WO2018086566A1 - Système et procédé de protection pvr - Google Patents

Système et procédé de protection pvr Download PDF

Info

Publication number
WO2018086566A1
WO2018086566A1 PCT/CN2017/110334 CN2017110334W WO2018086566A1 WO 2018086566 A1 WO2018086566 A1 WO 2018086566A1 CN 2017110334 W CN2017110334 W CN 2017110334W WO 2018086566 A1 WO2018086566 A1 WO 2018086566A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
top box
set top
recording
identification information
Prior art date
Application number
PCT/CN2017/110334
Other languages
English (en)
Chinese (zh)
Inventor
钟争胜
Original Assignee
深圳创维数字技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳创维数字技术有限公司 filed Critical 深圳创维数字技术有限公司
Publication of WO2018086566A1 publication Critical patent/WO2018086566A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • H04N21/4108Peripherals receiving signals from specially adapted client devices characterised by an identification number or address, e.g. local network address
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • H04N21/4135Peripherals receiving signals from specially adapted client devices external recorder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/414Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
    • H04N21/4147PVR [Personal Video Recorder]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42684Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/433Content storage operation, e.g. storage operation in response to a pause request, caching operations
    • H04N21/4334Recording operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording

Definitions

  • the present disclosure relates to the field of set top box technologies, for example, to a PVR protection method and system.
  • PVR Personal Video Recorder
  • the PVR program stored on the set-top box hard disk usually needs to be encrypted, and the encrypted PVR program can only be used by the same set-top box, and the program data cannot be shared.
  • the present disclosure provides a PVR protection method and system, which can solve the problem that data recorded by the related encryption method can only be played back on a set top box that records the data, so that the recorded data cannot be shared by other set tops.
  • the present disclosure provides a PVR protection method, which may include: when a recording instruction of a first set top box is triggered, the first set top box sends a request for acquiring a first recording key to a power production management system (PMS) of a PVR.
  • PMS power production management system
  • the request information includes first identification information of the first set top box
  • the PMS receives the request information and generates a random key, according to the first private key pair corresponding to the first identification information Encrypting the random key to obtain the first recording key, and transmitting the first recording key to the first set top box
  • the first set top box receives and decrypts the first recording key to obtain The random key, and using the random key to encrypt the descrambled audio and video data to obtain an encrypted program
  • the first set top box saves the encrypted program to an external storage device to implement PVR encrypted recording.
  • the method further includes: a PVR playback process, the PVR playback process includes: when the second set top box receives the playback instruction, reading the encrypted program, the first identification information from the external storage device And comparing, by the first recording key, the second identification information of the second set top box with the first identification information; when the second identification information is different from the first identification information, The second set top box sends the second identification information, the first identification information, and the first recording key to the PMS; the PMS is based on the second private key corresponding to the second identification information.
  • the PVR playback process includes: when the second set top box receives the playback instruction, reading the encrypted program, the first identification information from the external storage device And comparing, by the first recording key, the second identification information of the second set top box with the first identification information; when the second identification information is different from the first identification information, The second set top box sends the second identification information, the first identification information, and the first recording key to the PMS; the PMS is based on the second private key corresponding to the second identification information
  • the first private key corresponding to the first identification information and the first recording key generate a second recording key; the second set top box decrypts the second recording key to obtain the random key Key, and decrypting the encrypted program by using the random key, obtaining a decrypted program, and playing the decrypted program.
  • the present disclosure further provides a personal video recording PVR protection system, which may include: a set top box and a management system PMS of the PVR; the set top box includes: a first sending module, a first decrypting module, and a saving module; the first sending module, setting The request information for acquiring the first recording key is sent to the management system PMS of the PVR, where the request information includes the first identification information of the set top box; the first decryption module is set to Decrypting the first recording key to obtain a random key, and encrypting the descrambled audio and video data by using the random key to obtain a decrypted program; the saving module is configured to save the encrypted program to an external
  • the storage device is configured to implement PVR encrypted recording; the management system PMS is configured to receive the request information and generate a random key, and perform the random key according to the first private key corresponding to the first identification information. Encrypt to get the first recording key.
  • the set top box further includes: a comparison module, a second sending module, and a second decrypting module; the comparing module is configured to read the encrypted program from the external storage device when a playback instruction is triggered, The first identification information and the first recording key compare the second identification information of the second identification information with the first identification information, and the second sending module is configured to: when the second identification information and the first identification information When the identification information is different, the second identification information, the first identification information, and the first recording key corresponding to the recorded program are sent to the PMS; and the second decryption module is configured to decrypt the second recording key.
  • the PMS is further configured to be according to the second identifier information, the first identifier information, and the first The recording key generates a second recording key.
  • the set top box further includes: a third decryption module, configured to decrypt the first recording key to obtain the random key when the second identifier information is the same as the first identifier information, And decrypting the encrypted program by using the random key to obtain a decrypted program.
  • a third decryption module configured to decrypt the first recording key to obtain the random key when the second identifier information is the same as the first identifier information, And decrypting the encrypted program by using the random key to obtain a decrypted program.
  • the present disclosure also provides a PVR protection method, which can be applied to a PVR management system PMS, including:
  • the information includes the first identification information of the first set top box; determining, according to the first identification information, whether the first set top box has recording permission; when the first set top box has recording permission, generating a random key, and according to Determining, by the first identification information and the random key, the first recording key; sending the first recording key to the first set top box, so that the first set top box is facing the first Decrypting the recording key to obtain the random key, and encrypting the data stream to be encrypted by using the random key to obtain an encrypted data stream, so that the second set top box acquires the encrypted data stream, the first identifier information, and the Describe the first recording key;
  • the present disclosure also provides a PVR protection method, which can be applied to a first set top box, including:
  • the present disclosure also provides a PVR protection method, which can be applied to a second set top box, including:
  • the present disclosure further provides a PVR management system PMS, which may include: a receiving module, configured to: receive request information for acquiring a first recording key sent by a first set top box, where the request information includes the first set top box
  • the first identifier information is configured to: determine, according to the first identifier information, whether the first set top box has a recording authority; and the key processing module is configured to: when the first set top box has a recording permission, Generating a random key, and obtaining the first recording key according to the first identification information and the random key; and the key sending module is configured to: send the first recording key to the first a set top box, so that the first set top box decrypts the first recording key to obtain the random key, and encrypts the data stream to be encrypted by using the random key to obtain an encrypted data stream, thereby enabling the second set top box Obtaining the encrypted data stream, the first identification information, and the first recording key;
  • the receiving module is further configured to: receive the first identification information, the first recording key, and the second identification information of the second set top box sent by the second set top box, where the second set top box and the first set top box
  • the privilege judging module is further configured to: determine, according to the second identifier information, whether the second set top box has a play permission
  • the key processing module is further configured to: when the second set top box has Decrypting the first recording key according to the first identification information to obtain the random key; and obtaining a second recording key according to the second identification information and the random key
  • the key sending module is further configured to: send the second recording key to the second set top box, so that the second set top box decrypts the second recording key to obtain the random key, and Decrypting the encrypted data stream with the random key results in a decrypted data stream.
  • the present disclosure also provides a computer readable storage medium storing computer executable instructions for performing any of the methods described above.
  • the present disclosure also provides a PVR management device including one or more processors, a memory, and one or more programs, the one or more programs being stored in a memory when being processed by one or more processors When executed, the corresponding method described above can be performed.
  • the present disclosure also provides a set top box including one or more processors, a memory, and one or more programs, the one or more programs being stored in the memory when processed by one or more When the device is executed, the corresponding method described above can be performed.
  • the present disclosure also provides a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instructions are executed by a computer, Having the computer perform any of the methods described above.
  • the PVR protection method and system provided by the present disclosure generates a random key for recording a program through a PMS, and acquires the random key through the PMS during playback, and decrypts the program by using the random key.
  • the sharing of the recorded programs is achieved such that the recorded programs can also be played back from other set top boxes of the set top box that recorded the program.
  • FIG. 1 is a flowchart of a PVR protection method according to an embodiment.
  • FIG. 2 is a flow chart of another PVR protection method provided by an embodiment.
  • FIG. 3 is a flowchart of still another PVR protection method according to an embodiment.
  • FIG. 4 is a flowchart of still another PVR protection method according to an embodiment.
  • FIG. 5 is a schematic structural diagram of a PVR protection system according to an embodiment.
  • FIG. 6 is a schematic structural diagram of a set top box in a PVR protection system according to an embodiment.
  • FIG. 7 is a flowchart of still another PVR protection method according to an embodiment.
  • FIG. 8 is a flowchart of still another PVR protection method according to an embodiment.
  • FIG. 9 is a flowchart of still another PVR protection method according to an embodiment.
  • FIG. 10 is a schematic structural diagram of a PVR management system PMS according to an embodiment.
  • FIG. 11 is a schematic structural diagram of hardware of a PVR management device according to an embodiment.
  • FIG. 12 is a schematic structural diagram of hardware of a set top box according to an embodiment.
  • module the suffixes such as “module”, “component” or “unit” used to denote elements are merely illustrative of the present invention, and do not have a specific meaning per se. Therefore, “module”, “component” or “unit” can be used in combination.
  • the terminal device can be implemented in various forms.
  • the terminal described in the present invention may include, for example, a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (Personal Digital Assistant), a PAD (Tablet), a PMP (Portable Multimedia Player), a navigation device, etc.
  • Mobile terminals and fixed terminals such as digital TVs, desktop computers, and the like.
  • PDA Personal Digital Assistant
  • PAD Tablett
  • PMP Portable Multimedia Player
  • This embodiment provides a PVR protection method, where the method includes a recording process.
  • the recording process may include steps 110-140.
  • step 110 when the recording instruction of the first set top box is triggered, the first set top box sends request information for acquiring the first recording key to the management system PMS of the PVR, wherein the request information includes the first set top box.
  • First identification information when the recording instruction of the first set top box is triggered, the first set top box sends request information for acquiring the first recording key to the management system PMS of the PVR, wherein the request information includes the first set top box.
  • the PMS receives the request information and generates a random key, and encrypts the random key according to the first private key corresponding to the first identification information to obtain a first recording key, and Sending the first recording key to the first set top box.
  • the first set top box establishes an association relationship between the first identification information and the first recording key, and stores the association relationship in the external storage device.
  • the first set top box can bind its own identification information to the first recording key of the recorded program, and store the binding relationship on the external storage device, so that the other set top box can obtain the identifier of the first set top box from the external storage device.
  • Information and first recording key can be used to obtain the identifier of the first set top box from the external storage device.
  • the first set top box receives and decrypts the first recording key to obtain the random key, and encrypts the descrambled audio and video data by using the random key to obtain an encrypted program.
  • step 140 the first set top box saves the encrypted program to an external storage device to implement PVR encrypted recording.
  • CA Conditional Access
  • the private key in the main chip is used, and the random key can be obtained through the operation.
  • the audio and video data is encrypted by using the random key, and the random key is obtained by using the private key in the main chip during video playback, and the audio and video data is decrypted by using the random key.
  • the encryption method is to protect the audio and video data based on the private link of the hardware, and the other set top boxes cannot recover the random key of the encrypted set top box, so that the recording and playback are restricted to be used on the same set top box, and the encrypted video data is used. Cannot be shared by set-top boxes approved by other CA vendors.
  • the set top box sends its own first identification information to the PMS system, and the PMS system generates a random key for the first identification information, and uses an encryption algorithm corresponding to the first identification information.
  • the first private key encrypts the random key to generate a first recording key
  • the set top box decrypts the first recording key to obtain the random key, and uses the random key to record a program,
  • the recording key is managed to solve the problem that the PVR program obtained by the existing recording method can only be played back on the same set top box and cannot be played back on other set top boxes.
  • the recording instruction of the first set top box is triggered, which may be a control command generated by the user through a control panel of the set top box or a control device such as a remote controller to perform a control operation on the set top box.
  • the control command is Record the command.
  • the CA front end may be set in the PMS management system PMS, and the PMS may obtain related information of the set top box that is authenticated by the CA front end, such as identification information of the set top box, a private key, an encryption method, and a recording authority.
  • the identification information of the set top box may be a chip number CHIP ID.
  • the PMS system may pre-establish a database for storing the chip number CHIP ID of the set top box, a private key, an encryption method, and recording rights. Moreover, the chip number CHIP ID, private key, encryption method, and recording authority are stored in association with each other. That is to say, the PMS system can determine its corresponding private key, encryption method, recording authority, and the like according to the CHIP ID of the set top box.
  • the sending, by the first set top box, the request information for acquiring the first recording key to the PVR management system PMS may include the first set top box sending the request information carrying the own CHIP ID to the PMS system over the Internet, so that the PMS passes the request.
  • the information generates a first recording key for recording the program.
  • the random key is randomly generated by the PMS system, and the random key may be a character string, such as ab12. After generating the random key, encrypting the random key according to the first private key corresponding to the first identification information to obtain a first recording key. Since not all set top boxes have the right to record programs, there is no need to generate a random key for the set top box and perform subsequent steps when the set top box does not have recording rights.
  • the method may further include: a process of querying whether the first set top box has a recording permission, the method may include: the PMS receiving the request information, and acquiring first identification information carried by the request information; The PMS queries, in the database, whether the set top box corresponding to the first identifier information has a recording authority; if the first set top box has a recording right, the step 120 is performed;
  • the PMS may feed back the query result to the first set top box through the network, that is, the first set top box does not have recording permission.
  • the PMS receives the request information and generates a random key, and then encrypts the random key according to the first private key corresponding to the first identification information to obtain a first recording key.
  • Steps 1210 - 1240 can be included.
  • step 1210 the PMS receives and parses the request information to obtain the first identification information.
  • step 1220 the PMS searches for a corresponding first private key and an encryption method in the database according to the first identification information.
  • step 1230 the PMS randomly generates a random key, and encrypts the random key using the first private key and an encryption method to obtain a first recording key.
  • step 1240 the PMS feeds back the first recording key to the first set top box.
  • the first identification information may be CHIP ID1
  • the first private key is a private key in the main chip of the set top box. That is, the PMS uses the private key in the set-top box main chip, such as a session key (Session Key, SK) to encrypt the random key to obtain the first recording key, when the first set-top box receives the first recording key.
  • the first recording key may be decrypted according to a private key carried in the master chip thereof to obtain the random key.
  • the process of generating a random key and encrypting the random key by using the first private key is completed in the PMS system, and the PMS system may also save the random key, when the top set box plays back the recorded content of the first set top box.
  • the set top box can acquire the random key through the PMS system, and use the random key to decrypt the program recorded by the first set top box, thereby realizing sharing of the PVR program.
  • the first set top box decrypts the first recording key to obtain the random key
  • the first set top box receives the first recording key fed back by the PMS
  • the A recording key is set to the encryption engine
  • the first recording key is decrypted using the first private key to obtain the random key.
  • the first identification information and the metadata (META DATA) information such as the first recording key are saved to an external storage device (for example, a USB flash drive or a mobile hard disk, etc.), and the external storage device stores the first set top box.
  • An external storage device for recorded programs That is, when the top set box acquires the program recorded by the first set top box from the external storage device, the META DATA information of the first set top box may also be acquired, so that the random key may be acquired according to the META DATA information.
  • the first set top box writes the obtained recorded program to an external storage device to form a PVR file corresponding to the program played by the first set top box, and repeats the above encrypted recording process until the recording is not completed.
  • the end of the recording may be the end of the program time (the digital television terminal judges the start time and duration of the learned program through the Electronic Program Guide (EPG) information of the digital television channel), and completes the recording of the program; The user cancels the recording; it can also be the end of the error, such as the storage device is full.
  • EPG Electronic Program Guide
  • This embodiment further provides a PVR protection method, where the method includes a recording process. As shown in FIG. 2, the recording process may include steps 210-290.
  • step 210 the set-top box STB1 recording command is triggered, and a recording request is sent to the PMS,
  • the request includes the CHIP ID1 information of the STB1, wherein the set top box STB1 transmits the recording request to the PVR management system PMS via the Internet.
  • step 220 the PMS searches through the database to query the recording permission of the set-top box STB1. If the set-top box STB1 is allowed to record, step 230 is performed. If the set-top box STB1 is not allowed to record, the PMS returns the unrecordable permission to the set-top box STB1 through the network. And perform step 250.
  • step 230 the PMS generates a random key PVR KEY, and encrypts the PVR KEY by using the private key SK1 corresponding to the CHIP ID1 to obtain a recording key RECORD KEY1.
  • step 240 the PMS returns recording rights and RECORD KEY1 to the set top box STB1 over the network.
  • step 250 the set top box STB1 checks the result of the PMS return, if the recording is allowed, then step 260 is performed; if the recording is not allowed, step 290 is performed.
  • step 260 the set top box STB1 sets the RECORD KEY1 returned by the PMS to the encryption engine, decrypts the PVR KEY by the private key SK1, and saves the metadata METADATA information composed of CHIP ID1 and RECORD KEY1 to the external storage device.
  • step 270 the set top box STB1 encrypts the descrambled audio and video data using the PVR KEY, obtains the encrypted data RECORD CONTENT, and saves the RECORD CONTENT to the external storage device.
  • step 280 step 270 is repeated until the user cancels the recording or other error occurs, then the recording ends.
  • step 290 the recording is ended.
  • the recording process provided by the present embodiment is based on the recording process of the main chip of the set top box and the PMS system, and the PMS saves the encryption algorithm of the main chip and the private key SK.
  • the PMS finds the corresponding private key according to the first set-top box transmission chip number CHIP ID1, thereby generating and returning the encrypted PVR KEY corresponding to the CHIP ID1, and then the set-top box can utilize the chip.
  • the private key SK inside decrypts the PVR KEY, thereby completing the recording action.
  • the PVR KEY is simultaneously saved in the first set top box and the PMS, and the set top box that plays back the program recorded by the first set top box can save the PVR KEY, or can obtain the PVR KEY through the PMS, and ensure the security of the recorded program.
  • the sharing of recorded programs is achieved on the basis of sex.
  • the embodiment further provides a PVR protection method, and the method further includes a playback process.
  • the playback process may include steps 310-340.
  • step 310 when the second set top box receives the playback instruction, the encrypted program, the first identification information, and the first recording key are read from the external storage device, and the second set top box is second.
  • the identification information is compared with the first identification information.
  • the receiving, by the second set top box, the playback instruction refers to the second set top box being connected to an external storage device, and displaying the recording interface in the external storage device in a menu of the set top box, according to the user's selection. Playback instructions.
  • comparing the second identification information of the second set top box with the first identification information corresponding to the played back recorded program may include steps 3110 to 3140.
  • step 3110 when the second set top box is connected to the external storage device, the information of the encrypted program stored in the external storage device is read, and the recorded content carried by the external storage device is displayed in the menu.
  • step 3120 the second set top box receives the user's selection operation and generates a playback instruction according to the selection operation.
  • the second set top box acquires the corresponding encrypted program according to the playback instruction, and acquires metadata information corresponding to the encrypted program, where the metadata information includes the first identification information and the first recording key.
  • step 3140 the second set top box reads the first identification information in the metadata information, and compares the first identification information with the second identification information.
  • step 320 if the first identification information is different from the second identification information, the second set top box sends the second identification information, the first identification information, and the first recording key corresponding to the recorded program to the PMS.
  • the recorded program is not recorded by the second set top box.
  • the random key can be obtained through the PMS. Transmitting the second identification information, the first identification information, and the first recording key corresponding to the recorded program to the PMS, so that the PMS is determined according to the second identification information, the first identification information, and the first recording key. Decrypting the second recording key of the encrypted program in the second set top box.
  • the second identification information is the same as the first identification information
  • the first recording key is decrypted to obtain the random key; and the random key pair is utilized.
  • the encrypted program is decrypted to effect playback of the encrypted program.
  • the set top box can set the first recording key to the encryption engine to decrypt the random key.
  • step 330 the PMS generates a second recording key according to the second identification information, the first identification information, and the first recording key.
  • the PMS determines whether the second set top box corresponding to the second identifier information has playback rights, and generates a second recording key when the second set top box has the recording authority.
  • the step 330 may include step 3310 - step 3330.
  • the PMS determines, according to the second identification information, whether the second set top box has playback rights. For example, the PMS searches for the playback rights of the corresponding second set top box in the database according to the second identification information.
  • the PMS decrypts the first recording key according to the first identification information to obtain a random key. For example, the PMS determines a corresponding first private key according to the first identification information, and decrypts the first recording key by using the first private key to obtain a random key.
  • the random key is encrypted according to the second private key corresponding to the second identification information to generate a second recording key.
  • the PMS determines and acquires a second private key of the second set top box according to the second identification information, encrypts the random key by using the second private key, generates a second recording key, and The second recording key is fed back to the second set top box.
  • the second set top box decrypts the second recording key to obtain the random key, and decrypts the encrypted program by using the random key to obtain a decrypted program to implement subsequent Playing the decrypted program.
  • the second set top box sets the second recording key to the encryption engine, decrypts the second recording key to obtain the random key, and decrypts the recorded program by using the random key to obtain The encrypted audio and video data is played and played back to play back the recorded program.
  • the playback process provided by this embodiment determines whether the recorded program being played back is recorded by the local device, and if not recorded by the local device, acquires a random key through the PMS system, and decrypts the random key by using the random key. Recording the program, sharing the recorded program.
  • the playback method provided in this embodiment breaks the one-to-one mode of the traditional PVR program, and realizes a one-to-many flexible manner; and, breaks the limitation between the various hardware platforms, and records the content recorded from one platform to another platform. It can still be used to realize the sharing of PVR programs.
  • various protection measures can be added to the front end to enhance the protection of the recorded content.
  • a time stamp can be added in META DATA to control the effective time limit of the program, and a second charge can be performed.
  • the content recorded on STB1 is placed on STB2 for viewing, and STB2 itself does not purchase related program packages, etc., making the management of the front end more convenient and flexible.
  • the embodiment further provides a PVR protection method, and the method further includes a playback process.
  • the playback process may include steps 402-426.
  • step 402 the set top box is connected to the external storage device, and displays the information of the recorded program carried by the external storage device on the menu of the set top box, and receives the user's selection operation.
  • step 404 a play command is generated according to the selecting operation, and the set top box reads the metadata META DATA corresponding to the recorded program RECORD CONTENT to be played back according to the play instruction; if the reading fails, step 426 is executed to end the play and prompt User; if the reading is successful, step 406 is performed.
  • step 406 the set-top box reads the chip number CHIP ID of the local machine as CHIP ID2, compares the CHIP ID2 with the CHIP ID1 in META DATA, and if CHIP ID1 and CHIP ID2 are equal, step 408 is performed; otherwise, Go to step 412.
  • step 408 set top box STB1 sets RECORD KEY1 in META DATA to the encryption engine to decrypt the PVR KEY.
  • step 410 the set top box STB1 decrypts the recorded content RECORD CONTENT by using the PVR KEY, obtains the decrypted audio and video data and completes the playing, and the process ends.
  • step 412 set top box STB2 sends the META DATA data and CHIP ID2 over the network to the PMS.
  • step 414 the PMS retrieves the database to determine whether the set top box STB2 has playback rights: if the set top box STB2 is allowed to play, step 416 is performed; otherwise, the PMS returns the unplayable rights information to the STB2 via the network and performs step 420. .
  • step 416 the PMS decrypts the RECORD KEY1 according to the first private key SK1 corresponding to the CHIP ID1 to obtain the PVR KEY, and then encrypts the PVR KEY with the second private key SK2 corresponding to the CHID ID2 to obtain the RECORD KEY2.
  • step 418 the PMS returns the playback rights of STB2 and RECORD KEY2 to the set top box STB2 over the network.
  • step 420 the set top box STB2 determines the return result of the PMS: if playback is allowed, step 422 is performed, and if playback is not allowed, step 426 is performed.
  • step 422 the set top box STB2 sets RECORD KEY2 to the encryption engine to decrypt the PVR KEY.
  • step 424 the set top box STB2 reads the recorded content RECORD CONTENT, and decrypts the RECORD CONTENT using the PVR KEY to obtain the decrypted audio and video data and complete the playing.
  • step 426 playback is stopped.
  • This embodiment further provides a PVR protection system, as shown in FIG. 5, which may include: a set top box 100 and a PVR management system PMS200.
  • the set top box 100 may include: a first sending module 101, and a first decrypting module. 102 and save module 103.
  • the first sending module 101 is configured to: when the recording instruction is triggered, send, to the PVR management system PMS, the request information for acquiring the first recording key, where the request information includes the first identifier of the first set top box information.
  • the first decryption module 102 is configured to decrypt the first recording key to obtain a random key, and encrypt the descrambled audio and video data by using the random key to obtain an encrypted program.
  • the saving module 103 is configured to save the encrypted program to an external storage device to implement PVR encrypted recording.
  • the management system PMS200 is configured to generate a random key according to the request information, and encrypt the random key according to the first private key corresponding to the first identification information to obtain a first recording key.
  • the set top box further includes: a comparison module 104, a second sending module 105, and a second decryption module 106.
  • the comparison module 104 is configured to read the encrypted program, the first identification information, and the first recording key from the external storage device when the playback instruction is triggered, and set the second identification information of the second identification information. The first identification information corresponding to the recorded recorded program is compared.
  • the second sending module 105 is configured to: when the second identifier information is different from the first identifier information, send the second identifier information, the first identifier information, and the first recording key corresponding to the recorded program to PMS.
  • the PVR management system PMS200 is further configured to: generate a second recording key according to the second identifier information, the corresponding first identifier information, and the first recording key.
  • the set top box 100 may further include: a second decryption module 106 configured to decrypt the second recording key to obtain the random key, and decrypt the encrypted program by using the random key to obtain a decrypted program To achieve subsequent playback of the decrypted program.
  • the set top box further includes: a third decryption module 107, configured to decrypt the first recording key to obtain the random key when the second identifier information is the same as the first identifier information And decrypting the encrypted program by using the random key to obtain the decrypted program.
  • the set top box may include a plurality of set top boxes, and each of the set top boxes may be configured with the first sending module 101, the first decrypting module 102, the saving module 103, the comparing module 104, the second sending module 105, and the second decrypting module 106.
  • the third decryption module 107 for example, the set top box may include a first set top box and a second set top box, and the corresponding operations may be performed by the first sending module, the first decrypting module, the saving module, and the third decrypting module disposed in the first set top box.
  • Encrypted recording of the program by the first set top box the comparison module, the second sending module and the second decrypting module set by the second set top box perform the corresponding operations, and the second set top box inputs the encrypted program recorded by the first set top box Decryption, program playback, and resource sharing of encrypted programs between multiple set-top boxes.
  • This embodiment further provides a personal video recording PVR protection method, which can be applied to a PVR management system PMS. As shown in FIG. 7, the method may include steps 710-760.
  • step 710 the request information for acquiring the first recording key sent by the first set top box is received, where the request information includes first identification information of the first set top box.
  • step 720 determining, according to the first identification information, whether the first set top box has recording authority; when the first set top box has recording permission, generating a random key, and according to the first identification information and the The random key is obtained to obtain the first recording key.
  • step 730 the first recording key is sent to the first set top box, so that the first set top box decrypts the first recording key to obtain the random key, and the random key is utilized. Encrypting the encrypted data stream to obtain an encrypted data stream, so that the second set top box acquires the encrypted data stream, the first identification information, and the first recording key.
  • step 740 the first identification information, the first recording key, and the second identification information of the second set top box sent by the second set top box are received, where the second set top box is different from the first set top box.
  • Set-top box
  • step 750 determining, according to the second identifier information, whether the second set top box has a play permission; and when the second set top box has a play right, the first record key is used according to the first identifier information. Performing decryption to obtain the random key; and obtaining a second recording key according to the second identification information and the random key.
  • step 760 the second recording key is sent to the second set top box, so that the second set top box decrypts the second recording key, the random key is obtained, and the random key is utilized.
  • the key decrypts the encrypted data stream to obtain a decrypted data stream.
  • the determining, according to the first identifier information, whether the first set top box has the recording permission comprises: acquiring the recording authority information of the first set top box according to the first identifier information; The recording permission information of the set top box determines whether the first set top box has recording permission.
  • the method includes: acquiring the play permission information of the second set top box according to the second identifier information; The permission information determines whether the second set top box has a play permission.
  • the first set top box when the first set top box has the recording permission, generate a random key, and obtain the first recording key according to the first identification information and the random key, including: First When the set-top box has the recording permission, the random key is generated, and the first private key of the first set-top box is obtained according to the first identification information; and the random key is encrypted according to the first private key, The first recording key.
  • the obtaining, according to the second identifier information, the second record key, the second private key of the second set top box is obtained according to the second identifier information;
  • the second private key encrypts the random key to obtain a second recording key.
  • the embodiment further provides a personal video recording PVR protection method, which can be applied to the first set top box. As shown in FIG. 8, the method may include steps 810- 830.
  • the request information of the first recording key is sent to the management system PMS of the PVR, where the request information includes first identification information of the first set top box, so that the PMS is based on the first identifier. Determining whether the first set top box has recording permission, and generating a random key when the first set top box has recording permission, and obtaining and reporting the first identification information according to the first identification information and the random key The first set top box sends the first recording key.
  • step 820 the first recording key sent by the management system PMS of the PVR is received.
  • step 830 the first recording key is decrypted to obtain the random key, and the data stream to be encrypted is encrypted by the random key to obtain an encrypted data stream.
  • the decrypting the first recording key to obtain the random key comprises: decrypting the first recording key by using a first private key corresponding to the first identification information, to obtain The random key.
  • This embodiment further provides a personal video recording PVR protection method, which can be applied to a second set top box. As shown in FIG. 9, the method may include steps 910-930.
  • step 910 the encrypted data stream after the first set top box is encrypted, the first identification information of the first set top box, and the first recording key are obtained, where the first recording key is a PVR management system PMS.
  • the first set top box has recording permission, it is obtained according to the generated random key and the first identification information.
  • step 920 the first identifier information, the first recording key, and the second identifier information of the second set top box are sent to the PMS, so that the PMS determines according to the second identifier information. Whether the second set top box has the playing right, and when the second set top box has the playing right, decrypting the first recording key according to the first identification information, obtaining the random key, and according to the Decoding the second identification information and the random key to obtain a second recording key, and sending the second recording key to the second set top box.
  • step 930 receiving the second recording key sent by the management system PMS of the PVR; decrypting the second recording key to obtain the random key, and using the random key to pair the encrypted data
  • the stream is decrypted to obtain a decrypted data stream.
  • the decrypting the second recording key to obtain the random key comprises: decrypting the second recording key by using a second private key corresponding to the second identifier information, to obtain The random key.
  • the first set top box and the second set top box are interchangeable, that is, the first set top box can also realize encrypted recording of the program, and the second set top box can realize decryption and playing of the program, and the first set top box and the second set top box can execute the program.
  • the steps of decryption and program decryption are interchangeable, that is, the first set top box can also realize encrypted recording of the program, and the second set top box can realize decryption and playing of the program, and the first set top box and the second set top box can execute the program.
  • the embodiment also provides a PVR management system PMS.
  • the system may include:
  • the receiving module 1010 is configured to: receive request information for acquiring a first recording key sent by the first set top box, where the request information includes first identifier information of the first set top box.
  • the authority judging module 1020 is configured to: determine, according to the first identifier information, whether the first set top box has recording authority.
  • the key processing module 1030 is configured to: when the first set top box has recording permission, generate a random key, and obtain the first recording key according to the first identification information and the random key.
  • the data processing module 1040 is configured to: send the first recording key to the first set top box, so that the first set top box decrypts the first recording key to obtain the random key, by using the The random key encrypts the encrypted data stream to obtain an encrypted data stream, so that the second set top box acquires the encrypted data stream, the first identification information, and the first recording key.
  • the receiving module 1010 is further configured to: receive the first identifier information sent by the second set top box, the first recording key, and second identifier information of the second set top box, where the second set top box is first Set-top boxes are different set-top boxes.
  • the authority determining module 1020 is further configured to: determine, according to the second identifier information, whether the second set top box has a play right.
  • the key processing module 1030 is further configured to: when the second set top box has a play permission, decrypt the first record key according to the first identifier information, to obtain the random key; The second identification information and the random key obtain a second recording key.
  • the data processing module 1040 is further configured to: send the second recording key to the second set top box, so that the second set top box decrypts the second recording key to obtain the random key, and Profit Decrypting the encrypted data stream with the random key results in a decrypted data stream.
  • the permission judging module 1020 is configured to: obtain the recording permission information of the first set top box according to the first identification information; and determine, according to the recording permission information of the first set top box, whether the first set top box has Recording authority; obtaining, according to the second identifier information, the playing permission information of the second set top box; and determining, according to the playing right information, whether the second set top box has a playing right.
  • the key processing module 1030 is configured to: when the first set top box has recording permission, generate a random key, and acquire a first private key of the first set top box according to the first identification information; A private key encrypts the random key to obtain the first recording key.
  • the key processing module 1030 is further configured to: acquire a second private key of the second set top box according to the second identification information; and encrypt the random key according to the second private key to obtain a second Record the key.
  • the device embodiments described above are merely illustrative.
  • the division of the modules is only a logical function division.
  • multiple units or components may be combined or integrated. Go to another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • the plurality of functional units in the embodiment may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
  • the above software functional unit is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to execute all of the methods described in this embodiment. Or part of the steps.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .
  • the embodiment further provides a computer readable storage medium storing computer executable instructions for performing any of the above methods.
  • FIG. 11 it is a hardware structure diagram of a PVR management device provided by this embodiment.
  • the PVR management device includes: a processor 1110 and a memory 1120. Communication Interface 1130 and Bus 1140.
  • the processor 1110, the memory 1120, and the communication interface 1130 can complete communication with each other through the bus 1140.
  • Communication interface 1130 can be used for information transmission.
  • the processor 1110 can invoke logic instructions in the memory 1120 to perform the respective methods provided by the above embodiments.
  • the set top box includes: a processor 1210 and a memory 1220; and may further include a communication interface 1230 and a bus 1240.
  • the processor 1210, the memory 1220, and the communication interface 1230 can complete communication with each other through the bus 1240.
  • Communication interface 1230 can be used for information transfer.
  • the processor 1210 can invoke logic instructions in the memory 1220 to perform the respective methods provided by the above embodiments.
  • Both the memory 1120 and the memory 1220 may include a storage program area and a storage data area, and the storage program area may store an operating system and an application required for at least one function.
  • the storage data area can store data and the like created according to the use of the electronic device.
  • the memory may include, for example, a volatile memory of a random access memory, and may also include a non-volatile memory. For example, at least one disk storage device, flash memory device, or other non-transitory solid state storage device.
  • any of the logic instructions in memory 1120 and memory 1220 described above can be implemented in the form of a software functional unit and sold or used as a stand-alone product
  • the logic instructions can be stored in a computer readable storage medium.
  • the technical solution of the present disclosure may be embodied in the form of a computer software product, which may be stored in a storage medium, and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) All or part of the steps of the corresponding method provided by the embodiment are performed.
  • the storage medium may be a non-transitory storage medium or a transitory storage medium.
  • the non-transitory storage medium may include: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. medium.
  • All or part of the process in the above embodiment method can be indicated by a computer program.
  • the hardware is completed, and the program can be stored in a non-transitory computer readable storage medium.
  • the program is executed, the flow of the embodiment of the above method can be implemented.
  • the present disclosure provides a PVR protection method for generating a random key for encrypting and recording a program through a PMS, and acquiring the random key through a PMS during playback, and decrypting the program by the random key, so that the program is recorded except
  • Other set-top boxes other than the set-top box can also play back the encrypted recorded program to share the recorded program.

Abstract

La présente invention concerne un système et un procédé de protection PVR. Le procédé comprend les étapes suivantes : lorsqu'une instruction d'enregistrement d'un premier boîtier décodeur est déclenchée, le premier boîtier décodeur envoie des informations de demande pour obtenir une première clé d'enregistrement à un système de gestion PVR (PMS), les informations de demande comprenant des premières informations d'identification du premier boîtier décodeur; le PMS reçoit les informations de demande et génère une clé aléatoire, crypte la clé aléatoire conformément à une première clé privée correspondant aux premières informations d'identification afin d'obtenir la première clé d'enregistrement, et envoie la première clé d'enregistrement au premier boîtier décodeur; le premier boîtier décodeur reçoit et décrypte la première clé d'enregistrement afin d'obtenir la clé aléatoire, et crypte des données audio désembrouillées avec la clé aléatoire afin d'obtenir un programme crypté; et le premier boîtier décodeur stocke le programme crypté vers un dispositif de stockage externe afin d'obtenir un enregistrement crypté PVR.
PCT/CN2017/110334 2016-11-10 2017-11-10 Système et procédé de protection pvr WO2018086566A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610989564.1A CN106533668B (zh) 2016-11-10 2016-11-10 一种基于网络的pvr保护方法及系统
CN201610989564.1 2016-11-10

Publications (1)

Publication Number Publication Date
WO2018086566A1 true WO2018086566A1 (fr) 2018-05-17

Family

ID=58350920

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/110334 WO2018086566A1 (fr) 2016-11-10 2017-11-10 Système et procédé de protection pvr

Country Status (2)

Country Link
CN (1) CN106533668B (fr)
WO (1) WO2018086566A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389839A (zh) * 2021-12-10 2022-04-22 国网浙江省电力有限公司宁波供电公司 一种基于5g网络模组的pms数据传输系统及方法

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533668B (zh) * 2016-11-10 2019-09-10 深圳创维数字技术有限公司 一种基于网络的pvr保护方法及系统
CN107820128B (zh) * 2017-11-10 2019-12-27 深圳创维-Rgb电子有限公司 Usb录制功能定制方法、装置及计算机可读存储介质
CN113542877B (zh) * 2021-07-13 2023-05-05 四川长虹网络科技有限责任公司 Pvr资源的分享方法、系统、计算机设备和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030235393A1 (en) * 2002-06-25 2003-12-25 International Business Machines Corporation Personal video recording with storage space requirement checking
CN103024475A (zh) * 2012-12-21 2013-04-03 深圳市九洲电器有限公司 电视节目的录制及授权播放方法及系统
CN103974117A (zh) * 2013-02-06 2014-08-06 中兴通讯股份有限公司 一种共享录制方法、装置、服务器和机顶盒
CN106533668A (zh) * 2016-11-10 2017-03-22 深圳创维数字技术有限公司 一种基于网络的pvr保护方法及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281468A (zh) * 2011-08-09 2011-12-14 深圳市九洲电器有限公司 个人视频录像的录制、播放方法、装置及机顶盒

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030235393A1 (en) * 2002-06-25 2003-12-25 International Business Machines Corporation Personal video recording with storage space requirement checking
CN103024475A (zh) * 2012-12-21 2013-04-03 深圳市九洲电器有限公司 电视节目的录制及授权播放方法及系统
CN103974117A (zh) * 2013-02-06 2014-08-06 中兴通讯股份有限公司 一种共享录制方法、装置、服务器和机顶盒
CN106533668A (zh) * 2016-11-10 2017-03-22 深圳创维数字技术有限公司 一种基于网络的pvr保护方法及系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389839A (zh) * 2021-12-10 2022-04-22 国网浙江省电力有限公司宁波供电公司 一种基于5g网络模组的pms数据传输系统及方法
CN114389839B (zh) * 2021-12-10 2023-12-08 国网浙江省电力有限公司宁波供电公司 一种基于5g网络模组的pms数据传输系统及方法

Also Published As

Publication number Publication date
CN106533668A (zh) 2017-03-22
CN106533668B (zh) 2019-09-10

Similar Documents

Publication Publication Date Title
US11417663B2 (en) System and method for data collection and exchange with protected memory devices
WO2018177110A1 (fr) Procédé et dispositif de concession de licence de contenu multimédia
US20230306089A1 (en) Systems and methods for content security
US20100310076A1 (en) Method for Performing Double Domain Encryption in a Memory Device
AU2012241181B2 (en) System and method for asset lease management
US10055553B2 (en) PC secure video path
WO2018086566A1 (fr) Système et procédé de protection pvr
US20060235956A1 (en) Information process distribution system, information processing apparatus and information process distribution method
WO2018064955A1 (fr) Procédé et système d'enregistrement et de lecture d'un programme
US20070064936A1 (en) Content data delivery method and content data delivery system and handheld device for use therein
US8180709B2 (en) Method and device for consuming rights objects having inheritance structure in environment where the rights objects are distributed over plurality of devices
US20040250077A1 (en) Method of establishing home domain through device authentication using smart card, and smart card for the same
US9800561B2 (en) Secure sharing of user annotated subscription media with trusted devices
US8997216B2 (en) Recording medium apparatus and control method for authenticating a device based on a revocation list
US9083685B2 (en) Method and system for content replication control
WO2011072607A1 (fr) Procédé, appareil et système de protection segmentée de fichier
KR101944468B1 (ko) 컨텐츠를 보호하기 위한 방법, 호스트 장치, 저장 장치 및 기계로 읽을 수 있는 저장 매체
CN108650526B (zh) 一种识别方法、计算机设备和存储介质
KR20090000273A (ko) Drm 디바이스를 이용하여 drm 기능과 부가 기능을수행하기 위한 방법 및 그 시스템
US8634555B2 (en) Information processing apparatus, information processing method, and program
JP5361031B2 (ja) 暗号認証処理方法及び装置
JP2006155332A (ja) コンテンツ出力装置及びコンテンツ出力方法、コンテンツ取得装置及びコンテンツ取得方法
CN204652425U (zh) 一种个性化媒体播控系统
CN102231854A (zh) 多媒体广播节目录制方法及数据卡设备
JP2008016095A (ja) 通信システム、復号再生装置、記録装置、通信プログラム及び記録媒体

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17869840

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17869840

Country of ref document: EP

Kind code of ref document: A1