WO2006006233A1 - コンテンツ記録装置及びデータ配信システム - Google Patents
コンテンツ記録装置及びデータ配信システム Download PDFInfo
- Publication number
- WO2006006233A1 WO2006006233A1 PCT/JP2004/009976 JP2004009976W WO2006006233A1 WO 2006006233 A1 WO2006006233 A1 WO 2006006233A1 JP 2004009976 W JP2004009976 W JP 2004009976W WO 2006006233 A1 WO2006006233 A1 WO 2006006233A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- encryption key
- encryption
- data
- encrypted
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to a content recording apparatus and a data distribution system for receiving and storing encrypted content.
- the content when a broadcast station distributes content, the content may be distributed after being encrypted in order to protect the copyright of the content.
- the encryption key used to encrypt the content is received It is often generated from the license information of the other user.
- the content recording apparatus of the user receives, for example, content transmitted from a broadcasting station, if the license information distributed properly from the broadcasting station is held, the encryption key is generated from the license information.
- the content can be decrypted using the encryption key.
- the content decrypted by the user's content recording device can be copied and provided to a third party, the content may be widely distributed to unspecified third parties. Protecting copyrights.
- the third party holds it. It is not possible to determine whether the content that is currently acquired is legitimately acquired from the broadcasting station or is illegally acquired.
- a conventional content recording apparatus when a conventional content recording apparatus receives content transmitted from a broadcast station, it generates an encryption key from license information properly distributed from the broadcast station, and uses the encryption key to generate the content. Decrypt.
- the content is recorded on a data storage medium such as a hard disk
- the content is encrypted again using a separate encryption key different from the encryption key, and the encrypted content is recorded on the data storage medium.
- the content recorded on the data storage medium is copied and provided to a third party
- the content held by the third party is different from the content transmitted from the broadcast station. It turns out that it is not what was acquired normally.
- the encryption key A used for encrypting the content is encoded, and the encryption key A
- the encryption key B used for encryption and the encryption key C used for re-encrypting the encryption key A are distributed as metadata.
- the content recording device When the content recording device receives the encoded content and metadata, the content recording device does not re-encrypt the content and uses the encryption key B included in the metadata. After decrypting A, re-encrypt encryption key A using re-encryption encryption key C. And, the encrypted content, re-encrypted encryption key A, and re-encryption The encryption key C is recorded on a data storage medium (see, for example, Patent Document 1).
- Patent Document 1 Japanese Patent Application Laid-Open No. 2002-176419 (paragraph number [0013], FIG. 8)
- the conventional content recording apparatus is configured as described above, if the broadcast station on the content transmission side distributes the encryption key C for re-encryption as metadata, the content re-encoding is performed. Even if the user does not perform the process, the copyright of the content can be protected by re-encrypting the encryption key A. However, if the broadcast station on the content transmission side does not distribute the encryption key C for re-encryption as metadata, the copyright of the content cannot be protected unless the content is re-encrypted. There were issues such as.
- the present invention has been made to solve the above-described problems, and is used for content encryption even when the content transmission side does not distribute the encryption key for the reproduction key as metadata.
- An object of the present invention is to obtain a content recording device and a data distribution system that can re-encrypt the encryption key and protect the copyright of the content. Disclosure of the invention
- the content recording apparatus uses the second encryption key received by the receiving means to decrypt the first encryption key, and uses the third encryption key to encrypt the first encryption key.
- Decryption encryption means is provided, and the first encryption key encrypted by the decryption encryption means and the content received by the reception means are recorded on the data storage medium.
- FIG. 1 is a configuration diagram showing a data distribution system according to a first embodiment of the present invention.
- FIG. 2 is a configuration diagram showing a content transmission device of a data distribution system according to Embodiment 1 of the present invention.
- FIG. 3 is a block diagram showing a content recording apparatus according to Embodiment 1 of the present invention.
- FIG. 4 is an explanatory diagram showing content in which encrypted data Data [Ks (Kw)] or encrypted data Data [Ks (Kw2)] is embedded.
- FIG. 5 is an explanatory diagram showing decryption / encryption of the encryption key Ks.
- FIG. 6 is a block diagram showing a content recording apparatus according to Embodiment 2 of the present invention.
- FIG. 1 is a block diagram showing a data distribution system according to Embodiment 1 of the present invention
- FIG. 2 is a block diagram showing a content transmission apparatus of the data distribution system according to Embodiment 1 of the present invention.
- FIG. 3 is a block diagram showing a content recording apparatus according to Embodiment 1 of the present invention.
- the content transmission device 1 is installed in a broadcasting station, for example, and encrypts and distributes the content.
- the data communication network 2 is, for example, a wired transmission path such as the Internet or a public telephone network, or a wireless transmission path via a satellite, and is a communication that transmits data distributed from the content transmission apparatus 1 to the content recording apparatus 3. It is a medium.
- the content recording device 3 When the content recording device 3 receives the content distributed from the content transmission device 1, the content recording device 3 records the content in a data storage medium such as a hard disk.
- the content server 11 of the content transmission device 1 stores content to be distributed.
- the encryption key server 12 of the content transmission device 1 stores the encryption key Ks (first encryption key) used for encrypting the content to be distributed, and the encryption key Kw (first encryption key) used for encrypting the encryption key Ks.
- 2 encryption key for example, an encryption key generated from user license information).
- the encryption unit 13 of the content transmission device 1 uses the encryption key Ks stored in the encryption key server 12 to sign the content to be distributed and is stored in the encryption key server 12.
- the encryption key Ks is encrypted using the encryption key Kw.
- the data loading unit 14 of the content transmission device 1 receives encrypted data Data [Ks (Kw)] including the encryption key Ks (encryption information of the encryption key Ks) encrypted by the key 13
- Ks (Kw) encrypted data Data
- the process of embedding in the content that has been signed by the encryption unit 13 is performed.
- the data distribution unit 15 of the content transmission device 1 distributes the content in which the encrypted data Data [Ks (Kw)] is carried by the data loading unit 14 to the content recording device 3.
- the data distribution unit 15 uses the encryption key Kw stored in the encryption key server 12 as a content through a secure communication path different from the content in which the encrypted data Data [Ks (Kw)] is carried. Delivered to recording device 3.
- the data receiving unit 21 of the content recording device 3 receives the content in which the data [Ks (Kw)] is carried from the content transmitting device 1, and is a separate secure Receives the encryption key Kw over the communication path. Note that the data receiving unit 21 constitutes a receiving means.
- the secret data holding unit 22 of the content recording device 3 is a data holding area that cannot be accessed from the outside, and has a unique ID (for example, the MAC key of the content recording device 3). Dress, serial number of the content recording device 3, etc.).
- the encryption key generating unit 23 of the content recording device 3 generates an encryption key Kw2 (third encryption key) from the device-specific ID stored in the secret data holding unit 22.
- the encrypted data extraction unit 24 of the content recording device 3 extracts the encrypted data Data [Ks (Kw)] from the content received by the data receiving unit 21.
- the decryption / encryption unit 25 of the content recording device 3 uses the encryption key Kw received by the data reception unit 21 to encrypt the encrypted data Data [Ks (
- the secret data holding unit 22, the encryption key generation unit 23, the encrypted data extraction unit 24, and the decryption / encryption unit 25 constitute a decryption sign key means.
- the content playback unit 26 of the content recording device 3 plays back the content decrypted by the decryption code unit 25.
- the content playback unit 26 constitutes content playback means.
- the encrypted data loading unit 27 of the content recording device 3 receives the encrypted data Data [K S (K W 2)] including the encryption key Ks encrypted by the decryption key unit 25 and the encrypted data. Instead of the encrypted data Data [Ks (Kw)] extracted by the extraction unit 24, the content is loaded into the content.
- the content recording unit 28 of the content recording device 3 records the content in which the encrypted data Data [Ks (Kw2)] is loaded in the hard disk 29 by the encrypted data loading unit 27.
- the hard disk 29 of the content recording device 3 is a data storage medium incorporated in the device, and stores content in which encrypted data Data [Ks (Kw2)] is embedded.
- a content transmission device 1 installed in a broadcasting station distributes content.
- the content is distributed as a “sign”.
- the encryption unit 13 of the content transmission apparatus 1 takes out the content to be distributed from the content server 11, it takes out the encryption key Ks used for encryption of the content from the encryption key server 12, and its signature. Also, the content to be distributed is encrypted using the key Ks. Also, the key 13 of the content transmitting apparatus 1 takes out the key Kw used to encrypt the key Ks from the key server 12. Then, using the ⁇ key key Kw, the ⁇ key key Ks is encoded.
- the data loading unit 14 of the content transmitting apparatus 1 encrypts the encryption key Ks (encryption of the encryption key Ks) by the encrypting unit 13. ⁇ data including the conversion information) Data [Ks (Kw)] is loaded into the content encrypted by the encryption unit 13.
- FIG. 4 shows the content in which the encrypted data Data [Ks (Kw)] is embedded.
- the data distribution unit 15 of the content transmission device 1 transmits the encrypted data via the data communication network 2. Distributes the content (upper content in Fig. 4) with data [Ks (Kw)] into the content recording device 3.
- the data distribution unit 15 of the content transmission apparatus 1 is stored in the encryption key server 12 through a secure communication path different from the content in which the key data “Data [Ks (Kw)]” is embedded.
- the encryption key Kw is distributed to the content recording device 3.
- the data receiving unit 21 of the content recording device 3 receives the content distributed from the content transmitting device 1. In other words, the content in which the encrypted data Data [Ks (Kw)] is embedded is received. In addition, the encryption key Kw distributed from the content transmission device 1 is received.
- the encrypted data extraction unit 24 of the content recording device 3 extracts the encrypted data Data [Ks (Kw)] from the content.
- the encryption key generation unit 23 of the content recording device 3 is stored in the secret data holding unit 22.
- the encryption key Kw2 is generated from the device-specific ID.
- the unique ID of the device is not particularly limited as long as it is unique information that varies from device to device.
- the MAC address of the content recording device 3 or the serial number of the content recording device 3 is applicable.
- the encryption key generation unit 23 performs code inversion processing on a device-specific ID according to a predetermined procedure, or performs encryption using a predetermined encryption key, so that the encryption key is generated from the device-specific ID. Generate Kw2. Needless to say, the encryption key Kw2 generated from the device-specific ID is a secret key different from the secret key Kw used to encrypt the secret key Ks.
- the decryption / encryption unit 25 of the content recording device 3 is configured such that when the encrypted data extraction unit 24 extracts the content power, the data “Ks (Kw)”, as shown in FIG. Using the encryption key Kw received by the receiving unit 21, the encryption key Ks included in the encrypted data Data [Ks (Kw)] is decrypted.
- the decryption key unit 25 of the content recording device 3 uses the encryption key Kw2 as shown in FIG. Encrypt Ks again.
- the decryption / encryption unit 25 of the content recording device 3 encrypts the encryption key Ks again, the signature / code data loading unit 27 of the content recording device 3 is used.
- the encrypted data Data [Ks (Kw2)] including the encrypted encryption key Ks is encrypted by the data extraction unit 24.
- data Data [Ks (Kw)] carry the processing to be loaded into the content.
- the content recording unit 28 of the content recording device 3 records the content on the hard disk 29 when the encrypted data loading unit 27 embeds the encoded data Data [Ks (Kw2)] in the content.
- the content recording device 3 reproduces content
- the decryption decoding unit 25 of the content recording device 3 decrypts the content as described above
- the content reproduction unit 26 of the content recording device 3 decrypts and encrypts the content.
- the content decrypted by the unit 25 is played back.
- the decryption encryption unit 25 uses the encryption key Kw2 generated by the encryption key generation unit 23 to Decrypt the encryption key Ks contained in the encrypted data Data [Ks (Kw2)], and decrypt the content using the encryption key Ks.
- the sign key Ks is decrypted using the sign key Kw received by the data receiving unit 21, and the sign key Kw2 is used.
- a decryption / encryption unit 25 is provided to encrypt the key No. key Ks, and the encryption key Ks encrypted by the decryption / encryption unit 25 and the content received by the data reception unit 21 are recorded on the hard disk 29. Therefore, even if the content transmission device 1 does not distribute the encryption key Kw2 that is the encryption key for the re-signing key, it re-encrypts the encryption key Ks used for the content encryption, The effect which can protect rights is produced.
- the data receiving unit 21 of the content recording device 3 has been described as receiving the content in which the data [Ks (Kw)] is received. The same effect can be achieved even if the content and the key data Data [Ks (Kw)] are received separately.
- FIG. 6 is a block diagram showing a content recording apparatus according to Embodiment 2 of the present invention.
- the encryption key generation unit 31 of the content recording device 3 generates the encryption key Kw2 (third encryption key) from the ID unique to the storage medium stored in the secret data holding area 33a of the portable storage medium 33.
- the secret data holding area 33a, the encryption key generation unit 31, the encrypted data extraction unit 24, and the decryption / encryption unit 25 of the portable storage medium 33 constitute a decryption / encryption means.
- the content recording unit 32 of the content recording device 3 uses the encrypted data loading unit 27 to transfer the content loaded with the encrypted data Data [Ks (Kw2)] to the removable portable storage medium 33. Record.
- the recording means is composed of the data number embedding unit 27 and the content recording unit 32. Has been.
- the portable storage medium 33 of the content recording device 3 is a data storage medium such as a memory card or a DVD that can be removed from the device, and content in which encrypted data Data [Ks (Kw2)] is embedded.
- Ks encrypted data Data
- the portable storage medium 33 has a secret data holding area 33a that cannot be accessed from the outside, and an ID unique to the storage medium (for example, a card number that can uniquely identify a memory card) ) Is stored.
- the data receiving unit 21 of the content recording device 3 receives the content distributed from the content transmitting device 1. In other words, the content in which the encrypted data Data [Ks (Kw)] is embedded is received. In addition, the encryption key Kw distributed from the content transmission device 1 is received.
- the encrypted data extraction unit 24 of the content recording device 3 extracts the encrypted data Data [Ks (Kw)] from the content as in the first embodiment. .
- the encryption key generating unit 31 of the content recording device 3 generates the encryption key Kw2 from the ID unique to the storage medium stored in the secret data holding area 33a of the portable storage medium 33.
- the ID is not particularly limited as long as it is unique information that differs for each storage medium. For example, a card number that can uniquely identify a memory card is applicable.
- the encryption key generation unit 31 encrypts the unique ID of the storage medium from the ID unique to the storage medium by performing code inversion processing according to a predetermined procedure or performing encryption using a predetermined encryption key. Generate key Kw2. Needless to say, the encryption key Kw2 generated from the unique ID of the storage medium is an encryption key different from the encryption key Kw used for the sign of the encryption key Ks.
- the decryption / encryption unit 25 of the content recording device 3 is the same as the encrypted data extraction unit 24. If the key data “K S (K W )” is extracted, the key data “K S (K W )” is extracted using the encryption key Kw received by the data receiving unit 21 as in the first embodiment. Decrypt the encryption key Ks included in Data [Ks (Kw)] (see Fig. 5).
- the decryption key unit 25 of the content recording device 3 when the encryption key generation unit 31 generates the generation key Kw2 from the storage medium-specific ID, the decryption key unit 25 of the content recording device 3 generates the generation key Kw2 as shown in FIG. Use to encrypt the encryption key Ks again.
- the content recording device 3 When the content recording device 3 accumulates content, if the decryption / encryption unit 25 of the content recording device 3 encrypts the encryption key Ks again, the content recording device 3's signature key data loading unit 27 However, as in the first embodiment, the encrypted data Data [Ks (Kw2)] including the encrypted encryption key Ks is converted into the encrypted data Data [ Instead of [Ks (Kw)], the content is loaded (see the lower part of Fig. 4).
- the encrypted data loading unit 27 embeds the encoded data Data [Ks (Kw2)] in the content
- the content recording unit 32 of the content recording device 3 stores the content in the portable storage medium 33. Record.
- the content recording device 3 reproduces content
- the decryption decoding unit 25 of the content recording device 3 decrypts the content as described above
- the content reproduction unit 26 of the content recording device 3 decrypts and encrypts the content.
- the content decrypted by the unit 25 is played back.
- the decryption encryption unit 25 uses the encryption key Kw2 generated by the encryption key generation unit 31, and the encrypted data Data [Ks (Kw2)] is decrypted, and the content is decrypted using the encryption key Ks.
- the sign key Ks is decrypted using the sign key Kw received by the data receiving unit 21, and the sign key Kw2 is used.
- a decryption / encryption unit 25 for decrypting the key No. Ks is provided, and the encryption key Ks encrypted by the decryption / encryption unit 25 and the content received by the data receiving unit 21 are recorded in the portable storage medium 33.
- the encryption key Ks used for the content encryption is re-encrypted. The content copyright can be protected.
- the encrypted data Data [Ks (Kw2)] is embedded, the content is recorded on the removable portable storage medium 33. Even if the portable storage medium 33 is detached from the content recording device 3 and attached to the other content recording device 3, the content can be reproduced by the other content recording device 3.
- the data receiving unit 21 of the content recording device 3 has been shown to receive the content in which the data [Ks (Kw)] is received. The same effect can be achieved even if the content and the key data Data [Ks (Kw)] are received separately.
- the content recording apparatus is used for a content playback device or the like that is highly required to reliably protect the copyright of the content when storing the encrypted content. Suitable for.
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/009976 WO2006006233A1 (ja) | 2004-07-13 | 2004-07-13 | コンテンツ記録装置及びデータ配信システム |
JP2006527666A JPWO2006006233A1 (ja) | 2004-07-13 | 2004-07-13 | コンテンツ記録装置及びデータ配信システム |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/009976 WO2006006233A1 (ja) | 2004-07-13 | 2004-07-13 | コンテンツ記録装置及びデータ配信システム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006006233A1 true WO2006006233A1 (ja) | 2006-01-19 |
Family
ID=35783599
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/009976 WO2006006233A1 (ja) | 2004-07-13 | 2004-07-13 | コンテンツ記録装置及びデータ配信システム |
Country Status (2)
Country | Link |
---|---|
JP (1) | JPWO2006006233A1 (ja) |
WO (1) | WO2006006233A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008028575A (ja) * | 2006-07-19 | 2008-02-07 | Hitachi Kokusai Electric Inc | 受信装置 |
JP2008311779A (ja) * | 2007-06-12 | 2008-12-25 | Hitachi Kokusai Electric Inc | データ受信装置 |
US8744080B2 (en) | 2006-03-17 | 2014-06-03 | Sony Corporation | Encrypted data recording apparatus |
WO2021192731A1 (ja) * | 2020-03-23 | 2021-09-30 | ソニーグループ株式会社 | 通信装置及び通信方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10283270A (ja) * | 1997-04-09 | 1998-10-23 | Fujitsu Ltd | 再生許可方法、記録方法及び記録媒体 |
JP2000330871A (ja) * | 1999-05-21 | 2000-11-30 | Victor Co Of Japan Ltd | コンテンツ情報記録方法及びコンテンツ情報記録装置 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06224897A (ja) * | 1993-01-26 | 1994-08-12 | Nippon Telegr & Teleph Corp <Ntt> | 閉域放送システム |
JP2000048479A (ja) * | 1998-07-27 | 2000-02-18 | Kobe Steel Ltd | ディジタル情報再生装置及びディジタル情報配信システム |
JP2002261746A (ja) * | 2000-12-28 | 2002-09-13 | Sony Corp | 配信方法及び配信システム |
JP2002261747A (ja) * | 2000-12-28 | 2002-09-13 | Sony Corp | 配信方法及び配信システム |
JP3886964B2 (ja) * | 2001-09-14 | 2007-02-28 | 株式会社Yozan | 認証端末装置、認証サーバ及び認証システム |
JP2004134044A (ja) * | 2002-10-15 | 2004-04-30 | Sony Corp | データ記録媒体、データ記録方法および情報端末装置、ならびに、情報サービス方法および情報サービス装置 |
-
2004
- 2004-07-13 JP JP2006527666A patent/JPWO2006006233A1/ja active Pending
- 2004-07-13 WO PCT/JP2004/009976 patent/WO2006006233A1/ja active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10283270A (ja) * | 1997-04-09 | 1998-10-23 | Fujitsu Ltd | 再生許可方法、記録方法及び記録媒体 |
JP2000330871A (ja) * | 1999-05-21 | 2000-11-30 | Victor Co Of Japan Ltd | コンテンツ情報記録方法及びコンテンツ情報記録装置 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8744080B2 (en) | 2006-03-17 | 2014-06-03 | Sony Corporation | Encrypted data recording apparatus |
JP2008028575A (ja) * | 2006-07-19 | 2008-02-07 | Hitachi Kokusai Electric Inc | 受信装置 |
JP2008311779A (ja) * | 2007-06-12 | 2008-12-25 | Hitachi Kokusai Electric Inc | データ受信装置 |
WO2021192731A1 (ja) * | 2020-03-23 | 2021-09-30 | ソニーグループ株式会社 | 通信装置及び通信方法 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2006006233A1 (ja) | 2008-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7324974B1 (en) | Digital data file encryption apparatus and method | |
US7747538B2 (en) | Memory card | |
US6868404B1 (en) | Digital data recording device, digital data memory device, and digital data utilizing device for converting management information which contains restrictive information using a different key in each management information send/receive session | |
CN1209892C (zh) | 保护内容数据的装置和方法 | |
US7203312B1 (en) | Data reproduction apparatus and data reproduction module | |
US20090210724A1 (en) | Content management method and content management apparatus | |
WO2006003778A1 (ja) | コンテンツ管理方法及びコンテンツ管理用プログラム、並びに電子機器 | |
JP2000341263A (ja) | 情報処理装置及び方法 | |
JP2010267240A (ja) | 記録装置 | |
JP2003195759A (ja) | 暗号化データの生成方法、記録装置、記録媒体、復号方法、記録媒体再生装置、伝送装置、および、受信装置 | |
JP2003158514A5 (ja) | ||
JP2000122539A (ja) | 著作物保護システム | |
JP2000115154A5 (ja) | データ処理装置および方法、並びにデータ復号処理装置および方法 | |
JP3556891B2 (ja) | デジタルデータ不正使用防止システム及び再生装置 | |
JP2002305512A (ja) | データ受信装置 | |
EP1618448A2 (en) | Method and system for managing digital rights | |
CN101171791B (zh) | 根据广播加密方案有效地对数字内容加密/解密的方法和设备 | |
JP2000348003A (ja) | ディジタル著作物であるコンテンツを扱う著作物保護システム | |
JP2003229846A (ja) | 著作権保護システム、デジタル情報処理装置および著作権保護方法 | |
JP4728754B2 (ja) | コンテンツ送信装置およびコンテンツ送信プログラム、並びに、コンテンツ受信装置およびコンテンツ受信プログラム | |
JP2003216500A (ja) | デジタル著作権管理システム | |
WO2006006233A1 (ja) | コンテンツ記録装置及びデータ配信システム | |
JP5110942B2 (ja) | 情報保護システム | |
JP2000243026A (ja) | 情報記録方法、利用方法および配送方法 | |
JPH10293725A (ja) | 外部記憶装置、暗号化ユニット装置、復号化ユニット装置、暗号化システム、復号化システム、暗号化方法及び復号化方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006527666 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |