WO2005122165A1 - 記録装置および記録方法 - Google Patents
記録装置および記録方法 Download PDFInfo
- Publication number
- WO2005122165A1 WO2005122165A1 PCT/JP2005/010506 JP2005010506W WO2005122165A1 WO 2005122165 A1 WO2005122165 A1 WO 2005122165A1 JP 2005010506 W JP2005010506 W JP 2005010506W WO 2005122165 A1 WO2005122165 A1 WO 2005122165A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- information
- file
- content
- access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00115—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers wherein the record carrier stores a unique medium identifier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
- G11B20/00181—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software using a content identifier, e.g. an international standard recording code [ISRC] or a digital object identifier [DOI]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00188—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00362—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being obtained from a media key block [MKB]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00528—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein each title is encrypted with a separate encryption key for each title, e.g. title key for movie, song or data file
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/4104—Peripherals receiving signals from specially adapted client devices
- H04N21/4112—Peripherals receiving signals from specially adapted client devices having fewer capabilities than the client, e.g. thin client having less processing power or no tuning capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/414—Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
- H04N21/4147—PVR [Personal Video Recorder]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/434—Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams, extraction of additional data from a video stream; Remultiplexing of multiplex streams; Extraction or processing of SI; Disassembling of packetised elementary stream
- H04N21/4345—Extraction or processing of SI, e.g. extracting service information from an MPEG stream
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/4367—Establishing a secure communication between the client and a peripheral device or smart card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44204—Monitoring of content usage, e.g. the number of times a movie has been viewed, copied or the amount which has been watched
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/10537—Audio or video recording
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91314—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a pulse signal inserted in blanking intervals of the video signal, e.g. pseudo-AGC pulses, pseudo-sync pulses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91328—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy management signal, e.g. a copy generation management signal [CGMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91371—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video color burst signal being modified
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/765—Interface circuits between an apparatus for recording and another apparatus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/78—Television signal recording using magnetic recording
- H04N5/781—Television signal recording using magnetic recording on disks or drums
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/84—Television signal recording using optical recording
- H04N5/85—Television signal recording using optical recording on discs or drums
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/907—Television signal recording using static stores, e.g. storage tubes or semiconductor memories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/79—Processing of colour television signals in connection with recording
- H04N9/80—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
- H04N9/804—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components
- H04N9/8042—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components involving data reduction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/79—Processing of colour television signals in connection with recording
- H04N9/80—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
- H04N9/804—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components
- H04N9/806—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components with processing of the sound signal
- H04N9/8063—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components with processing of the sound signal using time division multiplex of the PCM audio and PCM video signals
Definitions
- SCS an attachment system
- C a digital audio player
- C a disc
- C the disc
- digital audio recorder a digital audio recorder
- R RW This signal is superimposed on the signal in the live audio equipment such as R, V disc, etc., the digital audio of the equipment such as S analog transmission, BS CS, terrestrial digital transmission, etc., and the audio CRC RW Used for recording control in places such as S. 0005]
- SCS has digital information attached to the digital audio signal and restricts the generation of the digital information. Physically, there is no condition, and only the information of the first, second, third, and third information is defined. 2) If the number is only the pi, update to pi, if the () is pi, do not Work.
- the mub performs an operation by causing the t-shirts stored in the recording medium to be unreproducible after piping the t-shirts stored in the recording medium to the other storage medium. is there.
- the checkout numerical information is determined in advance for the content, the content is received using the content and sonampita (C), and recorded in the description (for example) in C. , Treat this as (the).
- the user does not only play the technique using the C, but also checks the number of the set checkouts from the C to the pottab (Ptabtab device, P) the pottab media (P). You can play this. In this case, the number of checkouts is obtained for each checkout. Check-out Limited to the range of the check-out number. The is P or P The unnecessary material can be returned to C to increase the number of tick-outs (tick-in).
- 01223 (a) states that the rights of the 4th party have been paid
- Figure 23 (b) shows an example of the bears in 23 (a) copying the information of the 4 pieces of information that were lost and the information of the right that is 2 pieces. The two wires are moved to B and handled. As a result of the action of these two ties, two ties (two stuff) are recorded in B and. 23 (c) shows a case where the bears of 23 (b) are moved to C, and the rights of the 2 contents moved to C are transferred to C. As a result of the action of this phi, both phi are recorded in C and C.
- 23 (d) shows a case where the player moves to C from the state of 23 (c), and the file of the player moves from C to. As a result of the action of this file, C becomes the right 0 and the virtual file becomes 0, and is deleted or cannot be reproduced or moved.
- 23 (e) shows that he moved to B from 23 (b) from the state of 23 (d). (Indicating a mobu line, and as a result of this action, the right is erased without right 3 (the 3's) or the right is cleared (0) .
- Reference numeral 24 denotes a book of the conventional raw device 20.
- the raw device 20 includes a receiving unit 202, a storage unit 203 for storing the received content as a virtual file, a conversion unit 204 for converting the virtual file, and a virtual unit 205 for recording the converted file.
- There are two hundred and sixty two to convert the file two two hundred seventy two to record the converted file, three two hundred and eighty two to record the phi, and a zither face 209.
- the ZEITAFICE 209 is used to activate the following operations, to present alternative information required for the operation, and to obtain a selection result.
- the 203 stores the TE specified by the receiving unit 202 via the interface 209 of the data as the file 3 as the PG2S. However, it can be encrypted according to the broadcast situation. There is also. For example, if the broadcast content is broadcasted only in the generation, the content is updated and stored.
- 205 of S is a S method
- 207 of 2 is R
- 308 of 3 is S.
- the S deo expression is established as an expression of the S method.
- the Ding formula conforms to the PG2S (PoaSea) or PG4 case.
- 204 converts PG2S to PG2PS or PG4 sum. Which one is to be converted is specified through the ZEITAFICE 209.
- the digging expression is P G2 S (Po a S ea).
- 206 of 2 converts PG2S to PG2PS.
- S records PG2S as is.
- a plurality of files of the same record type are generated on the body. It is easy to cause copyright infringement. In other words, there is a danger that the same number of moves may be generated if a plurality of the same recording-type files are generated. The number of
- this may be specified.
- At least the data, at least the data, and at least the phi were stored in the recording medium. And a drive for recording the content on the body.
- the file includes an access report for accessing the data. Response to the message
- the data read of the data is read out based on the access information, and the data is output as described above.
- the data is recorded on the body, and the access information is disabled.
- the drive may generate an access report for accessing data of the device recorded on the body, and the drive may record the generated access report on the body.
- the file includes a recording information for specifying a recording medium for which the move of the object is permitted, reads out the information,
- Data for displaying the read information may be generated and output.
- the file may include format information for specifying a record format for which the move is permitted, read the report, generate and output data for displaying the read report.
- the tie may be encrypted, and the tie may include information for identifying the tie.
- the information may be read, and the drive may re-encrypt the tie based on the read information using a different information, and may record the content and data on the body.
- the datafile may be encrypted, and the file may include information for performing the datafile.
- the information may be read, and the drive may record the read information 003 on the body, and accumulate a number of pipe files specified by the provider of the test.
- the plurality of data files and the number of data files A plurality of pieces of information corresponding to the above are stored, and while the above-mentioned and the above-mentioned mbu are instructed, the data about the object which is the object of the mbu is specified from the above-mentioned number of data, and the above-mentioned data is specified.
- the drive reads and outputs the specified data, the drive records the read data on the body, and accesses the management file corresponding to the at least the read data. You may not use the information.
- Phi, 2 phi and data phi are accumulated, and the phi and 2 phi may include an access report for accessing the data phi.
- the move of the content may be further instructed, the tie may be read out based on the two-way access information, and at least the two-way access report may be disabled. .
- the data file may be read based on the access information included in the file, and at least two of the file access information may be disabled.
- recording according to the description accumulating at least data on the Te, accumulating a file including an access report for accessing the data, instructing the recording medium to move the object, Reading the data of the content in response to the indication of the move, based on the access information, stepping the data of the content, recording the data of the content on the body, using the access information It may include steps to disable.
- a management key that points to the thai on behalf of the mob is generated, and when the mob is indicated, the management key duplicates the thai on the recording medium.
- the number of moves can be reliably limited to the same level as the management file, and the copyright of te can be properly protected.
- FIG. 14 is a diagram showing the formation of a book of record 0 according to the light state.
- (a) is a diagram showing a queue of S received by the PGS processing unit 204
- (b) is a diagram showing a queue of S output from the PGS processing unit 204.
- FIG. 4 is a diagram showing a configuration of a book of a 4P GS processor 204;
- FIG. 5 is a diagram showing a list of programs 1 and S used in S.
- FIG. 9 is a diagram showing an example of 6P data structure.
- (a) is a diagram showing a digital video data structure
- (b) is a diagram showing a cop
- It is a diagram showing the relationship between the operation of information 00 corresponding to each of the two bits described in the co oeid.
- (c) corresponds to the two bits described in the da eco d cocoa aid. It is a figure which shows the relationship of the work of information 00
- (d) is a figure which shows the relationship of the work of information 00 corresponding to 2 bits described in PScodaa field.
- FIG. 8] (a) is a diagram showing a data structure of a ten (Co aabesc p o), and FIG. 8 (b) is a diagram showing a process according to a bit value of an e c P o ode feed.
- (a) is a diagram showing a data structure of a screw (Se es esc p o), and (b) is a diagram showing a corresponding service that can be obtained by a ce Pe field.
- (a) is a diagram showing the data structure of the pi (cop Sas desco), and (b) to () are diagrams showing the meaning of the data value of the phi's feed.
- FIG. 12 is a diagram showing a relationship between a copyright notice and a record of a book.
- FIG. 10 is a diagram showing two P 2 PS tires 07 and 09 differing in 14 bits, and two pipelines 06 and 08.
- FIG. 15 is a diagram showing an example of the configuration of the interface 5.
- FIG. 17 is a diagram showing the configuration of a drive 2 of the 170 and a generator 6 of the drive 2.
- FIG. 19 is a diagram showing an example of Phi6.
- FIG. 2 is a diagram showing the configuration of two drives 200, two eights, and two generators 83; 2 is a diagram showing a file 90 adopting another data structure.
- FIG. 2 is a diagram showing the configuration of two drives 200, two eights, and two generators 83; 2 is a diagram showing a file 90 adopting another data structure.
- FIG. 22 is a diagram showing the composition of the book of another note 22 according to the state of the statement.
- the term is not limited to the device that has recorded the data, but includes other devices having a reproducing function. And record The instruments have independently recognizable forms. Examples of bodies are magnetic tapes, disks, disks, semiconductors.
- 004 Bod Reco d: A device that stores data on a record so that it can only be produced in that container.
- a record for example, a hard disk, a built-in conductor
- a device stores data on a recording medium, only the device can encrypt and store the data in a built-in disk.
- the phenomena of record, product, pi and mbu include not only the content but also the control of the production of that material. It is processed as a separate file on the physical, data, and physical systems.
- G2 POS P G2 S
- glue bodies There are three types, for example, RS and S.
- record 0 is a video dingo PG2 program (PG2PS), and the content is recorded. At this time, the record 0 is encrypted using the CTE (CoePecofo Reco dabe eda) formula.
- CTE CoePecofo Reco dabe eda
- the content recorded in S9 can be played back.
- 005 0 has a central processing unit (P) 00, R 02, a receiving unit 03, drives 23 and 4 of encryption units 04, 05, 2 and 3, and the interface 5.
- P central processing unit
- CP 00 controls the bodywork of record 0. Of record 0
- R 02 is connected to an antenna for digital transmission and its antenna
- the communication unit 03 processes the broadcast R, extracts the PG2S in which a plurality of services (contents) are multiplexed,
- the management unit 04 generates a tie key, which is for each te. Then, using the tie and the information section, the receiver (03) encrypts the output data (PG2PSPG4 sum) from the receiving section 03. Master 04 The detailed configuration will be described later with reference to FIG.
- 005605 is, for example, a disk drive () or a semiconductor device.
- Numeral 05 receives the data of the data not received from the receiving unit 03 and / or the data of the data received from the encryption unit 04, and accumulates the received data. 05 is output from the receiving unit 03
- Report data can be directly received and accumulated.
- 05 is piled with the phi 06 of, the phi 07 of, the phi 08 of 2, the phi 09 of 2, the phi 0 and the phi 0 of 3.
- Drive 2 of drive 2 record data for () 6, 2 (Sme) 8 and 3 (S) 9, respectively. Data can be read. At this time, drives 2 to 4 are stored in 05
- the code 6 stores the code 7.
- the interface 5 communicates with each other in record 0 as needed, presents information, and accepts their power.
- Reference numeral 2 denotes a book formed by the receiving unit 03.
- the communication unit 03 includes R processing units 20 and 202, a management unit 203, a PGS processing unit 204, an SPS 205 and a PG2 206.
- the R processor 20 receives the R signal, and obtains the encrypted PG2S from the R signal. It is assumed that a plurality of channels are multiplexed in the PG2S.
- Reference numeral 202 denotes an encrypted PG2S that the R processing unit 20 performs.
- the PGS management unit 204 generates a PG2PS from the PG2S.
- S PS 205 converts PG 2 PS to PG 2 PS PG 244 6 converts PG 2 PS to PG 4 Sum.
- PG2S can be encrypted and broadcast for protection. It is up to the broadcaster to decide what to do.
- BCS Radio Industry
- the receiver In order to receive a BCS feed, the receiver must comply with the Radio Industry (R) rating. Physically, it is necessary to satisfy the protection specified in RB RB 4 (upper digital) and R 5 (SS digital).
- 006 2022 decrypts the data by using the data in the BCS and outputs the decrypted 2S. From the point of view of protection, it is forbidden to output the P 2 S that is easily accessible to users such as C. For this reason, the privately-located transponder outputs PG2S using, for example, a service line. In the case of implementation using C and others in the sonampita (C), the encryption used in C S is performed separately on P S to protect the contents.
- the PGS processing unit 204 selects only the evening related to the program specified from the multiplexed PGS and forms the PGS2. Specifically, the PGS management unit 204 selects a data related to the program specified via the interface 5 and extracts necessary information including a table of program-related information. Then, the output information is edited, and the table of the program-related information corresponding to PG2PS is reconstructed.
- 3a) shows a queue of S received by the PGS processing unit 204
- 3 (b) shows a queue of S output from the PGS processing unit 204.
- the box with P etc. corresponds to the S-key of the box.
- a (to 4) indicates program and audio data, respectively.
- the PGS control unit 204 extracts the video and audio packets, corresponding to from S shown in 3 (a), extracts the tables P and P of the program-related information, and converts the contents to YA. Rewrite as you do. As a result, Y PP is placed in S.
- the S includes a section included in S (see (1)) and a section in an information table (See fo ao ab S) that collects only information related to the program selected by the side of the program (S). Is stored.
- a specific set of S skews in S can be derived by the following reason.
- the procedure for extracting the S-kettle of the will be described.
- the program (Pog a ssoca o abe) can be searched. More specifically, the S key is assigned a key (P). If the P of the program key is set to 0, for example, a key having that value is retrieved from S.
- the number in the number box contains the number and the P of the (Program ap abe P) pair corresponding to the number.
- the end (P) of program P corresponding to program X can be specified.
- the original S contains one k. 1 k is a k including data describing the scheduling, etc. of the program included in the original S, and these are also referred to as independently defined reports).
- the data contained in one packet is as high as 20 to 30 types.
- Reference numeral 004 denotes a book formed by the PGS processing unit 204.
- the PGS processing unit 204 generates an error S from S using elements shown in FIG. Note that S and S are 3 (a) and 3, respectively.
- the PGS processing unit 204 is composed of S30, a screw 302 of
- S30 When S30 receives S in which the 4's are multiplexed, S30 separates it into a program (1), a program (S), and a basic sum (eea "SeaS"), which are elements of S.
- the program (S) is the name of a program (called a table) shown in 5.
- the program 5 is used in S (Sefofoo: 1) and the program (PogaSpec ffoao). : S), which are published for the radio industry (R), where the tabs are arranged in a defined order.
- S the basic sum S for an image is divided and stored in S. Note that in S, the sum of the program and audio sum is described in S for convenience.
- the service 302 of 0072 obtains, from the program P in which a plurality of information is given, a portion specifying the P of the S-kettle that transmits the program P related to the specified program, and generates the P. .
- S303 is composed of a plurality of sets (1) and programs included in S.
- the service 3004 of 00742 selectively acquires only the S of the specified program from the set of S separated by S30.
- the second service 304 acquires the program P corresponding to the acquired S. And get In addition to the program S, the program P is obtained by obtaining a portion specifying the P of the segment obtained by dividing the program S.
- the service 4-2 of 4 outputs S (and) related to the program and P corresponding to the S.
- the second service 304 can also store the copyright control information described later in P. A description will be given later with reference to FIG.
- the S multiplexing unit 3055 multiplexes the specified program program association P, sec- tion information S, mentorum S, and program P to configure the program S.
- the PG2PS reconstructed by the PGs processor 204 is input to the SPS205 and converted to a PG2PS. Also, PG2PS is input to PG2424 and converted to PG4 sum.
- the change between S-Os and S-Os and the change between P G2 and P G4 are all known. Therefore, a detailed description of them will be omitted in the tree specification.
- S includes (1) and (S) shown in 5.
- a structure called description (esc po) can be arbitrarily stored in a specific place.
- 6 shows an example of the data structure of the program P.
- a key use of P is to specify the S-key (P) that carries the numbers that make up the broadcast program.
- any (desc po) can be entered at the position indicated by pu and pu.
- description that can be placed in these positions includes, for example, ditapi (a Co Co o esco) and content (Co ea abe esco). The difference is also a description related to copyright in Jitter transmission.
- the second data structure will be described with reference to FIGS. 7 and 8.
- aCoCooesco is provided when specifying control information on digital or analog data for screws or individual mentalities, or when describing the maximum.
- the CocoPeide is a two-bit value indicating information in a format for controlling the piggyback.
- FIG. 7 (b) shows the relationship between the operation of the information 00 corresponding to the two bits described in the cocoid. For example, in the case of 00, if the value of the co-coe-id is 0, the value is output to the interface (94), and if it is not, the encryption is not performed.
- the d a eco d co o da a represents information for controlling the piggyback.
- the behavior based on the value of this field is determined so that it is applied when the value of the preceding code field is 0 or 0, that is, when the data is to be transmitted via the 394 source.
- 7 dg a eco dg Indicates the relationship between the operation of the information 00 corresponding to the two bits described in the co d a a feed.
- the content (Co aabesco) is defined to describe control information on the data output of a program.
- the limit bit (a e cos ao e) indicated by the eye indicates that there is no restriction on the video power.
- the resolution must be limited to 0 for the bit value, and may not be restricted. For example, for digital transmission in Japan, the resolution limit bit is prohibited, so age cos a oe is always set to.
- the temporary bit (“eeoo de”) indicated by the second mark indicates whether or not temporary permission is permitted. If the bit value is 0, the digital value is “dg a eco dg coo da a”. This indicates that temporary product is possible even if it is not possible. ,
- e represents the interval after receiving the content.
- the temporary bit (“e eo ode” (e eo s ae)) is fixedly operated, and e eo ode is always set to 0 and eo s ae is set to (90).
- the ecPodium feed is provided to encrypt the content and allow it to be played only on a specific device. It has been done. For this purpose and for recognition, the number of algebras and the number of algebras are not included. This is called P (Cossose). P indicates that it must be recorded without restrictions.
- (a) shows the data structure of the service (Se es esco).
- the service is a radiator defined in the above-mentioned service table (Secess escobe S), and a radiator that specifies the source of the input signal is described. This parameter is called a screw type.
- This parameter is called a screw type.
- the 20033 generates the above-mentioned copyright-related management information. That's why the management is recorded during the period.
- (a) shows the data structure of pi (cop Sas desc p o).
- CP desc p o defined in CP (g aas sss o Co e Po ec o), which is a protection technique for protection.
- the value of the pi field is defined as a value from 0 (b) to (), and a value corresponding to the digital value (ga Cop Coo esco) and the value of the ten (Coa abe esc po) is set.
- YA is sent to P203 in S, and entered into P6 (6) by management 203.
- management 203 also enters into the two items (6) related to the mentum.
- the input P 2 S always analyzes the input P 2 S, and when the copyright information is changed, generates a new copy and sends it to the P 2 S processing unit 204. Therefore, the copyright information may change within the same entertainment depending on the control of the entertainment recording by the user. For example, if 2 (Dora) are broadcast continuously, and this is recorded as a person, if there is no condition, and if Dora is the only generation, the value of the CPCC will change midway.
- the processing unit 04 outputs data such as PG2PSPG2PSPG4 sum output from the receiving unit 03 to 056 and 2
- the message Since it is assumed that the message is in the form of an RS, it encrypts according to the physical and cryptographic methods defined in CPR, which is a technique of these bodies.
- the encryption in the encryption unit 04 is similar to the encryption in which the drive 2 uses a tie in 7 described later. [0099] Consider a case where digital tents are stored or recorded on a printed object. Entities whose digital content is restricted by digital gadgets dcoa eco d coo daa and those whose protection is specified by content ecoode must protect the content cryptographically.
- a cryptographic mechanism with a strength above 56 bits and sufficient security for example, 2 (CP oea Ce) S (daced c Po S a da d) S (aac Po S Use a da d)).
- CPR uses C2.
- 0100 indicates the composition of the book of the encryption unit 04.
- the management unit 04 has a tie 50 cipher 502.
- 010 Tie 50 generates a 56-bit number, which is the tie used to encrypt the material.
- 502 indicates that if the value of PS is changed on record or the like, the PS is converted to Thailand using PS (aoPoecoSse), which is part of the copyright notice. In this case, the correct encryption cannot be obtained at the time of playback, so that the encryption code cannot be obtained. Thus, unauthorized use can be prevented.
- 502 uses the converted tight as encrypting te.
- 502 is an odec at the 2048th rank, called a video, Is encrypted.
- the key is changed for each lock by adding the lock part to the tie key converted by the PS.
- Use C2 In 0102, an example is shown in which the encryption unit 04 uses CPR as an expression of a recording medium. However, when the recording medium uses another storage format, the configuration of the cipher 04 may be changed according to the expression.
- 0103 05 stores the information. of ,
- Digital data d a eco d g co o da a is 0 and only the generation is available, the upper information is stored and stored. In this case, the content encrypted by the encryption unit 04 is stored. Content that has been stored as a copy cannot be copied to a recording medium, but can be moved.
- 0106 mobs can be a built-in body or a digitally connected body.
- 05 accumulates management files and data files separately for each device. 3 indicates at least content stored in 05 and management information corresponding to the content. 05 is more than one,
- the value 06 of 0112 is determined by assuming that the data 07 of R is moved.
- the 06 of the data is the information of the information, the sex information of the first data, the pointer of the first data, and the data of the data.
- the information includes information on the Thai language, the time of the broadcast, the name of the broadcasting station, the name of the broadcasting station, the name of the performer, the keyword, copyright information, and the like. Copyright information that identifies the record (s) to which the media is allowed to be moved (move destination), or
- the sex information of 0116 data fight 06 may be expressed, for example, as the data of the data fight deck (PG PS), video (P, etc.), scan, bit (as code,, standard, long time, extra time, etc.) Includes information that identifies the sound, size, and voice (eg, Norasteo 5.c).
- the data copy data 0117 stores the access information of the data copy (PG2PS).
- the access information is information for specifying the data to read the data, for example, information for specifying the head of the data.
- the address of the tie set to 05 corresponds to the access report. For the address, it is the address address of the tie or the first address size. Also, if you use the name of the user for access reporting, use
- the tie key used when the data of the data 0118 is used by the encryption unit 04. Even if it is erased and recorded, it may be easily restored if the disk is analyzed using C or the like, and the protection cannot be ensured. However, it is difficult if the code is removed, and the content can be reliably protected. Thailand copyright, if 06 is removed from record 0,
- Te 06 is encrypted using a device key etc. stored in another location so as not to be illegally used. For the purpose of stopping, for example, it is stored in the area marked in section S and inaccessible from the section.
- S may be encrypted by its own formula and stored in the S section.
- the Thai copyright information may be stored in an inaccessible storage area, for example, 06 in an inaccessible storage area. Since the copyright can only be read, it is possible to add a tip to distinguish whether the constitution has been amended without encryption. If the constitution of the copyright notice is detected at the time of the use of the copyright, it may be prohibited to use the copyright or may operate so as to allow only the strictest copyright. Information that can be used to detect a change in the constitution and perform a specific work.
- Tesoda data it is possible to control whether or not Tesoda data is used.
- Phi 08 of 01192 is defined assuming a S-medium move
- the second file 08 has a management information 08 relating to the ten information and the first data file and a second management 08 2 relating to the data file.
- 012 08 is defined for the tie 07 and contains the sexual information of the tie, the pointer of the second tie, and the tie. These are equivalent to the information given in key 06.
- the management 08 2 is defined for the second type 09 and includes the sex information of the second type, the pointer of the second type, and the second type.
- two pipes are included in Phi 08 of 2
- the third file 0 includes content information, sex information of the third file, data of the third file, and data of the third file. [0124]
- the user may specify any of the above-mentioned files using the interface 5 and give a reproduction indication.
- the number of data is 3, but it can be more or less. Also, it is not necessary that the types of sums are all different. For example, R
- the data may be prepared and accumulated according to the criteria such as first, standard, recording destination, and highest priority between recordings.
- the already stored PG2PSais may be SPS-converted with different bits.
- Reference numeral 0124 denotes two PG2 PS taps 07 and 09, and 2 taps 06 and 08 of different bits.
- the bit 07 (for example, bs) of the PG2PS is stored in the data 07, and the bit (for example, 2 bs) of the PG2PS is stored in the data 09.
- the management files 06 and 08 in 01284 include the management of the data files 07 and 2 for the data file 09, respectively.
- Phi 06 is determined assuming a move of R RW R.
- Phi08 of 2 is determined assuming a move of S-means.
- the file 06 includes a management 06 corresponding to the data 07 of the file, and a management 06 2 corresponding to the data 09 of the file 2.
- the second line 08 includes a management 08 corresponding to the second line 07, and includes a management 08 2 corresponding to the second line 09.
- the management can be specified for each file with different data and can be stored in the management file in parallel. Number of files By using multiple data files, the equipment can be diversified.
- 0133 and 4 have multiple modes of management file and data file.
- the management file data 70 may be provided in relation to the file.
- the management information tiers which focus on the two tiers 08 and 07 and 09, may be provided in a number relationship.
- the management information data focusing on the key 06 and the key 08 and the key 07 of the second embodiment may be provided in a number of sections.
- the management keys 06 and 08 and the keys 07 and 09 can be provided in a large number of relations.
- Mub started by giving instructions using Zitafice 5.
- 5 shows an example of the configuration of the interface 5.
- the Zaitas 5 has a display 40, a synthesizing 402, and a receiving section 403.
- Reference numeral 0133 generates a display image based on the display data sent from the record 0 part. 402 received
- 404 is a device for displaying the number of record 0, and is, for example, TVIC.
- the communication unit 403 receives the signal from the line 405 and issues a control signal to each unit in the record 0.
- the controller 405 has a function for controlling the record 0, and transmits a control signal to the record 0 using infrared rays, radio waves, or the like based on the operation.
- LA405 has at least function selection 406, upward 407, downward 408, left 409, 40, and decision4. It may also have other.
- the display 4404 and the line 4405 are recorded separately from the record 0, but may be incorporated into the record 0.
- the display 4404 and the line 4405 are recorded separately from the record 0, but may be incorporated into the record 0.
- the following is a procedure for performing a massage.
- the user presses the function selection button 406 of the line 405 to call the screen.
- the key to select Bing, and press ENTER 4 to call the dubbing side.
- the mob is assigned to the dubbing surface as a dubbing (pi) seed.
- the user selects and decides the content of the dubbing surface
- 01366 shows an example of the surface of the mub.
- the description of the dubbing destination and the record of the S-medium (P2 and P4) are displayed. It is included in the section of the memo of the move and the file of the ceremony.
- the storage 05 reads out the information and obtains the information of the destination and the expression.
- the CP generates display data based on the information and sends it to the interface 5.
- the interface 5 receives and displays the data Displayed at 404.
- P2 indicates PG2 PS, or P4 indicates PG4 sum.
- Thailand is marked by a star and a star. The moved content will be unusable for the reason described below.
- the content is subjected to a mob treatment, and the kin is subjected to a dabbing treatment.
- the operation is displayed below the surface. As the operation proceeds, the operation is displayed in sequence.
- the dot () with the dot added is the currently selected eye.
- press Decided Year 4. David Mobu is selected.
- the items that can be dubbed are displayed.
- the X mark is displayed in front of the tie to indicate that it cannot be moved.
- the display may be guiau (the body may be half-colored or not displayed).
- the accumulated data in 05 (referred to as 07 of data) is transferred to the body of the vehicle via the drive 2 of the vehicle. Then, the second file 06 cannot be used. Then, a management file is generated in the body, and the mob is completed.
- B608 is a kind of data obtained by encrypting the media with all the chair keys issued by the licensor.
- the media is stored at 6 in the process of producing the recording media, which differs for each record, using methods that are not possible.
- Drive 2 of 0143 is composed of B processor 602, conversion 603, and
- Drive 2 holds the set 60.
- the management unit 602 is provided with the set 60 and the media book (
- the chair set 60 in the drive 2 of the 0145 is composed of a set of six chair keys and distributed to the licenser drive manufacturer of CPR.
- the key is assigned by the licenser so that all six chairs do not match. As a licensing requirement, it is required that the device be incorporated into the device without the need for an installation. However, if a chair key is released to the public by using this chair key,
- the drive 2 of 0146 records the encryption tie 60, the management tie 6 and the encryption tie tie 62 with respect to 6.
- the raw device 63 of 0147 is composed of a control part 65, a conversion 66,
- the generator 63 holds the chair 64.
- the B processor 65 generates a B608 set 64 and the like.
- the medium is converted by the medium 609 to generate the medium.
- 6 7 uses encryption tie 60 as media.
- the data file 62 of the encryption key is tied.
- PG Deda 69 deducts the te (PG2 PS).
- the recording 0 generating device 63 is provided separately for easy understanding. However, in general, since the recording device has not only the recording function but also the recording function, the recording 0 may have a book equivalent to the raw device 63 except for the overlapping part.
- step S8 indicates the order of the content moving process.
- the CP 00 performs encryption. For example, in the drive 2 shown in 7, the media is written using the management units 602 and 603.
- step S82 606 calculates dark data in the data accumulated in 05. And the cipher 607 is a predetermined
- step S83 the second drive 2 records the encrypted data in the character at the destination. Goes to step S83.
- step S83 the drive 2 records the portion of the management information accumulated in 05 in the record 6.
- step S84 the CP 00 disables the management information stored in 05 by saving (backing up) the management information to a place where it cannot be accessed.
- step S85 the code recorded in record 6
- step S86 the CP 00 determines whether or not the content recorded in the record 6 is in a usable state. If yes, the process is terminated; otherwise, the process proceeds to step S87.
- step S87 the CP 00 returns the saved information to the storage 05 by returning to the storage 05, so that it can be used via 05, that is, read out from 05 and reproduced.
- 0154 Movement size It can be divided into the following () to (4).
- the management unit 602 generates a medium from the B608 set 60.
- the media is common in many bodies. Because of this, drive 2
- the drive 2 of the controller reads the tie-flag (6) of the controller 6 and checks whether or not the tie-key is recorded in the controller 6 of the controller 6 according to the controller.
- the 606 reads out the PG2 PS determined by the function 07.
- the tie key used for this key is later recorded in the tie with the encryption key 60, so the PG2 PS with the data 07 is directly used as the key for the key 6 Can be recorded in area 2. In this case, there is no need to re-encrypt the code. Thus, the recording can be sped up.
- 0160 606 reads the PG2 PS obtained from the timer 07.
- the key used for this key is in the key of key 06 of the key. Use this.
- the obtained PG2PS data is encrypted using the tie obtained from the encryption tie 60 with the encryption 607, and is recorded in the area where the data 622 of the record 6 is recorded.
- Phi 6 Stored in 6 Phi 6. 9 shows an example of management file 6.
- Phi 6 is called R (Rea aa fo ao) book, and its size is the same as that for te.
- the copyright notices in the rack are CGS feed, PS feed, and P feed.
- the CG S feed contains da eco dg co o da a, but if da eco d co o da a is the only pi, the CG S feed is updated with pi .
- the PS-side has PS-co-da-a-Pad and the c-Poode (however, its logic is the opposite). The lock is unencrypted, but a stop is in place.
- the playback device determines the content of the CGS side without limit, the encrypted content is actually sent to the PG decoder 69 as it is. What.
- the PS B-id is used as a part of the cipher by cipher 607. Therefore, in the above, the values of the obtained PS Bid cannot be obtained correctly and cannot be correctly encrypted.
- the P feed contains the data in C CC e fca o aa and can detect the constitutional amendment. [0163] With the above, the recording of the data file 6 and the file file 6 in the code 6 is completed. However, in the current state, since the pointer 6 of the encryption data 6 is not recorded in 6 of, even if it is taken out from 0 to 6, it is still
- Tedataphi 62 cannot be used. [0164] It should be noted here that before using the data 62 of the 6th method, it is necessary to disable the file 06 in 05. This is because both the source and the destination must be in a state where reproducible materials longer than a minute can be reproduced at the same time.
- Disabling a file means disabling the use of information based on the information in the management file, so that the location of the corresponding data file cannot be identified. What to do. For example, evacuating the file to an accessible location, deleting the interface of the management file or deleting the encryption, deleting the management file, storing the management file 06 using the data in the section 05 Encrypting is equivalent to making the information unusable.
- evacuation of a management key to an accessible position will be described as disabled. The information is not available, mainly according to the indication of P00.
- the tie 604 reads the tie from the key 06 in 05. If you use a unique formula to record the tie key in 05, do this. Thailand uses the cipher
- step (4) the access information of the encryption
- the second drive 2 After disabling the file 06, the second drive 2 records the contents of the data 6 and the pointer of the data 62, etc., based on the indication of CP00.
- a navigation system that writes the previously-recorded lock / rock information to a predetermined file (for example) and records cryptographic information on the system described in (6) above. Write phi.
- a doss (voita) for specifying the location of the file is written in the navigation file. If a tie key has not yet been recorded in the area of the tie 60 of 0172, the cipher 655 records the encrypted tie e in the area of the cipher tie 60.
- the function of (6) is enabled. That is, the raw device 63 uses the encryption tie 60 and the phi 6 to perform encryption.
- the position of the tender 62 can be specified.
- 05 deletes the saved 06.
- the pointer of the data included in the management file 06 may be deleted, or the data of the data may be deleted.
- the processing may be interrupted after turning off the power of the file 06 after disabling the file 06 or before confirming a pointer or the like. Due to such interruptions due to normal operation, 05 . If this is the case, the loss is large. Therefore, after the source is returned to record 0, drive 2 of the middle is
- Reproduction can be performed using the heating device 63 on the machine 6 on which the moving process is completed. If you want to live, set 6 4 ⁇
- the location of the data eye 07 can be specified. Therefore, when the user designates the eye 08 of the interface 5 or 2, the record 0 can specify the position of the eye based on the pointer. Therefore, if the second eye 08 is used, the data eye 07 can be reproduced again.
- Reference numeral 2-18 denotes a semiconductor device such as an S device.
- the move to 2 to 8 is also due to the fact that The gives instructions using The Interface 5. Be started.
- the dubbing move is performed and SP2 or SP4 is selected, the mob processing for 2 to 8 is performed. Also, the user selects SP2.
- the dubbing function is displayed after the original content of the dubbing pi.
- the data fight 07 stored in the memory 05 and the data fight 07 are transferred to the drive 8 of the drive 2 and the drive 8 of the drive 2 is switched to the drive 8 of the drive 2, and the second drive 08 is disabled.
- Reference numeral 0182 denotes the composition of the drive 3 of record 0, the drive 8 of 2 and the raw device 83 of record 2.
- 8 of 2 there is an archive (B) 806, 807 and media 08.
- B806 and 807 are equivalent to those of In the case of the card, the B 806 is defined for every 0 using the data calculated by the new, and the card is manufactured.
- the media is a key generated by exchanging 1807. Has different values for different media. All of B806, Media807 and Media08 are stored in 2-8 using a method that cannot be modified during manufacturing.
- the drive 3 of the drive 1832 includes a method switch, a child for securing the connection of the method in the switch, and a method for controlling data with the method.
- Drive 2 of 0184 2 is composed of B processor 802, conversion 803,
- the management unit 802 generates a B806 set 80 media.
- 803 transforms by 807 to generate media.
- Card 804 uses the media to play the card.
- 805 encrypts the tie key with media.
- the drive 3 of 0186 2 records the encryption tie 80, the management file 8 and the data file 82 of the encryption key for the number 8 in 2. 2-8 holds these reports.
- the S-mechanism is equipped with a device 809. 809 is the media in drive 3 of 2
- the raw device 83 of the 0187 2 is composed of a controller 85, a converter 86, and a card.
- the second raw device 83 holds the set 84.
- the B management unit 85 generates a medium from the B806 set 84.
- Card 87 converts the media with media 807 to generate.
- Card 87 is used for media.
- the encryption tie 80 uses the encryption tie 80 as media. 89, tie the data of the cryptographic material 82 in tie.
- the PG data 820 outputs the coded data (PG2PS).
- PG2PS coded data
- the raw device 83 of the record 02 is provided separately.
- the record 0 may have the same book as the two raw devices 83 except for the duplication.
- the second drive 3 card 8804 uses the ear, and the 2 8 809 uses the 8808 on the 2 8 to confirm that the other party is a legitimate device and card. I do.
- cards 804 and 809 exchange random numbers. Card 804 uses this number to generate session s.
- 0192 2 8 ties 80 are recorded. There is an amount that can store multiple Thai keys. Therefore, the drive 3 of 2 encrypts the tie generated by the encryption unit 04 and stores it in 8 of 2. However, it will be held in Thailand.
- the drive 3 of 01922 reads the PG2PS obtained from the data 07 of.
- the tie key used for this key is recorded in 2-8 as the encryption tie, so the PG2 PS with the 7th key is recorded as it is in the area of 2/8 content 8 2 You can do it. For this reason, it is not necessary to re-edit the signal. It is possible to perform high-speed recording because only the recording from 05 and the recording of 2 8 are required.
- the subsequent processing is the same as the processing in step 6 in the above. That is, first, a process of disabling the second file 08 in 05 is performed, and the data file 82 of the second file is used. The reason for performing this procedure is the same as in the sixth mob process.
- 0197 805 is tied from the second file 08 in 05
- tie key If the tie key is recorded in 05 and it is encrypted with its own formula, this is done. Thailand is encrypted by Oia with the cipher 805 and becomes tie 80. Use C2.
- drive 3 of 2 writes a tie 80 to 8 of 2
- drive 3 of 2 encrypts with the session s generated at the time of the above-mentioned proof, and receives 2 of 8 with session s. To return to encryption tie 80.
- step (4) the access information of the encryption
- the second drive 3 After disabling the file 08 of 00002, the second drive 3 records the pointer of 82, etc. in 8 of 2 based on the indication of CP00. This is the same as the example described in (4) of “Mub processing” for “6” in the record. 2 Drive 3 sends the dock information to the specified Write in the navigation, write the navigation key, and write the location (pointer) of the navigation in the navigation key. The drive 3 of 2 records the tie e based on the cipher 805 in the area of the tie 80 of 2-8.
- the second 8th pin is enabled. If access information is confirmed, 05 deletes the evacuated second file 08. Or you may delete the unusable 2 file 08.
- the second file 08 also includes a management 08 corresponding to the data file 07.
- the management that cannot be used due to the management of 2-8, the management 082 is the body of the file 2 of 08.
- the management 07 is not used and the data 07 can be accessed without being disabled, the data 07 may be moved to another S-method.
- the use of a work is usually repeated several times on the same kind of body, It is because the possibility of copyright infringement that moves the same content to the S-medium will increase. Therefore, when the management of multiple tires is included in the key, the data migration corresponding to the deviation is performed, and the other pipes are used for other data. I can no longer move phi.
- File 08 is unusable or has been deleted. Datafile 07 and Datafile 09 of 2 cannot be reproduced because there is no management file to be connected. Therefore, delete it to secure the amount of 05.
- the contents of 2-8 may be recorded on other media and recorded. However, this is provided that 2-8 is provided with such a function. In this case, 05
- the management file is used to manage the data of a plurality of formulas, and when there is a move, the management file copies the data of the point file to the recording medium and the management file. In order to disable the use of (), it is possible to reliably limit the number of moves () to the same number of files, and to properly protect the copyrights of Te. (2) It is possible to prepare a record-type data file that can record the character at the end of the move.
- a high-quality move can be made at high speed even with a recording medium that can be recorded by the formula. Furthermore, (4) when using a common data expression in the number field, there is another point that the data file can be shared and the amount of the field can be effectively used.
- 2 indicates a file 90 that employs another data structure.
- File 90 has information reports Nos. 1 to 3 Nos. 902 to 904. That is, the manager 90 has several pieces of management information in one file.
- the phi corresponds to the phi described above (for example, phi 06080 shown in 3). It does not matter whether the method of providing a number of phis or the method of providing a plurality of phis in the report is adopted. It was noted that the deviation was obvious.
- Sex information includes the name of the destination.
- the player cannot move or play the poisoned data. If the destination that moves the best record, for example, Phi 90, is R, then P G2 PS. If the destination of the move of the file 1022 in S2 is S-medium, the available records are PG2 PS P G4.
- the available recording formulas are shown through the Zeitafice 5, and either formula is selected.
- the symbol is restored, the recording method is changed, and the data is encrypted with a recording key and stored on the recording medium.
- the management information for a certain content is collected into one eye, and for example, the process of displaying the presence or absence of a mob on the interface 5 is simplified.
- the body only needs to have one data eye, so the amount can be reduced.
- the usable recording format is used to determine the PG2PS's low level.
- the user can select any of, standard, and low.If standard is selected, use the prepared data eye, and if, low is selected, perform record conversion from PG2PS. Generate data eyes.
- the management data eye is stored in one body, but the eye may be stored in another body.
- the eye accumulates in the, and the management eye is built into the device.
- the management eye may be encrypted, and only the management eye may be stored in another storage.
- accumulating in a semiconductor device is advantageous in terms of manufacturing.
- the conductor member is more expensive than the conductor member, but the amount is smaller than that of the cryptographic eye.
- reference numeral 22 indicates the formation of the book of the other description 22 according to the present embodiment. 0 Components having the same function are given the same symbols and their descriptions are omitted.
- the record 22 does not include the receiving unit 03, but it indicates that the receiving unit 03 may be built in the record 22 or may be an external switch connected to the record 22. Explanation will be given along the data path in 022224.
- the control part 04 of 22 receives the content and the PG2PS and encrypts it with a predetermined key.
- the processing unit 222 performs encryption of the data of PG2PS. Then, O223 converts the obtained PG2PS into PG2PS. Since PG4 sum can be recorded in the S-medium 8, PG2PS may be converted to PG4 sum. Since it is well known, its description is omitted.
- the resulting sum is sent to drive 2 or drive 3 of drive 2 and recorded on 6 or S maker 8, respectively. 22, the eye 7 of the PG2 PS recorded in 6 is schematically shown.
- the PG4 SUM is likely to be watched in the evening because the evening is high and the data storage capacity is limited. Even if the user changes the band just before going out and performs a band-type move, it takes time for the change, which is convenient. Therefore, by generating only the PG4 sum, the convenience of the user is enhanced.
- S dc for tape, recording disc (CRC RW), disc (), digital Disk (R RW R) RW R, a disk (B asc) (fo aoe sa e sc fo Re abe sa e) and the like.
- R is a compact, lightweight, portable disk drive that can be used in a wide range of applications from containers to Cs.
- semiconductor media there are Sekia Digitala (S) cards, Mesti, Mestip, Kufra (R), and others. Of course, it can be applied to various recording media to be issued in the future.
- the present invention is also applicable to a mob using a body such as a CP.
- a video deck expression is used as an example of a data defying expression to be recorded, but recording is not limited to this.
- video dig type such as P 2 SP G2 PS PG 4 W (W dos (R) eda deo)
- video such as SC PSC
- bit number of pictures, number of pictures, and aspect ratio
- the audio-coding PC P3 PG do ae 3) C (daced do Cod) W (W do s (R) eda do)
- sampling wave number bit, channel number And bits for compression.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
- Television Signal Processing For Recording (AREA)
- Management Or Editing Of Information On Record Carriers (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/570,072 US20080072072A1 (en) | 2004-06-09 | 2005-06-05 | Recording Device and Recording Method |
JP2006519591A JPWO2005122165A1 (ja) | 2004-06-09 | 2005-06-08 | 記録装置および記録方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-170773 | 2004-06-09 | ||
JP2004170773 | 2004-06-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005122165A1 true WO2005122165A1 (ja) | 2005-12-22 |
Family
ID=35503324
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/010506 WO2005122165A1 (ja) | 2004-06-09 | 2005-06-08 | 記録装置および記録方法 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20080072072A1 (ja) |
JP (1) | JPWO2005122165A1 (ja) |
CN (1) | CN1898737A (ja) |
WO (1) | WO2005122165A1 (ja) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2006035777A1 (ja) * | 2004-09-29 | 2008-07-31 | シャープ株式会社 | 記録装置及び方法 |
EP1968061A1 (en) * | 2005-12-28 | 2008-09-10 | Matsushita Electric Industrial Co., Ltd. | Content data recording/reproducing device |
JP2009048703A (ja) * | 2007-08-21 | 2009-03-05 | Hitachi Ltd | 記録制御方法 |
JP2009048702A (ja) * | 2007-08-21 | 2009-03-05 | Hitachi Ltd | 記録制御方法 |
JP2010092585A (ja) * | 2009-12-21 | 2010-04-22 | Hitachi Consumer Electronics Co Ltd | コピー制御方法 |
JP2010123241A (ja) * | 2009-12-21 | 2010-06-03 | Hitachi Consumer Electronics Co Ltd | コピー制御方法 |
JP2010123240A (ja) * | 2009-12-21 | 2010-06-03 | Hitachi Consumer Electronics Co Ltd | コピー制御方法 |
JP2010135056A (ja) * | 2009-12-21 | 2010-06-17 | Hitachi Consumer Electronics Co Ltd | コピー制御方法 |
EP2383736A1 (en) * | 2007-06-06 | 2011-11-02 | Hitachi, Ltd. | Limitating the number of copies by recording content with the indication copy-no-more as soon as the recording media is removable |
JP2012165130A (ja) * | 2011-02-04 | 2012-08-30 | Toshiba Corp | 通信装置および鍵算出装置 |
JP2012198980A (ja) * | 2012-05-18 | 2012-10-18 | Hitachi Consumer Electronics Co Ltd | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
JP2012198978A (ja) * | 2012-05-18 | 2012-10-18 | Hitachi Consumer Electronics Co Ltd | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
JP2012198979A (ja) * | 2012-05-18 | 2012-10-18 | Hitachi Consumer Electronics Co Ltd | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
JP2012234453A (ja) * | 2011-05-09 | 2012-11-29 | Hitachi Consumer Electronics Co Ltd | 受信方法 |
JP2013175272A (ja) * | 2013-03-25 | 2013-09-05 | Hitachi Consumer Electronics Co Ltd | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
WO2015136843A1 (ja) * | 2014-03-10 | 2015-09-17 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | 情報機器、管理サーバ及びコピー制御方法 |
JP2018133811A (ja) * | 2018-04-04 | 2018-08-23 | マクセル株式会社 | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
JP2019161667A (ja) * | 2019-06-25 | 2019-09-19 | マクセル株式会社 | デジタルコンテンツ送受信システム及びデジタルコンテンツ送受信方法 |
WO2021117154A1 (ja) * | 2019-12-11 | 2021-06-17 | 藤原 大介 | コンテンツ複製装置、アクセス制御装置およびアクセス制御プログラム |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL127569A0 (en) * | 1998-09-16 | 1999-10-28 | Comsense Technologies Ltd | Interactive toys |
US20100030838A1 (en) * | 1998-08-27 | 2010-02-04 | Beepcard Ltd. | Method to use acoustic signals for computer communications |
US6607136B1 (en) | 1998-09-16 | 2003-08-19 | Beepcard Inc. | Physical presence digital authentication system |
JP2002527012A (ja) * | 1998-10-02 | 2002-08-20 | コムセンス・テクノロジーズ・リミテッド | コンピュータとの相互作用のためのカード |
US8019609B2 (en) * | 1999-10-04 | 2011-09-13 | Dialware Inc. | Sonic/ultrasonic authentication method |
US9219708B2 (en) * | 2001-03-22 | 2015-12-22 | DialwareInc. | Method and system for remotely authenticating identification devices |
EP1616329A2 (en) * | 2003-04-22 | 2006-01-18 | Matsushita Electric Industrial Co., Ltd. | Aggregation system |
TWI277870B (en) * | 2004-11-22 | 2007-04-01 | Toshiba Corp | Copyright management method, information recording/reproducing method and device, and information recording medium and method of manufacturing the medium |
US20090179170A1 (en) * | 2006-10-09 | 2009-07-16 | Bassett H Eugene | Semispherical Valve for Reciprocating Compressor and Pumps |
JP5117103B2 (ja) * | 2007-05-16 | 2013-01-09 | アルパイン株式会社 | ドライブレコーダシステム |
EP2203861A1 (en) * | 2007-08-24 | 2010-07-07 | International Business Machines Corporation | System and method for protection of content stored in a storage device |
WO2009027125A1 (en) * | 2007-08-24 | 2009-03-05 | International Business Machines Corporation | System and method for content protection |
JP4720847B2 (ja) * | 2008-04-21 | 2011-07-13 | ソニー株式会社 | 記録システム、伝送装置、記録装置、及び記録制御方法、並びにプログラム |
US8839002B2 (en) * | 2008-04-23 | 2014-09-16 | Cyberlink Corp. | Optical media recording device for protecting device keys and related method |
JP4548524B2 (ja) * | 2008-07-29 | 2010-09-22 | ソニー株式会社 | 通信装置、プログラム、通信方法および通信システム |
EP2184739A3 (en) * | 2008-07-29 | 2011-03-16 | Hitachi Ltd. | Copy control method |
KR101574618B1 (ko) * | 2008-09-24 | 2015-12-04 | 파나소닉 주식회사 | 기록재생시스템, 기록매체장치 및 기록재생장치 |
JP2010146635A (ja) * | 2008-12-18 | 2010-07-01 | Hitachi Global Storage Technologies Netherlands Bv | コンテンツ記録再生装置並びにコンテンツの書き込み及び読み出し方法 |
JP5106432B2 (ja) * | 2009-01-23 | 2012-12-26 | 株式会社東芝 | 画像処理装置、方法、及びプログラム |
JP4924633B2 (ja) * | 2009-02-27 | 2012-04-25 | ソニー株式会社 | 情報処理装置、情報処理方法およびプログラム |
EP2555134A4 (en) * | 2010-03-26 | 2013-09-18 | Panasonic Corp | REPRODUCTION DEVICE, CONTENT DISTRIBUTION SYSTEM, REPRODUCTION METHOD, COMPUTER PROGRAM, AND INTEGRATED CIRCUIT |
US9225520B2 (en) * | 2010-05-28 | 2015-12-29 | Adobe Systems Incorporated | System and method for deterministic generation of a common content encryption key on distinct encryption units |
JP5159916B2 (ja) * | 2011-04-28 | 2013-03-13 | 株式会社東芝 | ホスト |
JP4996762B1 (ja) | 2011-08-31 | 2012-08-08 | 株式会社東芝 | 電子機器およびコンテンツ転送方法 |
JP5377712B2 (ja) * | 2012-05-31 | 2013-12-25 | 株式会社東芝 | 電子機器 |
CN103116492A (zh) * | 2013-01-09 | 2013-05-22 | 上海思华科技股份有限公司 | 光盘或光盘文件收录方法及系统 |
US10509733B2 (en) | 2017-03-24 | 2019-12-17 | Red Hat, Inc. | Kernel same-page merging for encrypted memory |
US10209917B2 (en) | 2017-04-20 | 2019-02-19 | Red Hat, Inc. | Physical memory migration for secure encrypted virtual machines |
US10379764B2 (en) | 2017-05-11 | 2019-08-13 | Red Hat, Inc. | Virtual machine page movement for encrypted memory |
US11354420B2 (en) * | 2017-07-21 | 2022-06-07 | Red Hat, Inc. | Re-duplication of de-duplicated encrypted memory |
US11614956B2 (en) | 2019-12-06 | 2023-03-28 | Red Hat, Inc. | Multicast live migration for encrypted virtual machines |
CN112954404A (zh) * | 2021-01-25 | 2021-06-11 | 世纪龙信息网络有限责任公司 | 一种mpeg-2 ps视频文件的加密存储方法和装置 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000149414A (ja) * | 1998-11-10 | 2000-05-30 | Victor Co Of Japan Ltd | 情報記録方法及び装置 |
JP2002334559A (ja) * | 2001-05-11 | 2002-11-22 | Matsushita Electric Ind Co Ltd | 情報記録媒体、情報管理装置および著作権保護方法 |
JP2002358242A (ja) * | 2001-05-31 | 2002-12-13 | Victor Co Of Japan Ltd | コンテンツのコピー管理方法及び記録再生装置 |
JP2002369138A (ja) * | 2001-06-04 | 2002-12-20 | Matsushita Electric Ind Co Ltd | 情報記録媒体、情報記録媒体に情報を記録、再生する装置 |
JP2003132625A (ja) * | 2001-10-25 | 2003-05-09 | Toshiba Corp | 秘匿情報を伴う情報記録方法及び装置及び再生方法及び装置 |
JP2003203432A (ja) * | 2001-10-30 | 2003-07-18 | Matsushita Electric Ind Co Ltd | 情報記録媒体、情報記録装置、情報再生装置およびコピー装置 |
JP2004005816A (ja) * | 2002-05-31 | 2004-01-08 | Toshiba Corp | 情報記録再生装置及び情報記録再生方法 |
JP2004022085A (ja) * | 2002-06-18 | 2004-01-22 | Toshiba Corp | 記録再生装置 |
WO2004087077A1 (en) * | 2003-04-04 | 2004-10-14 | L'oreal | Cosmetic composition comprising a volatile fatty phase |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH103745A (ja) * | 1996-06-12 | 1998-01-06 | Sony Corp | 記録媒体、デジタルコピー管理方法、再生装置、及び記録装置 |
EP1653463A1 (en) * | 1997-05-13 | 2006-05-03 | Kabushiki Kaisha Toshiba | License information copying method and apparatus, license information moving method |
JP2000260121A (ja) * | 1999-03-05 | 2000-09-22 | Toshiba Corp | 情報再生装置および情報記録装置 |
CN100423041C (zh) * | 2000-01-21 | 2008-10-01 | 索尼公司 | 数据处理设备和数据处理方法 |
TWI230858B (en) * | 2000-12-12 | 2005-04-11 | Matsushita Electric Ind Co Ltd | File management method, content recording/playback apparatus and content recording program |
US7114048B2 (en) * | 2001-07-06 | 2006-09-26 | Sony Corporation | Recording apparatus, recording method, storage medium, program and communication apparatus |
JP4934923B2 (ja) * | 2001-08-09 | 2012-05-23 | ソニー株式会社 | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにコンピュータ・プログラム |
US7372964B2 (en) * | 2001-10-10 | 2008-05-13 | Kabushiki Kaisha Toshiba | Method and apparatus for recording information including secret information and method and apparatus for reproduction thereof |
CA2464972A1 (en) * | 2001-10-30 | 2003-05-08 | Matsushita Electric Industrial Co. Ltd. | Information recording medium, information recording apparatus, information reproducing apparatus, and copying apparatus |
TWI227468B (en) * | 2002-04-01 | 2005-02-01 | Sony Corp | Recording method, and storage medium driving apparatus |
-
2005
- 2005-06-05 US US11/570,072 patent/US20080072072A1/en not_active Abandoned
- 2005-06-08 JP JP2006519591A patent/JPWO2005122165A1/ja active Pending
- 2005-06-08 WO PCT/JP2005/010506 patent/WO2005122165A1/ja active Application Filing
- 2005-06-08 CN CNA2005800013068A patent/CN1898737A/zh active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000149414A (ja) * | 1998-11-10 | 2000-05-30 | Victor Co Of Japan Ltd | 情報記録方法及び装置 |
JP2002334559A (ja) * | 2001-05-11 | 2002-11-22 | Matsushita Electric Ind Co Ltd | 情報記録媒体、情報管理装置および著作権保護方法 |
JP2002358242A (ja) * | 2001-05-31 | 2002-12-13 | Victor Co Of Japan Ltd | コンテンツのコピー管理方法及び記録再生装置 |
JP2002369138A (ja) * | 2001-06-04 | 2002-12-20 | Matsushita Electric Ind Co Ltd | 情報記録媒体、情報記録媒体に情報を記録、再生する装置 |
JP2003132625A (ja) * | 2001-10-25 | 2003-05-09 | Toshiba Corp | 秘匿情報を伴う情報記録方法及び装置及び再生方法及び装置 |
JP2003203432A (ja) * | 2001-10-30 | 2003-07-18 | Matsushita Electric Ind Co Ltd | 情報記録媒体、情報記録装置、情報再生装置およびコピー装置 |
JP2004005816A (ja) * | 2002-05-31 | 2004-01-08 | Toshiba Corp | 情報記録再生装置及び情報記録再生方法 |
JP2004022085A (ja) * | 2002-06-18 | 2004-01-22 | Toshiba Corp | 記録再生装置 |
WO2004087077A1 (en) * | 2003-04-04 | 2004-10-14 | L'oreal | Cosmetic composition comprising a volatile fatty phase |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2006035777A1 (ja) * | 2004-09-29 | 2008-07-31 | シャープ株式会社 | 記録装置及び方法 |
US8170399B2 (en) | 2004-09-29 | 2012-05-01 | Sharp Kabushiki Kaisha | Recording device and method |
EP1968061A1 (en) * | 2005-12-28 | 2008-09-10 | Matsushita Electric Industrial Co., Ltd. | Content data recording/reproducing device |
EP1968061A4 (en) * | 2005-12-28 | 2010-03-31 | Panasonic Corp | RECORDING / REPRODUCING DEVICE OF CONTENT DATA |
EP2383736A1 (en) * | 2007-06-06 | 2011-11-02 | Hitachi, Ltd. | Limitating the number of copies by recording content with the indication copy-no-more as soon as the recording media is removable |
JP2009048703A (ja) * | 2007-08-21 | 2009-03-05 | Hitachi Ltd | 記録制御方法 |
JP2009048702A (ja) * | 2007-08-21 | 2009-03-05 | Hitachi Ltd | 記録制御方法 |
JP2010123240A (ja) * | 2009-12-21 | 2010-06-03 | Hitachi Consumer Electronics Co Ltd | コピー制御方法 |
JP2010135056A (ja) * | 2009-12-21 | 2010-06-17 | Hitachi Consumer Electronics Co Ltd | コピー制御方法 |
JP4565049B2 (ja) * | 2009-12-21 | 2010-10-20 | 日立コンシューマエレクトロニクス株式会社 | デジタルコンテンツ受信装置、デジタルコンテンツ受信方法、およびデジタルコンテンツ送受信方法 |
JP4629789B2 (ja) * | 2009-12-21 | 2011-02-09 | 日立コンシューマエレクトロニクス株式会社 | デジタルコンテンツ受信装置、デジタルコンテンツ受信方法、およびデジタルコンテンツ送受信方法 |
JP4629790B2 (ja) * | 2009-12-21 | 2011-02-09 | 日立コンシューマエレクトロニクス株式会社 | デジタルコンテンツ受信装置、デジタルコンテンツ受信方法、およびデジタルコンテンツ送受信方法 |
JP4629791B2 (ja) * | 2009-12-21 | 2011-02-09 | 日立コンシューマエレクトロニクス株式会社 | デジタルコンテンツ受信装置、デジタルコンテンツ受信方法、およびデジタルコンテンツ送受信方法 |
JP2010123241A (ja) * | 2009-12-21 | 2010-06-03 | Hitachi Consumer Electronics Co Ltd | コピー制御方法 |
JP2010092585A (ja) * | 2009-12-21 | 2010-04-22 | Hitachi Consumer Electronics Co Ltd | コピー制御方法 |
JP2012165130A (ja) * | 2011-02-04 | 2012-08-30 | Toshiba Corp | 通信装置および鍵算出装置 |
JP2012234453A (ja) * | 2011-05-09 | 2012-11-29 | Hitachi Consumer Electronics Co Ltd | 受信方法 |
JP2012198979A (ja) * | 2012-05-18 | 2012-10-18 | Hitachi Consumer Electronics Co Ltd | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
JP2012198978A (ja) * | 2012-05-18 | 2012-10-18 | Hitachi Consumer Electronics Co Ltd | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
JP2012198980A (ja) * | 2012-05-18 | 2012-10-18 | Hitachi Consumer Electronics Co Ltd | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
JP2013175272A (ja) * | 2013-03-25 | 2013-09-05 | Hitachi Consumer Electronics Co Ltd | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
WO2015136843A1 (ja) * | 2014-03-10 | 2015-09-17 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | 情報機器、管理サーバ及びコピー制御方法 |
JPWO2015136843A1 (ja) * | 2014-03-10 | 2017-04-06 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America | 情報機器、管理サーバ及びコピー制御方法 |
JP2018133811A (ja) * | 2018-04-04 | 2018-08-23 | マクセル株式会社 | デジタルコンテンツ受信装置、および、デジタルコンテンツ受信方法 |
JP2019161667A (ja) * | 2019-06-25 | 2019-09-19 | マクセル株式会社 | デジタルコンテンツ送受信システム及びデジタルコンテンツ送受信方法 |
WO2021117154A1 (ja) * | 2019-12-11 | 2021-06-17 | 藤原 大介 | コンテンツ複製装置、アクセス制御装置およびアクセス制御プログラム |
JPWO2021117154A1 (ja) * | 2019-12-11 | 2021-06-17 | ||
JP7412445B2 (ja) | 2019-12-11 | 2024-01-12 | 藤原 大介 | コンテンツ複製装置、アクセス制御装置およびアクセス制御プログラム |
Also Published As
Publication number | Publication date |
---|---|
JPWO2005122165A1 (ja) | 2008-04-10 |
US20080072072A1 (en) | 2008-03-20 |
CN1898737A (zh) | 2007-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005122165A1 (ja) | 記録装置および記録方法 | |
US6834348B1 (en) | Digital data recording apparatus, digital data recording method, and computer-readable recording medium | |
US10089620B2 (en) | Recording medium, license management apparatus, and recording and playback apparatus | |
CN1682486B (zh) | 用于多数字权利管理的内容分配 | |
US7706531B2 (en) | Recording apparatus, reproduction apparatus, data processing apparatus, recording and reproduction apparatus and data transmission apparatus and corresponding methods | |
US8301569B2 (en) | Content information providing system, content information providing server, content reproduction apparatus, content information providing method, content reproduction method and computer program | |
US6456725B1 (en) | Method for increasing the functionality of a media player/recorder device or an application program | |
US7096268B1 (en) | Copyrighted data processing method and apparatus | |
KR20000060590A (ko) | 디지탈데이터 플레이어의 파일 암호화 장치 | |
JPH0944993A (ja) | 情報記録方法及び装置、関数記録方法及び装置並びに情報再生方法及び装置 | |
US20060059103A1 (en) | Return component, program, and return component method | |
US7028340B1 (en) | Apparatus, a system and method for controlling access to contents | |
KR101371834B1 (ko) | 트랜잭션 마킹에 의한 시청각 데이터의 안전한 배포 방법 및 시스템 | |
KR20040086745A (ko) | 서버장치 | |
CN102496378B (zh) | 控制方法、记录装置、记录再现装置 | |
CN100552791C (zh) | 利用介质id加密的内容数据记录设备 | |
JPH09307543A (ja) | 著作物データ再生方法および装置 | |
US7802311B2 (en) | Recording apparatus, recording method, recording medium and program | |
CA2467974A1 (en) | System for tracking end-user electronic content usage | |
CN101320582A (zh) | 控制方法、记录装置、记录再现装置 | |
US20100027797A1 (en) | Playing Apparatus and Management Method | |
US20090177712A1 (en) | Digital data Recording device | |
US20090175445A1 (en) | Electronic Device, Home Network System and Method for Protecting Unauthorized Distribution of Digital Contents | |
AU2006343229B2 (en) | A method for protecting digital content by encrypting and decrypting a memory card | |
JP4625737B2 (ja) | コンテンツ記録再生装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200580001306.8 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006519591 Country of ref document: JP |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 11570072 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
122 | Ep: pct application non-entry in european phase | ||
WWP | Wipo information: published in national office |
Ref document number: 11570072 Country of ref document: US |