WO2004100443A1 - Information management system - Google Patents

Information management system Download PDF

Info

Publication number
WO2004100443A1
WO2004100443A1 PCT/JP2003/005844 JP0305844W WO2004100443A1 WO 2004100443 A1 WO2004100443 A1 WO 2004100443A1 JP 0305844 W JP0305844 W JP 0305844W WO 2004100443 A1 WO2004100443 A1 WO 2004100443A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
common key
terminal device
content execution
content
Prior art date
Application number
PCT/JP2003/005844
Other languages
French (fr)
Japanese (ja)
Inventor
Yukitoshi Maeda
Original Assignee
Stark Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Stark Co., Ltd. filed Critical Stark Co., Ltd.
Priority to AU2003235920A priority Critical patent/AU2003235920A1/en
Priority to PCT/JP2003/005844 priority patent/WO2004100443A1/en
Publication of WO2004100443A1 publication Critical patent/WO2004100443A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the present invention provides a server device that transmits content and content execution information relating to the execution of the content, and an encryption key (a common key scheme) for distributing the information secretly between terminal devices that receive the content and information. (A common key).
  • encryption technology keys used to keep information confidential (a common key method is common) or the information generated by the key is transmitted between the information sending side and the receiving side through a communication network or the like. They were trying to share between the two by interacting through. For example, there are the following conventional technologies.
  • the client has a common key of the common key method used for encrypting information and a public key of the public key method (corresponding to the secret key of the server) for encrypting the common key.
  • the common key is encrypted with the public key and transmitted to the server
  • the server decrypts the common key encrypted with the public key with its own private key, which allows the server and the client to share the common key. After that, information encrypted with the common key is exchanged with a server and a client (Japanese Patent Application Laid-Open No. 2002-305515).
  • the present invention provides a common key shared between a sender and a receiver of information without transmitting and receiving the common key between the sender and the receiver of the information. Provide a mechanism that can be easily changed.
  • the present invention utilizes an information management system or the like including a server device for transmitting content and content execution information relating to execution of the content, and a terminal device for receiving the server and the terminal device.
  • the common key shared in the system of the present invention is mainly for protecting the content execution information.
  • the server device and the terminal device have the same usage condition information.
  • the usage condition information is information relating to any one or more of the number of usages of the content, the usage period, the usage period, and the content ID that are allowed for the terminal device, that is, information indicating a range in which the execution of the content is allowed.
  • the method by which the server device and the terminal device first have the same usage condition information does not matter.
  • the server and terminal share a common key by the following mechanism. First, the server device and the terminal device share each other based on the usage condition information. Generate a passkey. As described above, since the server device and the terminal device share the usage condition information, a corresponding common key is generated for each.
  • the common key can be shared between the server device and the terminal device.
  • the present invention further updates the usage condition information in each of the server device and the terminal device so that the server device and the terminal device have the same usage condition information even after the update.
  • This is characterized in that a shared key newly generated based on the updated usage condition information can be shared between the server device and the terminal device.
  • Update of usage condition information is performed as follows.
  • the server device encrypts the content execution information, which is information relating to the execution of the content executed by the terminal device, using the common key generated by itself, and transmits the encrypted content execution information to the terminal device. Further, the server device updates its own use condition information based on the content execution information.
  • the terminal device receives the encrypted content execution information transmitted from the server device, decrypts the content execution information with the common key generated based on the usage condition information (before updating) as described above, and executes the content execution information. Get. Then, the terminal device updates its own use condition information based on the decrypted content execution information. Since the server device and the terminal device update their own usage condition information based on the same content execution information, the updated usage condition information is also the same. Therefore, even when the server device and the terminal device newly generate a common key based on the updated usage condition information, respectively, the generated common key corresponds to the server device and the terminal device, and the shared key is generated between the two devices. Can share a common key. BRIEF DESCRIPTION OF THE FIGURES
  • FIG. 1 is a diagram illustrating an example of the concept of the embodiment.
  • FIG. 2 is a diagram illustrating an example of the configuration of the embodiment.
  • Figure 3 shows an example of updating the usage condition information based on the content execution information. It is a figure showing an example of an example.
  • FIG. 4 is a diagram illustrating an example of a processing flow according to the embodiment.
  • FIG. 5 is a diagram illustrating an example of the configuration of the embodiment.
  • FIG. 6 is a diagram illustrating an example of content execution information used in the embodiment. BEST MODE FOR CARRYING OUT THE INVENTION
  • FIG. 1 is a diagram showing an example of the concept of the present invention. An example of the concept of the present invention will be described with reference to FIG.
  • the present invention relates to a key (common key) used for encrypting and decrypting the content execution information and the like in a system including a server device that transmits the content and the content execution information and a terminal device that receives the content and the content execution information. ) Is shared between the server device and the terminal device.
  • the server device and the terminal device shared usage condition information A.
  • the usage condition information is information relating to one or more of the number of usages, the usage expiration date, the usage period, and the content ID in which the terminal device is allowed to execute the content.
  • the content could not be executed only with this usage condition information, and content execution information regarding the execution of the content was required for each individual content. Therefore, the terminal device requested the super device to deliver the content execution information A.
  • the server generates a common key A of the common key system based on the usage condition information A shared with the terminal, and transmits the encrypted content execution information A obtained by encrypting the content execution information A to the terminal. .
  • the terminal device received the encrypted content execution information A and generated a common key A based on the usage condition information A shared with the server device. Server as described above Since the device also generated the common key A based on the same usage condition information A, the server device and the terminal device could share the common key A. Then, the terminal device decrypts the encrypted content execution information A with the common key A.
  • the server device updates its own use condition information A to use condition information B based on the content execution information A that has been encrypted.
  • the usage condition information A was managed based on the content execution information A.
  • the terminal device also updates its own use condition information A to use condition information B based on the decrypted content execution information A.
  • the usage condition information A was managed based on the content execution information A in the same manner as the server device.
  • the terminal device requested the server device to deliver the content execution information B relating to the execution of another content.
  • the server device encrypted the content execution information B with the common key B generated based on the updated usage condition information B and transmitted it to the terminal device.
  • the terminal device also generated a common key B based on the updated usage condition information B.
  • the server device and the terminal device could share the common key B.
  • the common key B or the generated information of the common key B was not transmitted and received between the server device and the terminal device.
  • FIG. 2 is a diagram illustrating an example of a functional block according to the present embodiment. An example of the configuration of the present embodiment will be described with reference to FIG.
  • the present embodiment is an information management system including a server device 0200 and a terminal device 0210. '
  • Server device 0 2 0 0 is a server device side use condition information management unit 0 2 0 1, a server-side common key generation unit 202, an encryption unit 202, and a transmission unit 204.
  • the “server device usage condition information management unit 0 201” associates the terminal device 0 210 with the number of times of use of content, the usage period, the usage period, Use condition information, which is information about one or more of the content IDs, is managed based on the content rate information, which is information about the execution of content.
  • “Managing usage condition information based on content execution information” means that the present embodiment mainly updates usage condition information based on content execution information. For example, as shown in the figure, the use condition information A is updated to the use condition information B based on the content execution information.
  • the “usage condition information” is information relating to any one or more of the number of times of use, the expiration date, the usage period, and the content ID permitted for the terminal device 0210.
  • the use condition information indicates a range in which the content execution is permitted in the terminal device 0 210, but the content cannot be executed only by the terminal device 0 210 having this use condition information.
  • content execution information is required.
  • the usage condition information may be, for example, information indicating that the number of times the content is allowed to be used by the terminal device 210 is 10 times. Further, the usage condition information may be, for example, information obtained by converting the number of times of use and the like into points.
  • This usage condition information has the same contents in the server-side usage condition information management unit 0201 and the terminal device-side usage condition information management unit 0221 of the terminal device 210 described later. Prerequisite, that is, sharing. First, share the usage condition information.
  • the same usage condition information may be input to the server device 0210 and the terminal device 0200 without passing through the communication network, or the communication network may be connected from one to the other. May be transmitted via the Internet.
  • the use condition information is updated on each device based on the same content execution information. Be managed. Therefore, the updated usage condition information is not transmitted / received between the server device 0200 and the terminal device 0210, and the server device-side usage condition information management unit 0201 and the terminal device 201 are not transmitted / received. It is shared by the device side use condition information management unit 0 2 1 1. In other words, it can be said that the usage condition information is synchronized without using communication.
  • the use condition information is also used for generating a common key, as described later.
  • Content execution information is information relating to the execution of content executed by the terminal device. As described above, content execution information is required to execute content on a terminal device. The terminal device can execute the content based on the content execution information within the “permitted range of content execution” indicated by the usage condition information. Specifically, the content execution information may include a content ID of a specific content, an execution file of the content associated with the content ID, and the like. The content ID may be managed in a server device and a terminal device to be described later by a table configured to be associated with information on what content should be used to update the usage condition information. .
  • FIG. 3 is a diagram illustrating an example in which the usage condition information is similarly updated in each of the server device and the terminal device based on the content execution information.
  • the usage condition information is converted into a point
  • the content execution information includes a content ID associated with a point required to execute the content.
  • Figure A is included in the content execution information. This is an example of a table configured by associating a content ID to be executed with a point required for executing the content specified by the content ID. As shown in FIG. A, the content ID “001” of the movie A is managed in association with the point “3 points” required for executing the content of the movie A.
  • the content ID “002” of document B is managed in association with a point “2 points” required for executing the content of the document.
  • the content ID “003” of the content of the sport C is managed in association with the point “1 point” required for executing the content of the sport C. In this case, based on the content ID included in the content execution information, a point required for executing the content in the server device and a terminal device described later is specified.
  • Figure B shows that the usage condition information “100 points” first shared by the server device and the terminal device is necessary for the execution of specific content because they are registered in the server device and the terminal device.
  • the content execution information includes the content ID. Therefore, if the server device and the terminal device acquire the same content execution information, etc., the same "point required for content execution" can be specified in both devices based on the table shown in Fig. A. Can be done. Then, based on the specified “points required for executing the content”, the server device and the terminal device can update the usage condition information points and can share the updated usage condition information points.
  • the server device and the terminal For example, based on the content execution information including the content ID “001” of movie A, three points are required to execute the content of movie A, and the server device and the terminal The point of the usage condition information of the device is updated from the first shared point of 100 to 97 points (update point A;). Furthermore, based on the content execution information including the content ID “002” of documentary B. In this case, the number of bytes required to execute the contents of the document is 2 points, and the usage condition information of the super-unit and the terminal device is from the updated 97 points mentioned above. The content is updated to 95 points (updated point B) t In addition , if the content execution information including the content ID “003” of sports C is included, the sports content is executed. The required point is one point, and the usage condition information of the server device and the terminal device is updated from 95 points after the above-mentioned update to 94 points (update) Point C).
  • the “server device-side common key generation unit 0202” generates a common key based on the use condition information. For example, as shown in the figure, a common key is generated based on the usage condition information A managed by the server-side usage condition information management unit 0201. After the usage rule information A is updated to the usage rule information B in the server side usage rule information management unit 0201, a common key is generated based on the updated usage rule information B. In this case, the common key generated based on usage condition information A is different from the common key generated based on usage condition information B. In other words, if the usage condition information is different, the generated common key is also different.
  • the generation of the common key based on the usage condition information can be realized by calculating using a function with a numerical value or the like indicated by the usage condition information as an initial value. That is, the calculation result is used as a common key.
  • This common key is a key for encrypting and decrypting information in the common key cryptography.
  • the public key used for information encryption must be transmitted and received between the information transmitting side and the information receiving side. Therefore, the public key is used as a key to secure the secret for decryption. The key may be compromised.
  • the common key is generated based on the use condition information shared by the server device and the terminal device described later and updated with the same content.
  • the common key can be transferred between the server and the terminal.
  • the common key can be shared without transmitting and receiving to and from the device, and there is no risk of unauthorized decryption unlike the public key method.
  • the invention of the present application uses the usage condition information originally used for allowing the execution of the content also for generating the common key, so that the information necessary only for generating the common key is transmitted to the server device and the terminal. There is no need to send and receive between devices. That is, the amount of information transmitted and received between the server device and the terminal device can be reduced.
  • the server device and the terminal device share a common key does not only mean that the server device and the terminal device hold the same common key when they are the same.
  • “a server device and a terminal device share a common key” means that information encrypted by one device is replaced by a key corresponding to the key used for encryption by the other device.
  • the server device side use condition information management unit 0201 and the terminal device side use condition information management unit 0221 share the use condition information first. Accordingly, the common key generated by the server-side common key generation unit 0 202 based on the use condition information and the terminal-side common key generation unit 0 2 12 of the terminal device 0 210 described later correspond to each other. I do. In other words, the server device 0200 and the terminal device 0210 can share a common key. Further, as described above, the usage condition information is updated and managed based on the content execution information. Then, as described above, the updated usage condition information is also used by the server-side usage condition information management unit 0 201 of the server device 200 and the terminal-side usage condition information of the terminal device 210.
  • the common key generated by the server-side common key generation unit 0 202 and the terminal-device-side common key generation unit 0 212 based on the updated usage condition information correspond to each other. That is, the server device 0200 and the terminal device 0210 can also share a common key generated based on the updated usage condition information. At this time, a common key generated based on the pre-update usage condition information and a post-update None of the generated common keys are transmitted and received between the server device 0200 and the terminal device 0210.
  • the “encryption unit 0203” encrypts the content execution information using the common key generated by the common key generation unit 0202.
  • the content execution information to be encrypted by the encryption unit 0 203 is specified based on a content execution information distribution request, which is a request for distribution of the content execution information transmitted from the terminal device, as described later. It can be acquired.
  • a common key can be shared without transmitting and receiving between the server device 0200 and the terminal device 0210, so that information can be shared using the common key. It can be safely shared.
  • the information to be securely shared may be “other common key” or the “information for generating another common key”.
  • the problem is that the server device 200 needs to encrypt and transmit the content to each of the terminal devices using a specific common key.
  • the burden becomes a serious problem.
  • the content encrypted with the key can be transmitted and received between the terminal devices. it can. In this case, the load on the server device 200 is reduced.
  • the “other common key” that is common between the server device 0200 and the plurality of terminal devices 0210 is referred to as the server device 0200 and the terminal device 0210.
  • the advantage is that it can be safely shared between
  • the “transmission unit 0 204” transmits the encrypted content execution information encrypted by the encryption unit 0 203.
  • Terminal device 0 2 1 0 '' is composed of a receiving unit 0 2 13, a terminal device side usage condition information management unit 0 2 1 1, a terminal device side common key generation unit 0 2 1 2, and a decryption unit 0 2 1 4. Having.
  • the “receiving unit 0 2 1 3” receives the encrypted content execution information.
  • the “terminal-side use condition information management unit 0 2 1 1” manages the use condition information based on the content execution information.
  • the content execution information is obtained by using a common key generated by a terminal-side common key generation unit 0 2 12 described later.
  • the encrypted content execution information received by the reception unit 0 2 13 is decrypted by a decoding process described later. Are decrypted by the converting unit 0 2 1 4.
  • the use condition information has the same content in the server device use condition information management unit 0201 and the terminal device use condition management unit 0221, that is, it is shared. Is assumed. Further, as described above, the method for sharing the usage condition information first does not matter. Thus, the same usage condition information as the server device Since the usage condition information updated based on the same content execution information is managed on the basis of the above, the transmission and reception of the updated usage condition information is not performed directly between the server device and the terminal device. Can be shared at
  • the “terminal device side common key generation unit 0 2 1 2” generates a common key based on the usage condition information managed by the terminal device side usage condition information management unit 0 2 1 1.
  • the common key is generated based on the use condition information A managed by the terminal device side use condition information management unit 0 211.
  • the usage condition information A is updated to the usage condition information B based on the content execution information by the terminal device side usage condition information management unit 0 2 1 1
  • a common key is generated based on the usage condition information B. I do.
  • the common key generated based on the use condition information A is different from the common key generated based on the use condition information B.
  • the usage condition information managed by the terminal device side usage condition information management unit is shared between the server device 0200 and the terminal device 0210.
  • the common key generated by the common key generation unit 0 2 1 2 corresponds to the common key generated by the server-side common key generation unit 0 2 0 2, and the server device 0 2 0 0 and the terminal The devices 0 210 can share a common key.
  • the “decryption unit 0 2 1 4” uses the common key generated by the terminal-side common key generation unit 0 2 12 to encrypt the encrypted content execution information received by the reception unit 0 2 13. Decrypt and obtain content execution information.
  • the content execution information is information related to content execution, and may include a content ID, a content execution file associated with the content ID, and the like. Therefore, by decoding the content execution information, the terminal device can execute the content specified by the content ID. Further, as described above, the content execution information includes a common key other than the common key generated based on the use condition information or generation information (key generation information) of the other common key. In some cases, the content is encrypted with the other common key.
  • the encrypted content execution information is decrypted with the common key generated by the terminal-side common key generation unit 0 2 12 to obtain the other common key and the like, and the encrypted content execution information is encrypted with the other common key.
  • the content can be decrypted (see Fig. 6).
  • FIG. 4 is a diagram showing an example of the processing flow of the present embodiment. An example of the processing flow of the present embodiment will be described with reference to FIG.
  • the processing shown in the figure can be executed by a program to be executed by a computer (terminal device or the like), and this program must be recorded on a recording medium readable by the computer (terminal device). Can be.
  • Usage condition information which is information relating to one or more of the number of times the content is used, the expiration date, the usage period, and the content ID, which are allowed in the terminal device in association with the terminal device.
  • a common key is generated based on the managed key (server device-side common key generation step S0401).
  • the content execution information is encrypted by using the common key generated in step 0401 (content execution information encryption step S0402). Further, the encrypted content execution information encrypted in step 0402 is transmitted to the terminal device (encrypted content execution information transmission step S0403). Further, the use condition information managed by the server device is managed based on the content execution information that has been encrypted in step 0401 (use condition information management step S04). 0 4).
  • step 0403 receives the encrypted content execution information transmitted in step 0403 (encrypted content execution information receiving step S0405).
  • a common key is generated based on the usage condition information managed by the terminal device (terminal device side common key generation step S0406).
  • the encrypted content execution information received in step 0405 is decrypted using the common key generated in step 0406 to obtain content execution information (content execution information decryption).
  • Conversion step S 0 4 0 7 the use condition information managed by the terminal device is managed based on the content execution information obtained by decoding in the step S 407 (the terminal device side use condition information management step S 0 4 0 8).
  • the content execution information to be encrypted by the encryption unit 0203 is specified based on the content execution information distribution request that is a request for distribution of the content execution information transmitted from the terminal device.
  • a content execution information delivery request receiving unit 0505 is further provided in the server device 0500, and the content execution information delivery unit is provided in the terminal device 0510.
  • a request input section 0 5 15 and a content execution information distribution request transmission section 0 5 16 are further provided.
  • the content execution information distribution request input unit 0 5 15 transmits the content execution information distribution request input from the content execution information distribution request transmission unit 0 5 16, and the content execution information distribution request reception unit Receive with 0 5 0 5.
  • the server device 0500 receives the content execution information distribution request transmitted from the terminal device 0510, and identifies the content execution information based on the content execution information distribution request. can do.
  • a common key (or key generation information) is not transmitted and received between the server device and the terminal device, and the common key is exchanged between the two devices. And easily share a common key shared between both devices. You can change it.
  • the other terminal device cannot generate a common key. This is because, in order to generate a common key, it is necessary to obtain usage condition information possessed by the terminal device that should originally receive the encrypted content execution information.
  • the usage condition information is illegally acquired depending on the method of sharing the usage condition information between the terminal device and the server device first.
  • the usage condition information is first shared by the server device and the terminal device, and then updated by each device based on the content execution information. Then, the updated usage condition information is not transmitted and received between the server device and the terminal device.
  • the use condition information is updated, the updated use condition information is directly obtained from the terminal device illegally, or the first use condition information and all the content execution information used for the update are illegally obtained. Otherwise, the secret key cannot be obtained fraudulently. In the latter case, it is hard to imagine it because a person trying to use the common key illegally must constantly monitor the transmission and reception of information between a specific terminal device and a server device. Therefore, if the present invention is used, the common key can be safely shared between the server device and the terminal device.
  • the invention of the present application originally uses the usage condition information used for executing the content to generate the common key, information necessary only for generating the common key is transmitted between the server device and the terminal device. There is no transmission or reception.

Abstract

It is possible to provide a technique for sharing a common key between an information transmission side and reception side without transmitting/receiving the common key between the information transmission side and the reception side. In order to achieve this object, an information management system used includes a server device for transmitting a content and content execution information associated with execution of the content and a terminal device for receiving these information. The server device and the terminal device respectively generate a common key according to use condition information which is information on the range where content execution is allowed in the terminal device. The use condition information is firstly shared by the server device and the terminal device and then updated and managed by the both devices according to the content execution information transmitted/received between the both devices. Accordingly, the use condition information firstly shared by the server device and the terminal device is shared by the both devices even after it is updated by the content execution information, and the both devices can share the common key generated according to the use condition information.

Description

明細書 情報管理システム 技術分野  Description Information management system Technical field
本願発明は、 コ ンテンツ及びそのコ ンテンツの実行に関するコンテン ッ実行情報を送信するサーバ装置と、 これらを受信する端末装置間で情 報を秘密に保持して配信するための暗号鍵 (共通键方式の共通鍵) を共 有する仕組みに関する。 背景技術  The present invention provides a server device that transmits content and content execution information relating to the execution of the content, and an encryption key (a common key scheme) for distributing the information secretly between terminal devices that receive the content and information. (A common key). Background art
従来、 情報を秘密に保持するために利用する暗号技術の鍵 (共通鍵方 式の共通键) 若しく はその鍵の生成情報は、 情報の送信側と受信側の間 で通信ネッ ト ワーク等を通じてやり と りするこ とによ り両者の間で共有 するよ う にしていた。 例えば、 従来技術と して次のよ う なものがある。 Conventionally, encryption technology keys used to keep information confidential (a common key method is common) or the information generated by the key is transmitted between the information sending side and the receiving side through a communication network or the like. They were trying to share between the two by interacting through. For example, there are the following conventional technologies.
「ク ライアン トは、 情報の暗号化に用いる共通鍵方式の共通鍵と、 当該 共通鍵を暗号化するための公開鍵方式の公開鍵(サーバの秘密鍵と対応) を有する。 ク ライアン トは共通鍵を公開鍵で暗号化してサーバに送信す る。 サーバは、 公開鍵で暗号化された共通鍵を、 自身の秘密鍵で復号化 する。 これによ り 、 サーバとク ライアン トは共通鍵を共有するこ とがで きる。 その後、 その共通鍵で暗号化した情報をサーバと ク ライアン トで 授受を行う (特開 2 0 0 2 — 3 0 5 5 1 3 ) j。 発明の開示 "The client has a common key of the common key method used for encrypting information and a public key of the public key method (corresponding to the secret key of the server) for encrypting the common key. The common key is encrypted with the public key and transmitted to the server The server decrypts the common key encrypted with the public key with its own private key, which allows the server and the client to share the common key. After that, information encrypted with the common key is exchanged with a server and a client (Japanese Patent Application Laid-Open No. 2002-305515).
かかる従来技術のよ う に共通鍵を暗号化して送信する場合でも、 共通 鍵を情報の送信側と受信側との間で送受信する以上、 配信経路で不正に 取得され、 共通鍵に施された暗号が不正に解読されて共通鍵が取得され るおそれがある。 従って、 共通鍵の不正取得をよ り 困難とするために、 共通键若しく はその共通鍵の生成情報を情報の送信側と受信側との間で 送受信せずに両者の間で共有する方法が望まれる。 Even when the common key is encrypted and transmitted as in the conventional technology, since the common key is transmitted and received between the information transmitting side and the information receiving side, the information is illegally transmitted through the distribution route. There is a possibility that the encryption obtained and applied to the common key may be illegally decrypted to obtain the common key. Therefore, in order to make it more difficult to illegally obtain a common key, a method of sharing the common key or the generated information of the common key between the sender and the receiver without transmitting / receiving the information between both parties Is desired.
また、 同じ共通鍵を使い続ける と当該共通鍵が解読される危険性が高 まる。 従って、 セキュ リ ティ を高めるためには、 共通鍵は定期的に変更 するこ とが望ま しい。 この点、 従来技術は、 共通鍵を変更する度に、 変 更した共通鍵 (若しく はその鍵の生成情報) を情報の送信側と受信側の 間で送受信しなければならなかった。 従って、 変更後の共通鍵が、 上述 同様に配信経路で不正に取得され、 共通鍵に施された暗号が不正に解読 されて共通鍵が取得されるおそれがある。  In addition, if the same secret key is used, the risk of the secret key being decrypted increases. Therefore, in order to increase security, it is desirable to change the secret key periodically. In this regard, in the conventional technology, every time the common key is changed, the changed common key (or the information for generating the key) has to be transmitted and received between the information transmitting side and the information receiving side. Therefore, there is a possibility that the changed common key is illegally obtained through the distribution route as described above, and the encryption applied to the common key is illegally decrypted to obtain the common key.
そこで、 本願発明は、 共通鍵を情報の送信側と受信側との間で送受信 するこ となく 両者の間で共有し、 また、 情報の送信側と受信側との間で 共有する共通鍵を容易に変えるこ とができる仕組みを提供する。  Thus, the present invention provides a common key shared between a sender and a receiver of information without transmitting and receiving the common key between the sender and the receiver of the information. Provide a mechanism that can be easily changed.
かかる課題を解決するために、 本願発明は、 コンテンツ及びそのコン テンッの実行に関するコ ンテンツ実行情報を送信するサーバ装置と、 こ れらを受信する端末装置とからなる情報管理システム等を利用する。 本 願発明のシステムにおいて共有される共通鍵は、 主にコ ンテンツ実行情 報を保護するためのものである。  In order to solve such a problem, the present invention utilizes an information management system or the like including a server device for transmitting content and content execution information relating to execution of the content, and a terminal device for receiving the server and the terminal device. The common key shared in the system of the present invention is mainly for protecting the content execution information.
サーバ装置と端末装置は、 同じ利用条件情報を有する。 利用条件情報 は、端末装置に許容されるコ ンテンツの利用回数、利用期限、利用期間、 コンテンツ I Dのいずれか一又は二以上に関する情報、 即ちコンテンツ の実行が許容される範囲を示す情報である。 サーバ装置と端末装置が最 初に同じ利用条件情報を有するための方法は特に問わない。 この点を前 提と して、サーバ装置と端末装置は次の仕組みによ り共通鍵を共有する。 まず、 サーバ装置と端末装置は、 利用条件情報に基づいてそれぞれ共 通鍵を生成する。 上述のとおり 、 サーバ装置と端末装置は利用条件情報 を共有しているので、 それぞれ対応する共通鍵を生成する。 この場合、 サーバ装置と端末装置との間で共通鍵を共有できるこ とはいう までもな い。 本願発明は、 さ らに、 この利用条件情報をサーバ装置と端末装置の それぞれにおいて更新し、 更新後においてもサーバ装置と端末装置で同 じ利用条件情報となるよ う にする。 これによ り 、 更新後の利用条件情報 に基づいて新たに生成される共通鍵についてもサーバ装置と端末装置で 共有できる点に特徴がある。利用条件情報の更新は次のよ う にして行う。 サーバ装置は、 自身が生成した共通鍵で、 端末装置で実行されるコン テンッの実行に関する情報であるコンテンツ実行情報を暗号化して端末 装置に送信する。 また、 サーバ装置は当該コンテンツ実行情報に基づい て自身が有する利用条件情報を更新する。 端末装置は、 サーバ装置から 送信された暗号化されたコンテンツ実行情報を受信し、上述のよ う に(更 新前の) 利用条件情報に基づいて生成した共通鍵で復号化してコンテン ッ実行情報を得る。 そして、 端末装置は、 復号化して得たそのコンテン ッ実行情報に基づいて自身が有する利用条件情報を更新する。 サーバ装 置と端末装置では、 同じコンテンツ実行情報に基づいてぞれぞれの有す る利用条件情報が更新されるため、更新後の利用条件情報も同じとなる。 従って、 サーバ装置と端末装置が、 それぞれ更新後の利用条件情報に基 づいて新たに共通鍵を生成した場合も、 生成されるその共通鍵はサーバ 装置と端末装置で対応するものとなり両装置間で共通鍵を共有できる。 図面の簡単な説明 The server device and the terminal device have the same usage condition information. The usage condition information is information relating to any one or more of the number of usages of the content, the usage period, the usage period, and the content ID that are allowed for the terminal device, that is, information indicating a range in which the execution of the content is allowed. The method by which the server device and the terminal device first have the same usage condition information does not matter. With this in mind, the server and terminal share a common key by the following mechanism. First, the server device and the terminal device share each other based on the usage condition information. Generate a passkey. As described above, since the server device and the terminal device share the usage condition information, a corresponding common key is generated for each. In this case, it goes without saying that the common key can be shared between the server device and the terminal device. The present invention further updates the usage condition information in each of the server device and the terminal device so that the server device and the terminal device have the same usage condition information even after the update. This is characterized in that a shared key newly generated based on the updated usage condition information can be shared between the server device and the terminal device. Update of usage condition information is performed as follows. The server device encrypts the content execution information, which is information relating to the execution of the content executed by the terminal device, using the common key generated by itself, and transmits the encrypted content execution information to the terminal device. Further, the server device updates its own use condition information based on the content execution information. The terminal device receives the encrypted content execution information transmitted from the server device, decrypts the content execution information with the common key generated based on the usage condition information (before updating) as described above, and executes the content execution information. Get. Then, the terminal device updates its own use condition information based on the decrypted content execution information. Since the server device and the terminal device update their own usage condition information based on the same content execution information, the updated usage condition information is also the same. Therefore, even when the server device and the terminal device newly generate a common key based on the updated usage condition information, respectively, the generated common key corresponds to the server device and the terminal device, and the shared key is generated between the two devices. Can share a common key. BRIEF DESCRIPTION OF THE FIGURES
図 1 は、 実施形態の概念の一例を示す図である。  FIG. 1 is a diagram illustrating an example of the concept of the embodiment.
図 2は、 実施形態の構成の一例を示す図である。  FIG. 2 is a diagram illustrating an example of the configuration of the embodiment.
図 3 は、 利用条件情報をコンテンッ実行情報に基づいて更新する具体 例の一例を示す図である。 Figure 3 shows an example of updating the usage condition information based on the content execution information. It is a figure showing an example of an example.
図 4は、 実施形態の処理の流れの一例を示す図である。  FIG. 4 is a diagram illustrating an example of a processing flow according to the embodiment.
図 5 は、 実施形態の構成の一例を示す図である。  FIG. 5 is a diagram illustrating an example of the configuration of the embodiment.
図 6は、 実施形態で利用されるコ ンテンッ実行情報の一例を示す図で ある。 発明を実施するための最良の形態  FIG. 6 is a diagram illustrating an example of content execution information used in the embodiment. BEST MODE FOR CARRYING OUT THE INVENTION
図 1 から 6 を用いて本願発明の実施形態を説明する。  An embodiment of the present invention will be described with reference to FIGS.
(概念)  (Concept)
図 1 は本願発明の概念の一例を示す図である。 同図を用いて本願発明 の概念の一例を説明する。  FIG. 1 is a diagram showing an example of the concept of the present invention. An example of the concept of the present invention will be described with reference to FIG.
本願発明は、 コンテンツ及びコンテンツ実行情報を送信するサーバ装 置と これらを受信する端末装置とからなるシステムにおいて、 当該コ ン テンッ実行情報等を暗号化、復号化するために利用する鍵(共通鍵) を、 サーバ装置と端末装置で共有するための仕組みである。  The present invention relates to a key (common key) used for encrypting and decrypting the content execution information and the like in a system including a server device that transmits the content and the content execution information and a terminal device that receives the content and the content execution information. ) Is shared between the server device and the terminal device.
同図 Aに示すよ う に、 サーバ装置と端末装置は利用条件情報 Aを共有 した。 利用条件情報は、 端末装置でコ ンテンツの実行が許容される利用 回数、 利用期限、 利用期間、 コ ンテンツ I Dのいずれか一又は二以上の 関する情報である。この利用条件情報のみではコ ンテンツは実行できず、 個別のコ ンテンツごとにコ ンテンツの実行に関するコ ンテンツ実行情報 が必要であった。 そこで、 端末装置はコ ンテンツ実行情報 Aの配信をサ —パ装置に要求した。 サーバ装置は、 端末装置と共有している利用条件 情報 Aに基づいて共通鍵方式の共通鍵 Aを生成し、 コ ンテンツ実行情報 Aを暗号化した暗号化コンテンツ実行情報 Aを端末装置に送信した。 端 末装置は、 暗号化コ ンテンツ実行情報 Aを受信し、 サーバ装置と共有す る利用条件情報 Aに基づいて共通鍵 Aを生成した。 上述のよ う にサーバ 装置も同じ利用条件情報 Aに基づいて共通鍵 Aを生成したので、 サーバ 装置と端末装置は共通鍵 Aを共有できた。 そして、 端末装置は、 当該共 通鍵 Aで、 暗号化コ ンテンツ実行情報 Aを復号化した。 As shown in Fig. A, the server device and the terminal device shared usage condition information A. The usage condition information is information relating to one or more of the number of usages, the usage expiration date, the usage period, and the content ID in which the terminal device is allowed to execute the content. The content could not be executed only with this usage condition information, and content execution information regarding the execution of the content was required for each individual content. Therefore, the terminal device requested the super device to deliver the content execution information A. The server generates a common key A of the common key system based on the usage condition information A shared with the terminal, and transmits the encrypted content execution information A obtained by encrypting the content execution information A to the terminal. . The terminal device received the encrypted content execution information A and generated a common key A based on the usage condition information A shared with the server device. Server as described above Since the device also generated the common key A based on the same usage condition information A, the server device and the terminal device could share the common key A. Then, the terminal device decrypts the encrypted content execution information A with the common key A.
そして、 同図 B に示すよ う に、 サーバ装置は、 自身の有する利用条件 情報 Aを暗号化の対象となったコンテンツ実行情報 Aに基づいて利用条 件情報 Bに更新した。 つま り、 コ ンテンツ実行情報 Aに基づいて利用条 件情報 Aを管理した。 端末装置も、 復号化されたコ ンテンツ実行情報 A に基づいて自身の有する利用条件情報 Aを利用条件情報 Bに更新した。 つま り 、 サーバ装置と同様にコ ンテンツ実行情報 Aに基づいて利用条件 情報 Aを管理した。  Then, as shown in FIG. B, the server device updates its own use condition information A to use condition information B based on the content execution information A that has been encrypted. In other words, the usage condition information A was managed based on the content execution information A. The terminal device also updates its own use condition information A to use condition information B based on the decrypted content execution information A. In other words, the usage condition information A was managed based on the content execution information A in the same manner as the server device.
そして、 同図 Cに示すよ う に、 上述と 同じ手順で、 端末装置は、 別の コンテンツの実行に関する コンテンツ実行情報 Bの配信をサーバ装置に 要求した。 サーバ装置は、 更新後の利用条件情報 Bに基づいて生成され た共通鍵 Bでコ ンテンツ実行情報 Bを暗号化して端末装置に送信した。 端末装置も更新後の利用条件情報 Bに基づいて共通鍵 Bを生成した。 こ のよ う にサーバ装置と端末装置は共に利用条件情報 Bに基づいて共通鍵 Bを生成したので、 サーバ装置と端末装置は共通鍵 B を共有できた。 こ の際、 共通鍵 B、 若しく は共通鍵 B の生成情報をサーバ装置と端末装置 間で送受信するこ とはなかった。  Then, as shown in Fig. C, in the same procedure as described above, the terminal device requested the server device to deliver the content execution information B relating to the execution of another content. The server device encrypted the content execution information B with the common key B generated based on the updated usage condition information B and transmitted it to the terminal device. The terminal device also generated a common key B based on the updated usage condition information B. As described above, since both the server device and the terminal device generated the common key B based on the usage condition information B, the server device and the terminal device could share the common key B. At this time, the common key B or the generated information of the common key B was not transmitted and received between the server device and the terminal device.
(構成)  (Constitution)
図 2 は本実施形態の機能プロ ックの一例を示す図である。 同図を用い て本実施形態の構成の一例を説明する。  FIG. 2 is a diagram illustrating an example of a functional block according to the present embodiment. An example of the configuration of the present embodiment will be described with reference to FIG.
本実施形態は、 サーバ装置 0 2 0 0 と、 端末装置 0 2 1 0 とからなる 情報管理システムである。 . '  The present embodiment is an information management system including a server device 0200 and a terminal device 0210. '
(サーバ装置)  (Server device)
「サーバ装置 0 2 0 0」 は、 サーバ装置側利用条件情報管理部 0 2 0 1 、 サーバ装置側共通鍵生^部 0 2 0 2、 暗号化部 0 2 0 3 、 送信部 0 2 0 4 と を有する。 “Server device 0 2 0 0” is a server device side use condition information management unit 0 2 0 1, a server-side common key generation unit 202, an encryption unit 202, and a transmission unit 204.
「サーバ装置側利用条件情報管理部 0 2 0 1」 は、 端末装置 0 2 1 0 と関連付けて、 その端末装置 0 2 1 0 に許容されるコンテンッの利用回 数、 利用期限、 利用期間、 コ ンテンツ I Dのいずれか一又は二以上に関 する情報である利用条件情報を、 コンテンツの実行に関する情報である コンテンツ率行情報に基づいて管理する。 「コンテンツ実行情報に基づ いて利用条件情報を管理する」 とは、 本実施形態では主に、 コ ンテンツ 実行情報に基づいて利用条件情報を更新するこ とを意味する。 例えば、 同図に示すよ う に、 コンテンツ実行情報に基づいて、 利用条件情報 Aを 利用条件情報 Bに更新する。  The “server device usage condition information management unit 0 201” associates the terminal device 0 210 with the number of times of use of content, the usage period, the usage period, Use condition information, which is information about one or more of the content IDs, is managed based on the content rate information, which is information about the execution of content. “Managing usage condition information based on content execution information” means that the present embodiment mainly updates usage condition information based on content execution information. For example, as shown in the figure, the use condition information A is updated to the use condition information B based on the content execution information.
「利用条件情報」 とは、 上述のとおり 、 端末装置 0 2 1 0 に許容され るコ ンテンツの利用回数、 利用期限、 利用期間、 コンテンツ I Dのいず れか一又は二以上に関する情報である。 利用条件情報は端末装置 0 2 1 0でコンテンツの実行が許容される範囲を示すが、 端末装置 0 2 1 0が この利用条件情報を有するのみではコンテンツを実行するこ とができな い。コンテンツを実行するためには、コンテンツ実行情報が必要となる。 利用条件情報は、 例えば、 端末装置 0 2 1 0 に許容される コンテンッの 利用回数が 1 0 回であるこ と を示す情報等である場合がある。 また、 利 用条件情報は、 例えば、 前記利用回数等をポイ ン トで換算した情報であ る場合がある。 例えば、 コンテンツの 1 回の利用に 1 0ポイ ン ト必要で ある場合であって、 利用条件情報が 1 0 0ポイ ン ト と換算されている場 合は、 コ ンテンツの利用回数は 1 0回となる。 この利用条件情報は、 最 初にサーバ装置側利用条件情報管理部 0 2 0 1及び後述する端末装置 0 2 1 0の端末装置側利用条件情報管理部 0 2 1 1 で同じ内容のものを有 する こと、 つま り共有するこ とが前提となる。 利用条件情報を最初に共 有するための方法は問わない。 例えば、 サーバ装置 0 2 1 0側と端末装 置 0 2 0 0側で、 同じ利用条件情報が通信ネッ ト ワークを介さずに入力 されてもよ く 、 また、 一方から他方に通信ネッ トワークを介して送信し てもよい。 そして、 サーバ装置 0 2 0 0 と端末装置 0 2 1 0で利用条件 情報が最初に共有された後は、 それぞれの装置で当該利用条件情報が同 じコ ンテンツ実行情報に基づいて更新等されて管理される。 従って、 更 新された後の利用条件情報はサーバ装置 0 2 0 0 と端末装置 0 2 1 0 と の間で送受信されるこ となく 、 サーバ装置側利用条件 報管理部 0 2 0 1 と端末装置側利用条件情報管理部 0 2 1 1 で共有される。 つま り 、 利 用条件情報は、 通信を介する こ となく 同期している といえる。 そして、 この利用条件情報は、 後述するよ う に、 共通鍵の生成にも流用される。 As described above, the “usage condition information” is information relating to any one or more of the number of times of use, the expiration date, the usage period, and the content ID permitted for the terminal device 0210. The use condition information indicates a range in which the content execution is permitted in the terminal device 0 210, but the content cannot be executed only by the terminal device 0 210 having this use condition information. In order to execute content, content execution information is required. The usage condition information may be, for example, information indicating that the number of times the content is allowed to be used by the terminal device 210 is 10 times. Further, the usage condition information may be, for example, information obtained by converting the number of times of use and the like into points. For example, if the content requires 10 points for one use, and if the usage condition information is converted to 100 points, the content is used 10 times. It becomes. This usage condition information has the same contents in the server-side usage condition information management unit 0201 and the terminal device-side usage condition information management unit 0221 of the terminal device 210 described later. Prerequisite, that is, sharing. First, share the usage condition information. There is no particular limitation on the method for having it. For example, the same usage condition information may be input to the server device 0210 and the terminal device 0200 without passing through the communication network, or the communication network may be connected from one to the other. May be transmitted via the Internet. After the use condition information is first shared between the server device 0200 and the terminal device 0210, the use condition information is updated on each device based on the same content execution information. Be managed. Therefore, the updated usage condition information is not transmitted / received between the server device 0200 and the terminal device 0210, and the server device-side usage condition information management unit 0201 and the terminal device 201 are not transmitted / received. It is shared by the device side use condition information management unit 0 2 1 1. In other words, it can be said that the usage condition information is synchronized without using communication. The use condition information is also used for generating a common key, as described later.
「コ ンテンツ実行情報」 とは、 端末装置に実行させるコ ンテンツの実 行に関する情報である。 上述のとおり 、 端末装置でコ ンテンツを実行す るためにはコ ンテンツ実行情報が必要となる。 端末装置は、 利用条件情 報が示す 「コ ンテンツの実行が許容される範囲」 内で、 コ ンテンツ実行 情報に基づいてコ ンテンツの実行が可能となる。 コ ンテンツ実行情報に は、 具体的には、 特定のコ ンテンツのコ ンテンツ I D、 当該コ ンテンツ I Dに関連付けられたコ ンテンツの実行ファイル等が含まれる場合があ る。 かかる コ ンテンツ I Dは、 サーバ装置及び後述する端末装置内で、 前記利用条件情報をどのよ う な内容で更新すべきかに関する情報と関連 付けられて構成されるテーブルによ り管理されていてもよい。  “Content execution information” is information relating to the execution of content executed by the terminal device. As described above, content execution information is required to execute content on a terminal device. The terminal device can execute the content based on the content execution information within the “permitted range of content execution” indicated by the usage condition information. Specifically, the content execution information may include a content ID of a specific content, an execution file of the content associated with the content ID, and the like. The content ID may be managed in a server device and a terminal device to be described later by a table configured to be associated with information on what content should be used to update the usage condition information. .
図 3 は、 サーバ装置と端末装置のそれぞれにおいて、 前記利用条件情 報が前記コ ンテンツ実行情報に基づいて同じよ う に更新される一例を示 す図である。 本例では、 利用条件情報がポイ ン トで換算され、 コ ンテン ッ実行情報には、 コ ンテンツの実行に必要なポイ ン ト と関連付けられた コンテンツ I Dが含まれている。 同図 Aは、 コンテンツ実行情報に含ま れる コ ンテンツ I D と 当該コンテンツ I Dで特定される コ ンテンツの実 行に必要なポイ ン ト と を関連付けて構成したテーブルの一例である。 同 図 Aに示すよ う に、 映画 Aのコ ンテンツ I D 「 0 0 1 」 は、 当該映画 A のコンテンツの実行に必要なポイン ト 「 3 ポイ ン ト」 と 関連付けて管理 される。 また、 ドキュメ ンタ リ ー Bのコンテンツ I D 「 0 0 2」 は、 当 該 ドキュメ ンタ リ 一のコンテンッの実行に必要なボイン ト「 2ポィ ン ト」 と関連付けて管理される。 また、 スポーツ Cのコ ンテンツのコ ンテンツ I D 「 0 0 3」 は、 当該スポーツ Cのコ ンテンツの実行に必要なポイ ン ト 「 1 ポイ ン ト」 と関連付けて管理される。 この場合、 コンテンツ実行 情報に含まれるコ ンテンツ I Dに基づいて、 サーバ装置及び後述する端 末装置においてコ ンテンツの実行に必要なポイン トが特定される。 FIG. 3 is a diagram illustrating an example in which the usage condition information is similarly updated in each of the server device and the terminal device based on the content execution information. In this example, the usage condition information is converted into a point, and the content execution information includes a content ID associated with a point required to execute the content. Figure A is included in the content execution information. This is an example of a table configured by associating a content ID to be executed with a point required for executing the content specified by the content ID. As shown in FIG. A, the content ID “001” of the movie A is managed in association with the point “3 points” required for executing the content of the movie A. In addition, the content ID “002” of document B is managed in association with a point “2 points” required for executing the content of the document. Also, the content ID “003” of the content of the sport C is managed in association with the point “1 point” required for executing the content of the sport C. In this case, based on the content ID included in the content execution information, a point required for executing the content in the server device and a terminal device described later is specified.
そして、 同図 Bは、 サーバ装置と端末装置のそれぞれで登録されたこ と によ り 両装置が最初に共有した利用条件情報 「 1 0 0 ポイ ン ト」 が特 定のコンテンツの実行に必要なポイ ン ト数に基づいて同じよ う に更新さ れる一例を示している。 上述のとおり 、 コンテンツ実行情報にはコンテ ンッ I Dが含まれている。 従って、 サーバ装置と端末装置が同じコンテ ンッ実行情報を取得等すれば、 同図 Aに示すテーブルに基づいて、 両装 置で同じ 「コ ンテンツの実行に必要なポイン ト」 を特定するこ とができ る。 そして、 特定した 「コンテンツの実行に必要なポイ ン ト」 に基づい て、 サーバ装置と端末装置のそれぞれにおいて、 利用条件情報のポイン トを更新し、 更新後も共有するこ とができる。 例えば、 映画 Aのコ ンテ ンッ I D 「 0 0 1 」 を含むコ ンテンツ実行情報に基づく 場合、 映画 Aの コ ンテンツの実行に必要なポイ ン トは 3 ポイ ン ト とな り 、 サーバ装置、 端末装置の利用条件情報のポイ ン トは最初に共有した 1 0 0 ポイ ン トか ら 9 7ポイ ン トに更新される (更新ポイ ン ト A;)。 さ らに、 ドキュメ ンタ リ ー B のコ ンテンツ I D 「 0 0 2」 が含まれるコ ンテンツ実行情報に基 づく場合、 ドキュメ ンタ リ ーのコ ンテンツの実行に必要なボイ;/ トは 2 ポイン ト となり 、 サ一パ装置と端末装置の利用条件情報は上述の更新後 の 9 7ポイ ン トから さ らに 9 5ポイ ン トに更新される(更新ポイ ン ト B ) t さ らに、 スポーツ Cのコ ンテンツ I D 「 0 0 3 」 が含まれる コ ンテンツ 実行情報に基づく 場合、 スポーツのコ ンテンツの実行に必要なポイ ン ト は 1 ポイ ン ト とな り 、 サーバ装置と端末装置の利用条件情報は上述の更 新後の 9 5ポイン トからさ らに 9 4ポイ ン トに更新される (更新ポイ ン ト C )。 Figure B shows that the usage condition information “100 points” first shared by the server device and the terminal device is necessary for the execution of specific content because they are registered in the server device and the terminal device. An example is shown in which the same update is performed based on the number of points. As described above, the content execution information includes the content ID. Therefore, if the server device and the terminal device acquire the same content execution information, etc., the same "point required for content execution" can be specified in both devices based on the table shown in Fig. A. Can be done. Then, based on the specified “points required for executing the content”, the server device and the terminal device can update the usage condition information points and can share the updated usage condition information points. For example, based on the content execution information including the content ID “001” of movie A, three points are required to execute the content of movie A, and the server device and the terminal The point of the usage condition information of the device is updated from the first shared point of 100 to 97 points (update point A;). Furthermore, based on the content execution information including the content ID “002” of documentary B. In this case, the number of bytes required to execute the contents of the document is 2 points, and the usage condition information of the super-unit and the terminal device is from the updated 97 points mentioned above. The content is updated to 95 points (updated point B) t In addition , if the content execution information including the content ID “003” of sports C is included, the sports content is executed. The required point is one point, and the usage condition information of the server device and the terminal device is updated from 95 points after the above-mentioned update to 94 points (update) Point C).
「サーバ装置側共通鍵生成部 0 2 0 2」 は、 前記利用条件情報に基づ いて共通鍵を生成する。 例えば、 同図に示すよ う に、 前記サーバ装置側 利用条件情報管理部 0 2 0 1 で管理される利用条件情報 Aに基づいて共 通鍵を生成する。 また、 前記サーバ装置側利用条件情報管理部 0 2 0 1 で、 前記利用条件情報 Aが利用条件情報 Bに更新された後は、 更新後の 利用条件情報 Bに基づいて共通鍵を生成する。 この場合、 利用条件情報 Aに基づいて生成される共通鍵と、 利用条件情報 Bに基づいて生成され る共通鍵は異なる。 つま り 、 利用条件情報が異なれば、 生成される共通 鍵も異なる。 利用条件情報に基づく共通鍵の生成は、 具体的には、 前記 利用条件情報で示される数値等を初期値と して関数を用いて算出する こ とによ り実現できる。 つま り 、 当該算出結果を共通鍵と して利用する。 この共通鍵は、 共通鍵方式の暗号技術において情報を暗号化、 復号化 するための鍵をいう。 上述のとおり、 公開键方式では情報の暗号化に用 いる公開鍵を情報の送信側と受信側との間で送受信しなければならない, 従って、 当該公開鍵を手がかり に複号化のための秘密鍵が不正に解読さ れるおそれがある。 一方、 本願発明では、 サーバ装置、 及び後述する端 末装置がそれぞれ共有し、 かつ、 同じ内容で更新される利用条件情報に 基づいて共通鍵が生成される。 従って、 当該共通鍵をサーバ装置と端末 装置との間で送受信するこ となく 共通鍵を共有でき、 公開鍵方式のよ う な不正解読のおそれはない。 また、 本願発明は、 本来はコ ンテンツの実 行を許容するために利用する利用条件情報を共通鍵の生成にも流用する ため、 共通鍵の生成のためにのみ必要な情報をサーバ装置と端末装置間 で送受信する必要がない。 つま り 、 サーバ装置と端末装置間における情 報の送受信量を軽減できる。なお、 「サーバ装置と端末装置が共通鍵を共 有する」 とは、 サーバ装置と端末装置が同じ時において同じ共通鍵を保 持するこ とのみを意味する ものではない。本願発明において、 「サーバ装 置と端末装置が共通鍵を共有する」 とは、 一方の装置で暗号化された情 報を、 他方の装置でその暗号化に用いられた鍵に対応する鍵で復号化でThe “server device-side common key generation unit 0202” generates a common key based on the use condition information. For example, as shown in the figure, a common key is generated based on the usage condition information A managed by the server-side usage condition information management unit 0201. After the usage rule information A is updated to the usage rule information B in the server side usage rule information management unit 0201, a common key is generated based on the updated usage rule information B. In this case, the common key generated based on usage condition information A is different from the common key generated based on usage condition information B. In other words, if the usage condition information is different, the generated common key is also different. Specifically, the generation of the common key based on the usage condition information can be realized by calculating using a function with a numerical value or the like indicated by the usage condition information as an initial value. That is, the calculation result is used as a common key. This common key is a key for encrypting and decrypting information in the common key cryptography. As described above, in the public key scheme, the public key used for information encryption must be transmitted and received between the information transmitting side and the information receiving side. Therefore, the public key is used as a key to secure the secret for decryption. The key may be compromised. On the other hand, in the present invention, the common key is generated based on the use condition information shared by the server device and the terminal device described later and updated with the same content. Therefore, the common key can be transferred between the server and the terminal. The common key can be shared without transmitting and receiving to and from the device, and there is no risk of unauthorized decryption unlike the public key method. Further, the invention of the present application uses the usage condition information originally used for allowing the execution of the content also for generating the common key, so that the information necessary only for generating the common key is transmitted to the server device and the terminal. There is no need to send and receive between devices. That is, the amount of information transmitted and received between the server device and the terminal device can be reduced. Note that “the server device and the terminal device share a common key” does not only mean that the server device and the terminal device hold the same common key when they are the same. In the present invention, “a server device and a terminal device share a common key” means that information encrypted by one device is replaced by a key corresponding to the key used for encryption by the other device. In decryption
• きる場合を広く含む。 • Includes cases where it can be cut.
上述のとおり 、 前記サーバ装置側利用条件情報管理部 0 2 0 1 と、 端 末装置側利用条件情報管理部 0 2 1 1 は、 最初に利用条件情報を共有す る。 従って、 当該利用条件情報に基づいてサーバ装置側共通鍵生成部 0 2 0 2 と、 後述する端末装置 0 2 1 0の端末装置側共通鍵生成部 0 2 1 2で生成される共通鍵は対応する。 つま り 、 サーバ装置 0 2 0 0 と端末 装置 0 2 1 0 は共通鍵を共有できる。 また、 上述のとおり利用条件情報 はコンテンツ実行情報に基づいて更新等されて管理される。 そして、 上 述のとおり、 更新された後の利用条件情報もサーバ装置 0 2 0 0 のサー パ装置側利用条件情報管理部 0 2 0 1 と端末装置 0 2 1 0の端末装置側 利用条件情報管理部 0 2 1 1 で共有される。 従って、 更新後の利用条件 情報に基づいてサーバ装置側共通键生成部 0 2 0 2 と、 後述する端末装 置側共通鍵生成部 0 2 1 2 で生成される共通鍵は対応する。 つま り 、 サ ーパ装置 0 2 0 0 と端末装置 0 2 1 0 は更新された利用条件情報に基づ いて生成される共通鍵も共有できる。 この際、 更新前の利用条件情報に 基づいて生成された共通鍵、 及び更新後の利用条件情報に基づいて生成 された共通鍵のいずれもサーバ装置 0 2 0 0 と端末装置 0 2 1 0 との間 で送受信されるこ とはない。 As described above, the server device side use condition information management unit 0201 and the terminal device side use condition information management unit 0221 share the use condition information first. Accordingly, the common key generated by the server-side common key generation unit 0 202 based on the use condition information and the terminal-side common key generation unit 0 2 12 of the terminal device 0 210 described later correspond to each other. I do. In other words, the server device 0200 and the terminal device 0210 can share a common key. Further, as described above, the usage condition information is updated and managed based on the content execution information. Then, as described above, the updated usage condition information is also used by the server-side usage condition information management unit 0 201 of the server device 200 and the terminal-side usage condition information of the terminal device 210. Shared by the management unit 0 2 1 1. Therefore, the common key generated by the server-side common key generation unit 0 202 and the terminal-device-side common key generation unit 0 212 based on the updated usage condition information correspond to each other. That is, the server device 0200 and the terminal device 0210 can also share a common key generated based on the updated usage condition information. At this time, a common key generated based on the pre-update usage condition information and a post-update None of the generated common keys are transmitted and received between the server device 0200 and the terminal device 0210.
「暗号化部 0 2 0 3」 は、 前記共通鍵生成部 0 2 0 2で生成された共 通鍵を利用 して前記コ ンテンツ実行情報を暗号化する。 暗号化部 0 2 0 3 で暗号化するコ ンテンツ実行情報は、 後述するよ う に端末装置から送 信されるコンテンッ実行情報の配信の要求であるコンテンッ実行情報配 信要求に基づいて特定し、 取得等するこ とができる。  The “encryption unit 0203” encrypts the content execution information using the common key generated by the common key generation unit 0202. The content execution information to be encrypted by the encryption unit 0 203 is specified based on a content execution information distribution request, which is a request for distribution of the content execution information transmitted from the terminal device, as described later. It can be acquired.
上述のとお り 、 本願発明では、 サーバ装置 0 2 0 0 と端末装置 0 2 1 0間で送受信する こ となく 共通鍵を共有するこ とができるので、 当該共 通鍵を利用して情報を安全に共有する こ とができる。 その安全に共有す べき情報と しては、 「他の共通鍵」若しく は当該「他の共通鍵の生成情報」 等が該当する場合がある。 サーバ装置 0 2 0 0 と端末装置 0 2 1 0 間で 送受信するこ となく 共有できる共通鍵を利用してさ らに他の共通鍵等を 暗号化して两装置で共有するメ リ ッ トは次のとおり である。  As described above, according to the present invention, a common key can be shared without transmitting and receiving between the server device 0200 and the terminal device 0210, so that information can be shared using the common key. It can be safely shared. The information to be securely shared may be “other common key” or the “information for generating another common key”. The advantage of using a common key that can be shared without transmitting / receiving between the server device 0200 and the terminal device 0210 and further encrypting other common keys, etc. It is as follows.
サーバ装置 0 2 0 0 と特定の端末装置 0 2 1 0間の間でのみ共有でき る共通鍵でしか暗号化されたコ ンテンツを復号化するこ とができない場 合、 問題が生じる。 問題とは、 サーバ装置 0 2 0 0が端末装置のそれぞ れに対して特定の共通鍵でコンテンツを暗号化して送信する必要が生じ るこ とである。 端末装置の数が何万台、 何十万台となる と、 その負担が 大きな問題となる。  A problem arises when the encrypted content can be decrypted only with a common key that can be shared only between the server device 0200 and the specific terminal device 0210. The problem is that the server device 200 needs to encrypt and transmit the content to each of the terminal devices using a specific common key. When the number of terminal devices reaches tens of thousands or hundreds of thousands, the burden becomes a serious problem.
一方、 サーバ装置と複数の端末装置で鍵 (他の共通鍵) を共有するこ とができれば、 その鍵 (他の共通鍵) で暗号化したコ ンテンツを端末装 置間で送受信するこ とができる。 この場合、 サーバ装置 0 2 0 0の負担 は軽減される。  On the other hand, if a server device and a plurality of terminal devices can share a key (another common key), the content encrypted with the key (another common key) can be transmitted and received between the terminal devices. it can. In this case, the load on the server device 200 is reduced.
従って、 サーバ装置 0 2 0 0 と複数の端末装置 0 2 1 0 との間で共通 する当該 「他の共通鍵」 を、 サーバ装置 0 2 0 0 と端末装置 0 2 1 0 と の間で安全に共有できる点でメ リ ッ トがある。 Therefore, the “other common key” that is common between the server device 0200 and the plurality of terminal devices 0210 is referred to as the server device 0200 and the terminal device 0210. The advantage is that it can be safely shared between
特許文献 1 の従来技術のよ う に、 公開鍵によ り 共通鍵を暗号化して送 受信する場合、 事前に情報の受信側から送信側に公開鍵を送信しなけれ ばならない。 従って、 当該公開鍵が手がかり と なり秘密鍵が不正に解読 されて取得されるおそれがある。 一方、 本願発明の情報管理システムに おける共通鍵のよ う に、 サーバ装置と端末装置間で送受信するこ となく 共有可能な共通键は、従来技術におけるよ う な不正解読のおそれはない。 従って、 本願発明の情報管理システムにおいて、 サーバ装置と端末装置 間で送受信するこ となく共有可能な共通鍵を利用すれば、 当該他の共通 鍵若しく は当該他の共通鍵の生成情報の不正取得をよ り 困難にできる。  As in the prior art of Patent Document 1, when transmitting and receiving a common key after encrypting it with a public key, the public key must be transmitted from the information receiving side to the transmitting side in advance. Therefore, there is a risk that the public key serves as a clue and the secret key is illegally decrypted and obtained. On the other hand, a common key, such as a common key in the information management system of the present invention, which can be shared without transmitting and receiving between the server device and the terminal device, does not have the risk of unauthorized decryption as in the prior art. Therefore, in the information management system of the present invention, if a common key that can be shared without being transmitted and received between the server device and the terminal device is used, the other common key or the generation information of the other common key is illegal. Acquisition can be made more difficult.
「送信部 0 2 0 4」 は、 前記暗号化部 0 2 0 3で暗号化された暗号化 コンテンツ実行情報を送信する。  The “transmission unit 0 204” transmits the encrypted content execution information encrypted by the encryption unit 0 203.
(端末装置)  (Terminal device)
「端末装置 0 2 1 0」 は、 受信部 0 2 1 3、 端末装置側利用条件情報 管理部 0 2 1 1 、 端末装置側共通鍵生成部 0 2 1 2、 復号化部 0 2 1 4 とを有する。  `` Terminal device 0 2 1 0 '' is composed of a receiving unit 0 2 13, a terminal device side usage condition information management unit 0 2 1 1, a terminal device side common key generation unit 0 2 1 2, and a decryption unit 0 2 1 4. Having.
「受信部 0 2 1 3」 は、 前記暗号化コンテンッ実行情報を受信する。 「端末装置側利用条件情報管理部 0 2 1 1」 は、 コ ンテンツ実行情報 に基づいて前記利用条件情報を管理する。 このコンテンツ実行情報は、 後述する端末装置側共通鍵生成部 0 2 1 2で生成した共通鍵を利用 して. 前記受信部 0 2 1 3で受信した暗号化コ ンテンツ実行情報を、 後述する 復号化部 0 2 1 4で復号化したものである。また、この利用条件情報は、 最初に上述のサーバ装置側利用条件情報管理部 0 2 0 1及び端末装置側 利用状況管理部 0 2 1 1 で同じ内容のものを有するこ と、 つま り共有す るこ とが前提となる。 また、 上述のとおり利用条件情報を最初に共有す るための方法は問わない。 このよ う に、 サーバ装置と 同じ利用条件情報 を基礎と して、 同じコンテンツ実行情報に基づいて更新した利用条件情 報を管理するので、 サーバ装置と端末装置との間で直接送受信するこ と なく 、更新後の利用条件情報についても両装置で共有するこ とができる。 The “receiving unit 0 2 1 3” receives the encrypted content execution information. The “terminal-side use condition information management unit 0 2 1 1” manages the use condition information based on the content execution information. The content execution information is obtained by using a common key generated by a terminal-side common key generation unit 0 2 12 described later. The encrypted content execution information received by the reception unit 0 2 13 is decrypted by a decoding process described later. Are decrypted by the converting unit 0 2 1 4. In addition, the use condition information has the same content in the server device use condition information management unit 0201 and the terminal device use condition management unit 0221, that is, it is shared. Is assumed. Further, as described above, the method for sharing the usage condition information first does not matter. Thus, the same usage condition information as the server device Since the usage condition information updated based on the same content execution information is managed on the basis of the above, the transmission and reception of the updated usage condition information is not performed directly between the server device and the terminal device. Can be shared at
「端末装置側共通鍵生成部 0 2 1 2」 は、 前記端末装置側利用条件情 報管理部 0 2 1 1 で管理されている前記利用条件情報に基づいて共通鍵 を生成する。 例えば、 同図に示すよ う に、 前記端末装置側利用条件情報 管理部 0 2 1 1 で管理される利用条件情報 Aに基づいて共通鍵を生成す る。 また、 前記端末装置側利用条件情報管理部 0 2 1 1 で前記利用条件 情報 Aがコンテンツ実行情報に基づいて利用条件情報 Bに更新された後 は、 利用条件情報 Bに基づいて共通鍵を生成する。 この場合、 利用"条件 情報 Aに基づいて生成される共通鍵は利用条件情報 Bに基づいて生成さ れる共通鍵と異なる。 つま り 、 利用条件情報が異なれば、 生成される共 通鍵も異なる。 そして、 上述のとおり 、 端末装置側利用条件情報管理部 で管理される前記利用条件情報が、 サーバ装置 0 2 0 0 と端末装置 0 2 1 0 間で共有されている。 従って、 端末装置側共通鍵生成部 0 2 1 2で 生成される共通鍵は、 前記サーバ装置側共通鍵生成部 0 2 0 2で生成さ れる共通鍵と対応するもの とな り 、 サーバ装置 0 2 0 0 と端末装置 0 2 1 0は共通鍵を共有できる。  The “terminal device side common key generation unit 0 2 1 2” generates a common key based on the usage condition information managed by the terminal device side usage condition information management unit 0 2 1 1. For example, as shown in the figure, the common key is generated based on the use condition information A managed by the terminal device side use condition information management unit 0 211. After the usage condition information A is updated to the usage condition information B based on the content execution information by the terminal device side usage condition information management unit 0 2 1 1, a common key is generated based on the usage condition information B. I do. In this case, the common key generated based on the use condition information A is different from the common key generated based on the use condition information B. That is, if the use condition information is different, the generated common key is also different Then, as described above, the usage condition information managed by the terminal device side usage condition information management unit is shared between the server device 0200 and the terminal device 0210. The common key generated by the common key generation unit 0 2 1 2 corresponds to the common key generated by the server-side common key generation unit 0 2 0 2, and the server device 0 2 0 0 and the terminal The devices 0 210 can share a common key.
「復号化部 0 2 1 4」 は、 前記端末装置側共通鍵生成部 0 2 1 2 で生 成した共通鍵を利用 して前記受信部 0 2 1 3で受信した暗号化コンテン ッ実行情報を復号化してコンテンッ実行情報を取得する。 コ ンテンツ実 行情報は、 上述のとおり コ ンテンツの実行に関する情報であり 、 コ ンテ ンッ I D、 当該コ ンテンツ I Dに関連付けられたコ ンテンツの実行フ ァ ィル等を含む場合がある。 従って、 コ ンテンツ実行情報が復号化される こ とによ り 、 当該コ ンテンツ I Dによって特定されるコ ンテンツの実行 が端末装置で可能となる。 また、 上述のとおり 、 コ ンテンツ実行情報には、 前記利用条件情報に 基づいて生成される共通鍵以外の他の共通鍵若しく は当該他の共通鍵の 生成情報 (鍵生成情報) が含まれ、 当該他の共通鍵でコ ンテンツが暗号 化されている場合がある。 この場合、 前記端末装置側共通鍵生成部 0 2 1 2で生成した共通鍵で暗号化コンテンツ実行情報を復号化して当該他 の共通鍵等を取得し、 当該他の共通鍵で暗号化されたコ ンテンツを復号 化するこ とができる (図 6参照)。 The “decryption unit 0 2 1 4” uses the common key generated by the terminal-side common key generation unit 0 2 12 to encrypt the encrypted content execution information received by the reception unit 0 2 13. Decrypt and obtain content execution information. As described above, the content execution information is information related to content execution, and may include a content ID, a content execution file associated with the content ID, and the like. Therefore, by decoding the content execution information, the terminal device can execute the content specified by the content ID. Further, as described above, the content execution information includes a common key other than the common key generated based on the use condition information or generation information (key generation information) of the other common key. In some cases, the content is encrypted with the other common key. In this case, the encrypted content execution information is decrypted with the common key generated by the terminal-side common key generation unit 0 2 12 to obtain the other common key and the like, and the encrypted content execution information is encrypted with the other common key. The content can be decrypted (see Fig. 6).
(処理の流れ)  (Processing flow)
図 4 は本実施形態の処理の流れの一例を示す図である。 同図を用いて 本実施形態の処理の流れの一例を説明する。 なお、 同図で示す処理は、 計算機 (端末装置等) に実行させるためのプロ グラムで実行するこ とが でき、 またこのプログラムを計算機 (端末装置) によって読み取り可能 な記録媒体に記録するこ とができる。  FIG. 4 is a diagram showing an example of the processing flow of the present embodiment. An example of the processing flow of the present embodiment will be described with reference to FIG. The processing shown in the figure can be executed by a program to be executed by a computer (terminal device or the like), and this program must be recorded on a recording medium readable by the computer (terminal device). Can be.
端末装置と関連付けて、 その端末装置に許容されるコ ンテンツの利用 回数、 利用期限、 利用期間、 コ ンテンツ I Dのいずれか一又は二以上に 関する情報である利用条件情報であって、 サーバ装置で管理されるもの に基づいて共通鍵を生成する (サーバ装置側共通鍵生成ステ ップ S 0 4 0 1 )。前記ステップ 0 4 0 1 で生成された共通鍵を利用 して前記コンテ ンッ実行情報を暗号化する (コンテンッ実行情報暗号化ステップ S 0 4 0 2 )。 さ らに、 前記ステップ 0 4 0 2で暗号化された暗号化コ ンテンツ 実行情報を前記端末装置に送信する (暗号化コ ンテンツ実行情報送信ス テツプ S 0 4 0 3 )。 さ らに、 前記ステップ 0 4 0 1 で暗号化の対象とな つた前記コ ンテンツ実行情報に基づいて前記サーバ装置で管理される前 記利用条件情報を管理する (利用条件情報管理ステップ S 0 4 0 4 )。 さ らに、 前記ステ ップ 0 4 0 3 で送信された前記暗号化コ ンテンツ実行情 報を受信する (暗号コンテンツ実行情報受信ステップ S 0 4 0 5 )。 さ ら に、 前記利用条件情報であって、 端末装置で管理されているものに基づ いて共通鍵を生成する (端末装置側共通鍵生成ステップ S 0 4 0 6 )。 さ らに、 前記ステップ 0 4 0 6で生成した共通鍵を利用 して前記ステップ 0 4 0 5で受信した前記暗号化コンテンツ実行情報を復号化してコンテ ンッ実行情報を取得する (コンテンツ実行情報復号化ステップ S 0 4 0 7 )。 最後に、 前記ステップ S 0 4 0 7で復号化されて取得されたコンテ ンッ実行情報に基づいて、 前記端末装置で管理される前記利用条件情報 を管理する (端末装置側利用条件情報管理ステップ S 0 4 0 8 )。 Usage condition information, which is information relating to one or more of the number of times the content is used, the expiration date, the usage period, and the content ID, which are allowed in the terminal device in association with the terminal device. A common key is generated based on the managed key (server device-side common key generation step S0401). The content execution information is encrypted by using the common key generated in step 0401 (content execution information encryption step S0402). Further, the encrypted content execution information encrypted in step 0402 is transmitted to the terminal device (encrypted content execution information transmission step S0403). Further, the use condition information managed by the server device is managed based on the content execution information that has been encrypted in step 0401 (use condition information management step S04). 0 4). Further, it receives the encrypted content execution information transmitted in step 0403 (encrypted content execution information receiving step S0405). So Next, a common key is generated based on the usage condition information managed by the terminal device (terminal device side common key generation step S0406). Further, the encrypted content execution information received in step 0405 is decrypted using the common key generated in step 0406 to obtain content execution information (content execution information decryption). Conversion step S 0 4 0 7). Finally, the use condition information managed by the terminal device is managed based on the content execution information obtained by decoding in the step S 407 (the terminal device side use condition information management step S 0 4 0 8).
なお、 上述のとお り 、 暗号化部 0 2 0 3 で暗号化するコンテンツ実行 情報は、 端末装置から送信されるコンテンツ実行情報の配信の要求であ るコンテンツ実行情報配信要求に基づいて特定するこ とができる。 例え ば、 図 5 に示すよ う に、 前記サーバ装置 0 5 0 0 にコンテンツ実行情報 配信要求受信部 0 5 0 5 をさ らに設け、 前記端末装置 0 5 1 0 に、 コン テンッ実行情報配信要求入力部 0 5 1 5及びコンテンツ実行情報配信要 求送信部 0 5 1 6 をさ らに設ける。 そして、 前記コンテンツ実行情報配 信要求入力部 0 5 1 5 で入力したコンテンツ実行情報配信要求を、 前記 コンテンツ実行情報配信要求送信部 0 5 1 6から送信し、 前記コンテン ッ実行情報配信要求受信部 0 5 0 5で受信する。 以上のよ う にして、 端 末装置 0 5 1 0から送信されたコンテンツ実行情報配信要求をサーバ装 置 0 5 0 0が受信し、 当該コンテンツ実行情報配信要求に基づいて前記 コンテンツ実行情報を特定するこ とができる。 産業上の利用可能性  As described above, the content execution information to be encrypted by the encryption unit 0203 is specified based on the content execution information distribution request that is a request for distribution of the content execution information transmitted from the terminal device. Can be. For example, as shown in FIG. 5, a content execution information delivery request receiving unit 0505 is further provided in the server device 0500, and the content execution information delivery unit is provided in the terminal device 0510. A request input section 0 5 15 and a content execution information distribution request transmission section 0 5 16 are further provided. The content execution information distribution request input unit 0 5 15 transmits the content execution information distribution request input from the content execution information distribution request transmission unit 0 5 16, and the content execution information distribution request reception unit Receive with 0 5 0 5. As described above, the server device 0500 receives the content execution information distribution request transmitted from the terminal device 0510, and identifies the content execution information based on the content execution information distribution request. can do. Industrial applicability
このよ う に、 本願発明を利用するこ とによ り 、 サーバ装置と端末装置 との間で共通鍵 (若しく は鍵の生成情報) を送受信するこ となく 、 共通 鍵を両装置の間で共有し、 また、 両装置の間で共有する共通鍵を容易に 変えるこ とができる。 As described above, by using the present invention, a common key (or key generation information) is not transmitted and received between the server device and the terminal device, and the common key is exchanged between the two devices. And easily share a common key shared between both devices. You can change it.
また、 仮に、 暗号化されたコ ンテンツ実行情報が本来の送信先でない 他の端末装置等で不正に取得されても、 当該他の端末装置では共通鍵を 生成するこ とができない。 共通鍵を生成するためには、 暗号化されたコ ンテンッ実行情報を本来受信すべき端末装置が有する利用条件情報を得 なければならないからである。  Also, even if the encrypted content execution information is illegally acquired by another terminal device that is not the original transmission destination, the other terminal device cannot generate a common key. This is because, in order to generate a common key, it is necessary to obtain usage condition information possessed by the terminal device that should originally receive the encrypted content execution information.
この点、 最初に端末装置とサーバ装置との間で利用条件情報を共有す る方法によっては、当該利用条件情報が不正に取得されるおそれはある。 しかし、 上述のとおり利用条件情報は、 最初にサーバ装置及び端末装置 で共有された後は、 それぞれの装置でコ ンテンツ実行情報に基づいて更 新される。 そして、 更新後の利用条件情報が、 サーバ装置と端末装置と の間において送受信されるこ とはない。  In this regard, there is a possibility that the usage condition information is illegally acquired depending on the method of sharing the usage condition information between the terminal device and the server device first. However, as described above, the usage condition information is first shared by the server device and the terminal device, and then updated by each device based on the content execution information. Then, the updated usage condition information is not transmitted and received between the server device and the terminal device.
従って、 利用条件情報の更新後は、 更新後の利用条件情報を直接端末 装置から不正に取得するか、 若しく は、 最初の利用条件情報及ぴ更新に 利用された全てのコンテンツ実行情報を不正に取得しなければ共通鍵を 不正に得るこ とができない。 後者のケースでは、 共通鍵を不正に利用し よ う とする者が、 特定の端末装置とサーバ装置との間の情報の送受信を 常に監視しなければならないので現実的には想定しがたい。 従って、 本 願発明を利用すれば、 サーバ装置と端末装置間で安全に共通鍵を共有す るこ とができる。  Therefore, after the use condition information is updated, the updated use condition information is directly obtained from the terminal device illegally, or the first use condition information and all the content execution information used for the update are illegally obtained. Otherwise, the secret key cannot be obtained fraudulently. In the latter case, it is hard to imagine it because a person trying to use the common key illegally must constantly monitor the transmission and reception of information between a specific terminal device and a server device. Therefore, if the present invention is used, the common key can be safely shared between the server device and the terminal device.
また、 本願発明のよ う にサーバ装置と端末装置間で安全に共有可能な 共通鍵を利用すれば、 他の共通鍵若しく はその共通鍵の生成情報の不正 な取得を従来技術に比べてよ り 困難にしてサーバ装置と端末装置で送受 信するこ と もでき る。 上述の従来技術で示される公開鍵方式の鍵は、 一 般的にはセキュ リ ティが高いといわれている。 しかし、 情報の送信側と 受信側で送受信する暗号化のための公開鍵が、 復号化のための秘密鍵を 解読する手がかり となる場合があ り セキユ リ ティが十分でない場合があ る。 In addition, if a common key that can be safely shared between the server device and the terminal device is used as in the present invention, illegal acquisition of another common key or generation information of the common key can be compared with the conventional technology. It can be more difficult to send and receive data between the server device and the terminal device. It is generally said that the public key system shown in the above-mentioned prior art has high security. However, the public key for encryption transmitted and received between the information sending side and the receiving side uses the private key for decryption. May provide clues to decryption and may not provide sufficient security.
なお、 本願発明は、 本来はコンテンツの実行に利用する利用条件情報 を共通鍵の生成のために流用 しているので、 共通鍵の生成のためにのみ 必要な情報をサーバ装置と端末装置間で送受信するこ とはない。  Since the invention of the present application originally uses the usage condition information used for executing the content to generate the common key, information necessary only for generating the common key is transmitted between the server device and the terminal device. There is no transmission or reception.

Claims

請求の範囲 The scope of the claims
1 . 端末装置と関連付けて、 その端末装置に許容されるコ ンテンツの利 用回数、 利用期限、 利用期間、 コンテンツ I Dのいずれか一又は二以上 に関する情報である利用条件情報を、 端末装置に実行させるコ ンテンツ の実行に関する情報である コンテンツ実行情報に基づいて管理するサー バ装置側利用条件情報管理部と、 1. In association with the terminal device, execute the usage condition information, which is information on one or more of the number of usages of the content allowed, the usage period, the usage period, and the content ID, to the terminal device. A server device usage condition information management unit that manages based on content execution information that is information related to the execution of the content to be executed;
前記サーバ装置側利用条件情報管理部で管理されている利用条件情報 に基づいて共通鍵を生成するサーバ装置側共通鍵生成部と、  A server-side common key generation unit that generates a common key based on the usage condition information managed by the server-side usage condition information management unit;
前記共通鍵生成部にて生成された共通鍵を利用して前記コ ンテンツ実 行情報を暗号化する暗号化部と、  An encryption unit that encrypts the content execution information using a common key generated by the common key generation unit;
前記暗号化部にて暗号化された暗号化コ ンテンツ実行情報を前記端末 装置に送信する送信部と、  A transmission unit for transmitting the encrypted content execution information encrypted by the encryption unit to the terminal device;
を有するサーバ装置と、 A server device having
前記暗号化コンテンツ実行情報を受信する受信部と、  A receiving unit that receives the encrypted content execution information,
前記利用条件情報を前記コ ンテンツ実行情報に基づいて管理する端末 装置側利用条件情報管理部と、  A terminal device side use condition information management unit that manages the use condition information based on the content execution information,
前記端末装置側利用条件情報管理部で管理されている前記利用条件情 報に基づいて共通鍵を生成する端末装置側共通鍵生成部と、  A terminal-side common key generation unit that generates a common key based on the usage condition information managed by the terminal device-side usage condition information management unit;
前記端末装置側共通鍵生成部にて生成された共通鍵を利用 して前記受 信部で受信した暗号化コンテンッ実行情報を復号化してコ ンテンツ実行 情報を取得する複号化部と、  A decryption unit that decrypts the encrypted content execution information received by the receiving unit by using the common key generated by the terminal-side common key generation unit and acquires the content execution information;
を有する端末装置と、 A terminal device having
からなる情報管理システムであって、 An information management system comprising
前記サーバ装置側利用条件情報管理部と、 前記端末装置側利用条件情 報管理部とが有する利用条件情報は、 通信を介するこ となく 同期してい るこ とを特徴とする情報管理システム。 The use condition information of the server-side use condition information management unit and the use condition information of the terminal device-side use condition information management unit are synchronized without communication. Information management system.
2 . 前記サーバ装置は、 さ らに、 2. The server device further comprises:
前記コ ンテンツ実行情報の配信要求であるコ ンテンツ実行情報配信要 求を受信するコンテンッ実行情報配信要求受信部を有し、  A content execution information distribution request receiving unit that receives a content execution information distribution request that is the content execution information distribution request;
前記端末装置は、 さ らに、  The terminal device further comprises:
前記コ ンテンツ実行情報配信要求を入力するコンテンツ実行情報配信 要求入力部と、  A content execution information distribution request input unit for inputting the content execution information distribution request;
前記コ ンテンッ実行情報配信要求を送信する コ ンテンッ実行情報配信 要求送信部と、 を有する請求の範囲 1 に記載の情報管理システム。  2. The information management system according to claim 1, comprising: a content execution information distribution request transmitting unit that transmits the content execution information distribution request.
3 . 前記コ ンテンツは暗号鍵で暗号化されていて、 3. The content is encrypted with an encryption key,
前記コンテンツ実行情報は、 前記暗号鍵を復号化するための復号鍵を 前記端末装置で生成するための情報である鍵生成情報を含む、  The content execution information includes key generation information that is information for generating a decryption key for decrypting the encryption key in the terminal device.
請求の範囲 1又は 2に記載のコ ンテンツ実行装置。  3. The content execution device according to claim 1 or 2.
4 . 請求の範囲 1 に記載のサーバ装置。 4. The server device according to claim 1.
5 . 請求の範囲 1 に記載の端末装置。 5. The terminal device according to claim 1.
6 . サーバ装置と端末装置とからなる情報管理システムにおける情報管 理方法であって、  6. An information management method in an information management system including a server device and a terminal device,
前記端末装置と関連付けて、 その端末装置に許容されるコ ンテンツの 利用回数、 利用期限、 利用期間、 コ ンテンツ I Dのいずれか一又はニ以 上に関する情報である利用条件情報であって、 前記サーバ装置で管理さ れるものに基づいて共通键を生成するサーバ装置側共通鍵生成ステ ップ と、  Usage condition information, which is information relating to any one or more of the number of times of use of content, the expiration date, the usage period, and the content ID, which are allowed for the terminal device in association with the terminal device, A server-side common key generation step for generating a common key based on what is managed by the device; and
前記サーバ装置側共通鍵生成ステ ップで生成された共通鍵を利用 して 前記コ ンテンツ実行情報を暗号化する コ ンテンツ実行情報暗号化ステツ プと、  A content execution information encryption step of encrypting the content execution information using a common key generated in the server-side common key generation step;
前記コ ンテンツ実行情報暗号化ステ ップで暗号化された暗号化コ ンテ ンッ実行情報を前記端末装置に送信する暗号化コ ンテンツ実行情報送信 ステップと、 The encrypted content encrypted in the content execution information encryption step. Transmitting encrypted content execution information to the terminal device,
前記コンテンッ実行情報暗号化ステップで暗号化の対象となった前記 コンテンツ実行情報に基づいて、 前記サーバ装置で管理される前記利用 条件情報を管理する利用条件情報管理ステップと Λ Based on the Konten' the content execution information as a target of encryption in execution information encrypting step, and the usage condition information management step of managing the usage condition information managed by the server device Λ
前記暗号化コンテンッ実行情報送信ステ ップで送信された前記暗号化 コ ンテンツ実行情報を受信する暗号コ ンテンツ実行情報受信ステップと . 前記利用条件情報であって、 端末装置で管理されているものに基づい て共通鍵を生成する端末装置側共通鍵生成ステップと、  An encrypted content execution information receiving step of receiving the encrypted content execution information transmitted in the encrypted content execution information transmitting step; and a use condition information managed by a terminal device. A terminal-side common key generation step of generating a common key based on the
前記端末装置側共通鍵生成ステップで生成した共通鍵を利用して前記 暗号コ ンテンツ実行情報受信ステ ップで受信した前記暗号化コ ンテンツ 実行情報を復号化してコ ンテンツ実行情報を取得する コ ンテンツ実行情 報復号化ステップと、  Using the common key generated in the terminal-side common key generation step, decrypting the encrypted content execution information received in the encrypted content execution information receiving step to obtain content execution information Execution information decoding step;
前記コ ンテンツ実行情報復号化ステ ップで復号化されて取得された前 記コンテンツ実行情報に基づいて、 前記端末装置で管理される前記利用 条件情報を管理する端末装置側利用条件情報管理ステップと、  A terminal device side use condition information management step of managing the use condition information managed by the terminal device based on the content execution information decoded and acquired in the content execution information decoding step; ,
からなる情報管理方法。 Information management method.
PCT/JP2003/005844 2003-05-09 2003-05-09 Information management system WO2004100443A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2003235920A AU2003235920A1 (en) 2003-05-09 2003-05-09 Information management system
PCT/JP2003/005844 WO2004100443A1 (en) 2003-05-09 2003-05-09 Information management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2003/005844 WO2004100443A1 (en) 2003-05-09 2003-05-09 Information management system

Publications (1)

Publication Number Publication Date
WO2004100443A1 true WO2004100443A1 (en) 2004-11-18

Family

ID=33428602

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2003/005844 WO2004100443A1 (en) 2003-05-09 2003-05-09 Information management system

Country Status (2)

Country Link
AU (1) AU2003235920A1 (en)
WO (1) WO2004100443A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0983507A (en) * 1995-09-19 1997-03-28 Hitachi Inf Syst Ltd Generating and sharing method for cryptographic key
JP2002304330A (en) * 2001-04-06 2002-10-18 Sony Corp Method and system for communication, contents providing system, and contents acquiring device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0983507A (en) * 1995-09-19 1997-03-28 Hitachi Inf Syst Ltd Generating and sharing method for cryptographic key
JP2002304330A (en) * 2001-04-06 2002-10-18 Sony Corp Method and system for communication, contents providing system, and contents acquiring device

Also Published As

Publication number Publication date
AU2003235920A1 (en) 2004-11-26

Similar Documents

Publication Publication Date Title
KR102265652B1 (en) Blockchain-based digital rights management
EP1714459B1 (en) Accessing protected data on network storage from multiple devices
US8233627B2 (en) Method and system for managing a key for encryption or decryption of data
US8824674B2 (en) Information distribution system and program for the same
EP2677682B1 (en) Key management system
US8694783B2 (en) Lightweight secure authentication channel
EP1852799B1 (en) Device-independent management of cryptographic information
US20080209231A1 (en) Contents Encryption Method, System and Method for Providing Contents Through Network Using the Encryption Method
CN101094394A (en) Method for guaranteeing safe transmission of video data, and video monitoring system
JP2000261427A (en) Encryption communication terminal, encryption communication center equipment, encryption communication system and storage medium
JPH11275068A (en) Key management server, terminal equipment for chat system, chat system and recording medium
WO2012111714A1 (en) File server device and file server system
WO2013178019A1 (en) Method, device and system for implementing media data processing
WO2016136024A1 (en) Key replacement direction control system, and key replacement direction control method
WO2012161417A1 (en) Method and device for managing the distribution of access rights in a cloud computing environment
KR101220166B1 (en) Data access privilege managing method
JP2000347566A (en) Contents administration device, contents user terminal, and computer-readable recording medium recording program thereon
KR101220180B1 (en) Method and system of sharing digital contents applied DRM between apparatuses in theater
JP2006279269A (en) Information management device, information management system, network system, user terminal, and their programs
KR102385328B1 (en) Method and System of Digital Rights Management
CN112035820B (en) Data analysis method used in Kerberos encryption environment
KR100989371B1 (en) DRM security mechanism for the personal home domain
KR20110127789A (en) System for encrypting synchronization database and method therefor
WO2004100443A1 (en) Information management system
JP2001285278A (en) Encryption communication method and encryption communication system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC OF 070206, FORM 1205A

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP

122 Ep: pct application non-entry in european phase