- the content key 3 104 is obtained by decrypting 3 with the key. Then, the content key decryption unit 508 passes the acquired content key 304 to the content decryption processing unit 316.
- the content decryption processing unit 316 reads the encrypted content 305 from the medium 310 and decrypts the encrypted content 305 using the content key 304 passed from the content key decryption unit 508. I do. Then, the content decryption processing unit 316 passes the decrypted content to the reproduction processing unit 317.
- the reproduction processing unit 317 reproduces the decrypted content passed from the content decryption processing unit 316. In the content decryption processing unit 3 16 If the content can be decrypted, the reproduction processing section 317 can reproduce the content correctly.
- This processing is the encryption processing shown in FIG.
- the content distributor saves content Co to be distributed in storage device 302 of content recording device 500.
- the content Co is encrypted with the content key Kc, and the encrypted content E 3 (Co, Kc) is generated (S301).
- the storage device 302 stores the encrypted content E 3 (Co, Kc).
- This encryption method E3 may be the same as the encryption method E1 described in the first embodiment.
- the content key encrypting unit 501 encrypts the content key Kc with the content identifier C id to generate an encrypted content chain E 4 (Kc, C id) (S303).
- the combined data generation unit 502 combines the content identifier C id and the encrypted content key E4 (Kc, C id) to generate the combined data E 4 (Kc, C id)
- the media identifier reading unit 306 acquires a media identifier Mid, which is a unique ID of the media 310 (S307).
- the combined data encryption processing unit 503 encrypts the combined data E 4 (Kc, C id) IIC id with the media identifier M id, and separates the combined data E 5 (E4 (K c, C id) IIC id, M id) is generated (S 309).
- the recording processing unit 309 stores the individualized combined data E 5 (E 4 (K c, C id) IIC id, M id) and the encrypted content E 3 (C o, Kc) in the medium 3 10. Save (S31 1).
- E 4 (K c, C id) IIC id, M id) and the encrypted content E 3 (C o, Kc) in the medium 3 10. Save (S31 1).
- This processing is the decoding processing shown in FIG.
- the media identifier obtaining unit 306 of the content using device 506 obtains the media identifier Mid of the connected medium 310 (S33.
- the stored individualized combined data E5 (E4 (Kc, Cid) IIC id, Mid) is acquired (S3333), and decrypted using the media identifier Mid acquired by the media identifier acquiring unit 306.
- the combined data E4 (Kc, Cid) IIC id is obtained (S335)
- the content key decryption unit 508 separates the combined data E4 (Kc, Cid) IIC id into respective data.
- the encrypted content key E4 (Kc, Cid) is obtained by processing the encrypted content key E4 (Kc, Cid) and the content identifier Cid (S337). Decryption processing is performed using the content identifier C id as a key to obtain a content key Kc (S 33 9).
- the content decryption processing unit 316 acquires the encrypted content E 3 (Co, Kc) from the medium 310 (S 341), and uses the content key Kc decrypted and acquired by the content key decryption unit 508.
- the content Co is obtained by decryption (S343).
- the reproduction processing unit 317 can process and reproduce the content Co.
- the above-described encryption processing and decryption processing are performed by the content recording device 500 and the content use device 506 in the second embodiment, so that other media 310 b in which data stored in the media 310 is copied. Is connected to the content using device 506 to play back the content copied to the medium 310b, since the media identifier of the medium 310b is different from the media identifier 311 unique to the medium 310, the combined data
- the combined data generated from the individualized combined data copied to the medium 310 b by the decryption processing unit 507 is the combined data E 4 generated by the combined data generation unit 502 of the content recording device 500.
- the content key Kc used when the content recording device 301 performs the encryption process is not generated, and Even if the other media 310 b on which the data stored in the media 310 is copied is connected to the content using device 3 14, the data stored in the media 310 in the content using device 3 14 is not stored. Content Co cannot be obtained.
- the content recording device can reduce the processing time when the content is encrypted and recorded on the medium using the identifier of the medium. Further, in the content using apparatus according to the present invention, when the encrypted content recorded on the recording medium is copied to another recording medium such as another storage device, the content used in the encryption of the content is restored. The content cannot be played back because the media identifier cannot be obtained correctly. For this reason, unauthorized use of the content by illegally copying it to other media becomes impossible. At the same time, the legitimate user does not lose the convenience of being able to carry the media and play back the content recorded on the media on a plurality of use devices.
- the content recording apparatus performs individualization using different keys for each content, even when a plurality of different contents are recorded in the same medium, even if the media identifier of the medium is leaked.
- the recorded content can be protected. Therefore, the reliability of the content can be improved.
- the encryption method and the decryption method performed by the above-described content recording device and content use device can be provided as a program.
- Such programs include the flexible disk, CD—ROM, R It can be recorded on computer-readable recording media such as OM, RAM (Random Access Memory) and memory card, and provided as a program product.
- the program can be provided by being recorded on a recording medium such as a hard disk built into a computer.
- the program can also be provided by downloading via a network.
- the provided program product is installed and executed in a program storage unit such as a hard disk.
- the program product includes the program itself and a recording medium on which the program is recorded.
- a content recording device As described above, according to the present invention, it is possible to prevent illegal use of content, and therefore, a content recording device, a content using device, a content recording method, a content using method, a content recording program product, and a content It can be applied advantageously to program products.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04717865A EP1612987A4 (en) | 2003-03-13 | 2004-03-05 | CONTENTS DEVICE WITH FUNCTION TO PREVENT UNAUTHORIZED CONTENT OF THE CONTENT |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003-068470 | 2003-03-13 | ||
JP2003068470A JP4201624B2 (ja) | 2003-03-13 | 2003-03-13 | コンテンツ記録装置、コンテンツ利用装置、コンテンツ記録方法、コンテンツ利用方法、コンテンツ記録プログラム、およびコンテンツ利用プログラム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004082202A1 true WO2004082202A1 (ja) | 2004-09-23 |
Family
ID=32984591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/002910 WO2004082202A1 (ja) | 2003-03-13 | 2004-03-05 | コンテンツの不正利用を防止することのできるコンテンツ記録装置 |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1612987A4 (ja) |
JP (1) | JP4201624B2 (ja) |
WO (1) | WO2004082202A1 (ja) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4383311B2 (ja) | 2004-10-13 | 2009-12-16 | パナソニック株式会社 | コンテンツ録画装置及びコンテンツ録画装置の制御方法並びにコンテンツ録画装置の記録プログラム |
JP2008016095A (ja) * | 2006-07-04 | 2008-01-24 | Sharp Corp | 通信システム、復号再生装置、記録装置、通信プログラム及び記録媒体 |
KR20090052199A (ko) * | 2007-11-20 | 2009-05-25 | 삼성전자주식회사 | 저장 장치, 상기 저장 장치를 이용하는 단말장치와 그 방법 |
JP2009211159A (ja) * | 2008-02-29 | 2009-09-17 | Brother Ind Ltd | 端末装置 |
JP5468555B2 (ja) | 2009-01-13 | 2014-04-09 | パナソニック株式会社 | 情報記録装置、情報再生装置及び情報記録媒体 |
JP5020399B1 (ja) | 2011-06-30 | 2012-09-05 | 楽天株式会社 | 情報処理装置、情報処理装置の制御方法、プログラム、及び情報記憶媒体 |
JP4932047B1 (ja) | 2011-06-30 | 2012-05-16 | 楽天株式会社 | コンテンツ又はアプリケーションの提供システム、コンテンツ又はアプリケーションの提供システムの制御方法、端末装置、端末装置の制御方法、認証装置、認証装置の制御方法、プログラム、及び情報記憶媒体 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09326166A (ja) * | 1996-06-06 | 1997-12-16 | Mitsubishi Electric Corp | 著作権保護方法及び著作権保護システム |
JPH1196675A (ja) * | 1997-09-24 | 1999-04-09 | Matsushita Electric Ind Co Ltd | デジタル記録媒体、デジタル記録媒体のデータ暗号化装置、データ復号化装置、データ暗号化復号化装置、その方法及びその方法を記録した記録媒体 |
JP2000113586A (ja) * | 1998-10-01 | 2000-04-21 | Victor Co Of Japan Ltd | 情報保護方法及び情報を保護するための情報記録媒体 |
JP2000243026A (ja) * | 1999-02-19 | 2000-09-08 | Nippon Telegr & Teleph Corp <Ntt> | 情報記録方法、利用方法および配送方法 |
JP2001222861A (ja) * | 2000-02-03 | 2001-08-17 | Sony Corp | データ記録方法及び装置、データ再生方法及び装置、並びにデータ記録再生システム |
JP2002196982A (ja) * | 2000-12-26 | 2002-07-12 | Toshiba Corp | 情報記録媒体、記録/再生装置及び方法 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000029928A1 (en) * | 1998-11-13 | 2000-05-25 | Iomega Corporation | System for keying protected electronic data to particular media using a compound key to prevent unauthorized copying |
US6683954B1 (en) * | 1999-10-23 | 2004-01-27 | Lockstream Corporation | Key encryption using a client-unique additional key for fraud prevention |
DE10000964A1 (de) * | 2000-01-12 | 2001-05-10 | Siemens Ag | Verfahren zur Verschlüsselung von Software, Verfahren zur Übermittlung von Software, Verfahren zur Entschlüsselung von Software und softwaregesteuertes Gerät |
-
2003
- 2003-03-13 JP JP2003068470A patent/JP4201624B2/ja not_active Expired - Lifetime
-
2004
- 2004-03-05 WO PCT/JP2004/002910 patent/WO2004082202A1/ja active Application Filing
- 2004-03-05 EP EP04717865A patent/EP1612987A4/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09326166A (ja) * | 1996-06-06 | 1997-12-16 | Mitsubishi Electric Corp | 著作権保護方法及び著作権保護システム |
JPH1196675A (ja) * | 1997-09-24 | 1999-04-09 | Matsushita Electric Ind Co Ltd | デジタル記録媒体、デジタル記録媒体のデータ暗号化装置、データ復号化装置、データ暗号化復号化装置、その方法及びその方法を記録した記録媒体 |
JP2000113586A (ja) * | 1998-10-01 | 2000-04-21 | Victor Co Of Japan Ltd | 情報保護方法及び情報を保護するための情報記録媒体 |
JP2000243026A (ja) * | 1999-02-19 | 2000-09-08 | Nippon Telegr & Teleph Corp <Ntt> | 情報記録方法、利用方法および配送方法 |
JP2001222861A (ja) * | 2000-02-03 | 2001-08-17 | Sony Corp | データ記録方法及び装置、データ再生方法及び装置、並びにデータ記録再生システム |
JP2002196982A (ja) * | 2000-12-26 | 2002-07-12 | Toshiba Corp | 情報記録媒体、記録/再生装置及び方法 |
Also Published As
Publication number | Publication date |
---|---|
JP4201624B2 (ja) | 2008-12-24 |
EP1612987A4 (en) | 2012-07-04 |
JP2004282238A (ja) | 2004-10-07 |
EP1612987A1 (en) | 2006-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4760101B2 (ja) | コンテンツ提供システム,コンテンツ再生装置,プログラム,およびコンテンツ再生方法 | |
US8301569B2 (en) | Content information providing system, content information providing server, content reproduction apparatus, content information providing method, content reproduction method and computer program | |
JP4986327B2 (ja) | ポータブル音楽プレーヤ用のコピー・セキュリティ | |
WO2013031124A1 (ja) | 端末装置、検証装置、鍵配信装置、コンテンツ再生方法、鍵配信方法及びコンピュータプログラム | |
US20030061519A1 (en) | Authentication communication apparatus and authentication communication system | |
WO2001056224A1 (fr) | Systeme d'authentification de dispositif de stockage | |
JP2000260121A (ja) | 情報再生装置および情報記録装置 | |
US20060235956A1 (en) | Information process distribution system, information processing apparatus and information process distribution method | |
JP2002261748A (ja) | データ送信装置及び方法並びにデータ記録装置及び方法 | |
JP2008015622A (ja) | 著作権保護記憶媒体、情報記録装置及び情報記録方法、並びに情報再生装置及び情報再生方法 | |
WO2001054099A1 (fr) | Systeme d'authentification de donnees | |
JP2003195759A (ja) | 暗号化データの生成方法、記録装置、記録媒体、復号方法、記録媒体再生装置、伝送装置、および、受信装置 | |
JP2012083910A (ja) | 情報処理装置、および情報処理方法、並びにプログラム | |
KR20020026285A (ko) | 정보 처리 시스템 및 방법 | |
JP2007124717A (ja) | デジタルコンテンツ無断複製防止システム | |
JP4204901B2 (ja) | データ不正使用防止システム、データ再生装置、利用者識別手段、証明情報書込装置、データ不正使用防止方法、データ不正使用防止プログラム、およびコンピュータ読取可能な記録媒体 | |
JP4713745B2 (ja) | 認証通信装置及び認証通信システム | |
WO2004082202A1 (ja) | コンテンツの不正利用を防止することのできるコンテンツ記録装置 | |
JP2004140757A (ja) | コンテンツの暗号化方法及び暗号化されたデータを復号化する復号化方法並びにその装置 | |
JP2002244552A (ja) | 情報再生装置、情報再生方法、および情報記録媒体、並びにプログラム記憶媒体 | |
JP2001028572A (ja) | 情報配信システム | |
JPH10293724A (ja) | ユニット装置、復号化ユニット装置、暗号化ユニット装置、暗号処理システム、暗号化方法及び復号化方法 | |
JP4765377B2 (ja) | コンテンツ提供サーバ,および携帯電話 | |
WO2003073295A1 (fr) | Dispositif hote | |
JP2003008567A (ja) | 著作権保護システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004717865 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2004717865 Country of ref document: EP |