[go: up one dir, main page]

CN100388240C - Content playback device and content playback method - Google Patents

Content playback device and content playback method Download PDF

Info

Publication number
CN100388240C
CN100388240C CNB2005101069950A CN200510106995A CN100388240C CN 100388240 C CN100388240 C CN 100388240C CN B2005101069950 A CNB2005101069950 A CN B2005101069950A CN 200510106995 A CN200510106995 A CN 200510106995A CN 100388240 C CN100388240 C CN 100388240C
Authority
CN
China
Prior art keywords
content
information
key
data
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB2005101069950A
Other languages
Chinese (zh)
Other versions
CN1779659A (en
Inventor
堀吉宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sanyo Electric Co Ltd
Original Assignee
Sanyo Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sanyo Electric Co Ltd filed Critical Sanyo Electric Co Ltd
Publication of CN1779659A publication Critical patent/CN1779659A/en
Application granted granted Critical
Publication of CN100388240C publication Critical patent/CN100388240C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

本发明提供一种在保护内容的著作权的同时,提高用户的方便性的内容再生装置和内容再生方法。其中从存储装置接收内容使用信息,利用所接收的内容使用信息中包含的内容密钥,对加密内容数据进行译码处理,存储表示上述内容使用信息的使用状态的状态信息,测定利用上述内容密钥的上述加密内容数据的译码的经过时间、或利用上述内容密钥而被译码的上述加密数据的再生的经过时间,根据所测定的经过时间,进行内容使用信息的消费判断,将内容使用信息的消费的判断反映在记录于记录存储部中的状态信息中。

Figure 200510106995

The present invention provides a content playback device and a content playback method that improve user convenience while protecting the copyright of the content. The content usage information is received from the storage device, the encrypted content data is decoded using the content key included in the received content usage information, the status information indicating the usage status of the content usage information is stored, and the content key is measured using the content key. key, or the elapsed time of reproduction of the encrypted data decoded using the content key, based on the measured elapsed time, the consumption judgment of the content usage information is performed, and the content The determination of the consumption of the usage information is reflected in the state information recorded in the record storage unit.

Figure 200510106995

Description

内容再生装置和内容再生方法 Content playback device and content playback method

技术领域 technical field

本发明涉及内容再生技术,尤其涉及对加密过的内容进行译码,再生处理的内容再生装置及其方法。The present invention relates to content reproducing technology, in particular to a content reproducing device and method for decoding and reproducing encrypted content.

背景技术 Background technique

作为保护内容数据的著作权保护方式,公知:对内容数据进行加密,提高包括其译码密钥(在下面称为“内容密钥”)的内容使用信息(在下面称为“许可数据”)的隐匿性并进行管理的方式(比如,参照专利文献1)。在专利文献1所公开的内容数据配送系统中,作为在非加密的状态下对许可数据进行处理的装置,列举有服务器装置、作为存储装置的存储卡、作为使用装置的解码器的3种装置。另外,在服务器装置与存储装置,以及存储装置与使用装置之间,构筑加密通信通路,通过该加密通信通路,进行许可数据的发送接收。在服务器装置、存储装置、使用装置中备有用于对加密过的许可数据进行处理的TRM(Tamper Resistant Module)。As a copyright protection method for protecting content data, it is known to encrypt content data and increase the security of content usage information (hereinafter referred to as "licensed data") including its decryption key (hereinafter referred to as "content key"). A method of concealing and managing (for example, refer to Patent Document 1). In the content data distribution system disclosed in Patent Document 1, three types of devices are listed as a device for processing license data in an unencrypted state: a server device, a memory card as a storage device, and a decoder as a use device. . In addition, an encrypted communication path is established between the server device and the storage device, and between the storage device and the user device, and the license data is transmitted and received through the encrypted communication path. A TRM (Tamper Resistant Module) for processing encrypted license data is provided in the server device, storage device, and user device.

在该加密通信通路的构筑中,首先,提供许可数据的装置(在下面称为“提供装置”)向享有许可数据的装置(在下面称为“许可数据享有装置”)发送包括公开密钥的证明书。另外,该许可提供装置验证该证明书,作为验证的结果,在从许可享有装置发送的证明书为正规的证明书,并且没有被证明书删除列表认为无效的情况下,利用该证明书中包含的公开密钥,在装置之间进行密钥交换。而且,被从许可提供装置发送给许可享有装置的密钥加密过的许可数据,从许可提供装置发送到许可享有装置。TRM为以物理方式对隐匿性进行保护的电路模块,其构成为仅通过加密通信通路就可以获取许可数据。In the construction of this encrypted communication path, first, a device that provides license data (hereinafter referred to as "providing device") transmits a file including a public key to a device that owns license data (hereinafter referred to as "license data sharing device"). certificate. In addition, the license providing device verifies the certificate, and as a result of the verification, if the certificate sent from the license enjoying device is a legitimate certificate and is not invalidated by the certificate deletion list, use the certificate included in the certificate. The public key of the device is exchanged between devices. Then, the license data encrypted with the key transmitted from the license providing device to the license sharing device is sent from the license providing device to the license sharing device. The TRM is a circuit module that physically protects privacy, and is configured to acquire licensed data only through an encrypted communication channel.

此外,在获得许可数据时,存储卡安装于可与服务器装置通信的终端装置上,通过该终端装置,从服务器装置接收许可数据。另外,在使用内容时,存储卡安装于内置了解码器的终端装置上,通过终端装置,将许可数据发送给解码器。Also, when acquiring the license data, the memory card is mounted on a terminal device capable of communicating with the server device, and the license data is received from the server device through the terminal device. In addition, when content is used, the memory card is mounted on a terminal device having a built-in decoder, and the license data is transmitted to the decoder through the terminal device.

还有,在该系统中,存储卡本身可按照许可数据内的限制信息,限制许可数据的输出。比如,许可数据包括表示可利用该许可数据、再生内容数据的次数的限制信息。在再生时,存储卡确认许可数据内的再生次数的限制信息,判断是否可输出许可数据。在输出时,进行该控制信息的更新,在反复进行再生后,最终禁止许可数据的输出。Also, in this system, the memory card itself can restrict the output of the licensed data in accordance with the restriction information in the licensed data. For example, the license data includes restriction information indicating the number of times the content data can be reproduced using the license data. At the time of reproduction, the memory card checks the limit information on the number of times of reproduction in the permitted data, and judges whether or not the permitted data can be output. At the time of output, this control information is updated, and after reproduction is repeated, the output of the permission data is finally prohibited.

如上所述,在内容配送服务中,通过内容数据的加密,许可数据的隐匿,谋求彻底地实现内容相关的著作权保护。另外,通过再生次数控制等使用限制的导入,可应用于各种服务形式。这样,通过谋求彻底地实现内容著作权的保护,从而可保护内容权利者的权利,可实现内容的安全的提供。其结果是,成为配送服务的对象的内容的阵容(lineup)也增加,可在更宽的范围内满足接收内容配送的用户的需求。As described above, in the content distribution service, the content data is encrypted and the license data is concealed, so as to realize the copyright protection related to the content thoroughly. In addition, it can be applied to various service forms by introducing usage restrictions such as reproduction number control. Thus, by achieving thorough protection of the copyright of the content, the rights of the content right holder can be protected, and safe provision of the content can be realized. As a result, the lineup of content subject to the delivery service also increases, and the needs of users who receive content delivery can be met in a wider range.

【专利文献1】国际公开WO01/43342号文献[Patent Document 1] International Publication No. WO01/43342

如上所述,在现有的内容配送系统中,从存储装置向再生装置发送了再生次数受到限制的许可数据,但是,在再生装置中不进行利用该许可数据的再生的情况下,用户失去再生的权利。即使在以试听为目的,再生内容的一部分的情况下,同样用户失去再生的权利As mentioned above, in the existing content distribution system, the license data whose number of times of playback is limited is transmitted from the storage device to the playback device, but if the playback device does not perform playback using the license data, the user loses playback. s right. Even in the case of reproducing part of the content for the purpose of trial listening, the user loses the right to reproduce

发明内容 Contents of the invention

本发明是针对这样的状况而提出的,本发明的目的在于提供一种在保护内容的著作权的同时,提高用户的方便性的技术。The present invention is made in view of such a situation, and an object of the present invention is to provide a technique for improving user convenience while protecting the copyright of content.

针对上述课题,本发明分别具有下述的特征。To solve the above-mentioned problems, the present invention has the following features, respectively.

本发明的某一形态的内容再生装置,其利用记录于存储装置中的、包括用于对加密内容数据进行译码处理的内容密钥的内容使用信息,对该加密内容数据进行译码,并进行再生,该内容再生装置包括:接口,其在与存储装置之间控制数据的授受;内容译码部,其通过包含于内容使用信息中的内容密钥,对加密内容数据进行译码;内容密钥输出部,其从上述存储装置接收内容使用信息,将所接收的内容使用信息中包含的内容密钥输出到内容译码部;记录存储部,其存储表示内容使用信息的使用状态的状态信息;判断部,其获得内容译码部中的利用内容密钥的加密内容数据的译码的经过时间、或在上述内容译码部中利用内容密钥进行译码处理的加密内容数据的再生的经过时间,根据已取得的经过时间,判断是否认定为利用了内容密钥,使判断结果反映于记录在上述记录存储部内的状态信息中。A content playback device according to an aspect of the present invention decodes the encrypted content data by using content use information including a content key for decoding the encrypted content data recorded in the storage device, and Playback, the content playback device includes: an interface, which controls the exchange of data with the storage device; a content decoding unit, which decodes the encrypted content data through the content key included in the content use information; the content a key output unit that receives the content use information from the storage device, and outputs the content key contained in the received content use information to the content decoding unit; and a record storage unit that stores a state indicating the use state of the content use information information; a determination unit that obtains the elapsed time of decoding encrypted content data using the content key in the content decoding unit, or reproduction of the encrypted content data that was decoded using the content key in the content decoding unit Based on the obtained elapsed time, it is judged whether the content key is recognized as being used, and the judgment result is reflected in the status information recorded in the above-mentioned record storage unit.

根据该形态,在再生的经过时间短到可以认定为未使用内容密钥的程度的情况下,由于使未利用内容密钥的情况的状态信息反映到作为记录(log)存储的状态信息中,由此,可谋求使用者的方便,可以保护再生的权利。According to this aspect, when the elapsed time of playback is short enough to determine that the content key has not been used, since the state information of the case where the content key is not used is reflected in the state information stored as a log, Thereby, user's convenience can be improved, and reproduction rights can be protected.

还可包括上述经过时间,并将其通知给判断部的经过时间测定部。经过时间测定部在内容密钥输出部将内容密钥输出到内容译码部后,测定从译码或再生处理的开始时起的经过时间,上述判断部根据经过时间超过规定时间,认定为利用了内容密钥。The above-mentioned elapsed time may also be included and notified to the elapsed time measuring unit of the judging unit. After the content key output unit outputs the content key to the content decoding unit, the elapsed time measurement unit measures the elapsed time from the start of the decoding or playback process, and the above-mentioned judging unit determines that the content key is used if the elapsed time exceeds a predetermined time. content key.

也可包括测定经过时间,并将其通知给判断部的经过时间测定部。经过时间测定部根据内容译码部所译码的数据量,或对译码过的加密内容数据进行再生的数据量,计算经过时间,并将其通知给判断部,判断部根据经过时间超过规定时间,认定为利用了内容密钥。An elapsed time measuring unit that measures elapsed time and notifies it to the judging unit may also be included. The elapsed time measurement unit calculates the elapsed time based on the amount of data decoded by the content decoding unit or the amount of data reproduced from the decoded encrypted content data, and notifies the elapsed time to the judging unit. time, it is assumed that the content key is used.

规定时间包含于内容使用信息中,内容密钥输出部将包含于已接收的内容使用信息中的规定时间输出到判断部。规定时间可以为45秒。The predetermined time is included in the content use information, and the content key output unit outputs the predetermined time included in the received content use information to the judgment unit. The specified time may be 45 seconds.

判断部还包括控制部,其在判定为未利用内容密钥的情况下,向存储装置请求,以使记录于存储装置中的内容使用信息恢复到接收之前的状态。The judging unit further includes a control unit that requests the storage device to return the content usage information recorded in the storage device to a state before receiving the content key when it is judged that the content key is not used.

控制部也可在向存储装置请求将内容使用信息恢复到接收之前的状态时,将包含记录于记录存储部中的状态信息的记录信息发送给存储装置。该记录信息也可用于判断存储装置是否允许恢复。The control unit may transmit the log information including status information recorded in the log storage unit to the storage device when requesting the storage device to return the content use information to the state before receiving it. The record information can also be used to determine whether the storage device allows restoration.

控制部也可将下述信息的散列值与记录信息一起发送给存储装置,该信息包括内容再生装置和存储装置之间共用的共用密钥。该散列值还可用于存储装置判断内容再生装置的合法性。The control unit may transmit to the storage device a hash value of information including a common key shared between the content playback device and the storage device together with the recording information. The hash value can also be used by the storage device to judge the legitimacy of the content reproduction device.

记录存储部在接收内容使用信息时,以原始状态存储该内容使用信息的至少一部分,控制部也可在向存储装置请求使内容使用信息恢复到接收之前的状态时,将存储于记录存储部中的原始状态的内容使用信息发送给存储装置。The record storage unit stores at least a part of the content use information in an original state when receiving the content use information, and the control unit may also store the content use information in the record storage unit when requesting the storage device to restore the content use information to the state before receiving the content use information. The content usage information in the original state is sent to the storage device.

本发明的另一形态为内容再生方法。该方法是利用记录于存储装置中的、包括用于对加密内容数据进行译码的内容密钥的内容使用信息,对加密内容数据进行译码并再生的内容再生方法,其中,从存储装置接收内容使用信息,利用包含于已接收的内容使用信息中的内容密钥,对加密内容数据进行译码,在记录存储部中存储表示内容使用信息的使用状态的状态信息,获得利用了内容密钥的加密内容数据的译码的经过时间、或利用内容密钥进行译码的加密内容数据的再生的经过时间,根据已获得的经过时间,判断是否认定为利用了内容密钥,并使判断结果反映在记录于记录存储部内的状态信息中。Another aspect of the present invention is a content playback method. This method is a content reproducing method for decoding and reproducing encrypted content data by using content usage information including a content key for decoding encrypted content data recorded in a storage device, wherein the content received from the storage device The content usage information uses the content key included in the received content usage information to decrypt the encrypted content data, stores state information indicating the usage status of the content usage information in the record storage unit, and obtains the content key used. The elapsed time of decryption of the encrypted content data, or the elapsed time of reproduction of the encrypted content data decoded by using the content key, based on the obtained elapsed time, it is judged whether the content key is used, and the judgment result It is reflected in the status information recorded in the log storage unit.

经过时间从译码或再生处理的开始时起,通过定时器测定,可以在经过时间超过规定时间时,认定为利用了内容密钥。根据经译码处理的数据量、或对译码后的加密内容数据进行再生的数据量,计算经过时间,在经过时间超过规定时间时,认定为利用了内容密钥。规定时间时刻包含在内容使用信息中。规定时间可以为45秒。The elapsed time is measured by a timer from the start of decoding or playback processing, and when the elapsed time exceeds a predetermined time, it can be determined that the content key is used. The elapsed time is calculated based on the amount of decoded data or the amount of data reproduced after decoding the encrypted content data, and when the elapsed time exceeds a predetermined time, it is determined that the content key has been used. The predetermined time is included in the content usage information. The specified time may be 45 seconds.

在判定为未利用内容密钥的情况下,向存储装置请求使记录于存储装置中的内容使用信息恢复到接收之前的状态。When it is determined that the content key is not used, the storage device is requested to return the content usage information recorded in the storage device to the state before the reception.

对加密内容数据进行译码、再生的内容再生装置在向存储装置请求:使内容使用信息恢复到接收之前的状态时,可以将包括记录在记录存储部中的状态信息的记录信息发送给存储装置。存储装置也可以参照记录信息,判断内容使用信息的恢复是否允许,在判定为允许恢复时,将内容使用信息恢复到原始状态。存储装置也可以记录表示内容使用信息的使用状态的状态信息,存储装置进一步参照本身记录的状态信息,判断内容使用信息的恢复是否允许。When the content reproduction device that decodes and reproduces the encrypted content data requests the storage device to return the content use information to the state before receiving it, it can send the record information including the state information recorded in the record storage unit to the storage device . The storage device may refer to the log information to determine whether restoration of the content use information is permitted, and restore the content use information to its original state when it is determined that restoration is permitted. The storage device may also record state information indicating the use state of the content use information, and the storage device further refers to the state information recorded by itself to determine whether restoration of the content use information is permitted.

也可将包括在内容再生装置和存储装置之间共用的共用密钥的信息的散列值,与记录信息一起发送给存储装置。存储装置还可参照散列值,确认请求了内容使用信息的恢复的内容再生装置为本身发送该内容使用信息的装置,在确认了时,将内容使用信息恢复到原始状态。A hash value of information including a common key shared between the content playback device and the storage device may be transmitted to the storage device together with the recording information. The storage device may also refer to the hash value to confirm that the content playback device that requested the restoration of the content use information is the device that sent the content use information itself, and restore the content use information to the original state when confirmed.

存储装置也可以在将内容使用信息发送给内容再生装置时,以原始状态存储该内容使用信息的至少一部分,在从该内容再生装置请求使内容使用信息恢复到原始状态时,通过用以原始状态存储的内容使用信息覆写内容使用信息,从而恢复到原始状态。The storage device may also store at least a part of the content usage information in an original state when transmitting the content usage information to the content playback device, and may use the original The stored content usage information overwrites the content usage information, thereby restoring the original state.

记录存储部也可以在接收了内容使用信息时,以原始状态存储该内容使用信息的至少一部分,在向存储装置请求使内容使用信息恢复到接收之前的状态时,将存储于记录存储部中的原始状态的内容使用信息发送给存储装置。存储装置还可通过用上述原始状态的内容使用信息覆写内容使用信息来恢复到原始状态。The record storage unit may store at least a part of the content use information in an original state when receiving the content use information, and store the content stored in the record storage unit when requesting the storage device to return the content use information to the state before receiving the content use information. The content usage information in the original state is sent to the storage device. The storage device can also be restored to the original state by overwriting the content usage information with the above-mentioned content usage information in the original state.

根据下面给出的实施方式的描述,会更加明白本发明的特征乃至技术意义。但是,下述的实施方式完全是本发明的一个实施方式,本发明乃至各构成部分的术语的意义等并不限于下述实施方式中记载的形态。According to the description of the embodiments given below, the features and technical significance of the present invention will be more clearly understood. However, the following embodiments are all one embodiment of the present invention, and the present invention and the meanings of the terms of each component are not limited to the forms described in the following embodiments.

根据本发明,可提供在保护内容著作权的同时,提高用户的方便性的技术。According to the present invention, it is possible to provide technology for improving user convenience while protecting the copyright of content.

附图说明 Description of drawings

图1为表示第1实施方式的数据管理系统的构成的图;FIG. 1 is a diagram showing the configuration of a data management system according to a first embodiment;

图2为表示第1实施方式的配送系统的构成的图;Fig. 2 is a diagram showing the configuration of the delivery system of the first embodiment;

图3为表示第1实施方式的再生装置的构成的图;FIG. 3 is a diagram showing the configuration of the playback device according to the first embodiment;

图4为表示第1实施方式的存储装置的构成的图;4 is a diagram showing the configuration of the storage device according to the first embodiment;

图5为表示图2所示的密码引擎的构成的图;FIG. 5 is a diagram showing the configuration of the encryption engine shown in FIG. 2;

图6为表示图3所示的密码引擎的构成的图;FIG. 6 is a diagram showing the configuration of the encryption engine shown in FIG. 3;

图7为表示图4所示的密码引擎的构成的图;FIG. 7 is a diagram showing the configuration of the encryption engine shown in FIG. 4;

图8为说明许可数据的记录处理的图;FIG. 8 is a diagram illustrating recording processing of license data;

图9为说明许可数据的记录处理的图;FIG. 9 is a diagram illustrating recording processing of license data;

图10为说明许可数据的使用处理的图;FIG. 10 is a diagram illustrating use processing of license data;

图11为说明许可数据的使用处理的图;FIG. 11 is a diagram illustrating usage processing of license data;

图12为说明许可数据的使用处理的图;FIG. 12 is a diagram illustrating usage processing of license data;

图13为说明许可数据的使用处理的图;FIG. 13 is a diagram illustrating usage processing of license data;

图14为表示第2实施方式的配送系统的构成的图。Fig. 14 is a diagram showing the configuration of a delivery system according to a second embodiment.

图中:100-配送服务器;150-终端装置;200-存储装置;300-再生装置。In the figure: 100-distribution server; 150-terminal device; 200-storage device; 300-regeneration device.

具体实施方式 Detailed ways

下面参照附图,对本发明的实施方式进行描述。在本实施方式中,提出:在从存储装置接收内容使用信息,对加密内容数据进行译码处理,并对其进行再生的装置中,在不进行再生处理的情况,或在即使进行再生处理、仍在规定时间内的情况下,将与存储装置内的内容使用信息中包含的再生有关的控制信息恢复到输出前的状态的技术。在利用再生次数存在限制的许可数据的再生处理中,在以用于选择的找头再生或试听等为目的的局部再生中,通过不看作消费许可证的再生,从而可以保护用户所具有的内容再生的权利。Embodiments of the present invention will be described below with reference to the accompanying drawings. In this embodiment, it is proposed that, in a device that receives content usage information from a storage device, decodes encrypted content data, and reproduces it, when the reproduction process is not performed, or even if the reproduction process is performed, A technique for returning the control information related to reproduction included in the content usage information in the storage device to the state before the output while still within a predetermined time. In the reproduction processing of licensed data with a limit on the number of reproduction times, in partial reproduction for the purpose of changing the number of reproductions for selection or trial listening, the reproduction that is not regarded as a consumption license can protect the user's possession. Right to Reproduction of Content.

(第1实施方式)(first embodiment)

图1表示实施方式的数据管理系统10的整体构成。数据管理系统10包括:发送数据的配送服务器100、将从该配送服务器100发送的数据记录于存储装置200中的终端装置150、对记录于存储装置200中的数据进行再生的再生装置300、记录保持数据的存储装置200。FIG. 1 shows the overall configuration of a data management system 10 according to the embodiment. The data management system 10 includes: a distribution server 100 that transmits data, a terminal device 150 that records data transmitted from the distribution server 100 in a storage device 200, a reproduction device 300 that reproduces data recorded in the storage device 200, a recording A storage device 200 that holds data.

本实施方式的存储装置200不仅是保持数据的存储介质,而且是包括在其与终端装置150或再生装置300等主机装置之间控制数据的输入输出的控制器等结构、的驱动一体型的存储装置。在本实施方式中,以硬盘驱动器为例,对存储装置200进行描述。The storage device 200 of this embodiment is not only a storage medium for storing data, but also a drive-integrated storage device including a controller for controlling input and output of data between it and a host device such as the terminal device 150 or the playback device 300 . device. In this embodiment, the storage device 200 is described by taking a hard disk drive as an example.

现有的硬盘驱动器一般固定连接在一个主机装置上使用,但是,本实施方式的存储装置200构成为:可相对终端装置150和再生装置300等主机装置自由装卸。即,本实施方式的存储装置200为:其与CD、DVD等相同,可从主机装置上取下并运送,可在终端装置150、再生装置300以及可进行记录与再生的记录再生装置等多个主机装置之间共用的存储装置。A conventional hard disk drive is generally fixedly connected to a host device, but the storage device 200 of this embodiment is configured to be freely attached to and detached from a host device such as the terminal device 150 and the playback device 300 . That is, the storage device 200 of the present embodiment is the same as a CD, DVD, etc., and can be detached and transported from a host device, and can be used in multiple devices such as a terminal device 150, a playback device 300, and a recording and playback device that can perform recording and playback. shared storage between host devices.

这样,本实施方式的存储装置200以与多个主机装置连接为前提,比如,还具有与拥有者以外的第3者的主机装置连接,读出所记录的数据的可能性。假设在该存储装置200中记录应通过音乐、图像等的著作权保护的内容、企业或个人的机密信息等应隐匿的数据时,为了不将这些隐匿的数据泄漏到外部,最好在存储装置200本身中设置用于适当保护数据的结构,具有充分的防篡改功能。In this way, the storage device 200 of this embodiment is premised on being connected to a plurality of host devices, for example, it may be connected to a third party's host device other than the owner, and the recorded data may be read out. Assuming that data that should be concealed, such as content that should be protected by copyrights such as music and images, or confidential information of companies or individuals, should be recorded in the storage device 200, in order not to leak these hidden data to the outside, it is preferable to store them in the storage device 200. A structure set in itself for proper protection of data is sufficiently tamper-resistant.

根据这样的观点,本实施方式的存储装置200具有:在其与主机之间对隐匿数据进行输入输出时,用于对该隐匿数据进行加密并交换的结构。另外,为了存储隐匿数据,设置与普通的存储区域不同的机密数据存储区域,该机密数据存储区域构成为:如果不借助设置于存储装置200内的密码引擎,则不能够进行存取。该密码引擎仅与验证为具有合法的权限的主机装置进行隐匿数据的输入输出。以下,也将这样的数据保护功能称为“保密功能”。通过上述结构和功能,可以适当地保护记录于存储装置200中的隐匿数据。From such a viewpoint, the storage device 200 of the present embodiment has a configuration for encrypting and exchanging confidential data when inputting and outputting confidential data with a host. In addition, in order to store confidential data, a confidential data storage area different from the normal storage area is provided, and the confidential data storage area is configured so that it cannot be accessed without the encryption engine provided in the storage device 200 . The cryptographic engine performs input and output of encrypted data only with host devices that have been authenticated as having legal authority. Hereinafter, such a data protection function is also referred to as a "secrecy function". With the structure and functions described above, it is possible to properly protect the concealed data recorded in the storage device 200 .

为了以最大限度发挥存储装置200的可移式介质的特征,最好,即使为不与保密功能相对应的主机装置,也可以对普通的数据进行输入输出。由此,在本实施方式的存储装置200中,为了保持与过去的硬盘的互换性,与作为ANSI(American National Standards Institude)的标准规格的ATA(AT Attachment)相对应,上述保密功能作为ATA的扩展命令来实现。In order to maximize the characteristics of the removable medium of the storage device 200, it is preferable that even a host device that does not support a security function can input and output normal data. Therefore, in the storage device 200 of this embodiment, in order to maintain compatibility with conventional hard disks, it corresponds to ATA (AT Attachment), which is a standard specification of ANSI (American National Standards Institute), and the above-mentioned security function is implemented as ATA. The extended command is implemented.

下面作为隐匿数据的输入输出的实例,对记录再生图像等内容数据的情况进行描述。虽然可将内容数据本身作为隐匿数据进行处理,但是,在本实施方式中,对内容数据进行加密处理,将加密后的内容数据本身作为普通的数据记录于存储装置200中。另外,将包括用于对加密后的内容数据进行译码的密钥(在下面称为“内容密钥”)、与内容的再生控制或许可证的使用、移动、复制相关的控制有关的信息(在下面称为“使用规则”)的数据(在下面称为“许可数据”)作为隐匿数据,利用上述保密功能,进行输入输出处理。由此,可在保持充分的防篡改功能的同时,简化数据的输入输出,谋求处理的高速化和耗电量的降低。Next, as an example of the input and output of concealed data, a case of recording and reproducing content data such as images will be described. Although the content data itself can be handled as confidential data, in this embodiment, the content data is encrypted, and the encrypted content data itself is recorded in the storage device 200 as normal data. In addition, a key for decrypting encrypted content data (hereinafter referred to as "content key"), information related to content reproduction control or license use, transfer, and copy control will be included. Data (hereinafter referred to as "permission data") (hereinafter referred to as "usage rules") are used as confidential data, and input/output processing is performed using the above-mentioned security function. Thus, while maintaining a sufficient anti-tampering function, data input and output can be simplified, and processing speed can be increased and power consumption can be reduced.

在这里,许可数据不但包括内容密钥或使用规则,还包括用于特定许可数据的识别信息LicID。另外,作为使用规则,包括表示以再生为目的的许可数据的输出次数的上限的控制信息PC。在这里,该控制信息PC为1比特的无符号的整数,其值表示许可数据的输出次数的上限值,每当许可数据输出就减去1。另外,PC=255,作为例外,表示没有再生次数的上限设定的情况,其值不伴随以再生为目的的许可数据的输出而改变。另外,在这里给出的控制信息PC的设定方法和运用方法为本实施方式的一个实例,没有特别的限制。Here, the license data includes not only a content key or a usage rule but also identification information LicID for specific license data. In addition, control information PC indicating the upper limit of the output frequency of licensed data for the purpose of reproduction is included as a usage rule. Here, the control information PC is a 1-bit unsigned integer whose value indicates the upper limit value of the output count of permitted data, and is decremented by 1 every time the permitted data is output. In addition, PC=255, as an exception, indicates that there is no upper limit setting for the number of reproduction times, and its value does not change with the output of permission data for reproduction. In addition, the setting method and operating method of the control information PC given here are examples of this embodiment, and are not particularly limited.

此外,在下面,将配送服务器100、再生装置300等主机装置向存储装置200发布的命令中的、保密功能用的扩展命令也称为“保密命令”,将其它的命令也称为“普通命令”。In addition, in the following, among the commands issued to the storage device 200 by the host devices such as the distribution server 100 and the playback device 300, the extended commands for the security function are also referred to as "secret commands", and the other commands are also referred to as "normal commands". ".

图2表示实施方式的配送服务器100和终端装置150的构成。配送服务器100和终端装置150分别通过通信装置104、153,介由作为网络的一个实例的互联网120连接。配送服务器100包括:密码器102、密码引擎103、通信装置104、内容数据库105,许可数据库106、用户数据库107、控制它们的控制器101以及将它们电连接的数据总线110。配送服务器100的构成从硬件方面来说,可通过任意计算机的CPU、存储器和其它LSI等来实现,从软件方面来说,可以通过装载于存储器中的程序等来实现,但是,在这里,对通过它们的协同而实现的功能块进行描述。因此,本领域的普通技术人员可以理解到:这些功能块可仅仅通过硬件、仅仅通过软件或通过它们的组合,以各种形式实现。FIG. 2 shows configurations of delivery server 100 and terminal device 150 according to the embodiment. The delivery server 100 and the terminal device 150 are connected via the Internet 120 which is an example of a network via the communication devices 104 and 153, respectively. The distribution server 100 includes: an encryption device 102, an encryption engine 103, a communication device 104, a content database 105, a license database 106, a user database 107, a controller 101 for controlling them, and a data bus 110 for electrically connecting them. The configuration of the delivery server 100 can be realized by a CPU, memory, or other LSI of any computer in terms of hardware, and can be realized by a program loaded in a memory in terms of software, but here, the Function blocks realized by their cooperation are described. Therefore, those skilled in the art can understand that these functional blocks can be implemented in various forms only by hardware, only by software, or by a combination thereof.

密码器102发布包括用于对加密内容进行译码的内容密钥的许可数据LIC,利用该内容密钥,对存储于内容数据库105中的编码过的内容进行加密。加密后的内容通过数据总线110、通信装置104,发送给终端装置150,并记录于该存储装置200中。The scrambler 102 issues license data LIC including a content key for decoding encrypted content by which the encoded content stored in the content database 105 is encrypted. The encrypted content is sent to the terminal device 150 through the data bus 110 and the communication device 104 and recorded in the storage device 200 .

密码引擎103为了将提供给用户的许可数据LIC记录于存储装置200中,在其与存储装置200之间对加密通信进行控制。加密通信通过配送服务器100的数据总线110和通信装置104、互联网20、终端装置150的通信装置153、数据总线160、控制器151与存储接口152,直接在其与存储装置200之间进行。The cryptographic engine 103 controls encrypted communication with the storage device 200 in order to record the license data LIC provided to the user in the storage device 200 . Encrypted communication is directly performed between the distribution server 100 and the storage device 200 via the data bus 110 and the communication device 104 , the Internet 20 , the communication device 153 of the terminal device 150 , the data bus 160 , the controller 151 and the storage interface 152 .

通信装置104通过互联网20,与其它的装置进行数据交换。在这里,与上述终端装置150之间进行数据交换。内容数据库105保持提供给用户的内容。许可数据库106保持包含用于对内容进行加密的内容密钥的许可数据。用户数据库107保持作为内容的提供对象的用户的信息。比如,可保持用户的个人信息、用户的终端装置150的地址、内容的购买历史、费用信息等。The communication device 104 exchanges data with other devices via the Internet 20 . Here, data is exchanged with the above-mentioned terminal device 150 . The content database 105 holds content provided to users. The license database 106 holds license data including content keys used to encrypt content. The user database 107 holds information on users to whom content is provided. For example, the user's personal information, the address of the user's terminal device 150, the purchase history of content, fee information, and the like can be held.

配送服务器100的控制器101根据用户的请求,从内容数据库105读出内容数据,另外,从许可数据库106读出许可数据LIC。将读出的内容数据和许可数据LIC内的内容密钥传递给密码器102,此外,将许可数据LIC传递给密码引擎103。接着,在密码器102中,用内容密钥对内容数据进行加密,通过通信装置104将加密后的内容数据发送给终端装置150。另外,通过密码引擎103构筑加密通信线路,通过它,将许可数据发送给终端装置150。终端装置150将已接收的许可数据LIC记录于存储装置200中。The controller 101 of the distribution server 100 reads content data from the content database 105 and reads license data LIC from the license database 106 in response to a user's request. The read content data and the content key in the license data LIC are delivered to the scrambler 102 , and the license data LIC is delivered to the cipher engine 103 . Next, in the scrambler 102 , the content data is encrypted with the content key, and the encrypted content data is transmitted to the terminal device 150 through the communication device 104 . In addition, an encrypted communication line is constructed by the encryption engine 103 , and the license data is transmitted to the terminal device 150 through this. The terminal device 150 records the received license data LIC in the storage device 200 .

如果将加密后的内容数据和许可数据LIC记录于存储装置200中,则设为对终端装置150的用户进行了内容的提供,为了对该内容提供的对应价值进行收费,更新用户数据库107。When the encrypted content data and license data LIC are recorded in the storage device 200 , it is assumed that the content is provided to the user of the terminal device 150 , and the user database 107 is updated in order to charge the corresponding value of the content provision.

终端装置150包括:存储接口152、通信装置153、控制它们的控制器151与将它们电连接的数据总线160。终端装置150的构成从硬件方面来说,可通过任意计算机的CPU、存储器、其它LSI等来实现,从软件方面来说,可通过装载到存储器中的具有记录控制功能的程序等来实现,但是,在这里,对通过它们的协同来实现的功能块进行描述。因此,本领域的普通技术人员可以理解到:这些功能块可仅仅通过硬件、仅仅通过软件或通过它们的组合,以各种形式实现。The terminal device 150 includes a storage interface 152, a communication device 153, a controller 151 for controlling them, and a data bus 160 for electrically connecting them. The configuration of the terminal device 150 can be realized by CPU, memory, other LSI, etc. of any computer in terms of hardware, and can be realized by a program having a recording control function loaded into the memory in terms of software, but , and here, the functional blocks realized by their cooperation will be described. Therefore, those skilled in the art can understand that these functional blocks can be implemented in various forms only by hardware, only by software, or by a combination thereof.

存储接口152对与存储装置200的数据的输入输出进行控制。通信装置153通过互联网20,与其它装置进行数据交换。在这里,与配送服务器100进行数据交换。终端装置150的控制器151通过通信装置153,将用户的内容配送请求发送给配送服务器100。另外,作为其响应,通过通信装置153,接收从配送服务器100提供的加密后的内容数据和许可数据,通过存储接口152,记录在存储装置200中。The storage interface 152 controls input and output of data with the storage device 200 . The communication device 153 exchanges data with other devices via the Internet 20 . Here, data exchange is performed with the delivery server 100 . The controller 151 of the terminal device 150 transmits the user's content distribution request to the distribution server 100 through the communication device 153 . In response, the encrypted content data and license data supplied from the distribution server 100 are received via the communication device 153 and recorded in the storage device 200 via the storage interface 152 .

图3表示实施方式的再生装置300的内部构成。这些功能块也可仅仅通过硬件、仅仅通过软件或通过它们的组合,以各种形式实现。再生装置300主要包括控制器301、存储接口302、密码引擎303、译码器304、内容解码器305和将它们电连接的数据总线310。FIG. 3 shows the internal configuration of a playback device 300 according to the embodiment. These functional blocks can also be realized in various forms by only hardware, only software, or a combination thereof. The playback device 300 mainly includes a controller 301, a storage interface 302, an encryption engine 303, a decoder 304, a content decoder 305, and a data bus 310 electrically connecting them.

存储接口302对与存储装置200的数据的输入输出进行控制。密码引擎303为了从该存储装置200接收包括内容密钥的许可数据LIC,在其与存储装置200之间进行加密通信的控制。译码器304通过包含于从上述存储装置200接收的许可数据LIC中的内容密钥,对从存储装置200读出的加密后的内容进行译码。内容解码器305将由译码器304译码过的内容进行译码后输出。比如,如果为MPEG格式的内容,则从内容恢复图像信号和声音信号,将图像信号输出给图中未示出的显示装置,将声音信号输出给图中未示出的扬声器。控制器301对再生装置300的构成部分进行统括控制。The storage interface 302 controls input and output of data with the storage device 200 . The encryption engine 303 controls encrypted communication with the storage device 200 in order to receive the license data LIC including the content key from the storage device 200 . The decoder 304 decodes the encrypted content read from the storage device 200 using the content key included in the license data LIC received from the storage device 200 . The content decoder 305 decodes the content decoded by the decoder 304 and outputs it. For example, if the content is in MPEG format, the video signal and audio signal are recovered from the content, the video signal is output to a display device not shown in the figure, and the audio signal is output to a speaker not shown in the figure. The controller 301 collectively controls the components of the playback device 300 .

图4表示实施方式的存储装置200的内部构成。存储装置200主要包括:控制器201、存储接口202、密码引擎203、防篡改存储部204、普通数据存储部205和将它们电连接的数据总线210。FIG. 4 shows the internal configuration of the storage device 200 according to the embodiment. The storage device 200 mainly includes: a controller 201 , a storage interface 202 , a cryptographic engine 203 , a tamper-resistant storage unit 204 , a common data storage unit 205 and a data bus 210 electrically connecting them.

存储接口202对配送服务器100和再生装置300的数据的输入输出进行控制。密码引擎203进行加密通信的控制,该加密通信用于在其与配送服务器100及再生装置300之间输入输出包括内容密钥的许可数据LIC等的隐匿数据。普通数据存储部205是记录加密后的内容或普通的数据等的普通存储区域。防篡改存储部204是记录包括内容密钥的许可数据LIC等的隐匿数据的机密数据存储区域。普通数据存储部205通过来自外部的直接存取处理,进行数据的输入输出,但是,防篡改存储部204构成为:如果不借助密码引擎203,就无法进行数据的输入输出。控制器201对存储装置200的构成部分进行统括控制。The storage interface 202 controls input and output of data between the delivery server 100 and the playback device 300 . The encryption engine 203 controls encrypted communication for inputting and outputting confidential data including license data LIC of a content key and the like between the distribution server 100 and the playback device 300 . The normal data storage unit 205 is a normal storage area in which encrypted content, normal data, and the like are recorded. The tamper-resistant storage unit 204 is a confidential data storage area in which confidential data such as license data LIC including a content key is recorded. The normal data storage unit 205 performs data input and output through direct access processing from the outside, but the tamper-resistant storage unit 204 is configured so that data input and output cannot be performed without the encryption engine 203 . The controller 201 collectively controls the components of the storage device 200 .

在这里,对本实施方式中利用的密钥进行描述。在本实施方式中,密钥完全表述为从大写字符的“K”开始的字符串。另外,在第2字符为小写字符的“c”、“s”、“r”的其中之一的情况下,表示对称密钥(共用密钥)。具体来说,“c”是询问密钥,表示由许可数据的发送源生成的临时性对称密钥。“s”是通话密钥,表示由许可数据的发送对象生成的临时性对称密钥。“r”是恢复密钥,表示由许可数据的发送对象生成的临时性对称密钥。此外,在第2字符为大写字符“P”的情况下,表示公开密钥密码方式的公开密钥。在该密钥中,必定存在相应的秘密密钥,该秘密密钥为从公开密钥的表述中除去第2字符的大写字符的“P”的表述。Here, the key used in this embodiment will be described. In this embodiment, the key is fully expressed as a character string starting with uppercase "K". In addition, when the second character is one of "c", "s", and "r" of lowercase characters, it indicates a symmetric key (common key). Specifically, "c" is a challenge key and indicates a temporary symmetric key generated by the source of the license data. "s" is a session key and represents a temporary symmetric key generated by the sender of the license data. "r" is a recovery key and represents a temporary symmetric key generated by the sender of the license data. In addition, when the second character is an uppercase character "P", it indicates a public key of the public key encryption method. Among these keys, there must always be a corresponding secret key, which is the expression of "P" in which the uppercase character of the second character is removed from the expression of the public key.

在表示密钥的字符串包括小写字符的“d”的情况下,表示是针对装置的每组提供的密钥。另外,在表示密钥的字符串包括小写字符的“p”的情况下,表示是针对每个装置而提供的密钥。分别作为公开密钥和秘密密钥的对而提供、针对各组提供的公开密钥KPdx作为带有电子签名的公开密钥证明书C[KPdx]而提供。In the case where the character string indicating the key includes "d" in lowercase characters, it indicates that the key is provided for each group of devices. In addition, when the character string indicating the key includes a lowercase character "p", it indicates that the key is provided for each device. The public key KPdx provided as a pair of a public key and a secret key is provided for each group as a public key certificate C[KPdx] with an electronic signature.

此外,记载在表示密钥的字符串的最后的字符,比如公开密钥KPd2的“2”为用于识别提供该密钥的密码引擎的记号。在本实施方式中,在提供对象明确的情况下,表述为数字“1”、“2”、“3”,在为从该密码引擎以外提供的密钥,提供对象不明确的情况或未指定的情况下,通过“x”、“y”等英文字符来表述。在本实施方式中,针对配送服务器100的密码引擎103利用识别符号“1”,针对存储装置200的密码引擎203利用识别符号“2”,针对再生装置300的密码引擎303利用识别符号“3”。In addition, the last character described in the character string representing the key, for example, "2" of the public key KPd2 is a symbol for identifying the cryptographic engine that provided the key. In this embodiment, when the object of provision is clear, it is expressed as numbers "1", "2", and "3", and when it is a key provided from other than the encryption engine, the object of provision is unclear or unspecified In the case of , it is expressed by English characters such as "x" and "y". In this embodiment, the identification code "1" is used for the encryption engine 103 of the distribution server 100, the identification code "2" is used for the encryption engine 203 of the storage device 200, and the identification code "3" is used for the encryption engine 303 of the playback device 300. .

图5表示图2所示的配送服务器100的密码引擎103的内部构成。密码引擎103包括:证明书验证部120、第1密码部121、随机数产生部122、第1译码部123、第2译码部124、第2密码部125、第3密码部126、证明书输出部127、控制部128以及将这些构成部分中的至少一部分电连接的局域总线130。FIG. 5 shows the internal configuration of the encryption engine 103 of the delivery server 100 shown in FIG. 2 . The encryption engine 103 includes: a certificate verification unit 120, a first encryption unit 121, a random number generation unit 122, a first decoding unit 123, a second decoding unit 124, a second encryption unit 125, a third encryption unit 126, a certification The book output unit 127, the control unit 128, and the local bus 130 electrically connect at least some of these components.

证明书验证部120验证从存储装置200获得的证明书C[KPd2]。该证明书C[KPd2]由包括公开密钥KP2的明文的信息(在下面称为“证明书主体”)、与添加到证明书主体上的电子签名构成。该电子签名是通过作为第3者机构的认证所(图中未示出)的根密钥Ka,对下述结果进行加密处理而形成的数据,该结果是对证明书主体进行散列函数的运算(在下面将该运算处理称为“散列运算”)而形成的。根密钥Ka为由认证所进行严格管理的非公开密钥,其为认证所的秘密密钥。证明书验证部120保持与该根密钥Ka成对的验证密钥Kpa。该验证密钥Kpa为验证证明书的合法性的公开密钥。证明书的验证通过证明书的合法性和证明书的有效性来判断。The certificate verification unit 120 verifies the certificate C[KPd2] obtained from the storage device 200 . This certificate C[KPd2] is composed of plaintext information including the public key KP2 (hereinafter referred to as "certificate body"), and an electronic signature added to the certificate body. This electronic signature is data obtained by encrypting the result of performing a hash function on the certificate body with the root key Ka of a certification authority (not shown in the figure) as a third party organization. operation (hereinafter referred to as "hash operation"). The root key Ka is a private key strictly managed by the certification authority, and is a secret key of the certification authority. The certificate verification unit 120 holds a verification key Kpa paired with the root key Ka. This verification key Kpa is a public key for verifying the legitimacy of the certificate. The verification of the certificate is judged by the legitimacy of the certificate and the validity of the certificate.

证明书的合法性的确认是对相对于应验证的证明书的证明书主体的散列函数的运算结果,与通过验证密钥Kpa对电子签名进行译码处理的结果进行比较的处理,在两者一致时,判定为合法。证明书验证部120保持作为无效的证明书的列表的证明书删除列表(Certificate Revocation List:称为“CRL”),在该CRL中未记载应验证的证明书的情况下,判定是有效的。这样,判断证明书的合法性和有效性,将认可合法的证明书的处理称为“验证”。Confirmation of the validity of the certificate is a process of comparing the calculation result of the hash function of the certificate body of the certificate to be verified with the result of decoding the electronic signature with the verification key Kpa. When they agree, it is judged to be legal. The certificate verification unit 120 holds a certificate revocation list (Certificate Revocation List: referred to as "CRL") that is a list of invalid certificates, and when a certificate to be verified is not listed in the CRL, it is determined to be valid. In this way, the legality and validity of the certificate are judged, and the process of recognizing a valid certificate is called "verification".

证明书验证部120在验证成功时,取出存储装置200的公开密钥KPd2,将其传递给第1密码部121,通知验证结果。在验证失败的情况下输出验证错误通知。When the verification is successful, the certificate verification unit 120 takes out the public key KPd2 of the storage device 200, passes it to the first encryption unit 121, and notifies the verification result. Outputs a validation error notification in case of a validation failure.

证明书输出部127输出配送服务器100的证明书C[KPd1]。该证明书由包括配送服务器100的公开密钥KPd1的证明书主体、与添加于证明书主体上的电子签名构成。电子签名与存储装置200的证明书相同,通过认证所的根密钥Ka,进行加密处理。The certificate output unit 127 outputs the certificate C[KPd1] of the delivery server 100 . This certificate is composed of a certificate body including the public key KPd1 of the delivery server 100, and an electronic signature added to the certificate body. Like the certificate of the storage device 200, the electronic signature is encrypted with the root key Ka of the certification authority.

随机数产生部122生成询问密钥Kc1,该询问密钥Kc1是为了在其与存储装置200之间进行加密通信而暂时使用的密钥。每次进行加密通信时,通过根据随机数生成询问密钥Kc1,从而可将破获询问密钥Kc1的可能性抑制在最小程度。将已生成的询问密钥Kc1传递给第1密码部121和第1译码部123。The random number generator 122 generates a challenge key Kc1 that is temporarily used for encrypted communication with the storage device 200 . By generating the challenge key Kc1 from a random number every time encrypted communication is performed, the possibility of cracking the challenge key Kc1 can be suppressed to a minimum. The generated challenge key Kc1 is passed to the first encryption unit 121 and the first decoding unit 123 .

第1密码部121为了向存储装置200通知询问密钥Kc1,用通过证明书验证部120取出的存储装置的公开密钥KPd2对询问密钥Kc1进行加密,生成加密询问密钥E(KPd2,Kc1)。此外,加密询问密钥E(KPd2,Kc1)与从证明书输出部127输出的证明书C[KPd1]结合,形成询问信息E(KPd2,Kc1)//C[KPd1]。In order to notify the storage device 200 of the challenge key Kc1, the first encryption unit 121 encrypts the challenge key Kc1 with the public key KPd2 of the storage device extracted by the certificate verification unit 120 to generate an encrypted challenge key E(KPd2, Kc1 ). In addition, the encrypted challenge key E(KPd2, Kc1) is combined with the certificate C[KPd1] output from the certificate output unit 127 to form challenge information E(KPd2, Kc1)//C[KPd1].

在这里,符号“//”表示数据的连接,E(KPd2,Kc1)//C[KPd1]表示将加密询问密钥E(KPd2,Kc1)和证明书C[KPd1]并列地连接的数据列。另外,E表示加密函数,E(KPd2,Kc1)表示用公开密钥KPd2,对询问密钥Kc1进行加密后的数据。Here, the symbol "//" indicates the connection of data, and E(KPd2, Kc1)//C[KPd1] indicates the data sequence in which the encrypted challenge key E(KPd2, Kc1) and the certificate C[KPd1] are connected in parallel. . In addition, E represents an encryption function, and E(KPd2, Kc1) represents data obtained by encrypting the challenge key Kc1 with the public key KPd2.

第1译码部123对通过询问密钥E进行了加密的数据进行译码处理。由于由存储装置200发布的通话密钥s2和存储装置200所保持的公开密钥KPp2作为通话信息E(Kc1,E(KPd1,Ks2)//KPp2),从存储装置200供给,故第1译码部123利用随机数产生部122生成的询问密钥Kc1,对通话信息进行译码,取出加密通话密钥E(KPd1,Ks2)和公开密钥KPp2。将已取出的公开密钥KPp2传递给第2密码部125,将加密通话密钥E(KPd1,Ks2)传递给第2译码部124。The first decoding unit 123 decodes the data encrypted with the challenge key E. Since the session key s2 issued by the storage device 200 and the public key KPp2 held by the storage device 200 are supplied from the storage device 200 as session information E(Kc1, E(KPd1, Ks2)//KPp2), the first translation The code unit 123 decodes the session information using the challenge key Kc1 generated by the random number generator 122, and extracts the encrypted session key E(KPd1, Ks2) and the public key KPp2. The extracted public key KPp2 is passed to the second encryption unit 125 , and the encrypted session key E ( KPd1 , Ks2 ) is passed to the second decoding unit 124 .

第2译码部124用与公开密钥KPd1成对的密钥Kd1,对从第1译码部123传递的、通过本身的公开密钥KPd1而被加密的加密通话密钥E(KPd1,Ks2)进行译码,取出通话密钥Ks2。将已取出的通话密钥Ks2传递给第3密码部126。The second decoding unit 124 uses the key Kd1 paired with the public key KPd1 to encrypt the encrypted session key E(KPd1, Ks2 transmitted from the first decoding unit 123 and encrypted by its own public key KPd1). ) to decode and take out the session key Ks2. The extracted session key Ks2 is passed to the third encryption unit 126 .

第2密码部125取得包含密码器102对内容进行加密时发布的内容密钥的许可数据LIC,并用许可数据的提供对象的存储装置200的公开密钥KPp2对该许可数据LIC进行译码,生成E(KPp2,LIC)。而且,将所生成的E(KPp2,LIC)传递到第3密码部126。The second encryption unit 125 acquires the license data LIC including the content key issued when the scrambler 102 encrypts the content, and decodes the license data LIC using the public key KPp2 of the storage device 200 to which the license data is provided, to generate E(KPp2, LIC). Then, the generated E(KPp2, LIC) is passed to the third encryption unit 126 .

第3译码部126通过由存储装置200发布的通话密钥Ks2,对从第2密码部125传递的E(KPp2,LIC)进一步加密,生成加密许可数据E(Ks2,E(KPp2,LIC))。The third decryption unit 126 further encrypts the E(KPp2, LIC) delivered from the second encryption unit 125 using the session key Ks2 issued by the storage device 200, and generates encrypted license data E(Ks2, E(KPp2, LIC) ).

控制部128按照配送服务器100的控制器101的指示,在其与密码引擎103的内部构成部分的控制和外部的结构之间,对数据的输入输出进行中介。此外,在图5中,表示控制部128内部的各构成部分的控制的连线被省略。The control unit 128 mediates the input and output of data between the control of the internal components of the encryption engine 103 and the external structure according to the instruction of the controller 101 of the distribution server 100 . In addition, in FIG. 5 , the connection lines showing the control of each component inside the control unit 128 are omitted.

如图5所示,在本实施方式中,构成为:如果不借助控制部128,密码引擎103就无法与外部进行数据交换。关于连接各构成部分的形式,考虑各种方式,但是,在本实施方式中,随机数产生部122生成的询问密钥Kc1、从存储装置200接收的通话密钥Ks2、本身的密钥Kd1等的密码引擎103的内部所利用的各密钥,构成为不直接流出到密码引擎103的外部。由此,防止在密码引擎103的内部所利用的各密钥通过配送服务器100的其他构成部分等泄漏到外部的情况,可以提高保密性。As shown in FIG. 5 , in this embodiment, the configuration is such that the encryption engine 103 cannot exchange data with the outside without the use of the control unit 128 . Various forms are conceivable for the form of connecting the respective components, but in this embodiment, the challenge key Kc1 generated by the random number generator 122, the session key Ks2 received from the storage device 200, its own key Kd1, etc. Each key used inside the encryption engine 103 is configured so that it does not directly flow out to the outside of the encryption engine 103 . This prevents each key used inside the encryption engine 103 from being leaked to the outside through other components of the delivery server 100, thereby improving security.

图6表示图3所示的再生装置300的密码引擎303的内部结构。密码引擎303包括:证明书输出部320、随机数产生部321、证明书验证部322、第1译码部323、第1密码部324、第2密码部325、第2译码部326、第3译码部327、内容密钥输出部328、经过时间测定部329、记录存储部330、第4译码部331、记录签名部332、控制部333以及将这些构成部分中的至少一部分电连接的局域总线340。FIG. 6 shows the internal configuration of the encryption engine 303 of the playback device 300 shown in FIG. 3 . The encryption engine 303 includes: a certificate output unit 320, a random number generation unit 321, a certificate verification unit 322, a first decoding unit 323, a first encryption unit 324, a second encryption unit 325, a second decoding unit 326, a second 3 Decoding unit 327, content key output unit 328, elapsed time measurement unit 329, record storage unit 330, fourth decoding unit 331, record signature unit 332, control unit 333, and at least some of these components are electrically connected local bus 340 .

证明书输出部320输出再生装置300的证明书C[KPd3]。证明书既可由证明书输出部320保持,也可保持于图中未示出的证明书保持部中,将其读出。证明书由包含再生装置300的公开密钥KPd3的证明书主体、与添加于证明书主体上的电子签名构成。电子签名与存储装置200的证明书相同,由认证所的根密钥Ka进行加密处理。The certificate output unit 320 outputs the certificate C[KPd3] of the playback device 300 . The certificate may be held in the certificate output unit 320, or may be held in a certificate holding unit (not shown in the figure) and read out. The certificate is composed of a certificate body including the public key KPd3 of the playback device 300, and an electronic signature added to the certificate body. Like the certificate of the storage device 200, the electronic signature is encrypted with the root key Ka of the certification authority.

随机数产生部321为了在其与存储装置200之间进行加密通信而生成临时使用的通话密钥Ks3。将所生成的通话密钥Ks3传递给第1密码部324、第2密码部326、记录存储部330。The random number generation unit 321 generates a session key Ks3 temporarily used for encrypted communication with the storage device 200 . The generated session key Ks3 is passed to the first encryption unit 324 , the second encryption unit 326 , and the record storage unit 330 .

证明书验证部322进行存储装置200的证明书C[KPd2]的验证。验证的具体内容如上面所述。The certificate verification unit 322 verifies the certificate C[KPd2] of the storage device 200 . The specific content of verification is as described above.

第1译码部323用秘密密钥Kd3,对通过公开密钥KPd3加密的数据进行译码。在再生时,由于由存储装置200发布的询问密钥Kc2通过再生装置300的公开密钥KPd3加密后从存储装置200供给,故第1译码部323通过本身的密钥Kd3,对其进行译码,取出询问密钥Kc2。将所取出的询问密钥Kc2传递给第2密码部325。The first decoding unit 323 decodes the data encrypted with the public key KPd3 using the private key Kd3. At the time of reproduction, since the challenge key Kc2 issued by the storage device 200 is encrypted by the public key KPd3 of the reproduction device 300 and then supplied from the storage device 200, the first decoding unit 323 decrypts it with its own key Kd3. Code, take out the challenge key Kc2. The extracted challenge key Kc2 is passed to the second encryption unit 325 .

第1密码部324用从存储装置200的证明书C[KPd2]取出的公开密钥KPd2,进行数据的加密。为了将通话密钥Ks2通知给存储装置200,对通过随机数产生部321生成的通话密钥Ks3进行加密,生成加密通话密钥E(KPd2,Ks3)。将所生成的加密询问密钥E(KPd2,Ks3)传递给第2密码部325。The first encryption unit 324 encrypts data using the public key KPd2 extracted from the certificate C[KPd2] of the storage device 200 . In order to notify the storage device 200 of the session key Ks2, the session key Ks3 generated by the random number generator 321 is encrypted to generate an encrypted session key E(KPd2, Ks3). The generated encrypted challenge key E ( KPd2 , Ks3 ) is passed to the second encryption unit 325 .

第2密码部325通过从第1密码部323取出的询问密钥Kc2,进行数据的加密。将从第1密码部324传递的加密通话密钥E(KPd2,Ks3)与本身的公开密钥KPp3连接,并对其进行加密,生成通话信息E(Kc2,E(KPd2,Ks3)//KPp3)。The second encryption unit 325 encrypts data using the challenge key Kc2 extracted from the first encryption unit 323 . Concatenate the encrypted session key E(KPd2, Ks3) delivered from the first encryption unit 324 with its own public key KPp3, and encrypt it to generate session information E(Kc2, E(KPd2, Ks3)//KPp3 ).

第2密码部326对通过通话密钥Ks3加密的数据进行译码处理。由于许可数据LIC作为通过公开密钥KPp3和通话密钥Ks3双重加密的加密许可数据E(Ks3,E(KPp3,LIC)),从存储装置200供给,第2密码部326通过随机数产生部321所生成的通话密钥Ks3,进行译码处理,将作为其结果的加密许可数据E(KPp3,LIC)传递给第3译码部327。The second encryption unit 326 decodes the data encrypted by the session key Ks3. Since the license data LIC is supplied from the storage device 200 as the encrypted license data E(Ks3, E(KPp3, LIC)) double-encrypted by the public key KPp3 and the session key Ks3, the second encryption unit 326 passes the random number generation unit 321 The generated session key Ks3 is decoded, and the resulting encrypted license data E(KPp3, LIC) is passed to the third decoding unit 327 .

第3译码部327进行通过公开密钥KPp3加密过的数据的译码。通过与公开密钥KPp3成对的秘密密钥Kp3,对作为第2译码部326的译码结果的加密许可数据E(KPp3,LIC)进行译码,取出许可数据LIC。The third decoding unit 327 decodes the data encrypted with the public key KPp3. The encrypted license data E(KPp3, LIC) which is the result of decoding by the second decoding unit 326 is decoded by the secret key Kp3 paired with the public key KPp3, and the license data LIC is extracted.

内容密钥输出部328从通过第3译码部327取出的许可数据LIC,取出并保持内容密钥。另外,内容密钥输出部328将所保持的内容密钥提供给译码器304,同时监视利用译码器304的该内容密钥的译码处理,并将该状况传递给经过时间测定部329。The content key output unit 328 extracts and holds the content key from the license data LIC extracted by the third decoding unit 327 . In addition, the content key output unit 328 supplies the retained content key to the decoder 304, monitors the decoding process of the content key by the decoder 304, and notifies the status to the elapsed time measurement unit 329. .

经过时间测定部329测定利用内容密钥输出部328提供的内容密钥而译码的加密内容的再生时间。该经过时间测定部329同时具有判断部的功能,判定伴随再生时间超过规定的T秒,进行内容密钥的再生处理,即,消费由许可数据的控制信息PC规定的再生权利1个再生次数。反之,在未经过T秒的状态下停止再生的情况下,判定未进行内容密钥的再生,即,未消费由许可数据规定的再生的权利。换言之,如果从再生的开始起的经过时间未超过T秒,经过时间测定部329则认定为未利用许可数据所含有的内容密钥;若超过T秒,则认定为利用了内容密钥。The elapsed time measuring unit 329 measures the playback time of the encrypted content decoded using the content key supplied from the content key output unit 328 . The elapsed time measuring unit 329 also functions as a judging unit, which judges that the reproduction time exceeds the predetermined T seconds, and performs content key reproduction processing, that is, consumes one reproduction number of reproduction rights specified by the license data control information PC. Conversely, when playback is stopped before T seconds have elapsed, it is determined that the content key has not been played back, that is, the right to play specified in the license data has not been consumed. In other words, if the elapsed time from the start of playback does not exceed T seconds, the elapsed time measuring unit 329 determines that the content key included in the license data is not used; if it exceeds T seconds, it determines that the content key is used.

对于经过时间测定部329的构成,存在各种形成方法,但是,在这里,给出利用定时器,测定再生开始后的经过时间的构成实例。经过时间测定部329包括定时器。另外,若内容密钥输出部328提供给译码器304的内容密钥的译码开始,则重新设定定时器,开始经过时间的测定。而且,如果经过规定的T秒,则判定为进行了再生。在这里,T表示判断对每个内容种类(音乐/图像等)进行再生,即消费许可证的边界时间,其是预先确定的。由此,比如,如果在T秒经过以前,内容密钥输出部328所保持的内容密钥被删除,译码器304的译码处理停止,则判定未进行该内容密钥的再生处理。而且,将该判定结果反映在存储于后述的记录存储部330中的信息ST3中。此外,在假定比如音乐的试听等情况下,将上述边界时间T设定为45秒。There are various formation methods for the configuration of the elapsed time measuring unit 329 , but here, an example of a configuration using a timer to measure the elapsed time after the start of reproduction is given. The elapsed time measurement unit 329 includes a timer. Also, when decoding of the content key supplied to the decoder 304 by the content key output unit 328 starts, the timer is reset and the measurement of the elapsed time starts. Then, when predetermined T seconds have elapsed, it is determined that regeneration has been performed. Here, T represents a boundary time for judging reproduction, ie, consumption of a license, for each content category (music/image, etc.), which is predetermined. Thus, for example, if the content key held by the content key output unit 328 is deleted and the decoding process by the decoder 304 is stopped before T seconds elapse, it is determined that the content key reproduction process is not performed. And, this determination result is reflected in information ST3 stored in the log storage unit 330 described later. In addition, assuming, for example, a trial listening of music, the above-mentioned boundary time T is set to 45 seconds.

记录存储部330存储许可数据LIC的通信和消费相关的历史信息。该历史信息为特定许可数据LIC的信息LicID、特定许可数据LIC的通信用的信息,包括表示通过许可数据LIC的通信生成的通话密钥Ks3,从许可数据的通信到消费(再生)的状态的信息ST3。历史信息也可包括存储有许可数据的地址的信息,或许可数据中包含的原始的控制信息PC。The record storage unit 330 stores history information related to communication and consumption of the license data LIC. This history information is information LicID for identifying the license data LIC, information for identifying the communication of the license data LIC, and includes information indicating the status of the session key Ks3 generated by the communication of the license data LIC from communication of the license data to consumption (reproduction). Information ST3. The history information may also include information on the address where the license data is stored, or the original control information PC included in the license data.

信息ST3由表示以下3种状态中的任一状态的信息形成:生成通话密钥的状态(在下面称为“状态RP”);接收许可数据LIC的状态(在下面称为“状态RL”);通过经过时间测定部329判定为开始再生的状态(在下面称为“状态CL”)。The information ST3 is formed of information representing any one of the following three states: a state of generating a session key (hereinafter referred to as "state RP"); a state of receiving license data LIC (hereinafter referred to as "state RL") ; It is determined by the elapsed time measuring unit 329 that it is in the state of starting reproduction (hereinafter referred to as "state CL").

第4译码部331进行通过公开密钥KPp3加密过的数据的译码处理。通过与公开密钥KPp3成对的秘密密钥Kp3,对从存储装置200供给的恢复信息E(KPp3,Kr2)进行译码处理,取出恢复密钥Kr2。The fourth decoding unit 331 performs decoding processing of the data encrypted by the public key KPp3. The restoration information E(KPp3, Kr2) supplied from the storage device 200 is decrypted using the private key Kp3 paired with the public key KPp3, and the restoration key Kr2 is extracted.

记录签名部332利用通过第4译码部331取出的恢复密钥Kr2,与存储于记录存储部330中的历史信息,生成了解再生装置300中的许可数据LIC  的接收或消费的状况的状态信息LicID//ST3//H(Kr2//Kr3//LicID//ST3)。该状态信息可在同时具有Kr2和Kr3的密码引擎203中,验证其合法性。在这里,H表示散列函数,H(Kr2//Kr3//LicID//ST3)表示数据Kr2//Ks3//LicID//ST3的散列运算结果。The record signature unit 332 uses the recovery key Kr2 extracted by the fourth decoding unit 331 and the history information stored in the record storage unit 330 to generate status information for understanding the status of reception or consumption of the license data LIC in the playback device 300. LicID//ST3//H(Kr2//Kr3//LicID//ST3). The status information can be verified in the cryptographic engine 203 having Kr2 and Kr3 at the same time. Here, H represents a hash function, and H(Kr2//Kr3//LicID//ST3) represents a hash operation result of data Kr2//Ks3//LicID//ST3.

控制部333按照再生装置300的控制器301的指示,在密码引擎303的内部的构成部分的控制和外部的结构之间,进行数据的输入输出处理。另外,在图6中,表示控制部333的内部各构成部分的控制的连线省略。The control unit 333 performs data input and output processing between the control of the internal components of the encryption engine 303 and the external structure in accordance with instructions from the controller 301 of the playback device 300 . In addition, in FIG. 6 , the connecting lines showing the control of each internal component of the control unit 333 are omitted.

即使在图6所示的密码引擎303中,针对连接各构成部分的形式也考虑了各种形式,但是在本实施方式中,构成为:如果不借助控制部333,密码引擎303就无法与外部进行数据的交换。由此,防止随机数产生部321生成的通话密钥Ks3、与公开密钥成对的密钥Kd3和Kp3、从存储装置200接收的通话密钥Ks2、恢复密钥Kr2等密码引擎303内所使用的密钥泄漏到外部。Even in the encryption engine 303 shown in FIG. 6 , various forms have been considered for connecting the various components, but in this embodiment, the configuration is such that the encryption engine 303 cannot communicate with the outside without the use of the control unit 333. Carry out data exchange. This prevents the session key Ks3 generated by the random number generator 321, the keys Kd3 and Kp3 paired with the public key, the session key Ks2 received from the storage device 200, and the recovery key Kr2 from being stored in the encryption engine 303. The key used is leaked to the outside.

图7表示图4所示的存储装置200的密码引擎203的内部结构。这些功能块也可仅仅通过硬件、仅仅通过软件或通过它们的组合,以各种形式来实现。密码引擎203包括:控制部220、随机数产生部221、证明书输出部22、证明书验证部223、第1译码部224、第1密码部225、第2密码部226、第2译码部227、第3译码部228、第3密码部229、第4译码部230、第5译码部231、第4密码部232、第5密码部233、记录存储部234、第6密码部235、记录验证部236、以及将这些构成分中的至少一部分电连接的局域总线240。FIG. 7 shows the internal configuration of the encryption engine 203 of the storage device 200 shown in FIG. 4 . These functional blocks can also be realized in various forms by only hardware, only software, or a combination thereof. The encryption engine 203 includes: a control unit 220, a random number generation unit 221, a certificate output unit 22, a certificate verification unit 223, a first decoding unit 224, a first encryption unit 225, a second encryption unit 226, and a second decoding unit. 227, the 3rd decoding unit 228, the 3rd encryption unit 229, the 4th decoding unit 230, the 5th decoding unit 231, the 4th encryption unit 232, the 5th encryption unit 233, the record storage unit 234, the 6th password unit 235 , record verification unit 236 , and local bus 240 electrically connecting at least some of these components.

控制部220按照上述存储装置200的控制器201的指示,控制密码引擎203的内部的构成,另外,在其与外部构成之间进行数据的输入输出处理。The control unit 220 controls the internal configuration of the encryption engine 203 in accordance with instructions from the controller 201 of the storage device 200, and also performs data input/output processing between it and an external configuration.

随机数产生部221通过随机数运算,生成在配送服务器100或再生装置300之间的加密通信中暂时使用的通话密钥Ks2、询问密钥Kc2、恢复密钥Kr2。现在对各密钥的用途追加说明。The random number generator 221 generates a session key Ks2, a challenge key Kc2, and a recovery key Kr2 temporarily used in encrypted communication between the delivery server 100 and the playback device 300 by random number calculation. Now, the use of each key will be explained.

证明书输出部222输出存储装置200的证明书C[KPd2]。证明书既可由证明书输出部222保持,也可保持于存储装置200的规定的存储区域,比如防篡改存储部204中,并将其读出。证明书包含具有存储装置200的公开密钥KPd2的证明书主体、与添加于证明书主体上的电子签名。电子签名通过认证所的根密钥Ka进行加密。The certificate output unit 222 outputs the certificate C[KPd2] of the storage device 200 . The certificate may be held in the certificate output unit 222 or stored in a predetermined storage area of the storage device 200, such as the tamper-resistant storage unit 204, and read out. The certificate includes a certificate body having the public key KPd2 of the storage device 200, and an electronic signature added to the certificate body. The electronic signature is encrypted by the root key Ka of the CA.

证明书验证部223进行从外部提供的证明书的验证。具体来说,通过验证密钥Kpa,验证从配送服务器100获得的证明书C[KPd1]和从再生装置300获得的证明书C[KPd3]。验证的具体内容如前面所述。The certificate verification unit 223 verifies the certificate provided from the outside. Specifically, the certificate C[KPd1] obtained from the delivery server 100 and the certificate C[KPd3] obtained from the playback device 300 are verified by the verification key Kpa. The specific content of the verification is as described above.

第1译码部224对通过本身的公开密钥KPd2加密过的数据进行译码处理。具体来说,在记录时,用存储装置200的公开密钥KPp2对通过配送服务器100发布的询问密钥Kc1进行加密,并从配送服务器100供给,由此,通过本身的公开密钥KPd2对其进行译码处理,取出询问密钥Kc1。将已取出的询问密钥Kc1传递给第2密码部226。The first decoding unit 224 decodes the data encrypted by its own public key KPd2. Specifically, at the time of recording, the query key Kc1 issued by the delivery server 100 is encrypted with the public key KPp2 of the storage device 200, and supplied from the delivery server 100, whereby it is encrypted with its own public key KPd2. The decryption process is performed, and the challenge key Kc1 is taken out. The retrieved challenge key Kc1 is passed to the second encryption unit 226 .

第1密码部225通过配送服务器100的公开密钥KPd1,对数据进行加密处理。具体来说,通过公开密钥KPd1,对随机数产生部221生成的通话密钥Ks2进行加密处理,生成加密通话密钥E(KPd1,Ks2)。在这里所利用的配送服务器100的公开密钥KPd1通过控制部220,从存储装置200的证明书C[KPd1]的内部取出,并通过局域总线240传递。The first encryption unit 225 encrypts the data using the public key KPd1 of the distribution server 100 . Specifically, the session key Ks2 generated by the random number generator 221 is encrypted using the public key KPd1 to generate the encrypted session key E(KPd1, Ks2). The public key KPd1 of the delivery server 100 used here is fetched from the certificate C[KPd1] of the storage device 200 by the control unit 220 and transmitted through the local bus 240 .

第2密码部226用配送服务器100发布的询问密钥Kc1,对数据进行加密处理。具体来说,将从第1密码部225接收的加密通话密钥K(KPd1,Ks2)与本身的公开密钥KPp2连接,用询问密钥Kc1对其进行加密处理,生成通话密钥E(Kc1,E(KPd1,Ks2)//KPp2)。The second encryption unit 226 encrypts the data using the challenge key Kc1 issued by the distribution server 100 . Specifically, the encrypted session key K(KPd1, Ks2) received from the first encryption unit 225 is concatenated with its own public key KPp2, encrypted with the challenge key Kc1, and the session key E(Kc1 , E(KPd1, Ks2)//KPp2).

第2译码部227对用随机数产生部221生成的通话密钥Ks2加密过的数据进行译码处理。具体来说,从配送服务器100,将许可数据LIC作为通过公开密钥KPp2和通话密钥Ks2双重加密过的E(Ks2,E(KPp2,LIC))来接收,通过通话密钥Ks2,对其进行译码处理,将其结果传递给第3译码部228。The second decoding unit 227 decodes the data encrypted with the session key Ks2 generated by the random number generating unit 221 . Specifically, from the delivery server 100, the license data LIC is received as E(Ks2, E(KPp2, LIC)) double-encrypted by the public key KPp2 and the session key Ks2, and is encrypted by the session key Ks2. Decoding processing is performed, and the result is passed to the third decoding unit 228 .

第3译码部228对用本身的公开密钥KPp2加密过的数据进行译码处理。用与公开密钥KPp2成对的本身的密钥Kp2,对从第2译码部227传递的许可数据E(KPp2,LIC)进行译码,取出许可数据LIC。The third decoding unit 228 decodes the data encrypted with its own public key KPp2. The license data E(KPp2, LIC) delivered from the second decoding unit 227 is decoded by its own key Kp2 paired with the public key KPp2, and the license data LIC is extracted.

已取出的许可数据LIC通过局域总线240、控制部220,供给到数据总线210,按照控制器201的指示,存储于防篡改存储部204中。The extracted license data LIC is supplied to the data bus 210 through the local bus 240 and the control unit 220 , and is stored in the tamper-resistant storage unit 204 according to the instructions of the controller 201 .

第3密码部229用再生装置300的公开密钥KPp3,对数据进行加密处理。具体来说,在将许可数据LIC提供给再生装置300的情况下,用从由该再生装置300接收的证明书C“KPd3”取出的公开密钥KPp3,对随机数产生部221发布的询问密钥Kc2进行加密处理,生成加密询问密钥E(KPd3,Kc2)。已生成的加密询问密钥E(KPd3,Kc2)通过局域总线240,传递给控制部220。在控制部220中,将其与从证明书输出部222输出的本身的证明书C[KPd2]连接,生成询问信息E(KPd3,Kc2)//C[KPd2]。The third encryption unit 229 encrypts the data using the public key KPp3 of the playback device 300 . Specifically, when the license data LIC is provided to the playback device 300, the public key KPp3 extracted from the certificate C "KPd3" received by the playback device 300 is used for the challenge encryption issued by the random number generator 221. Key Kc2 is encrypted to generate an encrypted challenge key E(KPd3, Kc2). The generated encrypted challenge key E ( KPd3 , Kc2 ) is transmitted to the control unit 220 via the local bus 240 . In the control unit 220, this is concatenated with the own certificate C[KPd2] output from the certificate output unit 222 to generate inquiry information E(KPd3, Kc2)//C[KPd2].

第4译码部230对用随机数产生部221发布的询问密钥Kc2加密过的数据进行译码处理。用随机数产生部221生成的询问密钥Kc2对从再生装置接收的通话密钥E(Kc2,E(KPd2,Ks3)//KPp3)进行译码处理,取出加密通话密钥E(KPd2,Ks3)和再生装置300的公开密钥KPp3。将已取出的加密通话密钥E(KPd2,Ks3)传递给第5译码部231,将公开密钥KPp3传递给第4密码部232和记录存储部234。The fourth decryption unit 230 decodes the data encrypted with the challenge key Kc2 issued by the random number generator 221 . Use the challenge key Kc2 generated by the random number generator 221 to decode the session key E(Kc2, E(KPd2, Ks3)//KPp3) received from the reproduction device, and take out the encrypted session key E(KPd2, Ks3 ) and the public key KPp3 of the playback device 300. The extracted encrypted session key E(KPd2, Ks3) is passed to the fifth decryption unit 231, and the public key KPp3 is passed to the fourth encryption unit 232 and the record storage unit 234.

第5译码部231对用本身的公开密钥KPp2加密过的数据进行译码处理。具体来说,用本身的密钥Kd2对从第4译码部230传递的加密通话密钥E(KPd2,Ks3)进行译码处理,取出通话密钥Ks3。将已取出的通话密钥Ks3传递给第5密码部233。The fifth decoding unit 231 decodes the data encrypted with its own public key KPp2. Specifically, the encrypted session key E(KPd2, Ks3) passed from the fourth decryption unit 230 is decoded using its own key Kd2, and the session key Ks3 is extracted. The extracted session key Ks3 is passed to the fifth encryption unit 233 .

第4密码部232用再生装置300的公开密钥KPp3,对数据进行加密处理。在将许可数据提供给再生装置300的情况下,用从再生装置300接收的公开密钥KPp3,对许可数据LIC进行加密处理。该许可数据LIC按照控制器201的指示,从防篡改存储部204读出,通过数据总线210、控制部220和局域总线240,传递给第4密码部232。在这里,将已加密的许可数据E(KPp3,LIC)传递给第5密码部233。The fourth encryption unit 232 encrypts the data using the public key KPp3 of the playback device 300 . When the license data is provided to the playback device 300 , the license data LIC is encrypted using the public key KPp3 received from the playback device 300 . The license data LIC is read from the anti-tamper storage unit 204 according to the instruction of the controller 201 , and transmitted to the fourth encryption unit 232 through the data bus 210 , the control unit 220 and the local bus 240 . Here, the encrypted license data E(KPp3, LIC) is passed to the fifth encryption unit 233 .

第5密码部233用再生装置300发布的通话密钥Ks3,对数据进行加密处理。具体来说,用通话密钥Ks3,对在第4密码部232中加密的许可数据E(KPp3,LIC)进一步加密,生成加密许可数据E(Ks3,E(KPp3,LIC))。The fifth encryption unit 233 encrypts the data using the session key Ks3 issued by the playback device 300 . Specifically, the license data E(KPp3, LIC) encrypted by the fourth encryption unit 232 is further encrypted with the session key Ks3 to generate encrypted license data E(Ks3, E(KPp3, LIC)).

记录存储部234存储与许可数据LIC的通信和消费有关的历史信息。历史信息为用于特定许可数据LIC的信息LicID、用于特定许可数据LIC的通信的信息,其包括通过许可数据LIC的通信生成的通话密钥Ks3、表示从许可数据的通信到消费(再生)的状态的信息ST2。The record storage section 234 stores history information related to communication and consumption of the license data LIC. History information is information LicID for specifying the license data LIC, information for specifying the communication of the license data LIC, including the session key Ks3 generated by the communication of the license data LIC, indicating the information from the communication of the license data to consumption (reproduction) The state information ST2.

信息ST2由表示下述3个状态中的任一状态的信息、许可发送中固有的公开密钥KPp3构成,这3个状态指:接收通话密钥的状态(在下面称为“状态SP”);为了再生,发送许可数据LIC的状态(在下面称为“状态SL”),以再生为目的将许可数据LIC输出后,将所记录的许可数据LIC恢复到输出之前的状态(在下面称为“状态SR”)。The information ST2 is composed of information indicating any one of the following three states: a state of receiving a session key (hereinafter referred to as "state SP") and a public key KPp3 unique to license transmission. ; For regeneration, send the state of the license data LIC (hereinafter referred to as "state SL"), after the license data LIC is output for the purpose of reproduction, the recorded license data LIC is restored to the state before the output (hereinafter referred to as "Status SR").

第6密码部235用记录存储部234中存储的公开密钥KPp3,对数据进行加密处理。具体来说,在从再生装置300接受状态信息LicID//ST3//H(Kr2//Ks3//LicID//ST3)的情况下,用从再生装置300接收且存储于记录存储部234中的公开密钥KPd3,对随机数产生部221发布的恢复密钥Kr2进行加密处理,生成恢复信息E(KPp3,Kr2)。The sixth encryption unit 235 encrypts the data using the public key KPp3 stored in the record storage unit 234 . Specifically, when the status information LicID//ST3//H(Kr2//Ks3//LicID//ST3) is received from the playback device 300, the data received from the playback device 300 and stored in the record storage unit 234 The public key KPd3 encrypts the restoration key Kr2 issued by the random number generator 221 to generate restoration information E(KPp3, Kr2).

记录验证部236一边参照存储于记录存储部234中的历史信息,一边验证从再生装置300接收的状态信息LicID//ST3//H(Kr2//Ks3//LicID//ST3)的合法性,进行该许可数据的可否恢复的判断。The record verification unit 236 verifies the legitimacy of the state information LicID//ST3//H (Kr2//Ks3//LicID//ST3) received from the playback device 300 while referring to the history information stored in the record storage unit 234, A judgment is made on whether or not to restore the permission data.

图8和图9表示到配送服务器100在存储装置200中记录许可数据LIC为止的顺序。在该记录处理中,在配送服务器100的密码引擎103和存储装置200的密码引擎203之间构筑加密通信线路,通过该加密通信线路,将许可数据LIC从配送服务器100发送给存储装置200。在图中,区分为配送服务器100(密码引擎103)、存储装置200(密码引擎203)、以及在配送服务器100和存储装置200之间进行数据交换的终端装置150(控制器151)来表示处理。8 and 9 show the procedure until the delivery server 100 records the license data LIC in the storage device 200 . In this recording process, an encrypted communication line is constructed between the encryption engine 103 of the delivery server 100 and the encryption engine 203 of the storage device 200, and the license data LIC is transmitted from the delivery server 100 to the storage device 200 through the encrypted communication line. In the figure, the process is divided into the delivery server 100 (encryption engine 103), the storage device 200 (encryption engine 203), and the terminal device 150 (controller 151) that exchanges data between the delivery server 100 and the storage device 200. .

首先,终端装置150的控制器151向存储装置200发布证明书输出命令(S102)。控制器201若正常地接受证明书输出命令(S104),则对密码引擎203发布证明书的输出的命令,从密码引擎203中读出证明书C[KPd2],并将其输出到终端装置150的控制器151(S106)。若控制器151从存储装置200获得证明书C[KPd2]时,则将其发送给配送服务器100(S108)。First, the controller 151 of the terminal device 150 issues a certificate output command to the storage device 200 (S102). If the controller 201 normally accepts the certificate output command (S104), it issues a certificate output command to the encryption engine 203, reads the certificate C[KPd2] from the encryption engine 203, and outputs it to the terminal device 150 The controller 151 (S106). When the controller 151 obtains the certificate C[KPd2] from the storage device 200, it sends it to the delivery server 100 (S108).

配送服务器100的控制器101,若接收从存储装置200发布的证明书C[KPd2](S110),则将其传递给密码引擎103,证明书验证部120用认证密钥Kpa验证证明书(S112)。在未认可证明书的情况下(S112中的“否”),证明书验证部120将错误传递给控制器101。传递了错误的控制器101将验证错误通知发送给终端装置150(S190)。终端装置150的控制器151若接收错误通知(S192),则异常地结束处理。When the controller 101 of the delivery server 100 receives the certificate C[KPd2] issued from the storage device 200 (S110), it passes it to the encryption engine 103, and the certificate verification unit 120 verifies the certificate with the authentication key Kpa (S112 ). In the case where the certificate is not approved (NO in S112 ), the certificate verification section 120 transmits an error to the controller 101 . The controller 101 that passed the error transmits an authentication error notification to the terminal device 150 (S190). When the controller 151 of the terminal device 150 receives the error notification (S192), it ends the process abnormally.

在认可证明书的情况下(S112中的“是”),密码引擎103通过随机数产生部122生成询问密钥Kc1,将已生成的询问密钥Kc1传递给第1密码部121和第1译码部123。在第1译码部123的内部保持该询问密钥Kc1(S114)。另外,在第1密码部121中,用从证明书C[KPd2]取出的存储装置200的公开密钥KPd2,对该询问密钥Kc1进行加密处理,生成加密询问密钥E(KPd2,Kc1)。而起,将已生成的加密询问密钥E(KPd2,Kc1)与从证明书输出部127输出的本身的证明书C[KPd1]结合,生成加密询问密钥E(KPd2,Kc1)//C[KPd1],并将其传递给控制器101。控制器101将已生成的加密询问密钥E(KPd2,Kc1)//C[KPd1]发送给终端装置150(S116)。When the certificate is approved (Yes in S112), the encryption engine 103 generates a challenge key Kc1 through the random number generator 122, and passes the generated challenge key Kc1 to the first encryption unit 121 and the first translator. Code part 123. The challenge key Kc1 is held inside the first decoding unit 123 (S114). In addition, in the first encryption unit 121, the challenge key Kc1 is encrypted using the public key KPd2 of the storage device 200 extracted from the certificate C[KPd2], and the encrypted challenge key E(KPd2, Kc1) is generated. . Then, the generated encrypted challenge key E(KPd2, Kc1) is combined with the own certificate C[KPd1] output from the certificate output unit 127 to generate the encrypted challenge key E(KPd2, Kc1)//C [KPd1], and pass it to the controller 101. The controller 101 transmits the generated encrypted challenge key E(KPd2, Kc1)//C[KPd1] to the terminal device 150 (S116).

若终端装置150的控制器151从配送服务器100接收询问信息E(KPd2,Kc1)//C[KPd1](S118),则向上述存储装置200发布询问信息验证命令(S120)。在存储装置200中,若控制器201接收询问信息验证命令,则向上述终端装置150请求询问信息E(KPd2,Kc1)//C[KPd1]的输入(S122)。终端装置150的控制器151根据该请求,将询问信息E(KPd2,Kc1)//C[KPd1]输出到存储装置200(S124)。When the controller 151 of the terminal device 150 receives the inquiry information E(KPd2, Kc1)//C[KPd1] from the distribution server 100 (S118), it issues an inquiry information verification command to the storage device 200 (S120). In the storage device 200, when the controller 201 receives the inquiry information verification command, it requests the input of the inquiry information E(KPd2, Kc1)//C[KPd1] to the terminal device 150 (S122). The controller 151 of the terminal device 150 outputs the inquiry information E(KPd2, Kc1)//C[KPd1] to the storage device 200 according to the request (S124).

如果存储装置200接收询问信息E(KPd2,Kc1)//C[KPd1](S126),则在密码引擎203中,控制部220从询问信息E(KPd2,Kc1)//C[KPd1]中取出证明书C[KPd1],并将其传递给证明书验证部223。证明书验证部223用验证密钥KPa,验证所传递的证明书C[KPd1],将验证结果传递给控制部220(S128)。If the storage device 200 receives the query information E(KPd2, Kc1)//C[KPd1] (S126), in the cryptographic engine 203, the control unit 220 takes out the query information E(KPd2, Kc1)//C[KPd1] The certificate C[KPd1] is passed to the certificate verification unit 223 . The certificate verification unit 223 verifies the passed certificate C[KPd1] using the verification key KPa, and passes the verification result to the control unit 220 (S128).

在未认可证明书的情况下(S128中的“否”),证明书验证部223将验证错误通知传递给控制部220,接收到验证错误通知的控制部220将其通知给控制器201。而且,控制器201将已接收的验证错误通知,通过存储接口202,发送给终端装置150的控制器151(S194)。控制器151如果接收验证错误通知(S192),则异常地结束本处理。When the certificate is not approved (NO in S128), the certificate verification unit 223 passes a verification error notification to the control unit 220, and the control unit 220 having received the verification error notification notifies it to the controller 201. Then, the controller 201 transmits the received verification error notification to the controller 151 of the terminal device 150 through the storage interface 202 (S194). When the controller 151 receives the verification error notification (S192), it abnormally ends this process.

在认可证明书的情况下(S128中的“是”),控制部220从询问信息E(KPd2,Kc1)//C[KPd1]中,取出公开密钥KPd1和加密询问密钥E(KPd2,Kc1),将它们分别传递给第1密码部225、第1译码部224。When the certificate is approved (Yes in S128), the control unit 220 extracts the public key KPd1 and the encrypted challenge key E(KPd2, Kc1), and pass them to the first encryption unit 225 and the first decoding unit 224, respectively.

第1密码部225保持所传递的公开密钥KPd1。第1译码部224用本身的密钥Kd2,对所传递的加密询问密钥E(KPd2,Kc1)进行译码处理,取出询问密钥Kc1(S130)。将已取出的询问密钥Kc1传递并保持于第2密码部226中(S132)。The first encryption unit 225 holds the passed public key KPd1. The first decoding unit 224 decodes the transmitted encrypted challenge key E(KPd2, Kc1) using its own key Kd2, and extracts the challenge key Kc1 (S130). The retrieved challenge key Kc1 is transferred and held in the second encryption unit 226 (S132).

另一方面,若在存储装置200中询问信息验证命令的处理结束,则终端装置150的控制器151向存储装置200发布通话信息生成命令(S134)。在存储装置200中,如果控制器201接收通话信息生成命令(S316),则在密码引擎203中按照控制部220的指示,随机数产生部221生成通话密钥Ks2,将已生成的通话密钥Ks2传递给第2译码部227和第1密码部225。第2译码部227保持所传递的通话密钥Ks2(S138)。On the other hand, when the processing of the inquiry information verification command in the storage device 200 ends, the controller 151 of the terminal device 150 issues a call information generation command to the storage device 200 (S134). In the storage device 200, if the controller 201 receives the call information generation command (S316), then in the encryption engine 203 according to the instruction of the control part 220, the random number generation part 221 generates the call key Ks2, and the generated call key Ks2 is passed to the second decoding unit 227 and the first encryption unit 225 . The second decoding unit 227 holds the transmitted session key Ks2 (S138).

第1密码部225用在S130中保持的公开密钥KPd1,对所传递的通话密钥Ks2进行加密处理,生成加密通话密钥E(KPd1,Ks2),并将其传递给第2密码部226。第2密码部226将加密通话密钥E(KPd1,Ks2)和本身的公开密钥KPp2连接,用在S132中保持的询问密钥Kc1,对其进行加密处理,生成通话密钥E(Kc1,E(KPd1,Ks2)//KPp2)(S140)。The first encryption unit 225 encrypts the delivered session key Ks2 using the public key KPd1 held in S130, generates an encrypted session key E(KPd1, Ks2), and delivers it to the second encryption unit 226. . The second encryption unit 226 connects the encrypted session key E(KPd1, Ks2) with its own public key KPp2, encrypts it with the challenge key Kc1 held in S132, and generates the session key E(Kc1, E(KPd1, Ks2)//KPp2) (S140).

若在上述存储装置200中,通话信息生成命令的处理结束,则终端装置150的控制器151发布通话信息输出命令(S142)。若存储装置200接收通话信息输出命令(S144),则控制器201从密码引擎203中读出通话密钥E(Kc1,E(KPd1,Ks2)//KPp2),并将其输出到终端装置150的控制器151(S146)。终端装置150的控制器151如果从存储装置200接收通话密钥E(Kc1,E(KPd1,Ks2)//KPp2),则将其发送给配送服务器100(S148)。When the processing of the call information generation command is completed in the storage device 200, the controller 151 of the terminal device 150 issues a call information output command (S142). If the storage device 200 receives the call information output command (S144), the controller 201 reads the call key E(Kc1, E(KPd1, Ks2)//KPp2) from the encryption engine 203, and outputs it to the terminal device 150 The controller 151 (S146). The controller 151 of the terminal device 150, upon receiving the call key E(Kc1, E(KPd1, Ks2)//KPp2) from the storage device 200, transmits it to the delivery server 100 (S148).

配送服务器100的控制器101若接收通话密钥E(Kc1,E(KPd1,Ks2)//KPp2)(S150),则将其传递给密码引擎103。密码引擎103的第1译码部123用保持在其内部的询问密钥Kc1,对所传递的通话密钥E(Kc1,E(KPd1,Ks2)//KPp2)进行译码处理,取出加密通话密钥E(KPd1,Ks2)和存储装置200的公开密钥KPp2。将已取出的加密通话密钥E(KPd1,Ks2)传递给第2译码部124,第2译码部124用本身的密钥Kd1,对其进行译码处理取出通话密钥Ks2(S152)。When the controller 101 of the distribution server 100 receives the session key E(Kc1, E(KPd1, Ks2)//KPp2) (S150), it passes it to the encryption engine 103. The first decoding part 123 of the encryption engine 103 uses the challenge key Kc1 kept inside it to perform decoding processing on the transmitted session key E(Kc1, E(KPd1, Ks2)//KPp2), and takes out the encrypted session key. The key E ( KPd1 , Ks2 ) and the public key KPp2 of the storage device 200 . The encrypted session key E (KPd1, Ks2) that has been taken out is delivered to the second decoding unit 124, and the second decoding unit 124 uses its own key Kd1 to decode it and extract the session key Ks2 (S152) .

接着,密码引擎103的第2密码部125用存储装置200的公开密钥KPp2,对密码器102发布的许可数据LIC进行加密处理,生成E(KPp2,LIC),并将其传递给第3密码部126。第3密码部126用存储装置200发布的通话密钥Ks2,对所传递的E(KPp2,LIC)进一步加密,生成加密许可数据E(Ks2,E(KPp2,LIC)),并将其传递给控制器101。控制器101将所传递的加密许可数据E(Ks2,E(KPp2,LIC))发送给终端装置150(S154)。Next, the second encryption unit 125 of the encryption engine 103 encrypts the license data LIC issued by the encryption device 102 using the public key KPp2 of the storage device 200, generates E(KPp2, LIC), and passes it to the third encryption key. Section 126. The third encryption unit 126 uses the session key Ks2 issued by the storage device 200 to further encrypt the delivered E(KPp2, LIC), generate encrypted license data E(Ks2, E(KPp2, LIC)), and deliver it to the controller 101. The controller 101 transmits the transferred encrypted license data E(Ks2, E(KPp2, LIC)) to the terminal device 150 (S154).

终端装置150的控制器151若接收从配送服务器100发送的加密许可数据E(Ks2,E(KPp2,LIC))(S156),则向存储装置200发布许可数据写入命令(S158)。该许可写入命令伴随有指定防篡改存储部204上的记录位置的地址。在这里所说的“地址”表示逻辑地址,不是直接指定防篡改存储部204的记录位置的地址,通过控制器201进行控制,以使指定地址后记录的数据通过指定相同的地址而读出。但是,其也可为表示防篡改存储部204中的位置的物理地址。The controller 151 of the terminal device 150, upon receiving the encrypted license data E(Ks2, E(KPp2, LIC)) transmitted from the delivery server 100 (S156), issues a license data write command to the storage device 200 (S158). This write permission command is accompanied by an address designating a recording location on the tamper-resistant storage section 204 . The "address" mentioned here means a logical address, and is not an address directly specifying the recording position of the tamper-proof storage unit 204, but is controlled by the controller 201 so that the data recorded after specifying the address is read out by specifying the same address. However, it may also be a physical address indicating a location in the tamper-resistant storage 204 .

如果在存储装置200中,接收终端装置150发布的许可写入命令,则向终端装置150的控制器151请求密码许可数据(S160),终端装置150的控制器151根据该请求,将加密许可数据E(Ks2,E(KPp2,LIC))输出到存储装置200(S162)。If in the storage device 200, the permission writing command issued by the terminal device 150 is received, the controller 151 of the terminal device 150 requests the password permission data (S160), and the controller 151 of the terminal device 150 encrypts the permission data according to the request. E(Ks2, E(KPp2, LIC)) is output to the storage device 200 (S162).

若存储装置200接收加密许可数据E(Ks2,E(KPp2,LIC))(S164),则将其传递给密码引擎203内的第2译码部227。第2译码部227用保持于其内部的通话密钥Ks2,对加密许可数据E(Ks2,E(KPp2,LIC))进行译码处理,取出用本身的公开密钥KPp2加密过的许可数据E(KPp2,LIC)。而且,将已取出的许可数据E(KPp2,LIC)传递给第3译码部228。第3译码部228用与公开密钥KPp2成对的秘密密钥Kp2,对所传递的加密许可数据E(KPp2,LIC)进行译码处理,取出许可数据LIC(S166),并通过局域总线240、控制部220,将其输出到数据总线210。控制器201将输出到数据总线210的许可数据存储于防篡改存储部204中的已指定的地址中(S168)。When the storage device 200 receives the encrypted permission data E(Ks2, E(KPp2, LIC)) ( S164 ), it passes it to the second decoding unit 227 in the encryption engine 203 . The second decryption unit 227 decodes the encrypted license data E(Ks2, E(KPp2, LIC)) with the session key Ks2 held inside, and extracts the license data encrypted with its own public key KPp2. E(KPp2, LIC). Then, the fetched license data E(KPp2, LIC) is passed to the third decoding unit 228 . The third decoding unit 228 uses the secret key Kp2 paired with the public key KPp2 to decode the transmitted encrypted license data E (KPp2, LIC), take out the license data LIC (S166), and pass the local area The bus 240 and the control unit 220 output it to the data bus 210 . The controller 201 stores the permission data output to the data bus 210 in the designated address in the tamper-resistant storage unit 204 (S168).

终端装置150的控制器151,在存储装置200中许可数据写入命令的处理结束后,判断是否接着记录许可数据(S170)。在接着记录许可数据的情况下(S170中的“是”),转移到S134,从通话信息的生成命令的发布起,反复进行处理。这是在记录多个许可数据的情况下,以通过共同具有证明书的验证处理而简化处理为目的的顺序。另外,在这里,虽然接着记录许可数据,但是,不必在1个许可数据的记录后,马上进行下一许可数据的记录。如果为配送服务器100的密码引擎103和存储装置200的密码引擎203共同具有相同的询问密钥Kc1的状态,具体来说,为配送服务器100的密码引擎103的第1译码部123,与存储装置200的密码引擎203的第2密码部226保持相同的询问密钥Kc1的状态,则可以为任意的时刻。另外,即使在接着记录许可数据的情况下,即便从S102起反复进行处理也没有任何问题。在不连续记录许可数据的情况下(S170的“否”),正常地结束处理。The controller 151 of the terminal device 150 judges whether to continue to record the permission data after the processing of the permission data write command in the storage device 200 is completed (S170). In the case of continuing to record permission data (YES in S170), the process shifts to S134, and the process is repeated from the issuing of the call information generation command. This is an order for the purpose of simplifying the processing by the verification processing of having a certificate in common when recording a plurality of license data. Here, although the license data is recorded successively, it is not necessary to record the next license data immediately after the recording of one license data. If the cryptographic engine 103 of the delivery server 100 and the cryptographic engine 203 of the storage device 200 share the same challenge key Kc1, specifically, the first decoding unit 123 of the cryptographic engine 103 of the delivery server 100 is connected to the storage device 200. The second encryption unit 226 of the encryption engine 203 of the device 200 holds the same challenge key Kc1, which may be at any time. In addition, even if the permission data is recorded next, there is no problem even if the processing is repeated from S102. In the case of discontinuously recording permission data ("No" of S170), the processing is normally ended.

通过以上的顺序,将对加密过的内容进行译码并再生所需的许可数据LIC记录于上述存储装置200中。由于加密内容为普通数据,并通过存储装置200中的普通命令进行记录,故在这里,省略对其描述。Through the above procedure, the license data LIC necessary for decoding and reproducing the encrypted content is recorded in the storage device 200 . Since the encrypted content is ordinary data and is recorded by ordinary commands in the storage device 200, its description is omitted here.

另外,许可数据LIC和加密内容数据的记录顺序,哪一个在先均没有关系。另外,也可在加密内容数据的记录的空余时间,通过分割发布保密命令来记录许可数据LIC。In addition, it does not matter which one comes first in the order of recording the license data LIC and the encrypted content data. In addition, the license data LIC may be recorded by dividing and issuing a security command during the spare time of recording encrypted content data.

此外,图8和图9所示的,终端装置150将从配送服务器100发送的许可数据LIC记录于该存储装置200中之前的顺序为正常地进行处理的情况的实例。In addition, as shown in FIG. 8 and FIG. 9 , the sequence before the terminal device 150 records the license data LIC transmitted from the delivery server 100 in the storage device 200 is an example of a case where processing is normally performed.

图10~图13表示:到再生装置300从该存储装置200读出许可数据LIC、删除已读出的内容密钥为止的再生处理的顺序。在该再生处理中,在存储装置200的密码引擎203和再生装置300的密码引擎303之间构筑加密通信线路,通过该加密通信线路,将许可数据LIC从该存储装置200发送给再生装置300。另外,该图区分为存储装置200(密码引擎203)、再生装置300的密码引擎303以及进行它们之间的数据的交换的再生装置300的控制器301来示出处理。10 to 13 show the sequence of playback processing until the playback device 300 reads the license data LIC from the storage device 200 and deletes the read content key. In this playback process, an encrypted communication line is constructed between the encryption engine 203 of the storage device 200 and the encryption engine 303 of the playback device 300 , and the license data LIC is transmitted from the storage device 200 to the playback device 300 through the encrypted communication line. In addition, the figure shows processing divided into the storage device 200 (encryption engine 203 ), the encryption engine 303 of the playback device 300 , and the controller 301 of the playback device 300 that exchanges data between them.

首先,再生装置300的控制器301向密码引擎303进行证明书的输出请求(S302)。若密码引擎303接收该发送请求(S304),则证明输出部320将证明书C[KPd3]传递给控制器301(S306)。如果从密码引擎303传递证明书C[KPd3](S308),则控制器301向存储装置200发布证明书验证命令(S310)。First, the controller 301 of the playback device 300 requests the encryption engine 303 to output a certificate (S302). When the encryption engine 303 receives the transmission request (S304), the certificate output unit 320 passes the certificate C[KPd3] to the controller 301 (S306). If the certificate C[KPd3] is delivered from the cryptographic engine 303 (S308), the controller 301 issues a certificate verification command to the storage device 200 (S310).

在存储装置200中,如果接收证明书验证命令(S312),则向再生装置300请求证明书。再生装置300的控制器301根据该请求,将从密码引擎303传递的证明书C[KPd3]输出给存储装置200(S314)。若存储装置200接收证明书C[KPd3(S316),则将所接收的证明书C[KPd3]传递给内部的密码引擎203。在密码引擎203中,按照控制部220的指示,证明书验证部223用验证密钥KPa,验证证明书C[KPd3](S318)。Upon receiving the certificate verification command (S312), the storage device 200 requests the playback device 300 for a certificate. The controller 301 of the playback device 300 outputs the certificate C[KPd3] delivered from the encryption engine 303 to the storage device 200 in response to the request (S314). If the storage device 200 receives the certificate C[KPd3 ( S316 ), it transmits the received certificate C[KPd3 ] to the internal encryption engine 203 . In the encryption engine 203, according to the instruction of the control unit 220, the certificate verification unit 223 verifies the certificate C[KPd3] using the verification key KPa (S318).

在S318中,在未认可证明书的情况下(S318中的“否”),证明书验证部223将验证错误通知通过控制部220、控制器201、存储接口202,发送给控制器301(S490)。控制器301一接收到错误通知(S492),就异常地结束本处理。In S318, when the certificate is not approved ("No" in S318), the certificate verification unit 223 sends a verification error notification to the controller 301 through the control unit 220, the controller 201, and the storage interface 202 (S490 ). When the controller 301 receives the error notification (S492), this process ends abnormally.

另一方面,在S318中,在认可了证明书的情况下(S318中的“是”),密码引擎203的控制部220从证明书C[KPd3],取出公开密钥KPd3,并将其传递给第3密码部229。第3密码部229保持已传递的公开密钥KPd3(S320)。On the other hand, in S318, when the certificate is approved (YES in S318), the control unit 220 of the encryption engine 203 extracts the public key KPd3 from the certificate C[KPd3], and passes it to the third encryption unit 229. The third encryption unit 229 holds the delivered public key KPd3 (S320).

如果在存储装置200中,认可密码引擎303的证明书C[KPd3],则再生装置300的控制器301向存储装置200,发布询问信息生成命令(S322)。若存储装置200接收再生装置300发布的询问信息生成命令(S324),则在密码引擎203中,按照控制部220的指示,随机数产生部221生成询问密钥Kc2,并将已生成的询问密钥Kc2传递给第3密码部229和第4译码部230。When the certificate C[KPd3] of the encryption engine 303 is approved in the storage device 200, the controller 301 of the playback device 300 issues a challenge information generation command to the storage device 200 (S322). If the storage device 200 receives the challenge information generation command issued by the playback device 300 (S324), in the encryption engine 203, according to the instruction of the control unit 220, the random number generation unit 221 generates a challenge key Kc2, and converts the generated challenge key Kc2 to The key Kc2 is passed to the third encryption unit 229 and the fourth decoding unit 230 .

第4译码部230将所传递的询问密钥Kc2保持于其内部(S326)。第3密码部229用在S320中保持的公开密钥KPd3,对已传递的询问密钥Kc2进行加密处理,生成加密询问密钥E(KPd3,Kc2)。接着,从证明书输出部222获得本身的证明书C[KPd2],并将其与生成的加密询问密钥E(KPd3,Kc2)结合,生成询问信息E(KPd3,Kc2)//C[KPd2](S328)。The fourth decoding unit 230 holds the passed challenge key Kc2 inside (S326). The third encryption unit 229 encrypts the passed challenge key Kc2 using the public key KPd3 held in S320 to generate an encrypted challenge key E(KPd3, Kc2). Next, obtain your own certificate C[KPd2] from the certificate output unit 222, and combine it with the generated encrypted challenge key E(KPd3, Kc2) to generate challenge information E(KPd3, Kc2)//C[KPd2 ] (S328).

在再生装置300中,如果在存储装置200中询问信息生成命令的处理结束,则控制器301发布询问信息输出命令(S330)。如果存储装置200接收再生装置300发布的询问信息生成命令(S332),则控制器201从密码引擎203中取出询问信息E(KPd3,Kc2)//C[KPd2],将其输出到再生装置300的控制器301(S334)。In the playback device 300, when the processing of the query information generation command in the storage device 200 ends, the controller 301 issues a query information output command (S330). If the storage device 200 receives the query information generation command issued by the reproduction device 300 (S332), the controller 201 takes out the query information E(KPd3, Kc2)//C[KPd2] from the encryption engine 203, and outputs it to the reproduction device 300 The controller 301 (S334).

在再生装置300中,控制器301若接收询问信息E(KPd3,Kc2)//C[KPd2]时,则将其传递给密码引擎303(S336)。接着,若密码引擎303接收询问信息E(KPd3,Kc2)//C[KPd2](S338),则密码引擎303内的证明书验证部322用验证密钥Kpa,验证已传递的证明书(S340)。In the reproduction device 300, when the controller 301 receives the inquiry information E(KPd3, Kc2)//C[KPd2], it will pass it to the encryption engine 303 (S336). Next, if the encryption engine 303 receives the query information E(KPd3, Kc2)//C[KPd2] (S338), the certificate verification unit 322 in the encryption engine 303 uses the verification key Kpa to verify the delivered certificate (S340 ).

在未认可证明书的情况下(S340中的“否”),证明书验证部322将验证错误通知发送给控制器301(S394)。控制器301若接收错误通知(S492),则异常地结束本处理。When the certificate is not approved ("No" in S340), the certificate verification section 322 sends a verification error notification to the controller 301 (S394). When the controller 301 receives the error notification (S492), it abnormally ends this process.

另一方面,在认可了证明书的情况下(S340中的“是”),密码引擎303的第1译码部323用自身的秘密密钥Kd3对加密询问密钥E(KPd3,Kc2)进行译码,并取出询问密钥Kc2(S342)。将所取出的询问密钥Kc2传递并保持在第2密码部325中。On the other hand, when the certificate is approved (Yes in S340), the first decryption unit 323 of the encryption engine 303 uses its own secret key Kd3 to encrypt the challenge key E (KPd3, Kc2). Decipher and take out the challenge key Kc2 (S342). The retrieved challenge key Kc2 is transferred and held in the second encryption unit 325 .

另一方面,控制器301向存储装置200发布许可读出命令(S346)。该许可读出命令伴随有指定防篡改存储部204的读出位置的地址。On the other hand, the controller 301 issues a license read command to the storage device 200 (S346). This permission readout command is accompanied by an address designating the readout position of the tamper-resistant storage unit 204 .

存储装置200若接收再生装置300发布的许可读出命令(S348),则读出存储于防篡改存储部204中的已指定的地址处的许可数据LIC,所读出的许可数据LIC保持于密码引擎203的第4密码部232中(S350)。If the storage device 200 receives the license read command issued by the playback device 300 (S348), it reads the license data LIC stored at the specified address in the tamper-resistant storage unit 204, and the read license data LIC is stored in the password. in the fourth encryption unit 232 of the engine 203 (S350).

接着,控制器301向密码引擎303请求通话信息(S352)。若密码引擎303接收该请求(S354),则随机数产生部321生成通话密钥Ks3,将其传递给第1密码部324、第2译码部326、记录存储部330。第2译码部326和记录存储部330将所传递的通话密钥Ks3保持于其内部。此时,记录存储部330一并保持作为信息ST3的表示“状态RP”的信息(S355)。另外,第1密码部324用从证明书“KP12”取出的存储装置200的公开密钥KPd2,对通话密钥Ks2进行加密处理,生成加密通话密钥E(KPd2,Ks3)。将已生成的加密通话密钥E(KPd2,Ks3)传递给第2密码部325。第2密码部325将本身的公开密钥KPp3,与所传递的加密通话密钥E(KPd2,Ks3)结合,用在S344中保持的询问密钥Kc2,对它们进行加密处理,生成通话信息E(Kc2,E(KPd2,Ks3)//KPp3),并将其发送给控制器301(S356)。Next, the controller 301 requests call information from the cryptographic engine 303 (S352). When the encryption engine 303 receives the request (S354), the random number generation unit 321 generates the session key Ks3, and passes it to the first encryption unit 324, the second decoding unit 326, and the record storage unit 330. The second decoding unit 326 and the record storage unit 330 hold the passed session key Ks3 inside. At this time, the record storage unit 330 also holds information indicating "status RP" as information ST3 (S355). Also, the first encryption unit 324 encrypts the session key Ks2 using the public key KPd2 of the storage device 200 retrieved from the certificate "KP12" to generate the encrypted session key E(KPd2, Ks3). The generated encrypted session key E(KPd2, Ks3) is passed to the second encryption unit 325. The second encryption unit 325 combines its own public key KPp3 with the transmitted encrypted session key E(KPd2, Ks3), encrypts them with the query key Kc2 held in S344, and generates session information E (Kc2, E(KPd2, Ks3)//KPp3), and send it to the controller 301 (S356).

若控制器301从密码引擎303接收通话信息E(Kc2,E(KPd2,Ks3)//KPp3)(S358),则向存储装置200发布通话信息处理命令(S360)。If the controller 301 receives the call information E(Kc2, E(KPd2, Ks3)//KPp3) from the encryption engine 303 (S358), it issues a call information processing command to the storage device 200 (S360).

若存储装置200接收从再生装置300发布的通话信息处理命令(S362),则向再生装置300请求通话信息,再生装置300的控制器301根据该请求,将从密码引擎303接收的通话信息E(Kc2,E(KPd2,Ks3)//KPp3)输出给存储装置200(S364)。If the storage device 200 receives the call information processing command issued from the playback device 300 (S362), it requests the call information from the playback device 300, and the controller 301 of the playback device 300 sends the call information E( Kc2, E(KPd2, Ks3)//KPp3) are output to the storage device 200 (S364).

若存储装置200接收通话信息E(Kc2,E(KPd2,Ks3)//KPp3)(S366),则将其传递给密码引擎203的第4译码部230。第4译码部230用在S326中保持的询问密钥Kc2,对所传递的通话信息E(Kc2,E(KPd2,Ks3)//KPp3)进行译码处理。接着,取出加密通话密钥E(KPd2,Ks3)和再生装置300的公开密钥KPp3,将加密通话密钥E(KPd2,Ks3)传递给第5译码部231,另外,将公开密钥KPp3传递给第4密码部232和记录存储部234。If the storage device 200 receives the call information E(Kc2, E(KPd2, Ks3)//KPp3) (S366), it will pass it to the fourth decoding unit 230 of the encryption engine 203. The fourth decoding unit 230 decodes the passed communication information E(Kc2, E(KPd2, Ks3)//KPp3) using the challenge key Kc2 held in S326. Next, the encrypted session key E(KPd2, Ks3) and the public key KPp3 of the playback device 300 are taken out, the encrypted session key E(KPd2, Ks3) is passed to the fifth decoding unit 231, and the public key KPp3 The data is passed to the fourth encryption unit 232 and the record storage unit 234 .

接着,第5译码部231用与本身的公开密钥KPd2成对的本身的秘密密钥Kd2,对所传递的加密通话密钥E(KPd2,Ks3)进行译码处理,取出通话密钥Ks3,并将其传递给第5密码部233和记录存储部234。记录存储部234保持所传递的通话密钥Ks3和公开密钥KPp3。另外,此时,还一并保持表示“状态SP”的信息(S368)。Next, the fifth decryption unit 231 decodes the transmitted encrypted session key E(KPd2, Ks3) by using its own secret key Kd2 paired with its own public key KPd2, and extracts the session key Ks3. , and pass it to the fifth encryption unit 233 and the record storage unit 234. The record storage unit 234 holds the transmitted session key Ks3 and public key KPp3. In addition, at this time, information indicating the "status SP" is also held (S368).

第4密码部232用从第4译码部230传递的再生装置300的公开密钥KPp3,对在S350中保持的许可数据LIC进行加密处理,生成加密许可数据E(KPp3,LIC),并将其传递给第5密码部233。第5密码部233用从第5译码部231传递的通话密钥Ks3,对由第4密码部232生成的加密许可数据E(KPp3,LIC)进行加密处理,生成加密许可数据E(Ks3,E(KPp3,LIC))(S370)。The fourth encryption unit 232 encrypts the license data LIC held in S350 using the public key KPp3 of the playback device 300 passed from the fourth decoding unit 230 to generate encrypted license data E(KPp3, LIC), and This is passed to the fifth encryption unit 233 . The fifth encryption unit 233 encrypts the encrypted license data E(KPp3,LIC) generated by the fourth encrypted unit 232 with the session key Ks3 delivered from the fifth decryption unit 231, and generates the encrypted license data E(Ks3,LIC). E(KPp3, LIC)) (S370).

再生装置300的控制器301,若在存储装置200中通话信息处理命令的处理结束,即,生成加密许可数据E(Ks3,E(KPp3,LIC),则向存储装置200发布加密许可输出命令(S372)。若存储装置200接收再生装置300发布的加密许可输出命令(S374),则密码引擎203的控制部220进行记载于许可数据LIC中的控制信息PC的确认(S376)。The controller 301 of the playback device 300, when the processing of the call information processing command in the storage device 200 is completed, that is, the encrypted permission data E(Ks3, E(KPp3, LIC), is generated, then the encrypted permission output command ( S372). When the storage device 200 receives the encrypted license output command issued by the playback device 300 (S374), the control unit 220 of the encryption engine 203 confirms the control information PC written in the license data LIC (S376).

在控制信息PC为0的情况下(S376的IV),控制部220判定为具有再生次数的限制的许可数据,且限制次数的再生已结束,将再生条件错误通知通过控制器201、存储接口202,发送给再生装置300的控制器301(S3901)。若再生装置300的控制器301接收存储装置200发送的错误通知(S392),则异常地结束本处理。When the control information PC is 0 (IV of S376), the control unit 220 judges that there is permission data with a limited number of reproduction times, and the reproduction with the limited number of times has ended, and notifies the reproduction condition error via the controller 201 and the storage interface 202. , and send it to the controller 301 of the playback device 300 (S3901). When the controller 301 of the playback device 300 receives the error notification from the storage device 200 (S392), this process ends abnormally.

另外,在S376中,控制信息PC在1~254的范围内的情况下(S376中的C),控制部220将存储于防篡改存储部204中的许可数据的控制信息PC变为减1而得到的值(S378)。In addition, in S376, when the control information PC is within the range of 1 to 254 (C in S376), the control unit 220 changes the control information PC of the permission data stored in the tamper-resistant storage unit 204 to minus 1 to The obtained value (S378).

此外,在S376中,控制信息PC为255的情况下(S376中的“NA”),以及在S378之后,控制部220通过控制器201、存储接口202,将加密许可数据E(Ks3,E(KPp3,LIC))输出给再生装置300的控制器301,并且在记录存储部234中保持已输出的许可数据LIC的识别信息LicID,将信息ST2变为“状态SL”(S380)。In addition, in S376, when the control information PC is 255 ("NA" in S376), and after S378, the control unit 220 transfers the encrypted license data E(Ks3, E( KPp3,LIC)) is output to the controller 301 of the playback device 300, and the identification information LicID of the output license data LIC is stored in the record storage unit 234, and the information ST2 is changed to "status SL" (S380).

若再生装置300的控制器301从上述存储装置200接收加密许可数据E(Ks3,E(KPp3,LIC)),则将其发送给密码引擎303(S382)。如果密码引擎303接收加密许可数据E(Ks3,E(KPp3,LIC))(S384),则第2译码部326用在S354中保持的通话密钥Ks3,对加密许可数据E(Ks3,E(KPp3,LIC))进行译码处理,将译码处理结果的E(KPp3,LIC)传递给第3译码部327。When the controller 301 of the playback device 300 receives the encrypted license data E(Ks3, E(KPp3, LIC)) from the storage device 200, it sends it to the encryption engine 303 (S382). If the encryption engine 303 receives the encrypted license data E(Ks3, E(KPp3, LIC)) (S384), the second decoding unit 326 uses the session key Ks3 held in S354 to encrypt the encrypted license data E(Ks3, E (KPp3, LIC)) performs decoding processing, and transmits E(KPp3, LIC) of the decoding processing result to the third decoding unit 327 .

第3译码部327用与公开密钥KPp3成对的本身的密钥Kp3,对所传递的E(KPp3,LIC)进行译码处理,取出许可数据LIC,将所取出的许可数据LIC的识别信息LicID传递给记录存储部330,另外,将内容密钥传递给内容密钥输出部328。The third decoding unit 327 uses its own key Kp3 paired with the public key KPp3 to decode the transmitted E(KPp3, LIC), extract the license data LIC, and identify the extracted license data LIC The information LicID is delivered to the record storage unit 330 , and the content key is delivered to the content key output unit 328 .

记录存储部330保持所传递的识别信息LicID,将信息ST3变为“状态RL”(S386),内容密钥输出部328开始向译码器304提供已传递的内容密钥(S388)。The record storage unit 330 holds the transmitted identification information LicID, changes the information ST3 to "status RL" (S386), and the content key output unit 328 starts supplying the transmitted content key to the decoder 304 (S388).

控制器301在处于可向译码器304提供内容密钥的状态时,确认是否应实现再生结束的确认,即,加密内容数据的再生完成所导致的再生结束,或来自用户的再生中止指示(包括结束操作、选择操作等再生停止的指示)所导致的再生结束(S390)。When the controller 301 is in a state where the content key can be provided to the decoder 304, it is confirmed whether the reproduction end should be confirmed, that is, the end of the reproduction due to the completion of the reproduction of the encrypted content data, or the reproduction suspension instruction from the user ( Including an instruction to stop reproduction such as an end operation or a selection operation) the reproduction ends (S390).

在S390中,在再生未结束的情况下(S390中的“否”),读出记录于存储装置200的普通数据存储部205中的加密内容数据,并将其供给到译码器304(S392)。此时,控制器301将必要量的加密内容数据间断地供给译码器304,以便在内容解码器305中顺利地进行再生处理。接着,在停止向译码器304供给的期间,再次返回到S390,进行结束判断。In S390, when the reproduction has not ended ("No" in S390), the encrypted content data recorded in the normal data storage unit 205 of the storage device 200 is read out and supplied to the decoder 304 (S392 ). At this time, the controller 301 intermittently supplies the necessary amount of encrypted content data to the decoder 304 so that the content decoder 305 can perform playback processing smoothly. Next, while the supply to the decoder 304 is stopped, the process returns to S390 again, and an end judgment is performed.

另一方面,在密码引擎303中,如果处于可向译码器304提供内容密钥的状态,则与控制器301的处理并行,开始监视内容密钥输出部328的译码器304的译码处理的监视处理(S400)。内容密钥输出部328确认是否开始已提供的内容密钥的再生,或是否未利用内容密钥而结束再生(S402)。On the other hand, if the encryption engine 303 is in a state where the content key can be supplied to the decoder 304, then in parallel with the processing of the controller 301, the decoding by the decoder 304 of the monitoring content key output unit 328 is started. Process monitoring process (S400). The content key output unit 328 checks whether to start reproduction of the provided content key or to end reproduction without using the content key (S402).

如果在S402中,确认开始了再生处理(S402中的“是”),则重新设定经过时间测定部329的定时器,开始译码处理的连续时间的测定,等待经过T秒(S404)。接着,如果经过T秒(S404中的“是”),则将从经过时间测定部329配送消费许可数据LIC的情况的信息传递给记录存储部330。接收了该信息的记录存储部330将所存储的信息ST3变为“状态CL”(S406),结束密码引擎303的监视处理。If it is confirmed in S402 that the reproduction process has started (YES in S402), the timer of the elapsed time measuring unit 329 is reset, and the measurement of the continuous time of the decoding process is started, and T seconds are waited (S404). Next, when T seconds have elapsed (YES in S404 ), information on the delivery of the consumption license data LIC from the elapsed time measuring unit 329 is passed to the record storage unit 330 . The record storage unit 330 having received this information changes the stored information ST3 to "state CL" (S406), and ends the monitoring process of the encryption engine 303.

此外,如果在S402或S404中,确认了再生的结束(S402中的S,或S404中的S),则结束密码引擎303的监视处理。在此情况下,存储于记录存储部330中的信息ST3处于“状态RL”的状态。In addition, when the end of reproduction is confirmed in S402 or S404 (S in S402 or S in S404), the monitoring process of the encryption engine 303 ends. In this case, the information ST3 stored in the record storage unit 330 is in the state of "state RL".

如果在S390中,控制器301确认再生结束(S390中的“是”),则确认再生时间是否超过T秒(S394)。在该确认中,比如,既可使用控制器301在内部设置的定时器进行确认,还可参照密码引擎303的经过时间测定部329进行确认,此外,也可根据密码引擎303的记录存储部330的信息ST3的状态,进行判断。If in S390, the controller 301 confirms that the regeneration is finished (YES in S390), it confirms whether the regeneration time exceeds T seconds (S394). In this confirmation, for example, it may be confirmed by using a timer provided inside the controller 301, or by referring to the elapsed time measurement unit 329 of the encryption engine 303, or by using the record storage unit 330 of the encryption engine 303. The state of the information ST3 is judged.

在S394中,在进行再生并经过T秒的情况下(S394的“是”),控制器301认定为消费了许可数据,判断是否接着对下一内容进行再生处理(S396)。在未接着进行再生处理,即,未读出其它的许可数据的情况下(S396中的“否”),正常地结束本处理。In S394, when T seconds have elapsed after reproduction is performed (YES in S394), the controller 301 recognizes that the license data has been consumed, and determines whether to proceed with reproduction processing of the next content (S396). When the reproduction process is not performed next, that is, when other license data has not been read ("No" in S396), this process is normally terminated.

在S396中,打算接着进行再生处理,即,读出其它的许可数据的情况下(S396中的“是”),控制器301可转移到S346,从许可读出命令的发布起反复进行处理。这是以通过在多个许可数据的读出中,通过共用证明书的验证处理而简化处理为目的的流程。另外,虽然接着读出许可数据,但是不必在读出1个许可数据后,马上进行下一读出。如果为密码引擎303和存储装置200共用询问密钥Kc2的状态,具体来说,为再生装置300的密码引擎303的第2密码部325,与存储装置200的密码引擎203的第4译码部230保持相同的询问密钥Kc2的状态,也可为任意的时刻。另外,即使在接着读出许可数据的情况下,即便从步骤S302起开始流程,也没有任何问题。在接着不读出其它的许可数据的情况下(S386中的“否”),控制器301仍正常地结束本处理。In S396, when it is intended to continue the playback process, that is, to read other license data (YES in S396), the controller 301 may shift to S346 and repeat the process from the issuance of the license read command. This is a flow for the purpose of simplifying the process by sharing the verification process of the certificate in reading a plurality of license data. In addition, although the license data is read out next, it is not necessary to perform the next read immediately after reading out one piece of license data. If the encryption engine 303 and the storage device 200 share the challenge key Kc2, specifically, the second encryption unit 325 of the encryption engine 303 of the playback device 300 and the fourth decoding unit of the encryption engine 203 of the storage device 200 230 maintains the same state of the challenge key Kc2, and may be at any time. Also, even if the permission data is read out next, there is no problem even if the flow starts from step S302. When not reading other license data subsequently ("No" in S386), the controller 301 still normally ends this process.

此外,在S394中,不到T秒的再生,或未进行再生的情况下(S394中的“否”),控制器301判定未消费许可数据,开始记录于存储装置200中的许可数据LIC的恢复处理。In addition, in S394, if the reproduction is less than T seconds, or in the case of no reproduction ("No" in S394), the controller 301 determines that the license data has not been consumed, and starts recording the license data LIC in the storage device 200. Resume processing.

再生装置300的控制器301向存储装置200发布恢复信息生成命令(S410)。如果存储装置200接收再生装置300发布的恢复信息生成命令(S412),则在密码引擎203中,按照控制部220的指示,随机数产生部221生成恢复密钥Kr2,将已生成的恢复密钥Kr2传递给第6密码部235和记录验证部236。记录验证部236在内部保持所传递的恢复密钥Kr2(S414)。第6密码部235用保持于记录存储部234中的公开密钥KPp3,对所传递的恢复密钥Kr2进行加密处理,生成恢复信息E(KPp3,Kr2)(S416)。The controller 301 of the playback device 300 issues a resume information generation command to the storage device 200 (S410). If the storage device 200 receives the recovery information generation command issued by the playback device 300 (S412), in the encryption engine 203, according to the instruction of the control unit 220, the random number generation unit 221 generates a recovery key Kr2, and converts the generated recovery key Kr2 to Kr2 is passed to the sixth encryption unit 235 and the record verification unit 236 . The record verification unit 236 internally holds the transferred restoration key Kr2 (S414). The sixth encryption unit 235 encrypts the transmitted restoration key Kr2 using the public key KPp3 held in the record storage unit 234 to generate restoration information E(KPp3, Kr2) (S416).

另一方面,若在存储装置200中恢复信息生成命令处理结束,则再生装置300的控制器301发布恢复信息输出命令(S418)。若存储装置200接收再生装置300发布的恢复信息输出命令(S420),则控制器201从密码引擎203取出恢复信息E(KPp3,Kr2),并将其输出到再生装置300的控制器301(S422)。再生装置300的控制器301在接收从存储装置200输出的恢复信息E(KPp3,Kr2)时,将其发送给密码引擎303(S424)。On the other hand, when the resume information generation command processing is completed in the storage device 200, the controller 301 of the playback device 300 issues a resume information output command (S418). If the storage device 200 receives the recovery information output command issued by the playback device 300 (S420), the controller 201 takes out the recovery information E (KPp3, Kr2) from the encryption engine 203, and outputs it to the controller 301 of the playback device 300 (S422 ). When the controller 301 of the playback device 300 receives the recovery information E(KPp3, Kr2) output from the storage device 200, it sends it to the encryption engine 303 (S424).

若密码引擎303接收恢复信息E(KPp,Kr2)(S426),则密码引擎303的第4译码部331用本身的密钥Kp3,对恢复信息E(KPp3,Kr2)进行译码处理,取出恢复密钥Kr2(S428)。将所取出的恢复密钥Kr2传递给记录签名部332。记录签名部332从记录存储部330中取出通话密钥Ks3、识别信息LicID、信息ST3,将它们与从第4译码部331传递的恢复密钥Kr2结合,生成数据Kr2//Ks3//LicID//ST3。接着,进行散列运算,计算H(Kr2//Ks3//LicID//ST3),将该运算结果和识别信息LicID、状态信息ST3结合,生成状态信息LicID//ST3//H(Kr2//Ks3//LicID//ST3),并将其输出给再生装置300的控制器301(S430)。If the encryption engine 303 receives the recovery information E (KPp, Kr2) (S426), the fourth decryption unit 331 of the encryption engine 303 uses its own key Kp3 to decode the recovery information E (KPp3, Kr2), and take out The key Kr2 is recovered (S428). The retrieved recovery key Kr2 is passed to the record signature unit 332 . The record signature unit 332 takes out the session key Ks3, identification information LicID, and information ST3 from the record storage unit 330, combines them with the recovery key Kr2 delivered from the fourth decoding unit 331, and generates data Kr2//Ks3//LicID //ST3. Next, perform a hash operation to calculate H(Kr2//Ks3//LicID//ST3), and combine the operation result with the identification information LicID and the state information ST3 to generate the state information LicID//ST3//H(Kr2// Ks3//LicID//ST3), and output it to the controller 301 of the playback device 300 (S430).

若从密码引擎303接收状态信息LicID//ST3//H(Kr2//Ks3//LicID//ST3)(S432),则再生装置300的控制器301向存储装置200发布状态信息处理命令(S434)。如果存储装置200接收从再生装置300发布的状态信息处理命令(S436),则向再生装置300请求状态信息。再生装置300的控制器301根据该请求,将从密码引擎303输出的状态信息LicID//ST3//H(Kr2//Ks3//LicID//ST3)输出到存储装置200(S438)。If the state information LicID//ST3//H(Kr2//Ks3//LicID//ST3) is received from the encryption engine 303 (S432), the controller 301 of the playback device 300 issues a state information processing command to the storage device 200 (S434 ). When the storage device 200 receives the status information processing command issued from the playback device 300 (S436), it requests the playback device 300 for the status information. The controller 301 of the playback device 300 outputs the state information LicID//ST3//H (Kr2//Ks3//LicID//ST3) output from the encryption engine 303 to the storage device 200 according to the request (S438).

如果存储装置200接收状态信息LicID//ST3//H(Kr2//Ks3//LicID//ST3)(S340),则将其传递给内部的密码引擎203。在密码引擎203中,按照控制部220的指示,记录验证部236对已传递的状态信息进行验证,根据状态信息是否可靠的判断,进行是否恢复许可数据,即是否将许可数据恢复到输出前的状态的判断(S442)。If the storage device 200 receives the state information LicID//ST3//H(Kr2//Ks3//LicID//ST3) (S340), it will pass it to the internal encryption engine 203. In the cryptographic engine 203, according to the instructions of the control unit 220, the record verification unit 236 verifies the status information that has been delivered, and decides whether to restore the permission data according to whether the status information is reliable, that is, whether to restore the permission data to the status before output. Judgment of state (S442).

在S442的状态信息的验证中,确认下述2个项目。In the verification of the status information in S442, the following two items are confirmed.

1)状态信息中的识别信息LicID与存储于记录存储部234中的识别信息LicID是否一致?1) Is the identification information LicID in the state information consistent with the identification information LicID stored in the record storage unit 234?

2)将状态信息中的识别信息LicID、状态信息ST3、保持于记录存储部234中的通话密钥Ks3、在步骤S414中保持的恢复密钥Kr2结合,对该结合后的数据进行散列函数运算的结果H(Kr2//Ks3//LicID//ST3),与状态信息中的散列值H(Kr2//Ks3//LicID//ST3)是否一致?2) Combining the identification information LicID in the state information, the state information ST3, the session key Ks3 held in the record storage unit 234, and the recovery key Kr2 held in step S414, and performing a hash function on the combined data Is the operation result H(Kr2//Ks3//LicID//ST3) consistent with the hash value H(Kr2//Ks3//LicID//ST3) in the state information?

在上述2个项目的确认中,任何一项均不一致的情况下,判定状态信息为不可靠的信息,不是恢复的对象(S442中的“否”)。控制部220通过控制器201、存储接口202,将恢复错误通知发送给再生装置300的控制器301(S450)。若再生装置300的控制器301接收从存储装置200输出的错误通知(S452),则转移到S396,继续本处理。In the confirmation of the above-mentioned two items, when neither item matches, it is determined that the state information is unreliable information and is not a target of recovery ("No" in S442). The control unit 220 transmits a recovery error notification to the controller 301 of the playback device 300 via the controller 201 and the storage interface 202 (S450). When the controller 301 of the playback device 300 receives the error notification output from the storage device 200 (S452), it transfers to S396 and continues the present process.

另一方面,在上述2个项目的确认中,2个项目均一致的情况下,认定状态信息为可靠的数据,另外,根据信息ST3与存储于记录存储部234中的信息ST2,判断该许可数据是否为成为恢复对象的许可数据。这样做的原因在于从保护内容的著作权的权利的立场来说,限于成为恢复对象的许可数据从存储装置200输出,并且未在再生装置300中消费的情况。具体来说,限于信息ST2为“状态SL”且信息ST3为“状态RP”,或“状态RL”时的情况。On the other hand, in the confirmation of the above two items, if the two items are consistent, the status information is determined to be reliable data, and the permission is determined based on the information ST3 and the information ST2 stored in the record storage unit 234. Whether or not the data is permitted data to be restored. The reason for this is that the license data to be restored is limited to the case where the license data to be restored is output from the storage device 200 and is not consumed in the playback device 300 from the standpoint of protecting the copyright of the content. Specifically, it is limited to the case where the information ST2 is "state SL" and the information ST3 is "state RP" or "state RL".

如果在上述判断中,判定为恢复的对象(S442中的“是”),则在存储于防篡改存储部204中的许可数据的控制信息PC不是255的情况下,将该控制信息PC变为在其上加1而形成的值(S444)。接着,控制部220通过控制器201、存储接口202,将恢复通知发送给再生装置300的控制器301(S446)。再生装置300的控制器301若接收从存储装置200输出的错误通知(S448),则转移到S396,继续进行本处理。If in the above judgment, it is determined that it is the object of recovery ("Yes" in S442), then if the control information PC of the permission data stored in the tamper-resistant storage unit 204 is not 255, the control information PC is changed to A value obtained by adding 1 thereto (S444). Next, the control unit 220 transmits a recovery notification to the controller 301 of the playback device 300 via the controller 201 and the storage interface 202 (S446). When the controller 301 of the playback device 300 receives the error notification output from the storage device 200 (S448), it shifts to S396 and continues the present process.

此外,图10~图13所示的、再生装置300利用存储于存储装置200中的许可数据的流程为处理正常地进行的情况的实例。In addition, the flow shown in FIGS. 10 to 13 in which the playback device 300 utilizes the license data stored in the storage device 200 is an example of a case where processing is normally performed.

另外,针对许可数据的消费的判断的再生时间的测定,在本实施方式中,测定译码器304的译码处理的经过时间,但是,也可测定从译码器304到内容解码器305的译码结果的提供的经过时间。此外,还可测定内容解码器305的译码处理的经过时间,或从内容解码器305输出的再生信号的提供的经过时间。In addition, in the measurement of the playback time for judging the consumption of the license data, in this embodiment, the elapsed time of the decoding process of the decoder 304 is measured, but the time elapsed from the decoder 304 to the content decoder 305 may also be measured. Elapsed time for the rendering of decoding results. In addition, it is also possible to measure the elapsed time of decoding processing by the content decoder 305 or the elapsed time of supply of the reproduced signal output from the content decoder 305 .

还有,在本实施方式中,针对每个内容种类,比如音乐、图像等,预定判断为不是许可数据的“消费”的边界时间T,但是,也可在许可数据LIC中包含使用规则,另外,也可并用它们。比如,在边界时间未设定为使用规则的情况下,可利用预定的边界时间。Also, in this embodiment, for each type of content, such as music, images, etc., the boundary time T for judging that it is not "consumption" of licensed data is predetermined, but the usage rules may also be included in the licensed data LIC. , they can also be used together. For example, when a boundary time is not set as a usage rule, a predetermined boundary time can be used.

再有,在本实施方式中,在许可数据的消费判断的再生开始后的经过时间的测定的情况下,经过时间测定部329包括定时器,利用定时器测定时间,伴随边界时间T秒的经过,进行消费的判断,但是,也可根据已处理的数据量(译码或再生),推导出再生开始后的经过时间,判断许可的消费。这样做的原因在于可根据对内容数据进行编码处理后形成的编码方式的特性,由内容数据的处理数据量预测再生时间。另外,在内容为图像内容的情况下,也可根据经译码处理或经再生处理的图像数据的帧数,推导出经过时间,判断许可的消费。还可参照流数据中的时间标记(stamp),比如埋入MPEG数据的TS中的“time code”,计算经过时间。In addition, in this embodiment, in the case of measuring the elapsed time after the reproduction start of the consumption judgment of the license data, the elapsed time measurement unit 329 includes a timer, and the time is measured by the timer, with the elapse of the boundary time T seconds. However, it is also possible to determine the consumption of the license by deriving the elapsed time after the start of reproduction based on the amount of processed data (decoding or reproduction). The reason for this is that the playback time can be predicted from the processed data volume of the content data according to the characteristics of the encoding method obtained by encoding the content data. Also, when the content is video content, the consumption of the license may be determined by deriving the elapsed time from the number of frames of decoded or reproduced video data. The elapsed time can also be calculated with reference to a time stamp (stamp) in the stream data, such as a "time code" embedded in the TS of the MPEG data.

另外,虽然根据再生时间,进行许可数据的消费的判断,但是,也可根据设为“消费”的内容数据的边界数据量的设定、经再生处理的数据量的测定,进行消费的判断。还可预先计算未判定为消费了再生的权利的时间量的数据量,将该量的数据提供给内容解码器305。还可在未判定为消费了再生的权利的时间或数据量的再生结束时,询问用户,是否再次继续再生处理。在用户指示再生的结束时,执行上述许可数据的恢复流程。在用户指示了再生的继续时,继续再生处理,不恢复许可数据。In addition, although the judgment of consumption of licensed data is performed based on the playback time, the determination of consumption may be made based on the setting of the boundary data volume of content data set as "consumed" and the measurement of the data volume after playback processing. It is also possible to calculate in advance the amount of data for the amount of time that it is not determined that the right to reproduce has been consumed, and provide this amount of data to the content decoder 305 . It is also possible to ask the user whether to continue the playback process again when it is determined that the playback right has not been consumed or when the playback of the data volume is completed. When the user instructs the end of reproduction, the above-mentioned recovery flow of the license data is executed. When the user instructs to continue the playback, the playback process is continued without restoring the licensed data.

此外,在本实施方式中,分别对询问密钥Kc2和恢复密钥Kr2进行了描述,但是,也可针对通过作为许可数据的发送对象的存储装置200的随机数产生部221生成的共用密钥的情况,使恢复密钥Kr2的产生成为询问密钥Kc2的更新。在此情况下,在存储装置200的密码引擎203中,将由随机数产生部221生成的恢复密钥Kr2也传递给第4译码部230,第4译码部230保持已传递的恢复密钥Kr2,而代替所保持的询问密钥Kc2。另外,在从S346起的反复的处理中,利用已保持的恢复密钥Kr2,而代替询问密钥Kc2,进行通话信息的译码处理。在再生装置300的密码引擎303中,将通过第4译码部331取出的恢复密钥Kr2传递给第2密码部325,第2密码部325保持已传递的恢复密钥Kr2,而代替保持的询问密钥Kc2。接着,在从S346起的反复的处理中,当生成通话信息时,代替询问密钥Kc2,而利用已保持的恢复密钥Kr2。Also, in this embodiment, the challenge key Kc2 and the recovery key Kr2 have been described separately, but the common key generated by the random number generator 221 of the storage device 200 to which the license data is to be transmitted may also be In the case of , make the generation of the recovery key Kr2 an update of the challenge key Kc2. In this case, in the encryption engine 203 of the storage device 200, the recovery key Kr2 generated by the random number generator 221 is also passed to the fourth decoding unit 230, and the fourth decoding unit 230 holds the transmitted recovery key Kr2 instead of the held challenge key Kc2. In addition, in the iterative process from S346, the communication information decoding process is performed using the stored recovery key Kr2 instead of the challenge key Kc2. In the encryption engine 303 of the playback device 300, the recovery key Kr2 extracted by the fourth decoding unit 331 is passed to the second encryption unit 325, and the second encryption unit 325 holds the transmitted recovery key Kr2 instead of the stored Ask for key Kc2. Next, in the iterative process from S346, when generating communication information, instead of the challenge key Kc2, the stored recovery key Kr2 is used.

在上述的流程中,在将许可数据恢复到原始状态时,存储装置200的控制部220将存储于防篡改存储部204中的许可数据的控制信息PC加1,进行恢复到原始状态的处理。在另一实例中,也可在存储装置200输出许可数据时,将该许可数据的输出前的控制信息PC记录在记录存储部234中,在请求许可数据的恢复时,通过在存储于防篡改存储部204中的许可数据的控制信息PC上覆写记录于记录存储部234中的输出前的控制信息PC,而恢复到原始状态。由此,可确实地将许可数据的控制信息PC恢复到原始状态。In the above flow, when restoring the license data to the original state, the control unit 220 of the storage device 200 adds 1 to the control information PC of the license data stored in the anti-tamper storage unit 204, and performs the process of restoring the original state. In another example, when the storage device 200 outputs the license data, the control information PC before the output of the license data can be recorded in the record storage unit 234, and when the recovery of the license data is requested, the PC information stored in the tamper-proof The control information PC of the permission data in the storage unit 204 overwrites the control information PC before output recorded in the record storage unit 234 to return to the original state. Thereby, the control information PC of the license data can be surely restored to the original state.

在又一实例中,也可在将许可数据的输出前的控制信息PC记录于再生装置300的记录存储部330中,在再生装置300请求许可数据的恢复时,从记录存储部330中读出该许可数据的输出前的控制信息PC,并将其送到存储装置200,将其覆写到存储于防篡改存储部204中的许可数据的控制信息PC上。在此情况下,再生装置300也可通过在其与存储装置200之间共用的共用密钥,比如通话密钥Ks2等,对控制信息PC和识别信息LicID进行加密处理,并将其发送给存储装置200。存储装置200的控制部220对从再生装置300接收的、经过加密处理的控制信息PC进行译码处理,将其覆写到存储于防篡改存储部204中的许可数据的控制信息PC上。In yet another example, the control information PC before the output of the license data may be recorded in the record storage unit 330 of the playback device 300, and read from the record storage unit 330 when the playback device 300 requests recovery of the license data. The control information PC before the output of the permission data is sent to the storage device 200 and overwritten on the control information PC of the permission data stored in the tamper-resistant storage unit 204 . In this case, the playback device 300 may encrypt the control information PC and the identification information LicID through a common key shared between it and the storage device 200, such as the call key Ks2, and send it to the storage device. device 200. The control unit 220 of the storage device 200 decodes the encrypted control information PC received from the playback device 300 and overwrites it on the control information PC of the license data stored in the tamper-resistant storage unit 204 .

在上述的流程中,给出在提供许可数据侧和享受侧构成单向的加密通信线路的实例,但是,在另一实例中,也可形成双向的加密通信线路。在此情况下,也可为无论发送许可数据的方向,存储装置200以从属方式动作的通信协议。比如,也可以是在再生装置300和存储装置200之间构筑双向的加密通信通路的情况下,享受许可数据一侧的再生装置300实现主导的功能,提供许可数据的一侧的存储装置200实现从属的功能。由此,可简化存储装置200的结构。在该通信模式中,再生装置300向存储装置200请求许可数据的恢复的情况,也可以使再生装置300将状态信息输出到存储装置200,在再生装置300侧,判断恢复是否允许。还可在允许许可数据的恢复的情况下,象上述那样,再生装置300将许可数据的原始的控制信息PC发送给存储装置200,在存储于防篡改存储部204中的许可数据的控制信息PC中覆写该控制信息PC,以恢复到原始状态。In the above flow, an example was given in which a one-way encrypted communication line is formed between the license data providing side and the enjoyment side, but in another example, a two-way encrypted communication line may be formed. In this case, it may be a communication protocol in which the storage device 200 operates in a slave mode regardless of the direction in which the permission data is transmitted. For example, when a two-way encrypted communication channel is established between the reproduction device 300 and the storage device 200, the reproduction device 300 on the side receiving the license data may implement the leading function, and the storage device 200 on the side providing the license data may realize Dependent functions. Thus, the structure of the storage device 200 can be simplified. In this communication mode, when the playback device 300 requests the storage device 200 to allow restoration of data, the playback device 300 may output status information to the storage device 200, and the playback device 300 may judge whether the restoration is permitted. Also under the situation of allowing the restoration of the license data, as described above, the playback device 300 sends the original control information PC of the license data to the storage device 200, and the control information PC of the license data stored in the tamper-resistant storage unit 204 Overwrite the control information PC in order to restore to the original state.

(第2实施方式)(second embodiment)

图14表示第2实施方式的内容配送系统的构成。本实施方式的内容配送系统与第1实施方式相同,包括配送内容的配送服务器100、接收内容的提供的终端装置150、记录有提供给终端装置150的内容的存储装置200,配送服务器100和终端装置150分别通过通信装置104、153,借助作为网络的一个实例的互联网20而链接。FIG. 14 shows the configuration of a content distribution system according to the second embodiment. The content delivery system of this embodiment is the same as that of the first embodiment, and includes a delivery server 100 that delivers content, a terminal device 150 that receives content, a storage device 200 that records content provided to the terminal device 150, delivery server 100, and a terminal. The devices 150 are linked via the Internet 20, which is an example of a network, via the communication devices 104, 153, respectively.

与第1实施方式的不同之处在于:在终端装置150中,设置配送服务器100的密码器102和密码引擎103。The difference from the first embodiment is that the encryption device 102 and the encryption engine 103 of the distribution server 100 are provided in the terminal device 150 .

另外,为了确保配送服务器100和用户的终端装置150之间的通信中的数据的安全性,在配送服务器100和用户的终端装置150之间,按照SSL或配送运营商所规定的各自的数字内容管理方式,安全地进行保护。由此,与第1实施方式相同地发挥功能。In addition, in order to ensure the security of the data in the communication between the delivery server 100 and the user's terminal device 150, between the delivery server 100 and the user's terminal device 150, each digital content specified by SSL or the delivery provider Managed, securely protected. Thereby, it functions similarly to 1st Embodiment.

以上对本发明的实施方式进行了描述,但是,本实施方式是例示,本发明不限于该实施方式,本领域的普通技术人员可以理解:在这些各构成部分或处理程序的组合中可有各种变形例,另外,这样的变形实例均在本发明的范围内。The embodiment of the present invention has been described above, but this embodiment is an example, and the present invention is not limited to this embodiment. Those of ordinary skill in the art can understand that there can be various combinations in these constituent parts or processing procedures. Modifications, In addition, such modification examples are within the scope of the present invention.

比如,在上述实施方式中,在密码引擎中分别设置进行加密处理的功能块和进行译码处理的功能块,但是,也可在这些构成部分中共用电路。由此,可抑制电路规模,有助于小型化、低耗电化。For example, in the above-mentioned embodiment, the encryption engine is provided with a functional block for performing encryption processing and a functional block for decoding processing. However, circuits may be shared among these components. Accordingly, the scale of the circuit can be suppressed, contributing to miniaturization and low power consumption.

本发明的实施方式可在技术方案的范围给出的技术构思的范围内,适当地进行各种变更。The embodiments of the present invention can be appropriately modified in various ways within the scope of the technical ideas given in the scope of the technical claims.

Claims (23)

1. content player, wherein utilize be recorded in the memory storage, comprise that the content that is used for content key that encrypted content data is deciphered uses information, encrypted content data is deciphered and is regenerated, it is characterized in that, comprising:
Interface, its and above-mentioned memory storage between the giving and accepting of control data;
Content decoding part, its utilization are contained in the content key in the described content use information, and described encrypted content data is deciphered;
The content key efferent, it receives described content from described memory storage and uses information, and the content key that comprises in the content use information that is received is outputed to described content decoding part;
Recording storage portion, the described content of its storage representation is used the status information of the user mode of information;
Judging part, it obtains the elapsed time of the decoding of the described encrypted content data that utilizes described content key in the described content decoding part, or in described content decoding part, utilize described content key and the elapsed time of the regeneration of decoded described encrypted content data, according to the obtained elapsed time, judge whether to regard as and utilized described content key, and judged result is reflected in the status information that is recorded in the described recording storage portion.
2. content player according to claim 1 is characterized in that,
Also comprise and measure the described elapsed time and it is notified to the elapsed time determination part of described judging part;
Described elapsed time determination part after described content key efferent is exported to content key described content decoding part, the elapsed time when measuring the beginning from decoding or Regeneration Treatment;
Described judging part exceeded schedule time according to the described elapsed time, regarded as and had utilized described content key.
3. content player according to claim 1 is characterized in that,
Also comprise and measure the described elapsed time and it is notified to the elapsed time determination part of described judging part;
The data volume that described elapsed time determination part is deciphered according to described content decoding part, or, calculate the elapsed time to the data volume that the encrypted content data after the decoding is reproduced, and it is notified to described judging part;
Described judging part exceeded schedule time according to the described elapsed time, regarded as and had utilized described content key.
4. according to claim 2 or 3 described content players, it is characterized in that the described stipulated time is contained in the described content use information;
The described stipulated time that described content key efferent will be contained in the content use information that is received is exported to described judging part.
5. according to claim 2 or 3 described content players, it is characterized in that the described stipulated time is 45 seconds.
6. according to claim 2 or 3 described content players, it is characterized in that, described judging part also comprises control part, it is being judged to be under the situation of not utilizing described content key, to described memory storage request the content use information that is recorded in the described memory storage is returned to and receives state before.
7. content player according to claim 6, it is characterized in that, described control part will comprise the recorded information that is recorded in the described status information in the described recording storage portion and send to described memory storage when the state that returns to described memory storage request before receiving described content use information.
8. content player according to claim 7, it is characterized in that described control part will comprise that the hashed value of the information of shared key shared between described content player and the described memory storage sends to described memory storage with described recorded information.
9. content player according to claim 6 is characterized in that, described recording storage portion stores at least a portion that this content is used information with virgin state when having received described content and use information;
Described control part sends to described memory storage with the content use information that is stored in the virgin state in the described recording storage portion when making the state of described content use information before returning to reception to described memory storage request.
10. content reproducing method, wherein utilize be recorded in the memory storage, comprise that the content that is used for content key that encrypted content data is deciphered uses information, encrypted content data is deciphered and is regenerated, it is characterized in that,
Use information from described memory storage received content, utilize the content key that is contained in the content use information that is received, described encrypted content data is deciphered;
Use the status information of the user mode of information to be stored in the recording storage portion the described content of expression;
Acquisition utilizes elapsed time of decoding of the described encrypted content data of described content key, or utilize described content key and the elapsed time of the regeneration of decoded described encrypted content data, according to the elapsed time that is obtained, judge whether to regard as and utilized described content key, and this judged result is reflected in the status information that is recorded in the described recording storage portion.
11. content reproducing method according to claim 10 is characterized in that,
The described elapsed time is measured by timer during from the decoding or the beginning of Regeneration Treatment;
When exceeding schedule time, regard as and utilized described content key in the described elapsed time.
12. content reproducing method according to claim 10 is characterized in that,
The described elapsed time is according to the data volume of being deciphered, or the data volume that the encrypted content data after the decoding is reproduced is calculated;
When exceeding schedule time, regard as and utilized described content key in the described elapsed time.
13., it is characterized in that the described elapsed time is contained in the content use information according to claim 11 or 12 described content reproducing methods.
14., it is characterized in that the described stipulated time is 45 seconds according to claim 11 or 12 described content reproducing methods.
15. according to claim 11 or 12 described content reproducing methods, it is characterized in that, be judged to be under the situation of not utilizing described content key, to described memory storage request the content use information that is recorded in the described memory storage returned to and receive state before.
16. content reproducing method according to claim 15, it is characterized in that, the content player that described encrypted content data is deciphered and regenerated, when the state that returns to described memory storage request before receiving described content use information, will comprise that the recorded information that is recorded in the described status information in the described recording storage portion sends to described memory storage.
17. content reproducing method according to claim 16, it is characterized in that described memory storage judges whether to allow described content to use the recovery of information with reference to described recorded information, when being judged to be the permission recovery, described content use information is returned to virgin state.
18. content reproducing method according to claim 17, it is characterized in that, described memory storage also writes down the status information that the described content of expression is used the user mode of information, described memory storage judges whether to allow described content to use the recovery of information with further reference to the described status information that itself writes down.
19. according to claim 16 or 17 described content reproducing methods, it is characterized in that, with being included in the hashed value of the information of shared key shared between described content player and the described memory storage, send to described memory storage with described recorded information.
20. content reproducing method according to claim 18, it is characterized in that, described memory storage is with reference to described hashed value, confirm that it is that itself sends the device that this content is used information that the described content of request is used the content player of the recovery of information, when having confirmed, described content use information is returned to virgin state.
21. content reproducing method according to claim 15, it is characterized in that, described memory storage is when sending to described content player with described content use information, store at least a portion that this content is used information with virgin state, when making this content use information return to virgin state from this content player request, override content by content use information and use information, thereby return to virgin state in order to the virgin state storage.
22. content reproducing method according to claim 15 is characterized in that,
Described recording storage portion stores at least a portion that this content is used information with virgin state when having received described content and use information;
When the state that returns to described memory storage request before receiving described content use information, the content use information that is stored in the virgin state in the described recording storage portion is sent to described memory storage.
23. content reproducing method according to claim 22 is characterized in that, described memory storage overrides content by the content use information with described virgin state and uses information, thereby returns to virgin state.
CNB2005101069950A 2004-09-30 2005-09-29 Content playback device and content playback method Expired - Lifetime CN100388240C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2004288813 2004-09-30
JP2004288813 2004-09-30
JP2005267058 2005-09-14

Publications (2)

Publication Number Publication Date
CN1779659A CN1779659A (en) 2006-05-31
CN100388240C true CN100388240C (en) 2008-05-14

Family

ID=36769995

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101069950A Expired - Lifetime CN100388240C (en) 2004-09-30 2005-09-29 Content playback device and content playback method

Country Status (1)

Country Link
CN (1) CN100388240C (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012049757A1 (en) 2010-10-14 2012-04-19 富士通株式会社 Content data playback device, update management method, and update management program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001043342A1 (en) * 1999-12-06 2001-06-14 Sanyo Electric Co., Ltd. Data distribution system and recorder for use therein
US20020108043A1 (en) * 2001-02-02 2002-08-08 Nec Corporation Method and apparatus for encrypting and decrypting data using encrypting key contained in electronic watermark
CN1433611A (en) * 1999-12-03 2003-07-30 三洋电机株式会社 Data distribution system and recorder for use therein
CN1442055A (en) * 2002-03-05 2003-09-17 株式会社岛野 Fishing rod
CN1495620A (en) * 2002-09-04 2004-05-12 ���µ�����ҵ��ʽ���� Semiconductor device having encryption portion or external interface and content reproduction method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1433611A (en) * 1999-12-03 2003-07-30 三洋电机株式会社 Data distribution system and recorder for use therein
WO2001043342A1 (en) * 1999-12-06 2001-06-14 Sanyo Electric Co., Ltd. Data distribution system and recorder for use therein
US20020108043A1 (en) * 2001-02-02 2002-08-08 Nec Corporation Method and apparatus for encrypting and decrypting data using encrypting key contained in electronic watermark
CN1442055A (en) * 2002-03-05 2003-09-17 株式会社岛野 Fishing rod
CN1495620A (en) * 2002-09-04 2004-05-12 ���µ�����ҵ��ʽ���� Semiconductor device having encryption portion or external interface and content reproduction method

Also Published As

Publication number Publication date
CN1779659A (en) 2006-05-31

Similar Documents

Publication Publication Date Title
US6550011B1 (en) Media content protection utilizing public key cryptography
JP4795727B2 (en) Method, storage device, and system for restricting content use terminal
US9081726B2 (en) Controller to be incorporated in storage medium device, storage medium device, system for manufacturing storage medium device, and method for manufacturing storage medium device
US7565691B2 (en) Information processing apparatus, authentication processing method, and computer program
US20090210724A1 (en) Content management method and content management apparatus
CN101779209B (en) System and method for protecting content stored in a storage device
CN103209176A (en) System and method for building home domain by using smart card
KR100620921B1 (en) Method and apparatus for encrypting data to be secured and inputting/outputting the same
JP2008009631A (en) Storage device and storage method
JP2006127485A (en) Device and method for reproducing content
JP4110511B2 (en) Content use management system, information processing apparatus and method, and computer program
US20060190740A1 (en) Contents utilization system, contents utilization device and contents utilization information storage device
CN100388240C (en) Content playback device and content playback method
JP4663436B2 (en) Content usage information transmitting method, content usage information providing device and content usage information receiving device capable of using the method
JP2004312717A (en) Data protection management device and data protection management method
JP4671657B2 (en) Content use information storage device and content use device
JP4663437B2 (en) Content usage information transmitting method, content usage information providing device and content usage information receiving device capable of using the method
JP2008209960A (en) Method, storage device, and system for restricting content use terminal
JP4663435B2 (en) Content usage information transmitting method, content usage information providing device and content usage information receiving device capable of using the method
JP2006033764A (en) Contents utilizing information providing apparatus and contents utilizing information appreciating apparatus
KR20060024652A (en) Storage device for storing encrypted multimedia file and method of playing the file
JP4667517B2 (en) Content usage device
JP4318740B2 (en) Content utilization system and content utilization apparatus
JP4615055B2 (en) Content usage device
JP4606474B2 (en) Content utilization system and content utilization apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant