WO2006030500A1 - 情報処理装置,セットアップ方法,セットアッププログラムおよび同プログラムを記録したコンピュータ読取可能な記録媒体 - Google Patents
情報処理装置,セットアップ方法,セットアッププログラムおよび同プログラムを記録したコンピュータ読取可能な記録媒体 Download PDFInfo
- Publication number
- WO2006030500A1 WO2006030500A1 PCT/JP2004/013442 JP2004013442W WO2006030500A1 WO 2006030500 A1 WO2006030500 A1 WO 2006030500A1 JP 2004013442 W JP2004013442 W JP 2004013442W WO 2006030500 A1 WO2006030500 A1 WO 2006030500A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- setting information
- computer
- information
- setting
- random number
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00362—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being obtained from a media key block [MKB]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/0042—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the copy protection scheme being related to a specific access protection standard
- G11B20/00442—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the copy protection scheme being related to a specific access protection standard content protection for recordable media [CPRM]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00514—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein the entire content is encrypted with the same key, e.g. disc key or master key
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00855—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/12—Formatting, e.g. arrangement of data block or words on the record carriers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Definitions
- the present invention relates to a method for supplying setting information such as a device key in CPRM (Content Protection for Recordable Media).
- CPRM Content Protection for Recordable Media
- MKB Media Key Block
- BCA Burt Cutting Area
- the MKB is issued by a license organization (for example, 4C Entity, LLC), and the quantity of media that can be produced by one MKB is predetermined.
- the MKB is updated every certain number of manufactured sheets, and every time the number of manufactured media exceeds a certain number (for example, 5000 sheets), a new MKB is issued by the licensing agency. Yes.
- a device key (equipment key) generated by a license institution corresponding to MKB is registered on the device side that reproduces the content stored in the medium or records on the medium.
- CPRM uses these device keys, MKB, media ID, etc. to decrypt and encrypt the content, and to play and record it.
- the license authority issues a new MKB and makes it impossible to use the device key corresponding to the broken encryption key. Unauthorized use of the media).
- the number of MKBs and the device key that can be generated corresponding to the MKB is determined in advance by the license authority (for example, 5000).
- the license authority for example, 5000.
- a PC manufacturer prepares a master hard disk having the same data configuration as that of a PC hard disk to be shipped in the manufacture of a pre-installed model, and sequentially copies the master hard disk so that the hard disk can be prepared in the PC.
- the present invention was devised in view of such problems, and improves convenience by eliminating the need for the user to input setting information, and also manages setting information in the manufacturer.
- the object is to enable cost reduction.
- Non-patent document 1 "[This week's special feature: Whether it's compatible with two layers or cheap multi-player !? Recordable DVD drive special feature", [online], June 19, 2004, ascii24.com, [Search September 9, 2004], Internet URL:
- an information processing apparatus of the present invention is an information processing apparatus having a setup function for performing initial setting processing using setting information, and is the first time of the information processing apparatus.
- a detection unit for detecting that the device is being activated, and a selection for selecting at least one of the setting information from a plurality of types of the setting information when the detection unit detects that the device is being activated for the first time And a processing unit for performing an initial setting process that works on the information processing apparatus using the setting information selected by the selection unit.
- a random number generation unit for generating a random number is provided, and the selection unit selects at least one piece of the setting information from among the plurality of types of setting information using the random number generated by the random number generation unit.
- a storage unit for storing the plural types of setting information may be provided. Yes.
- the setting information is key information related to copyright protection of data
- the processing unit sets the data to be reproducible or recordable in the information processing apparatus using the key information as the initial setting process. May be.
- the information processing apparatus of the present invention is an information processing apparatus that performs setting processing using setting information, and uses a random number generation unit that generates a random number and the random number generated by the random number generation unit.
- a selection unit that selects at least one of the setting information from a plurality of types of setting information, and a processing unit that performs the setting process using the setting information selected by the selection unit.
- the number of the plurality of types of setting information may have a predetermined relationship with the predicted production number of the same type of information processing apparatus.
- the setup method of the present invention is a setup method for performing initial setting processing of an information processing device using setting information, the detection step for detecting that the information processing device is being started for the first time, and the detection step In this case, a selection step of selecting at least one of the setting information from a plurality of types of the setting information when the first activation is detected, and the setting selected by the selection unit And a processing step for performing the initial setting process using information.
- a random number generation step for generating a random number is provided, and in the selection step,! /, Among the plurality of types of setting information using the random number generated in the random number generation step. Force At least one of the setting information may be selected.
- the setting information is key information related to data copyright protection
- the initial setting process is set so that the data can be reproduced or recorded in the information processing apparatus using the key information. May be.
- the number of the plurality of types of setting information may have a predetermined relationship with the predicted production number of the same type of information processing apparatus.
- the setup program of the present invention is a setup program for performing initial setting processing of a computer using setting information, and a selection unit for selecting at least one setting information among a plurality of types of setting information. And the setting information selected by the selection unit
- the computer is caused to function as a processing unit for performing the initial setting process using information.
- the computer when the computer is caused to function as a random number generation unit that generates a random number, and the computer is used as the selection unit, the plurality of types are used by using the random numbers generated by the random number generation unit. Let the computer function to select at least one configuration information from among the configuration information.
- the setting information is key information related to copyright protection of data, and when the computer is caused to function as the processing unit, as the initial setting process, the key information is used for the information processing apparatus.
- the data can be set to be reproducible or recordable.
- the number of the plurality of types of setting information may have a predetermined relationship with the estimated production number of devices of the same type as the computer.
- the computer-readable recording medium storing the setup program of the present invention is a computer-readable recording medium that stores a setup program that is executed when the computer is started for the first time and performs initial setting processing of the computer using the setting information.
- the computer is made to function as a processing unit for performing the above.
- the set-up program power causes the computer to function as a random number generation unit that generates random numbers
- the selection unit uses the random numbers generated by the random number generation unit as V and sets the plurality of types of settings.
- the computer may function to select at least one of the setting information from the information, or the plurality of types of setting information may be stored.
- the setting information is key information related to copyright protection of data, and when the computer functions as the processing unit, the data is reproduced or reproduced on the computer using the key information as the initial setting processing.
- the number of pieces of setting information of the plurality of types that may be set to be recordable may have a predetermined relationship with the predicted production number of the same type of device as the computer.
- the information processing apparatus of the present invention includes a storage unit that stores a plurality of types of setting information, A selection unit that selects at least one setting information from a plurality of types of setting information, and a processing unit that performs setting processing for the information processing apparatus using the setting information selected by the selection unit; It is characterized by having
- a random number generation unit that generates a random number is provided, and the selection unit selects at least one setting information from the plurality of types of setting information using the random number generated by the random number generation unit. Good.
- the setting information is key information related to data copyright protection, and the processing unit can reproduce or record the data in the information processing apparatus using the key information as the setting processing.
- the number of the plurality of types of setting information may have a predetermined relationship with the predicted production number of the same type of device as the information processing device.
- the program of the present invention is a program for performing a computer setting process, and includes a selection unit that selects at least one of the setting information from a plurality of types of setting information stored in the storage unit, and the selection unit
- the computer is caused to function as a processing unit for performing the setting process for the computer using the setting information selected by the above.
- the computer when the computer is caused to function as a random number generation unit that generates random numbers and the computer is used as the selection unit, the plurality of types are used by using the random numbers generated by the random number generation unit. Let the computer function to select at least one configuration information from among the configuration information.
- the setting information is key information related to copyright protection of data, and when the computer functions as the processing unit, the data is reproduced or recorded in the computer using the key information as the setting processing.
- the number of pieces of the setting information of the plurality of types may have a predetermined relationship with the estimated production number of the same type of device as the computer.
- a computer-readable recording medium of the present invention records the above-described program.
- the present invention has the following effects and advantages.
- the plurality of setting information can be used equally among all the information processing apparatuses. This can reduce the management cost of setting information.
- FIG. 1 is a block diagram showing a functional configuration of a PC (Personal Computer) as an embodiment of the present invention.
- PC Personal Computer
- the PC 1 as an embodiment of the present invention is an information processing apparatus that can support CPRM (Content Protection for Recordable Media), and has various applications including OS (Operating System) and CPRM compatible applications at the time of shipment from the factory. It is configured as a pre-installed model that is pre-installed.
- CPRM Content Protection for Recordable Media
- OS Operating System
- CPRM compatible applications at the time of shipment from the factory. It is configured as a pre-installed model that is pre-installed.
- PC1 registers the device key (setting information) obtained from the license authority (eg 4C Entity, LLC) in the CPRM compatible application (playback Z recording software) and sets it to the MKB ( It is possible to perform playback / recording processing on a CP RM compatible medium (DVD-RAM, DVD-RW, SD card, etc.) on which a Media Key Block) is recorded.
- the device key functions as key information related to copyright protection of data (content) stored on the medium.
- the PC1 manufacturer predicts the number of PC1 shipments in advance, and the number of shipments (for example, 500,000 units) can be manufactured per one MKB specified in CPRM (for example, Obtain the license engine power in advance for the number of device keys (for example, 1000) obtained by dividing by 5000.
- the PC 1 has functions as a detection unit 2, a selection unit 3, a random number generation unit 5, a processing unit 4, and a storage unit 6.
- the detection unit 2 detects that the PC 1 is being started for the first time.
- the initial startup includes not only the first startup of PC1, but also the first startup after re-installing the OS, etc. Nagaru Includes the first startup of CPRM compatible application. Furthermore, CPRM-compatible application capability It may be the first time that SCPRM-compatible content is handled.
- the storage unit 6 stores a plurality of types of device keys 50.
- the storage unit 6 stores all (1000 in the above example) device keys 50 acquired from the license authority. ing.
- the device key 50 is stored as an encrypted module (file group).
- the random number generation unit 5 generates random numbers, and the selection unit 3 selects a plurality of types of device keys that are stored in the storage unit 6 when the detection unit 2 detects the initial activation time.
- the medium power also selects at least one device key 50.
- the selection unit 3 uses the random number generated by the random number generation unit 5 to select the device key 50 to be applied, and uses the random number generated by the random number generation unit 5 to select the medium random random number stored in the storage unit 6.
- the device key 50 is selected.
- the random number generation unit 5 controls the upper limit value of the generated random numbers so as not to exceed the above-mentioned predicted shipment number. Since this random number control is a known technique, a detailed description thereof is omitted.
- the selection unit 3 uses a random number to select the medium power of the plurality of types of device keys 50 stored in the storage unit 6. All device keys 50 acquired by the license authority are selected and used randomly and evenly. Since random numbers are averaged definitions, it is not possible to use only one device key 50. Therefore, by predicting the number of PC1 shipped and acquiring an appropriate number of device keys 50, there is no breach of the production number limit with the license organization that provides the device keys 50. In addition, the shipment number of PC1 is The greater the number of devices, the more even the selection of device keys 50 is.
- the license authority also obtains the device key 50, by setting the predicted shipment number of the PC 1 to a large number and calculating the number of device keys 50 to be obtained, If there is a bias in the selection, the number of device keys 50 actually installed on PC1 will not exceed the number of products that can be manufactured per MKB specified in CPRM. Can be.
- the processing unit 4 performs an initial setting process for the PC 1 using the device key 50 selected by the selection unit 3.
- the device key 50 is used as the initial setting process. Use it to set PC1 to play or record CPRM-compatible media.
- FIG. 2 is a diagram showing a hardware configuration example of a PC as an embodiment of the present invention.
- Figure 2 [As shown here] Communication Unit 11, CPU12, Mini PCI13, RTC14, Node Controller 15, Display 16, Display Controller 17, Chipset 18, Input Controller 19, HDD ( Hard Disk Drive) 20, BIOS memory 21, audio unit 2 2, keyboard 23 and mouse 24!
- the communication unit 11 is for enabling communication between the PC 1 and the outside, and is configured by, for example, a LAN (Local Area Network) card or a modem.
- LAN Local Area Network
- the HDD 20 stores the OS and various applications.
- the HDD 20 further stores all device keys 50 acquired from the license authority and functions as the storage unit 6 described above. It becomes like this.
- the mini PCI (miniPCl) 13 is a small expansion card using a PCI bus (Peripheral Components Interconnect bus).
- PCI bus Peripheral Components Interconnect bus
- various functions such as a network card and a graphics card can be used.
- An expansion card equipped with can be installed.
- the RTC (Real Time Clock) 14 is a chip dedicated to timekeeping, and provides the date and time to the OS when the PC 1 is started, for example. Note that the RTC14 operates by receiving power from the built-in battery while the PC1 is turned off.
- the chipset 18 is a series of circuit groups that manage the exchange of various data in the PCI, and performs various processes such as data communication control of the CPU 12, memory, and PCI slot.
- the chip set 18 includes a plurality of LSIs (Large Scale Integration) such as a memory controller and a bus controller.
- the No.1 controller 15 performs control for supplying appropriate power to the chipset 18 and the like.
- the BIOS memory 21 is a memory that stores a BIOS (Basic Input / Output System), and is configured by, for example, a ROM (Read Only Memory).
- the audio unit 22 provides an acoustic function, and is composed of, for example, a sound card.
- the keyboard 23 and mouse 24 are input by an operator (user) of the PC 1, and the input controller 19 controls input signals from the keyboard 23 and mouse 24.
- the display 16 displays various information and provides it to the operator, and the display controller 17 performs display control of the display 16.
- the CPU 12 implements various functions by executing and processing various programs stored in the HDD 20 and memory (not shown).
- the CPU 12 of the PC 1 executes the setup program so as to function as the detection unit 2, the selection unit 3, the random number generation unit 5, and the processing unit 4.
- the setup program is used to perform initial setting processing of the PC 1. For example, when the user who purchased the PC 1 first starts up (turns on the power) the PC 1 in a factory-shipped state ( PC 1 can be used by the user by performing processing such as opening the OS and various applications, deleting unnecessary data generated by the initial setting process, etc. It is set to the correct state.
- this setup program is shipped from the factory when the user reinstalls PC 1 using the recovery media (reinstallation media; flexible disk, CD, etc.) attached to PC 1. Even after reformatting, after reformatting It is also executed when it is first started (turned on).
- recovery media reinstallation media; flexible disk, CD, etc.
- a program (setup program) for realizing the functions of the detection unit 2, selection unit 3, random number generation unit 5 and processing unit 4 is, for example, a flexible disk, CD (CD-ROM, CD-R, CD—RW, etc.), DVD (DVD-ROM, DVD-RAM, DVD R, DVD-RW, DVD + RW, etc.), magnetic disk, optical disk, magneto-optical disk, etc. Provided in form.
- the PC (computer) 1 reads the program of the recording medium power, transfers it to an internal storage device or an external storage device, and uses it.
- the program may be recorded in a storage device (recording medium) such as a magnetic disk, an optical disk, or a magneto-optical disk, and provided to the computer via a communication path from the storage device. .
- the detection unit 2, selection unit 3, random number generation unit 5, processing unit 4 and storage unit described above are used. Function as 6 and processing shall be performed.
- FIG. 3 is a diagram schematically showing the function of the setup program in the PC 1 as one embodiment of the present invention.
- each device key 50 is stored as an encrypted module 51 in the HDD 20.
- the encrypted module 51 may be referred to as an encryption module.
- the manufacturer of the PC 1 prepares a master hard disk (not shown) having the same data structure (disk image) as the HDD 20, and manufactures the HDD 20 by copying the master hard disk power. That is, the master hard disk is included in the computer-readable recording medium on which the setup program of the present invention is recorded. Note that the master hard disk or HDD 20 stores the encryption module 51. The functions using these modules cannot be used just by opening the master hard disk or HDD20.
- a unique identification number is set in advance in the encryption module 51 stored in the HDD 20 and the master hard disk, and the random number generated by the random number generation unit 5 is stored in the encryption module 51.
- the generated random number corresponds to (or matches) one of the identification numbers of the encryption module 51.
- the setup program selects one encryption module 51 at random using a random number from among the plurality of encryption modules 51 stored in the HDD 20 in cooperation with the OS (basic OS). Become! /
- the setup program can decompress (decrypt) the encryption module 51, decompress the selected encryption module 51, and is already installed on the PC 1. By installing this decompressed module for the CPRM compatible application, the device key 50 is set for the CPRM compatible application.
- the content for example, music data, image data, video data
- the CPRM compatible medium is processed (reproduced), or the CPRM compatible medium is used. It will be possible to record content.
- the computer is a concept including hardware and an operating system (OS), and means hardware operating under the control of the operating system.
- OS operating system
- the hardware itself corresponds to the computer.
- the hardware includes at least a microprocessor such as a CPU and means for reading a computer program recorded on a recording medium.
- the PC 1 has a function as a computer. It is.
- the above-mentioned flexible disk CD (CD-ROM, CD-R, CD-RW, etc.), DVD (DVD-ROM, DVD-RAM, DVD) R, DVD-RW, DVD + RW, etc.), magnetic disks, optical disks, magneto-optical disks, IC cards, ROM cartridges, magnetic tapes, punch cards, computer internal storage devices (memory such as RAM and ROM), external Various computer-readable media such as a storage device or a printed matter on which a code such as a barcode is printed can be used.
- the setup program prompts the user to start the setting application, and the started setting application calls the CPRM setting routine! /.
- the PC 1 starts normally (step A20), and the setup program displays a message for prompting a unique setting on the display 16 (step A30).
- the user manually starts the setting application according to these messages (step A40), individual processing for initial setting of the started setting application force is performed (step A50).
- the setting application calls the CPRM setting routine (step A60).
- step A70 it is checked whether or not there is a regular CPRM-compatible application that is activated! /, Which is PC1-based (step A70).
- step A80 if there is a regular CPRM compatible application (genuine product) (see YES route in step A80), the setting application is stored in HDD20.
- Cryptographic module 51 device The number of keys 50
- step A90 all of the encryption modules 51 stored in the HDD 20 may be additionally installed to the purged application installed on the PC 1.
- step A110 As a result of determining whether or not additional installation is possible (step A110), if installation is possible (see YES route in step A110), the setting application next determines the model of PC 1.
- the encryption module (file group) 51 that matches the model is selected (step A120).
- the CPRM setting routine L number generation unit 5 generates a random number within the range of the additionally installable cryptographic module 51 selected in step A120 (step A130; random number generation step), Only the cryptographic key module 51 corresponding to the generated random number is selected (selection step) and decompressed (decrypted) (step A140).
- the setup program installs the decompressed module on PC 1 (step A150; processing step), and if the installation is completed successfully and the CPRM is supported, the CP RM compatible application (playback Z recording software) Notify (step A160).
- the CPRM setting routine deletes the encryption module 51 other than the decompressed module, that is, the encryption module 51 that was not selected from PC 1 (step A170), and whether or not the deletion was successfully completed. (Step A180).
- step A180 If the deletion is completed normally (see YES route in step A180), a message indicating that CPRM is supported is displayed on the display 16 (step A200), and the CPRM setting routine is terminated (step A210). ), The process returns to the setting application (step A220), and the processing of the entire setting application is terminated (step A230).
- step A 180 deletes all the CPRM compatible applications (basic applications) (step A 190) and proceed to step A220. .
- step A80 if there is no genuine product as a result of checking whether there is a regular CPRM compatible application (see NO route in step A80), additional installation is possible. Even if the result of the determination as to whether or not there is a force is not installable (see the NO route of step Al10), the process proceeds to step A220.
- This PC1 has a program (update application) that notifies the type of device key 50 (module) that is actually installed on PC1! /, For example, this PC1.
- this update application is executed by the CPU12 and is actually installed on the PC1! /, Device key 50 ( The module type is notified to the manufacturer's (or vendor's) server.
- FIG. 5 is a flowchart (steps B10-B70) showing a method for collecting information on device keys 50 (modules) used by the PC 1 as one embodiment of the present invention. )
- PC1 When the user uses PC 1 to connect to the manufacturer's (or vendor's) website of this PC 1 (Step B10), PC1 will use the update application capability to determine what module (device key 50) The server of the website is notified whether or not is installed (step B20).
- step B30 In the server of the manufacturer (or distributor), confirm that the correct module is installed by the user (step B30), and the module installed on the PC 1 is the latest! (Step B40).
- the update application is automatically terminated (step B60). If the module is not up-to-date (see NO route in step B50), the update application displays information on the display 16 that the module (device key 50) should be updated, for example (step B70). .
- the user updates the module according to the information displayed on the display 16.
- the PCI as one embodiment of the present invention, the user who purchased the PC 1 does not need to perform the input operation of the device key 50 at the first activation time, and the customer satisfaction is high. Can be improved.
- the manufacturing cost of the PC 1 can be reduced because it is not necessary to attach a paper or the like on which the device key is printed when the PC 1 is shipped.
- the number of PC1 manufactured exceeds the number of media that can be manufactured per MKB (for example, 5000) specified in CPRM, one (common) master hard disk
- MKB for example, 5000
- CPRM common master hard disk
- the plurality of device keys 50 are set among all the shipped PCs 1. Can be used evenly, which eliminates the need for managing the number of shipments of the device key 50 at the manufacturer (seller) of the PC 1 and reducing its management cost.
- the number of device keys 50 that are available on the market can be kept constant by deleting and deleting the device key 50 (module) installed on the PC1. There is no penalty for the production limit with the licensing organization that provides the key 50.
- the power that the HDD 20 provided in the PC 1 functions as the storage unit 6 that stores a plurality of device keys 50 is not limited to this.
- Various recording media for example, flexible disc, CD (CD-ROM, CD-R, CD-RW, etc.), DVD (DVD-ROM, DVD-RAM, DVD-R, DVD- RW, DVD + RW, etc.), magnetic disk, optical disk, magneto-optical disk, IC card, ROM cartridge, magnetic tape, RAM, ROM, etc.) by storing at least some of the device keys 50
- These recording media may have a function as the storage unit 6.
- the setup program prompts the user to start the setting application, and the started setting application calls the CPRM setting routine.
- Functions such as detection unit 2, selection unit 3, random number generation unit 5, processing unit 4 and storage unit 6 Power to realize processing and setup program power that is not limited to this directly CPRM You can run the routine! /
- one encryption module 51 is selected from among a plurality of encryption module (device key) 50 stored in the HDD 20 using a random number V.
- the present invention is not limited to this.
- a serial number may be set for all PCs 1 to be manufactured, the setup program may obtain this serial number, and one encryption module 51 may be selected according to a predetermined rule based on this serial number. That is, a correspondence table between the serial number and the encryption module 1 may be prepared in advance, and the encryption module 51 may be selected according to this correspondence table.
- encryption is performed using a mathematical formula that evenly selects one encryption module 51 from among a plurality of encryption module 51 (device key 50) stored in HDD 20. You can select module 51! /.
- the setup program calls and executes the CPRM compatible setting routine.
- the CPRM setting routine is installed in the CP RM compatible application and the CPRM compatible application is started for the first time or the CPRM. Configure this CPRM setup routine to run when handling supported content for the first time.
- the PC 1 is a preinstalled model in which the OS and various applications are preinstalled at the time of shipment from the factory.
- the present invention is not limited to this.
- Portable recording media such as CDs and DVDs that prestore OS and various applications are attached to PCs and sold to users, and also applied to PCs where users use these media to install on PCs it can.
- the master disk when it is installed on the PC, it will have the same format as the master disk.
- the contents of the master disk are stored in a portable recording medium and set up on the PC by the setup program.
- the encryption module 51 that was not selected in the flowchart shown in FIG. 4 (steps A170 and A180) is deleted from the PC 1, and the deletion is normally completed. If the power is strong, the power to delete all the CPRM compatible applications (basic applications) is not limited to this. Instead of deleting the CPRM compatible applications, the CPRM compatible applications may be disabled.
- the power for selecting one device key 50 from a plurality of types of device keys 50 and using this device key 50 for initial setting of PC 1 is not limited to this.
- two or more device keys 50 may be selected and used.
- the ability to explain the initial setting process in the CPRM-compatible PC 1 is not limited to this.
- Copyright protection technology such as CPPM (Content Protection for Prerecorded Media), and a plurality of types Data strength It can also be applied to various processes executed by selectively using at least one data.
- FIG. 1 is a block diagram showing a functional configuration of a PC as an embodiment of the present invention.
- FIG. 2 is a diagram showing a hardware configuration example of a PC as an embodiment of the present invention.
- FIG. 3 is a diagram schematically showing the function of a setup program in a PC as an embodiment of the present invention.
- FIG. 4 is a diagram for explaining an example of setup processing in a PC as an embodiment of the present invention. It is a flowchart of.
- FIG. 5 is a flowchart for explaining a technique for collecting device key (module) information used in a PC as an embodiment of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020097024944A KR100947019B1 (ko) | 2004-09-15 | 2004-09-15 | 정보 처리 장치 |
EP04773105A EP1811372A4 (en) | 2004-09-15 | 2004-09-15 | INFORMATION PROCESSING DEVICE, CONFIGURATION METHOD, CONFIGURATION PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM HAVING THE SAME PROGRAM RECORDED THEREIN |
PCT/JP2004/013442 WO2006030500A1 (ja) | 2004-09-15 | 2004-09-15 | 情報処理装置,セットアップ方法,セットアッププログラムおよび同プログラムを記録したコンピュータ読取可能な記録媒体 |
EP15178584.7A EP2958012A1 (en) | 2004-09-15 | 2004-09-15 | Information processing apparatus, setup method, setup program, and computer-readable recording medium on which the setup program is recorded |
JP2006534984A JP4755990B2 (ja) | 2004-09-15 | 2004-09-15 | 情報処理装置およびプログラム |
US11/712,450 US8023650B2 (en) | 2004-09-15 | 2007-03-01 | Information processing apparatus, setup method and non-transitory computer-readable recording medium on which setup program is recorded |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/013442 WO2006030500A1 (ja) | 2004-09-15 | 2004-09-15 | 情報処理装置,セットアップ方法,セットアッププログラムおよび同プログラムを記録したコンピュータ読取可能な記録媒体 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/712,450 Continuation US8023650B2 (en) | 2004-09-15 | 2007-03-01 | Information processing apparatus, setup method and non-transitory computer-readable recording medium on which setup program is recorded |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006030500A1 true WO2006030500A1 (ja) | 2006-03-23 |
Family
ID=36059767
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/013442 WO2006030500A1 (ja) | 2004-09-15 | 2004-09-15 | 情報処理装置,セットアップ方法,セットアッププログラムおよび同プログラムを記録したコンピュータ読取可能な記録媒体 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8023650B2 (ja) |
EP (2) | EP2958012A1 (ja) |
JP (1) | JP4755990B2 (ja) |
KR (1) | KR100947019B1 (ja) |
WO (1) | WO2006030500A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1983440A1 (en) * | 2007-04-19 | 2008-10-22 | Oki Data Corporation | Image forming apparatus storing encrypted data on hard disk |
JP2010286590A (ja) * | 2009-06-10 | 2010-12-24 | Yamaha Corp | 電子音楽装置 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5289476B2 (ja) * | 2011-02-04 | 2013-09-11 | 株式会社東芝 | 通信装置および鍵算出装置 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003078425A (ja) * | 2001-08-30 | 2003-03-14 | Denso Corp | 車載機器用機能設定装置 |
JP2004220317A (ja) * | 2003-01-15 | 2004-08-05 | Sony Corp | 相互認証方法、プログラム、記録媒体、信号処理システム、再生装置および情報処理装置 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5830064A (en) * | 1996-06-21 | 1998-11-03 | Pear, Inc. | Apparatus and method for distinguishing events which collectively exceed chance expectations and thereby controlling an output |
JP3212078B2 (ja) | 1996-09-12 | 2001-09-25 | エヌエスエンジニアリング株式会社 | アプリケーションソフト使用端末固有化方法 |
US6144743A (en) * | 1997-02-07 | 2000-11-07 | Kabushiki Kaisha Toshiba | Information recording medium, recording apparatus, information transmission system, and decryption apparatus |
JPH11212771A (ja) | 1998-01-28 | 1999-08-06 | Nec Software Kobe Ltd | 再セットアップ用媒体共通化方式 |
FR2815208B1 (fr) | 2000-10-06 | 2003-01-03 | France Telecom | Regie dans une installation terminale privative en mode atm |
JP2003005859A (ja) | 2001-04-16 | 2003-01-08 | Yuichi Sumiya | プログラムやデータの管理方法とコンピュータ |
US7100036B2 (en) | 2001-10-30 | 2006-08-29 | Hewlett-Packard Development Company, L.P. | System and method for securing a computer |
JP2004030601A (ja) | 2002-04-26 | 2004-01-29 | Ricoh Co Ltd | リソース情報によりアプリケーション起動判断を行う装置及び方法 |
JP2003345518A (ja) * | 2002-05-29 | 2003-12-05 | Hitachi Ltd | ディスクアレイ装置の設定方法、プログラム、情報処理装置、ディスクアレイ装置 |
JP2004051152A (ja) | 2002-07-19 | 2004-02-19 | Matsushita Electric Works Ltd | 梱包構造 |
JP2004078392A (ja) | 2002-08-13 | 2004-03-11 | Seiko Epson Corp | ネットワーク装置の自動設定 |
-
2004
- 2004-09-15 EP EP15178584.7A patent/EP2958012A1/en not_active Withdrawn
- 2004-09-15 JP JP2006534984A patent/JP4755990B2/ja not_active Expired - Fee Related
- 2004-09-15 KR KR1020097024944A patent/KR100947019B1/ko active IP Right Grant
- 2004-09-15 EP EP04773105A patent/EP1811372A4/en not_active Withdrawn
- 2004-09-15 WO PCT/JP2004/013442 patent/WO2006030500A1/ja active Application Filing
-
2007
- 2007-03-01 US US11/712,450 patent/US8023650B2/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003078425A (ja) * | 2001-08-30 | 2003-03-14 | Denso Corp | 車載機器用機能設定装置 |
JP2004220317A (ja) * | 2003-01-15 | 2004-08-05 | Sony Corp | 相互認証方法、プログラム、記録媒体、信号処理システム、再生装置および情報処理装置 |
Non-Patent Citations (2)
Title |
---|
"Digital AV NEWS Gyokai News (2004/06/17) Cyber Link, Digital Hoso 'Copy Seigyo Hoshiki' Setsumeikai Kaisai, Matsushita, Warner, BS-i ramo Sanka", PHILE-WEB HENSHUBU, 17 June 2004 (2004-06-17), XP002998471, Retrieved from the Internet <URL:http://www.phileweb.com/news/d-av/200406/17/10561.html> * |
See also references of EP1811372A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1983440A1 (en) * | 2007-04-19 | 2008-10-22 | Oki Data Corporation | Image forming apparatus storing encrypted data on hard disk |
JP2010286590A (ja) * | 2009-06-10 | 2010-12-24 | Yamaha Corp | 電子音楽装置 |
Also Published As
Publication number | Publication date |
---|---|
KR100947019B1 (ko) | 2010-03-11 |
EP1811372A1 (en) | 2007-07-25 |
EP1811372A4 (en) | 2011-08-03 |
KR20090130154A (ko) | 2009-12-17 |
JP4755990B2 (ja) | 2011-08-24 |
JPWO2006030500A1 (ja) | 2008-05-08 |
US8023650B2 (en) | 2011-09-20 |
EP2958012A1 (en) | 2015-12-23 |
US20070156596A1 (en) | 2007-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1336961B1 (en) | Method and device for supplying of a data set stored in a database | |
EP1703409A1 (en) | Content processing device, content processing method, and computer program | |
EP1780654A1 (en) | Communication system, contents processing device, communication method, and computer program | |
EP1811386A1 (en) | Contents reproduction device, contents reproduction control method, program | |
EP1783655A2 (en) | Communication system, communication method, contents processing device, and computer program | |
EP1783616A1 (en) | Content processing device, content processing method, and computer program | |
WO2002035362A1 (fr) | Systeme de communication, terminal, programme de reproduction et support sur lequel il est enregistre, serveur, programme du serveur et support sur lequel il est enregistre | |
US20050105884A1 (en) | Content play back, information processing, and play back restriction | |
JP2006331410A (ja) | サーバから記録媒体へのコンテンツダウンロード方法及びこれに適した記録媒体 | |
CN1670817B (zh) | 用于记录和再现音乐内容的电子音乐装置 | |
WO2004099973A1 (ja) | 情報処理装置および方法、記録媒体、並びにプログラム | |
CN100552791C (zh) | 利用介质id加密的内容数据记录设备 | |
US20090271875A1 (en) | Upgrade Module, Application Program, Server, and Upgrade Module Distribution System | |
US8023650B2 (en) | Information processing apparatus, setup method and non-transitory computer-readable recording medium on which setup program is recorded | |
JP2005222409A (ja) | オペレーティングシステム、ライセンス管理サーバ、ライセンス管理方法、ライセンス管理プログラム、及び記録媒体 | |
KR100947017B1 (ko) | 정보 처리 장치 및 셋업 프로그램이 기록된 컴퓨터 판독 가능한 기록 매체 | |
US20040133519A1 (en) | Method for preventing unauthorized copy application program execution, its program, its program recording apparatus, and its program recording medium | |
JP2001344096A (ja) | 情報処理装置、その制御方法、記録媒体 | |
JP2000148166A (ja) | カラオケ端末装置 | |
JP4493715B2 (ja) | コンテンツ記憶メディア作成方法、コンピュータプログラムおよびコンテンツ提供システム | |
JP2003280752A (ja) | 著作権保護システム、情報処理装置および固有情報管理装置 | |
JP2002024450A (ja) | 著作権保護ソフト及び該プログラムを記録した記録媒体 | |
KR20070031836A (ko) | 콘텐츠 처리장치, 콘텐츠 처리 방법 및 컴퓨터 프로그램 | |
JP2006031196A (ja) | アクセス方法、情報処理装置、プログラム及び記録媒体 | |
JP2001023299A (ja) | プログラムの不正コピー防止方法及びその対策を施した情報記録媒体 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006534984 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11712450 Country of ref document: US |
|
REEP | Request for entry into the european phase |
Ref document number: 2004773105 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004773105 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077007775 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 11712450 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2004773105 Country of ref document: EP |