WO2005048111A1 - 半導体メモリカード - Google Patents
半導体メモリカード Download PDFInfo
- Publication number
- WO2005048111A1 WO2005048111A1 PCT/JP2004/016954 JP2004016954W WO2005048111A1 WO 2005048111 A1 WO2005048111 A1 WO 2005048111A1 JP 2004016954 W JP2004016954 W JP 2004016954W WO 2005048111 A1 WO2005048111 A1 WO 2005048111A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- memory card
- access
- nonvolatile memory
- authentication area
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0608—Saving storage space on storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0637—Permissions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0833—Card having specific functional components
- G07F7/084—Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Definitions
- the present invention relates mainly to a video / audio signal processing terminal that records / reproduces video / audio using a network.
- a typical mobile terminal with a wireless connection function is a mopile terminal that a user carries while moving.
- Examples of the mopile terminal include a mobile phone, a PDA (Personal Digital Assistance), and a notebook PC (Personal Computer).
- a portable recording medium such as a memory card is usually inserted into a mopile terminal, and contents are recorded there.
- a portable recording medium is inserted into a terminal connected to a large-capacity recording medium such as a PC hard disk.
- the hard disk may be used as a backup area for contents.
- An object of the present invention is to increase the recording capacity of a portable recording medium that can be used by a mobile terminal. Another object of the present invention is to protect contents distributed via a wireless network based on copyright. Still another object of the present invention is to provide a portable recording medium that can be used in any mono-phone terminal.
- Invention 1 provides a semiconductor memory card that is removable from an electronic device.
- This semiconductor memory card has the following elements. • rewritable first non-volatile memory,
- Communication means for controlling access by the electronic device to a storage device on a network having a rewritable second nonvolatile memory
- a space integration unit that generates a pseudo-integrated memory space including the first nonvolatile memory and the second nonvolatile memory.
- the storage device is, for example, a database and a DBM (Data Base Management system) that manages writing and reading to and from the database.
- DBM Data Base Management system
- the invention 2 is based on the invention 1, and judges whether or not the data to be accessed by the second access means is a writing or reading force by another semiconductor memory card, and according to the judgment result, Provided is a semiconductor memory card further provided with conflict determination means for starting, stopping, or delaying writing and Z or reading by a second access means.
- the editing process is a process of changing a part of the existing recording data, such as a change of a title, a partial deletion, and a brightness adjustment.
- the recording process is a process of writing new data into the second non-volatile memory of the storage device.
- the reproduction process is a process of reading existing recording data without changing it.
- Invention 3 provides the semiconductor memory card according to Invention 1, wherein the communication means stores an address of the storage device on the network.
- the electronic device can access the storage device based on the stored network address.
- Invention 4 provides the semiconductor memory card according to Invention 3, wherein the communication means accesses the storage device using identification information of the semiconductor memory card. Mutual authentication can be performed between the storage device and the semiconductor memory card based on the identification information of the semiconductor memory card.
- Invention 5 provides the semiconductor memory card according to Invention 1, further comprising an encryption means and an authentication means.
- the encryption means generates an encryption key for encrypting the data, and encrypts the data with the encryption key.
- the authentication means verifies the validity of the electronic device.
- the first nonvolatile memory includes a first authentication area and a first non-authentication area which are predetermined storage areas.
- the first access unit controls access by the electronic device to the first non-authentication area. Further, the first access unit permits the electronic device to access the first authentication area when the authentication unit authenticates the validity of the electronic device.
- the second access means controls access by the electronic device to a second non-authentication area, which is a predetermined storage area included in the second nonvolatile memory.
- the space integration means assigns an address of a second non-authentication area in the second nonvolatile memory to the data encrypted with the encryption key, and assigns an address of a first authentication area in the first nonvolatile memory.
- a dress is assigned to the encryption
- An encryption key and an encryption content for encrypting content protected by copyright are stored in different locations. Even if the encrypted content is obtained illegally, the encryption key is not obtained at the same time, so that the decryption of the encryption content becomes impossible and the security of the content can be guaranteed.
- the space integration means is configured to determine which of the first non-authentication area in the first non-volatile memory and the second non-authentication area in the second non-volatile memory.
- a semiconductor memory card is provided which determines whether to assign a dress to data encrypted with the encryption key, and allocates an address to the data according to the determination.
- the method of determining whether to allocate the first non-authentication area or the second non-authentication area is not particularly limited. Which method to use can be determined in consideration of user convenience and storage area efficiency.
- the space integration means may receive an instruction from the user as to whether to write data in the semiconductor memory card or the storage device. In this case, the integrating means can determine which storage area address is to be assigned to the encrypted data based on the instruction from the user. Users can conveniently store data according to their own convenience.
- the spatial integration means may preferentially store data in one or the other and store it in the other if there is not enough free space.
- the space integration means may check whether the first non-authentication area in the first nonvolatile memory has a sufficient free area.
- the integration means can determine whether or not to assign a shifted address of the first non-authentication area or the second non-authentication area to the data. Since the data storage destination is selected according to the data amount, the writing process can be made more efficient.
- the second access unit uses a predetermined storage area in the second nonvolatile memory when the authentication unit authenticates the validity of the electronic device.
- a semiconductor memory card that permits access to the certain second authentication area by the electronic device.
- the first authentication area in the semiconductor memory card can also be apparently increased. Therefore, even if data such as content is stored in the first or second authentication area without being encrypted, a sufficient storage area can be prepared and content security can be guaranteed.
- Invention 8 provides the semiconductor memory card according to Invention 1, wherein the first nonvolatile memory includes a management area.
- the space integration means allocates an address in the first nonvolatile memory or the second nonvolatile memory to data, and associates the data in the management area with a data identifier for identifying the data and the allocated address.
- the first access means and the second access means may include the first nonvolatile memory or the first access means.
- a request for writing the data to the second nonvolatile memory is accepted, and the data is written to a storage area corresponding to an address assigned to the data.
- the management area corresponds to a so-called FAT.
- the FAT in the first non-volatile memory manages the addresses of the first authentication area and the first non-authentication area in the first non-volatile memory and the address of the second non-authentication area in the second non-volatile memory. I do.
- the spatial integration means assigns addresses 0000-3FFF to the first authentication area and the second non-authentication area, and assigns addresses 4000-FFFF to the second non-authentication area.
- the identifier of the data written in the first authentication area, the first non-authentication area, or the second non-authentication area is stored in the FAT in association with one of the addresses managed by the space integration means. In this way, the space integration means can generate a pseudo integrated memory space.
- the second access means accepts a data read request and reads an address of a second nonvolatile memory to which the data is written from the management area. And a semiconductor memory card for reading the data by accessing the read address via the communication means.
- the second access means accesses the address corresponding to the data identifier and stores the data in the second non-authentication area if the data is stored in the second non-authentication area. Read data from the area. This allows the user to read data such as contents from the storage device as well as from the semiconductor memory card as long as the user has the semiconductor memory card.
- Invention 10 is the semiconductor memory according to invention 8, further comprising an encryption unit for generating an encryption key for encrypting and decrypting the data, and encrypting the data with the encryption key. Offer a card.
- the second access means reads the address of the second non-authentication area in which the data encrypted with the encryption key is written, reads the address of the management area, and reads the address of the second non-authentication area. Accessing the address and reading the encrypted data via the communication means.
- the first access means reads the address of the first authentication area, in which the encryption key is written, in the management area, and accesses the address in the first authentication area to read the encryption key. put out.
- An encryption key and an encryption content for encrypting the content protected by the copyright are stored in different places. Even if the encrypted content is obtained illegally, the encryption key is not obtained illegally at the same time, so that the decryption of the encryption content becomes impossible and the security of the content can be guaranteed.
- Invention 11 provides a memory space management method including the following steps.
- Invention 12 provides a memory space management program which is detachable from an electronic device and recorded on a semiconductor memory card including a computer. This program causes the computer to function as the following means.
- First access control means for controlling access by the electronic device to a rewritable first nonvolatile memory
- Communication means for controlling access by the electronic device to a storage device on a network having a rewritable second nonvolatile memory
- a space integration unit that generates a pseudo-integrated memory space including the first nonvolatile memory and the second nonvolatile memory.
- This program has the same operation and effect as the first aspect of the invention.
- a computer-readable recording medium on which the program is recorded is also included in the present invention.
- the recording medium is a computer-readable / writable flexible disk, hard disk, Conductive memory, CD-ROM, DVD, magneto-optical disk (MO) and others.
- the programs include those stored in a recording medium and those that can be downloaded.
- FIG. 1 A system including a terminal into which a memory card is inserted
- FIG. 2 A block diagram showing a functional configuration of a memory card.
- FIG. 6 is a conceptual explanatory diagram of information recorded in a FAT where a space integration unit writes.
- FIG. 9 is a flowchart showing an example of the flow of a connection process
- FIG. 10A is a flowchart showing an example of the flow of a writing process
- FIG. 10B Flow chart showing an example of the flow of a writing process (part of the memory card side)
- FIG. 11 is a flowchart showing an example of the flow of a list output process
- FIG. 12 is a flowchart showing an example of the flow of a reading process
- FIG. 13 is a flowchart showing an example of the flow of an exclusive control process
- a semiconductor memory card (hereinafter, simply referred to as a memory card) of the present invention is inserted into an electronic device to write and read data.
- the memory card has an authentication area (equivalent to the first authentication area) that requires authentication of the electronic device that performs writing and reading, and a non-authentication area that does not require authentication (equivalent to the first non-authentication area).
- the memory card of the present invention is used for a wireless network. It has connection means, which allows the electronic device to access a storage server (corresponding to a storage device) on the network.
- the storage server has at least a non-authentication area (corresponding to the second non-authentication area).
- An encryption key used for encryption and decryption of content protected by copyright or the like is written in an authentication area on the memory card. Even if anyone can access the content data in the non-authentication area on the storage server, the encryption key required to decrypt the content is in the memory card. As a result, only a person having a memory card and a legitimate electronic device can decrypt, reproduce, and output the content using the encryption key. Therefore, the security of the data protected by the copyright or the like can be guaranteed while the storage capacity of the memory card is apparently increased.
- FIG. 1 shows an example of a system 10 including a terminal 14 into which a memory card 13 of the present invention is inserted.
- the system 10 includes a storage server 11, a wireless network base station 12, a memory card 13, a terminal 14 (corresponding to an electronic device) into which the memory card 13 is inserted, and an output device 15.
- the output device 15 is a speaker or a display for outputting a sound or an image.
- the storage server 11 and the base station 12 are connected by a network 106.
- the base station 12 and the memory card 13 can be connected by a wireless network.
- the configurations of the memory card 13 and the storage server 11 will be described in more detail.
- FIG. 2 is a block diagram showing a functional configuration of the memory card 13. As shown in FIG.
- the memory card 13 operates by receiving an external power supply and a clock signal supply via a power supply terminal 131.
- the memory card 13 is electrically connected to an external device such as the terminal 14 by a data IZO terminal 132.
- the memory card 13 further has the following elements (a) to (h). ing.
- the wireless communication unit 133 connects the memory card 13 and the network 106 via the base station 12.
- the connection uses connection information stored in the NV-RAM 136 described later.
- the ROM 134 stores a master key and various programs. Various programs are executed by a CPU 137 described later, and achieve various functions.
- the master key is used for mutual authentication with the terminal 14 and the storage server 11.
- the master key is also used for protecting data in the flash memory 139 and the storage server 11.
- the RAM 135 is used as a work area when the CPU 137 performs processing.
- NV—RAM 136 is a non-volatile memory that stores connection information required to connect to the storage server 11.
- the connection information includes, for example, the network address of the storage server 11.
- FIG. 3 shows an example of the connection information stored in the NV-RAM 136.
- the URL of the storage server 11, the connection identification ID, and the connection authentication password are included in the connection information.
- the connection identification ID and the connection authentication password are identification information for identifying the memory card 13.
- the CPU 137 executes various programs stored in the ROM 134 to achieve various functions.
- the special area 138 stores in advance information such as a media ID which is identification information unique to the memory card 13 and a manufacturer name of the memory card 13.
- the media ID is a unique identifier capable of distinguishing the memory card 13 from other semiconductor memory cards 13.
- the media ID is used for mutual authentication between devices, and is used to prevent unauthorized access to the authentication area and unauthorized access to the storage server 11.
- Flash memory corresponding to first non-volatile memory
- the flash memory 139 is a rewritable non-volatile memory that can be repeatedly written.
- the flash memory 139 has a FAT (corresponding to a management area) 139a, an authentication area (corresponding to a first authentication area) 139b, and a non-authentication area (corresponding to a first non-authentication area) 139c as logical storage areas.
- the authentication area 139b is a storage area that can be accessed only by the terminal 14 that has been authenticated as a valid device.
- the non-authentication area 139c is a storage area that the terminal 14 can access without requiring such authentication.
- the FAT 139a is a storage area for uniformly managing a memory space including a storage area in the flash memory 139 and the storage server 11.
- the authentication area 139b is used to store important data related to copyright protection.
- the authentication area 139b is an area that can be read and written only when authentication between the terminal 14 and the memory card 13 is successful.
- An encrypted command is used to access the authentication area 139b.
- an encryption key obtained by encrypting a password and the number of times of reading are stored.
- Passwords are used to encrypt copyrighted data.
- the number of readings indicates the number of times the data can be reproduced or digitally output.
- the encryption key and the number of times of reading are stored in association with the data ID, and can be searched using the data ID as a key.
- the non-authentication area 139c is used as an auxiliary storage device in a general computer system.
- the non-authentication area 139c is an area that can be accessed by published commands such as ATA and SCSI, that is, can be read and written without authentication. Therefore, data can be read from and written to the non-authentication area 139c by the file management software on the terminal 14, as in the case of Flash ATA or CompactFlash (registered trademark).
- the non-authentication area 139c stores, for example, encrypted contents and list data encrypted with the password.
- FIG. 4 is a conceptual diagram of the list data. In this figure, as an example, list data for outputting a list of recorded programs is shown.
- FIG. 5 is an example of a list display screen of recorded programs displayed based on the list data of FIG. This screen accepts a read processing request for an arbitrary program.
- the information stored in the authentication area 139b and the non-authentication area 139c is only an example. Yes, and is not limited to the examples given here.
- the encryption / decryption circuit 1310 is a control circuit for encrypting and decrypting data.
- the encryption / decryption circuit 1310 encrypts and writes the data when writing the data into the flash memory 139, and decrypts the data when reading the data from the flash memory 139. This is to prevent an unauthorized user from disassembling the memory card 13 and directly analyzing the contents of the flash memory 139 to steal an encryption key stored in the authentication area. .
- the program stored in ROM 134 causes CPU 137 to achieve the following functions.
- the following functions are realized by a program.
- the following functions can be realized by a control circuit having active element power in a hardware manner.
- the authentication program stored in the ROM 134 causes the CPU 137 of the memory card 13 to function as an authentication unit (corresponding to an authentication unit).
- the authentication unit performs a challenge-response mutual authentication with the terminal 14 attempting to access the memory card 13.
- the authentication unit authenticates the validity of the terminal 14 by detecting whether or not the terminal 14 has the same encryption program as the encryption program.
- the challenge-response mutual authentication means that the terminal 14 is authenticated by comparing challenge data sent from the memory card 13 to the terminal 14 with response data sent from the terminal 14 to the memory card 13. This is an authentication method in which both devices mutually perform an authentication step of determining whether or not the device can perform the authentication.
- the memory card 13 sends challenge data for verifying the validity of the terminal 14 to the terminal 14.
- the terminal 14 performs a process of proving its validity, generates response data, and sends the response data to the memory card 13.
- the command determination program stored in the ROM 134 causes the CPU 137 of the memory card 13 to function as a command determination unit.
- the command judging unit outputs a command which is an instruction to the memory card 13. Determine the type of command.
- the commands include commands for reading, writing, and erasing data in the flash memory 139 and the storage server 11. Such a command is
- the access control program stored in the ROM 134 causes the CPU 137 of the memory card 13 to function as an access control unit (corresponding to a first access unit and a second access unit).
- the access control unit writes and reads data to and from the authentication area 139b and the non-authentication area 139c of the flash memory 139, respectively. Only writing requests and reading requests to the authentication area 139b from the terminal 14 authenticated by the authentication unit are permitted.
- the access control unit writes and reads data to and from an unauthenticated area (corresponding to a second unauthenticated area) 111 of the storage server 11 described below.
- Specific methods of writing and reading include the following, for example.
- the storage server 11 and the wireless communication unit 133 can communicate by HTTP (HyperText Transfer Protocol).
- the access control unit can also use the GET command and the RANGE specifier via the wireless communication unit 133 to read data from the specified address on the storage server 11.
- the access control unit can write data to a specified address on the storage server 11 by using the PUSH command ZPOST command and the RANGE specifier.
- the communication between the storage server 11 and the wireless communication unit 133 is not limited to HTTP.
- another communication protocol such as FTP (File Transfer Protocol) may be used.
- the data writing process includes a recording process and an editing process.
- the data reading process includes a reproducing process and a chasing reproducing process.
- the recording process is a process of writing new data into a storage area.
- the editing process is a process for changing a part of existing data, such as changing a title, erasing a part, and adjusting brightness.
- the reproduction process is a process of outputting existing data without changing it.
- the chasing reproduction process is a process of outputting existing data without changing it within a range where a data write address does not exceed a data read address.
- data reading Processing may include digital output of data, such as copying or moving.
- the space integration program stored in the ROM 134 causes the CPU 137 of the memory card 13 to function as a space integration unit (corresponding to space integration means).
- the space integration unit generates a pseudo integrated memory space including the authentication area 139b and the non-authentication area 139c of the flash memory 139, and the non-authentication area 111 of the storage server 11.
- FIG. 6 is a conceptual explanatory diagram of information recorded in the FAT 139a where the space integration unit writes.
- the FAT 139a is a recording area for address management in the flash memory 139.
- the FAT 139a stores the addresses of the authentication area 139b and the non-authentication area 139c of the flash memory 139, and the address of the non-authentication area 111 of the storage server 11.
- the address of the pseudo unified memory space is stored in the FAT 139a.
- the identifier of the data written to any storage area is stored in the FAT in association with the address where the data was written. For example, the data ID "
- ENCRYPT / MO V00011.MPG J is stored in association with addresses 0000-0099. This indicates that the content is stored at the content address 0000-0099 specified by the data ID.
- the space integration unit damages the authentication area 139b and the non-authentication area 139c of the flash memory 139 [this address 0000-1 to 3999], and authenticates the storage area 11 of the storage server 11. Damn it!
- the position of the boundary of each of the regions 139b, 139c, 111 is written into a buffer or the like (not shown) by the space integration unit.
- the position of the boundary line may be fixed or variable. In this figure,
- the data identified by ENCRYPT / MOV00011.MPGJ and “ENCRYPT / MOV00012.MPG” is stored in the authentication area 139b.
- the data identified by “DVD # RTAV / MOV00011.MPG” is stored in the non-authentication area 139c.
- the data identified by “DVD # RTAV / MOV00012.MPG” is stored in the non-authentication area 111 of the storage server 11.
- the space management unit When reading data in response to a terminal 14 read request, the space management unit refers to the FAT 139a and stores the data in either the flash memory 139 or the storage server 11. Then, it is determined whether the data is data, and the determination result and the address are passed to the address control unit.
- FIG. 7 is a conceptual explanatory diagram of address conversion performed by the space integration unit.
- Address conversion is required when writing to or reading from the storage server 11.
- Writing and reading are performed using the buffer 135a in the RAM 135 as a work area.
- This figure shows address conversion when reading a 399 Mbyte data file stored at addresses 4000 to 4399 in the non-authentication area 111 of the storage server 11.
- the Noffer can store up to 100 Mbytes of data and is assigned addresses 0-99.
- the data file is temporarily stored in a buffer in the RAMI 35, for example, in 100 Mbytes.
- the space integration unit converts the address of the buffer from 0-99 to 4000-4099. This address and data are returned to terminal 14.
- the space unifying unit converts the address of the buffer to 4100-4199, and the access control unit returns the address and data to the terminal 14. By repeating this until the end of the data file, the terminal 14 apparently accesses the address 4000-4399.
- the reverse process is performed.
- connection program stored in the ROM 134 causes the CPU 137 of the memory card 13 to function as a connection unit (corresponding to a part of communication means).
- the connection unit connects to the storage server 11 via the wireless communication unit 133 using the connection information stored in the NV-RAM 136. [0057] (2-6) Competition judgment unit
- the contention determination program stored in the ROM 134 causes the CPU 137 of the memory card 13 to function as a contention determination unit (corresponding to first, second, and third contention determination means).
- the conflict determination unit prevents the occurrence of inconsistency when another memory card 13 accesses the same access target. Specifically, the contention determination unit imposes a certain restriction on the writing when the data to be written is to be written to another memory card 13. Further, when the data capacity of the object to be read is a write object of another memory card 13, the conflict determination unit imposes certain restrictions on the read.
- FIG. 8 shows a configuration diagram of the terminal 14.
- the terminal 14 includes a RAM 141, a microprocessor 142, a medium input / output unit 143, a hard disk unit 144, and a video signal output unit 145 connected via an internal bus 146.
- the hard disk unit 144 stores a program.
- each processing unit constituting the terminal 14 achieves its function.
- a non-authentication area 111 is formed in the hard disk unit 144.
- the non-authentication area 111 stores program data and list data, like the non-authentication area 139c on the memory card 13.
- the processing can be broadly divided into (1) connection processing, (2) writing processing, (3) list output processing, (4) reading processing, and (5) exclusive control processing.
- each of the processes (1) and (5) will be described.
- an example will be described in which a list output process is performed along with writing, reading, and reading of program data (hereinafter, referred to as content) protected by copyright.
- the memory card 13 may be abbreviated as RM in some cases.
- FIG. 9 is a flowchart illustrating an example of the flow of a connection process performed when the memory card 13 is inserted into the terminal 14.
- the memory card 13 attempts to connect to the network through the base station 12.
- the following process inserts the memory card 13 into the terminal 14. It is started from that.
- Step S101 Power is supplied to the memory card 13 from the outside via the power supply terminal 131.
- Steps S102-S103 The connection program stored in the ROM 134 is read into the CPU 137 and triggered by the supply of electric power (S102).
- the CPU 137 as the connection unit reads out the connection information stored in the NV-RAM 136 (S103), and based on the connection information, tries to connect to the storage server 11 via the wireless communication unit 133.
- Step S104 The connection unit of the CPU 137 determines whether or not the wireless network is available (S104). If it is not available, it shifts to “network connection standby mode” (S105). During the network connection standby mode, the connection unit checks whether or not the wireless network is continuously available at regular time intervals, for example. On the other hand, the connection unit accesses the contents in the storage server 11 only for the contents in the storage server 11 that have already been downloaded to the RAM 135.
- Step S106 If a wireless network is available, the connection unit connects to the storage server 11 via the wireless communication unit 133.
- Step S107 Further, the connection unit performs authentication with the storage server 11 using the connection information, and establishes a connection.
- Step S110 When there is no other memory card 13 accessing the storage server 11, the connection unit sets the file access mode (S110). Specifically, the connection section The recording processing permission flag and the editing processing permission flag indicating that image and editing are possible are each set to “ON”. In addition, the connection unit sets a reproduction processing permission flag and a tracking reproduction processing permission flag indicating that reproduction and tracking reproduction are possible to “ON”, respectively.
- the connection between the memory card 13 and the storage server 11 can be established. Further, when a conflict occurs with another memory card 13, the memory card 13 can grasp which process conflicts.
- FIGS. 10A and 10B are flowcharts illustrating an example of the flow of processing executed by the terminal 14 and the memory card 13 when the terminal 14 writes content to the memory card 13.
- the terminal 14 When the user of the terminal 14 instructs the data writing process by pressing a predetermined button on the screen or the like, the terminal 14 starts the following process. In the following processing, the terminal 14 makes a content write request to the memory card 13.
- Step S201 The microprocessor 142 of the terminal 14 accepts a write request by pressing a predetermined button on the screen or the like.
- Step S202 The microprocessor 142 of the terminal 14 performs an authentication program for the memory card 13 and a challenge-response type authentication.
- Step S203 If the authentication process with the memory card 13 succeeds, the microprocessor 142 of the terminal 14 requests the memory card 13 to read the master key and the media ID, and acquires them.
- Step S204 The microprocessor 142 of the terminal 14 generates a random number, and generates a nosword for encrypting the content from the master key, the media ID, and the generated random number that have also acquired the memory card 13 power. .
- the random number at this time is, for example, a value obtained by encrypting the challenge data transmitted to the memory card 13 in the above authentication (about L number).
- Step S205 The microprocessor 142 of the terminal 14 encrypts the obtained password with the master key and the media ID to generate an encryption key. Further, the microprocessor 142 requests the memory card 13 to write the generated encryption key into the authentication area 139b, The authentication key is stored in the authentication area 139b. This request is performed by transmitting a command for writing to the authentication area 139b to the memory card 13 after encrypting the command before transmitting the encryption key.
- Step S206 The microprocessor 142 of the terminal 14 transfers the encrypted content to the memory card 13 while encrypting the content with the password, and requests writing.
- the above-described write processing on the terminal 14 side is the same as the case where the non-authentication area 111 is provided on the storage server 11.
- the content is written to either the memory card 13 or the storage server 11 in response to a write request from the terminal 14.
- the following processing is started.
- the following processes can be broadly divided into pre-processing, writing to memory cards, and writing to storage servers.
- Step S301 The authentication unit of the CPU 137 performs challenge-response type authentication with the terminal 14.
- Step S302 In response to the read request from the terminal 14, the access control unit of the CPU 137 reads the master key and the media ID from the ROM 134 and the special area 138, respectively, and passes them to the terminal 14.
- Step S303 If the authentication processing with the terminal 14 is successful in the authentication processing, the access control unit of the CPU 137 sends the encryption key to the authentication area 13 in response to the write request from the terminal 14. Write to 9b.
- Step S 304 In response to a write request from the terminal 14, the access control unit of the CPU 137 receives the encrypted content and temporarily stores it in the RAM 135.
- Step S305 The spatial integration unit of the CPU 137 writes the encrypted content to the gap between the non-authentication area 139c of the memory card 13 or the non-authentication area 111 of the storage server 11. Judge. The process moves to step S306 when writing to the memory card 13, and moves to step S309 to be described later when writing to the storage server 11.
- the method of determining whether to write V or deviation is not particularly limited, but can be performed as follows. For example, an instruction to write the user power of the terminal 14 to any of the terminals 14 may be received, and the writing may be performed according to the instruction.
- the user can store data according to his own convenience, so he is a user.
- the spatial integration unit compares the FAT 139a with the data amount of the encrypted content stored in the RAM 135, and determines the write destination after confirming whether or not there is a free area. Which of the memory card 13 and the storage server 11 is the priority writing destination may be determined in advance, or may be set by the user.
- a non-authentication area in which the ratio of the data amount to the free area becomes smaller may be set as the write destination. Since the storage destination of the data is selected according to the amount of data, the storage area can be used efficiently.
- the write destination can also be determined by appropriately combining the above-described methods and other methods. Which method to use may be determined in consideration of the convenience of the user and the efficiency of the storage area.
- Steps S309-310 If it is determined that the encrypted content is to be written to the storage server 11, the access control unit determines whether the storage server 11 is currently connected. When the connection is established, the process proceeds to step S311. If not connected, wait for network connection Move to mode. If the connection between the memory card 13 and the storage server 11 is established during the network connection standby mode, the flow shifts to step S311.
- Step S311 The access control unit of the CPU 137 executes an exclusive control process described later, and determines whether or not writing to the storage server 11 is possible based on the result. This judgment is made based on whether the recording processing permission flag or the editing processing permission flag is ONZOFF! By the exclusive control processing, or not, based on! /. If the flag is set to SOFF, the process waits until it is turned ON. Instead of waiting, the user may be notified of the state where the specified writing process is not possible and the process may be terminated.
- Step S312 The access control unit of the CPU 137 writes the encrypted content into the non-authentication area 111 of the storage server 11 via the encryption / decryption circuit 1310 and the wireless communication unit 133.
- the space integration unit specifies to the access control unit the URL of the storage server 11 and the address of the non-authentication area 111 to write the encrypted content.
- the access control unit writes, for example, the content of the B-note-i-ride to the specified address by using the URL in the connection information, the three “PUSH” or “POST” commands of HTTP, and the RANGE specifier. .
- Step S313 The access control unit of the CPU 137 adds a record relating to the newly written content to the list data in the non-authentication area 111 of the storage server 11 via the encryption / decryption circuit 1310 and the wireless communication unit 133. I do. Prior to the addition, the space integration unit specifies to the access control unit whether to write a new record at a misaligned address in the non-authentication area 111.
- Step S314 The space integration unit of the CPU 137 updates the FAT 139a in the memory card 13 after the writing by the access control unit is successfully completed.
- the data ID of the content and list data written in the non-authentication area 111 of the storage server 11 and the address in the non-authentication area 111 are stored in the FAT 139a in association with each other.
- the memory space of the flash memory 139 in the memory card 13 can be expanded without changing the writing processing on the terminal 14 side. Further, even when writing content to the storage server 11, the storage locations of the encrypted key and the encrypted content are different. Therefore, even if the encrypted content is obtained illegally, the encryption key Since the contents are not illegally obtained at the same time, the decryption of the encrypted content becomes impossible, and the security of the content can be guaranteed.
- FIG. 11 is a flowchart illustrating an example of the flow of processing on the terminal 14 side and the memory card 13 side in the list output processing. List output processing is performed prior to reading the content.
- the terminal 14 requests list data from the memory card 13 and performs display based on the list data.
- a list output request is generated by the user pressing a button on the screen or the like, the following processing is started.
- Step S401 The microprocessor 142 of the terminal 14 requests list data from the memory card 13 in response to a request from the user.
- Step S402 The microprocessor 142 of the terminal 14 responds to the request by a memory card.
- Step S403 The microprocessor 142 of the terminal 14 outputs the output device 1 such as a display.
- the memory card 13 In response to the list output request from the terminal 14, the memory card 13 reads the list data from the memory card 13 or from the storage server 11 and outputs the list data to the terminal 14. When a list output request is received from the terminal 14, the following processing is started.
- Step S501 The access control unit of the CPU 137 transmits the non-authentication area 13 in the memory card 13.
- This determination is made based on whether or not either the reproduction processing permission flag or the chasing reproduction processing permission flag has been turned ON in the exclusive control processing. If both permission flags are OFF, the process waits until one of them is turned ON (S506). The process may be terminated without notifying the user that the list data cannot be output without waiting! /.
- Step S507 The access control unit of the CPU 137 reads from the storage server 11 the latest D1 of the update date and time of the list data stored in the storage server 11 that is V.
- Step S508 The access control unit of the CPU 137 compares the latest update date D2 of the update date and time of the list data of the memory card 13 stored in the RAM 135 with the last update date and time D1, , Determine whether the list data of the deviation is newer.
- Step S509 If the list data of the storage server 11 is newer, the access control unit of the CPU 137 reads the list data from the storage server 11. This reading can be performed, for example, by using the URL of the bus 146 storage server 11, the GET command of HTTP, and the RANGE specifier. The address specified by the RANGE specifier is obtained by referring to the FAT 139a prior to reading.
- the access control unit merges the list data obtained from the storage server 11 with the list data in the memory card 13 stored in the RAM 135, and generates the latest list data. The generated list data is overwritten on the RAM 135.
- Step S510 The access control unit of the CPU 137 transmits the list data of the RAM 135 to the terminal 14.
- the access control unit updates the list data in the memory card 13 to the latest state by overwriting the list data in the RAM 135 with the list data in the non-authentication area 139c.
- the terminal 14 executes list output based on the latest list data.
- the list data stored in each of the memory card 13 and the storage server 11 is updated to the latest state and stored in the memory card 13. [0110] (4) Read processing
- FIG. 12 is a flowchart illustrating an example of the flow of a process performed by the terminal 14 and the memory card 13 in the reading process.
- the content is read from the memory card 13 or the storage server 11 whose reading is designated on the list output screen.
- the terminal 14 also accepts the designation of the content by the user, and performs a process of acquiring the designated content from the memory card 13 and outputting the acquired content.
- a content is designated on the list output screen output in the list output processing, the following processing is started.
- Step S601 The microprocessor 142 of the terminal 14 passes the data ID of the specified content to the memory card 13, and requests the memory card 13 to read the content.
- Step S602 The processor of the terminal 14 communicates with the authentication unit of the memory card 13.
- Step S605 The microprocessor 142 of the terminal 14 determines whether or not reading is possible based on the number of times of reading. If the read count power is '0', read is impossible.If the read count is 1 or more, it is determined that read is possible.
- Step S606 If readable, the microprocessor 142 of the terminal 14 increments the number of times of reading and requests the memory card 13 to write the new number of times of reading. It is also necessary to reduce the remaining number of readings by one by performing the following processing.
- Step S607 The microprocessor 142 of the terminal 14 decrypts the decryption key obtained from the memory card 13 with the master key and the media ID, and extracts the password.
- Step S608 The microprocessor 142 of the terminal 14 outputs the content received from the memory card 13 to the output device 15 or a recording medium while decrypting the content with the password.
- the memory card 13 reads the content specified for the terminal 14 from the non-authentication area 139c in the flash memory 139 or the non-authentication area 111 of the storage server 11, and Pass to.
- the memory card 13 receives the read request together with the content data ID of the terminal 14, the following processing is started.
- the following processing can be roughly divided into preprocessing, reading from a memory card, and reading from a storage card.
- Step S701 The authentication unit of the CPU 137 performs challenge-response type authentication with the terminal 14.
- Step S704 The access control unit of the CPU 137 updates the number of times of reading stored in the authentication area 139b in response to a request from the terminal 14.
- Step S705 The access control unit of the CPU 137 sets the FA using the data ID of the content as a key.
- Step S706 The space integration unit of the CPU 137 determines whether the access memory card 13 or the storage server 11 is the access destination acquired by the access control unit. When the access destination is the storage server 11, the space integration unit reads the URL of the storage server 11 from the NV-RAM 136 and passes it to the access control unit.
- the access control unit of the CPU 137 executes an exclusive control process described later (S711), and based on the result, the storage server 11 It is determined whether or not reading from is possible (S712). This determination is made based on whether the reproduction processing permission flag or the chasing reproduction processing permission flag is ON. If both permission flags are OFF, the process waits for any permission flag to turn ON (S713). Instead of waiting, the user may be notified that the reading process of the designated content is impossible, and may end the process.
- Step S714 If any permission flag is ON, the access control unit acquires the encrypted content from the storage server 11 according to the permission flag being ON. That is, the access control unit accesses the address obtained in step S705, and obtains the encrypted content from the storage server 11 via the encrypted decryption circuit 1310 and the wireless communication unit 133. The obtained encrypted content is temporarily stored in the RAM 135 and output to the terminal 14 (S708).
- the access control unit When the reproduction processing permission flag is ON, the access control unit only needs to sequentially read out the specified content and the head address. However, when only the chase reproduction process permission flag is ON, the access control unit performs reading so that the read address does not pass the write address for the designated content. As will be described later, the content is in the middle of being recorded by another memory card 13.
- the CPU 137 of the memory card 13 refers to the FAT and determines whether the data is stored in the memory card 13 or the storage server 11.
- the CPU 137 reads data from the storage server 11. Therefore, if the user has the memory card 13, the content can be read from the storage server 11 as well as from the memory card 13, so that the apparent storage capacity of the memory card 13 increases.
- a password for encrypting content protected by copyright and a password for encrypting content are also considered.
- By storing the content and the content in separate locations even if the encrypted content is obtained illegally, it is possible to prevent the encryption key from being obtained illegally at the same time and to guarantee the security of the content. .
- FIG. 13 is a flowchart illustrating an example of the flow of the exclusive control process performed by the memory card 13.
- this process when another memory card 13 attempts to access the same access target on the storage server 11, a certain restriction is imposed on writing or reading to the same access target. More specifically, in this process, each time an access to the storage server 11 occurs, the following process is started.
- Step S801 The contention determination unit determines whether the generated access is a read process or a write process.
- reproduction processing is considered as read processing
- recording processing or editing processing is considered as write processing.
- Step S802 When the reading process occurs, the conflict determining unit determines whether or not the reading target is the editing process using the other memory mode 13. This determination can be made based on a response obtained by inquiring of the number of simultaneous connections to the storage server 11 side.
- Step S803 If the read target is being edited by another memory card 13, the conflict determination unit turns off both the reproduction processing permission flag and the chasing reproduction permission flag. In this case, a message such as "Cannot play because editing is in progress" is output to terminal 14. The target data capacity to be reproduced from now on can be prevented from being rewritten during reproduction by access from another semiconductor memory card 13.
- Step S804 If the read target is not being edited by another memory card 13, the conflict determination unit further determines whether the read target is being recorded by another memory card 13.
- Step S805 If the readout target is not being recorded by another memory card 13, the conflict determination unit sets the reproduction processing permission flag to ON.
- Step S806 If the read target is being recorded by another memory card 13, the conflict determination unit sets the chase reproduction process permission flag to ON. This is to allow reproduction within a range where the read address follows the write address for recording.
- the access control unit performs a fast forward operation during the chase playback based on the chase playback process permission flag. When the read address approaches the write address for video recording, fast-forwarding can be canceled and transition to constant speed playback can be made.
- Step S807 If it is determined that the access generated in step S801 is a writing process, the conflict determination unit further determines whether the writing process is an editing process or a recording process.
- Step S808 When an access for the recording process occurs, the conflict determination unit sets the recording process permission flag to ON. When writing new data, another memory card 1
- Step S809 When an access for the editing process occurs, the conflict determination unit determines whether or not the editing target is in the process of any of the recording 'editing' playback by accessing from another memory card 13. I do.
- Step S810 While some processing is being performed on the editing target, the conflict determination unit sets the editing processing permission flag to OFF until the processing ends, and sets the editing processing permission flag when the processing ends. Change to ON.
- Step S811 The conflict determination unit sets the editing process permission flag to ON when there is no access from another memory card 13 to the editing target. This prevents the target data to be edited from being rewritten by access from another memory card 13.
- the memory card 13 of the present invention includes the wireless communication unit 133 and the connection unit, the memory card 13 can access the storage server 11 on the network.
- the memory space of the memory card 13 will appear to increase.
- the expanded memory space can be accessed from any terminal 14 as long as there is a memory card 13, so that the convenience and flexibility for users who want to store a large amount of data are improved.
- the encrypted content protected by the copyright is decrypted by the storage server 11. If the encryption key necessary for the encryption is stored in the memory card 13, even if the encrypted content is illegally obtained by a third party, the security of the content can be guaranteed.
- the system of the first embodiment includes only one storage server 11, but may include a plurality of storage servers 11a, b-.
- the FAT of the memory card 13 manages the addresses of the storage areas of the storage servers 11a, b ',... In addition to the memory space in the memory card 13.
- the FAT manages which address space is allocated to which storage server 11.
- NV—RAM 136 stores the network address of each storage server 11.
- the authentication area is provided only on the memory card 13, but the authentication area (corresponding to the second authentication area) may be provided on the storage server 11.
- the authentication area in the storage server 11 can be apparently increased. Therefore, for example, even if data such as content is stored in the authentication area on the memory card 13 or the authentication area on the storage server 11 without being encrypted, the storage area can be sufficiently prepared, and the security of the content is guaranteed. Can be.
- connection between the storage server 11 and the memory card 13 is established by using the functions of the wireless communication unit 133 and the connection unit of the memory card 13.
- the connection between the storage server 11 and the memory card 13 may be established using the terminal 14 communication function. Which communication function to use can be automatically determined in consideration of communication cost and communication speed.
- Various user settings can be stored in the memory card 13 and the user settings can be used on any terminal 14. For example, by storing the user settings such as the color settings of the user interface, the user name notation, and the dominant hand on the memory card 13, the user can use both the terminal 14 and the terminal 14 other than the terminal 14 owned by the user. Thus, the terminal 14 can be used with the same settings as the above.
- the storage server 11 may manage the access right by using the connection ID as a unit.
- Fig. 14 shows an example of a program list display screen when there is access right management.
- Fig. 15 shows the access rights management information held by the storage server 11.
- 2 shows an example of data in a management table.
- FIG. 16 shows a screen example for creating a memory card 13 that can be accessed with different access rights to the storage server 11.
- the removable semiconductor memory card is not limited to a memory card, but is a portable recording medium. It accesses a storage device on a network and accesses the memory space of the storage medium and the memory of the storage device. Anything that has a space integration means that can integrate with the space 1.
- Other examples include an optical disk stored in a removable HDD unit and a cartridge together with the control mechanism of the present invention.
- (G) The basic concept of the present invention can be applied to a recording medium using an optical system, a magnetic system, or a biotechnology that is not limited to a recording medium using a semiconductor.
- a program for executing the method executed by the semiconductor memory card described above is included in the scope of the present invention.
- a computer-readable recording medium on which the program is recorded is also included in the scope of the present invention.
- the recording medium include a flexible disk, a hard disk, a semiconductor memory, a CD-ROM, a DVD, a magneto-optical disk (MO), and the like, which can be read and written by a computer.
- the programs include those stored in the recording medium and those that can be downloaded.
- the present invention is applicable to a portable recording medium that is portable and that writes and reads data by inserting it into an electronic device.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Software Systems (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/571,463 US20070101143A1 (en) | 2003-11-13 | 2004-11-15 | Semiconductor memory card |
JP2005515477A JPWO2005048111A1 (ja) | 2003-11-13 | 2004-11-15 | 半導体メモリカード |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003383530 | 2003-11-13 | ||
JP2003-383530 | 2003-11-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005048111A1 true WO2005048111A1 (ja) | 2005-05-26 |
Family
ID=34587295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/016954 WO2005048111A1 (ja) | 2003-11-13 | 2004-11-15 | 半導体メモリカード |
Country Status (3)
Country | Link |
---|---|
US (1) | US20070101143A1 (ja) |
JP (1) | JPWO2005048111A1 (ja) |
WO (1) | WO2005048111A1 (ja) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007034386A (ja) * | 2005-07-22 | 2007-02-08 | Softbank Telecom Corp | ネットワークストレージアクセス用端末及びそれを用いた遠隔データ蓄積システム |
JP2007293443A (ja) * | 2006-04-21 | 2007-11-08 | Hitachi Ltd | 電子タグシステム、および電子タグシステムが行うデータ処理方法 |
WO2008099909A1 (ja) * | 2007-02-16 | 2008-08-21 | Hitachi, Ltd. | Icタグシステム |
JP2009205294A (ja) * | 2008-02-26 | 2009-09-10 | Hitachi Ltd | 情報記憶システム |
JP2009282616A (ja) * | 2008-05-20 | 2009-12-03 | Toshiba Corp | 電子装置およびコンテンツデータ提供方法 |
JP2009282617A (ja) * | 2008-05-20 | 2009-12-03 | Toshiba Corp | 電子装置およびコンテンツデータ提供方法 |
JP2009282623A (ja) * | 2008-05-20 | 2009-12-03 | Toshiba Corp | 電子装置およびコンテンツデータ提供方法 |
JP2009282615A (ja) * | 2008-05-20 | 2009-12-03 | Toshiba Corp | 電子装置およびコンテンツデータ提供方法 |
US8060925B2 (en) * | 2005-09-01 | 2011-11-15 | Kabushiki Kaisha Toshiba | Processor, memory, computer system, and method of authentication |
WO2013111174A1 (ja) * | 2012-01-23 | 2013-08-01 | パナソニック株式会社 | 記録装置、端末装置、及びコンテンツ伝送システム |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4624732B2 (ja) * | 2003-07-16 | 2011-02-02 | パナソニック株式会社 | アクセス方法 |
US20080141029A1 (en) * | 2006-12-11 | 2008-06-12 | Migo Software, Inc. | Digital content protection |
JP2008269088A (ja) * | 2007-04-17 | 2008-11-06 | Toshiba Corp | プログラム情報提供システム、プログラム情報提供方法、プログラム情報提供方法に用いられる記録媒体 |
US8539238B2 (en) * | 2007-05-09 | 2013-09-17 | Intel Corporation | Authenticated nonvolatile memory signing operations |
KR20090053162A (ko) * | 2007-11-22 | 2009-05-27 | 재단법인서울대학교산학협력재단 | 통신망을 이용한 스토리지 보안 장치 및 방법 |
KR101465966B1 (ko) | 2011-03-09 | 2014-11-28 | 에스케이텔레콤 주식회사 | 클라우드 환경에서의 데이터 암호화 처리 장치 및 방법 |
US20140032867A1 (en) * | 2012-07-26 | 2014-01-30 | Yuji Nagai | Storage system in which information is prevented |
US9418022B2 (en) * | 2012-07-26 | 2016-08-16 | Kabushiki Kaisha Toshiba | Storage system in which information is prevented |
US20140244956A1 (en) * | 2013-02-26 | 2014-08-28 | Kabushiki Kaisha Toshiba | Storage system in which fictitious information is prevented |
JP6318940B2 (ja) * | 2013-07-30 | 2018-05-09 | 株式会社リコー | サービス提供システム、データ提供方法及びプログラム |
JP5883424B2 (ja) * | 2013-09-27 | 2016-03-15 | 株式会社東芝 | 可搬型半導体記憶装置 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000115253A (ja) * | 1998-09-30 | 2000-04-21 | Toshiba Corp | 通信方法、携帯端末装置及びゲートウェイ装置 |
JP2002099475A (ja) * | 2000-09-25 | 2002-04-05 | Toshiba Corp | 無線装置、データ管理システム及びデータ管理方法 |
JP2003110976A (ja) * | 2001-09-27 | 2003-04-11 | Fuji Photo Film Co Ltd | 画像データ送信方法、デジタルカメラ、画像データ保管方法および装置並びにプログラム |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6295584B1 (en) * | 1997-08-29 | 2001-09-25 | International Business Machines Corporation | Multiprocessor computer system with memory map translation |
US6728843B1 (en) * | 1999-11-30 | 2004-04-27 | Hewlett-Packard Development Company L.P. | System and method for tracking and processing parallel coherent memory accesses |
JP2001312410A (ja) * | 2000-05-01 | 2001-11-09 | Sony Corp | 情報処理装置および方法、並びにプログラム格納媒体 |
US7240197B1 (en) * | 2000-07-18 | 2007-07-03 | Hitachi, Ltd. | Method and apparatus for encryption and decryption in remote data storage systems |
US7395339B2 (en) * | 2003-08-07 | 2008-07-01 | International Business Machines Corporation | Method and system for providing on-demand media streaming from a user's own library to a receiving device of the user |
-
2004
- 2004-11-15 US US10/571,463 patent/US20070101143A1/en not_active Abandoned
- 2004-11-15 JP JP2005515477A patent/JPWO2005048111A1/ja not_active Withdrawn
- 2004-11-15 WO PCT/JP2004/016954 patent/WO2005048111A1/ja active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000115253A (ja) * | 1998-09-30 | 2000-04-21 | Toshiba Corp | 通信方法、携帯端末装置及びゲートウェイ装置 |
JP2002099475A (ja) * | 2000-09-25 | 2002-04-05 | Toshiba Corp | 無線装置、データ管理システム及びデータ管理方法 |
JP2003110976A (ja) * | 2001-09-27 | 2003-04-11 | Fuji Photo Film Co Ltd | 画像データ送信方法、デジタルカメラ、画像データ保管方法および装置並びにプログラム |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007034386A (ja) * | 2005-07-22 | 2007-02-08 | Softbank Telecom Corp | ネットワークストレージアクセス用端末及びそれを用いた遠隔データ蓄積システム |
US8060925B2 (en) * | 2005-09-01 | 2011-11-15 | Kabushiki Kaisha Toshiba | Processor, memory, computer system, and method of authentication |
JP2007293443A (ja) * | 2006-04-21 | 2007-11-08 | Hitachi Ltd | 電子タグシステム、および電子タグシステムが行うデータ処理方法 |
WO2008099909A1 (ja) * | 2007-02-16 | 2008-08-21 | Hitachi, Ltd. | Icタグシステム |
KR101062624B1 (ko) * | 2007-02-16 | 2011-09-07 | 가부시키가이샤 히타치세이사쿠쇼 | Ic 태그 시스템 |
JP2009205294A (ja) * | 2008-02-26 | 2009-09-10 | Hitachi Ltd | 情報記憶システム |
JP2009282616A (ja) * | 2008-05-20 | 2009-12-03 | Toshiba Corp | 電子装置およびコンテンツデータ提供方法 |
JP2009282617A (ja) * | 2008-05-20 | 2009-12-03 | Toshiba Corp | 電子装置およびコンテンツデータ提供方法 |
JP2009282623A (ja) * | 2008-05-20 | 2009-12-03 | Toshiba Corp | 電子装置およびコンテンツデータ提供方法 |
JP2009282615A (ja) * | 2008-05-20 | 2009-12-03 | Toshiba Corp | 電子装置およびコンテンツデータ提供方法 |
WO2013111174A1 (ja) * | 2012-01-23 | 2013-08-01 | パナソニック株式会社 | 記録装置、端末装置、及びコンテンツ伝送システム |
JPWO2013111174A1 (ja) * | 2012-01-23 | 2015-05-11 | パナソニックIpマネジメント株式会社 | 記録装置、端末装置、及びコンテンツ伝送システム |
Also Published As
Publication number | Publication date |
---|---|
US20070101143A1 (en) | 2007-05-03 |
JPWO2005048111A1 (ja) | 2007-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005048111A1 (ja) | 半導体メモリカード | |
JP3698968B2 (ja) | 著作権保護機能つきハブ装置 | |
JP4687703B2 (ja) | 記録システム、情報処理装置、記憶装置、記録方法及びプログラム | |
KR100566627B1 (ko) | 반도체 메모리 카드 및 데이터 판독장치 | |
KR100713046B1 (ko) | 라이센스 이동 장치 및 프로그램 | |
US8307454B2 (en) | Computer-readable recording medium recording remote control program, portable terminal device and gateway device | |
US8280818B2 (en) | License source component, license destination component, and method thereof | |
JP4333455B2 (ja) | コンテンツ再生装置,プログラム及びコンテンツ再生制御方法 | |
US20020138442A1 (en) | Content provision device and method and license server capable of facilitating circulation of encrypted content data | |
US20060059105A1 (en) | Move component, program, and move method | |
US20110191600A1 (en) | System, Method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media | |
JP2000315177A (ja) | コンテンツ管理方法およびコンテンツ管理装置 | |
US20060069652A1 (en) | Copy component, program and method thereof | |
JP2002135243A (ja) | データ再生装置、データ記録装置、およびデータ再生方法、データ記録方法、リスト更新方法、並びにプログラム提供媒体 | |
KR20040015798A (ko) | 콘텐츠 판독장치 | |
JP2003233795A (ja) | 半導体メモリカード及び読み出し装置 | |
WO2006031030A1 (en) | Method and apparatus for searching for rights objects stored in portable storage device using object identifier | |
US20060059103A1 (en) | Return component, program, and return component method | |
US20060059101A1 (en) | Reproduction component, program and method thereof | |
JP2003022219A (ja) | コンテンツデータを容易に再取得できるデータ端末装置、その端末装置において実行されるプログラム、およびそのプログラムを記録した記録媒体 | |
US20060059104A1 (en) | Rent component, program, and rent component method | |
JP4170670B2 (ja) | 利用権管理装置 | |
KR100608604B1 (ko) | 객체 식별자를 이용하여 이동형 저장 장치에서 권리객체를 검색하는 방법 및 장치 | |
JP4613487B2 (ja) | 電子機器、情報処理システム、情報処理装置および方法、プログラム、並びに記録媒体 | |
JP2008506168A (ja) | 移動型格納装置においてオブジェクトの位置情報を用いて権利オブジェクトを検索する方法および装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005515477 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007101143 Country of ref document: US Ref document number: 10571463 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase | ||
WWP | Wipo information: published in national office |
Ref document number: 10571463 Country of ref document: US |