WO2006073040A1 - バックアップシステム、記録再生装置、バックアップ装置、バックアップ方法、プログラム及び集積回路 - Google Patents
バックアップシステム、記録再生装置、バックアップ装置、バックアップ方法、プログラム及び集積回路 Download PDFInfo
- Publication number
- WO2006073040A1 WO2006073040A1 PCT/JP2005/022772 JP2005022772W WO2006073040A1 WO 2006073040 A1 WO2006073040 A1 WO 2006073040A1 JP 2005022772 W JP2005022772 W JP 2005022772W WO 2006073040 A1 WO2006073040 A1 WO 2006073040A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- backup
- information
- recording
- key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
- G11B20/00768—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/0084—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific time or date
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
- G11B27/02—Editing, e.g. varying the order of information signals recorded on, or reproduced from, record carriers
- G11B27/031—Electronic editing of digitised analogue information signals, e.g. audio or video signals
- G11B27/034—Electronic editing of digitised analogue information signals, e.g. audio or video signals on discs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/4104—Peripherals receiving signals from specially adapted client devices
- H04N21/4135—Peripherals receiving signals from specially adapted client devices external recorder
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/414—Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
- H04N21/4147—PVR [Personal Video Recorder]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/433—Content storage operation, e.g. storage operation in response to a pause request, caching operations
- H04N21/4334—Recording operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/433—Content storage operation, e.g. storage operation in response to a pause request, caching operations
- H04N21/4335—Housekeeping operations, e.g. prioritizing content for deletion because of storage space restrictions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/43615—Interfacing a Home Network, e.g. for connecting the client to a plurality of peripherals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/765—Interface circuits between an apparatus for recording and another apparatus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91328—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy management signal, e.g. a copy generation management signal [CGMS]
Definitions
- the present invention relates to a technology for generating a backup of digital content in consideration of copyright protection of the digital content.
- CCI Copy Contro 1 Information
- HD recorder Even with content with CCI added, for example, when the power of the hard disk recorder (hereinafter referred to as HD recorder) is turned off, the content stored in the HDD (node disk drive) can be operated using a personal computer. Fraud may occur. In order to prevent such unauthorized duplication, the content stored in the HDD in advance is assigned to the one-way function, and fraud detection information is calculated and stored, and the HD recorder is turned on. When the content stored in the HDD is substituted into a one-way function, verification information is generated, and the generated verification information is compared with the stored fraud detection information. There is a technology to detect this.
- the content is temporarily stored, and when a predetermined time has passed or played back, the content is erased to realize shift playback of content including CCI indicating that copying is not possible.
- the HDD has a large capacity and can be accessed randomly, so users can store content broadcasted by digital broadcasting without worrying about storage capacity on the HD recorder, and with simple operations, The stored content can be viewed.
- HDDs are convenient, but write and read information with rotation and seek operations, so the failure rate increases with the frequency of use. If the HDD fails, data may be lost. In order to prevent such data loss due to HDD failure, it is considered effective to back up content to other storage media and recording devices. However, even if the purpose is knock-up, if the content containing CCI indicating Copy Once is moved to another medium, the content stored in the HD recorder will be deleted, which is convenient for the user. There is a problem of damage.
- the present invention has been made in view of such problems, and a backup system, a recording / reproducing apparatus, and the like that can back up content while adjusting copyright protection and convenience for users.
- An object is to provide a backup device, a knock-up method, an integrated circuit, a knock-up program, and a recording medium.
- the present invention provides a backup system comprising a recording / reproducing apparatus and a backup apparatus for recording and reproducing content, wherein the recording / reproducing apparatus stores the content.
- Storage means a receiving means for receiving an instruction to back up the content, a content transmission means for reading the content when the instruction is received, and transmitting the read content to a backup device, and the instruction Is received, the period information indicating the period during which the content to be backed up is permitted to be played back is associated with the content.
- Reproduction control for permitting reproduction of the content within a period indicated by the period information and writing means for writing to the storage means and prohibiting reproduction of the content when the period indicated by the period information ends.
- the backup device includes content receiving means for receiving the content from the recording / playback device, and knock-up storage means for storing the received content.
- “backup” means to store a copy of the content in the backup device in case the content stored in the legitimate device is lost due to an erroneous operation or failure.
- the recording / playback device normally uses the content stored in itself, and when the content stored in the recording / playback device is lost, the backup device also obtains a copy and restores the lost content.
- “Content is lost” it is deleted not only by the failure of the recording / playback device or the network to which the recording / playback device is connected, but also due to the memory shortage of the recording / playback device, or by the user's intention. In such a case, it shall be eligible for recovery. However, if content is lost due to MOVE to other recording media, the recording / playback device cannot acquire the content of the knock-up device.
- the content is transmitted to the backup device, and period information indicating a period during which reproduction of the content targeted for knock-up is permitted is associated with the content and stored.
- the period during which the content stored in the storage unit can be reproduced is limited to the period indicated by the period information, and is used while protecting the rights of the copyright holder. A person can view the content. Therefore, content can be backed up as a countermeasure against failure while adjusting copyright protection and convenience for users.
- the present invention is also a recording / playback apparatus that records and plays back content.
- the storage unit stores the content
- the receiving unit receives the content backup instruction
- the instruction is stored in the storage unit. If accepted, the content is read from the storage means, and if the read content is allowed to be knocked up, the content transmission means for sending the read content to the backup device and the instruction are accepted. Then, writing means for writing period information indicating a period during which reproduction of the content to be backed up is permitted in association with the content into the storage means, and within the period indicated by the period information And a reproduction control means for permitting reproduction of the content and prohibiting reproduction of the content when a period indicated by the period information ends.
- the storage unit transmits the content to the backup device and associates the period information indicating a period during which reproduction of the content targeted for backup is permitted with the content.
- the reproduction control unit prohibits the reproduction of the content. Therefore, the period during which the content stored in the storage unit can be reproduced is indicated by the period information. Limited within a period. Therefore, contents can be backed up as a countermeasure against troubles while balancing copyright protection and convenience for users.
- the recording / reproducing apparatus further includes an extension request means for transmitting an extension request for requesting extension of the period indicated by the period information to the backup apparatus, and an extension permission indicating the extension permission from the backup apparatus.
- Extending means for receiving information and extending a period indicated by the period information.
- the extension unit receives the extension permission information indicating the extension permission from the backup device, and extends the period indicated by the period information. Thereby, the user can view the content stored in the recording / reproducing device even after the period indicated by the period information at the beginning of backup.
- the recording / reproducing device transmits the extension request to the backup device, and extends the period information when receiving the extension permission information.
- the extension permission information is provided only when the extension request satisfies a predetermined condition, for example, that it is transmitted from a device compliant with a specific standard! It is assumed that it is set to transmit. In this way, devices that can extend the period information can be limited to only devices that satisfy a predetermined condition.
- the extension requesting unit transmits the extension request a predetermined time before the end of the period indicated by the period information.
- the extension request means transmits the extension request at a time before a predetermined time before the end of the period indicated by the period information. The period of time allowed is not interrupted.
- the extension requesting unit periodically transmits the extension requesting unit request periodically within a period indicated by the period information.
- the extension request means repeatedly transmits the extension request, so that the period indicated by the period information can be reliably extended.
- the extension means receives the extension permission information indicating a period later than the period information stored in the storage means, and receives the period indicated by the period information.
- the period information is extended by rewriting the period indicated by the extension permission information.
- the extension unit can extend the period information quickly and easily only by replacing the period indicated by the period information with the period indicated by the received extension permission information.
- the extension means constituting the recording / reproducing apparatus stores an extension time in advance, and extends the period information by adding the extension time to a period indicated by the time limit information.
- the backup device receives the extension request from each device connected to the network, determines whether or not to permit extension, and transmits extension permission information. .
- the extension means extends the period information by adding an extension time stored in advance to the period indicated by the time limit information.
- the recording / playback apparatus by performing the calculation for adding the extension period to the period, the processing executed by the backup apparatus can be reduced.
- the recording / reproducing apparatus since the recording / reproducing apparatus performs operations related to the management and extension of the effective period, it is not necessary to provide a watch protected from the operation device outside the backup device.
- the period information indicates that reproduction of the content stored in the storage means is permitted.
- the playback control means constituting the recording / playback apparatus permits the playback of the content if the current time is before the time indicated by the period information, and the current time is If the content is later than the time indicated by the information, the reproduction of the content is prohibited.
- the reproduction control unit can easily determine whether to permit or prohibit the reproduction of the content by comparing the current time with the end time.
- the period information is stored in the storage means !, a permission time indicating a time length during which reproduction of the content is permitted, and a start time indicating a start time of a period during which the content reproduction is permitted,
- the playback control unit acquires an elapsed time from the start time, and if the acquired elapsed time is equal to or shorter than the permission time, the playback of the content is permitted. If the elapsed time exceeds the permission time, reproduction of the content is prohibited.
- the period information includes the permission time indicating the length of time during which reproduction of the content stored in the storage unit is permitted, and the start point of the period during which reproduction of the content is permitted. It is the start time shown.
- the period indicated by the period information is considered to be a predetermined time from the time when the content is backed up to the backup device.
- the writing unit can easily acquire the start time and write it in the storage unit by acquiring the current time at the time when the instruction is received and using the acquired current time as the start time.
- the playback control means prohibits playback of the content by deleting the content from the storage means.
- the reproduction control unit deletes the content from the storage unit, the reproduction of the content after the end of the period indicated by the time limit information can be surely prohibited.
- the recording / reproducing apparatus of the present invention further includes a restore instruction acquisition means for acquiring a restore instruction indicating acquisition of the content stored in the backup apparatus, and the backup apparatus upon acquisition of the restore instruction. From the restore request means for transmitting the content transmission request stored in the backup device, and the backup device, Restorer means for receiving the content and writing the received content to the storage means. When the content is written, the writing means further reproduces the content written by the restore means Period information indicating a period during which the content is permitted is written in the storage unit in association with the content.
- the restore unit receives the content from the backup device and writes the received content into the storage unit. As a result, the user can view the content again.
- the writing means writes period information indicating a period during which reproduction of the content written by the restore means is permitted in association with the content into the storage means.
- a period during which the acquired content can be reproduced can be limited.
- the content stored in the storage means is based on an encryption key! / And an encrypted work generated by encrypting a digital work, and the content And a decryption key used for decrypting the encrypted work, wherein the reproduction control means prohibits the reproduction of the content by deleting the decryption key included in the content.
- the encrypted work included in the content is generated by encrypting the digital work with an encryption key. Therefore, the encrypted work is copied by an unauthorized user. Even in such a case, without the decryption key, the digital work cannot be generated, and illegal reproduction of the content can be prevented.
- the recording / reproducing apparatus further includes a restore instruction acquisition means for acquiring a restore instruction indicating acquisition of the decryption key stored in the backup apparatus, and the backup apparatus, when acquiring the restore instruction, the backup instruction
- a restore request unit that transmits a transmission request for the decryption key stored in the device
- a restore unit that receives the decryption key from the backup device and writes the received decryption key to the storage unit.
- the writing means further associates period information indicating a period during which reproduction of the content stored in the storage means is permitted with the content in the storage means. It is characterized by writing.
- the restoration unit receives the decryption key and writes the received decryption key in the storage unit.
- the writing unit writes period information indicating a period during which the reproduction of the content stored in the storage unit is permitted in association with the content into the storage unit.
- the period during which the content reproduction is permitted can be limited.
- the content stored in the storage means includes an encrypted work created by encrypting a digital work using an encryption key; An encryption key generated by encrypting a decryption key used for decrypting the copyrighted work using a unique key unique to the recording / reproduction device, and the reproduction control means includes the storage means power and the encryption key. The reproduction of the content is prohibited by deleting the key.
- the content stored in the storage means includes the encryption key generated by encrypting the decryption key using the unique key, and the digital key using the encryption key. And the above-mentioned encryption work that encrypts the work. Therefore, even if the content is copied, the content cannot be played back without the unique key, so that unauthorized playback of content by a third party can be prevented.
- the content stored in the storage means includes backup information indicating permission or prohibition of backup, and the content transmitting means constituting the recording / playback apparatus permits the backup information to be knocked up.
- the content is transmitted when the determination is that the permission is indicated, and the writing means determines whether or not the backup information indicates backup permission. If it is determined that the permission is indicated, the period information is written.
- the content is preliminarily added with backup information indicating whether or not knock-up is possible, and the content transmission means indicates the backup information force S backup permission Only the content is transmitted. Therefore, the intention of the content creator can be reflected in the backup of the content.
- the content transmitting means constituting the recording / reproducing apparatus encrypts the content by using a communication key and transmits the encrypted content safely.
- the recording / reproducing apparatus further stores detection information generated by performing a predetermined operation on the content, reads the content from the detection information storage means, and the storage means, and reads the content.
- the inspection information is generated by performing the predetermined calculation, and the generated inspection information is compared with the detection information, and the fraud prohibition means prohibits the use of the content determined as not matching! It is characterized by that.
- the fraud prohibition unit compares the detection information generated by the same calculation with the inspection information. If a one-way function is used for this calculation, the detection information does not match the inspection information if there is any change in the content.
- the backup device stores another content in accordance with a backup instruction from a device other than the recording / reproducing device, and the recording / reproducing device further includes a restore instruction indicating acquisition of the other content.
- the restore instruction acquisition means for acquiring the content
- the content request means for transmitting the transmission request for the other content to the backup device when the restore instruction is acquired, and the other content received from the backup device.
- Restore means for writing the other content to the storage means, and when receiving the other content, the writing means further includes period information indicating a period during which reproduction of the other content is permitted. And writing to the storage means in association with the other content.
- the restore unit receives the other content from the backup device and writes the received other content to the storage unit.
- the same unit such as a home network or an in-house LAN is used.
- the same content can be shared between devices belonging to other networks. This allowed users to install in different rooms Users can view the same content from any device, improving user convenience.
- the writing unit associates period information indicating a period during which reproduction of the other content is permitted with the other content. Since the data is written in the storage means, the period during which the content can be reproduced can be limited in each device having the content.
- the present invention is a backup device for backing up content, and a period during which the reproduction of the content stored in the recording / playback device is permitted from the storage means storing the content and the recording / playback device
- An extension accepting means for receiving an extension request for permission to extend the period information indicating, and a determination means for determining whether or not to permit the extension, and an extension indicating the extension permission when it is determined to permit the extension.
- Permission means for outputting permission information to the recording / reproducing apparatus.
- the permission unit when the determination unit determines that the extension is permitted, the permission unit outputs extension permission information indicating the extension permission.
- the device that satisfies the predetermined condition can extend the period information related to the reproduction of the content, and an unauthorized device that does not satisfy the condition cannot extend the period information. Therefore, in a device that does not satisfy the condition, it is possible to stop the reproduction of the content after the period indicated by the period information ends.
- the storage unit constituting the backup device further stores identification information indicating the content in association with the content
- the extension receiving unit stores the recording / playback device.
- the extension request including the content identification information indicating the content is received, and the determination unit compares the content identification information with the identification information stored in the storage unit, and if both match, It is characterized by determining that it is permitted.
- the determination unit determines to permit if the content identification information matches the identification information stored in the storage unit. Therefore, when the content stored in the backup device is moved and is no longer a backup for troubleshooting, the period indicated by the period information is not extended and the period ends. Then, the content cannot be played back by the recording / playback apparatus. In this way, it is possible to prevent both content that has been moved by the backup device by a malicious user and content that the recording / playback device has become viewable.
- the extension request includes device identification information indicating the recording / reproducing device that has output the extension request.
- the determination means includes at least one or more indicating a specific device in advance. Permitted device identification information is stored, and if the device identification information included in the received extension request matches any of the permitted device identification information, it is determined that the permitted device identification is permitted.
- the determination means matches whether the device identification information included in the received extension request is stored in advance or! /, A deviation of the permitted device identification information indicating the specific device. If so, it is determined to be permitted. As a result, it is possible to extend the period information only in a specific device and extend the period during which the content is permitted to be reproduced, and in other devices, the period during which the content is permitted to be reproduced. Cannot be extended.
- the storage means further stores detection information generated by performing a predetermined operation on the content in correspondence with the content, and the determination means is stored in the storage means.
- the content is read, the predetermined calculation is performed on the read content to generate verification information, the generated verification information is compared with the detection information, and if they match, it is determined that the extension is permitted. It is characterized by that.
- the determination unit compares the verification information generated by performing the same calculation on the content and the detection information stored in the storage unit. Allow. If a one-way function is used for the calculation, it is possible to easily detect the alteration of the content. Therefore, when the content backed up by the backup device is illegally altered, the recording / playback device is not allowed to extend the period during which the content is allowed to be played back, and the content can be played back. The period can be limited.
- the permission unit outputs the extension permission information indicating a period later than a period indicated by the period information. According to this configuration, since the permission unit outputs the post-extension period information as the extension permission information, the recording / reproducing apparatus can quickly replace the period information with the post-extension period information. Can be extended to
- the backup device since the backup device sets the post-extension period information, the backup device can collectively manage the period during which the content reproduction of each device is permitted.
- the backup device When it is determined that the backup device further transmits a restore reception unit that receives the transmission request for the content stored in the storage unit, and a restore determination unit that determines whether or not the content can be transmitted. And a restore transmission unit that reads the content from the storage unit and transmits the read content.
- the restore transmitting means reads the content from the storage means and transmits the read content. Therefore, a device that satisfies a predetermined condition acquires the content, and a user can enjoy viewing the content. In addition, it is possible to prevent the content from being played back on a device that does not satisfy the predetermined condition.
- the transmission request includes restore device identification information indicating a restore device that is a transmission source of the transmission request.
- the restore determination unit indicates a specific device in advance.
- the permitted device identification information described above is stored, and if the restored device identification information matches any of the permitted device identification information, it is determined that the content is transmitted.
- the restore determination unit determines to transmit the content. Therefore, the devices that can acquire the content can be limited to specific devices that are set in advance.
- the permitted device identification information indicates a backup source device that has been instructed to back up the content stored in the storage unit, and the restore determination unit communicates the restore device identification with the backup device. Information and the authorized device identification information If it matches, it is determined that the content is transmitted.
- the devices that can acquire the content can be limited to only the backup source device that has instructed the backup of the content stored in the storage unit.
- the restore determination means is a copy indicating the total number of devices that store the same content stored in the storage means and permitted to be played back by the backup device. And a copy permission number indicating an upper limit of the number of copies. If the copy number is less than the copy permission number, it is determined that the content is transmitted.
- the restore determination means determines that the content is to be transmitted if the number of copies is less than the number of permitted copies. Therefore, the total number of devices having the same content as the content can be limited to less than the permitted number of copies.
- the backup device is further the same as the content stored in the storage means, and device identification information indicating the device storing the content permitted to be played back by the backup device, and the device!
- a period information storage means for storing a copy period information indicating a period during which the reproduction of the content is permitted, and a copy for subtracting 1 from the number of copies when the period indicated by the copy period information ends. It is characterized by comprising a number management means.
- the copy number management unit and the backup device subtract 1 from the copy number when the period indicated by the copy period information ends. Therefore, when the period during which viewing of the content is permitted in a certain device ends, the backup device can output the content to another device.
- the content stored in the storage means is stored in advance in the backup device, and the determination means obtains the copy permission number from the content. It is characterized by doing.
- the determination unit uses the number of copies permitted acquired from the content. Judgment that reflects the intention of the content creator It can be carried out.
- the restore transmission means constituting the backup device encrypts the content using a communication key, and securely transmits the encrypted content.
- the recording / playback apparatus gives start instruction information for instructing the backup apparatus to start prior to the extension request.
- the backup device further comprises power control means for starting power supply to each circuit constituting the backup device when the activation instruction is received.
- the backup device preferably has a short operation time because of the role of holding the content as a countermeasure against the occurrence of a failure. According to the above configuration, when the power control unit receives the activation instruction, the power control unit starts supplying power to each circuit configuring the backup device. Accordingly, the operation time of the backup device can be shortened, and the failure occurrence probability of the hard disk unit constituting the storage means can be reduced.
- FIG. 1 is a configuration diagram showing a configuration of a knock-up system 1 according to a first embodiment.
- FIG. 2 is a block diagram showing a configuration of HD recorder 100.
- FIG. 3 shows an example of information stored in the information storage unit 110.
- FIG. 4 shows details of the content management table 121.
- FIG. 5 is a block diagram showing a configuration of a control unit 107.
- FIG. 6 shows an example of the menu screen 181 and the playlist screen 211 displayed on the monitor 120.
- FIG. 7 is an example of an initial setting screen 191 and a restore information screen 221 displayed on the monitor 120.
- FIG. 7 is an example of an initial setting screen 191 and a restore information screen 221 displayed on the monitor 120.
- FIG. 8 is a block diagram showing a configuration of a backup device 500.
- FIG. 9 shows an example of information stored in the content storage unit 510.
- FIG. 10 shows an example of information stored in the secure information storage unit 511.
- FIG. 12 is a flowchart showing the operation of the HD recorder 100.
- FIG. 13 is a flowchart showing recording processing by the HD recorder 100.
- FIG. 14 is a flowchart showing recording processing by the HD recorder 100. Figure 13 Power continues.
- FIG. 15 is a flowchart showing content playback processing.
- FIG. 16 is a flowchart showing restoration processing by the HD recorder 100 and the backup device 500.
- FIG. 17 is a flowchart showing restoration processing by the HD recorder 100 and the backup device 500. Continued from Figure 16.
- FIG. 18 is a flowchart showing backup processing by the HD recorder 100 and the backup device 500.
- FIG. 19 is a flowchart showing backup processing by the HD recorder 100 and the backup device 500. Continue from Figure 18.
- FIG. 20 is a flowchart showing backup processing by the HD recorder 100 and the backup device 500. Continue from Figure 18.
- FIG. 21 is a flowchart showing the expiration date extension processing by the HD recorder 100 and the backup device 500.
- FIG. 22 is a flowchart showing expiration date extension processing by the HD recorder 100 and the backup device 500. Continue from Figure 21.
- FIG. 23 is a flowchart showing the expiration date extension processing by the HD recorder 100 and the backup device 500. Continue from Figure 21.
- FIG. 24 is a flowchart showing device authentication processing by the HD recorder 100 and the backup device 500.
- FIG. 25 is a flowchart showing device authentication processing by the HD recorder 100 and the backup device 500. Continued from Figure 24.
- Embodiment 1 The knock-up system 1 according to the first embodiment of the present invention will be described below with reference to the drawings.
- the backup system 1 of the present invention includes a hard disk recorder (hereinafter referred to as HD recorder) 100, an HD recorder 400, and a backup device 500.
- the HD recorder 100, the HD recorder 400, and the backup device 500 are connected by LAN (Local Area Network) 30.
- the HD recorder 100 receives the broadcast wave transmitted from the broadcast device 10, thereby acquiring content such as video and audio power, and stores the acquired content. Also, the HD recorder 100 is equipped with an external recording medium such as a DVD, and can acquire content from the external recording medium.
- the HD recorder 100 transmits the stored content to the backup device 500 and sets an expiration date for the stored content based on the user's operation.
- the backup device 500 receives the content from the HD recorder 100 and records the received content.
- the HD recorder 100 requests the knock-up device 500 to extend the expiration date.
- the backup device 500 receives a request for extending the expiration date of the content from the HD recorder 100, confirms that the content corresponding to the received request is stored normally, and sends the expiration date to the HD recorder 100. Allow extension of.
- the HD recorder 100 When extension is permitted by the knock-up device 500, the HD recorder 100 extends the expiration date stored in itself. When extension is not permitted or when communication with the backup device 500 is not possible due to a LAN 30 malfunction, the HD recorder 100 deletes the content whose validity period has expired. After the deletion, the HD recorder 100 acquires the content backed up in the backup device 500 from the backup device 500 by the user's operation, and sets the expiration date again.
- the HD recorder 100 transmits the HD recorder 100 itself to the backup device 500.
- the content sent by HD recorder 400 to backup device 500 can be acquired.
- HD recorder 400 receives, stores, reproduces content including a broadcast program, and transmits the received content to knock-up device 500, similarly to HD recorder 100.
- the HD recorder 100 includes a transmission / reception unit 101, an authentication unit 102, an input unit 103, a playback control unit 104, a decoding unit 105, a key generation unit 106, a control unit 107, a unique information storage unit 108, an encryption
- the processing unit 109, the information storage unit 110, the input / output unit 112, the secure storage unit 113, the broadcast receiving unit 114, and the antenna 130 are included.
- the HD recorder 100 is specifically a computer system configured to include a microprocessor, RAM, and ROM, and a computer program is stored in the RAM and ROM.
- the HD recorder 100 achieves a part of its functions by the microprocessor operating according to the computer program.
- the unique information storage unit 108 includes a ROM, and stores a device identifier 115 “ID-A” and a device-specific key 116 “Key-A”. In addition, the unique information storage unit 108 is provided with a protection mechanism, and the access power by an external device is also protected.
- Device identifier 115 “ID-A” is information that uniquely indicates HD recorder 100.
- the device-specific key 116 “Key—A” is key information unique to the HD recorder 100. These are written in advance in the unique information storage unit 108 when the HD recorder 100 is shipped.
- the information storage unit 110 is composed of a hard disk unit and, as an example, stores a backup history table 131, content files 134, 139... As shown in FIG.
- Each content final contains a content ID, B sound key content, and B sound key content key.
- the content ID is identification information that uniquely identifies the encrypted content.
- the encrypted content was obtained from the broadcast device 10 or an external recording medium using the content key.
- the content is generated by applying the encryption algorithm El.
- the content includes image data and audio data compressed by a compression method such as MPEG2.
- the encrypted content key is encrypted using the device unique key 116 "Key-A" stored in the unique information storage unit 108 as the content key used for content encryption. It is generated by applying. There is a one-to-one correspondence between content keys and content.
- the encryption algorithm E1 is, for example, DES (Data Encryption Standard).
- the content file 134 includes a content ID 136 "A001", an encrypted content 1 37, and an encrypted content key 138 "Enc (Key-A, Key-la)", and the content ID 136 "A001" This is identification information indicating the encrypted content 137.
- the encrypted content 137 is generated by applying the encryption algorithm E1 to the content including the video using the content key “Key-la”.
- the encrypted content key 138 “Enc (Key-A, Key-la)” is stored in the unique information storage unit 108 and the device-specific key 116 “Key-A” is used to store the content key “Key-la”. It is generated by applying the encryption algorithm El to.
- the content key “Key-la” has a one-to-one correspondence with the content on which the encrypted content 137 is based.
- the backup history table 131 includes the date and time when the HD recorder 100 backed up the backup device 500 and the content ID of each content file stored in the information storage unit 110 at this time in association with each other. Out.
- the secure storage unit 113 is configured to include a flash memory, and is protected against access by an external device.
- the secure storage unit 113 stores a content management table 121 shown in FIG. 4 as an example.
- the content management table 121 ⁇ includes a plurality of contents ⁇ blueprints 122, 123, 1 24.
- Each content information management information consists of content ID, title, recording date and time, hash value, type, compression method, expiration date, backup flag, and priority.
- the content ID is information for identifying the encrypted content included in the corresponding content file, and is the same as the content ID included in the corresponding content file.
- the title is a name indicating the corresponding encrypted content, and is not written when the content that is the basis of the encrypted content is acquired by the broadcasting device 10 or the external recording media.
- the recording date and time indicates the date and time when the content that is the source of the encrypted content included in the corresponding content file is acquired from the broadcast device 10 or the recording media card.
- the type is information indicating the content acquisition route. For example, it indicates “broadcast program” indicating the content received from the broadcasting device 10 or image data captured by a digital camera or the like. “Photos”.
- the compression method is the name of the compression method used to compress the video and audio that make up the content.
- the hash value is generated by combining the encrypted content included in the corresponding content file and the encrypted content key, and substituting them into the hash function.
- the hash function used here is SHA-1.
- the expiration date indicates the date and time when the period during which the corresponding encrypted content can be used in the HD recorder 100 ends.
- the knock-up flag is a flag indicating whether or not the corresponding encrypted content has been backed up to the backup device 500, and takes a value of “1” or “0”. “1” indicates that it has been backed up, and “0” indicates that it has been backed up!
- the priority is information indicating the priority of content storage, and takes a value of “1” or “2”.
- the control unit 107 selects a content file corresponding to the content information including the priority “2”. Delete and secure storage capacity. Even if the free space of the information storage unit 110 is insufficient, the content file corresponding to the content information including the priority “1” is not deleted.
- the priority is automatically set to “1” when content is acquired, but it is changed by user operation.
- the content information 122 is stored in the content file stored in the information storage unit 110.
- the content ID 151 “A001” is identification information indicating the encrypted content 137 and is the same as the content ID 136 “A001”.
- Title 152 “Wide Show” is the name entered by the user for encrypted content 137.
- the recording date 15 3 “04. 10. 10. 17:00” indicates that the B sound content was generated by encrypting the content acquired at 17:00 on October 10, 2004. ing.
- the hash value 154 “01a” is generated by substituting the concatenation of the encrypted content 137 and the encrypted content key 138 “Enc (Key-A, Key-la)” into the hash function.
- the expiration date 157 “04. 12. 15. 17” is the time limit that allows the corresponding encrypted content 137 to be decrypted and played back on the HD recorder 100 until December 15, 2004 at 17:00. It is shown that.
- the antenna 130 receives a broadcast wave transmitted from the broadcast device 10.
- the broadcast receiving unit 114 includes a tuner, a modulation / demodulation unit, a transport decoder, and the like, selects one broadcast wave from the broadcast waves received by the antenna 130, and converts the selected broadcast wave into a digital signal.
- TS transport stream
- TS packets are generated.
- the generated TS packets are output to decoding section 105 in the order of generation.
- control unit 107 receives a recording instruction indicating that the currently received content is to be recorded.
- the generated TS packets are continuously output to the control unit 107 in the order of generation. Until the end notification is received from the control unit 107, the output of the TS packet is continued.
- the content acquired by the HD recorder 100 from the broadcasting device 10 is configured to include a plurality of TS packets.
- the TS packet that constitutes the content is simply referred to as the content without mentioning it.
- the decoding unit 105 converts the content acquired by the broadcast receiving unit 114 and the content generated by the encryption processing unit 109 (described later) into MPEG (Moving) according to the compression method of each content.
- Picture Experts Group (2), JPEG (Joint Photographic Experts Group), etc. generate image data and audio data by decompression, and output the generated image data and audio data to the playback control unit 104 To do.
- the transmission / reception unit 101 is connected to the LAN 30 and transmits / receives information between the control unit 107 and the authentication unit 102 and an external device.
- the external device is the knock-up device 500.
- the authentication unit 102 stores a secret key SK-A, a public key certificate Cert-A, a certificate authority public key PK-CA, and a CRL (Certificate Revocation List) unique to the HD recorder 100 in advance.
- the public key certificate Cert—A is used to prove the validity of the public key PK—A corresponding to the private key SK—A, and includes the certificate identification number, the public key PK—A, and the signature data of the certificate authority. Consists of including.
- the signature data of the certificate authority is generated by applying the signature generation algorithm S to at least the public key PK-A using the secret key SK-CA of the certificate authority.
- the signature generation algorithm S is an Elgamal signature on a finite field. Since the Elgamal signature is publicly known, a description thereof will be omitted.
- the certificate authority is a fair third-party organization, and issues public key certificates of the respective devices constituting the backup system 1 of the first embodiment.
- the CRL contains the certificate identification number of the revoked public key certificate.
- the CA public key PK—CA is a public key that is paired with the CA private key SK—CA.
- the authentication unit 102 performs device authentication in accordance with DTCP (Digital Transmission Content Protection) with an external device according to an instruction from the control unit 107, and if authentication fails, the authentication unit 102 and the external device Prohibit communication. If the authentication is successful, a common session key is generated with the external device, and the generated session key is output to the control unit 107.
- DTCP Digital Transmission Content Protection
- the input unit 103 includes various buttons such as a power button, a recording button, a menu button, and a selection button, and a receiving circuit for a remote controller.
- buttons operation by the user and the operation of the remote controller are accepted and accepted.
- Operation instruction information indicating button operation and remote controller operation is output to the control unit 107.
- the key generation unit 106 receives a content key generation instruction from the control unit 107.
- a content key generation instruction When a content key generation instruction is received, a pseudo-random number is generated, and a 56-bit content key is generated using the generated pseudo-random number.
- the generated content key is output to the control unit 107.
- Other methods may be used as the content key generation method.
- the encryption processing unit 109 receives plaintext information and a key from the control unit 107 and is instructed to perform encryption. Also, the control unit 107 receives the ciphertext and the key, and is instructed to decrypt.
- the received plaintext is subjected to encryption algorithm E1 using the received key to generate a ciphertext, and the generated ciphertext is output to the control unit 107.
- the decrypted text is generated by applying the decryption algorithm D1 to the ciphertext received using the received key, and the generated decrypted text is output to the control unit 107.
- a combination of a plaintext and a key received by the encryption processing unit 109 is a content and a content key, and a content key and a device unique key “Key-A”. Further, the combination of the ciphertext and the key received by the encryption processing unit 109 is the B-sound content and the content key, the encrypted content key and the device unique key “Key-A”.
- the decryption algorithm D 1 is an algorithm that decrypts the ciphertext generated by the encryption algorithm E 1.
- control unit 107 includes a secure clock 117, a main control unit 118, and a time limit management unit 119.
- the secure clock 117 is a clock that measures the passage of time and calculates the current time.
- the calculated current time includes the date, day of the week, and time.
- the secure clock 117 has a protection mechanism and is protected from external operations.
- the term management unit 119 stores the extended execution time “24 hours” in advance.
- the extended execution time “24 hours” is a criterion for determining whether or not to request an extension of the expiration date of the encrypted content stored in the HD recorder 100.
- the expiration date management unit 119 If the time until the expiration date is less than “24 hours”, request the knock-up device 500 to extend the expiration date.
- the term management unit 119 receives from the main control unit 118 an instruction for extending the term of validity indicating the extension of the term of validity of each content. It also receives a delete instruction indicating deletion of expired content.
- the expiration date management unit 119 sequentially selects the content information stored in the secure storage unit 113 and constitutes the content management table 121 one by one. Perform the process described.
- the term management unit 119 reads the term of validity from the selected content information. Here, if the expiration date is not written in the selected content information, the processing proceeds to the next content information.
- the time limit management unit 119 When the expiration date is read, the time limit management unit 119 next acquires the current time from the secure clock power. The difference between the read expiration date and the acquired current time is calculated. Here, the calculated difference is called the remaining time.
- the time limit management unit 119 ends the processing related to the selected content information, and proceeds to the next content information processing. However, if the update execution time is less than “24 hours”, the time limit management unit 119 transmits an activation instruction indicating activation to the backup device 500 via the transmission / reception unit 101. Next, the time limit management unit 119 receives from the knock-up device 500 an activation notification indicating that it has been activated. Here, if the activation notification is not received within a certain time, the processing related to the selected content information is terminated, and the processing of the next content information is started.
- the time limit management unit 119 instructs the authentication unit 102 to perform device authentication with the knock-up device 500. If the device authentication by the authentication unit 102 is successful, the authentication unit 102 The session key generated in the device authentication is received. In the following process, the time limit management unit 119 encrypts and decrypts information transmitted to and received from the knock-up device 500 using the session key, and performs secret communication. A description of the conversion and decryption processing is omitted.
- the process regarding the selected content information is terminated, and the process proceeds to the next content information process.
- the time limit management unit 119 Upon receiving the session key from the authentication unit 102, the time limit management unit 119 reads the content ID included in the selected content information, reads the device identifier 115 “ID-A” from the unique information storage unit 108, and the read content ID and The device identifier and an extension request for requesting extension of the expiration date are transmitted to the backup device 500 via the transmission / reception unit 101.
- the time limit management unit 119 receives an error notification indicating that a new expiration date or extension request cannot be accepted from the knock-up device 500 via the transmission / reception unit 101.
- the time limit management unit 119 ends the processing related to the selected content information, and proceeds to the next content information processing.
- the expiration date management unit 119 updates the expiration date included in the selected content information according to the received expiration date, and proceeds to processing of the next content information.
- an extension end notification indicating that the extension of the expiration date has ended is output to the main control unit 118.
- the time limit management unit 119 Upon receiving a deletion instruction from the main control unit 118, the time limit management unit 119 sequentially selects the content information stored in the secure storage unit 113 and constituting the content management table 121 one by one. The content information is processed as described below.
- the term management unit 119 reads the term of validity from the selected content information. Here, if the expiration date is not written in the selected content information, the processing proceeds to the next content information.
- the expiration date management unit 119 When the expiration date is read, the expiration date management unit 119 next acquires the current time from the secure clock 117. Compare the read expiry date with the acquired current time. If the time point before the expiration date is indicated, the process proceeds to the next content information processing.
- the time limit management unit 119 reads the content ID included in the selected content information and reads the content ID read on the information storage unit 110. Delete content inoles that contain content IDs that match. Next, the selected content information is deleted, and the processing of the next content information is started.
- a deletion completion notification indicating that the deletion processing for the expired content has been completed is output to the main control unit 118.
- the main control unit 118 stores an extension time for extending the validity period of the encrypted content stored in the information storage unit 110 in advance.
- the extended time “2:00” is stored.
- a time interval “30 minutes” for deleting expired content is stored. These are set when the HD recorder 100 is shipped.
- the main control unit 118 receives various types of operation instruction information from the input unit 103, and controls various types of processing in accordance with the received operation instruction information.
- menu screen 181 When receiving the operation instruction information indicating that the menu button is pressed, the main control unit 118 generates a menu screen 181 based on the image data stored in the information storage unit 110, and controls the generated menu screen 181 to be reproduced. Outputs to section 104 and instructs display of menu screen 181.
- FIG. 6 (a) is an example of the menu screen 181 displayed here.
- Menu screen 181 includes playback list display button 182, restore button 183, timer reservation button 184, thread and table display button 185, content list button 186, dubbing setting button 187, initial setting button 188, and content management button 189. .
- the user selects any button by moving the cursor to any button with the direction key and pressing the enter button.
- the main control unit 118 controls (c 2) reproduction processing described below. Also, select the initial setting button 188.
- (c 3) Initial setting processing described below is performed.
- the operation instruction information indicating the selection of the restore button 183 is received, it will be described below (c— 4
- the main control unit 118 When receiving operation instruction information indicating selection of other buttons, the main control unit 118 accepts timer reservation, displays a program guide, and displays information from an external recording medium according to each button. Performs various processes such as input and output.
- main control unit 118 periodically monitors the secure clock 117, and secure clock 11
- an expiration date extension instruction is output to the expiration date management unit 119.
- the main control unit 118 measures time using the secure clock 117 and outputs a deletion instruction indicating deletion of the expired content to the time limit management unit 119 every “30 minutes”.
- the main control unit 118 performs (c 1) recording process control, (c 2) playback process control, (c-3) initial setting process, (c 4) restore process, and (c 5) backup process. I will explain this.
- the main control unit 118 When receiving the operation instruction information indicating the pressing of the recording button from the input unit 103, the main control unit 118 generates a new content ID and generates it in the content management table 121 stored in the secure storage unit 113. Add content information including the content ID. At this time, the current time is written as the recording date and time of the added content information, the “broadcast program” is written as the type, “MPEG2” as the compression method, “0” as the backup flag, and “1” as the priority.
- main control unit 118 outputs a content key generation instruction to key generation unit 106 and receives the content key from key generation unit 106.
- the main control unit 118 newly generates a content file in the information storage unit 110.
- the main control unit 118 outputs a recording instruction to the broadcast receiving unit 114 and receives content from the broadcast receiving unit 114.
- the received content key and content are output to the encryption processing unit 109 to instruct the content encryption key.
- the main control unit 118 creates a content file newly generated in the information storage unit 110. Write the received encrypted contents.
- the content output from the broadcast receiving unit 114 is composed of a plurality of TS packets, and the main control unit 118 provides operation instruction information indicating pressing of the stop button. Until it is received, content is received in TS packet units, encryption is instructed, and encryption content is written repeatedly.
- the main control unit 118 monitors the free capacity of the information storage unit 110. If it is determined that there is not enough free space, the content information constituting the content management table 121 is selected with the priority “2”, and the content file corresponding to the selected content information is stored as information. Delete from the section 110 and delete the selected content information from the content management table 121.
- the main control unit 118 notifies the user that the storage capacity is insufficient and the recording is stopped, for example, by blinking a lamp.
- the main control unit 118 causes the broadcast receiving unit 114 to end recording. An end notification is output.
- the main control unit 118 reads the device unique key 116 “Key—A” from the unique information storage unit 108, and encrypts the read device unique key 116 “Key—A” and the content key. Outputs to section 109 and instructs encryption of content key.
- the encrypted content key is received from the encryption processing unit 109, and the received encrypted content key and the generated content ID are written into the generated content finale.
- the main control unit 118 reads the B-coded content and the encrypted content key, also reads the generated content file power, and combines the read encrypted content key and the encrypted content key. Assign to a hash function to generate a 160-bit hash value. Write the calculated hash value to the added content information.
- the main control unit 11 8 When the playlist display button 182 is selected by the user's button operation, the main control unit 11 8 generates a play list screen 211 using the image data stored in the information storage unit 110 and the title and recording date and time of each piece of content information constituting the content management table 121. The display is output to the playback control unit 104.
- a playlist screen 211 shown in FIG. 6 (b) is the playlist screen 211 displayed here.
- the playback list screen 211 includes content buttons 212, 213, 214, and 215. Each content button corresponds to the content information 122, 123, 124, and 125 that constitute the content management table 121, respectively. And
- the main control unit 118 reads from the secure storage unit 113 the content ID included in the content / blueprint corresponding to the selected content button.
- the information storage unit 110 a content file including a content ID that matches the read content ID is detected.
- the encrypted content and the encrypted content key are read from the detected content file, the read encrypted content and the encrypted content key are combined, and assigned to the no-hash function.
- the main control unit 118 reads the hash value included in the content information corresponding to the selected content button, compares the read hash value with the calculated hash value, and if both do not match, Generates an error screen indicating that the selected content cannot be played.
- the main control unit 118 outputs the generated error screen to the reproduction control unit 104, instructs display of the error screen, and stops the reproduction of the content.
- the main control unit 118 reads the device unique key 116 "Key-A" from the unique information storage unit 108, and reads the device-specific key.
- the key 116 “Key-A” and the read encrypted content key are output to the encryption processing unit 109 to instruct the decryption of the encrypted content key.
- the main control unit 118 receives the content key from the encryption processing unit 109.
- the encrypted content is read from the detected content file, the read encrypted content and the received content key are output to the encryption processing unit 109, and the decryption of the encrypted content is instructed.
- the main control unit 118 receives a copy from the encryption processing unit 109. The content is received, and the received content is output to the decoding unit 105.
- FIG. 7 (a) shows the initial setting screen 191 displayed here.
- the initial setting screen 191 includes setting items 192, 193, 194 and 196.
- FIG. 7 (a) shows setting boxes 197 to 201 corresponding to the setting item 196 “backup” are displayed.
- the main control unit 118 accepts an input operation by the user to the setting boxes 197 to 201.
- “all” indicating that all contents are knocked up regardless of the type of contents is entered in the setting box 197.
- “Sunday 0:30” is input as a schedule for transmitting the encrypted content to the backup device 500 for backup.
- “new only” indicates that only new encrypted content that has been backed up among the encrypted content stored in the information storage unit 110 is to be backed up. "Is entered.
- “manual” indicating that it is started by a user operation is input as a method for starting restoration of the content backed up in the backup device 500.
- the HD recorder 100 obtaining encrypted content that is backed up in the backup device 500 is called restoration.
- the main control unit 118 receives operation instruction information indicating that the enter button has been pressed from the input unit 103, and stores the setting items input to each setting box.
- the setting items entered by pressing the enter button are accepted when the user moves the cursor to buttons 192 to 194 to accept input of settings regarding the channel, image quality, and disc.
- the main control unit 118 communicates with the knock-up device 500.
- An error screen is generated to notify the user that restoration cannot be performed due to communication failure.
- the generated error screen is displayed on the monitor 120 via the playback control unit 104, and the following processing is stopped.
- the main control unit 118 instructs the authentication unit 102 to perform device authentication with the knock-up device 500. To do. If device authentication by the authentication unit 102 fails, the main control unit 118 generates an error screen notifying the user that restoration cannot be performed because communication with the knock-up device 500 has failed, and the playback control unit 104 is The error screen generated on the monitor 120 is displayed and the following processing is stopped.
- the main control unit 118 receives the session key from the authentication unit 102.
- the main control unit 118 performs secret communication on the received session key using a common key encryption method. For the sake of simplicity, the following description omits the description of encryption and decryption processing related to secret communication.
- the main control unit 118 reads the device identifier 115 “ID-A” from the unique information storage unit 108, and transmits / receives the restore information request for requesting information on the encrypted content that can be restored and the read device identifier 115 “ID_A”. Send to backup device 500 via part 101
- the main control unit 118 receives a content ID, a title, and a recording date and time corresponding to each encrypted content stored in the knockup device 500 from the knockup device 500 via the transmission / reception unit 101. To do.
- the received content ID, title, and recording date / time are temporarily stored, and the restoration information shown in FIG. 7 (b) is stored using the image data, received title, and recording date / time stored in the information storage unit 110.
- Generate screen 221 and playback controller 1 The generated restore information screen 221 is displayed on the monitor 120 via 04.
- the restore information screen 221 displays a plurality of content buttons 222 to 225.
- the main control unit 118 receives operation instruction information indicating the selection of any content button from the input unit 103, and reads a content ID corresponding to the received operation instruction information. Next, the main control unit 118 transmits the read content ID and a restore request for requesting restoration of the encrypted content indicated by the content ID to the knock-up device 500 via the transmission / reception unit 101.
- the B-coded content, the content key, and the expiration date are received from the backup device 500 via the transmission / reception unit 101.
- a new content file is generated in the information storage unit 110, and the content button selected by the user and the content ID corresponding to the content button and the received B-sign message content are written in the generated content file.
- the main control unit 118 reads the device unique key 116 “Key—A” from the secure storage unit 113, and encrypts the read device unique key 116 “Key—A” and the received content key with the encryption processing unit 109. And instruct the content key encryption key.
- the cryptographic key is received from the cryptographic processing unit 109, the received cryptographic key is written into the newly generated content file.
- the main control unit 118 reads the encrypted content and the encrypted content key from the content file newly generated on the information storage unit 110, and reads the encrypted content and the encrypted key.
- the content key is combined and assigned to the hash function to calculate the knosh value.
- the main control unit 118 After calculating the hash value, the main control unit 118 generates a content blueprint including the content ID corresponding to the content button selected by the user, the title, the recording date and time, the expiration date, and the calculated hash value.
- the generated content blueprint is added to the content management table 121. At this time, the backup flag “1” and the priority “2” are written in the added content information, and the restore process is terminated.
- the content to be restored is selected by the user's operation, and the selected container is selected.
- the state of the information storage unit 110 may be returned to the state immediately after the knock-up.
- the main control unit 118 reads the backup date from the knock-up history table 131 and displays the read date on the monitor 120. The user selects one of the displayed dates.
- the main control unit 118 reads the content ID stored in the knock-up history table 131 corresponding to the selected date. Of the read content IDs, only the content ID included in the content management table 121 is extracted, the extracted content ID is transmitted to the backup device 500, and the encrypted content corresponding to the transmitted content ID is sent. Request transmission.
- the main control unit 118 stores settings related to backup by user operations.
- description will be made assuming that the input setting items are stored in the initial setting screen 191 described above.
- the main control unit 118 regularly monitors the time, and when determining that the current time is "Sunday 0:30", the main control unit 118 stores the content management table 121 stored in the secure storage unit 113.
- the content information to be configured is selected one by one in order, and the following processing is performed for the selected content information.
- the main control unit 118 detects a content file corresponding to the selected content information on the information storage unit 110 based on the content ID included in the selected content information.
- the encrypted content and the encrypted content key included in the detected content file are read from the information storage unit 110, and the read encrypted content and the encrypted content key are combined and substituted into a hash function. No, the shush value is calculated.
- the calculated hash value is compared with the hash value included in the selected content information. If they do not match, the process proceeds to the next content information processing.
- main controller 118 transmits an activation instruction to knock-up device 500 via transmission / reception unit 101. Backup via sending / receiving unit 101 within a predetermined time If the activation notification is not received from the device 500, the main control unit 118 stops the subsequent processing.
- the main control unit 118 instructs the authentication unit 102 to perform device authentication with the knock-up device 500. If the device authentication by the authentication unit 102 has failed, the main control unit 118 stops the subsequent processing.
- main control unit 118 receives a session key from authentication unit 102.
- the main control unit 118 performs secret communication in the transmission / reception of information with the knock-up device 500 by a common key encryption method using the received session key.
- the following description omits the description of the encryption and decryption processing related to the secret communication.
- the main control unit 118 reads the device unique key 116 “Key—A” from the unique information storage unit 108, and the read device unique key 116 “Key—A” and the encryption key read from the information storage unit 110.
- the content key is output to the encryption processing unit 109 to instruct the decryption of the encrypted content key.
- the main control unit 118 receives the content key from the encryption processing unit 109.
- the encrypted content included in the detected content file is read, the device identifier 115 “ID-A” is read from the unique information storage unit 108, and included in the selected content information from the secure storage unit 113. Read the recorded content ID, title, and recording date and time.
- the main control unit 118 sends the backup request instructing the knock-up, the read device identifier 115 “ID-A”, the content ID, the title, the recording date and time, the content key, and the encrypted content to the transmission / reception unit 101.
- the knock-up device 500 To the knock-up device 500.
- the main control unit 118 receives an error notification or expiration date indicating that the backup request cannot be received from the backup device 500 via the transmission / reception unit 101.
- the main control unit 118 stops the subsequent processing.
- the main control unit 118 writes the received expiration date in the selected content information and changes the backup flag to “1”. Next, “2” is written in the priority and the processing of the next content information is started.
- the main control unit 118 reads the content ID from each content ⁇ blueprint included in the content management table 121 and reads it.
- the issued content ID and the current date are written in the knock-up history table 131.
- the main control unit 118 starts the backup process in the initial setting process regardless of the set backup schedule.
- the reproduction control unit 104 includes an image signal processing unit and an audio signal processing unit.
- the playback control unit 104 receives image data and audio data from the decoding unit 105.
- the image signal processing unit generates an image signal from the received image data.
- the vertical synchronization signal, horizontal synchronization signal, and generated image signal are output to the monitor 120. Further, an image signal is generated from various screen data according to instructions from the control unit 107 and output to the monitor 120.
- the audio signal processing unit generates the received audio data force analog audio signal and outputs the generated analog audio signal to the monitor 120.
- the monitor 120 has a built-in speaker, receives a horizontal synchronization signal, a vertical synchronization signal, and an image signal from the image signal processing unit, and displays an image based on the received horizontal synchronization signal, vertical synchronization signal, and image signal. indicate.
- the speaker also receives an analog audio signal from the audio signal processing unit, converts the received analog audio signal into audio, and outputs the audio.
- the input / output unit 112 is loaded with a recording medium such as a DVD or a memory card.
- a recording medium such as a DVD or a memory card.
- the information recorded on the recording medium is read and the information is written on the recording medium.
- the backup device 500 includes a transmission / reception unit 501, an authentication unit 502, a power supply unit 503, a control unit 507, an encryption processing unit 509, a unique information storage unit 504, a content storage unit 510, and a secure information storage unit 511. And an input unit 512 and a display unit 513.
- knock-up device 500 is a computer system that includes a microprocessor, RAM, and ROM.
- the RAM and ROM store computer programs, and the microprocessor operates according to the computer programs.
- the knock-up device 500 achieves a part of its functions.
- the unique information storage unit 504 includes a ROM, and stores a device unique key 516 “Key-C” as shown in FIG.
- the device unique key 516 “Key-C” is key data unique to the knock-up device 500 and is written when the knock-up device 500 is shipped.
- the content storage unit 510 is composed of a hard disk unit. As an example, as shown in FIG. 9, the contents storage unit 510 reads and writes [this content finale 529, 534, 539.
- Each content finale includes a content ID, a Japanese phone number ⁇ content, and a Japanese phone number ⁇ content key.
- the content ID is identification information corresponding to the encrypted content.
- the encryption content is generated by applying the encryption algorithm E1 to the content using the content key.
- the encrypted content key is obtained by applying the encryption algorithm E 1 to the content key used for content encryption using the device unique key 516 “Key—C” stored in the unique information storage unit 508. Has been generated.
- the content file 529 includes a content ID 531 “A001”, an encrypted content 532, and an encrypted content key 533 “Enc (Key—C, Key—la)”.
- the content ID 531 “A001” is information for uniquely identifying the encrypted content 532, and is the same as the content ID 136 “A001” stored in the information storage unit 110 of the HD recorder 100.
- the encrypted content 532 is generated by applying the encryption algorithm E1 to the content using the content key “Key-la”.
- the encrypted content 532 is the same as the encrypted content 137 stored in the information storage unit 110 of the HD recorder 100.
- the encrypted content key 533 “Enc (Key—C, Key—la)” is stored in the unique key storage unit 504 using the device unique key 516 “Key—C” and the content key “Key— la ”is generated by applying the encryption algorithm E1.
- the secure information storage unit 511 includes a flash memory.
- the secure information storage unit 511 has a protection mechanism and is protected from access by an external device.
- the secure information storage unit 511 stores a backup management table 521 and permitted device identification information 551 as shown in FIG.
- the knock-up management table 521 includes a plurality of backup information 522, 523, 524, 525.
- Each backup information includes a content ID, a title, a recording date and time, a knock-up device identifier, and a hash value.
- Each piece of content information has a one-to-one correspondence with the content file stored in the content storage unit 510.
- the content ID is the same as the content ID included in the corresponding content file, and is identification information indicating the encrypted content.
- the title is the name of the corresponding encrypted content.
- the recording date and time is the date and time when the content that becomes the basis of the encrypted content such as HD recorder 100 or HD recorder 400 power broadcasting device 10 or external recording media power is acquired.
- the backup source device identifier is a device identifier of a device that has requested backup of the encrypted content included in the corresponding content file.
- the “No” and “Sh” values are generated by combining the “B” sound content and the “B” sound content key included in the corresponding content file and substituting them into the “No” and “Sh” functions.
- the permitted device identification information 551 is configured to include identification information of a device for which the knock-up device 500 accepts various instructions such as a knock-up request.
- a device identifier 552 “ID-A” indicating the HD recorder 100 forming the knock-up system 1 and a device identifier 553 riD_Bj indicating the HD recorder 400 are included.
- the power supply unit 503 also acquires power from the external power supply, and supplies the acquired power to each circuit constituting the backup device 500 in accordance with an instruction from the control unit 507.
- the power supply unit 503 supplies power only to the transmission / reception unit 501 and the control unit 507.
- the power supply unit 503 is instructed by the control unit 507 to start power supply. When instructed to start power supply, it starts power supply to other parts. Also, supply power from the control unit 507 It is instructed to stop. When instructed to stop the power supply, the power supply to each unit other than the transmission / reception unit 501 and the control unit 507 is stopped.
- the transmission / reception unit 501 is connected to the LAN 30, and transmits / receives various information between the external device connected to the LAN 30 and the control unit 507 and the authentication unit 502.
- the external devices are the HD recorder 100 and the HD recorder 400.
- the authentication unit 502 stores in advance a secret key SK-C, a public key certificate Cert-C, a certificate authority public key PK-CA, and CRL unique to the knock-up device 500.
- the public key certificate C ert — C is used to prove the validity of the public key PK — C corresponding to the private key SK — C.
- the certificate identification number, the public key PK — C, and the signature data of the certificate authority It is comprised including.
- the signature data of the certificate authority is generated by applying the signature generation algorithm S to at least the public key PK_C using the secret key SK-CA of the certificate authority.
- the CRL includes the certificate identification number of the revoked public key certificate.
- the CA public key PK—CA is a public key that is paired with the CA private key SK—CA.
- the authentication unit 502 performs device authentication according to DTCP with an external device according to an instruction from the control unit 507, and prohibits communication between the control unit 507 and the external device when the authentication fails. If the authentication is successful, a common session key is generated with the external device, and the generated session key is output to the control unit 507. The device authentication operation will be described in detail later.
- the encryption processing unit 509 receives the plaintext and the key from the control unit 507, and is instructed to encrypt the plaintext.
- the control unit 507 receives the ciphertext and key, and is instructed to decrypt the ciphertext.
- the received plaintext is subjected to the encryption algorithm E1 using the received key to generate a ciphertext, and the generated ciphertext is output to the control unit 507.
- the decrypted text is generated by applying the decryption algorithm D 1 to the ciphertext received using the received key, and the generated decrypted text is output to the control unit 107.
- the combination of plaintext and key received by the encryption processing unit 509 is a content key. And the device unique key “Key-C”. Further, the combination of the ciphertext and the key received by the cryptographic processing unit 509 is the cipher key content key and the device unique key “Key-C”.
- the control unit 507 stores the viewing time “240 hours”.
- the viewing time is the time during which the HD recorder 100 and HD recorder 400 can use the encrypted content that was the target of backup.
- control unit 507 is provided with a secure clock (not shown) that can also operate an external force.
- the control unit 507 receives an activation instruction for instructing activation from an external device via the transmission / reception unit 501.
- the external device is the HD recorder 100 or the HD recorder 400.
- the power supply unit 503 is instructed to start power supply. Next, an activation notification indicating that the knock-up device 500 has been activated is transmitted to the external device via the transmission / reception unit 501.
- control unit 507 instructs the authentication unit 502 to perform device authentication with an external device. If device authentication by the authentication unit 502 is unsuccessful, the power supply unit 503 is instructed to stop power supply. If the device authentication by the authentication unit 502 is successful, the session key is received from the authentication unit 502. In the following processing, the control unit 507 realizes secret communication with the external device by the common key encryption method using the received session key, but explains the encryption and decryption processing related to the secret communication. Omitted.
- control unit 507 receives the device identifier, the backup request, the content ID, the content key, the title, the recording date and time, and the encrypted content from the external device via the transmission / reception unit 501.
- the device identifier, the extension request, and the content ID are received.
- a device identifier and a restore information request are received.
- the control unit 507 Upon receiving the device identifier, the backup request, the content ID, the content key, the title, the recording date and time, and the encrypted content, the control unit 507 stores the received device identifier in the secure information storage unit 511. Confirm that it is included in information 551. If not included, a backup request is sent to the external device via the transceiver 501. Send an error notification indicating that cannot be accepted. Next, the power supply unit 503 is instructed to stop power supply.
- device unique key 516 “Key-C” is read from unique information storage unit 504.
- the read device unique key 516 “Key—C” and the received content key are output to the encryption processing unit 509 to instruct the encryption of the content key.
- control unit 507 receives the encrypted key content key from the encryption processing unit 509, and generates a content file including the received content ID, the B sound key content, and the B sound key content key.
- the generated content file is written into the content storage unit 510.
- control unit 507 reads the encrypted content and the encrypted content key included in the content file written in the content storage unit 510, and reads the read encrypted content and encrypted content key. Substitute the hash value into a hash function to generate a 160-bit hash value.
- control unit 507 generates backup information including the received content ID, title, recording date and time, device identifier, and calculated hash value, and adds the generated backup information to the backup management table 521.
- the received device identifier is used as the backup source device identifier.
- control unit 507 also obtains the current time for the secure clock power, and calculates the expiration date by adding the viewing time "240 hours" to the obtained current time.
- the calculated expiration date is transmitted to the external device via the transmission / reception unit 501.
- the control unit 507 When the device identifier, the extension request, and the content ID are received via the transmission / reception unit 501, the control unit 507 includes the received device identifier in the permitted device identification information 551 stored in the secure information storage unit 511. Confirm that it matches the device identifier! / If they do not match, an error notification indicating that the extension request cannot be received is transmitted to the external device via the transmission / reception unit 501. Next, the power supply unit 503 is instructed to stop power supply. If the received device identifier matches any of the device identifiers included in permitted device identification information 551, control unit 507 selects knock-up information including the same content ID as the received content ID.
- control unit 507 detects a content inlay including the same content ID as the received content ID from the content storage unit 510, and the encrypted content and encryption included in the detected content inole are detected. Read the content key. The read cipher key content and cipher key content key are combined and substituted into a hash function to calculate the no-shash value.
- control unit 507 sends an error notification indicating that the extension request cannot be accepted. Output to an external device via the transmission / reception unit 501.
- control unit 507 also acquires the current time for the secure clock power, and adds the viewing time “240 hours” to the acquired current time to calculate the expiration date. Next, the calculated expiration date is transmitted to the external device via the transmission / reception unit 501.
- the control unit 507 When receiving the device identifier and the restore information request from the external device, the control unit 507 confirms that the received device identifier is stored in the secure information storage unit 511 and included in the permitted device identification information 551. Check. If it is not included, an error notification indicating that the restore information request cannot be accepted is transmitted to the external device via the transmission / reception unit 501. Next, the power supply unit 503 is instructed to stop power supply.
- control unit 507 stores all the knockup information stored in secure information storage unit 511 and included in knockup management table 521. Also reads the content ID, title, and recording time. The read content ID, title, and recording time are transmitted to the external device via the transmission / reception unit 501. Next, the control unit 507 receives the content ID and the restore request from the external device via the transmission / reception unit 501. When the content ID and the restore request are received, the backup management table 5 21 selects the backup information including the same content ID as the received content ID.
- control unit 507 compares the selected backup information with the received content ID.
- the corresponding content file is detected.
- the read cipher key content and the cipher content key are combined and substituted into a hash function to calculate a no-shash value.
- the calculated hash value is compared with the hash value included in the selected backup information.
- control unit 507 transmits an error notification indicating that the restore request cannot be accepted to the external device via the transmission / reception unit 501.
- the power supply unit 503 is instructed to stop power supply.
- control unit 507 If they match, the control unit 507 reads the device unique key 516 “Key—C” from the unique information storage unit 504, and encrypts the read encrypted content key and device unique key 516 “Key-C”. Output to the processing unit 509 and instruct the decryption of the encrypted content key. Next, the content key is received from the cryptographic processing unit 509. Upon receiving the content key, the control unit 507 reads the encrypted content from the detected content file.
- control unit 507 also acquires the current time for the secure clock power, and calculates the expiration date by adding the viewing time “240 hours” to the acquired current time.
- the read encrypted content, the received content key, and the calculated expiration date are transmitted to the external device via the transmission / reception unit 501.
- control unit 507 instructs the power supply unit 503 to stop power supply.
- the input unit 512 receives input of information and instructions by the operator, and outputs the received information and operation instruction information corresponding to the received instructions to the control unit 507.
- the display unit 513 displays various types of information under the control of the control unit 507.
- step S111 The operation of HD recorder 100 will be described using the flowchart shown in FIG. For convenience of explanation, the explanation starts from step S111.
- the main control unit 118 sets the items related to backup set on the initial setting screen 191 shown in FIG. 7, the content type “all”, the backup schedule “Sunday 0:30”, and the backup mode “new only”. ”And the restore mode“ manual ”are stored.
- the control unit 107 of the HD recorder 100 compares the current time indicated by the secure clock 117 with its own extended time “2:00” (step SI 11), and the current time is “2: If it is determined that the current time is not “2: 0” (NO in step S111), step S112 is executed. Does not go to step S113.
- control unit 107 compares the current time with the stored knock-up schedule “Sunday 0:30” and determines that the current time is “Sunday 0:30” (step S113). YES), backup processing is performed (step S114).
- step S113 If it is determined that it is not “current time power ⁇ Sunday 0:30” (NO in step S113), the process proceeds to step S115.
- step S115 if the expired content is deleted immediately before the elapsed time of power exceeds "30 minutes" (YES in step S115), the control unit 107 again returns to the content management table 121.
- the expiration date included in each piece of content information is compared with the current time, the content file corresponding to the expiration date of the content information is deleted from the information storage unit 110, and the content information is deleted from the content management table 121. Delete (Step S116).
- control unit 107 does not perform step S116 but moves the process to step S117.
- step S117 when the power button is pressed by the user's operation (YES in step S117), the control unit 107 accepts the user's button operation and remote controller operation via the input unit 103 (step S117). 118), perform various processes according to the accepted button operations.
- step S117 If the power button is not pressed (NO in step S117), the process returns to step SI11 to continue monitoring the current time.
- step S122 When the recording button is pressed in step S118, the control unit 107 executes a recording process (step S122). When the recording process ends, the process returns to step S118 to accept the user's operation.
- step S118 If the power button is pressed in step S118, the process returns to step S111. Continue to monitor the time.
- step S118 If any other button is pressed in step S118, other processing is performed (step S123).
- step S118 upon accepting the pressing of the menu button, the control unit 107 displays the menu screen 181 shown in FIG. 6 (a) on the motor 120 (step S121) and accepts the selection by the user (step S121). S 124).
- step S124 When the initial setting button 188 is selected (step S124), the control unit 107 displays the initial setting screen 191 shown in Fig. 7 (a) on the monitor 120 (step SI26), and the user's button Accepts various settings by operation (step S127). When the setting is accepted, return to step S118.
- step S124 reproduction processing is performed (step S129).
- step S129 reproduction processing is performed (step S129).
- step S124 when restore button 183 is selected, control unit 107 performs a restore process (step S131). When the restoration process ends, the process returns to step S118. If another button is selected, other processing is performed (step S181), and the process returns to step S118.
- step S122 in FIG. 1 This is a detail of step S122 in FIG.
- the control unit 107 Upon receiving the operation instruction information indicating the pressing of the record button, the control unit 107 generates a new content ID (step S151), and displays the content ⁇ blueprint including the generated content ID in the content management table. It is added to 121 (step S153). The current time is written in the recording date and time of the added content information (step S154), and “broadcast program” is written in the type (step S156). In addition, “MPEG2” is written in the compression method (step S157), “0” is written in the backup flag (step S158), and “1” is written in the priority (step S161).
- control unit 107 instructs the key generation unit 106 to generate a content key.
- Key generation unit 106 generates a content key and outputs the generated content key to control unit 107 (step S162).
- control unit 107 generates a new content file in the information storage unit 110 (step S163).
- a recording instruction is output to the broadcast receiving unit 114.
- the broadcast receiving unit 114 receives content via the antenna 130 (step S164), and outputs the received content to the control unit 107 in units of TS packets.
- step S164 The process from step S164 to step S168 is repeated until the stop button is pressed by the user.
- the stop button is pressed (YES in step S166)
- the process proceeds to step S171. .
- control unit 107 outputs the content received from the broadcast receiving unit 114 and the content key received from the key generation unit 106 to the encryption processing unit 109, and instructs the content encryption key.
- the encryption processing unit 109 encrypts the content using the received content key, and outputs the generated encrypted content to the control unit 107 (step S167).
- Control unit 107 writes the encrypted content generated by encryption processing unit 109 into the content file generated in information storage unit 110 (step S168), and returns to step S164.
- the control unit 107 reads the device unique key 116 “Key—A” from the unique information storage unit 108 (step S171), and the read device unique key 116 “ Key—A ”and the content key are output to the encryption processing unit 109 to instruct the encryption key of the content key.
- the encryption processing unit 109 encrypts the content key using the received device unique key 116 “Key-A”, and generates an encrypted content key.
- the generated encrypted content key is output to control unit 107 (step S 172).
- the control unit 107 receives the encrypted content key from the encryption processing unit 109, and writes the received encrypted content key and the generated content ID into the content finale (step S173).
- control unit 107 combines the encrypted content and the encrypted content key and substitutes them into the hash function to calculate a no-shash value (step S 174).
- the calculated hash value is written in the added content information (step S176).
- control unit 107 executes step S181 to step S189.
- the control unit 107 monitors the free capacity of the information storage unit 110 ( Step S181). If it is determined that there is sufficient free space (YES in step S181), and the user does not press the stop button (NO in step S182), the flow returns to step S181 to continue monitoring the free space.
- the control unit 107 moves the process to step S171.
- step S181 When it is determined that the free space is insufficient (NO in step S181), the control unit 107 sequentially stores the content information stored in the secure storage unit 113 and included in the content management table 121. Select (step S184). At this time, when all the pieces of content information included in the content management table 121 have been processed in steps S187 to 189, that is, there is no deleteable content in the information storage unit 110 (step S186). YES), the control unit 107 notifies the user that the storage capacity is insufficient by blinking the lamp, etc., and moves the process to step S171.
- step S186 the control unit 107 reads the priority level included in the selected content information, and determines whether the read priority level is "2" (step S 187). . If the priority is not “2” (NO in step S187), the process returns to step S184 to select the next content information.
- step S 187 the information storage unit 110 detects the content file corresponding to the selected content information based on the content ID included in the selected content information, and detects the detected content file.
- the content file is deleted from the information storage unit 110 (step S188).
- step S189 the selected content information is deleted from the content management table 121 (step S189), and the process returns to step S181.
- step S129 in FIG. 1 is a detail of step S129 in FIG.
- the control unit 107 When the user selects the play list display button 182 on the menu screen 181 shown in FIG. 6, the control unit 107 generates a play list screen 211 as shown in FIG. The screen 211 is displayed on the monitor 120 (step S201).
- step S202 selection of content by the user is accepted via the input unit 103 (step S202).
- the user selects the content button 212. And explain.
- the control unit 107 reads the content ID “A001” included in the content information 122 corresponding to the selected content button 212 from the secure storage unit 113 (step S 203), and information based on the read content ID “A001”.
- a content file 134 corresponding to the content information 122 is detected on the storage unit 110 (step S204).
- the encrypted content 137 and the encrypted content key 138 “Enc (Key—A, Key_la)” are read from the detected content file 134 (step S205).
- the read cipher key content 137 and cipher key content key 138 “Enc (Key—A, Key—la)” are combined and substituted into a hash function to calculate a hash value (step S 206).
- control unit 107 reads the hash value “01a” from the content information 122 including the content ID “A001” (step S207).
- the calculated hash value is compared with the read hash value (step S208), and if they do not match (NO in step S208), an error screen is displayed indicating that the selected content cannot be played back.
- the generated error screen is displayed (step S209), and the reproduction process is terminated.
- the control unit 107 reads the device unique key 116 "Key-A" from the unique information storage unit 108.
- the encrypted content key 138 “Enc (Key— A, Key— la)” and the read device unique key 1 16 “Key— A” are output to the encryption processing unit 109, and the encrypted content key 138 “Enc ( Key—A, Key—la) ”is instructed to be decoded.
- the encryption processing unit 109 receives the encrypted content key “Enc (Key—A, Key—1a)” and the device specific key 116 “Key—A” from the control unit 107. Using the received device unique key 116 “Key-A”, the encrypted content key “Enc (Key-A, Key-la)” is decrypted to generate the content key “Key-la”. The key “Key-la” is output to the control unit 107 (step S211).
- Control unit 107 receives content key “Key-la” from encryption processing unit 109.
- the encrypted content 137 is read from the content file 134 (step S212), and the read encrypted content 137 and the content key “Key—laj” are output to the encryption processing unit 109. And instruct to decrypt the encrypted content.
- encryption processing unit 109 decrypts the B sound key content using content key “Key-la”, generates content, and generates the generated content as “1”. (Step S213).
- the control unit 107 receives the content from the encryption processing unit 109 and outputs the received content to the reproduction control unit 104.
- the playback control unit 104 receives content from the control unit 107, decompresses the received content to generate an image signal and an audio signal (step S214), outputs the generated image signal and audio signal to the monitor 120, and Plays an image and a sound (step S216).
- the control unit 107 transmits an activation instruction to the backup device 500 via the transmission / reception unit 101 (step S231).
- the control unit 507 of the backup device 500 receives an activation instruction via the transmission / reception unit 501 and instructs the power supply unit 503 to start supplying power.
- the power supply unit 503 starts power supply to each unit constituting the backup device 500 (step S232).
- control unit 507 transmits an activation notification to the HD recorder 100 via the transmission / reception unit 501 (step S233).
- the control unit 107 of the HD recorder 100 indicates that restoration cannot be performed unless a start-up notification is received from the backup device 500 within a predetermined time via the transmission / reception unit 101 (NO in step S234). An error screen is generated and the error screen generated via the playback control unit 104 is displayed on the monitor 120 (step S236).
- the authentication unit 102 If the activation notification is received within the predetermined time (YES in step S234), the authentication unit 102 is instructed to authenticate the device with the backup device 500. The authentication unit 102 performs device authentication with the knock-up device 500 according to an instruction from the control unit 107 (step S237).
- step S236 If the device authentication by the authentication unit 102 fails (NO in step S239), the control unit 107 Then, the process proceeds to step S236.
- step S239 If the device authentication is successful (YES in step S239), the device identifier 115 “ID—A” is read from the unique information storage unit 108 (step S241), and the read device identifier 115 “ID— A ”and a restore information request are transmitted to knock-up device 500 (step S 244).
- step S242 When device authentication with the HD recorder 100 fails (NO in step S242), the control unit 507 of the backup device 500 instructs the power supply unit 503 to stop supplying power, and the power supply unit 503 receives the transmission / reception unit 501 and Stop power supply to each unit other than the control unit 507 (step S243)
- step S242 If the device authentication with the HD recorder 100 is successful (YES in step S242), a restore information request and a device identifier “ID-A” are received from the HD recorder 100 via the transmission / reception unit 501.
- the received device identifier “ID-A” is stored in the secure information storage unit 511 and registered in the permitted device identification information 551, and it is determined whether or not it is possible (step S246). If it is determined that it is not registered (NO in step S246), control unit 507 moves the process to step S263.
- each backup information power constituting the knock-up management table 521 also reads the content ID, title, and recording date and time (step S247), and the read content ID Then, the title and the recording date / time are transmitted to the HD recorder 100 via the transmission / reception unit 501 (step S248).
- the control unit 107 of the HD recorder 100 receives the content ID, the title, and the recording date / time from the backup device 500 via the transmission / reception unit 101.
- a restore information screen 221 shown in FIG. 7 is generated using the received title and recording date (step S 251), and the generated list information screen 221 is displayed on the monitor 120 via the playback control unit 104 (step S 252). )
- Control unit 107 accepts selection of content to be restored by the user via input unit 103 (step S253).
- the control unit 107 reads the content ID corresponding to the selected content button (step S254), and transfers the read content ID and the restore request via the transmission / reception unit 101. The data is transmitted to the backup device 500 (step S256).
- the control unit 507 configuring the backup device 500 receives the restore request and the content ID via the transmission / reception unit 501.
- the control unit 507 selects the backup information that is stored in the secure information storage unit 511 and includes the content ID received from the backup management table 521 (step S257).
- control unit 507 detects a content file corresponding to the selected backup information in the content storage unit 510 based on the received content ID, and the encrypted content and the encrypted content included in the detected content file. Read the content key (step S259). The control unit 507 combines the read encrypted content and the encrypted content key and substitutes them into the hash function to calculate the hash value (step S260).
- the hash value included in the selected backup information is read (step S261), and the calculated hash value is compared with the read hash value. If they do not match (NO in step S262), control is performed.
- Unit 507 generates an error notification indicating that the request to restore the content corresponding to the received content ID cannot be received, and transmits the generated error notification to HD recorder 100 via transmission / reception unit 501 (step S263).
- the control unit 107 of the HD recorder 100 displays an error screen informing that the restoration cannot be performed on the monitor, and ends the restoration process.
- control unit 507 instructs the power supply unit 503 to stop power supply.
- the power supply unit 503 receives the instruction from the control unit 507, and stops power supply to each unit other than the transmission / reception unit 501 and the control unit 507 (step S264).
- the control unit 507 reads the device unique key 516 “Key—C” from the unique information storage unit 504 (step S 266 )
- the read device unique key 516 “Key-C” and the encrypted content key are output to the encryption processing unit 509, and the decryption of the encrypted content key is instructed.
- the encryption processing unit 509 generates a content key by decrypting the encrypted content key using the device unique key 516 “Key-C” in accordance with an instruction from the control unit 507, and the generated content key is transmitted to the control unit 507. (Step S267).
- the control unit 507 receives the content key from the encryption processing unit 509, and then detects the detected content.
- the encrypted content contained in the file is read (step S268).
- the control unit 507 also obtains the current time for the secure clock power, and calculates the expiration date by adding the viewing time “240 hours” to the obtained current time (step S269).
- the encrypted content read, the received content key, and the calculated expiration date are transmitted to the HD recorder 100 via the transmission / reception unit 501 (step S271).
- the control unit 507 instructs the power supply unit 503 to stop power supply, and the power supply unit 503 receives the instruction from the control unit 507 and supplies power to each unit other than the transmission / reception unit 501 and the control unit 507. Stop (step S272).
- the control unit 107 of the HD recorder 100 receives the encrypted content, the content key, and the expiration date from the backup device 500 via the transmission / reception unit 101.
- a new content inlay is generated on the information storage unit 110, and the received B-sound key content and content ID are written to the generated content file. (Step S274).
- the device unique key 116 “Key_A” is read from the unique information storage unit 108 (step S276), and the read device unique key 116 “Key—A” and the received content key are encrypted. And instruct the encryption key of the content key.
- the encryption processing unit 109 receives the device unique key 116 “Key-A” and the content key from the control unit 107.
- the received device-specific key “Key_A” is used to encrypt the content key, an encrypted content key is generated, and the generated encrypted content key is output to the control unit 107 (step S277).
- the control unit 107 receives the encrypted content key from the encryption processing unit 109, and writes the received encrypted content key to the generated content file on the information storage unit 110 (step S278).
- control unit 107 combines the received encrypted content and the received encrypted content key and substitutes them into a hash function to calculate a no-shash value (step S279).
- the control unit 107 adds content information including the content ID corresponding to the selected content button, the title, the recording date and time, the received expiration date, and the calculated hash value to the content management table 121. (Step S281). Write “1” to the backup flag of the added content information (step S284) and write priority “2” (step S286) [0190] (5) Backup processing by HD recorder 100 and backup device 500
- the control unit 107 configures the content management table 121 stored in the secure storage unit 113.
- the content information is selected one by one in order (step S301). At this time, if all the content information has been selected and there is no content information to be newly selected (YES in step S302), the backup process is terminated. If all the content information has not been selected (NO in step S302), the control unit 107 determines whether the backup flag included in the selected content information is “0”, that is, the selected content information. It is determined whether or not the content corresponding to is already backed up! / (Step S303). If the backup flag is “0”! /, (NO in step S303), the process returns to step S301 to select the next content information.
- the control unit 107 reads the content ID of the selected content information (step S304), and selects the content information based on the read content ID.
- the encrypted content and the encrypted content key are read from the information storage unit 110 from the detected content file (step S307).
- the control unit 107 combines the read encrypted content and the encrypted content key and assigns them to the hash function to calculate the hash value (step S308).
- the hash value included in the selected content information is read (step S309), and the read hash value is compared with the calculated hash value (step S311). If the two do not match, the process returns to step S301 to proceed to the next content information processing.
- the control unit 107 transmits an activation instruction to the backup device 500 via the transmission / reception unit 101 (step S313).
- the control unit 507 of the backup device 500 receives an activation instruction from the HD recorder 100 via the transmission / reception unit 501, and instructs the power supply unit 503 to start power supply.
- the power supply unit 503 starts power supply to each unit constituting the backup device 500 according to an instruction from the control unit 507 (step S316).
- the control unit 507 transmits an activation notification to the HD recorder 100 via the transmission / reception unit 501 (step S317).
- control unit 107 of the HD recorder 100 does not receive the activation notification from the backup device 500 within a predetermined time (NO in step S318), the control unit 107 ends the backup process.
- the control unit 107 instructs the authentication unit 102 to perform device authentication with the backup device 500.
- Authentication unit 102 performs device authentication with knock-up device 500 according to an instruction from control unit 107 (step S321). If device authentication by the authentication unit 102 fails (NO in step S322), the control unit 107 ends the backup process.
- the control unit 107 reads the device unique key 116 “Key-A” from the unique information storage unit 108, and reads the device unique key 116 “Key-A”.
- the encrypted content key included in the selected content information is output to the encryption processing unit 109, and the decryption of the encrypted content key is instructed.
- the encryption processing unit 109 generates a content key by decrypting the encrypted content key using the received device unique key 116 “Key-A”, and the generated content key is used as the control unit. Output to 107 (step S323).
- the control unit 107 receives the content key from the encryption processing unit 109.
- the content ID, title, and recording date / time included in the selected content information are read (step S324).
- control unit 107 reads the device identifier 115 “ID-A” from the unique information storage unit 108, and reads the encrypted content corresponding to the selected content information from the information storage unit 110 (step S326).
- the backup request, the read device identifier 115 “ID A”, the content ID, the title, the recording date and time, and the encrypted content are received via the transceiver 101.
- the acquired content key is transmitted to the backup device 500 (step S327).
- control unit 507 instructs power supply unit 503 to stop power supply, and power supply unit 503 includes transmission / reception unit 501 and control unit 503. The power supply to each unit other than the control unit 507 is stopped (step S329).
- the control unit 507 receives the backup request, the device identifier “ID—A”, the content ID, the title, and the recording date / time from the HD recorder 100 via the transmission / reception unit 101. And the encrypted key content and the content key are received. It is determined whether or not the received device identifier “ID-A” is registered in the permitted device identification information 551 stored in the secure information storage unit 511 (step S331). If it is determined that the error is registered (NO in step S331), the control unit 507 transmits an error notification indicating that the backup request cannot be received to the HD recorder 100 via the transmission / reception unit 501. (Step S332), the power supply to each circuit constituting the backup device 500 is stopped via the power supply unit 503 (Step S333). Here, the HD recorder 100 that has received the error notification ends the backup process.
- the device unique key 516 “Key—C” is stored from the unique information storage unit 504.
- the device unique key 516 “Key-C” and the received content key are output to the encryption processing unit 509 to instruct the encryption of the content key.
- the encryption processing unit 509 generates the encrypted content key by encrypting the content key using the received device unique key 516 “Key-C” according to the instruction of the control unit 507, and generating the generated encryption key.
- the content key is output to the control unit 507 (step S336).
- Control unit 507 receives the encrypted content key from encryption processing unit 509.
- a new content file is generated on the content storage unit 510, and the received content ID, the encrypted content, and the encrypted content received from the cryptographic processing unit 509 are added to the generated content file.
- Write the key step S337).
- control unit 507 combines the received encrypted content and the received encrypted content key, and assigns them to the Noh and Cush functions to calculate a hash value (step S339).
- Received content ID, title, recording date and time, device identifier “ID-A” and calculated hash value Is generated, and the generated backup information is added to the backup management table 521 (step S341).
- the received device identifier “ID-A” is used as the backup source device identifier.
- the control unit 507 also acquires the current time of the secure clock power, calculates the expiration date by adding the viewing time "240 hours” to the acquired current time (step S342), and transmits the calculated expiration date to the transmission / reception unit.
- the data is transmitted to the HD recorder 100 via 501 (step S343).
- power supply to each circuit constituting knockup device 500 is stopped via power supply unit 503 (step S344).
- the control unit 107 of the HD recorder 100 receives the expiration date of the backup device 500 via the transmission / reception unit 101, and writes the received expiration date in the selected content information (step S346).
- control unit 107 changes the backup flag of the selected content information to “1” (step S347), changes the priority to “2” (step S348), and returns to step S301.
- the main control unit 118 constituting the control unit 107 outputs an expiration date extension instruction to the time limit management unit 119.
- the expiration date management unit 119 receives the expiration date extension instruction, and sequentially selects the content information constituting the content management table 121 stored in the secure storage unit 113 one by one (step S361). . At this time, if all the content information has been selected and there is no content information to be newly selected (YES in step S362), the process of extending the validity period ends.
- step S363 If all content information has been selected (NO in step S362), the term management unit 119 reads the expiration date for the selected content information (step S363). If the expiration date is written in the selected content information (NO in step S366), the process returns to step S361 to select the next content information. If an expiration date is written in the selected content information (YES in step S366), the expiration management unit 119 next obtains the current time from the secure clock 117 (step S367), and the read expiration date The remaining time is calculated by calculating the difference between the current time and the acquired current time (step S368). When the deadline management unit 119 compares the calculated remaining time with the extended execution time “24 hours” and determines that the remaining time is 24 hours or more (NO in step S371), the process returns to step S361, and the next content Move on to information processing.
- the period management unit 119 transmits an activation instruction to the backup device 500 via the transmission / reception unit 101 (step S372). ).
- the control unit 507 of the backup device 500 receives an activation instruction via the transmission / reception unit 501, and instructs the power supply unit 503 to start supplying power.
- the power supply unit 503 starts power supply to each unit constituting the knock-up device 500 (step S373).
- control unit 507 transmits an activation notification to the HD recorder 100 via the transmission / reception unit 501 (step S374).
- step S376 If the time limit management unit 119 of the HD recorder 100 does not receive the activation notification from the backup device 500 within a predetermined time via the transmission / reception unit 101 (NO in step S376), the process returns to step S361.
- the time limit management unit 119 instructs the authentication unit 102 to perform device authentication with the backup device 500.
- the authentication unit 102 performs device authentication with the knock-up device 500 in accordance with an instruction from the time limit management unit 119 constituting the control unit 107 (step S381).
- time limit management unit 1 If device authentication by authentication unit 102 fails (NO in step S382), time limit management unit 1
- the time limit management unit 119 reads the device identifier 115 “ID—A” from the unique information storage unit 108, and reads the content ID from the selected content information ( Step S383).
- the time limit management unit 119 transmits the extension request, the read device identifier 115 “ID A”, and the content ID to the backup device 500 via the transmission / reception unit 101 (step S). 386) o
- control unit 507 of backup device 500 instructs power supply unit 503 to stop power supply, and power supply unit 503 receives transmission / reception unit 501 and Stop the power supply to each unit other than the control unit 507 (Step S391)
- control unit 507 receives the extension request, the device identifier “ID-A”, and the content ID via the transmission / reception unit 501. .
- the control unit 507 determines whether or not the received device identifier “ID-A” force is included in the permitted device identification information 551 stored in the secure information storage unit 511 (Ste S392). If it is determined that it is not included (NO in step S392), the control unit 507 transmits an error notification to the HD recorder 100 via the transmission / reception unit 501 (step S393), and stops power supply to the power supply unit 503. Instruct.
- the power supply unit 503 stops power supply to each unit other than the transmission / reception unit 501 and the control unit 507 (step S394).
- the time limit management unit 119 of the HD recorder 100 moves the process to step S361.
- step S392 if it is determined that the received device identifier “ID-A” force permitted device identification information 55 1 is included (YES in step S392), control unit 507 stores secure information storage unit 511.
- the backup information including the received content ID is selected from the stored backup management table 521 (step S396).
- control unit 507 detects the content file corresponding to the selected content information based on the received content ID, and reads the encrypted content and the encrypted content key from the detected content file (In step S397), the read cipher key content and cipher key content key are combined, and assigned to the hash function to calculate a hash value (step S398).
- control unit 507 reads the hash value included in the selected backup information (step S401), and compares the read hash value with the calculated hash value (step S402). When the two do not match (NO in step S402), the control unit 507 transmits an error notification to the HD recorder 100 via the transmission / reception unit 501 (step S403), and then to the power supply unit 503. Instruct to stop power supply.
- the power supply unit 503 stops power supply to each unit other than the transmission / reception unit 501 and the control unit 507 (step S404).
- the time limit management unit 119 of the HD recorder 100 moves the process to step S361.
- step S402 If the read hash value matches the calculated hash value (YES in step S402), the control unit 507 also acquires the current time of the secure clock power, and the viewing time “240” is obtained at the acquired current time. The expiration date is calculated by adding “time” (step S406).
- control unit 507 transmits the calculated expiration date to the HD recorder 100 via the transmission / reception unit 501 (step S407).
- the control unit 507 instructs the power supply unit 503 to stop power supply.
- the power supply unit 503 stops power supply to each unit other than the transmission / reception unit 501 and the control unit 507 (step S408).
- the time limit management unit 119 receives the expiration date from the knockup device 500 via the transmission / reception unit 101.
- the expiration date included in the selected content information is updated according to the received expiration date (step S411), and the process proceeds to step S361.
- the device authentication operation between the HD recorder 100 and the backup device 500 will be described with reference to FIGS.
- Gen () is a key generation function and Y is a system-specific parameter.
- the authentication unit 102 of the HD recorder 100 reads the public key certificate Cert—— (step S5 01), and transmits the read public key certificate Cert—A to the backup device 500 via the transmission / reception unit 101. (Step S502).
- the authentication unit 502 of the backup device 500 Upon receiving the public key certificate Cert—A, the authentication unit 502 of the backup device 500 uses the certificate authority's public key PK—CA, and uses the certificate authority signature data Sig received in the public key certificate Cert—A. —
- the signature verification algorithm V is applied to the CA to verify the signature (step S503).
- the signature verification algorithm V is the signature generated by the signature generation algorithm S. An algorithm that validates data. If the signature verification result is unsuccessful (NO in step S504), the process ends.
- step S504 If the result of the signature verification is successful (YES in step S504), the authentication unit 502 reads the CRL (step S505), and receives the certificate identification number ID received in the public key certificate Cert—A. — Judge whether or not a is registered in the read CRL (step S506). If it is determined that it is registered (YES in step S506), the process is terminated.
- the authentication unit 502 reads the public key certificate Cert—C (Step S507), and transmits the read public key certificate Cert—C to the HD recorder 100. (Step S508).
- the authentication unit 102 of the HD recorder 100 that has received the public key certificate Cert—C uses the public key PK—CA of the certificate authority to authenticate the certificate authority received in the public key certificate Cert—C.
- Signature data Sig—Signature is verified by applying signature verification algorithm V to the CA (step S509). If the signature verification fails (NO in step S510), the process ends.
- step S510 If the signature verification result is successful (YES in step S510), the authentication unit 102 reads the CRL (step S511), and the certificate identification number ID—b received in the public key certificate Cert—C is It is determined whether or not it is registered in the read CRL (step S 512). If it is determined that it is registered (YES in step S512), the process is terminated. If it is determined that it is not registered (NO in step S512), the process is continued.
- Authentication unit 502 of knock-up device 500 generates random number Cha-C (step S513) and transmits the generated random number Cha-C to HD recorder 100 (step S514).
- the authentication unit 102 of the HD recorder 100 receives the random number Cha—C, and applies the signature generation algorithm S to the received random number Cha—C using the secret key SK—A of the HD recorder 100 to sign data Sig— A is generated (step S515), and the generated signature data Sig—A is transmitted to the backup device 500 (step S516).
- the authentication unit 502 of the backup device 500 Upon receiving the signature data Sig—A, the authentication unit 502 of the backup device 500 receives the signature using the public key PK—A of the HD recorder 100 received in the public key certificate Cert—A.
- the signature verification algorithm V is applied to data Sig_A to verify the signature (step S517). If it is determined that the signature verification result is unsuccessful (NO in step S518), finish. If it is determined that the signature verification result is successful (YES in step S518), the processing is continued.
- the authentication unit 102 of the HD recorder 100 generates a random number Cha-A (step S519), and transmits the generated random number Cha_A to the backup device 500 (step S520).
- Knock-up device 500 receives random number Cha—A and generates signature data Sig—C by applying signature generation algorithm S to received random number Cha—A using private key SK—B of backup device 500. (Step S521), the generated signature data Sig-C is transmitted to the HD recorder 100 (Step S522).
- the HD recorder 100 uses the public key PK—B of the backup device 500 received in the public key certificate Cert—to the received signature data Sig_C, The signature is verified by applying the signature verification algorithm V (step S523). If it is determined that the signature verification result is failure (NO in step S524), the process is terminated.
- the HD recorder 100 sends the encrypted content stored in the information storage unit 110 to the backup device 500 to request a backup, and the knockup device 500 encrypted content received Back up.
- an expiration date is set for the encrypted content stored in the HD recorder 100 that is the transmission source of the encrypted content.
- the HD recorder 100 requests the backup device 500 to extend the expiration date before the expiration date expires.
- the HD recorder 100 sends the encrypted content that has expired from the information storage unit 110. Is deleted.
- the encrypted content stored in the knock-up device 500 can be acquired by a user operation or the like.
- the knock-up device 500 stores the permitted device identification information in advance, and the backup request, the extension request, and the restore request that have the device identifier registered in the permission identification information. Accept.
- the HD recorder 100 stores the encrypted content until the expiration date expires. It is possible to view the content.
- the HD recorder 100 deletes the stored encrypted content, thereby preventing the copy of the encrypted content from existing indefinitely.
- the rights of copyright holders can be protected.
- the backup device 500 also stores content requested for backup from the HD recorder 400. Since the HD recorder 100 can also acquire and play back the content backed up according to the instruction of the HD recorder 400, the convenience for the user can be further improved.
- the backup device 500 receives power-up instructions from the HD recorder 100 and supplies power to each component constituting the backup device 500 only during various processes. Therefore, the operation time of the hard disk unit constituting the content storage unit 510 can be suppressed to the minimum, and the risk of failure of the hard disk unit can be suppressed.
- the time limit management unit 119 deletes the content file including the encrypted content whose expiration date has passed from the information storage unit 110. Only the encrypted content key is used. It may be deleted.
- the time limit management unit 119 deletes only the encrypted content key from the information storage unit 110, and deletes the hash value and the expiration date included in the corresponding content information.
- the main control unit 118 If the hash value does not exist in the content information corresponding to the selected content button by the user's button operation while the playlist screen 211 is displayed on the monitor, the main control unit 118 The content ID included in the information is read, and the content key request and the read content ID are transmitted to the knock-up device 500 via the transmission / reception unit 101.
- Knockup device 500 receives the content key request and transmits the corresponding content key and the expiration date to HD recorder 100.
- the main control unit 118 of the HD recorder 100 receives the content key and the expiration date, instructs the encryption processing unit 109 to generate a B-encoded content key, and stores the generated encrypted content key as information. Write to part 110. Next, the encrypted content included in the content file corresponding to the content information corresponding to the selected content button is read from the information storage unit 110, and the read encrypted content and the generated encrypted content key are generated. Based on the above, a hash value is generated, and the generated hash value and the received expiration date are written in the content information. Subsequently, the encrypted content is decrypted and played back in the same manner as in the above generation process control.
- the main control unit 118 transmits an expiration date request to the backup device 500 in place of the content key request. Only when the expiration date can be received from the knock-up device 500, the received expiration date is written in the content information, and the hash value is calculated again from the encrypted content corresponding to the content information and the encrypted content key.
- the knock-up device 500 calculates the expiration date and calculates Force that transmits the expiration date to the HD recorder 100 In the HD recorder 100, the expiration date may be calculated.
- the knock-up device 500 transmits a completion notification indicating that the backup is normally completed to the HD recorder 100 instead of transmitting the expiration date.
- the main control unit 118 of the HD recorder 100 acquires the current time from 117 secure clocks, and calculates the expiration date by adding the viewing time “240 hours” to the acquired current time.
- the backup device 500 transmits an extension permission indicating that the expiration date can be extended to the HD recorder 100 instead of the expiration date.
- the time limit management unit 119 of the HD recorder 100 Upon receiving the extension permission, acquires the current time from the secure clock 117, and calculates the expiration date by adding the viewing time “240 hours” to the acquired current time.
- viewing time "240 hours” may be added to the expiration date included in each content information, and the addition result may be used as a new expiration date.
- control unit 507 constituting the knock-up device 500 does not need to have a secure clock.
- the HD recorder 100 plays back 1S encrypted content that has been extended and deleted due to the expiration date included in each content information.
- Each content may be managed according to the start date and time of the permitted period and the permitted period.
- each piece of content information constituting the content management table 121 includes the start date and time of the period during which content reproduction is permitted, instead of the expiration date.
- the main control unit 118 stores a period “240 hours” during which content reproduction is permitted.
- the backup device 500 transmits a backup completion notification indicating that the content has been backed up normally, instead of the expiration date.
- the main control unit 118 completes backup from the backup device 500 via the transmission / reception unit 101. An end notification is received, the current time is acquired from the secure clock 117, and the acquired current time is written in the content information as the start date.
- the expiration date management unit 119 acquires the current time from the secure clock 117, and transmits an extension request to the knock-up device 500 if the elapsed time from the start date is 216 hours or more.
- the time limit management unit 119 acquires the current time from the secure clock 117, and deletes the corresponding content file from the information storage unit 110 if the elapsed time of the start date / time is 240 hours or more. Delete content information.
- control unit 507 constituting the knock-up device 500 does not need to have a secure clock.
- the HD recorder 100 transmits an extension request to the backup device 500 when the time until the expiration date of each encrypted content expires is less than 24 hours.
- an extension request may be sent periodically regardless of the time until the expiration date expires.
- the content may be managed based on the number of viewing times.
- each piece of content information in the content management table 121 includes the number of effective viewing times instead of the expiration date.
- the control unit 107 subtracts 1 from the effective viewing number included in the content information corresponding to the played content.
- the knock-up device 500 transmits the number of viewing times “3” instead of the expiration date.
- the control unit 107 of the HD recorder 100 sets the received viewing count “3” as the effective viewing count.
- the HD recorder 100 deletes the content information of the effective viewing count "0" and the content file corresponding to this content information.
- the knock-up device 500 stores the permitted device identification information 551 in advance, and accepts a restore request having a device identifier having the device identifier registered in the permitted device identification information 551. However, you may decide whether to accept restore requests according to the number of copy contents.
- the encrypted content stored in the knock-up device 500 is stored.
- the content is simply called “content”
- the encrypted content stored in the playback device such as the HD recorder 100 is called copy content.
- the backup system 1 is connected to devices having content storage and playback functions.
- the control unit 507 of the knock-up device 500 stores an allowable copy number “3”, which is the number of permitted copy contents existing in each content.
- each backup information constituting the backup management table 521 stored in the secure information storage unit 511 includes the number of copies indicating the number of copy contents currently existing.
- the secure information storage unit 511 further stores a plurality of copy management tables.
- Each copy management table consists of multiple pieces of copy information.
- Each copy information also has a content ID, device identifier, and expiration date.
- the content ID is the same as one of the content IDs included in the knock-up management table 521.
- the device identifier is information for identifying an external device having a copy content indicated by the content ID.
- the expiration date is the expiration date of the copy content of the external device indicated by the device identifier.
- the control unit 507 when the control unit 507 receives a knock-up request from the HD recorder 100, as described in the first embodiment, the control unit 507 writes content, adds knock-up information, and is valid. The deadline is calculated. At this time, “1” is written in the number of copies of the added backup information.
- control unit 507 generates copy information including the received content ID, the received device identifier, and the calculated expiration date, and adds the generated copy information to the copy management table. After adding the copy information, the calculated expiration date is transmitted to the HD recorder 100.
- the main control unit 118 when recording new content, runs out of priority when the information storage unit 110 has insufficient free space.
- the encrypted content corresponding to the content information including “2” is deleted from the information storage unit 110.
- the main control unit 118 receives a copy deletion notification indicating deletion of the copy content and the deletion.
- the content ID corresponding to the copy content to be transmitted and the device identifier “ID—A” of the HD recorder 100 itself are transmitted to the backup device 500.
- the control unit 507 of the backup device 500 receives the copy deletion notification, the content ID, and the device identifier “ID-A” from the HD recorder 100.
- the copy deletion notification is received, the copy information including the received content ID and device identifier “ID—A” is deleted, and 1 is subtracted from the number of copies of the backup information including the received content ID.
- the control unit 507 of the knock-up device 500 When receiving the restore request from the external device in the restore process described above, the control unit 507 of the knock-up device 500 reads the backup information power copy number including the received content ID together with the restore request. If the number of copies read out is the allowable number of copies “3”, an error notification is sent to the HD recorder 100 indicating that the restore request cannot be accepted.
- control unit 507 performs the procedure described in Embodiment 1 to verify the hash value, generate the content key, calculate the expiration date, etc. I do. After calculating the expiration date, 1 is added to the number of copies included in the backup information including the received content ID in the backup management table 521. Next, the control unit 507 generates copy information including the received content ID, device identifier, and calculated expiration date, and adds the generated copy information to the copy management table.
- the content, the content key, and the expiration date are transmitted to the external device.
- control unit 507 selects copy information including the received content ID and device identifier, and rewrites the newly calculated expiration date with the expiration date of the selected copy information.
- the control unit 507 stores a verification time for verifying an expiration date included in each piece of copy information. When the verification time comes, the control unit 507 selects one copy information constituting the copy management table, reads the expiration date included in the selected copy information, and compares the read expiration date with the current time. If the current time is past the expiration date, the number of copies of the backup information including the content ID included in the selected copy information is reduced by one. Next, control The control unit 507 deletes the selected content information.
- the control unit 507 verifies the expiration date for all backup information in the same procedure.
- the backup device 500 stores the allowable copy number in advance, and the content to be broadcast may include the allowable copy number.
- the allowable number of copies is included in a predetermined bit of a TS packet constituting content, and the backup device 500 has received any one TS packet of the received encrypted content in the backup process. Decrypt with the content key to extract the allowable number of copies, and store the extracted number of copies in association with the received content ID.
- the control unit 107 of the HD recorder 100 extracts information indicating whether or not to allow knock-up generation from the received content, and stores the extracted information (referred to as backup information) and the content ID in association with each other. To do.
- the knock-up process indicates that the knock-up information power corresponding to the encrypted content to be knocked-up is permitted to be generated, as described in the first embodiment.
- the encrypted content is transmitted to the backup device 500 by a simple procedure. If the backup information corresponding to the encrypted content to be backed up indicates prohibition of backup, transmission is stopped.
- the common key encryption method is used for encrypting the content and content key, and the same key is used for encryption and decryption. Is not to be done.
- a public key cryptosystem such as RSA or elliptic curve cryptography may be employed, and different keys may be used for encryption and decryption.
- the key generation unit 106 of the HD recorder 100 uses one content key in the content recording processing described with reference to FIG. Instead, a pair of content encryption key and content decryption key is generated.
- the control unit 107 outputs the content received via the broadcast receiving unit 114 and the content encryption key generated by the key generation unit 106 to the encryption processing unit 109 to instruct the encryption of the content.
- the encryption processing unit 109 When the encryption processing unit 109 is instructed to encrypt the content, the encryption processing unit 109 generates an encrypted content by applying the encryption algorithm according to the public key encryption method to the content using the content encryption key.
- the encryption processing unit 109 encrypts the content decryption key using the device unique key “Key-A” instead of the content key. Create a cryptographic content key
- the encryption processing unit 109 employs a common key encryption method for encrypting the content decryption key and decrypting the encrypted content key, and uses a public key encryption method for decrypting the encrypted content. Adopt and perform encryption and decryption.
- the force described for the example in which the knock-up device 500 and the HD recorder 100 are connected via the LAN 30 is not limited to this configuration.
- a case where the knock-up device is built in the HD recorder 100 is also included in the present invention.
- the content storage unit 510 of the backup device 500 has been described as being configured from a hard disk unit, but includes a removable optical disk and an input / output unit for writing and reading information to and from the optical disk. It may be done. In this case, the user attaches and detaches the optical disk as necessary.
- a plurality of optical discs and a disc changer for automatically exchanging them are included. It may be configured.
- the present invention may be the method described above. Further, the present invention may be a computer program that realizes these methods by a computer, or may be a digital signal that also has the computer program power.
- the present invention also provides a computer-readable recording medium such as a flexible disk, hard disk, CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD ( Blu-ray Disc), semiconductor memory, etc. may be recorded. Further, the present invention may be the computer program or the digital signal recorded on these recording media.
- a computer-readable recording medium such as a flexible disk, hard disk, CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD ( Blu-ray Disc), semiconductor memory, etc.
- the present invention may be the computer program or the digital signal recorded on these recording media.
- the present invention may be configured such that the computer program or the digital signal is transmitted via an electric communication line, a wireless or wired communication line, a network represented by the Internet, a data broadcast, or the like.
- the present invention may also be a computer system including a microprocessor and a memory.
- the memory may store the computer program, and the microprocessor may operate according to the computer program.
- System L SI is an ultra-multifunctional LSI manufactured by integrating multiple components on a single chip. Specifically, it is a computer system that includes a microprocessor, ROM, RAM, and so on. Stem. A computer program is stored in the RAM. The microphone processor power By operating according to the computer program, the system LSI achieves its functions.
- ICs integrated circuits
- LSIs Integrated Circuits
- super LSIs super LSIs
- ultra LSIs may be used depending on the difference in power integration level of system LSIs.
- system LSI instead of the system LSI, it may be configured by an FPGA (Field Programmable Gate Array; CPLD) (also referred to as a complex programmable logic device) that can be programmed after being incorporated into a product.
- FPGA Field Programmable Gate Array
- CPLD Field Programmable Gate Array
- CPLD Field Programmable Gate Array
- some or all of the components that make up each device may be realized by the new technology.
- the present invention is used in industries that produce, distribute, broadcast, and use digital content, and equipment that generates content, equipment that distributes, and various electrical equipment that performs reproduction, editing, etc. Can be used continuously, continuously and repeatedly.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Television Signal Processing For Recording (AREA)
- Management Or Editing Of Information On Record Carriers (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/794,255 US8065498B2 (en) | 2005-01-07 | 2005-12-12 | Backup system, recording/reproduction device, backup device, backup method, program, and integrated circuit |
JP2006550656A JP4759522B2 (ja) | 2005-01-07 | 2005-12-12 | バックアップシステム、記録再生装置、バックアップ装置、バックアップ方法、プログラム及び集積回路 |
EP05814462A EP1840785A1 (en) | 2005-01-07 | 2005-12-12 | Backup system, recording/reproduction device, backup device, backup method, program, and integrated circuit |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005-003152 | 2005-01-07 | ||
JP2005003152 | 2005-01-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006073040A1 true WO2006073040A1 (ja) | 2006-07-13 |
Family
ID=36647525
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/022772 WO2006073040A1 (ja) | 2005-01-07 | 2005-12-12 | バックアップシステム、記録再生装置、バックアップ装置、バックアップ方法、プログラム及び集積回路 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8065498B2 (ja) |
EP (1) | EP1840785A1 (ja) |
JP (1) | JP4759522B2 (ja) |
CN (1) | CN101099158A (ja) |
WO (1) | WO2006073040A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009059232A (ja) * | 2007-08-31 | 2009-03-19 | I-O Data Device Inc | コンテンツ管理方法、そのプログラム、および記録媒体 |
Families Citing this family (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4234721B2 (ja) * | 2005-03-29 | 2009-03-04 | 株式会社東芝 | コンテンツ配信装置とユーザ端末装置と救済管理方法とコンピュータプログラム |
JP2007215162A (ja) * | 2006-01-11 | 2007-08-23 | Canon Inc | 情報処理装置及びその制御方法、プログラム、記憶媒体 |
US8042172B1 (en) * | 2006-02-02 | 2011-10-18 | Emc Corporation | Remote access architecture enabling a client to perform an operation |
JP4893040B2 (ja) * | 2006-03-17 | 2012-03-07 | ソニー株式会社 | 暗号化データ記録装置 |
US20090019492A1 (en) * | 2007-07-11 | 2009-01-15 | United Video Properties, Inc. | Systems and methods for mirroring and transcoding media content |
US20090119784A1 (en) * | 2007-11-07 | 2009-05-07 | Sony Corporation | Out of band license acquisition including content identification |
US20090300767A1 (en) * | 2008-06-02 | 2009-12-03 | Sony Corporation | Method for out of band license acquisition associated with content redistributed using link protection |
US8225109B1 (en) * | 2008-04-30 | 2012-07-17 | Netapp, Inc. | Method and apparatus for generating a compressed and encrypted baseline backup |
JP5383117B2 (ja) * | 2008-08-21 | 2014-01-08 | キヤノン株式会社 | 記録装置及びその制御方法、並びに、プログラム |
US8261030B2 (en) * | 2008-11-18 | 2012-09-04 | Microsoft Corporation | Using delete notifications to free related storage resources |
US8156300B2 (en) * | 2008-11-18 | 2012-04-10 | Microsoft Corporation | Delete notifications for an entire storage volume |
US8255641B2 (en) * | 2008-11-18 | 2012-08-28 | Microsoft Corporation | Modifying delete notifications in a storage stack |
US8412905B2 (en) * | 2009-01-01 | 2013-04-02 | Sandisk Il Ltd. | Storage system having secondary data store to mirror data |
JP4707748B2 (ja) * | 2009-03-31 | 2011-06-22 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 外部記憶デバイス、外部記憶デバイスに記憶されたデータを処理するための方法、プログラムおよび情報処理装置 |
JP5482172B2 (ja) * | 2009-12-14 | 2014-04-23 | 富士ゼロックス株式会社 | 文書利用管理システム、一時利用許可書発行装置、文書利用装置及びプログラム |
JP5931362B2 (ja) * | 2011-07-01 | 2016-06-08 | 日立マクセル株式会社 | コンテンツ送信装置及びコンテンツ送信方法 |
DE102013101508A1 (de) * | 2012-02-20 | 2013-08-22 | Denso Corporation | Datenkommunikationsauthentifizierungssystem für ein Fahrzeug, Netzkopplungsvorrichtung für ein Fahrzeug, Datenkommunikationssystem für ein Fahrzeug und Datenkommunikationsvorrichtung für ein Fahrzeug |
US8806529B2 (en) | 2012-04-06 | 2014-08-12 | Time Warner Cable Enterprises Llc | Variability in available levels of quality of encoded content |
US9285981B1 (en) | 2012-07-16 | 2016-03-15 | Wickr Inc. | Discouraging screen capture |
US9830089B1 (en) | 2013-06-25 | 2017-11-28 | Wickr Inc. | Digital data sanitization |
US10129260B1 (en) | 2013-06-25 | 2018-11-13 | Wickr Inc. | Mutual privacy management |
US10567349B2 (en) | 2013-06-25 | 2020-02-18 | Wickr Inc. | Secure time-to-live |
US9866591B1 (en) | 2013-06-25 | 2018-01-09 | Wickr Inc. | Enterprise messaging platform |
WO2015096026A1 (zh) * | 2013-12-24 | 2015-07-02 | Quasion股份有限公司 | 一种具有数据采集功能的物品防盗系统及相关方法 |
US10089380B2 (en) * | 2014-01-07 | 2018-10-02 | Samsung Electronics Co., Ltd. | Method and apparatus for operating electronic device |
US9509509B2 (en) * | 2014-02-06 | 2016-11-29 | Dropbox, Inc. | Random identifier generation for offline database |
US9698976B1 (en) | 2014-02-24 | 2017-07-04 | Wickr Inc. | Key management and dynamic perfect forward secrecy |
US9584530B1 (en) | 2014-06-27 | 2017-02-28 | Wickr Inc. | In-band identity verification and man-in-the-middle defense |
US10110382B1 (en) | 2014-09-02 | 2018-10-23 | Amazon Technologies, Inc. | Durable cryptographic keys |
US10003584B1 (en) | 2014-09-02 | 2018-06-19 | Amazon Technologies, Inc. | Durable key management |
JP6460765B2 (ja) * | 2014-12-09 | 2019-01-30 | キヤノン株式会社 | 情報処理装置、情報処理装置の制御方法、プログラム |
US9654288B1 (en) | 2014-12-11 | 2017-05-16 | Wickr Inc. | Securing group communications |
CN104506429B (zh) * | 2014-12-31 | 2018-01-09 | 瑞斯康达科技发展股份有限公司 | 一种管理路由器备份组的方法、路由器及系统 |
US9590956B1 (en) | 2015-12-18 | 2017-03-07 | Wickr Inc. | Decentralized authoritative messaging |
US10291607B1 (en) | 2016-02-02 | 2019-05-14 | Wickr Inc. | Providing real-time events to applications |
US9602477B1 (en) | 2016-04-14 | 2017-03-21 | Wickr Inc. | Secure file transfer |
US9596079B1 (en) | 2016-04-14 | 2017-03-14 | Wickr Inc. | Secure telecommunications |
US10708251B2 (en) * | 2016-08-01 | 2020-07-07 | Timothy Steiner | Portable authentication and encryption device and system |
EP3291121B1 (en) * | 2016-08-31 | 2022-04-20 | Axis AB | Restore of headless electronic device |
JP6757697B2 (ja) * | 2017-04-28 | 2020-09-23 | 株式会社日立製作所 | 制御コントローラおよび制御方法 |
CN107222883B (zh) * | 2017-07-12 | 2020-06-16 | 锐捷网络股份有限公司 | 无线控制器备份方法、备份切换方法、装置及系统 |
CN112685222A (zh) * | 2019-10-17 | 2021-04-20 | 伊姆西Ip控股有限责任公司 | 管理备份数据的方法、设备和计算机程序产品 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08263440A (ja) * | 1994-11-23 | 1996-10-11 | Xerox Corp | ディジタルワーク配給システム |
JPH11203127A (ja) * | 1998-01-09 | 1999-07-30 | Casio Comput Co Ltd | プログラム管理システム及び端末管理システムの制御方法 |
JP2001014221A (ja) * | 1999-04-27 | 2001-01-19 | Victor Co Of Japan Ltd | コンテンツ情報記録方法及びコンテンツ情報記録装置 |
JP2003030054A (ja) * | 2001-07-18 | 2003-01-31 | Sharp Corp | 記録装置およびプログラム記録媒体 |
JP2003186751A (ja) * | 2001-12-13 | 2003-07-04 | Matsushita Electric Ind Co Ltd | コンテンツ配信システム、及びコンテンツ配信システムに用いるコンテンツサーバ、並びにコンテンツ記録再生装置 |
JP2004054988A (ja) * | 2002-07-17 | 2004-02-19 | Sony Corp | 記録装置、記録方法、プログラム、プログラム記録媒体 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4044232A (en) * | 1976-01-23 | 1977-08-23 | International Business Machines Corporation | Electronic copy selection controls for a document reproduction machine |
EP1049087A3 (en) | 1999-04-27 | 2004-10-13 | Victor Company Of Japan, Ltd. | Contents information recording method, contents information recording unit, contents information record reproduction method, contents information record reproduction unit and media therefor |
EP1134670A4 (en) * | 1999-08-27 | 2006-04-26 | Sony Corp | INFORMATION TRANSMITTING SYSTEM, TRANSMITTER AND RECEIVER, INFORMATION TRANSMITTING METHOD, INFORMATION RECEIVING METHOD |
JP4269501B2 (ja) * | 2000-09-07 | 2009-05-27 | ソニー株式会社 | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
JP2002244926A (ja) | 2001-02-15 | 2002-08-30 | Matsushita Electric Ind Co Ltd | データ無効化装置 |
JP2002297452A (ja) | 2001-03-30 | 2002-10-11 | Matsushita Electric Ind Co Ltd | 記録再生装置、制御方法、及び不正防止システム |
JP4576066B2 (ja) | 2001-04-10 | 2010-11-04 | 日立コンシューマエレクトロニクス株式会社 | ディジタル信号記録再生装置、ディジタル信号記録再生方法、ディジタル信号送受信方法、及びディジタル信号送信方法 |
US20020188955A1 (en) * | 2001-06-11 | 2002-12-12 | Thompson Calvin Eugene | Digital video recording and playback system for television |
JP2004133501A (ja) | 2002-10-08 | 2004-04-30 | Sony Corp | 情報処理装置および情報処理方法、コンテンツ配信システム、記録媒体、並びに、プログラム |
JP3974538B2 (ja) * | 2003-02-20 | 2007-09-12 | 株式会社日立製作所 | 情報処理システム |
US7478096B2 (en) * | 2003-02-26 | 2009-01-13 | Burnside Acquisition, Llc | History preservation in a computer storage system |
US7580961B2 (en) * | 2004-01-21 | 2009-08-25 | Emc Corporation | Methods and apparatus for modifying a retention period for data in a storage system |
-
2005
- 2005-12-12 US US11/794,255 patent/US8065498B2/en not_active Expired - Fee Related
- 2005-12-12 CN CNA2005800461064A patent/CN101099158A/zh active Pending
- 2005-12-12 JP JP2006550656A patent/JP4759522B2/ja not_active Expired - Fee Related
- 2005-12-12 WO PCT/JP2005/022772 patent/WO2006073040A1/ja active Application Filing
- 2005-12-12 EP EP05814462A patent/EP1840785A1/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08263440A (ja) * | 1994-11-23 | 1996-10-11 | Xerox Corp | ディジタルワーク配給システム |
JPH11203127A (ja) * | 1998-01-09 | 1999-07-30 | Casio Comput Co Ltd | プログラム管理システム及び端末管理システムの制御方法 |
JP2001014221A (ja) * | 1999-04-27 | 2001-01-19 | Victor Co Of Japan Ltd | コンテンツ情報記録方法及びコンテンツ情報記録装置 |
JP2003030054A (ja) * | 2001-07-18 | 2003-01-31 | Sharp Corp | 記録装置およびプログラム記録媒体 |
JP2003186751A (ja) * | 2001-12-13 | 2003-07-04 | Matsushita Electric Ind Co Ltd | コンテンツ配信システム、及びコンテンツ配信システムに用いるコンテンツサーバ、並びにコンテンツ記録再生装置 |
JP2004054988A (ja) * | 2002-07-17 | 2004-02-19 | Sony Corp | 記録装置、記録方法、プログラム、プログラム記録媒体 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009059232A (ja) * | 2007-08-31 | 2009-03-19 | I-O Data Device Inc | コンテンツ管理方法、そのプログラム、および記録媒体 |
Also Published As
Publication number | Publication date |
---|---|
US20080022061A1 (en) | 2008-01-24 |
CN101099158A (zh) | 2008-01-02 |
US8065498B2 (en) | 2011-11-22 |
JP4759522B2 (ja) | 2011-08-31 |
JPWO2006073040A1 (ja) | 2008-06-12 |
EP1840785A1 (en) | 2007-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4759522B2 (ja) | バックアップシステム、記録再生装置、バックアップ装置、バックアップ方法、プログラム及び集積回路 | |
US7991155B2 (en) | Backup management device, backup management method, computer program, recording medium, integrated circuit, and backup system | |
TWI407748B (zh) | 傳輸數位資料於本地網路中之方法 | |
JP4778965B2 (ja) | コンテンツ再生装置、コンテンツ再生方法、コンピュータプログラム、鍵中継装置及び記録媒体 | |
JP4801055B2 (ja) | 情報セキュリティ装置 | |
US7188224B2 (en) | Content duplication management system and networked apparatus | |
US7194091B2 (en) | Content using system | |
US8225411B2 (en) | Contents management system, and contents management device | |
JP4585460B2 (ja) | 同一コンテンツから派生した形式の異なるコンテンツを複数個所で同時に利用することを防ぐ記憶装置、システム及び方法 | |
US20070283442A1 (en) | Recording/Reproduction Device And Content Protection System | |
US20080016307A1 (en) | Storage device and storing method | |
CN103947151A (zh) | 信息处理设备、信息存储设备、服务器、信息处理系统、信息处理方法以及程序 | |
JPWO2007046376A1 (ja) | 送信側の記録再生装置、受信側の記録再生装置 | |
JP2008146712A (ja) | コンテンツ記録再生装置 | |
JP4525361B2 (ja) | 個人用コンテンツの配信装置 | |
JP2010258795A (ja) | 送信装置、受信装置及びコンテンツ送受信方法 | |
WO2011105041A1 (ja) | 管理装置及び複製装置 | |
JP4564572B1 (ja) | 送信装置、受信装置及びコンテンツ送受信方法 | |
JP5168366B2 (ja) | サーバ装置、クライアント装置、及び、サーバ装置とクライアント装置を含むコンテンツ伝送システム | |
JP4379241B2 (ja) | 録画再生機器 | |
JP2010238325A (ja) | 記録装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006550656 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005814462 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11794255 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580046106.4 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2005814462 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11794255 Country of ref document: US |