WO2010116845A1 - 鍵情報管理方法、コンテンツ送信方法、鍵情報管理装置、ライセンス管理装置、コンテンツ送信システム、及び端末装置 - Google Patents
鍵情報管理方法、コンテンツ送信方法、鍵情報管理装置、ライセンス管理装置、コンテンツ送信システム、及び端末装置 Download PDFInfo
- Publication number
- WO2010116845A1 WO2010116845A1 PCT/JP2010/054125 JP2010054125W WO2010116845A1 WO 2010116845 A1 WO2010116845 A1 WO 2010116845A1 JP 2010054125 W JP2010054125 W JP 2010054125W WO 2010116845 A1 WO2010116845 A1 WO 2010116845A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- encryption
- reproduction data
- content
- encrypted
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 87
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000007726 management method Methods 0.000 title claims description 73
- 238000004891 communication Methods 0.000 abstract description 47
- 238000006243 chemical reaction Methods 0.000 description 23
- 238000010586 diagram Methods 0.000 description 16
- 238000003860 storage Methods 0.000 description 13
- 230000008569 process Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 7
- 238000009826 distribution Methods 0.000 description 5
- 230000010365 information processing Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/601—Broadcast encryption
Definitions
- the present invention relates to a key information management method, a content transmission method, a key information management device, a license management device, a content transmission system, and a terminal device.
- Patent Document 1 plaintext data is encrypted and transmitted, a part of the encryption key is stored in advance on the encryption side and the decryption side, and the remaining encryption key is transmitted via a communication network.
- a communication system is disclosed.
- Patent Document 2 the first key encrypted for content encryption is received via a communication network, the second key is obtained using a storage medium, and then the first key is stored in the first key.
- An apparatus for decrypting using a second key is disclosed.
- the present invention has been made in view of such problems, and a key information management method capable of reliably preventing unauthorized use of content when content is encrypted and transmitted using an encryption key, It is an object to provide a content transmission method, a key information management device, a license management device, a content transmission system, and a terminal device.
- a key information management method of the present invention is a key information management method for encrypting content and transmitting it to a terminal device, wherein basic key management means generates a basic key. And a key encryption step in which the basic key management means encrypts one key reproduction data of a plurality of key reproduction data for reproducing an encryption key for content encryption with a basic key. .
- the key information management method of the present invention is a key information management method for encrypting content and transmitting it to the terminal device, wherein the encryption key generation means generates an encryption key for encrypting the content.
- the content transmission method of the present invention is a content transmission method for encrypting content and transmitting it to the terminal device, wherein the basic key management means generates a basic key, and the encryption key generation means includes: An encryption key generation step for generating an encryption key for encrypting the content and generating a plurality of key reproduction data for reproducing the encryption key, and a basic key management means include one of the plurality of key reproduction data.
- the generation means includes a second transmission step of transmitting the other part of the encrypted one and other key reproduction data to the terminal device.
- a basic key is generated by the basic key management unit, and an encryption key and a plurality of key reproduction data for reproducing the encryption key are generated by the encryption key generation unit.
- the one key reproduction data is encrypted with the basic key by the basic key management means, and the other key generation data is encrypted sequentially using the one key reproduction data and the other key reproduction data by the encryption key generation means.
- the content encrypted using the encryption key and one part of the encrypted key reproduction data are transmitted to the terminal device by the transmission unit, and the other part of the key reproduction data is transmitted to the terminal device by the encryption key generation unit. Is done.
- the data for reproducing the content decryption key is divided and then encrypted and transmitted separately, a part of which is encrypted using a previously generated basic key, and the remaining part is mutually encrypted. Therefore, the risk that the key information is illegally acquired during data transmission can be reliably reduced. That is, even if a part of the data for key reproduction and a basic key generated in advance are illegally acquired, it is possible to prevent the encryption key for content decryption from being illegally used.
- a plurality of mutual encryption keys are generated as a plurality of key reproduction data
- a first mutual encryption key among the plurality of mutual encryption keys is used as a basic key
- a plurality of mutual encryption keys and encryption keys excluding the first mutual encryption key are sequentially encrypted with a plurality of mutual encryption keys including the first mutual encryption key, respectively.
- the encrypted content and one of the plurality of encrypted mutual encryption keys and encryption keys are transmitted to the terminal device, and in the second transmission step, It is preferable to transmit the encrypted mutual encryption key and the other part of the encryption key to the terminal device.
- a plurality of divided encryption keys are generated by dividing the encryption key as a plurality of key reproduction data, and in the first key encryption step, the first of the plurality of divided encryption keys is generated.
- a plurality of split encryption keys excluding the first split encryption key are converted into a plurality of split ciphers each including the first split encryption key.
- the first transmission step the encrypted content and one part of the encrypted plurality of divided encryption keys are transmitted to the terminal device, and in the second transmission step, the encryption is performed in the first transmission step. It is also preferable to transmit the other part of the plurality of divided encryption keys to the terminal device.
- the basic key management device of the present invention is a basic key management device for encrypting content and transmitting it to a terminal device, and reproduces a basic key generating means for generating a basic key and an encryption key for content encryption And key encryption means for encrypting one key reproduction data of a plurality of key reproduction data for use with a basic key.
- the license management apparatus of the present invention is a license management apparatus for encrypting content and transmitting it to the terminal device, and generates an encryption key for encrypting the content and reproduces the encryption key.
- An encryption key generating means for generating a plurality of key reproduction data, and other key reproduction data excluding one key reproduction data of the plurality of key reproduction data, respectively, one key reproduction data and another key reproduction data.
- One of key encryption means for sequentially encrypting, one key reproduction data encrypted using a specific basic key, and another key reproduction data encrypted by the key encryption means Transmitting means for transmitting the portion to the terminal device.
- the content transmission system of the present invention is a content transmission system that encrypts content and transmits it to a terminal device, and generates basic key generation means for generating a basic key and an encryption key for encrypting the content.
- encryption key generation means for generating a plurality of key reproduction data for reproducing the encryption key
- first key encryption means for encrypting one key reproduction data of the plurality of key reproduction data with a basic key
- second key encryption for encrypting the other key reproduction data excluding one key reproduction data among the plurality of key reproduction data by sequentially using the one key reproduction data and the other key reproduction data, respectively.
- Means, content encryption means for encrypting content using an encryption key, encrypted content, and one portion of the encrypted one and other key reproduction data to the terminal device Comprising a content transmitting unit that signal, the other portion of the encrypted first and other key reproduction data, and key information transmitting means for transmitting to the terminal device.
- the terminal device is a terminal device that receives and decrypts encrypted content, and includes a content encrypted using an encryption key and a plurality of encrypted key reproduction data.
- a key decrypting unit for reproducing the encryption key and a content decrypting unit for decrypting the content using the encryption key are provided.
- a basic key is generated by the basic key management unit, and a plurality of keys for reproducing the encryption key and the encryption key by the encryption key generation unit Key reproduction data is generated, one key reproduction data is encrypted with the basic key by the basic key management means, and another key generation data is sequentially converted into one key reproduction data and other key reproduction data by the encryption key generation means.
- the content transmission means encrypts the content encrypted by using the encryption key and one part of the encrypted key reproduction data to the terminal device, and the encryption key generation means transmits the other part of the key reproduction data. Is transmitted to the terminal device.
- the data for reproducing the content decryption key is divided and then encrypted and transmitted separately, a part of which is encrypted using a previously generated basic key, and the remaining part is mutually encrypted. Therefore, the risk that the key information is illegally acquired during data transmission can be reliably reduced. That is, even if a part of the data for key reproduction and a basic key generated in advance are illegally acquired, it is possible to prevent the encryption key for content decryption from being illegally used.
- unauthorized use of content can be reliably prevented when the content is encrypted and transmitted using an encryption key.
- FIG. 1 is a connection configuration diagram illustrating a content transmission system and a terminal device according to a preferred embodiment of the present invention. It is a block diagram which shows the hardware constitutions of each server of the content transmission system of FIG. It is a block diagram which shows the hardware constitutions of the terminal device of FIG. It is a block diagram which shows the function structure of the license server of FIG. It is a block diagram which shows the function structure of the basic key management server of FIG. It is a block diagram which shows the function structure of the content provision server of FIG. It is a block diagram which shows the function structure of the terminal device of FIG. It is a sequence diagram which shows operation
- FIG. 1 is a connection configuration diagram showing a content transmission system 1 and a terminal device 2 according to a preferred embodiment of the present invention.
- the terminal device 2 shown in the figure is a mobile terminal such as a mobile phone, a PDA (Personal Digital Assistance), or an information processing terminal such as a personal computer.
- the content transmission system 1 is a server group for acquiring content such as music data and image data from an external network or storage medium, encrypting the content, and distributing the content to the terminal device 2 by broadcast waves.
- the content transmission system 1 includes a license server (license management device) 3 that generates and manages an encryption key for content encryption, a customer management server 4 that manages customer information related to the user of the terminal device 2, and a reproduction of the encryption key.
- the basic key management server (basic key management device) 5 for managing the basic key for encrypting the data and the content providing server 6 for distributing the content.
- the license server 3, the customer management server 4, the basic key management server 5, and the content providing server 6 are connected via a network such as a LAN or WAN so that data communication can be performed with each other.
- the content providing server 6 is connected to the broadcast wave relay station 7 so that data can be distributed to the terminal device 2 by the broadcast wave, and the basic key management server 5 and the license server 3 are connected to the communication network NW. As a result, data can be transmitted to the terminal device 2 via the data communication network.
- the license server 3, the customer management server 4, the basic key management server 5, and the content providing server 6 may be installed in the same location, or any one of them may be installed in a different location. It may be.
- the license server 3 of the content transmission system 1 physically includes a CPU 32, a RAM 33 and a ROM 34 that are main storage devices, an auxiliary storage device 36 such as a hard disk device, an input key that is an input device, and a mouse.
- the information processing apparatus includes an input device 37 such as a display, an output device 38 such as a display, another server device, the broadcast wave relay station 7, and a communication module 35 that manages transmission and reception of data with the communication network NW. ing.
- the functions realized by the license server 3 include a communication module 35, an input device 37, and an output device 38 under the control of the CPU 32 by reading a predetermined program on hardware such as the CPU 32 and the RAM 33 shown in FIG. This is realized by reading and writing data in the RAM 33 and the auxiliary storage device 36.
- the hardware configuration of the other server apparatus of the content transmission system 1 is also the same, the description thereof is omitted.
- the terminal device 2 physically includes a CPU 22, a RAM 23 and a ROM 24 that are main storage devices, a hard disk device, an auxiliary storage device 26 such as a memory card, an input key that is an input device, a microphone, and the like.
- the information processing terminal includes an input device 27, an output device 28 such as a speaker and a display, a communication module 25A for transmitting / receiving data to / from the communication network NW, a broadcast receiving module 25B for receiving broadcast waves, and the like.
- the functions realized by the terminal device 2 include a communication module 25A, a broadcast receiving module 25B, and an input device under the control of the CPU 22 by reading a predetermined program on hardware such as the CPU 22 and the RAM 23 shown in FIG. 27, by operating the output device 28, and reading and writing data in the RAM 23 and the auxiliary storage device 26.
- the license server 3 includes, as functional components, an encryption key generation unit (encryption key generation unit) 301, a key reproduction data encryption unit (key encryption unit) 302, and a key data transmission unit 303.
- the encryption key generation unit 301 is based on the customer information regarding the user of the terminal device 2 acquired from the customer management server 4, and the encryption key K n (n is 4 or more) for encrypting the content by the common key encryption method. And a function of generating a plurality of key reproduction data for reproducing the encryption key Kn on the terminal device 2 side. Specifically, the encryption key generation unit 301 generates a plurality of mutual encryption keys K 2 to K n ⁇ 1 as key reproduction data. Note that the encryption key K n is a must have at least one key data, it may be more generated in accordance with the protection level of the contents.
- the encryption key generation unit 301 outputs a mutual encryption key K 2 of the plurality of mutual encryption key K 2 ⁇ K n-1 which generated the key data transmission unit 303, mutual encryption key K 2 ⁇ K n- 1, and it outputs the encryption key K n to the key reproduction data encryption unit 302.
- the key data transmission unit 303 transmits the mutual encryption key K 2 passed from the encryption key generation unit 301 to the basic key management server 5.
- the key data receiving unit 304 receives the mutual encryption key K 1 (K 2 ) encrypted using the basic key K 1 from the basic key management server 5 and sends it to the key reproduction data distribution unit 305. Output.
- K X (K Y) a common key encryption scheme in encrypted key K Y using the key K X.
- Key reproduction data encryption unit 302 mutual encryption key K 3 ⁇ K n-1, except for mutual encryption key K 2, and the encryption key K n, respectively, sequentially with mutual encryption key K 2 ⁇ K n-1
- the encrypted data K 2 (K 3 ), K 3 (K 4 ),..., K n ⁇ 1 (K n ) is generated.
- the key reproduction data encryption unit 302 converts any or all of the mutual encryption keys K 2 to K n-1 and the encryption key K n into key data using an arbitrary conversion algorithm according to the security level. It can also be converted into data that cannot be analyzed. In that case, the key reproduction data encryption unit 302 performs data conversion before the encryption process, and embeds additional information for notifying the terminal device 2 of the conversion algorithm in the data after the data conversion.
- the key reproduction data encryption unit 302 uses the encrypted data K 2 (K 3 ), K 3 (K 4 ),..., K n ⁇ 1 (K n ), and the encryption key Kn to be the key reproduction data transfer unit. Output to the dividing unit 305.
- the key reproduction data distribution unit 305 includes encrypted mutual encryption keys K 1 (K 2 ), K 2 (K 3 ),..., K n ⁇ 2 (K n ⁇ 1 ), and an encryption key K n ⁇ 1. It has a function of distributing (K n ) for each transmission destination. That is, the key reproduction data distribution unit 305 uses the mutual encryption key K 1 (K 2 ) and the communication network NW as a part of the keys K 1 (K 2 ),..., K n-1 (K n ). The key to be transmitted to the terminal device 2 is selected and distributed to the first data communication unit 306.
- the key reproduction data distribution unit 305 transmits the remaining remaining part of the keys K 2 (K 3 ),..., K n ⁇ 1 (K n ) to the terminal device 2 via the broadcast wave. It is selected as should do key distributed to the second data communication unit 307 together with the encryption key K n.
- key data transmission is a communication method when a fixed allocation method or a communication network and broadcast wave traffic are monitored and a large band on the broadcast wave is allocated for content transmission. It is possible to adopt a method of managing dynamically such that a large amount is assigned to the network side, a method of randomly assigning, or the like.
- the first data communication unit 306 transmits the mutual encryption key K 1 (K 2 ) and the key to be transmitted via the communication network NW to the terminal device 2 via the communication network NW.
- the second data communication unit 307 transmits the encryption key Kn and the key to be transmitted to the terminal device 2 via the broadcast wave to the content providing server 6.
- the basic key management server 5 includes a basic key generation unit (basic key generation unit) 501, a basic key transmission unit 502, a key data reception unit 503, and a key data encryption unit (key encryption unit) 504. , And a key data transmission unit 505.
- Basic key generation unit 501 generates a basic key K 1 is the key data required for the terminal device 2 receives the provision of broadcasting services.
- the basic key generation unit 501 outputs the generated basic key K 1 to the basic key transmission unit 502 and the key data encryption unit 504, and the basic key transmission unit 502 outputs the basic key K 1 to the terminal device 2.
- a transmission method to the terminal device 2 in addition to a method of transmitting to the terminal device 2 via the communication network NW, output to a recording medium such as an IC card and the terminal device 2 via the recording medium.
- a short-distance wireless communication such as a storage medium, infrared communication, Bluetooth communication, and the like.
- the key data reception unit 503 receives the mutual encryption key K 2 from the license server 3, key data encryption unit 504 to encrypt the common key encrypted using the mutual encryption key K 2 with basic key K 1 To generate encrypted data K 1 (K 2 ). Then, the key data transmission unit 505 returns the encrypted data K 1 (K 2 ) generated by the key data encryption unit 504 to the license server 3.
- the content providing server 6 includes a key data receiving unit 601, a content encryption unit 602, and a data communication unit 603 as shown in FIG.
- the keys are received from the license server 3, and the keys are output to the content encryption unit 602 and the data communication unit 603, respectively.
- Content encryption unit 602 encrypts the content C to be transmitted to the terminal device 2 by using the encryption key K n, to generate encrypted data K n (C). Further, the data communication unit 603 transmits the encrypted data K n (C) and the key K 2 (K 3 ),..., K n ⁇ 1 (K n ) to the terminal device 2 via a broadcast wave. The power key is transmitted to the terminal device 2 via the broadcast wave.
- the data communication unit 603 may transmit the encrypted data K n (C) simultaneously with the key to be transmitted to the terminal device 2 via the broadcast wave using the same broadcast wave channel. For example, the key to be transmitted to the terminal device 2 via the broadcast wave on the control channel and the encrypted data K n (C) on the data channel may be transmitted separately.
- the data communication unit 603 may transmit additional information in which information related to content decoding or reproduction is described.
- the information related to the reproduction of the content may include information for specifying the content such as the content number, information for specifying the terminal device such as the manufacturing number of the terminal device, the number of times of reproduction, information regarding the reproduction restriction, and the like.
- the terminal device 2 includes a data communication unit (second receiving unit) 203, a license information acquisition unit (second receiving unit), a basic key storage unit 205, and a content receiving unit (first receiving unit).
- (Means) 201 a decryption information receiving unit (first receiving unit) 202, an encryption key reproducing unit (key decrypting unit) 206, and a content decrypting unit (content decrypting unit) 207.
- the data communication unit 203 receives various data from the license server 3 and the basic key management server 5 via the communication network NW. Specifically, the data communication unit 203 obtains a communication network NW from the mutual encryption key K 1 (K 2 ) and the keys K 2 (K 3 ),..., K n ⁇ 1 (K n ) from the license server 3. The key to be transmitted is received and output to the license information acquisition unit 204, and the license information acquisition unit 204 outputs the key data to the encryption key reproduction unit 206.
- the content receiving unit 201 receives the encrypted content K n (C) from the content providing server 6 via the broadcast wave, and outputs it to the content decrypting unit 207.
- the decryption information receiving unit 202 sends the key to be transmitted from the content providing server 6 via the broadcast wave via the broadcast wave among the keys K 2 (K 3 ),..., K n-1 (K n ). And outputs the received key data to the encryption key reproducing unit 206.
- the basic key storage unit 205 is a data storage area for storing the basic key K 1 shared with the basic key management server 5 in advance.
- the basic key K 1 is or are transmitted through the communication network NW from the basic key management server 5, it is stored in or read via the recording medium or another terminal device.
- the encryption key reproducing unit 206 converts the encrypted mutual encryption keys K 1 (K 2 ) to K n-2 (K n-1 ) and the encryption key K n-1 (K n ) into the decryption information receiving unit 202.
- the mutual encryption key K 2 is reproduced by decrypting the mutual encryption key K 1 (K 2 ) received from the license information acquisition unit 204 using the basic key K 1 read from the basic key storage unit 205.
- the encryption key reproducing unit 206 reproduces the mutual encryption key K 3 decrypts the mutual encryption key K 2 (K 3) by using the mutual encryption key K 2.
- the encryption key reproducing unit 206 mutually uses the mutual encryption keys K 3 ,..., K n-1 to mutually use the mutual encryption keys K 3 (K 4 ), ..., K n-2 (K n-1 ),
- the encryption key K n is obtained by sequentially decrypting the encryption key K n ⁇ 1 (K n ).
- the encryption key reproduction unit 206 outputs the reproduced encryption key Kn to the content decryption unit 207.
- the encryption key reproducing unit 206 uses the corresponding conversion algorithm to change the mutual encryption key K 3 to K n ⁇ 1 and the encryption key K n are converted.
- the encryption key reproducing unit 206 specifies the corresponding conversion algorithm by referring to the additional information added to the key data.
- the additional information includes information for checking the alteration of the key to be used next, the encryption key reproducing unit 206 also executes a key data alteration check process.
- Content decryption unit 207 decrypts the encrypted content K n (C) using an encryption key K n reproduced, resulting content K n for reproducing the content of music and video for playback Deliver it to the application program.
- the content decrypting unit 207 extracts the information and delivers it to the content reproduction program.
- FIG. 8 is a sequence diagram illustrating an operation at the time of content transmission of the content transmission system 1.
- basic key K 1 for the terminal device 2 receives the provision of broadcasting services is generated by the basic key management server 5 (step S101).
- basic key K 1 generated is transmitted to the terminal device 2 (step S102), and stored in the basic key storage unit 205 of the terminal device 2 (step S103).
- step S104 the license server 3, the encryption key K n, and after the mutual encryption key K 2 ⁇ K n-1 for reproducing an encryption key K n is generated, mutual encryption key K 2 has the basic key management server 5 It is transmitted (step S104).
- the mutual key K 2 is encrypted by the basic key K 1 by the basic key management server 5 (step S105), and the generated encrypted key data K 1 (K 2 ) is returned to the license server 3. (Step S106).
- the remaining mutual encryption keys K 3 to K n-1 and encryption key K n are encrypted by the license server 3 using the mutual encryption keys K 2 to K n-1 in order.
- Encryption key data K 2 (K 3 ),..., K n-1 (K n ) is generated (step S107).
- the encryption key K n and the encryption key data K 2 (K 3 ),..., K n ⁇ 1 (K n ) are transmitted to the terminal device 2 via the broadcast wave.
- the key to be transmitted is sent (step S108).
- the content providing server 6, the content C is encrypted using the encryption key K n, encrypted content K n (C), and via a broadcast wave encryption to be transmitted to the terminal apparatus 2
- the key data is transmitted to the terminal device 2 via the broadcast wave (step S109).
- the communication server NW of the encryption key data K 1 (K 2 ) and the encryption key data K 2 (K 3 ),..., K n-1 (K n ) is transferred from the license server 3 to the terminal device 2.
- the key to be transmitted is transmitted (step S110).
- the terminal device 2 verifies whether all of the encryption key data K 1 (K 2 ),..., K n ⁇ 1 (K n ) are available (step S111). As a result of this verification, if all the encryption key data are available (step S111; YES), the encryption key data K 1 (K 2 ) is decrypted using the basic key K 1 (step S112). . Thereafter, the encrypted key data K 2 (K 3), ... , cipher key K n is regenerated by K n-1 (K n) is sequentially decoded, encrypted content K n (C) is encrypted It is decoded using the key K n (step S113).
- FIG 9 is a conceptual diagram showing the flow of encryption processing and decryption processing of the encryption key K n for content encryption by the above-described content transmission method.
- the encryption key K n is the encryption key K n through the conversion algorithm X 'is converted to the converted encryption key K n' is the additional information n-1 includes information specifying a conversion algorithm X
- the encrypted key data K n-1 (K n ′) is generated by encryption using the encryption key K n ⁇ 1 converted by the conversion algorithm n ⁇ 1, and the terminal device 2 Sent to.
- the mutual encryption key K m (m is an integer of 2 to n ⁇ 1) is encrypted using the mutual encryption key K m ⁇ 1 converted by the conversion algorithm m ⁇ 1, and the encrypted key data K m ⁇ 1 (K m ) is generated and transmitted to the terminal device 2.
- the transmitted encryption key data K m-1 (K m ) is decrypted by using the mutual encryption key K m-1 that has already been decrypted and then converted by the conversion algorithm m-1, so that the mutual encryption key K m and additional information m ⁇ 1 are restored. Thereafter, by sequentially decrypting, the encrypted key data K n ⁇ 1 (K n ′) is decrypted using the mutual decryption key K n ⁇ 1 converted using the conversion algorithm n ⁇ 1. The encryption key K n ′ and the additional information n ⁇ 1 are restored. Finally, the encryption key K n ′ is inversely converted using the conversion algorithm X specified by the additional information n ⁇ 1, and the encryption key K n is reproduced.
- basic by the key management server 5 basic key K 1 is generated, by the license server 3 cipher key K n, and the plurality of to reproduce the encryption key K n
- the mutual encryption keys K 2 to K n-1 are generated, the mutual encryption key K 2 is encrypted with the basic key K 1 by the basic key management server 5, and the mutual encryption keys K 3 to K n-1 and the license server 3 encryption key K n is encrypted sequentially with K 2 ⁇ K n-1, the content providing server 6, the encrypted content K n (C) and the encrypted key data K 2 (K 3), ...
- K n ⁇ 1 (K n ) are transmitted to the terminal device 2, and the license server 3 encrypts the encrypted key data K 1 (K 2 ) and the encrypted key data K 2 (K 3 ),.
- K n- Other parts of the (K n) is transmitted to the terminal device 2.
- the data for reproducing the content decryption key is divided and encrypted and transmitted separately via the communication network and the broadcast network, and a part of the data is encrypted using the previously generated basic key. Since the remaining portions are encrypted using each other as an encryption key, it is possible to reliably reduce the risk that the key information is illegally acquired during data transmission.
- the plurality of encrypted mutual encryption keys K 2 to K n ⁇ 1 and encryption key K n are divided and transmitted to the terminal device 2, and a part thereof is encrypted with the basic key K 1 , and the remaining Since the parts are mutually encrypted, even if a part of the data for key reproduction and the basic key generated in advance are illegally acquired, the encryption key for content decryption is prevented from being illegally used. I can do it. Furthermore, there is an advantage that the process of reproducing the encryption key is not complicated while preventing unauthorized use of the content.
- the encryption key generation unit 301 generates an encryption key K Z for encrypting the content C, and also divides the encryption key K Z as a plurality of key reproduction data to generate a plurality of divided encryption keys K 2 to K. n may be generated.
- the encryption key generation unit 301 outputs the divided encryption key K 2 of the plurality of divided encryption keys K 2 ⁇ K n that generated the key data transmission unit 303, a key a mutual encryption key K 2 ⁇ K n
- the data is output to the reproduction data encryption unit 302.
- the encryption Kagidoro Seibu 301 may generate a plurality of divided encryption keys K 2 ⁇ K n and it divides the encryption key K Z, it may be divided after certain conversion.
- FIG. 10 is a sequence diagram showing the operation of the content transmission system 1 in this case.
- step S201 basic key K 1 is shared between the basic key management server 5 and the terminal device 2 (steps S201 ⁇ S203). Then, the license server 3, after the encryption key K Z, and split encryption key K 2 ⁇ K n for reproducing an encryption key K Z generated, divided cryptographic key K 2 is transmitted to the basic key management server 5 (Step S204). In response to this, the divided key K 2 is encrypted with the basic key K 1 by the basic key management server 5 (step S205), and the generated encrypted key data K 1 (K 2 ) is returned to the license server 3. (Step S206).
- the license server 3 encrypts the remaining divided encryption keys K 3 to K n by using the divided encryption keys K 2 to K n ⁇ 1 in order, and the encrypted key data K 2 (K 3 ), ..., K n-1 (K n ) is generated (step S207). Then, the license server 3 transmits the encryption key K Z and the encryption key data K 2 (K 3 ),..., K n ⁇ 1 (K n ) to the terminal device 2 via the broadcast wave. The key to be sent is sent (step S208). On the other hand, the content providing server 6 encrypts the content C using the encryption key K Z , and the encrypted content K Z (C) and the encryption to be transmitted to the terminal device 2 via the broadcast wave.
- the activation key data is transmitted to the terminal device 2 via the broadcast wave (step S209). Further, the communication server NW of the encryption key data K 1 (K 2 ) and the encryption key data K 2 (K 3 ),..., K n-1 (K n ) is transferred from the license server 3 to the terminal device 2. The key to be transmitted is transmitted (step S210).
- the terminal device 2 verifies whether all of the encryption key data K 1 (K 2 ),..., K n ⁇ 1 (K n ) are available (step S211). As a result of this verification, if all the encryption key data are available (step S211; YES), the encryption key data K 1 (K 2 ) is decrypted using the basic key K 1 (step S212). . Then, after all the divided encryption keys K 2 to K n are reproduced by sequentially decrypting the encryption key data K 2 (K 3 ),..., K n-1 (K n ), the divided encryption key K encryption key K Z by 2 ⁇ K n are combined is reproduced, encrypted content K n (C) is decrypted using the encryption key K Z (step S213).
- FIG 11 is a conceptual diagram showing the flow of encryption processing and decryption processing of the encryption key K Z for content encryption by the above-described content transmission method.
- the divided encryption keys K 2 to Kn are generated by dividing the encryption key K Z after being converted by the conversion algorithm X.
- encryption key data K n ⁇ 1 (K n ) is generated and transmitted to the terminal device 2.
- the divided encryption key K m (m is an integer of 2 to n ⁇ 1) is encrypted using the divided encryption key K m ⁇ 1 converted by the conversion algorithm m ⁇ 1, and the encrypted key data K m ⁇ 1 (K m ) is generated and transmitted to the terminal device 2.
- the transmitted encryption key data K m-1 (K m ) is decrypted by using the divided encryption key K m-1 that has already been decrypted and then converted by the conversion algorithm m-1, so that the split encryption key K m and additional information m ⁇ 1 are restored. Thereafter, by sequentially decrypting, the encrypted key data K n-1 (K n ) is decrypted using the divided decryption key K n-1 converted using the conversion algorithm n-1, thereby dividing the encrypted key data K n-1 (K n ). encryption key K n and additional information n-1 is restored. Finally, the key data obtained by combining the divided encryption keys K 2 to K n is inversely converted using the conversion algorithm X specified by the additional information n ⁇ 1, and the encryption key K Z is reproduced. .
- a plurality of encrypted divided encryption keys K 2 to Kn are transmitted separately, a part of which is encrypted with the basic key K 1 , and the remaining parts are mutually Since it is encrypted, it is possible to prevent the content decryption encryption key from being illegally used even if a part of the data for key reproduction and the basic key generated in advance are illegally obtained. Furthermore, since the encryption key ZZ for content decryption is not directly exchanged between the content transmission system 1 and the terminal device 2, the risk of unauthorized acquisition of the encryption key can be further reduced.
- the present invention is intended for use in a key information management method, a content transmission method, a key information management device, a license management device, a content transmission system, and a terminal device, and when content is encrypted and transmitted using an encryption key, Unauthorized use can be surely prevented.
- first data Communication unit key information transmission unit
- Basic key generation unit basic key generation unit
- 504... Key data encryption unit key encryption unit
- 602... Content encryption unit content encryption
- 603 ... communication unit content transmitting means
- K 1 ... basic key K 2 ⁇ K n-1 ... mutual encryption key
- splitting the encryption key key reproduction data
- K n ... split encryption key encryption key
- K Z ... encryption key, C ... content.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
Claims (9)
- コンテンツを暗号化して端末装置に送信するための鍵情報管理方法であって、
基本鍵管理手段が、基本鍵を生成する基本鍵生成ステップと、
基本鍵管理手段が、前記コンテンツ暗号化用の暗号鍵を再生するための複数の鍵再生データのうちの一の鍵再生データを、基本鍵で暗号化する鍵暗号化ステップと、
を備えることを特徴とする鍵情報管理方法。 - コンテンツを暗号化して端末装置に送信するための鍵情報管理方法であって、
暗号鍵生成手段が、前記コンテンツを暗号化するための暗号鍵を生成するとともに、前記暗号鍵を再生するための複数の鍵再生データを生成する暗号鍵生成ステップと、
暗号鍵生成手段が、前記複数の鍵再生データのうちの一の鍵再生データを除く他の鍵再生データを、それぞれ、前記一の鍵再生データ及び前記他の鍵再生データを順次用いて暗号化する鍵暗号化ステップと、
暗号鍵生成手段が、特定の基本鍵を用いて暗号化された前記一の鍵再生データと、前記第2の鍵暗号化ステップで暗号化された前記他の鍵再生データとのうちの一の部分を、前記端末装置に送信する送信ステップと、
を備えることを特徴とする鍵情報管理方法。 - コンテンツを暗号化して端末装置に送信するコンテンツ送信方法であって、
基本鍵管理手段が、基本鍵を生成する基本鍵生成ステップと、
暗号鍵生成手段が、前記コンテンツを暗号化するための暗号鍵を生成するとともに、前記暗号鍵を再生するための複数の鍵再生データを生成する暗号鍵生成ステップと、
基本鍵管理手段が、前記複数の鍵再生データのうちの一の鍵再生データを基本鍵で暗号化する第1の鍵暗号化ステップと、
暗号鍵生成手段が、前記複数の鍵再生データのうちの前記一の鍵再生データを除く他の鍵再生データを、それぞれ、前記一の鍵再生データ及び前記他の鍵再生データを順次用いて暗号化する第2の鍵暗号化ステップと、
コンテンツ暗号化手段が、前記コンテンツを前記暗号鍵を用いて暗号化するコンテンツ暗号化ステップと、
コンテンツ送信手段が、暗号化された前記コンテンツと、暗号化された前記一及び他の鍵再生データのうちの一の部分とを、前記端末装置に送信する第1の送信ステップと、
暗号鍵生成手段が、暗号化された前記一及び他の鍵再生データのうちの他の部分を、前記端末装置に送信する第2の送信ステップと、
を備えることを特徴とするコンテンツ送信方法。 - 前記暗号鍵生成ステップでは、前記複数の鍵再生データとして複数の相互暗号鍵を生成し、
前記第1の鍵暗号化ステップでは、前記複数の相互暗号鍵のうちの第1の相互暗号鍵を、前記基本鍵で暗号化し、
前記第2の鍵暗号化ステップでは、前記第1の相互暗号鍵を除く前記複数の相互暗号鍵及び前記暗号鍵を、それぞれ、前記第1の相互暗号鍵を含む前記複数の相互暗号鍵で順次暗号化し、
前記第1の送信ステップでは、暗号化された前記コンテンツと、暗号化された前記複数の相互暗号鍵及び前記暗号鍵のうちの一の部分とを、前記端末装置に送信し、
前記第2の送信ステップでは、暗号化された前記複数の相互暗号鍵及び前記暗号鍵のうちの他の部分を、前記端末装置に送信する、
ことを特徴とする請求項3記載のコンテンツ送信方法。 - 前記暗号鍵生成ステップでは、前記複数の鍵再生データとして、前記暗号鍵を分割することにより複数の分割暗号鍵を生成し、
前記第1の鍵暗号化ステップでは、前記複数の分割暗号鍵のうちの第1の分割暗号鍵を、前記基本鍵で暗号化し、
前記第2の鍵暗号化ステップでは、前記第1の分割暗号鍵を除く前記複数の分割暗号鍵を、それぞれ、前記第1の分割暗号鍵を含む前記複数の分割暗号鍵で順次暗号化し、
前記第1の送信ステップでは、暗号化された前記コンテンツと、暗号化された前記複数の分割暗号鍵の一の部分とを、前記端末装置に送信し、
前記第2の送信ステップでは、暗号化された前記複数の分割暗号鍵の他の部分を、前記端末装置に送信する、
ことを特徴とする請求項3記載のコンテンツ送信方法。 - コンテンツを暗号化して端末装置に送信するための基本鍵管理装置であって、
基本鍵を生成する基本鍵生成手段と、
前記コンテンツ暗号化用の暗号鍵を再生するための複数の鍵再生データのうちの一の鍵再生データを、基本鍵で暗号化する鍵暗号化手段と、
を備えることを特徴とする鍵情報管理装置。 - コンテンツを暗号化して端末装置に送信するためのライセンス管理装置であって、
前記コンテンツを暗号化するための暗号鍵を生成するとともに、前記暗号鍵を再生するための複数の鍵再生データを生成する暗号鍵生成手段と、
前記複数の鍵再生データのうちの一の鍵再生データを除く他の鍵再生データを、それぞれ、前記一の鍵再生データ及び前記他の鍵再生データを順次用いて暗号化する鍵暗号化手段と、
特定の基本鍵を用いて暗号化された前記一の鍵再生データと、前記鍵暗号化手段によって暗号化された前記他の鍵再生データとのうちの一の部分を、前記端末装置に送信する送信手段と、
を備えることを特徴とするライセンス管理装置。 - コンテンツを暗号化して端末装置に送信するコンテンツ送信システムであって、
基本鍵を生成する基本鍵生成手段と、
前記コンテンツを暗号化するための暗号鍵を生成するとともに、前記暗号鍵を再生するための複数の鍵再生データを生成する暗号鍵生成手段と、
前記複数の鍵再生データのうちの一の鍵再生データを基本鍵で暗号化する第1の鍵暗号化手段と、
前記複数の鍵再生データのうちの前記一の鍵再生データを除く他の鍵再生データを、それぞれ、前記一の鍵再生データ及び前記他の鍵再生データを順次用いて暗号化する第2の鍵暗号化手段と、
前記コンテンツを前記暗号鍵を用いて暗号化するコンテンツ暗号化手段と、
暗号化された前記コンテンツと、暗号化された前記一及び他の鍵再生データのうちの一の部分とを、前記端末装置に送信するコンテンツ送信手段と、
暗号化された前記一及び他の鍵再生データのうちの他の部分を、前記端末装置に送信する鍵情報送信手段と、
を備えることを特徴とするコンテンツ送信システム。 - 暗号化されたコンテンツを受信して復号する端末装置であって、
暗号鍵を用いて暗号化された前記コンテンツと、暗号化された複数の鍵再生データのうちの一の部分の鍵再生データとを受信する第1の受信手段と、
前記暗号化された複数の鍵再生データのうちの他の部分の鍵再生データを受信する第2の受信手段と、
前記暗号化された前記複数の鍵再生データのうちの一の鍵再生データを基本鍵を用いて復号した後に、前記複数の鍵再生データを相互に用いて、前記一の鍵再生データを除く前記複数の鍵再生データを順次復号することにより、前記暗号鍵を再生する鍵復号手段と、
前記コンテンツを前記暗号鍵を用いて復号するコンテンツ復号手段と、
を備えることを特徴とする端末装置。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BRPI1013381A BRPI1013381A2 (pt) | 2009-03-30 | 2010-03-11 | método de gerenciamento de informação de chave, método de transmissão de conteúdo, aparelho de gerenciamento de informação de chave, aparelho de gerenciamento de licença, sistema de transmissão de conteúdo, e aparelho de terminal |
CN2010800144296A CN102369686A (zh) | 2009-03-30 | 2010-03-11 | 密钥信息管理方法、内容发送方法、密钥信息管理装置、许可管理装置、内容发送系统以及终端装置 |
US13/260,810 US20120076300A1 (en) | 2009-03-30 | 2010-03-11 | Key information management method, content transmission method, key information management apparatus, license management apparatus, content transmission system, and terminal apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009-081793 | 2009-03-30 | ||
JP2009081793A JP5255499B2 (ja) | 2009-03-30 | 2009-03-30 | 鍵情報管理方法、コンテンツ送信方法、鍵情報管理装置、ライセンス管理装置、コンテンツ送信システム、及び端末装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010116845A1 true WO2010116845A1 (ja) | 2010-10-14 |
Family
ID=42936132
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/054125 WO2010116845A1 (ja) | 2009-03-30 | 2010-03-11 | 鍵情報管理方法、コンテンツ送信方法、鍵情報管理装置、ライセンス管理装置、コンテンツ送信システム、及び端末装置 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20120076300A1 (ja) |
JP (1) | JP5255499B2 (ja) |
KR (1) | KR20110132422A (ja) |
CN (1) | CN102369686A (ja) |
BR (1) | BRPI1013381A2 (ja) |
PE (1) | PE20120883A1 (ja) |
WO (1) | WO2010116845A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10581856B2 (en) | 2015-01-19 | 2020-03-03 | Nokia Technologies Oy | Method and apparatus for heterogeneous data storage management in cloud computing |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014063361A1 (en) * | 2012-10-26 | 2014-05-01 | Nokia Corporation | Methods and apparatus for data access control |
US10454671B2 (en) * | 2014-10-15 | 2019-10-22 | Verimatrix, Inc. | Securing communication in a playback device with a control module using a key contribution |
US10027715B2 (en) | 2015-06-03 | 2018-07-17 | Samsung Electronics Co., Ltd. | Electronic device and method for encrypting content |
CN106599698B (zh) * | 2015-10-19 | 2019-09-20 | 腾讯科技(深圳)有限公司 | 一种加密图片、解密图片的方法和装置 |
CN108260125B (zh) * | 2018-01-19 | 2020-09-18 | 北京工业大学 | 一种基于d2d通信的内容分发应用的密钥分发方法 |
US11025413B2 (en) | 2018-09-04 | 2021-06-01 | International Business Machines Corporation | Securing a storage network using key server authentication |
US11038671B2 (en) | 2018-09-04 | 2021-06-15 | International Business Machines Corporation | Shared key processing by a storage device to secure links |
US11088829B2 (en) | 2018-09-04 | 2021-08-10 | International Business Machines Corporation | Securing a path at a node |
US11991273B2 (en) * | 2018-09-04 | 2024-05-21 | International Business Machines Corporation | Storage device key management for encrypted host data |
US11038698B2 (en) | 2018-09-04 | 2021-06-15 | International Business Machines Corporation | Securing a path at a selected node |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002261746A (ja) * | 2000-12-28 | 2002-09-13 | Sony Corp | 配信方法及び配信システム |
JP2003152698A (ja) * | 2001-11-15 | 2003-05-23 | Nippon Hoso Kyokai <Nhk> | コンテンツ利用制御送信方法、コンテンツ利用制御受信方法およびコンテンツ利用制御送信装置、コンテンツ利用制御受信装置ならびにコンテンツ利用制御送信プログラム、コンテンツ利用制御受信プログラム |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS60183842A (ja) * | 1984-03-02 | 1985-09-19 | Toshiba Corp | 伝送方式 |
US4780905A (en) * | 1984-11-26 | 1988-10-25 | Nightwatch, Inc. | Computer data encryption system |
US5764772A (en) * | 1995-12-15 | 1998-06-09 | Lotus Development Coporation | Differential work factor cryptography method and system |
JPH10336128A (ja) * | 1997-05-29 | 1998-12-18 | Mitsubishi Electric Corp | ディジタル放送のスクランブルシステム |
GB2342022B (en) * | 1997-07-28 | 2002-12-18 | Director Government Comm Headq | Split-key cryptographic system and method |
US6185685B1 (en) * | 1997-12-11 | 2001-02-06 | International Business Machines Corporation | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same |
US7095852B2 (en) * | 1998-02-13 | 2006-08-22 | Tecsec, Inc. | Cryptographic key split binder for use with tagged data elements |
JPH11298470A (ja) * | 1998-04-16 | 1999-10-29 | Hitachi Ltd | 鍵の配布方法およびシステム |
JP3565715B2 (ja) * | 1998-07-02 | 2004-09-15 | 松下電器産業株式会社 | 放送システムと放送送受信装置 |
EP1075108A1 (en) * | 1999-07-23 | 2001-02-07 | BRITISH TELECOMMUNICATIONS public limited company | Cryptographic data distribution |
DE10129285C2 (de) * | 2001-06-18 | 2003-01-09 | Hans-Joachim Mueschenborn | Verschlüsselungsverfahren mit beliebig wählbaren Einmalschlüsseln |
JP3841337B2 (ja) * | 2001-10-03 | 2006-11-01 | 日本放送協会 | コンテンツ送信装置、コンテンツ受信装置およびコンテンツ送信プログラム、コンテンツ受信プログラム |
US20060034456A1 (en) * | 2002-02-01 | 2006-02-16 | Secure Choice Llc | Method and system for performing perfectly secure key exchange and authenticated messaging |
US8989390B2 (en) * | 2005-12-12 | 2015-03-24 | Qualcomm Incorporated | Certify and split system and method for replacing cryptographic keys |
DE102008021933B4 (de) * | 2008-05-02 | 2011-04-07 | Secutanta Gmbh | Verfahren zur Bestimmung einer Kette von Schlüsseln, Verfahren zur Übertragung einer Teilkette der Schlüssel, Computersystem und Chipkarte I |
-
2009
- 2009-03-30 JP JP2009081793A patent/JP5255499B2/ja not_active Expired - Fee Related
-
2010
- 2010-03-11 US US13/260,810 patent/US20120076300A1/en not_active Abandoned
- 2010-03-11 CN CN2010800144296A patent/CN102369686A/zh active Pending
- 2010-03-11 KR KR1020117022931A patent/KR20110132422A/ko active IP Right Grant
- 2010-03-11 PE PE2011001736A patent/PE20120883A1/es not_active Application Discontinuation
- 2010-03-11 WO PCT/JP2010/054125 patent/WO2010116845A1/ja active Application Filing
- 2010-03-11 BR BRPI1013381A patent/BRPI1013381A2/pt not_active IP Right Cessation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002261746A (ja) * | 2000-12-28 | 2002-09-13 | Sony Corp | 配信方法及び配信システム |
JP2003152698A (ja) * | 2001-11-15 | 2003-05-23 | Nippon Hoso Kyokai <Nhk> | コンテンツ利用制御送信方法、コンテンツ利用制御受信方法およびコンテンツ利用制御送信装置、コンテンツ利用制御受信装置ならびにコンテンツ利用制御送信プログラム、コンテンツ利用制御受信プログラム |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10581856B2 (en) | 2015-01-19 | 2020-03-03 | Nokia Technologies Oy | Method and apparatus for heterogeneous data storage management in cloud computing |
Also Published As
Publication number | Publication date |
---|---|
CN102369686A (zh) | 2012-03-07 |
PE20120883A1 (es) | 2012-07-28 |
JP2010239174A (ja) | 2010-10-21 |
JP5255499B2 (ja) | 2013-08-07 |
BRPI1013381A2 (pt) | 2016-03-29 |
KR20110132422A (ko) | 2011-12-07 |
US20120076300A1 (en) | 2012-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5255499B2 (ja) | 鍵情報管理方法、コンテンツ送信方法、鍵情報管理装置、ライセンス管理装置、コンテンツ送信システム、及び端末装置 | |
JP3086887B2 (ja) | 情報伝達方法、情報発信方法、情報再生方法及び通信装置 | |
EP1452027B1 (en) | Access to encrypted broadcast content | |
US7251330B2 (en) | Content playback system, content playback method, content playback requesting apparatus, and temporary playback apparatus | |
CN1950777B (zh) | 内容流的完整性保护 | |
EP2040411B1 (en) | Terminal device, server device, and content distribution system | |
CN1728633B (zh) | 提供访问加密内容的方法和设备及产生加密内容包的方法 | |
CN101268651B (zh) | 用于流式多媒体内容的权限管理系统 | |
JP2008516548A (ja) | コンテンツ暗号化方法、これを利用したネットワークによるコンテンツ提供システム及びその方法 | |
CN101394280B (zh) | 移动终端及其数据业务消息的保护方法 | |
CN101496327A (zh) | 用于流式多媒体内容的权限管理系统 | |
WO2007007764A1 (ja) | ライセンス管理装置及び方法 | |
KR100826522B1 (ko) | 이동통신 시스템에서 동적 암호화 장치 및 방법 | |
JP2001211442A (ja) | コンテンツ情報伝送方法、コンテンツ情報記録方法、コンテンツ情報伝送装置、コンテンツ情報記録装置、伝送媒体、及び記録媒体 | |
KR101424972B1 (ko) | 모바일 카드를 이용한 컨텐츠 사용 방법, 호스트 장치, 및모바일 카드 | |
JP2004303108A (ja) | ライセンス移動機能付き端末装置 | |
JP2003229846A (ja) | 著作権保護システム、デジタル情報処理装置および著作権保護方法 | |
JP4731034B2 (ja) | 著作物保護システム、暗号化装置、復号化装置および記録媒体 | |
JP4447908B2 (ja) | 新しい装置を導入するローカルデジタルネットワーク及び方法と、そのネットワークにおけるデータ放送及び受信方法 | |
CN101860433A (zh) | 用于接收广播内容的方法和设备 | |
JP2003216500A (ja) | デジタル著作権管理システム | |
JP4234516B2 (ja) | 契約認証サーバ及びコンテンツ再生認証方法 | |
JP2001274785A (ja) | コンテンツ情報復号化方法、コンテンツ情報復号化装置 | |
JP3984599B2 (ja) | サービス提供システム | |
CN101297518A (zh) | 在支持不同drm方法的用户终端机间提供内容操作的drm网关方法和执行其方法的drm网关 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080014429.6 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10761546 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20117022931 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 001736-2011 Country of ref document: PE |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 7830/DELNP/2011 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13260810 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10761546 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: PI1013381 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: PI1013381 Country of ref document: BR Kind code of ref document: A2 Effective date: 20110930 |