WO2006025415A1 - データ処理方法、情報記録媒体製造管理システム、記録データ生成装置、および方法、並びにコンピュータ・プログラム - Google Patents

データ処理方法、情報記録媒体製造管理システム、記録データ生成装置、および方法、並びにコンピュータ・プログラム Download PDF

Info

Publication number
WO2006025415A1
WO2006025415A1 PCT/JP2005/015813 JP2005015813W WO2006025415A1 WO 2006025415 A1 WO2006025415 A1 WO 2006025415A1 JP 2005015813 W JP2005015813 W JP 2005015813W WO 2006025415 A1 WO2006025415 A1 WO 2006025415A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
information
content
recording medium
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2005/015813
Other languages
English (en)
French (fr)
Japanese (ja)
Inventor
Kenjiro Ueda
Tateo Oishi
Yoshitomo Osawa
Katsumi Muramatsu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Priority to US11/574,652 priority Critical patent/US7746738B2/en
Priority to CN2005800375124A priority patent/CN101053030B/zh
Priority to EP05781287.7A priority patent/EP1785995B1/en
Priority to MX2007002217A priority patent/MX2007002217A/es
Publication of WO2006025415A1 publication Critical patent/WO2006025415A1/ja
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/02Editing, e.g. varying the order of information signals recorded on, or reproduced from, record carriers
    • G11B27/031Electronic editing of digitised analogue information signals, e.g. audio or video signals
    • G11B27/034Electronic editing of digitised analogue information signals, e.g. audio or video signals on discs
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • G11B20/00362Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being obtained from a media key block [MKB]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00188Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00753Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/12Formatting, e.g. arrangement of data block or words on the record carriers
    • G11B20/1217Formatting, e.g. arrangement of data block or words on the record carriers on discs
    • G11B2020/1218Formatting, e.g. arrangement of data block or words on the record carriers on discs wherein the formatting concerns a specific area of the disc
    • G11B2020/1224Formatting, e.g. arrangement of data block or words on the record carriers on discs wherein the formatting concerns a specific area of the disc extent, i.e. a set of sectors which numbers form a continuous ascending sequence
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/12Formatting, e.g. arrangement of data block or words on the record carriers
    • G11B20/1217Formatting, e.g. arrangement of data block or words on the record carriers on discs
    • G11B2020/1218Formatting, e.g. arrangement of data block or words on the record carriers on discs wherein the formatting concerns a specific area of the disc
    • G11B2020/1229Formatting, e.g. arrangement of data block or words on the record carriers on discs wherein the formatting concerns a specific area of the disc lead-in area
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the recording data generation step includes
  • the data processing method further includes a step of generating an auxiliary file including position information of the dummy data area, and the recording data generation step includes The dummy data area is identified based on the position information of the auxiliary file, and valid information setting processing for the identification area is executed.
  • Master data as original data of recording data for the information recording medium is generated as master data including a dummy data area in a partial area and provided to the information recording medium manufacturing entity.
  • the fourth aspect of the present invention provides
  • the media key block (MKB) is set according to the indicated position of the auxiliary information file for disk image generation (MSTBL.DAT).
  • a set disk image can be generated.
  • the content editing entity consists of specific data: media key block (MKB), content hash table (CHT), content certificate (Content_Cert), encrypted unit key (Unit—Key.inf),
  • the information recording medium manufacturing entity that receives the data such as the MF Key Certificate of the information recording medium manufacturing entity receives or generates these data and generates the auxiliary information file (MSTB L It is possible to generate a disk image set at the indicated position of DAT), and to perform efficient recording data generation processing.
  • the content editing entity can set the recording position of various information including the media key block (MKB) to an arbitrary position, which can increase the flexibility of data recording.
  • FIG. 4 is a diagram for explaining a data recording configuration of an information recording medium, and a diagram for explaining a correspondence between an ECC block in a physical layer and a clip AV stream.
  • FIG. 24 is a diagram illustrating a content verification processing sequence to which a hash value based on plain text data is applied in an information processing apparatus that executes content playback.
  • a game program as service data an image file, audio data, text data, or the like may be stored as sub-contents.
  • a sub-content is data that does not follow a specific AV data format! / And data format. That is, it can be stored as Blu-ray disc ROM standard non-standard data in any format that does not follow the Blu-ray disc ROM standard format.
  • the playback device executing the content playback process stores the unit key Kul of the content management unit (CPS unit) 1, 301, and the unit of the content management unit (CPS unit) 2, 302
  • the playback application program that controls the content playback processing centrally is used between application units.
  • the unit key corresponding to the change of the content management unit (CPS unit) is changed, that is, Kul ⁇ Ku2.
  • the hash unit number at the head of clip (i) is assigned a number from 0 to NC for each clip file (for example, a maximum of 1000) on the disc. Then, describe the number of the entire (logically) first hash unit of the hash unit belonging to each clip file. This is as described above with reference to FIG.
  • Each value is stored.
  • the management center 310 generates a media key Km313, and further generates a media key block (MKB) 311 in which the media key Km313 is stored as encrypted data, and these media key block (MKB) 311 and media
  • the information recording medium manufacturing entity 350 is provided with the key Km313 and the public key certificate (MF Key Certificate) 312 storing the public key of the information recording medium manufacturing entity 350.
  • Last_Sector_of_Clip Flag indicating the last Sector of each clip (regardless of layer).
  • Last_Sector_of_Layer A flag indicating the last Sector of each clip in each layer.
  • the information recording medium manufacturing entity 550 obtains the media key block (MKB) storing the media key (Km) from the management center 510, obtains the media key, and obtains the media key block and the plaintext content 532 from the content editing entity 530. Then, the auxiliary file (MSTB.DAT) 531 describing the detailed information of the encryption process is acquired, and the unit key 551 is applied to execute the content encryption process (step S211) to generate the encrypted content 552. To do.
  • the content encryption process is executed as an AES-CBC mode encryption process (see FIG. 7) as a sector-by-sector process as described above with reference to FIG.
  • the generated encrypted content 552 is an encrypted content 601 stored in the information recording medium 600.
  • FIG. 19 is a processing example along the processing flow of FIG. 15.
  • the division of roles of each entity is not limited to the processing examples shown in FIG. 15 and FIG. Other processing examples will be described with reference to FIGS.
  • content hash calculation based on plaintext content is all executed by the content editing entity.
  • Tomo the content editing entity.
  • content hash calculation, content hash table generation, content certificate generation, and signature are not limited to the information recording medium manufacturing entity 550 but the content editing entity 530 or the information recording medium manufacturing entity 550. It can be configured to execute at any rate.
  • An information processing apparatus that executes content playback processing with information recording medium power has verified that the content is valid based on the content verification means that verifies the validity of the content and the verification of the content verification means.
  • Content reproduction means for executing content reproduction processing on condition that the content verification means selects n hash units set as subdivision data of the content recorded on the information recording medium (n Is an integer greater than or equal to 1), and collation processing is performed between the calculated hash value based on the selected hash unit and the hash value for verification stored in the information recording medium, and verification of all n selected hash values is established.
  • the content verification processing is executed using the above as a condition for checking the validity of the content.
  • the selected hash unit is
  • the cutting master with media key block (MKB) dummy data 962 is provided to the information recording media manufacturing entity, and the auxiliary information file (MS TBL. DAT)) Data encryption based on 961 and other recorded data generation processing are performed. Specifically, as shown in FIG. 31, the encryption key processing applying the unit key 965 to the plain text user data included in the cutting master shown in (A), and the media key block (MKB) 967 to the dummy data area. The setting process is executed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Storage Device Security (AREA)
  • Management Or Editing Of Information On Record Carriers (AREA)
PCT/JP2005/015813 2004-09-02 2005-08-30 データ処理方法、情報記録媒体製造管理システム、記録データ生成装置、および方法、並びにコンピュータ・プログラム Ceased WO2006025415A1 (ja)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US11/574,652 US7746738B2 (en) 2004-09-02 2005-08-30 Data processing method, information recording medium manufacturing management system, recording data generation apparatus and method, and computer program
CN2005800375124A CN101053030B (zh) 2004-09-02 2005-08-30 数据处理方法、信息记录介质制造管理系统、记录数据生成设备和方法、以及计算机程序
EP05781287.7A EP1785995B1 (en) 2004-09-02 2005-08-30 Data processing method, information recording medium manufacturing management system, recording data generation device and method, and computer program
MX2007002217A MX2007002217A (es) 2004-09-02 2005-08-30 Metodo de procesamiento de datos, sistema de manejo de la fabricacion de medios de registro de informacion, dispositivo y metodo para la generacion de datos de registro y programa de computo.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2004255154A JP4569228B2 (ja) 2004-09-02 2004-09-02 データ処理方法、情報記録媒体製造管理システム、記録データ生成装置、および方法、並びにコンピュータ・プログラム
JP2004-255154 2004-09-02

Publications (1)

Publication Number Publication Date
WO2006025415A1 true WO2006025415A1 (ja) 2006-03-09

Family

ID=36000065

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/015813 Ceased WO2006025415A1 (ja) 2004-09-02 2005-08-30 データ処理方法、情報記録媒体製造管理システム、記録データ生成装置、および方法、並びにコンピュータ・プログラム

Country Status (7)

Country Link
US (1) US7746738B2 (enExample)
EP (1) EP1785995B1 (enExample)
JP (1) JP4569228B2 (enExample)
CN (1) CN101053030B (enExample)
MX (1) MX2007002217A (enExample)
TW (1) TW200627393A (enExample)
WO (1) WO2006025415A1 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008021350A (ja) * 2006-07-11 2008-01-31 Toshiba Corp コンテンツ記録装置、方法およびプログラム
JP2012150879A (ja) * 2012-03-21 2012-08-09 Toshiba Corp コンテンツ再生装置、方法およびプログラム

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8824683B2 (en) 2005-05-02 2014-09-02 Panasonic Corporation Recording medium, authoring device, and authoring method
JP4901164B2 (ja) * 2005-09-14 2012-03-21 ソニー株式会社 情報処理装置、情報記録媒体、および方法、並びにコンピュータ・プログラム
JP4640083B2 (ja) * 2005-09-29 2011-03-02 セイコーエプソン株式会社 デバイス管理システム
US20070223889A1 (en) * 2006-03-16 2007-09-27 Dandekar Shree A Embedded high definition media management module for information handling systems
JP4979312B2 (ja) 2006-09-09 2012-07-18 ソニー株式会社 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム
JP4770650B2 (ja) * 2006-09-09 2011-09-14 ソニー株式会社 情報処理装置および情報処理方法並びにコンピュータ・プログラム
WO2008090928A1 (ja) 2007-01-24 2008-07-31 Humming Heads Inc. 記憶媒体上のデータ変換方法、装置およびプログラム
CA2683863C (en) 2007-04-14 2019-01-15 Abbott Diabetes Care Inc. Method and apparatus for providing data processing and control in medical communication system
JP4802141B2 (ja) * 2007-05-31 2011-10-26 株式会社東芝 光ディスク装置及び光ディスクの再生方法
JP2009129520A (ja) * 2007-11-26 2009-06-11 Taiyo Yuden Co Ltd 光情報記録媒体及び光情報記録媒体への情報記録方法並びに光情報記録装置
JP4600544B2 (ja) 2008-08-22 2010-12-15 ソニー株式会社 情報処理装置、ディスク、および情報処理方法、並びにプログラム
JP4521462B2 (ja) * 2008-12-26 2010-08-11 株式会社東芝 情報ライフサイクル管理システム、情報管理サーバ装置、情報媒体制御装置及びプログラム
JP2010191665A (ja) * 2009-02-18 2010-09-02 Sony Corp 情報処理装置、情報処理方法、およびプログラム、並びに記録媒体
US20100228704A1 (en) * 2009-02-20 2010-09-09 All Media Guide, Llc Recognizing a disc
US20100228736A1 (en) * 2009-02-20 2010-09-09 All Media Guide, Llc Recognizing a disc
US8620967B2 (en) * 2009-06-11 2013-12-31 Rovi Technologies Corporation Managing metadata for occurrences of a recording
JP5532726B2 (ja) * 2009-07-31 2014-06-25 ソニー株式会社 記録媒体製作方法、記録媒体及び記録媒体の再生装置
JP5192479B2 (ja) * 2009-12-10 2013-05-08 エイチジーエスティーネザーランドビーブイ ディスク・ドライブ及びディスク・ドライブにおけるデータ変換処理方法
JP5549221B2 (ja) * 2009-12-28 2014-07-16 ソニー株式会社 再生装置、再生制御方法、およびプログラム
CN102289413B (zh) * 2011-09-05 2014-06-18 汤红梅 一种数据隐藏方法
CN106598882B (zh) * 2016-12-09 2019-09-20 武汉斗鱼网络科技有限公司 一种安全的内存数据保护方法及装置
CN118489112A (zh) * 2021-12-13 2024-08-13 微芯片技术股份有限公司 片外计算机可读指令的验证以及相关系统、方法和装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002074835A (ja) * 2000-09-05 2002-03-15 Matsushita Electric Ind Co Ltd ディジタルタイトルデータ記録方法
JP2002215465A (ja) * 2001-01-16 2002-08-02 Sony Corp 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム記憶媒体

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4219680B2 (ja) * 2000-12-07 2009-02-04 サンディスク コーポレイション 不揮発性メモリカード、コンパクトディスクまたはその他のメディアから記録済みのオーディオ、ビデオまたはその他のコンテンツを再生するためのシステム、方法およびデバイス
JP2002258011A (ja) 2001-02-28 2002-09-11 Asahi Glass Co Ltd 光拡散シートおよびその製造方法
US6898172B2 (en) * 2001-06-11 2005-05-24 Eastman Kodak Company System to reduce writing overhead to a hybrid optical disc
GB0129065D0 (en) * 2001-12-05 2002-01-23 Philips Electronics Uk Ltd Method and apparatus for verifying the integrity of system data
JP2004165855A (ja) * 2002-11-11 2004-06-10 Sony Corp オーサリング装置および方法、オーサリングプログラム、ならびに、オーサリングプログラムが記録された記録媒体

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002074835A (ja) * 2000-09-05 2002-03-15 Matsushita Electric Ind Co Ltd ディジタルタイトルデータ記録方法
JP2002215465A (ja) * 2001-01-16 2002-08-02 Sony Corp 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム記憶媒体

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008021350A (ja) * 2006-07-11 2008-01-31 Toshiba Corp コンテンツ記録装置、方法およびプログラム
JP2012150879A (ja) * 2012-03-21 2012-08-09 Toshiba Corp コンテンツ再生装置、方法およびプログラム

Also Published As

Publication number Publication date
TW200627393A (en) 2006-08-01
JP4569228B2 (ja) 2010-10-27
JP2006072688A (ja) 2006-03-16
EP1785995A1 (en) 2007-05-16
EP1785995B1 (en) 2019-01-23
US7746738B2 (en) 2010-06-29
MX2007002217A (es) 2007-05-08
US20070247985A1 (en) 2007-10-25
TWI317934B (enExample) 2009-12-01
EP1785995A4 (en) 2013-01-09
CN101053030B (zh) 2011-11-16
CN101053030A (zh) 2007-10-10

Similar Documents

Publication Publication Date Title
JP4576936B2 (ja) 情報処理装置、情報記録媒体、コンテンツ管理システム、およびデータ処理方法、並びにコンピュータ・プログラム
JP4569228B2 (ja) データ処理方法、情報記録媒体製造管理システム、記録データ生成装置、および方法、並びにコンピュータ・プログラム
JP4734906B2 (ja) 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム
JP4626221B2 (ja) 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム
JP4784131B2 (ja) 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム
JP4901164B2 (ja) 情報処理装置、情報記録媒体、および方法、並びにコンピュータ・プログラム
US8863296B2 (en) Information processing apparatus, information recording medium, information processing method, and computer program
JP4715233B2 (ja) 情報処理装置、および情報記録媒体製造方法、並びにコンピュータ・プログラム
JP4701748B2 (ja) 情報処理装置、情報記録媒体製造装置、情報記録媒体、および方法、並びにコンピュータ・プログラム
JP5170229B2 (ja) 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム
CN100437419C (zh) 信息处理设备和方法、信息记录媒体以及计算机程序

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: MX/a/2007/002217

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 2005781287

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 200580037512.4

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2005781287

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 11574652

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 11574652

Country of ref document: US