WO2010119549A1 - コンテンツデータ再生システム、及び記録装置 - Google Patents
コンテンツデータ再生システム、及び記録装置 Download PDFInfo
- Publication number
- WO2010119549A1 WO2010119549A1 PCT/JP2009/057688 JP2009057688W WO2010119549A1 WO 2010119549 A1 WO2010119549 A1 WO 2010119549A1 JP 2009057688 W JP2009057688 W JP 2009057688W WO 2010119549 A1 WO2010119549 A1 WO 2010119549A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- content
- key
- host device
- host
- Prior art date
Links
- 238000012545 processing Methods 0.000 claims description 29
- 238000000034 method Methods 0.000 claims description 24
- 238000006243 chemical reaction Methods 0.000 claims description 21
- 238000003860 storage Methods 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 15
- 238000004364 calculation method Methods 0.000 claims description 2
- 238000000926 separation method Methods 0.000 description 12
- 230000005540 biological transmission Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 11
- 230000004044 response Effects 0.000 description 7
- 238000013500 data storage Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000015572 biosynthetic process Effects 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 230000008929 regeneration Effects 0.000 description 3
- 238000011069 regeneration method Methods 0.000 description 3
- 238000003786 synthesis reaction Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 2
- 230000002194 synthesizing effect Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00188—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/414—Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
- H04N21/4147—PVR [Personal Video Recorder]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to a content data playback system that enables playback of content data while eliminating unauthorized use of content data, and a recording device used therefor.
- a content data reproduction system uses a host device that uses content data, decrypts encrypted content data obtained by encrypting the content data with content key data, and uses the content data in the host device
- a content data reproduction system including a recording device configured to be enabled, the recording device encrypts the content key data with the service key, and encrypts the content key data with the service key.
- the storage unit is configured to store the service key in a secret area that is inaccessible from the host device, and the host device obtains the second output data based on the input data and the host function.
- a conversion unit is provided.
- the recording apparatus is configured to cooperate with the host apparatus so that the content data can be used by appropriately decrypting the encrypted content data obtained by encrypting the content data with the content key data.
- a storage unit for providing the input data to the host device, and based on the input data and the host function
- a comparison unit that receives the second output data acquired by the host device and compares the second output data with the first output data, and the comparison unit matches the first output data with the second output data.
- a decryption processing unit that decrypts the encrypted content key data using the service key to obtain the content key data, and the storage unit does not access the service key from the host device. It is stored in a possible secret area.
- FIG. 1 is a block diagram showing an overall configuration of a content data reproduction system according to a first embodiment of the present invention.
- the procedure for the host device 20 to acquire the content key data Kc and the operation of each unit at that time will be described. It is a block diagram which shows the whole structure of the content data reproduction system which concerns on the 2nd Embodiment of this invention.
- the procedure for the host device 20 to acquire the content key data Kc and the operation of each unit at that time will be described. It is a conceptual diagram explaining the outline
- MKB Media
- regeneration system which concerns on the 3rd Embodiment of this invention
- operation of each part in the case of performing a common authentication process is shown.
- MKB Media
- regeneration system which concerns on the 3rd Embodiment of this invention
- operation of each part when executing different authentication processes for each host is shown.
- FIG. 1 is a block diagram showing the overall configuration of a content data reproduction system according to the first embodiment of the present invention.
- This system acquires a memory card (recording device) 10 that securely stores content key data and the like for encrypting content data, and obtains the content key data after an authentication process described below in cooperation with the memory card 10.
- a host device 20 for reproducing the content data.
- the host device 20 is configured to be able to perform data communication with the content server 30 and the key database 40 via the network 50.
- the memory card 10 and the host device are connected via a secure channel 60 and configured to be able to transmit and receive data securely according to AKE (Authentication and Key Exchange).
- AKE Authentication and Key Exchange
- the memory card 10 includes an interface unit 11, a data processing / communication control unit 12, a system area 13, a secret area 14, a user data area 15, and a service key processing unit 16.
- the interface unit 11 is a part in charge of input / output control of various data exchanged with the host device 20 via the secure channel 60.
- the data processing / communication control unit 12 is a part in charge of various data processing (data separation, comparison determination, data conversion, encryption / decryption) to be described later, and transmission / reception control of these data.
- the data processing / communication control unit 12 includes a data separation unit 121, a comparison unit 122, an encryption / decryption unit 123, a third conversion unit 124, and a transmission / reception control unit 125.
- the data separation unit 121 has a function of separating linked data formed by linking data related to each other.
- Comparator 122 the answer data A C of the memory card 10 has compares the reply data A H of the host device 20 has been calculated, it is judged part the match / mismatch.
- the encryption / decryption unit 123 has a function of encrypting the given plaintext data and decrypting the given encrypted data.
- the third conversion unit 124 has a function of converting a given data into irreversible data by applying a one-way function or the like.
- the transmission / reception control unit 125 is a part that performs data transmission / reception with the host device 20 by performing encryption using a session key Ks generated by AKE (Authentication and Key Exchange).
- the system area 13 is an area accessible from the outside of the storage device 10, and stores a storage media key Ksm used when acquiring a service key Ksrv, which will be described later, an authentication key Kauth used for authentication processing with the host, and the like. Has been.
- the secret area 14 is an area in which only the content server 30 that has performed the predetermined authentication process can write data, and in other cases, access from the outside is completely impossible.
- a service key Ksrv used for protecting the content key data Kc is stored, and the service key Ksrv cannot be viewed from the outside.
- the service key Ksrv is written by the memory card manufacturer when the memory card 20 is manufactured, or after manufacturing / shipment, the key distribution server performs the authentication process using the storage media key Ksm or the PKI authentication process. Written in.
- the method of writing the service key Ksrv is not limited to a specific method.
- the user data area 15 is an area that can be freely written / read from the outside of the recording medium 30.
- the content key data Kc in addition to the encrypted content data Enc (Kc: C) obtained by encrypting the content data C with the content key data Kc, the content key data Kc is encrypted with the service key Ksrv.
- the encrypted content key data Enc (Ksrv: Kc) is stored.
- the user data area 15 stores question data Q (input data) to be input to the host function F of the regular host device 20 and inputs the question data Q to the host function F.
- encrypted answer data Enc (Ksrv: A C ) obtained by encrypting the answer data A C (first output data) obtained in this case with the service key Ksrv is stored.
- the encrypted content key data Enc (Ksrv: Kc), the question data Q, and the encrypted answer data Enc (Ksrv: A C ) are linked to each other for the association data Enc (Ksrv: Kc
- Q (where Enc (A: B
- ” indicates that the data shown on the left and right are connected).
- MKB Media Key Block
- the MKB is obtained by encrypting a media key, which is a base key for content encryption, with an aggregate of device keys (Kd) installed as a secret key in each host device. Information on unauthorized devices is also recorded in the MKB so that unauthorized devices cannot retrieve media keys.
- the encrypted content data Enc (Kc: C) does not need to be stored in the user data area 15, and may be stored on the host device 20 side.
- the service key processing unit 16 When the service key processing unit 16 receives the service key Ksrv distributed from the content server 16 from the content server 30, the service key processing unit 16 has a function of writing the service key Ksrv into the secret area 14 through a predetermined process.
- the service key Ksrv is used only in the memory card 10, and once written from the content server 16, it is never passed to the outside.
- the host device 20 has an application program 20A, and an interface unit 21, a data processing / communication control unit 22, and a data storage area 23 are formed in the application program.
- the interface unit 21 is a part in charge of input / output control of various data exchanged with the memory card 10 via the secure channel 60.
- the data processing / communication control unit 22 is in charge of various data processing (data separation and data conversion) to be described later, and transmission / reception control of these data.
- the data processing / communication control unit 22 includes a data synthesis / separation unit 221, a first conversion unit 222, an encryption / decryption unit 223, and a transmission / reception control unit 225.
- the data processing / communication control unit 22 includes an MKB processing unit 22A in charge of MKB (Media Key Block) processing.
- the data synthesis / separation unit 221 has a function of synthesizing (linking) data related to each other and separating the received linked data.
- First converter 222 has a function of converting to input query data Q provided in the host function F to the reply data A H.
- the encryption / decryption unit 223 has a function of encrypting given plaintext data and decrypting the given encrypted data.
- the transmission / reception control unit 225 is a part that performs data transmission / reception with the memory card 10 by performing encryption using the session key Ks generated by AKE (Authentication and Key Exchange).
- the data storage area 23 stores a host function execution program for executing a host function F, which will be described in detail later, and other acquired content key data Kc.
- the host function execution program stored in the data storage area 23 may be completed by itself.
- a part of the function is a dynamic link library (DLL).
- DLL dynamic link library
- the DLL execution unit 24 loads the DLL, thereby causing the DLL to operate integrally with the program stored in the data storage area 23 and to function as one piece of software as a whole.
- the host function execution program for executing the host function F is given to the regular host device 20, while the host function that the regular host device F should have in the memory card 10 is provided.
- the host device 20 inputs the query data Q supplied from the memory card 10 to the host function F obtains response data A H, returns it to the memory card 10.
- Memory card 10 includes a the received and answer data A H, compares the reply data A C which itself has, if they match, the host decodes the encrypted content key data Kc by the service key Ksrv device 20 Send to.
- the non-regular host device does not have such a host function F, and even if the question data Q is given, the answer data cannot be obtained, and therefore the content key data Kc cannot be obtained. Therefore, according to this embodiment, the use of unauthorized devices can be eliminated.
- the host function F is provided to a legitimate host device as a program for executing it, and unlike normal data, it is difficult to simply duplicate and use it. Further, if the host function execution program is formed by using the added DLL as in the above example, the duplication becomes more difficult.
- MKB Media ⁇ ⁇ ⁇ Key ⁇ Block
- Kd device keys
- the memory card 10 stores the concatenated data Enc (Ksrv: Kc
- Q is transmitted to the requesting host device 20 via the data processing / communication control unit 12 and the secure channel 60 (not shown in FIG. 2).
- the data composition / separation unit 221 of the host device 20 separates the question data Q and the encrypted data Enc (Ksrv: Kc
- the separated question data Q is input to the first converter 222, and answer data AH is generated based on the host function F.
- a H is encrypted by the encryption / decryption unit 223 with the session key Ks and then transmitted to the memory card 10.
- the encryption / decryption unit 123 decrypts the encrypted data using the session key Ks.
- the data separation unit 121 separates the decrypted combined data Enc (Ksrv: Kc
- a C ) is decrypted by the encryption / decryption unit 123 using the service key Ksrv, and the content key data Kc and the response data Ac are obtained.
- the resulting answer data Ac and answer data A H is compared in comparator 122, if they coincide with each other, the coincidence signal is output to the reception control unit 125.
- the transmission / reception control unit 125 encrypts the decrypted content key data Kc using the session key Ks by the encryption / decryption unit 123 and transmits the encrypted content key data Kc to the host device 20.
- the host device 20 decrypts the content key data Kc using the session key Ks.
- the data processing unit 226 stores the content key data Kc in a predetermined storage unit and ends the process.
- the host device 20 has the host function execution program that can execute the calculation based on the host function F, so that the answer data A H can be obtained based on the given question data Q.
- the content key data Kc can be obtained based on the above. It is difficult to duplicate a program that behaves in the same way as such a program because it requires analysis of the program. By introducing a mechanism for executing such a program, unauthorized devices can be effectively eliminated.
- FIGS. 1 a content data reproduction system according to a second embodiment of the present invention will be described with reference to FIGS.
- the overall configuration of the system is substantially the same as that shown in FIG. 1, and the same reference numerals are assigned to the same components, so that detailed description thereof will be omitted below.
- the difference from the first embodiment is that the answer data A H output from the first converter 222 is input to the one-way function together with the session key Ks to be converted data AES-G (A H , Ks).
- the second conversion unit 224 is provided.
- the third conversion unit 124 in the memory card 10 also performs an operation of inputting the response data Ac and the session key Ks to the one-way function to obtain the conversion data AES-G (A C , Ks). It is configured.
- the converted data are compared in the comparison unit 122. Thus, match / mismatch between response data Ac and answer data A H is determined.
- Others are the same as those in the first embodiment.
- the question data Q ## is given the same answer data A ## regardless of what host function F is input. Therefore, the authentication process for the other host device 20-i can be simpler than that for the specific host device 20-m (the host device 20-i has some host function). As long as you do it, no matter what type.) In this way, the mechanism and strength of the authentication process can be switched for each host device.
- This system has an MKB configuration as shown in FIG. 6 for switching authentication processes based on the host function F.
- the MKB includes a host node number storage unit 71 that stores host node numbers (Node # 1, Node # 2,..., Node # n) of the host device 20. Further, this MKB has, as data, a common media key Km that is commonly used by the plurality of host devices 20-1 to 20-n.
- this MKB also has individual media keys Km-1, Km-2,..., Km-n that are different for each host device as data.
- the individual media keys Km-1, Km-2,..., Km-n are stored in the individual media key storage unit 73.
- (A) Case 1 In such an MKB configuration, the case where the same input / output for the host function is applied to all the host devices 20-1, 20-2,... 20-n will be described with reference to FIG. . In this case, by the following procedure, the content key data Kc, the reply data A C encrypts, and stores the user data area 15.
- the content key data Kc is encrypted with the common media key Km to generate encrypted content key data Enc (Km: Kc).
- the concatenated data is encrypted with the service key Ksrv, and the encrypted data Enc (Ksrv : Enc (Km: Kc)
- This data is further encrypted with the common media key Km and stored in the user data area 15.
- the MKB having such a data structure is stored in the user data area 15 of the memory card 10.
- the memory card 10 supplies this MKB to the MKB processing unit 22A of the host device 20-m.
- the MKB processing unit 22A decrypts the common media key Km in the storage unit 72 using its own device key Kd # m, and uses the common media key Km to encrypt the encrypted data Enc ( Km: Enc (Ksrv: Enc (Km: Kc)
- Q ## Query data Q # * is supplied to the first conversion unit 222 is separated by the data separation section 221, response data A H is obtained.
- Other operations are the same as those in the above-described embodiment.
- the MKB processing unit 22A obtains the individual media key Km-m using its own device key Kd # m, and Enc (Km-m: Enc (Ksrv: Enc (Km-m: Kc)
- This question data Q # m is output as answer data A # m only when input to a specific host function F # m, and is different in other host functions F #. Accordingly, the host device 20-m verifies the function of the host device 20-m with the question data and the answer data different from those of the other host devices 20-i (i ⁇ m).
- SYMBOLS 10 Memory card, 11 ... Interface part, 12 ... Data processing / communication control part, 13 ... System area, 14 ... Secret area, 15 ... User data area, 16 ... Service key processing unit, 20 ... host device, 21 ... interface unit, 22 ... data processing / communication control unit, 22A ... MKB processing unit, 23 ... data storage unit, 24 ... -DLL execution unit, 30 ... content server, 40 ... key database, 50 ... network, 71 ... host node number storage unit, 72 ... encrypted common media key storage unit, 73 ... -Individual media key storage unit, 121 ... data separation unit, 122 ... comparison unit, 123 ...
- encryption / decryption unit 124 ... third conversion unit, 25 ... Transmission / reception control unit, 221 ... Data separation unit, 222 ... First conversion unit, 223 ... Encryption / decryption unit, 224 ... Second conversion unit, 225 ... Transmission / reception control unit, 226: Data processing unit.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
ことを特徴とする。
また、本発明の一態様に係る記録装置は、ホスト装置と連携し、コンテンツデータをコンテンツ鍵データで暗号化してなる暗号化コンテンツデータを適宜復号してコンテンツデータを利用可能とするように構成された記録装置であって、前記コンテンツデータを暗号化するためのコンテンツ鍵データを暗号化するためのサービス鍵と、前記コンテンツ鍵データを前記サービス鍵で暗号化してなる暗号化コンテンツ鍵データと、正規の前記ホスト装置が有するホスト関数に与えられる入力データと、前記入力データを前記ホスト関数に与えた場合に得られる第1出力データを前記サービス鍵で暗号化して得られる暗号化出力データとを記憶する記憶部と、前記入力データを前記ホスト装置に与え、この入力データ及び前記ホスト関数に基づいて前記ホスト装置が取得した第2出力データを受信し、この第2出力データと前記第1出力データとを比較する比較部と、前記比較部が前記第1出力データと前記第2出力データの一致を検出した場合において、前記サービス鍵を用いて前記暗号化コンテンツ鍵データを復号して前記コンテンツ鍵データを得る復号処理部とを備え、前記記憶部は、前記サービス鍵を前記ホスト装置からアクセス不可能な秘匿領域に記憶することを特徴とする。
図1は、本発明の第1の実施の形態に係るコンテンツデータ再生システムの全体構成を示すブロック図である。このシステムは、コンテンツデータを暗号化するコンテンツ鍵データ等をセキュアに記憶するメモリカード(記録装置)10と、このメモリカード10と連携して、コンテンツ鍵データを後述する認証処理を経た後取得してコンテンツデータの再生を行うホスト装置20とを備えている。このホスト装置20は、コンテンツサーバ30及び鍵データベース40とネットワーク50を介してデータ通信可能に構成されている。
メモリカード10とホスト装置は、セキュアチャネル60を介して接続され、データをAKE(Authentication and Key Exchange)に従ってセキュアに送受信可能に構成されている。
インタフェース部11は、セキュアチャネル60を介してホスト装置20とやりとりされる各種データの入出力制御を担当する部分である。
データ処理/通信制御部12は、後述する各種のデータ処理(データ分離、比較判定、データ変換、暗復号化)、及びそれらデータの送受信制御を担当する部分である。データ処理/通信制御部12は、データ分離部121、比較部122、暗復号部123、第3変換部124、及び送受信制御部125を有している。データ分離部121は、後述するように、互いに関連するデータを連結してなる連結データを分離する機能を有する。
秘匿領域14は、所定の認証処理を行ったコンテンツサーバ30のみがデータを書込み可能であり、それ以外の場合には、外部からのアクセスが一切不可となっている領域である。この実施の形態では、コンテンツ鍵データKcの保護に用いられるサービス鍵Ksrvが記憶され、サービス鍵Ksrvは、外部からは見ることができない状態とされている。サービス鍵Ksrvは、メモリカード20の製造時にメモリカードメーカにより書き込まれるか、又は、製造・出荷後において、鍵配信サーバより、前述のストレージメディア鍵Ksmを用いた認証処理、又はPKI認証処理等を用いて書き込まれる。サービス鍵Ksrvの書き込み方法は、特定のものに限られない。
データ合成・分離部221は、後述するように、互いに関連するデータを合成(連結)すると共に、受信された連結データを分離する機能を有する。
このように、正規のホスト装置20には、ホスト関数Fを実行するためのホスト関数実行プログラムが与えられ、一方、メモリカード10には、正規のホスト装置Fが有しているはずのホスト関数Fへの入力データとしての質問データQ、及びその出力データとしての回答データACとが与えられている。ホスト装置20は、メモリカード10から与えられた質問データQをホスト関数Fに入力して回答データAHを得て、これをメモリカード10に返信する。メモリカード10は、この受領した回答データAHと、自身が有する回答データACを比較し、両者が一致する場合、サービス鍵Ksrvで暗号化されたコンテンツ鍵データKcを復号してホスト装置20に送信する。
ホスト装置20より、あるコンテンツデータCの再生の要求が出された場合、メモリカード10は、そのコンテンツデータCに対応するコンテンツ鍵データKcが含まれる連結データEnc(Ksrv:Kc||AC)||Qを、データ処理/通信制御部12及びセキュアチャネル60を介して(図2では図示せず)、要求元のホスト装置20に送信する。
次に、本発明の第2の実施の形態に係るコンテンツデータ再生システムを、図3及び図4を参照して説明する。システムの全体構成は図1に示したのと略同様であり、同一の構成要素に関しては同一の参照番号を付しているので、以下ではこれらの詳細な説明は省略する。
第1実施の形態との相違点は、第1変換部222が出力した回答データAHを、セッション鍵Ksとともに一方向性関数に入力して変換データAES-G(AH、Ks)とする第2変換部224が備えられていることである。
次に、本発明の第3の実施の形態に係るコンテンツデータ再生システムを、図5~図9を参照して説明する。この実施の形態のシステムの全体構成は、図1に示したのと略同様であるので、詳細な説明は省略する。
このシステムでは、ホスト関数Fに基づく認証プロセスの切替えのため、図6に示すようなMKBの構成を有している。
また、このMKBは、複数のホスト装置20-1~nに共通に用いられる共通メディア鍵Kmをデータとして有している。共通メディア鍵Kmは、ホスト装置毎に異なるデバイス鍵Kd#1、Kd#2・・・、Kd#nで暗号化されて暗号化共通メディア鍵Enc(Kd#m、Km)(m=1~n)として暗号化共通メディア鍵記憶部72に記憶されている。
(A)ケース1
このようなMKBの構成において、全てのホスト装置20-1、20-2、・・・20-nに対しホスト関数に対する入出力に同じものを適用する場合を、図7を参照して説明する。この場合には、次のような手順で、コンテンツ鍵データKc、回答データACを暗号化し、ユーザデータ領域15に格納する。
(2)この暗号化コンテンツ鍵データEnc(Km:Kc)と回答データA#*、質問データQ#*を連結した後、この連結データをサービス鍵Ksrvで暗号化して、暗号化データEnc(Ksrv:Enc(Km:Kc)||A#*||Q#*)とする。このデータを、更に共通メディア鍵Kmで暗号化してユーザデータ領域15に格納する。
質問データQ#*はデータ分離部221で分離されて第1変換部222に供給され、回答データAHが得られる。他の動作は上述の実施の形態と同様である。
一方、特定のホスト装置20-mにのみ他のホスト装置とは異なる質問を適用する場合の動作を、図8及び図9を参照して説明する。この場合には、その他のホスト装置20-i(i≠m)のために、暗号化データEnc(Ksrv:Enc(Km:Kc)||A#*||Q#*)を生成する一方、特定のホスト装置20-mのために、暗号化データEnc(Ksrv:Enc(Km-m:Kc)||A#m||Q#m)を生成する。また、暗号化共通メディア鍵記憶部72に記憶されておる暗号化共通メディア鍵データEnc(Kd#m:Km)は、暗号化個別メディア鍵データEnc(Kd#m:Km-m)に書き換える。
Claims (5)
- コンテンツデータを利用するホスト装置と、
前記コンテンツデータをコンテンツ鍵データで暗号化してなる暗号化コンテンツデータを復号してコンテンツデータを前記ホスト装置において利用可能とするように構成された記録装置と
を備えたコンテンツデータ再生システムにおいて、
前記記録装置は、
前記コンテンツ鍵データを暗号化するためのサービス鍵と、前記コンテンツ鍵データを前記サービス鍵で暗号化してなる暗号化コンテンツ鍵データと、正規の前記ホスト装置が有するホスト関数を使用して入力データを演算した場合に得られる第1出力データを前記サービス鍵で暗号化して得られる暗号化出力データとを記憶する記憶部と、
前記入力データを前記ホスト装置に与え、この入力データと前記ホスト関数に基づいて前記ホスト装置が取得した第2出力データを前記ホスト装置から受信し、この第2出力データと前記第1出力データとを比較する比較部と、
前記比較部が前記第1出力データと前記第2出力データの一致を検出した場合において、前記サービス鍵を用いて前記暗号化コンテンツ鍵データを復号して前記コンテンツ鍵データを得るデータ処理部と
を備え、
前記記憶部は、前記サービス鍵を前記ホスト装置からアクセス不可能な秘匿領域に記憶するように構成され、
前記ホスト装置は、前記入力データと前記ホスト関数に基づいて前記第2出力データを得る第1変換部を備えた
ことを特徴とするコンテンツデータ再生システム。 - 前記ホスト装置は、前記記録装置との間での認証処理により得られたセッション鍵データと前記第2出力データとを入力して第1変換データを得る第2変換部を更に備え、
前記記録装置は、前記セッション鍵データと前記第1出力データとを入力して第2変換データを得る第3変換部を更に備え、
前記比較部は、前記第1変換データと前記第2変換データとを比較して前記第1出力データと前記第2出力データの一致を判定することを特徴とする請求項1記載のコンテンツデータ再生システム。 - 前記ホスト装置は、前記ホスト関数による演算を実行するための実行プログラムを実行可能に構成された請求項2記載のコンテンツデータ再生システム。
- 前記実行プログラムの一部は、動的リンクライブラリ(Dynamic Link Library:DLL)提供される請求項3記載のコンテンツデータ再生システム。
- ホスト装置と連携し、コンテンツデータをコンテンツ鍵データで暗号化してなる暗号化コンテンツデータを適宜復号してコンテンツデータを利用可能とするように構成された記録装置であって、
前記コンテンツデータを暗号化するためのコンテンツ鍵データを暗号化するためのサービス鍵と、前記コンテンツ鍵データを前記サービス鍵で暗号化してなる暗号化コンテンツ鍵データと、正規の前記ホスト装置が有するホスト関数に与えられる入力データと、前記入力データを前記ホスト関数に与えた場合に得られる第1出力データを前記サービス鍵で暗号化して得られる暗号化出力データとを記憶する記憶部と、
前記入力データを前記ホスト装置に与え、この入力データ及び前記ホスト関数に基づいて前記ホスト装置が取得した第2出力データを受信し、この第2出力データと前記第1出力データとを比較する比較部と、
前記比較部が前記第1出力データと前記第2出力データの一致を検出した場合において、前記サービス鍵を用いて前記暗号化コンテンツ鍵データを復号して前記コンテンツ鍵データを得る復号処理部と
を備え、
前記記憶部は、前記サービス鍵を前記ホスト装置からアクセス不可能な秘匿領域に記憶する
ことを特徴とする記録装置。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/264,448 US8799682B2 (en) | 2009-04-16 | 2009-04-16 | Content data reproduction system and recording device |
CN200980158692.XA CN102396179B (zh) | 2009-04-16 | 2009-04-16 | 内容数据再现系统、以及记录装置 |
JP2011509148A JP5296195B2 (ja) | 2009-04-16 | 2009-04-16 | コンテンツデータ再生システム、及び記録装置 |
PCT/JP2009/057688 WO2010119549A1 (ja) | 2009-04-16 | 2009-04-16 | コンテンツデータ再生システム、及び記録装置 |
US14/274,852 US20140250308A1 (en) | 2009-04-16 | 2014-05-12 | Content data reproduction system and recording device |
US14/274,788 US20140289529A1 (en) | 2009-04-16 | 2014-05-12 | Content data reproduction system and recording device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2009/057688 WO2010119549A1 (ja) | 2009-04-16 | 2009-04-16 | コンテンツデータ再生システム、及び記録装置 |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/264,448 A-371-Of-International US8799682B2 (en) | 2009-04-16 | 2009-04-16 | Content data reproduction system and recording device |
US14/274,852 Continuation US20140250308A1 (en) | 2009-04-16 | 2014-05-12 | Content data reproduction system and recording device |
US14/274,788 Continuation US20140289529A1 (en) | 2009-04-16 | 2014-05-12 | Content data reproduction system and recording device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010119549A1 true WO2010119549A1 (ja) | 2010-10-21 |
Family
ID=42982232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2009/057688 WO2010119549A1 (ja) | 2009-04-16 | 2009-04-16 | コンテンツデータ再生システム、及び記録装置 |
Country Status (4)
Country | Link |
---|---|
US (3) | US8799682B2 (ja) |
JP (1) | JP5296195B2 (ja) |
CN (1) | CN102396179B (ja) |
WO (1) | WO2010119549A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8929547B2 (en) | 2011-03-23 | 2015-01-06 | Kabushiki Kaisha Toshiba | Content data reproduction system and collection system of use history thereof |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9734356B2 (en) | 2009-06-29 | 2017-08-15 | Clevx, Llc | Encrypting portable media system and method of operation thereof |
US8782440B2 (en) * | 2012-08-15 | 2014-07-15 | International Business Machines Corporation | Extending the number of applications for accessing protected content in a media using media key blocks |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005117332A1 (ja) * | 2004-05-26 | 2005-12-08 | Kabushiki Kaisha Toshiba | 記憶媒体変換方法、プログラム及び機器 |
WO2006001161A1 (ja) * | 2004-06-28 | 2006-01-05 | Kabushiki Kaisha Toshiba | 記憶媒体処理方法、記憶媒体処理装置及びプログラム |
WO2006003778A1 (ja) * | 2004-07-02 | 2006-01-12 | Kabushiki Kaisha Toshiba | コンテンツ管理方法及びコンテンツ管理用プログラム、並びに電子機器 |
WO2006006326A1 (ja) * | 2004-07-08 | 2006-01-19 | Kabushiki Kaisha Toshiba | 記憶媒体処理方法、記憶媒体処理装置及びプログラム |
WO2006008909A1 (ja) * | 2004-07-15 | 2006-01-26 | Kabushiki Kaisha Toshiba | 記憶媒体処理方法、記憶媒体処理装置及びプログラム |
WO2008139670A1 (ja) * | 2007-04-26 | 2008-11-20 | Panasonic Corporation | 権利情報暗号化モジュール、不揮発性記憶装置、権利情報記録システム、権利情報復号化モジュール、権利情報読出システム及び権利情報記録読出システム |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6651171B1 (en) * | 1999-04-06 | 2003-11-18 | Microsoft Corporation | Secure execution of program code |
WO2001041104A1 (fr) | 1999-11-30 | 2001-06-07 | Sanyo Electric Co., Ltd. | Enregistreur |
JP4576853B2 (ja) * | 2004-03-05 | 2010-11-10 | ソニー株式会社 | 情報処理装置、および認証処理方法、並びにコンピュータ・プログラム |
JP2007304822A (ja) | 2006-05-10 | 2007-11-22 | Sanyo Electric Co Ltd | コンテンツ管理方法及び装置 |
US8321662B2 (en) * | 2008-05-08 | 2012-11-27 | International Business Machines Corporation | Certificate renewal using secure handshake |
KR20110074823A (ko) * | 2008-09-30 | 2011-07-04 | 파나소닉 주식회사 | 3d 영상에 관한 기록매체, 재생장치, 시스템 lsi, 재생방법, 안경 및 표시장치 |
-
2009
- 2009-04-16 WO PCT/JP2009/057688 patent/WO2010119549A1/ja active Application Filing
- 2009-04-16 JP JP2011509148A patent/JP5296195B2/ja not_active Expired - Fee Related
- 2009-04-16 CN CN200980158692.XA patent/CN102396179B/zh not_active Expired - Fee Related
- 2009-04-16 US US13/264,448 patent/US8799682B2/en not_active Expired - Fee Related
-
2014
- 2014-05-12 US US14/274,852 patent/US20140250308A1/en not_active Abandoned
- 2014-05-12 US US14/274,788 patent/US20140289529A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005117332A1 (ja) * | 2004-05-26 | 2005-12-08 | Kabushiki Kaisha Toshiba | 記憶媒体変換方法、プログラム及び機器 |
WO2006001161A1 (ja) * | 2004-06-28 | 2006-01-05 | Kabushiki Kaisha Toshiba | 記憶媒体処理方法、記憶媒体処理装置及びプログラム |
WO2006003778A1 (ja) * | 2004-07-02 | 2006-01-12 | Kabushiki Kaisha Toshiba | コンテンツ管理方法及びコンテンツ管理用プログラム、並びに電子機器 |
WO2006006326A1 (ja) * | 2004-07-08 | 2006-01-19 | Kabushiki Kaisha Toshiba | 記憶媒体処理方法、記憶媒体処理装置及びプログラム |
WO2006008909A1 (ja) * | 2004-07-15 | 2006-01-26 | Kabushiki Kaisha Toshiba | 記憶媒体処理方法、記憶媒体処理装置及びプログラム |
WO2008139670A1 (ja) * | 2007-04-26 | 2008-11-20 | Panasonic Corporation | 権利情報暗号化モジュール、不揮発性記憶装置、権利情報記録システム、権利情報復号化モジュール、権利情報読出システム及び権利情報記録読出システム |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8929547B2 (en) | 2011-03-23 | 2015-01-06 | Kabushiki Kaisha Toshiba | Content data reproduction system and collection system of use history thereof |
TWI501100B (zh) * | 2011-03-23 | 2015-09-21 | Toshiba Kk | 內容資料再生系統、及其使用歷史記錄之收集系統 |
Also Published As
Publication number | Publication date |
---|---|
US8799682B2 (en) | 2014-08-05 |
JP5296195B2 (ja) | 2013-09-25 |
US20140289529A1 (en) | 2014-09-25 |
CN102396179A (zh) | 2012-03-28 |
US20120096284A1 (en) | 2012-04-19 |
JPWO2010119549A1 (ja) | 2012-10-22 |
US20140250308A1 (en) | 2014-09-04 |
CN102396179B (zh) | 2014-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6789177B2 (en) | Protection of data during transfer | |
JP4795727B2 (ja) | コンテンツの利用端末を制限する方法、記憶装置およびシステム | |
JP5869580B2 (ja) | 端末装置、検証装置、鍵配信装置、コンテンツ再生方法、鍵配信方法及びコンピュータプログラム | |
JP4555046B2 (ja) | データ転送システム及びデータ転送方法 | |
KR20030027066A (ko) | 데이터 교환을 위해 배열된 장치 및 인증 방법 | |
EP1061515B1 (en) | Memory card, memory card utilizing device, and corresponding method and program for converting management information which contains restrictive information using a different key in each management information send and receive session | |
US20080219451A1 (en) | Method and system for mutual authentication between mobile and host devices | |
US20090210724A1 (en) | Content management method and content management apparatus | |
JP2010268417A (ja) | 記録装置及びコンテンツデータ再生システム | |
JP2010267240A (ja) | 記録装置 | |
JPWO2004109972A1 (ja) | ライセンス受信用ユーザ端末 | |
WO2001078298A1 (fr) | Systeme et procede de traitement d'informations | |
JP4414321B2 (ja) | 携帯用保存装置を用いたデジタル著作権の管理方法及び装置 | |
WO2006003778A1 (ja) | コンテンツ管理方法及びコンテンツ管理用プログラム、並びに電子機器 | |
JP2004519882A (ja) | 認証方法及びデータ伝送システム | |
CN100364002C (zh) | 读或写用户数据的设备和方法 | |
JP2002099514A (ja) | デジタルデータ不正使用防止方法、デジタルデータ不正使用防止システム、登録装置、配信装置、再生装置及び記録媒体 | |
JP5296195B2 (ja) | コンテンツデータ再生システム、及び記録装置 | |
JP2008209960A (ja) | コンテンツの利用端末を制限する方法、記憶装置およびシステム | |
US8634555B2 (en) | Information processing apparatus, information processing method, and program | |
JPH10293724A (ja) | ユニット装置、復号化ユニット装置、暗号化ユニット装置、暗号処理システム、暗号化方法及び復号化方法 | |
US8929547B2 (en) | Content data reproduction system and collection system of use history thereof | |
JP2007193477A (ja) | コンテンツ保護装置及びプログラム | |
JP4624638B2 (ja) | デジタルデータ書込装置、デジタルデータ記録装置、デジタルデータ利用装置 | |
JP2009099223A (ja) | ディスク、および情報処理方法、並びにコンピュータ・プログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980158692.X Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09843330 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011509148 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13264448 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09843330 Country of ref document: EP Kind code of ref document: A1 |