WO2004086231A1 - 情報記録媒体、情報処理装置、および情報処理方法、並びにコンピュータ・プログラム - Google Patents
情報記録媒体、情報処理装置、および情報処理方法、並びにコンピュータ・プログラム Download PDFInfo
- Publication number
- WO2004086231A1 WO2004086231A1 PCT/JP2004/002921 JP2004002921W WO2004086231A1 WO 2004086231 A1 WO2004086231 A1 WO 2004086231A1 JP 2004002921 W JP2004002921 W JP 2004002921W WO 2004086231 A1 WO2004086231 A1 WO 2004086231A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- information
- key
- recording medium
- information recording
- Prior art date
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 80
- 238000003672 processing method Methods 0.000 title claims description 25
- 238000004590 computer program Methods 0.000 title claims description 11
- 238000012545 processing Methods 0.000 claims abstract description 136
- 238000000034 method Methods 0.000 claims abstract description 113
- 230000008569 process Effects 0.000 claims description 107
- 230000008676 import Effects 0.000 claims description 73
- 238000012795 verification Methods 0.000 claims description 25
- 230000004913 activation Effects 0.000 claims description 22
- 238000003860 storage Methods 0.000 claims description 22
- 238000012790 confirmation Methods 0.000 claims description 11
- 238000009826 distribution Methods 0.000 description 22
- 238000010586 diagram Methods 0.000 description 21
- 230000015654 memory Effects 0.000 description 20
- 238000007726 management method Methods 0.000 description 17
- 230000006870 function Effects 0.000 description 15
- 238000004891 communication Methods 0.000 description 7
- 238000013500 data storage Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000013478 data encryption standard Methods 0.000 description 4
- 230000001143 conditioned effect Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 235000010425 Sorbus domestica Nutrition 0.000 description 1
- 240000005332 Sorbus domestica Species 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000007630 basic procedure Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000002542 deteriorative effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000001824 photoionisation detection Methods 0.000 description 1
- 238000010926 purge Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00188—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
- G11B20/00202—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier wherein the copy protection scheme builds on multi-session recording, e.g. defective table of contents [TOC] in the 2nd session
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00847—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction is defined by a licence file
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- Information recording medium information processing device, information processing method, and computer program
- the present invention relates to an information recording medium, an information processing device, an information processing method, and a computer program. Further, in detail, a data recording field for recording the encrypted content is set on the content recording medium such as a CD, and license information for recording content usage conditions and an encryption key required for the reproduction process are stored.
- the present invention relates to an information recording medium, an information processing device, an information processing method, and a computer program, which, by adopting a configuration, enable appropriate content copyright management and improve the user's convenience in using the content.
- audio data such as music, image data such as movies, game programs, various application programs, etc., various software data (hereinafter referred to as “Content”)
- networks such as the Internet
- information recording media such as CDs (Compact Disks), DVDs (Digital Versatile Disks) and MDs (Mini Disks).
- CDs Compact Disks
- DVDs Digital Versatile Disks
- MDs Mini Disks
- a reproduction device such as a PC (Personal Computer), a CD player, a DVD player, an MD player, etc. owned by the user, or a game device.
- Many content, such as music data and image data generally have their distribution rights reserved by their creators or sellers.
- an information recording medium with a copy control function for example, a CD with a copy protection function
- Examples of copy protection features include copy control technology developed by midbar technologists and Coby control technology developed by McGuide Vision in the United States.
- copy control technology developed by midbar technologists and Coby control technology developed by McGuide Vision in the United States.
- an attempt is made to play back an information recording medium such as a CD on which a copy-controlled content is recorded it can be played back on a CD player dedicated to playback processing, but cannot be played back on a PC or the like.
- copy protection processing is performed, the use of content such as copying or moving the content to a PC, and further copying it to a recording medium such as a flash memory, etc., and enjoying it with a portable player or the like will be hindered. Will be.
- content stored on an information recording medium such as a CD is encrypted and distributed, and content usage right information such as the number of copies of the content and the usage period of the content are limited.
- SDMI Secure Digital Music Initiative
- the Secure Digital Music Initiative proposes various specifications for music distribution technology
- There are various forms of realizing the copyright protection function such as a limitation on the number of copies of the content and a limitation on the use period of the content.
- the distribution of the encrypted content and the license is executed independently, and the encrypted content is stored in an information recording medium such as a CD, DVD, or MD and provided to the user, and the license is transmitted to a network such as the Internet. It is common to adopt a configuration of distributing via a conventional proposal configuration. For example, a user who purchases a CD containing encrypted content connects to the license provider using a PC or other network-connectable terminal, performs license acquisition processing on condition that a predetermined price is paid, and obtains the license. After obtaining a key to be used for decrypting the encrypted content based on the license, decrypt the encrypted content using the obtained key, Perform playback.
- a user obtains a license specifying various content usage right information such as the number of times of content copying and the number of times of reproduction, and thereby obtains a content in accordance with the obtained license.
- various content usage right information such as the number of times of content copying and the number of times of reproduction
- a license acquisition procedure is a very complicated procedure. Users who are unfamiliar with network connection, etc. may need to give up such a license acquisition procedure and may give up using the content itself. Users need to obtain a license even if they use one piece of content stored in the CD.
- the user must access the license provider to obtain a license, enter various data such as the user or terminal information, payment terms of the consideration, and obtain the license from the license provider with the approval of the license provider.
- the present invention has been made in view of the above-described problems, and eliminates the need for license acquisition processing via a network when using encrypted content stored on an information recording medium such as a CD.
- an information recording medium such as a CD.
- an information processing device an information processing method, and a computer program, which are capable of improving the operability and accurately managing the copyright of a content.
- An information recording medium storing the encrypted content
- the information recording medium has a multi-session configuration having a plurality of sessions as divided information recording areas, wherein the encrypted content and the encrypted In addition to the session in which the usage right information of the encrypted content and the encryption key information necessary for the decryption process of the encrypted content are stored, there is a session set as a content storage area subjected to the copy protection process. It is characterized by the following. Further, in one embodiment of the information recording medium of the present invention, the information recording medium has a configuration further storing media identification data (PID: Post scribed-ID) as an identifier unique to the information recording medium.
- PID media identification data
- the media identification data (PID: Post scribed-ID) is configured to include a MAC (Message Authentication Code) as falsification verification data.
- the encrypted content file includes an encrypted content, an encrypted content key that is encrypted data of a content key as a decryption key of the encrypted content, and An enabling key block (EKB: enabling key block) as an encryption key data capable of obtaining a key applied to decryption of the encrypted content key, wherein the encryption key information is stored in the encrypted content file.
- the device node key (DNK: Device Node Key) as key information applied to processing of an included enabling keep block (EKB: Enabling Key Block).
- the device node The key (DNK: Device Node Key) is characterized in that it is key information set based on a key provision configuration based on a hierarchical key tree configuration.
- the information recording medium further includes a content use program including a reproduction process of the encrypted content, wherein the content use program is based on the use right information. It is characterized by including a program that executes control processing of content use.
- the information recording medium includes an encrypted content that can be used based on a usage right confirmation process according to usage right information stored in the information recording medium.
- the configuration is characterized by including a file.
- a second aspect of the present invention is:
- An information processing device for executing a process of using the encrypted content stored in the information recording medium
- An information processing apparatus characterized in that it has a configuration in which content usage is performed on condition that the content usage is permitted in the description of the read usage right information.
- the use processing of the encrypted content includes a reproduction process of the content, and the information processing apparatus includes a description of the usage right information read from the information recording medium. Characterized in that the content reproduction is executed on condition that the content reproduction processing is permitted.
- the use processing of the encrypted content includes an import processing of the content, and the information processing apparatus includes: The content import processing is executed on condition that the content import processing is permitted, and the import of the usage right information read from the information recording medium is performed at the time of the content import processing.
- the usage right information to be imported to the information processing apparatus is usage right information describing usage conditions for the content after the import.
- the usage right information is information in which at least one of permission conditions of content reproduction, checkout, or copying is described.
- the information processing apparatus includes a MAC (Message Authentication) as tampering verification data of media identification data (PID: Post scribed ID) read from the information recording medium. Code) verification processing, and the content is used under the condition that there is no falsification of the media identification data (PID: Post scribed-ID).
- MAC Message Authentication
- the information processing apparatus The content is obtained by applying the encryption key information read from the information recording medium and decrypting the encrypted content file read from the information recording medium.
- the encrypted content file stored in the information recording medium is an encrypted content and encrypted data of a content key as a decryption key of the encrypted content.
- a file containing an encrypted content key and an effective key block (EKB) as encryption key data capable of obtaining a key applied to decrypt the encrypted content key The information processing device transmits a device node key (DNK: Device Node Key) as key information applied to processing of an enabling key block (EKB) included in the encrypted content file to the encryption. It is characterized in that it is obtained from key information and executes the processing of an enabling key block (EKB).
- a third aspect of the present invention provides
- An encrypted content file including the encrypted content stored on the information recording medium
- the content use is performed on condition that the use of the content is permitted in the description of the use right information.
- the use process of the encrypted content is a process of reproducing the content
- the content use step includes the step of using the description of the use right information read from the information recording medium. It is characterized by executing the permitted content reproduction processing.
- the use process of the encrypted content is a content import process
- the content use step includes a description of the use right information read from the information recording medium. In the content import processing, the content import processing is performed, and the import of the usage right information read from the information recording medium is also performed in the content import processing.
- the usage right information to be imported to the information processing apparatus is usage right information describing usage conditions for the content after the import.
- the usage right information is information in which at least one of conditions for reproducing, checking out, or copying content is described.
- the information processing method further includes a MAC (Message) as falsification verification data of media identification data (PID: Post scribed-ID) read from the information recording medium. Authentication code (Authentication Code) is verified, and the content is used on condition that there is no falsification of the media identification data (PID: Post scribed-ID).
- the content using step includes applying the encryption key information read from the information recording medium to decrypt the encrypted content file read from the information recording medium. It is characterized by including the step of acquiring. Further, in one embodiment of the information processing method of the present invention, the encrypted content file stored in the information recording medium is an encrypted content and encrypted data of a content key as a decryption key of the encrypted content.
- a device node key (DNK: Device Node Key) as key information applied to processing of an enabling key block (EKB) included in the encrypted content file is stored in the above-mentioned format. It is characterized by including a step of executing an enabling key block (EKB) process obtained from the key information.
- a computer program that executes processing for using encrypted content stored on an information recording medium.
- An encrypted content file including the encrypted content stored on the information recording medium
- the use right information confirmation step the use right information A content usage step of using the content on condition that the content is used.
- an information recording medium such as a CD.
- the user can decrypt the license (use right information) and the content together with the content from the information recording medium without connecting to the license provider and acquiring the license (use right). Necessary key information can be obtained. Therefore, there is no need to perform a license (license right) acquisition process from a license provider when using content, which improves user convenience and guarantees content copyright management based on the license.
- usage right information that describes usage conditions for the imported content is set and stored in a storage device such as a hard disk.
- content usage will be restricted according to the imported usage right information, and content usage based on an appropriate license will be realized for content after importing.
- media identification data PID: Post scribed-ID
- falsification verification data for the PID is stored.
- the encrypted content file stored in the information recording medium is stored in an encrypted content file, the encrypted content key being encrypted data of the content key as a decryption key of the decrypted content, and And a file containing an enabling key block (EKB: Enabling Key Block) as encryption key data from which a key applicable to decryption of an encrypted content key can be obtained, and stored in an information recording medium.
- EKB Enabling Key Block
- the information recording medium includes an encrypted content file that can be used based on a usage right confirmation process according to the usage right information stored in the information recording medium, It is configured to include a plurality of different encrypted content files from the encrypted content file that can be used based on the usage right confirmation processing according to the usage right information that can be obtained from the license provider without being stored on the medium.
- the computer program of the present invention is, for example, a general-purpose computer capable of executing various program codes, and is provided in a computer-readable form in a storage medium and a communication medium such as CDFD and MO. It is a computer program that can be provided through a communication medium such as a network or a network. By providing such a program in a computer-readable format, processing corresponding to the program is realized on a computer system. Further objects, features and advantages of the present invention will become apparent from the following detailed description based on embodiments of the present invention and the accompanying drawings.
- FIG. 1 is a diagram showing a configuration of an information recording medium having a first data storage area subjected to copy protection processing and a second data storage area not subjected to copy protection processing.
- FIG. 2 is a diagram illustrating a data configuration of an information recording medium.
- FIG. 3 is a diagram showing a data format example of PID data.
- FIG. 4 is a diagram illustrating an example of a MAC value generation process.
- FIG. 5 is a diagram illustrating a use form of the information recording medium.
- FIG. 6 is a tree configuration diagram illustrating various keys and data encryption processing and distribution processing.
- FIG. 7 is a diagram showing an example of an activation keep-up (EKB) used for distribution of various keys and data.
- EKB activation keep-up
- FIG. 8 is a diagram showing an example of distribution and an example of decryption processing using a content key activation key block (EKB).
- EKB content key activation key block
- FIG. 9 is a diagram showing an example of the format of the activation key block (EKB).
- FIG. 10 is a view for explaining the configuration of the tag of the activation keep-up (E KB).
- FIG. 11 is a diagram illustrating category division in a tree configuration.
- FIG. 12 is a diagram illustrating category division in a tree configuration.
- FIG. 13 is a diagram illustrating a specific example of category division in a tree configuration.
- FIG. 14 is a diagram showing a data configuration example of service data and usage right information.
- FIG. 15 is a diagram illustrating a data configuration example of the usage right information.
- FIG. 16 is a diagram showing a data configuration example of the usage right information corresponding to the import content.
- FIG. 17 is a diagram for explaining the content playback and import processing sequence.
- FIG. 18 is a diagram illustrating a license acquisition processing sequence corresponding to content.
- FIG. 19 is a diagram for explaining the outline of the content reproduction process.
- FIG. 20 is a diagram illustrating an example of content decryption and use processing using the activation keep lock (EKB).
- FIG. 21 is a diagram illustrating a configuration example of an information processing device.
- FIG. 1 shows a plan view of various information recording media 10 such as a CD (Compact Disc), a DVD (Digital Versatile Disk), and an MD (Mini Disk).
- the data recording area of the information recording medium is divided into two areas.
- a content data recording area for copyright protection that is, a first data recording field as a content recording field having a copy and anti-ribbing function.
- (1st session) 11 is set, and further, a second data recording field (2nd session) 12 in which the encrypted content is recorded is set on the outer peripheral portion (B) of the information recording medium 10.
- rubbing is a data duplication process as digital data, and the quality of the original data is maintained.
- a content CD with exactly the same quality as the original CD is created. Is done.
- live data as compressed data such as MP3 or to transmit it via a network.
- the configuration of the present invention relates to the data recording configuration of the second data recording field (2nd session) 12 and the processing of the recorded data, and the data of the first data recording field (1st session) is It can be set as data of any format, and may be configured without the first data recording field. However, in the following embodiments, description will be made focusing on an example in which an information recording medium having a plurality of sessions is applied as shown in FIG.
- a PID (Postscribed-ID) recording area 13 is provided in a partial area of the second data recording field 12.
- the PID is a media ID assigned as a unique identifier (ID) for each disk in a predetermined disk set unit such as a title unit, an album unit, a category unit, a manufacturing unit unit, etc., and other purge information. And the like, and furthermore, data that has been processed by a MAC (Message Authentication Code) as a data tampering verification code.
- MAC Message Authentication Code
- the information recording medium 10 includes a first data storage area (1st session) 11 set as a content storage area subjected to copy protection processing, an encrypted content, and an encrypted content.
- One session includes a lead-in area composed of a data area (for example, silence data) indicating a data start area, a content storage area, and a lead-out area indicating a data end area. It is a unit area composed of areas.
- the recorded content of the first data recording field (1st session) is recorded as content that has been subjected to copy protection processing. For example, when a pseudo signal is recorded on the first track and set in the CD-ROM drive of the PC, the PC is not recognized as a music CD, and the playback processing by the music CD playback program of the PC is not executed. is there.
- the copy protection function for example, various copy protection functions such as copy control technology developed by a mid-per technician or copy control technology developed by a vision company in the United States can be applied.
- the recording content of this first data recording field (1st session) is read out as digital data by attaching it to a CD drive such as a PC, and stored in another recording medium, or compressed data such as MP3.
- the recorded content in the first data recording field (1st session) can be reproduced by a reproduction processing device (player) having a reproduction function as a dedicated function, such as a normal CD player. That is, a CD player that does not have a copy processing or ripping processing program and can execute only CD reproduction can ignore the signal even if a pseudo signal is recorded on the fast track and reproduce the content data.
- a reproduction processing device player
- 2nd session the second data recording field
- An encrypted content file is a content for a playback device such as a PC that can execute digital copy processing, and performs decryption processing using an encryption key (content key) set in advance for the content. Can be played with.
- the ⁇ key (content key) for performing the decryption process can be obtained on condition that the user has a license corresponding to the content.
- the license information is stored together with the encrypted content file in the second data recording field (2nd session) of the information recording medium, and the stored license can be used.
- a key to be applied to decryption of an enabling key block (EKB) included in an encrypted content file is obtained based on license information, a content key is obtained based on the obtained key, and a content key is obtained. Can decrypt the encrypted content.
- EKB enabling key block
- the bundle player is a program that executes the direct reproduction process without importing the encrypted content stored in the 2nd session! /.
- the information recording medium 10 can be used by setting it on a PC, and can be used for copying to another storage medium such as a HDD such as a PC, that is, reproduction processing without import processing, that is, information recording medium 10 such as a CD. This is a program for executing a direct reproduction process from a computer.
- the usage right information is the usage permission information of the encrypted content.
- the usage conditions of the content for example, the content reproduction permission information, the copy permission information, the content import processing permission information, the content checkout permission information, and the CD-R generation permission information.
- information including various contents usage right information such as information on the number of permitted times.
- the usage right information for example,
- Offline import of licenses (license information) means that licenses (license information) corresponding to the encrypted content stored on the information recording medium are recorded from the information recording medium to the hard disk of an information processing device such as a PC. This is the process of importing the license (use right information) to the medium.
- the online import of the license (use right information) means that the license (use right information) corresponding to the encrypted content is accessed not by the information recording medium but by the license provider. Get over the network Processing.
- Checkout is the process of temporarily outputting the content stored on a PC, for example, to another device, for example, portable media (PM). The process of returning content from a portable media (PM) to a PC is called checkin.
- a user device such as a PC interprets the usage right information in the usage right information interpretation module in the user device when using the encrypted content, and uses the content on condition that the user device conforms to the usage conditions.
- the encryption key information is symbol key information necessary to obtain a content key for decrypting the encrypted content or a key applied to decrypt the encrypted content key obtained by encrypting the content key.
- a user device such as a PC obtains a key to be applied to decryption of an encrypted content key on condition that it is determined that the device conforms to the usage condition description in the usage right information (license).
- the encrypted content key is decrypted to perform the content key acquisition process, and the encrypted content is decrypted based on the acquired content key to use the content, for example, content reproduction, or other device for the content. It performs processing such as copying (copying) and moving (mooping) the data.
- the encryption key information is, for example, a device node key (DNK: Device Node Key) provided by a hierarchical key distribution configuration.
- DNS Device Node Key
- the content key can be obtained by decrypting the enabling key block (EKB) included in the encrypted content file, based on the decryption node key (DNK).
- EKB enabling key block
- DNK decryption node key
- the player which is conditioned on the use right information (license information), is a content use processing execution program that executes overall control of the content use processing when playing back, copying, and using other contents based on the license. .
- usage right information (license information)
- content usage based on usage right information (license information) will be described later.
- the information recording medium is further provided with a PID (Postscribed-ID) recording area in a partial area of the second data recording field.
- the PID includes a media ID assigned as a unique identifier (ID) for each disc in a predetermined disk set unit such as a title unit, an album unit, a category unit, a production lot unit, and other information such as version information.
- FIG. 3 shows an example of the data structure of the PID.
- the PID has a format version 21 indicating the format transition of the PID, a PID reserve field 22 and a media ID 23 as unique identification data for each disk. Configuration with MAC 24 added as One.
- the message authentication code (MAC) is generated as data for data tampering verification.
- FIG. 4 shows an example of MAC value generation using a DES encryption processing configuration as an example. An example of MAC generation using the DES encryption processing configuration in FIG. 4 will be described.
- the target message is divided into 8-byte units (hereinafter, the divided messages are referred to as ⁇ 1, ⁇ 2, ⁇ , MN).
- the initial value (Initial Value (hereinafter referred to as IV))
- Ml are exclusive-ORed (the result is I 1).
- II is put into the DE encrypting unit, and is encrypted using a key (hereinafter, referred to as K 1) (output is referred to as E 1).
- E1 and M2 are XORed, the output I2 is input to the DES encryption unit, and encrypted using the key K1 (output E2).
- this process is repeated, and encryption processing is performed on all messages.
- this is the EN message S message authentication code (MAC).
- MAC EN message S message authentication code
- the information recording medium 101 enables (a) playback of the content recorded in the 1st session in a playback device that cannot perform digital copying such as ripping, for example, in a CD player 102. Also, on a device capable of digital copying such as ritving, for example, PC103, (b) the content recorded in the second session is directly reproduced using the bundle player recorded in the second session. Becomes possible.
- the process of importing the content recorded in the second session that is, the encrypted content can be copied to a recording device such as a hard disk in the PC 103.
- this is executed when the content usage conditions described in the usage right information (license) recorded in the second session are met, and the user device such as the PC 103 uses the usage right information. Is interpreted by the usage right information interpretation module in the user device, and the import can be performed on condition that the processing conforms to the usage conditions. For example, in the license usage conditions, if import is permitted, if the content is importable but import is not permitted, the import process is not executed.
- the license 111 including the usage right information is also imported, and is stored together with the encrypted content on the recording medium of the PC 103.
- imported content on the PC 103 for example, when playing, copying, mopping or checking, the use right information in the imported license is interpreted on the PC and conforms to the use conditions.
- Content usage is made on the condition that The imported content can be further used for checking the flash memory available on the portable device 104, for example, and playing back the checkout content stored in the flash memory on the portable device 104. It is possible.
- the PC 103 interprets the usage right information in the imported license, and can execute the checkout on condition that the checkout process conforms to the usage conditions.
- the license is also stored in the brush memory and the usage rights information in the license is interpreted in the portable device 104, and the content usage is conditioned on the condition that the process conforms to the usage conditions. Is made. [2. Hierarchical key distribution configuration]
- a device and key management configuration based on a configuration which is an aspect of the broadcast encryption (Broadcast Encryption) system.
- Namers 0 to 15 shown at the bottom of FIG. 6 are user devices as clients that use the content. That is, each leaf of the hierarchical tree structure shown in FIG. 6 corresponds to a device.
- Each device 0 to 15 has a key (node key) assigned to a node from its own leaf to the root in the hierarchical tree structure shown in FIG. 6 at the time of manufacture, shipment, or thereafter, and A key set (Device Node Key (DNK)) consisting of leaf keys for each leaf is stored in memory.
- K 0 0 0 0 0 to K 1 1 1 1 shown at the bottom of FIG. 6 are devices 0 to 1
- KR to K11 1 1 are the node keys.
- device 0 owns a leaf key K 0 00 0 and node keys: K 0 0 0, K 0 0, K 0, and KR.
- device 5 owns K 0101, K 010, K 01, K 0, and KR.
- Device 15 owns K1111, Kill, Kll, Kl, KR.
- the tree structure is shown as a four-stage balanced and symmetrical configuration. It is also possible to have a different number of stages in each part of the array.
- Each device included in the tree structure shown in FIG. 6 includes various recording media, for example, a DVD, a CD embedded in a device or detachable from the device.
- various types of devices using D, MD, flash memory, etc. are included.
- various application services can coexist.
- a hierarchical structure which is a content or key distribution configuration shown in FIG. 6, is applied.
- devices 0, 1, 2, and 3 are set as one group using the same recording medium.
- the common content is collectively encrypted and sent from the provider, the content key used commonly for each device is sent, or Processing such as encrypting and outputting the payment data of the content fee from the device to the provider or the settlement institution is also executed.
- the entity that sends and receives data to and from each device such as a content server, license server, or shop server, collects data as a group surrounded by the dotted line in Figure 6, that is, devices 0, 1, 2, and 3 as one group.
- the sending process can be executed. There are a plurality of such groups in the line in FIG.
- the node key and leaf key may be controlled and managed by a single management system having a key management center function, or message data distribution from providers, settlement institutions, etc., which transmit and receive various data to and from each group. It may be configured to manage each group by means. These node keys and leaf keys are updated in the event of, for example, a key leak, and this update process is executed by a management system having a key management center function, a provider, or a settlement institution.
- a management system having a key management center function, a provider, or a settlement institution.
- DNK device node key
- a node key ⁇ 0 0 that is commonly held is a held key that is common to devices 0, 1, 2, and 3.
- the value Enc (K00, Knew) obtained by encrypting the new key Knew with the node key K00 is stored over the network or in a recording medium, and the devices 0, 1, 2, 3, and 3 are stored. Only the devices 0, 1, 2 and 3 use the shared node key K 0 0 held by each device to solve the symbol Enc (K 0 0, Kn ew) to obtain a new key K new Can be obtained.
- Enc (K a, K b) indicates that Kb is data obtained by encrypting Kb with K a. Also, at a certain point in time t, if it is discovered that the keys possessed by Depayes 3 are: After that, device 3 must be disconnected from the system in order to protect the data transmitted and received by the system (group of devices 0, 1, 2, and 3). To do so, the node keys: ⁇ 0 0 1, ⁇ 0 0, ⁇ 0, and KR are replaced with new keys ⁇ (t) 0 0 1, K (t) 0 0, K (t) ⁇ , ⁇ (t) R needs to be updated and devices 0, 1, and 2 need to be notified of the updated key.
- ⁇ (t) aaa indicates that the generation of the key aaa (Generation) is an update key of t.
- the update key distribution process will be described.
- the key can be updated, for example, by storing a table composed of block data called an enabling key block (EKB) shown in FIG. It is performed by supplying 1 and 2.
- the activation keep key (E KB) is composed of an encryption key for distributing a newly updated key to devices corresponding to each leaf that constitutes the structure shown in Fig. 6. Is done.
- An enabling key block (EKB) is sometimes called a key renewal block (KRB).
- KRB key renewal block
- the activation keep lock (EKB) shown in Fig. 7 (A) contains the update of the node key.
- FIG. 7 is block data formed for the purpose of distributing an updated node key of generation t to devices 0, 1, and 2 in the tree structure shown in FIG.
- device 0 and device 1 need (t) 00, K (t) 0, and K (t) R as update node keys
- device 2 has an update node key.
- K (t) 001, K (t) 00, K (t) 0, and K (t) R are required.
- the EKB in Fig. 7 (A) contains multiple encryption keys.
- the encryption key at the bottom is Enc (K 0 0 10, K (t) 0 0 1).
- K (t) 0 0 1 encrypted with the leaf key K 0 0 1 0 of device 2, and device 2 decrypts this encryption key with its own leaf key, K (t) 0 0 1 can be obtained. Also, using K (t) 01 obtained by decryption, the encryption key Enc (K (t) 0 0 1, K (t) 0 0) in the second stage from the bottom in FIG. Can be decrypted, and an updated node key K (t) 00 can be obtained. Subsequently, the decoding keys Enc (K (t) 0 0, K (t) 0) in the second stage from the top in FIG.
- the device K 0 0 0 0. ⁇ 0 0 0 1 does not include the node key KO 0 0 in the target to be updated, and only ⁇ ⁇ ⁇ (t) 0 0 and K (t) 0 , K (t) R.
- the device K 0 0 0 0. ⁇ 0 0 0 1 decrypts the encryption key Enc (K 0 0 0, ⁇ (t) 0 0) in the third stage from the top in FIG.
- the index in Fig. 7 (A) indicates the absolute addresses of the node key and leaf key used as the decryption key. If it is not necessary to update the node keys in the upper stage of the tree structure shown in FIG.
- the updated node key K (t) 00 can be distributed to the devices 0, 1, and 2.
- the EKB shown in Fig. 7 (B) can be used, for example, when distributing a new content key shared by a specific group. As a specific example, it is assumed that a recording medium having devices 0, 1, 2, and 3 in a group indicated by a dotted line in FIG. 6 is used and a new common content key K (t) con is required.
- Figure 8 shows an example of processing to obtain a key at time t, for example, a content key K (t) con applied to content encryption / decryption, using a new common content key using K (t) 00.
- the device 0 performs the same EKB processing as described above using the EKB at the time t stored in the recording medium and the node key K 00 stored in advance by itself.
- FIG. 9 shows an example of the format of the activation key block (E KB).
- Version 201 is an identifier indicating the version of the activation key block (EKB).
- the version has the function of identifying the latest EKB and the function of indicating the correspondence between the content and the content.
- Depth indicates the number of levels in the hierarchical tree for the destination where the activation key block (EKB) is distributed.
- Data pointer 203 is a pointer indicating the position of the data section in the activation keep block (EKB)
- tag pointer 204 is a pointer indicating the position of the tag section
- signature pointer 205 is a pointer indicating the position of the signature. is there.
- the data section 206 stores, for example, data obtained by encrypting a node key to be updated. For example, each encryption key related to the updated node key as shown in FIG. 7 is stored.
- the tag part 2007 is a tag indicating the positional relationship between the decoded node key and leaf key stored in the data part.
- the tag assignment rule will be described with reference to FIG.
- FIG. 10 shows an example in which the activation key block (EKB) described above with reference to FIG. 7A is transmitted as data.
- the data at this time is as shown in Table (b) of FIG.
- the top node address included in the encryption key at this time is set as the top node address.
- the top node address is KR.
- data Enc (K (t) 0, ⁇ (t) R) at the top is located at the position shown in the hierarchical tree shown in (a) of FIG.
- the next data is E nc (K (t) 0 0, K (t) 0), which is at the lower left position of the previous data on the tree. If there is data, the tag is set to 0; otherwise, 1 is set.
- the tag is set as ⁇ left (L) tag, right (R) tag ⁇ .
- the signature 208 is an electronic signature that is issued by, for example, a management system having a key management center function, a content server, a license server, or a shop server that has issued an activation key block (EKB).
- Fig. 11 shows an example of the classification of categories with a hierarchical structure.
- a root key K root 301 is set at the top of the hierarchical structure
- a node key 302 is set at the following middle
- a leaf key 303 is set at the bottom. Is set.
- Each device has an individual leaf key and a series of node keys and root keys from leaf key to root.
- a node having the M-th stage from the top is set as a category node 304.
- each of the M-th nodes is a device setting node of a specific category.
- One node at the Mth stage is defined as a vertex, and the nodes and leaves below the M + 1 stage are the nodes and leaves related to the devices included in the category.
- the category [Memory Stick (trademark)] is set for one node 3 05 in the M-th stage in Fig. 11, and the nodes following this node, the leaves, are various devices using a memory stick. It is set as a node or leaf dedicated to the containing category.
- the nodes 305 and below are defined as a set of related nodes and leaves of devices defined in the memory stick category.
- a stage several stages lower than the M stage can be set as the subcategory node 306.
- the node two levels below the category [Memory Stick (trademark)] node 205 is a sub-category node included in the category of devices using Memory Stick (trademark).
- a sub-category node a node with a music playback function included in the category of a playback-only device, is set under the node of a playback-only device, which is a sub-category node.
- node [308] and the [mobile phone] node [309] included in the category can be set.
- categories and subcategories are not only device types, but also arbitrary units such as nodes managed by a certain manufacturer, content provider, settlement institution, etc., that is, processing units, jurisdiction units, or provided service units. (Collectively, hereafter referred to as entities). For example, if one category node is set as a dedicated vertex node for the game device XYZ sold by the game device manufacturer, the game device sold by the manufacturer ⁇ stores the lower node key and leaf key below the vertex node for sale.
- EKB effective keepup packet
- usable data can be distributed only to devices below the vertex node.
- one vertex node of the category stage or the subcategory stage is set. It is possible for the managing maker, content provider, etc. to independently generate an activation key block (EKB) with the node as the vertex and distribute it to devices belonging to the vertex node and below. Key update can be performed without affecting devices belonging to the category of nodes.
- the nodes in the 8 + 24 + 32 stage have a clear structure, and the category corresponds to each node from the root node to the lower 8 stages.
- the category means a category of a device using a semiconductor memory such as a memory stick, and a category of a device receiving digital broadcasting.
- this system corresponds to one of the category nodes as a system for managing licenses.
- the keys corresponding to the nodes in the lower 24 levels of the T system node apply to the service provider as a management entity such as a shop server or license server, or to the services provided by the service provider. Is done.
- the lowest 32 levels can define 2 32 (approximately 4 giga) users (or user devices).
- the key corresponding to each node on the path from the bottom 32 nodes to the ⁇ system node constitutes the DNK (Device Node Key), and the ID corresponding to the bottom leaf is the leaf ID.
- the content key with encrypted content is encrypted with the updated root key KR '
- the upper-level updated node key is encrypted with the nearest lower-level updated node key, and placed in the EKB. Is done.
- the updated node key one level up from the end of the EKB is encrypted by the end node key or leaf key of the EKB and placed in the EKB.
- the user device uses one of the DNK keys described in the service data to decrypt the latest upper layer update node key described in the EKB distributed with the content data, and decrypts it. Using the obtained key, the updated node key in the layer above it described in the EKB is decrypted. By sequentially performing the above processes, the user device can obtain the updated root key KR '.
- the category classification of the tree allows a configuration in which one node is set as a vertex and the following nodes are set as related nodes of the category or subcategory defined at the vertex node. Manufacturers, service providers, etc.
- the tree with the hard node 355 at the top is a category that distributes the hardware-compatible EKB [EKB (H)] that is issued for the device by setting the user device itself as the leaf 355. is there.
- the service tree with the T service node 352 at the top is a category tree for distributing the service-compatible EKB [EKB (S)] issued in response to the service provided to the user device.
- Both the hardware-compatible EKB [EKB (H)] and the service-compatible EKB [EKB (S)] are DNKs (Device Node Keys) that are assigned to devices with legitimate authority. Having a key corresponding to each node on the path enables each EKB to be decrypted.
- the information processing device such as a PC on which the information recording medium storing the encrypted content is set executes content usage based on the license stored in the second session of the information recording medium together with the encrypted content.
- the license when the encrypted content is used based on the license, the license can be obtained from the second session of the information recording medium.
- the license includes the usage right information and the encryption key information as described above.
- Figure 14 (a) shows an example of the data structure of service data that includes key information. As shown in Fig.
- the service data 4 11 1 includes a leaf ID unique to the client, a service ID as a service identifier, and a device node key ( E (K root, DNK), which is the encryption key information obtained by encrypting DNK) with the root key (K root).
- Fig. 14 (b) shows an example of the data structure of usage right information as license information.
- the usage right information 4 12 contains the usage right information ID as the usage right information identifier, the time stamp as the issue S time information, the leaf ID unique to the client, and the content correspondence. In the case of, the content ID and the usage condition target content type information are stored.
- the content ID may be configured to enumerate the individual content IDs of the encrypted content stored in the second data storage area of the information recording medium shown in FIG. 1, or may be configured to set the product ID.
- FIG. 14 (c) shows the structure of the content file 4 13.
- the encrypted content file recorded in the second data recording field 12 of the information recording medium 10 shown in FIG. 1 is a content data (Enc (Kc, Content) encrypted with the content key [Kc].
- E nc ((K root, K c)
- Only users with valid usage rights can decrypt and obtain the root key [K root] It is recorded on the disk as a configuration with a possible EKB and service ID Figure 15 and Figure 16 show the usage described in the license stored with the encrypted content in the second session of the information recording medium.
- An example of rights information is shown below:
- the usage rights information shown in Fig. 15 is the direct It describes the conditions for direct playback processing and import processing.
- the usage right information shown in Fig. 16 is used when the content stored in the second session is imported to an information processing device such as a PC.
- usage right information (license) corresponding to the content is stored, and the usage right information (license) describes the usage conditions shown in FIGS. 15 and 16.
- a user device such as a PC interprets the usage right information shown in Fig. 15 of the usage right information (license) in the usage right information interpretation module in the user device and obtains the content specified in the usage right information.
- the content is used under the condition that the process conforms to the usage conditions, that is, content playback or import processing is executed.
- the program executed by the usage right information interpretation module is a player conditioned on the application of the usage right information (license information) stored on the information recording medium.
- the information processing device installs and executes a player as required on condition that the usage right information (license information) stored in the information recording medium is applied.
- the user device such as a PC interprets the usage right information (license) imported with the encrypted content, that is, the usage right information shown in Fig. 16 in the usage right information interpretation module in the user device.
- the content is used under the condition that the process conforms to the usage conditions, that is, the content is played back or checked out, or the CD-R is created.
- the usage right information shown in FIGS. 15 and 16 is an example, and it is optional to set various other usage conditions.
- the content usage right information will be described with reference to FIG. FIG. 15 shows an example of the content usage right information before the content is imported.
- Reproduction conditions as one of the content usage rights include a time limit and Is set. As the time limit, there is a setting of “no limit” and a setting of “limited”. If there is a limit, the content playback allowable start and end times are set. The allowable number of playbacks includes the setting of "no limit” and the setting of "limited”. If there is a limit, the allowable number of content playbacks is set. This numerical value is updated in the usage right information interpretation module in the user device when the content reproduction process is executed, and the permissible number is reduced by one after executing the reproduction process once.
- an import condition as one of the content use rights, the availability of an offline import and an online import is set.
- Offline import is the process of directly importing the encrypted content from the information recording medium.
- Online import is the process of importing the encrypted content not from the information recording medium but via a network with a predetermined content provider. This is the process of connecting and importing content online.
- the availability of offline import and the availability of online import are set as content import conditions.
- the usage right information interpretation module in the PC interprets the usage conditions specified in the license. The import will be made on condition that the offline import is the permitted content.
- FIG. 16 shows an example of import right usage right information.
- the playback conditions a period limit and the allowable number of playbacks are set.
- the time limit is There is a setting of “No limit” and a setting of “Limited”. If there is a limit, the content playback allowable start time and end time are set.
- the allowable number of times of reproduction includes a setting of “no limit” and a setting of “with restriction”. If there is a limit, the permitted number of times of content reproduction is set.
- This value is updated in the usage right information interpretation module in the user device when the content playback process is executed, and after one playback process is executed, the allowable number is reduced by one.
- the type (category) of the device permitted for the check and the allowable number of the check are set.
- the device type (category) is set as flag information capable of identifying the device type.
- the use right information interpretation module in the user device such as a PC determines the flag information and determines whether or not the model is a checkout allowable model. Checkout is executed only when the model is a checkout allowable model.
- the number of permitted check-outs includes a setting of "no limit" and a setting of "limited”. If there is a limit, the number of allowed content checkouts is set.
- the maximum number of checks is the number of portable media (PM) that can use the content at the same time.
- Portable media (PM) is a recording medium that can be used in portable devices such as flash memory or small HD, optical disk, magneto-optical disk, and MD (Mini Disk).
- the usage right information is verified in the usage right information interpretation module in the user device such as a PC, and if the allowable number of checkouts is "limited", the checkout is allowed only if the number is within the limited number. This numerical value is updated in the usage right information interpretation module in the user device at the time of executing the checkout process, and the allowable number is reduced by one after executing the checkout once. Also, a process to increase the allowable number is performed by the check-in process. Further, as the conditions for creating the CD-R, the types (categories) of devices permitted to create the CD-R and the allowable number of times of creating the CD-R are set. The device type (category) is set as flag information capable of identifying the device type. The use right information interpretation module in the user device such as a PC determines the plug information and determines whether or not the model is a CD-R creation allowable model. Executable.
- the allowable number of CD-R creations includes “Unlimited J” setting and “Limited” setting. If there is a limitation, the allowable number of CD-R creations is set.
- the usage right information is verified by the usage right information interpretation module in the user device such as a PC, and if the CD-R creation permitted number of times is "limited", CD-R creation is allowed only if the number of times is within the limited number. Is done. This value is updated in the usage right information interpretation module in the user device when the CD-R creation process is executed, and after one CD-R creation, the permissible number is reduced by one.
- step S101 when an information recording medium such as a CD is set, a content list is displayed on the display of the information processing apparatus according to a start-up program.
- the display screen displays a GUI such as a button that allows the user to select whether or not to execute the process applying the license. If the user does not select the processing applying the usage right information (license) in step S102, the bundle stored in the second session of the information recording medium is determined in step S111. The content is sequentially reproduced by the player.
- This content playback is a process of directly playing back information from the information recording medium, and the encrypted content is automatically decrypted and automatically played back according to the processing program of the bundle player.
- step S102 when the user selects the use right information (license) use process, in step S103, the user selects the license-based content reproduction process or the license-based content import process. Is determined. This is executed as a process of interpreting the use conditions specified in the use right information (license) in the use right information interpretation module in the user device. If the user selects the content reproduction processing based on the usage right information (license), the process proceeds to step S104, and the content reproduction is permitted based on the usage right of the license corresponding to the content (see FIG. 15).
- step S105 verifies the conditions set in the usage conditions, such as whether it is within the usage period of the content or the number of times the content can be reproduced. If it is determined in step S105 that the reproduction use condition has not been cleared, the process ends without executing the content reproduction. If it is determined in step S105 that the reproduction use condition has been cleared, in step S106, the content key acquisition process and the decryption process of the encrypted content based on the acquired content key are performed. Then, in step S107, content reproduction is performed. In step S103, if the process specified by the user is the content import process based on the usage right information (license), the process proceeds to step S121, where the usage right information of the license corresponding to the content (FIG.
- step S122 it is determined whether or not content import is allowed based on 15). In this case, since it is an import of the encrypted content of the information recording medium and an offline import, it is determined whether or not the offline import is permitted. If it is determined in step S122 that the import condition has not been cleared, the process ends without executing the content import. If it is determined in step S122 that the import condition has been cleared, in step S123, the content corresponding to the encrypted content and the encrypted content stored in the second session of the information recording medium is corresponded. Store usage right information (license) on the user device (PC, etc.). This import license stores the usage right information described above with reference to FIG. The imported content is used after judging whether or not it can be used based on the imported usage right information (license).
- step S201 a content list is displayed on the display of the information processing device according to the start program.
- the display screen displays a GUI such as a button that allows the user to select whether or not to execute the process to which the license is applied.
- step S202 when the user specifies the content and selects the import process, in step S203, it is determined whether the usage right information (license) corresponding to the content is stored in the information recording medium. Search for If the usage right information (license) is stored, the process proceeds to step S204, and the description of the usage right information (license), that is, the off-line port is allowed in the usage condition (see FIG. 15). Is determined. If the offline import is permitted, the encrypted content and the license are imported together in step S205. This processing is the same as the processing described with reference to FIG.
- step S203 when the usage right information (license) corresponding to the content is not stored in the information recording medium, or in step S204, the offline condition is used as the usage condition described in the usage right information (license). If the import is not permitted, go to step S211. In step S 211, PID (Postscribed—ID) verification processing is executed.
- PID Postscribed—ID
- the PID has media ID and other data as unique identification data for each disk, and a MAC as a falsification verification code is added to each data.
- the usage right information interpretation module in the user device newly calculates a MAC based on the data in the PID, and performs a comparison with the stored MAC. If the calculated MAC and the stored MAC match, it is determined that the PID data has not been tampered with, and PID verification is established (step S212: yes). If the calculated MAC and the stored MAC do not match (step S212: No), it is determined that the PID data has been falsified, and the process ends without executing the import.
- step S213 only the encrypted content is imported from the information recording medium. Further, in step S2114, a connection is made to the license provider.
- the information storage medium supports the license provider's URL (Uniform Resource Locator) capability S and content required for license acquisition The user connects to the license provider based on the URL.
- step S215 a license corresponding to the content is obtained from the license provider. The content use conditions described above with reference to FIG. 16 are also set in this acquired license.
- step S216 the acquired license is downloaded and stored in a recording medium such as a hard disk of a user device (PC or the like) in association with the encrypted content previously imported from the information recording medium.
- the PID ′ verification processing executed in step S211 and step S212 can be omitted.
- the configuration may be such that the PID verification is executed on the license provider side. That is, after the connection process with the license provider in step S2114, the user device transmits the PID read from the information recording medium to the license provider, performs MAC verification in the license provider, and checks whether there is tampering. Is determined.
- the license provider may hold a list of valid or invalid PIDs and execute processing to confirm the validity of the received PID. If the license provider determines that the PID has been tampered with, or if it is determined that the PID is not valid based on the list, it will cancel the issuance of the license corresponding to the import content.
- the service provider executes the management of the number of times of import processing from an information recording medium such as a CD having the same PID by transmitting a PID from the user's information processing device to the service provider. It may be configured to perform a charging process according to the import process.
- the encrypted content stored on the information recording medium includes a mode in which the license for which the use conditions are set is stored together and a mode in which the license is not stored, and the license is stored in the information recording medium. If so, import the license directly from the information recording medium and use the imported content based on the import license.
- the license is obtained from the license provider, stored in association with the imported content, and obtained from the license provider. Use the imported content based on the license you have provided.
- the basic procedure of content playback processing will be described with reference to FIG. From the second data storage area (second session) 450 of the information recording medium shown in FIG. 1, the content file 451 containing the encrypted content and the license 452 containing the usage right information are read, and the usage right information ( The license key) and the encryption key information 452 are applied to execute the decryption processing of the encrypted content in the content file 451.
- the content included in the content file 45 1 is encrypted by the content key: K c (E nc (K c, Content)), and the content key K c is a root key that can be obtained from the EKB. Key obtained from K root.
- a device node key (DNK) is obtained from the service data in the license, the EKB of the content file is decrypted based on the obtained DNK, and a root key: K root is obtained. Further, using the obtained root key: K root, the content key: K c is obtained by decrypting Enc (K root, K c), and the obtained content key: K c is used to encrypt the content: E Performs decryption processing of nc (K c, Content) to acquire and reproduce the content.
- nc K c, Content
- FIG. 20 is a diagram illustrating a content use processing sequence based on decryption processing of content to which EKB [ ⁇ (H)] for hardware and EKB [E KB (S)] for service are applied.
- the encrypted content file 474, service data 473 including encryption key information, and usage right information (license) 475 shown in FIG. 20 are stored in the second data storage area (second session) of the information recording medium.
- the service data 473 is a leaf ID as a leaf identifier, the version of the EKB to be applied, and the service-compatible device node key (SDNK) required to decrypt the service-compatible EKB [EKB (S)].
- SDNK service-compatible device node key
- the encrypted content file 474 is a service-compatible EKB [E KB (S)] that stores the root key K root that is set corresponding to the service-compatible category, and the content ID (CID) is stored in the root key K root.
- the data E (K root, CID + K c), which is encrypted with the content key (K c) applied to the content decoding and decryption processing, and the content (Content) are encrypted with the content key K c This is a file containing the converted data E (K c, Contet).
- the usage right information 475 is data storing a leaf ID and content usage condition information.
- the content usage condition information includes various usage conditions, such as a usage period, the number of times of use, and copy restrictions set for the content.
- the user device receiving the usage right information 4 7 5 sends the usage right information to the content. Either store it as corresponding security information, or store it as content index data in the AV index file set on the playback device (PC, etc.).
- the user device applies the hardware-compatible device node key (HDNK) 472 to the hardware-compatible EKB (H).
- HDNK hardware-compatible device node key
- the decryption processing of 471 is executed, and the root key Kroot 'set corresponding to the hardware-compatible category is obtained from the EKB (H) 471.
- the processing of EKB to which DNK is applied follows the method described above with reference to FIG. Next, in step S12, using the root key Kroot 'extracted from EKB (H), the encrypted data E (Kroot',
- step S13 the service-compatible EKB [EKB (S)] stored in the encrypted content file 474 is processed (decrypted) using the device node key (S DNK) extracted from the service data. ) To obtain the root key K root set for the service-compatible category tree stored in the service-compatible EKB [EKB (S)].
- step S 14 using the root key K root extracted from the service-compatible EKB [EKB (S)], the encrypted data E (K root, CID + The content ID (CID) and the content key (Kc) are obtained by executing the decryption process of Kc).
- step S15 a matching process is performed between the content ID (CID) extracted from the encrypted content file 474 and the content ID stored in the usage right information. By matching process, contents When it is confirmed that the content can be used, in step S16, the content key (Kc) extracted from the encrypted content file 474 is applied and stored in the encrypted content file 474.
- the decrypted encrypted content E (Kc, Content) is decrypted and the content is reproduced.
- the hardware corresponding EKB [EKB (H)] as the EKB corresponding to the category set according to the hardware as the content using device, and the category tree set according to the content using service Provide EKB [EKB (S)] service to users individually as an EKB corresponding to EKB, and only users with valid DNK for each EKB can use the service It becomes.
- the SDNK is stored as service data 473 corresponding to the content in the second session of the information recording medium shown in FIG. Can be obtained from the information recording medium.
- the S DNK is encrypted using a legal hardware compatible DNK; that is, a root key set in accordance with a hardware compatible category tree that can be acquired only by devices with HDNK. By doing so, only the user device that has a valid HDNK can acquire the SDNK and use the service.
- the configuration is such that a matching process is performed between the content identifier (CID) obtained from the encrypted content file 474 and the CID obtained from the usage right information, so that the usage right information 4 7 Acquiring 5 and storing the CID information can be an essential requirement for the content playback process, and content usage according to usage conditions is realized.
- the CPU (Central Processing Unit) 501 stores various programs stored in a ROM (Read Only Memory) 502, or is stored in a storage unit 508, and is stored in a RAM (Random Access Memory) 503. Executes various processes according to the loaded program.
- the timer 500 performs timing processing, and supplies clock information to the CPU 501.
- a ROM (Read Only Memory) 502 stores a program used by the CPU 501, calculation parameters, fixed data, and the like.
- a RAM (Random Access Memory) 503 stores a program used in the execution of the CPU 501, parameters that change as appropriate in the execution, and the like. These elements are interconnected by a bus 5 11.
- the encryption / decryption unit 504 performs signal processing of communication data or content, application processing of a device node key (DNK), and application processing of an effective key block (EKB: Enabling Key Block). (Data Encryption Standard) encryption processing, MAC generation, verification processing, etc. In addition, it performs various encryption processes such as authentication and session key sharing when transmitting and receiving various data such as license information executed with another connected device.
- the codec unit 505 executes various types of data encoding processing and decoding processing such as ATRAC (Adaptive Transform Acoustic Coding) 3 system, MPEG, JPEG system, and the like.
- the data to be processed is input from the removable storage medium 521 via the bus 511, the input / output interface 511, the drive 510, or the communication unit 509.
- the processed data is stored in the removable storage medium 521, or output via the communication unit 509, as necessary.
- the input / output interface 512 includes an input unit 506 such as a keyboard and a mouse, an output unit 507 including a display such as a CRT and an LCD, a speaker, a storage unit 508 such as a hard disk, a modem, and a terminal.
- a communication unit 509 constituted by an adapter or the like is connected to perform data transmission / reception via a communication network such as the Internet.
- the program can be stored on removable recording media such as flexi-punore disks, CD-ROM (Compact Disk Read Only Memory), MO (Magneto optical) disks, DVDs (Digital Versatile Disks), magnetic disks, and semiconductor memories. It can be stored (recorded) temporarily or permanently. Such a removable recording medium can be provided as so-called package software. It should be noted that the program is stored in a removable storage medium as described above. In addition to installing it on a computer, it can be wirelessly transferred from a download site to a computer, or transferred to a computer via a network such as a LAN (Local Area Network) or the Internet, and then transferred to the computer as such.
- LAN Local Area Network
- an information recording medium such as a CD stores an encrypted content file containing the encrypted content
- the user can connect to the license provider and obtain the license (right to use) together with the content from the information recording medium without acquiring the license (license right).
- the license (use right information) and key information necessary for decrypting the content can be obtained.
- the configuration of the present invention in the information processing apparatus that uses the information recording medium storing the encrypted content, when the encrypted content is imported to storage means such as a hard disk in the information processing apparatus, As corresponding usage right information, usage right information describing usage conditions for the content after the import is set and stored in a storage means such as a hard disk. The content usage will be restricted according to the usage right information imported along with the As for content, the use of content based on an accurate license is realized.
- media identification data PID: Post scribed-ID
- PID Post scribed-ID
- PID verification By granting usage permission on the condition that this is the case, more advanced content usage management becomes possible.
- the encrypted content file stored in the information recording medium can be stored in an encrypted content file, an encrypted content key as encrypted data of a content key as a decryption key of the encrypted content, and Encrypting key information stored in an information recording medium as a file containing an enabling key block (EKB) as an encryption key data from which a key applicable to decrypting an encrypted content key can be obtained.
- EKB enabling key block
- the information recording medium includes an encrypted content file that can be used based on a usage right confirmation process according to the usage right information stored in the information recording medium, It is configured to include a plurality of different encrypted content files from the encrypted content file that can be used based on the usage right confirmation processing according to the usage right information that can be obtained from the license provider without being stored on the medium.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04717887A EP1498819A4 (en) | 2003-03-24 | 2004-03-05 | INFORMATION RECORDING MEDIUM, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, COMPUTER PROGRAM |
US10/515,271 US7734047B2 (en) | 2003-03-24 | 2004-03-05 | Information recording medium, information processing device, information processing method, and computer program |
US12/801,101 US8712048B2 (en) | 2003-03-24 | 2010-05-21 | Information recording medium and information processing method for accessing content with license or copyright protection |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003079827A JP3788438B2 (ja) | 2003-03-24 | 2003-03-24 | 情報記録媒体、情報処理装置、および情報処理方法、並びにコンピュータ・プログラム |
JP2003-079827 | 2003-03-24 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10515271 A-371-Of-International | 2004-03-05 | ||
US12/801,101 Continuation US8712048B2 (en) | 2003-03-24 | 2010-05-21 | Information recording medium and information processing method for accessing content with license or copyright protection |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004086231A1 true WO2004086231A1 (ja) | 2004-10-07 |
Family
ID=33094855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/002921 WO2004086231A1 (ja) | 2003-03-24 | 2004-03-05 | 情報記録媒体、情報処理装置、および情報処理方法、並びにコンピュータ・プログラム |
Country Status (7)
Country | Link |
---|---|
US (2) | US7734047B2 (ja) |
EP (1) | EP1498819A4 (ja) |
JP (1) | JP3788438B2 (ja) |
KR (1) | KR100982082B1 (ja) |
CN (1) | CN100409205C (ja) |
TW (1) | TWI242127B (ja) |
WO (1) | WO2004086231A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009011050A1 (ja) * | 2007-07-18 | 2009-01-22 | Pioneer Corporation | 情報記録媒体、並びに情報処理装置及び方法 |
Families Citing this family (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8180681B2 (en) * | 2003-08-05 | 2012-05-15 | Intraware, Inc. | Automated entitlement management method and apparatus for capturing maintenance renewals revenues |
US7958163B2 (en) | 2003-08-05 | 2011-06-07 | Intraware, Inc. | System and method for bulk transfer of digital goods |
US7831515B2 (en) * | 2003-08-05 | 2010-11-09 | Intraware. Inc. | Method and system for subscription-based, entitlement-driven license key generation and distribution for digital goods |
JP4655470B2 (ja) * | 2003-11-18 | 2011-03-23 | ソニー株式会社 | コンテンツデータ処理装置及びコンテンツデータ処理方法、並びにコンテンツデータ管理システム及びコンテンツデータ管理方法 |
US20050278376A1 (en) * | 2004-06-14 | 2005-12-15 | Idt Corporation | Media distribution system, device, and method |
JP4856444B2 (ja) * | 2005-03-07 | 2012-01-18 | 株式会社リコー | 情報処理装置及び情報処理方法 |
JP2006262230A (ja) * | 2005-03-18 | 2006-09-28 | Sony Corp | 情報処理システム、情報解析装置および方法、情報処理装置および方法、並びにプログラム |
US20080195548A1 (en) * | 2005-04-11 | 2008-08-14 | Hyun Gon Chu | License Data Structure and License Issuing Method |
US8832466B1 (en) | 2006-01-27 | 2014-09-09 | Trustwave Holdings, Inc. | Methods for augmentation and interpretation of data objects |
US8612556B2 (en) * | 2006-05-03 | 2013-12-17 | Comcast Cable Holdings, Llc | Method of provisioning network elements |
FR2911026B1 (fr) * | 2006-12-29 | 2009-04-24 | Ubicmedia Soc Par Actions Simp | Procede et dispositif pour controler et gerer les fichiers multimedias compresses et librement telecharges |
EP2009566A1 (en) * | 2007-06-29 | 2008-12-31 | Thomson Licensing | Method and device for exchanging digital content licenses |
US9754625B2 (en) * | 2008-07-31 | 2017-09-05 | Warner Bros. Entertainment Inc. | Generation and use of user-selected scenes playlist from distributed digital content |
JP2011081764A (ja) * | 2009-09-14 | 2011-04-21 | Panasonic Corp | コンテンツ受信機、コンテンツ再生機、コンテンツ再生システム、コンテンツ書き出し方法、視聴期限判定方法、プログラム、および記録媒体 |
US20110066843A1 (en) * | 2009-09-16 | 2011-03-17 | Brent Newman | Mobile media play system and method |
CN102023934B (zh) * | 2009-09-23 | 2013-03-27 | 群联电子股份有限公司 | 数据保护方法与系统、外接式存储装置及存储装置控制器 |
US20110110516A1 (en) * | 2009-11-06 | 2011-05-12 | Kensuke Satoh | Content receiver, content reproducer, management server, content use system, content use method, method of write-out from content receiver, method of possible viewing time management on content reproducer, method of time limit fixation in management server, and program |
US9082127B2 (en) | 2010-03-31 | 2015-07-14 | Cloudera, Inc. | Collecting and aggregating datasets for analysis |
US8874526B2 (en) | 2010-03-31 | 2014-10-28 | Cloudera, Inc. | Dynamically processing an event using an extensible data model |
US9317572B2 (en) | 2010-03-31 | 2016-04-19 | Cloudera, Inc. | Configuring a system to collect and aggregate datasets |
US9081888B2 (en) | 2010-03-31 | 2015-07-14 | Cloudera, Inc. | Collecting and aggregating log data with fault tolerance |
CN102236606B (zh) * | 2010-04-21 | 2014-06-11 | 群联电子股份有限公司 | 数据保护系统及数据保护方法 |
US8788815B1 (en) * | 2011-01-31 | 2014-07-22 | Gazzang, Inc. | System and method for controlling access to decrypted data |
US8880592B2 (en) | 2011-03-31 | 2014-11-04 | Cloudera, Inc. | User interface implementation for partial display update |
JP5747758B2 (ja) * | 2011-09-15 | 2015-07-15 | ソニー株式会社 | 情報処理装置、および情報処理方法、並びにプログラム |
CN102521168A (zh) * | 2011-12-16 | 2012-06-27 | 中颖电子股份有限公司 | 用于存储卡的数据防拷贝方法 |
US9128949B2 (en) | 2012-01-18 | 2015-09-08 | Cloudera, Inc. | Memory allocation buffer for reduction of heap fragmentation |
US9172608B2 (en) | 2012-02-07 | 2015-10-27 | Cloudera, Inc. | Centralized configuration and monitoring of a distributed computing cluster |
US9405692B2 (en) | 2012-03-21 | 2016-08-02 | Cloudera, Inc. | Data processing performance enhancement in a distributed file system |
US9338008B1 (en) | 2012-04-02 | 2016-05-10 | Cloudera, Inc. | System and method for secure release of secret information over a network |
US9842126B2 (en) | 2012-04-20 | 2017-12-12 | Cloudera, Inc. | Automatic repair of corrupt HBases |
US9753954B2 (en) | 2012-09-14 | 2017-09-05 | Cloudera, Inc. | Data node fencing in a distributed file system |
US10223688B2 (en) | 2012-09-24 | 2019-03-05 | Samsung Electronics Co., Ltd. | Competing mobile payment offers |
US9342557B2 (en) | 2013-03-13 | 2016-05-17 | Cloudera, Inc. | Low latency query engine for Apache Hadoop |
US20140279566A1 (en) * | 2013-03-15 | 2014-09-18 | Samsung Electronics Co., Ltd. | Secure mobile payment using media binding |
IN2013CH01202A (ja) | 2013-03-20 | 2015-08-14 | Infosys Ltd | |
CN103440439B (zh) * | 2013-09-05 | 2016-03-30 | 深圳市环球数码科技有限公司 | 一种用于控制数码电影播放次数的方法和系统 |
US9477731B2 (en) | 2013-10-01 | 2016-10-25 | Cloudera, Inc. | Background format optimization for enhanced SQL-like queries in Hadoop |
US9934382B2 (en) | 2013-10-28 | 2018-04-03 | Cloudera, Inc. | Virtual machine image encryption |
US9690671B2 (en) | 2013-11-01 | 2017-06-27 | Cloudera, Inc. | Manifest-based snapshots in distributed computing environments |
US10171635B2 (en) | 2013-12-04 | 2019-01-01 | Cloudera, Inc. | Ensuring properly ordered events in a distributed computing environment |
US9509665B2 (en) * | 2014-08-11 | 2016-11-29 | Alcatel Lucent | Protecting against malicious modification in cryptographic operations |
US9747333B2 (en) | 2014-10-08 | 2017-08-29 | Cloudera, Inc. | Querying operating system state on multiple machines declaratively |
US20160350544A1 (en) * | 2014-10-22 | 2016-12-01 | Sze Yuen Wong | Methods And Apparatus For Sharing Encrypted Data |
US10120904B2 (en) | 2014-12-31 | 2018-11-06 | Cloudera, Inc. | Resource management in a distributed computing environment |
KR102654259B1 (ko) * | 2023-08-14 | 2024-04-04 | 광운대학교 산학협력단 | 온라인 및 오프라인 유통을 위한 암호화 기반 콘텐츠 서비스 시스템 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002215465A (ja) * | 2001-01-16 | 2002-08-02 | Sony Corp | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム記憶媒体 |
JP2003045116A (ja) * | 2001-07-31 | 2003-02-14 | Sony Corp | データ再生方法および装置、並びにデータ記録再生装置および方法 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69536139D1 (de) * | 1994-11-17 | 2011-03-24 | Panasonic Corp | Optische Platte und Verfahren zur Wiedergabe von Daten von einer optischen Platte |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
JPH08185444A (ja) | 1994-12-28 | 1996-07-16 | Fujitsu Ltd | ソフトウエア販売管理方法及びシステム |
US6807534B1 (en) * | 1995-10-13 | 2004-10-19 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
JP3093678B2 (ja) * | 1996-06-28 | 2000-10-03 | 株式会社東芝 | 暗号化方法、復号方法、記録再生装置、復号装置、復号化ユニット装置及び記録媒体の製造方法 |
US6047292A (en) * | 1996-09-12 | 2000-04-04 | Cdknet, L.L.C. | Digitally encoded recording medium |
KR100484209B1 (ko) * | 1998-09-24 | 2005-09-30 | 삼성전자주식회사 | 디지털컨텐트암호화/해독화장치및그방법 |
US7073063B2 (en) * | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
JP3471654B2 (ja) * | 1999-04-06 | 2003-12-02 | 富士通株式会社 | ライセンスサーバ、著作権者システム、利用者システム、システム、記録媒体およびコンテンツ利用制御方法 |
CN1192381C (zh) * | 1999-04-14 | 2005-03-09 | 松下电器产业株式会社 | 数据管理装置以及数据管理方法 |
US6898708B2 (en) * | 1999-12-07 | 2005-05-24 | Sanyo Electric Co., Ltd. | Device for reproducing data |
US20010032312A1 (en) * | 2000-03-06 | 2001-10-18 | Davor Runje | System and method for secure electronic digital rights management, secure transaction management and content distribution |
US20020059144A1 (en) * | 2000-04-28 | 2002-05-16 | Meffert Gregory J. | Secured content delivery system and method |
US7266704B2 (en) * | 2000-12-18 | 2007-09-04 | Digimarc Corporation | User-friendly rights management systems and methods |
US6912634B2 (en) * | 2000-12-28 | 2005-06-28 | Intel Corporation | Verifying the integrity of a media key block by storing validation data in a validation area of media |
US7039803B2 (en) * | 2001-01-26 | 2006-05-02 | International Business Machines Corporation | Method for broadcast encryption and key revocation of stateless receivers |
JP2002324349A (ja) | 2001-04-26 | 2002-11-08 | Sony Corp | 情報配信方法、情報配信システムおよび情報配信装置 |
US20030002671A1 (en) * | 2001-06-11 | 2003-01-02 | Eastman Kodak Company | Delivery of electronic content over a network using a hybrid optical disk for authentication |
JP4149150B2 (ja) * | 2001-08-15 | 2008-09-10 | 富士通株式会社 | ライセンスのオフライン環境下における送信流通システム及び送信流通方法 |
US20050021398A1 (en) * | 2001-11-21 | 2005-01-27 | Webhound Corporation | Method and system for downloading digital content over a network |
DE10163354A1 (de) | 2001-12-21 | 2003-07-03 | Leica Microsystems | Vorrichtung zum Halten einer optischen Betrachtungseinrichtung |
CN1332278C (zh) * | 2002-03-28 | 2007-08-15 | 皇家飞利浦电子股份有限公司 | 撤销或授权屏蔽内容材料的方法和设备 |
US7644446B2 (en) * | 2003-10-23 | 2010-01-05 | Microsoft Corporation | Encryption and data-protection for content on portable medium |
-
2003
- 2003-03-24 JP JP2003079827A patent/JP3788438B2/ja not_active Expired - Fee Related
-
2004
- 2004-01-28 TW TW093101876A patent/TWI242127B/zh not_active IP Right Cessation
- 2004-03-05 WO PCT/JP2004/002921 patent/WO2004086231A1/ja active Application Filing
- 2004-03-05 EP EP04717887A patent/EP1498819A4/en not_active Withdrawn
- 2004-03-05 US US10/515,271 patent/US7734047B2/en not_active Expired - Fee Related
- 2004-03-05 KR KR1020047018913A patent/KR100982082B1/ko not_active IP Right Cessation
- 2004-03-05 CN CNB2004800003790A patent/CN100409205C/zh not_active Expired - Fee Related
-
2010
- 2010-05-21 US US12/801,101 patent/US8712048B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002215465A (ja) * | 2001-01-16 | 2002-08-02 | Sony Corp | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム記憶媒体 |
EP1265396A1 (en) | 2001-01-16 | 2002-12-11 | Sony Corporation | Apparatus and method for recording/reproducing information |
JP2003045116A (ja) * | 2001-07-31 | 2003-02-14 | Sony Corp | データ再生方法および装置、並びにデータ記録再生装置および方法 |
Non-Patent Citations (2)
Title |
---|
"Press release CD-ROM disc eno kobetsu joho kiroku o kano ni suru 'Postscribed IDtm' gijutsu o kaihatsu", SONY CORP., 29 May 2002 (2002-05-29), XP002982531, Retrieved from the Internet <URL:http://www.sony.co.jp/Sonyinfo/News/Press/200205/02-021/> [retrieved on 20040527] * |
See also references of EP1498819A4 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009011050A1 (ja) * | 2007-07-18 | 2009-01-22 | Pioneer Corporation | 情報記録媒体、並びに情報処理装置及び方法 |
Also Published As
Publication number | Publication date |
---|---|
TW200419356A (en) | 2004-10-01 |
CN1698040A (zh) | 2005-11-16 |
US20060080742A1 (en) | 2006-04-13 |
EP1498819A4 (en) | 2008-03-05 |
US20100296652A1 (en) | 2010-11-25 |
US8712048B2 (en) | 2014-04-29 |
JP3788438B2 (ja) | 2006-06-21 |
CN100409205C (zh) | 2008-08-06 |
EP1498819A1 (en) | 2005-01-19 |
KR20050116106A (ko) | 2005-12-09 |
TWI242127B (en) | 2005-10-21 |
KR100982082B1 (ko) | 2010-09-13 |
US7734047B2 (en) | 2010-06-08 |
JP2004287910A (ja) | 2004-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2004086231A1 (ja) | 情報記録媒体、情報処理装置、および情報処理方法、並びにコンピュータ・プログラム | |
KR101028176B1 (ko) | 정보 기록 매체, 정보 처리 장치, 정보 처리 방법, 및 컴퓨터 프로그램을 기록한 컴퓨터 판독가능 기록 매체 | |
US20050015343A1 (en) | License management device, license management method, and computer program | |
US8090102B2 (en) | Information processing device, information processing method, and computer program | |
JP4760101B2 (ja) | コンテンツ提供システム,コンテンツ再生装置,プログラム,およびコンテンツ再生方法 | |
US7260721B2 (en) | Information processing method, information processing apparatus and recording medium | |
US20040025058A1 (en) | Information processing apparatus, information processing method, and computer program used therewith | |
WO2003088114A1 (fr) | Dispositif et procede de traitement d'informations, support de programme et programme | |
WO2002087147A1 (fr) | Dispositif et procede d'enregistrement/de reproduction d'informations | |
US7503077B2 (en) | Method, storage medium, and apparatus to prevent use or distribution of unauthorized copies of storage medium contents | |
JP4192499B2 (ja) | 情報処理装置、情報処理方法、およびコンテンツ入出力処理システム、コンテンツ入出力処理方法、並びにコンピュータ・プログラム | |
JP4479698B2 (ja) | コンテンツ提供システム | |
JP2004054745A (ja) | 情報処理装置、および二次配信コンテンツ生成方法、情報処理方法、並びにコンピュータ・プログラム | |
WO2017038493A1 (ja) | 情報処理装置、および情報処理方法、並びにプログラム | |
WO2017038492A1 (ja) | 情報処理装置、および情報処理方法、並びにプログラム | |
JP2007306094A (ja) | 端末装置、記録媒体、サーバー及びコンテンツの課金方法 | |
KR20050116786A (ko) | 디지털 컨텐츠의 보안 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004717887 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020047018913 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 20048003790 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2004717887 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2006080742 Country of ref document: US Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10515271 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1020047018913 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 10515271 Country of ref document: US |