WO2000007329A1 - Content processing system - Google Patents
Content processing system Download PDFInfo
- Publication number
- WO2000007329A1 WO2000007329A1 PCT/JP1999/004132 JP9904132W WO0007329A1 WO 2000007329 A1 WO2000007329 A1 WO 2000007329A1 JP 9904132 W JP9904132 W JP 9904132W WO 0007329 A1 WO0007329 A1 WO 0007329A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- key
- encrypted
- content signal
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0071—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a purchase action
- G11B20/00724—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a purchase action wherein a prepaid credit balance is registered on the recording medium
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to a content processing system for a user to acquire content data encrypted by electronic distribution.
- Content Data Content Data
- Digital data Duplication in the evening, so-called digital copy or digital dubbing, requires some restrictions to be made in order to reproduce content without signal degradation.
- audio as defined in IEC 958 At present, digital in-flights are currently using CD (Compact Disc), DAT (Digital Audio Tape), MD
- SCS Serial Copy Management System
- content data such as music data is generally encrypted, and the encryption is performed.
- the copy control code such as SCMS is also encrypted in the form embedded with the content data or the content data Therefore, the value of the copy control code embedded and encrypted in the content data is supplied to the copy destination device without being changed.
- the supply device rewrites the copy control code to prohibit copying and attempts to embed it in the content and send it to the destination device, it decrypts the content data and prohibits the copy control code from being copied. After rewriting, it must be re-encrypted, which is cumbersome and time-consuming.
- the content key size is on the order of a few bytes, and the size of each content window ranges from hundreds of kilobytes to several megabytes and several gigabytes, so it is very important to re-key. It takes a lot of processing time.
- the present invention has been made in view of such a conventional situation, and when a user obtains an encrypted content signal by electronic distribution and decrypts and outputs the content, Knowledge of the equipment used at the time of acquisition It is an object of the present invention to provide a content signal receiving device and a content processing system capable of embedding different information into content efficiently.
- the present invention provides a content processing device, an encryption processing device, and a content processing device that can reliably perform a billing process when a user obtains and decrypts an encrypted content signal by electronic distribution. It is intended to provide a physical management system.
- the identification information of the device used at the time of acquisition can be efficiently embedded in the content. It is an object of the present invention to provide a content signal receiving method as described above.
- Another object of the present invention is to provide a content processing method capable of reliably performing a billing process when a user obtains and decrypts an encrypted content signal by electronic distribution. Is what you do.
- the content signal receiving apparatus includes: a receiving unit that receives an encrypted content signal; a storage unit that stores the encrypted content signal received by the receiving unit; A decryption means for decrypting the encrypted content signal stored in the storage means when an instruction to decrypt the encrypted content signal stored in the storage means is given; and a decryption means for decrypting the encrypted content signal stored in the storage means.
- Identification information adding means for adding identification information to the content signal.
- the content signal receiving device is provided from an external device.
- Receiving means for receiving the encrypted content signal and the identification information; decryption means for decrypting the encrypted content signal; and identification information adding means for adding identification information to the content signal decrypted by the decryption means And characterized in that:
- the content processing apparatus comprises: a decryption unit for decrypting the encrypted content signal using a content key; and a log information generation for generating log information each time the decryption unit decrypts the content key.
- the content processing apparatus further includes: a receiving unit that receives an encrypted content key obtained by encrypting a content key for decrypting an encrypted content signal with a delivery key updated every predetermined period.
- Decoding means for decoding the encrypted content signal using the content key; charging information generating means for generating charging information relating to use of the encrypted content signal; storage means for storing the charging information; And transmitting means for transmitting the billing information when the key is updated.
- the content processing apparatus includes: a receiving unit that receives a delivery key that is a key for decrypting an encrypted content signal and is updated every predetermined period; Decoding means for decoding the encrypted content signal; charging information generating means for generating charging information relating to use of the encrypted content signal; storage means for storing the charging information; and the delivery key being updated And transmitting means for transmitting the billing information.
- the encryption processing device includes a decryption unit that decrypts an encrypted content key in which a content key for decrypting a content signal is encrypted, and log information each time the content key is decrypted.
- the content processing system includes: a storage unit that stores an encrypted content signal; a storage unit that stores identification information; and a transmission unit that transmits the encrypted content signal and the identification information.
- a first content processing apparatus provided; a receiving means for receiving the encrypted content signal and the identification information; a decrypting means for decrypting the encrypted content signal; and a content signal decrypted by the decrypting means.
- a second content processing device including an identification information adding unit for adding the identification information.
- the content processing system further includes: a decryption unit configured to decrypt the encrypted content signal using the content key; a log information generation unit configured to generate log information each time the decryption unit decrypts the content key; A content processing device including a storage unit for storing log information, a transmission unit for transmitting the log information at a predetermined timing, a reception unit for receiving the log information, and a charging process based on the log information. And a billing processing device having a billing means for performing the billing.
- the content signal receiving method receives an encrypted content (Content) signal, and converts the received encrypted content signal.
- an instruction to decrypt the stored encrypted content signal is given as the stored and user instruction information
- the stored encrypted content signal is decrypted, and identification information is added to the decrypted content signal. It is characterized by comprising steps.
- the content receiving method comprises the steps of: receiving an encrypted content signal and identification information from the outside; decoding the encrypted content signal; and adding identification information to the decrypted content signal. It is characterized by becoming.
- the content processing method includes: decoding a content signal to be encrypted using a content key; generating log information each time the content key is decrypted; storing the log information;
- the content processing method according to the present invention is characterized in that a content key for decrypting an encrypted content signal is updated every predetermined period. Receiving the encrypted content key obtained by encrypting with the delivery key; decrypting the encrypted content signal with the content key; generating billing information on use of the encrypted content signal; And transmitting the accounting information when the delivery key is updated.
- the content processing method is a key for decrypting an encrypted content signal, receiving a delivery key updated every predetermined period, and based on the delivery key, Decoding the signal, generating billing information on the use of the encrypted content signal, storing the billing information, and transmitting the billing information when the delivery key is updated.
- FIG. 1 is a block diagram showing a basic configuration of an entire content distribution system to which the present invention is applied.
- FIG. 2 is a block diagram showing a configuration of the first information processing device and the second information processing device.
- FIG. 3 is a block diagram showing a schematic configuration in the case where the first information processing device holding only the storage key receives the content and stores it in the large-capacity storage device in the content distribution system. is there.
- FIG. 4 is a diagram for explaining a procedure of a mutual authentication process using public key encryption.
- FIG. 5 is a block diagram showing a schematic configuration in a case where the first information processing apparatus holding the distribution key receives the content data and stores it in the large-capacity storage device in the content distribution system.
- FIG. 6 is a flowchart of the accounting process performed by the first information processing apparatus.
- FIG. 7 is a block diagram showing a main configuration of a receiving device of the first information processing device in the content distribution system according to the first embodiment of the present invention.
- FIG. 8 is a block diagram showing a main configuration of a receiving device of the second information processing device in the content distribution system according to the first embodiment of the present invention.
- FIG. 9 shows a case where the content stored in the mass storage device of the first information processing device is transferred to the second information processing device according to the first procedure.
- FIG. 10 is a diagram showing a case where the content stored in the large-capacity storage device of the first information processing device is transferred to the second information processing device according to the second procedure.
- FIG. 11 is a diagram illustrating a case where the content stored in the large-capacity storage device of the first information processing device is transferred to the second information processing device according to a third procedure.
- FIG. 12 is a block diagram illustrating a main configuration of a receiving device of the first information processing device in the content distribution system according to the second embodiment of the present invention.
- FIG. 13 is a block diagram showing a main configuration of a receiving device of a second information processing device in the content distribution system according to the second embodiment of the present invention.
- FIG. 14 is a block diagram illustrating a main configuration of a receiving device of the first information processing device in the content distribution system according to the third embodiment of the present invention.
- FIG. 15 is a block diagram illustrating a main configuration of a receiving device of a second information processing device in the content distribution system according to the third embodiment of the present invention.
- FIG. 1 is a block diagram showing a basic configuration of the entire content distribution system to which the present invention is applied.
- the content distribution system shown in Fig. 1 is a content provider (Content Data) that holds content data such as music data, video data, text data such as books, and still image data.
- Content Data Content Data
- a key distribution center 30 a transmission system 50 such as a satellite or cable dinnet for transmitting content, a first information processing device 100 on the user side, The second information processing apparatus 200 to which the content data is transferred from the information processing apparatus 100 of the first embodiment.
- the content provider 10 stores the content data, and if necessary, inserts a digital watermark (Watermark: mark) into the content data, and further compresses and encrypts the content data. Make it. Further, the content provider 10 encrypts a content key (Content Key) for decrypting the encrypted content data with the delivery key. Note that the content provider 10 may have separate metadata (Meta Data) in addition to the content data. These data are sent to service provider 20.
- the service provider 20 receives the encrypted content data and the encrypted content key from the content provider 10 and prices the content data (determines the price), and the communication path. Then, the encrypted content data is transmitted to the first information processing apparatus 100 on the user side via the transmission system 50.
- the key distribution center 30 distributes a distribution key to the content provider 10, obtains billing information from the information processing device 100 on the user side, performs payment processing, and performs a payment process according to the result. Profit distribution to content providers 10 and service providers 20.
- the first information processing device 100 is a device owned by the user. As shown in FIG. 2, the encrypted content data to be encrypted which is supplied from the service provider 20 via the transmission system 50 is provided. And the like, and a large-capacity storage device 180 for storing information such as the supplied encrypted content data.
- the second information processing apparatus 200 is a device owned by the user, and is a receiving apparatus 2 for receiving information such as an encrypted content to be encrypted transferred from the first information processing apparatus 100. 70, and a large-capacity storage device 280 for storing information such as the supplied encrypted content data.
- the first information processing apparatus 100 and the second information processing The receiving devices 170 and 270 that receive the encrypted content data transmitted from the device and the encrypted content data received by the receiving devices 170 and 270, respectively, are stored.
- the mass storage device consists of 180,280.
- the receivers 170 and 270 are connected to the communication units 110 and 210 that transmit and receive data to and from the outside, respectively, and the higher-level controllers 1 and 2 connected to the communication units 110 and 210, respectively.
- the communication unit 110 communicates with the service provider 20 and the key distribution center 30 to transmit a predetermined content such as content or a key. Send / receive information.
- the communication unit 210 communicates with the first information processing device 100 to transmit / receive predetermined information.
- the upper controllers 120 and 220 respond to the data received via the communication units 110 and 210 and the operation input data from the operation input units 130 and 230, respectively.
- Predetermined messages are displayed on the display units 140 and 240, and the encryption processing units 150 and 2 are displayed.
- the content data usage right purchase processing and transfer processing are performed, the encrypted content data and the like are stored in the large-capacity storage devices 180 and 280, and Controls such as reading from the capacity storage devices 180 and 280 and supplying them to the content processing units 160 and 260 are performed.
- the operation input units 130, 230 supply operation input data, such as a signal from a remote controller (not shown) and operation of an input button (not shown), ie, user instruction information, to the upper controllers 120, 220, respectively.
- the display units 140 and 240 are composed of display devices such as liquid crystal displays controlled by the upper controllers 120 and 220, respectively, and issue instructions and display information. Or The input operation sections 130 and 230 and the display sections 140 and 240 are replaced with a touch panel liquid crystal display if necessary, and are integrated together. Also, in the receiving device 170 of the first information processing device 100, the signal processing unit 150 cross-authenticates with the service provider 20 and the key distribution center 30 to purchase the content usage right.
- the cryptographic processing unit 150 includes a control unit 151, a storage module 152, a purchase processing module 1553, a mutual authentication module 1554, an encryption / decryption module 1555, and the like.
- the control unit 151 controls each module in accordance with a command from the host controller 12 ⁇ and outputs the result from each module to the host controller 1 2.
- the storage module 152 stores the billing information supplied from the purchase processing module 153 and the data such as the delivery key Kd, and the other functional blocks execute predetermined processing. At this time, data such as the delivery key K d is supplied.
- the purchase processing module 1553 newly generates license condition information and charging information from the handling policy and price information received from the service provider 20, and outputs the information to the storage module 1552.
- the mutual authentication module 154 performs mutual authentication with the external device, generates a temporary key K t (session key) as necessary, and supplies the temporary key K t (session key) to the encryption / decryption module 155.
- the encryption / decryption module 155 includes a decryption unit 155 a and an encryption unit 155 b.
- the decryption unit 1555a decrypts the content key Kc encrypted with the delivery key Kd, and decrypts various data encrypted with the session key Kt.
- the encryption unit 15 5b sends the decrypted content key K c Encrypt with the storage key K s stored in the storage module 152, output to the storage module 152 via the control unit 151, and encrypt various data with the session key Kt .
- the content processing section 160 receives the content key Kc by performing mutual authentication with the encryption processing section 150, and uses the content key Kc to perform the encryption supplied from the higher-order controller 120.
- the content is decoded, the compressed content is decompressed, and a digital watermark is embedded in the content.
- the content processing section 160 includes a decryption module 161, a decompression module 162, a digital watermark embedding module 163, and the like.
- the decryption module 161 decrypts the content data stored in the large-capacity storage unit 180 with the content key Kc and outputs the decrypted content to the decompression module 162.
- the decompression module 162 decompresses the compressed content data by, for example, the ATRAC (Adaptive Transform Acoustic Coding) method, and outputs it to the electronic watermark embedding module 163.
- the digital watermark embedding module 16 3 embeds the individual ID of the cryptographic processing unit that performed the purchase processing in the content using digital watermarking technology, and is converted into an analog signal by the D / A Output from speakers 18 3.
- the encryption processing unit 150 and the content processing unit 160 in the receiving device 170 of the first information processing device 100 are configured by a single-chip encryption processing IC, have a multilayer structure, and have an internal structure. Memory cells are sandwiched between dummy layers such as aluminum layers, and the operating voltage or frequency width is narrow, making it difficult to read data from outside in a single-chip IC. Is configured as Further, the encryption processing unit 250 and the content processing unit 260 provided in the receiving device 270 of the second information processing device 200 are provided with the receiving device of the first information processing device 100, respectively. It has the same function as the encryption processing unit 150 and the content processing unit 160 of the 170, and is configured as a single-chip IC having an anti-dumper property.
- the large-capacity storage units 180 and 280 are storage devices such as a hard disk and an optical disk.
- the storage device is a content device encrypted with a content key Kc and a content key encrypted with a delivery key Kd. Kc, license information, price information, public key certificate, registration information, etc. are stored.
- content data provided from the content provider 10 is stored in the large-capacity receiving device 180 via the receiving device 170 of the information processing device 100 of the user.
- the steps (1) to (4) will be described with reference to FIG.
- the content provider 10 that holds the unencrypted content data generates a content key (for example, a common key) Kc with a random number generator (not shown), and encrypts the content key Cont with the content key Kc.
- the content provider 10 uses the distribution key (for example, a common key or a public key) K d supplied from the key management center 30 in advance (procedure 1), and uses the content key K c and Encrypt other information such as license information.
- the content provider 10 supplies the encrypted content data K c (Cont) and the encrypted content key K d (K c) to the service provider 20. (Step 1).
- the receiving device 170 of the first information processing device 100 possessed by the user receives the encrypted content data Kc (Cont) from the service provider 20 via satellite communication, cable communication, Internet connection, or the like. And the encrypted content ⁇ key Kd (Kc) is received (step 3). The receiving device 170 receiving these must decrypt the code in order for the user to enjoy this content. Therefore, the receiving device 170 obtains the decrypted content key Kc as follows.
- the receiving device 170 of the first information processing device 100 transmits the encrypted content key Kd (Kc) directly to the key management center 30 (procedure 1).
- the receiving device 170 may store the encrypted content key Kd (Kc) received in step 3 once in the large-capacity receiving device 180 (step 5), or may not need to store it. . That is, the receiving device 170 does not have the distribution key Kd used for encrypting the content key Kc, and the receiving device 170 decrypts the encrypted content key Kd (Kc) as it is. Since it is not possible, this encrypted content key Kd (Kc) is transmitted to the key management center 30 once.
- the receiving device 170 of the first information processing device 100 transmits its own identification information ID and its own storage key Ks together with the encrypted content key Kd (Kc).
- the key management center 30 decrypts the content key Kc from the encrypted content key Kd (Kc) with its own distribution key Kd, and uses the storage key Ks received from the user's receiving device 170. Encrypt the content key Kc again.
- the key management center 30 further performs a billing process according to the identification information of the user. Then, the key management center 30 transmits the encrypted code encrypted with the storage key Ks.
- the content key Ks (Kc) is returned to the receiving device (step (1)).
- the key management center 30 may transmit these data after encrypting them with a session key established by mutual authentication with the receiving device 170. That is, when encrypting the content key or the like with the session key, the receiving device 170 does not transmit the storage key Ks to the key management center 30, and the key management center 30 encrypts the content key Kc with the session key. And transmit it to the receiving device 1 ⁇ 0. After receiving the encrypted content key or the like encrypted with the session key, the receiving device 170 once decrypts the content key Kc or the like using the session key, and holds the decrypted content key Kc or the like. Encrypt with the storage key Ks.
- the receiving device 170 that has received the encrypted content key Ks (Kc) encrypted with the storage key Ks stores the encrypted content key Ks (Kc) in the large-capacity receiving device 180. Since the storage module 152 of the receiving device 170 stores the storage key Ks, the receiving device 170 can decrypt the content key Kc at any time, and using the content key Kc, The content Cont can be decrypted from the encrypted content data Kc (Cont). Although only one key is stored in large-capacity receiving device 180 in FIG. 3, a large number of encrypted content / content keys may be actually stored.
- the content data Cont possessed by the content provider 10 can be encrypted with the content key Kc and provided to the user's receiving device 170,
- the content key Kc used for encrypting the content is also encrypted and provided to the user's receiving device 170. Can be.
- the receiving device 170 of the user can decrypt the provided encrypted content key Kc and decrypt the content data Cont.
- the encryption algorithm may be any algorithm that encrypts the data so that the contents cannot be understood by a third party.
- public key cryptosystems and common key cryptosystems are generally known as cryptographic algorithms.
- the public key cryptosystem is a cryptographic algorithm in which a key used for encryption and a key used for decryption are different.
- RSA cryptography and elliptic curve cryptography are known.
- the public key is called the public key
- the key kept secret by the user is called the secret key.
- a symmetric key cryptosystem is a cryptographic algorithm in which a key used for encryption and a key used for decryption are the same.
- DES Data Encryption Standard
- FEAL Fast Encryption Algorithm
- NKT NKT
- Mist Mitsubishi Electric
- the public key of device A is Kpa
- the secret key is Ksa
- the identification information is IDa
- the public key of device B is Kpb
- the secret key is Ksb
- the identification information is IDb. Then, let the public key of the certificate authority be Kpc and the secret key be Ksc.
- the certificate Ca for indicating the validity of the public key Kpa of the device A is as shown in the following equation (1).
- Hash () is a one-way function called a hash function.
- This hash function is a function that compresses data with a long data length into data with a short fixed bit length, and is a function whose input is hard to see from the output.
- Representative examples of the hash function include MD (Message Digest) 5 and SHA (Secure Hash Algorithm) -1. This hash function is described in detail in Bruce Schneier's rApplied Cryptography (Second Edition), Wiley. "+" Means to concatenate data.
- 16-bit data + 16-bit data means that 32 bits of data are continuously arranged.
- Enc () indicates the encryption process
- Enc (x, y) indicates that data x will be encrypted with encryption key y.
- public key encryption for example, RSA encryption
- Dec () represents the decryption process
- Enc (x, z) indicates that data X is decrypted with decryption key z.
- the certificate Cb for showing the validity of the public key Kpb of the device B is the same as the certificate Ca.
- the devices A and B hold their own public key certificates Ca and Cb and the public key Kpc of the certificate authority in addition to their own keys and identification information.
- step S1 device A generates a random number R1. Further, as shown in the following equation (3), this random number R1 is encrypted with the secret key Ksa to generate authentication data R2.
- R2 Enc (Rl, Ksa) ' ⁇ ' ⁇ (3) Then, the certificate Ca and the authentication data R2 are sent to the device B.
- step S3 Enc (Rl, Ksb) ⁇ ' ⁇ (5)
- step S3 the device A verifies the certificate Cb sent from the device B as in step S2, and determines whether the public key Kpb is valid.
- the device A decrypts the authentication data R3 with the public key Kpb to generate verification data R4 as shown in the following equation (6), and generates the verification data R4. Compare R4 with random number M.
- R4 Dec (R3, Kpb). '(6) If the random number R1 matches the verification data R4, the device B has a valid secret key Ksb, and the device B Can be confirmed. If they do not match, device B is an unauthorized device that has seen certificate Cb Can be determined.
- the device A generates an authentication data R5 from the random number R1 and the authentication data R2 using a hash function as shown in the following equation (7).
- R5 Hash (Rl + R2) ⁇ ' ⁇ (7) Then, the device ⁇ encrypts the authentication data R5 with the secret key Ksa and generates R6 as shown in the following equation (8).
- R6 Enc (R5, Ksa) ⁇ ' ⁇ (8) And device ⁇ sends R6 to device B.
- step S4 the device B generates a verification data R7 from the random number R1 and the authentication data R2 using a hash function as shown in the following equation (9).
- R7 Hash (Rl + R2) ' ⁇ , (9)
- device ⁇ generates the verification data R8 by decrypting the transmitted R6 with the public key Kpa as shown in the following equation (10). I do.
- R8 Dec (R6, Kpa). ⁇ '(10) Then, the device ⁇ compares the verification data R7 and the verification data R8, and if they match, the device ⁇ is a valid private key Ksa Therefore, the validity of the device A can be confirmed. If they do not match, it can be determined that device A is an unauthorized device that has seen the certificate Ca.
- device A and device B can perform mutual authentication, confirming that both are valid.
- a temporary key such as a random number M may be used as a temporary key only for that time, and this key is called a session key.
- the content key described above is decrypted
- the encrypted content is decrypted according to the usage conditions. For example, if the condition is that the content can be decrypted only 10 times, each time the content key is decrypted once, the number of times the usage condition accompanying the content key is used is reduced. Also, for example, if there is a condition that copying is prohibited, copying of content is prohibited, such as prohibiting decryption of content when trying to transfer content to another device.o
- the key management center 30 holds the account number and credit card number associated with the identification information, and collects money from banks and power companies in accordance with this number.
- the key management center 30 sends and sends the account number and credit card number every time the key is sent.
- the key management center 30 deducts the price from the electronic money stored in the storage module 152 inside the receiving device 1 ⁇ 0.
- the distribution key Kd is stored in advance in the storage module 152 of the receiving device 170 of the first information processing device 100, and The content key Kc may be decrypted from the encrypted content key Kd (Kc) using the key Kd.
- the receiving device 170 of the first information processing device 100 owned by the user transmits the encrypted content data from the service provider 20 via satellite communication, cable communication, Internet connection, or the like.
- the storage module The content key Kc is decrypted from the encrypted content key Kd (Kc) using the delivery key Kd held in the Yule 152, and the content key Kc is re-encrypted with the storage key Ks which is held by itself.
- Ks (Kc) in the large-capacity receiving device 180 step (1).
- the receiving device 170 creates log information log every time the content key Kc is decrypted, and stores the log information log in the storage module 152.
- the receiver 170 transmits the log information log to the key management center 30 after a certain period of time, when the distribution key Kd is decrypted a predetermined number of times, or when the distribution key Kd is updated. Yes (Procedure I). That is, as shown in the flowchart of the billing process in FIG. 6, the receiving device 170 of the first information processing device 100 determines whether or not a certain period has elapsed since the previous billing process was performed (step S 1). 1) repeatedly determining whether the encrypted delivery key Kd has been decrypted a predetermined number of times (step S12) and updating the delivery key Kd (step S13).
- step S14 the accounting processing is performed by transmitting the log information log to the key management center 30 (step S14).
- the current accounting process is reset, the process returns to step S11, and the next accounting process is started.
- the content provider 10 is given a delivery key Kd from the key management center 30 in advance (step (2)), and the content provider 10 receives the encrypted content data Kc ( Cont) and the encrypted content key Kd (Kc) are supplied to the service provider 20 (Procedure I).
- the storage module 1 52 of the first information processing device 100 When the delivery key Kd is stored in advance, the delivery key Kd used by the content provider 10 is updated at regular intervals (for example, once a month), and the first information processing device 100 responds accordingly. It is assumed that the distribution key Kd is supplied from the key management center 30 (step 1). That is, since the distribution key Kd is common to all devices, it is sometimes changed in consideration of security.
- first information processing apparatus 100 and the second information processing apparatus 200 connected to the first information processing apparatus 100 will be described in further detail with reference to FIGS. 7 and 8. Will be described.
- the encryption / decryption module 15 5 in the receiving device 170 of the first information processing device 100 includes a storage module 15 2 and an encrypted device encrypted with the delivery key Kd.
- the data Kc (Cont) and the encrypted content key Ks' (Kc + ID) are transmitted to the second information processing apparatus 200 via the communication unit 110.
- the receiving device 170 is connected to the large-capacity receiving device 180 via an IEEE1394 interface or the like.
- the storage module 152 includes a flash memory or the like in an IC chip, and includes a content key decrypting unit 23, an identification information adding unit 24, a content
- the key code part 25 is composed of an ASIC and a program in an IC chip.
- the storage module 152 includes a memory (flash memory, EEPR0M, or the like) in a single-chip IC having an anti-dumper built into the first receiving device 170, and a first receiving device 150. Any kind of storage medium that can not be easily checked by a third party, such as an IC card that can be exchanged overnight, can be used.
- the large-capacity storage device 180 may be any storage medium or storage device such as a removable or fixed hard disk, optical disk, tape media, semiconductor memory, or the like.
- the receiving device 170 may be externally connected or built-in. It is to be noted that identification information (ID) for identifying each of these large-capacity receiving devices 180 may be written, and this identification information may not be rewritable.
- ID identification information
- the receiving device 270 of the second information processing device 200 receives the encrypted data encrypted by the storage key K s ′ that the receiving device 270 independently holds.
- a content key decryption unit 33 for decrypting the encrypted content key Ks' (Kc + ID) is provided in the encryption processing unit 250, and a decryption module and electronic watermarking in the content processing unit 260 are embedded.
- a content decryption unit 34 that decrypts the encrypted content data K c (Cont) encrypted with the content key K c, and a decompression that expands the content data decrypted by the content decryption unit 34
- a digital watermark embedding unit 36 that embeds the identification information ID 1 unique to the first information processing apparatus 100 into the content decompressed by the decompression unit 35 by digital watermark processing. With The content data in which the identification information ID 1 is embedded by the digital watermark is output from the output terminal 37.
- the receiving device 270 transmits the encrypted content data Kc (Cont) and the encrypted content key Ks, (Kc + ID) from the first information processing device 100 to the communication unit 2.
- the receiving device 270 is connected to a mass storage device 280 via an IEEE 1394 interface or the like.
- the decompressing unit 35 includes, for example, MPEG (Moving Picture
- Examples include an MPEG decoder that decodes data encoded according to the Experts Group (AT) standard, and an ATRAC decoder that decodes data encoded according to the so-called Adaptive Transform Acoustic Coding (ATRAC) standard.
- AT Experts Group
- ATRAC Adaptive Transform Acoustic Coding
- the storage module 252 of the receiving device 270 in the second information processing device 200 is configured by a flash memory or the like in an IC chip similarly to the storage module 152 of the receiving device 170 of the first information processing device 100.
- the content key decryption unit 33, the content decryption unit 34, the digital watermark embedding unit 36, and the decompression unit 35 are configured by an ASIC or a program in the IC chip.
- the receiving device 170 of the first information processing device 100 and the receiving device 270 of the second information processing device 200 each have unique identification information (ID 1, ID 2). It holds the storage keys Ks, Ks'.
- the storage key uniquely held by the receiving device 170 of the first information processing device 100 is hereinafter referred to as a first storage key Ks
- the storage key uniquely held by the second receiving device 270 is hereinafter referred to as a first storage key Ks. It is called the second storage key Ks'.
- the digital watermark of the receiving device 270 of the second information processing device 200 The embedding unit 36 embeds digital watermark information (Water ark) in the content data. It is difficult to remove the embedded information from audio data or image data with information embedded by this digital watermarking process, and this information can be extracted even after repeated filling and compression / expansion processing. Can be.
- the receiving apparatus 170 of the first information processing apparatus 100 When the content is transferred from the first information processing apparatus 100 to the second information processing apparatus 200 in the first procedure, the receiving apparatus 170 of the first information processing apparatus 100 The delivery key K d and the unique identification information ID 1 of the first information processing device are stored in advance in the storage module 15 2 of the storage device. Then, the first information processing apparatus 100 transmits the encrypted content data K encrypted with the content key K c transmitted from the service provider 20 via the satellite communication network. c (Cont) and the encrypted content key K d (K c) encrypted with the delivery key K d are received by the receiving device 170 (procedure 1), and the received encrypted content data K is received. c (Cont) and the encrypted content key Kd (Kc) are stored in the large-capacity receiving device 180 (step (1)).
- the first information processing apparatus 100 Between the second information processing device 200 Perform mutual authentication (step 3).
- This mutual authentication is performed, for example, in the receiving device 270 of the second information processing device 200 shown in FIG. 2 by using the user instruction information input from the operation input unit 230 to the upper controller 220. Accordingly, in order to make a content transfer request to the first information processing apparatus 100, the request is first performed between the first information processing apparatus 100 and the second information processing apparatus 200.
- the mutual authentication process is performed by the receiving device 170 of the first information processing device 100 shown in FIG. 2 by operating a signal from a remote controller (not shown) or operating an input button (not shown).
- input data that is, user instruction information is input from the operation input unit 130 to the higher-order controller 120
- each of the first information processing device 100 and the second information processing device 200 The processing may be executed via the communication units 110 and 210.
- the receiving device 270 of the second information processing device 200 sends a content request command including the content number of the content to be copied from the first information processing device 100 and the second storage key Ks. Is encrypted with the session key and sent to the receiving device 170 of the first information processing device 100 (procedure 4).
- the receiving device 170 of the first information processing device 100 that has received the content request command decrypts the received data with the session key, and obtains the content number and the second storage key Ks'. Then, the receiving device 170 searches and retrieves the content and the content key corresponding to the content number from the large-capacity receiving device 180 (procedure 1). Subsequently, the receiving device 170 of the first information processing device 100 decrypts the content key K c with the delivery key K d held in the storage module 152 by the content key decrypting unit 23. (Procedure 6), the decrypted content key K c The own identification information ID 1 is added by the identification information adding unit 24 (step (1)).
- the identification information ID 1 of the first information processing device 100 is “0000 1 1 1 1 22223333”
- the identification information is added.
- the key is 0 123456789ABCDEF 0000 1 1 1 122223333.
- the receiving device 170 of the first information processing device 100 uses the content key encryption unit 25 to convert the content key Kc with its own identification information ID 1 added thereto using the second storage key Ks'. Encrypt (step 1). Then, the receiving device 170 of the first information processing device 100 transmits the encrypted content key Ks ′ (Kc + ID 1) to which the identification information ID 1 has been added and encrypted, and the encrypted content data Kc ( Cont) is transmitted to the receiving device 270 of the second information processing device 200 via the communication unit 110 (procedure 9).
- the receiving device 270 of the second information processing device 200 transmits the encrypted content key Ks ′ (Kc + ID) and the encrypted content data Kc (Cont) transmitted from the first information processing device 100 to the communication unit 2. 10 and received in the mass storage device 280 (step (1)).
- the receiving device 270 of the second information processing device 200 uses the second storage key Ks ′ stored in the storage module 252 by the content key decrypting unit 33 to receive the received encrypted content key Ks ′. (Kc + ID) is decrypted (step 1).
- the receiving device 270 of the second information processing device 200 decrypts the encrypted content key Ks ′ (Kc + ID 1), thereby obtaining the content key Kc and the identification information ID 1 of the first information processing device 100. Obtainable.
- the second information processing device 20 The 0 receiving device 270 uses the content decrypting unit 34 to decrypt the received encrypted content data Kc (Cont) using the content key Kc (procedure 1).
- the decompression unit 35 performs a predetermined decompression process on the content data decrypted by the content decryption unit 34, for example, if the content data is music data compressed by ATRAC, performs ATRAC decompression processing. And convert to PCM data
- the digital watermark embedding unit 36 generates a first information processing device 100 obtained by decrypting the encrypted content key K s ′ (K c + ID 1) by the content key decrypting unit 33.
- the unique identification information ID 1 is embedded in the content data decompressed by the decompression unit 35 by digital watermarking processing and output via the output terminal 37.
- the above is the first procedure for transferring the content data stored in the large-capacity receiving device 180 of the first information processing device 100 to the second information processing device 200 for playback.
- a content request command including the content number of the content to be copied in step (1) and the second storage key Ks ′ is transmitted from the second information processing apparatus 200 to the first Was transmitted to the information processing apparatus 100 of the first information processing apparatus 100, but in the second steps (1) to (4) described below, the second storage key Ks' was It is registered in the storage module 1502 of 170.
- the first information processing device 100 Even when the content is transmitted to the device 200, the storage key 152 of the receiving device 170 of the first information processing device 100 includes the delivery key Kd and the delivery key Kd of the first information processing device. Unique identification ID 1 is stored in advance. Then, the first information processing apparatus 100 transmits the encrypted content data Kc encrypted with the content key Kc transmitted from the service provider 20 via the satellite communication network. (Cont) and the encrypted content key Kd (Kc) encrypted with the delivery key Kd are received by the receiving device 170 (step (2)), and the received encrypted content content Kc (Cont) is received. The encrypted content key Kd (Kc) is stored in the large-capacity receiving device 180 (step (1)).
- the receiving device 270 of the second information processing device 200 shown in FIG. 2 described above uses a signal from a remote controller (not shown) or an operation of an input button (not shown).
- the operation input data that is, user instruction information is input from the operation input unit 230 to the higher-level controller 220, so that the receiving device 270 of the second information processing device 200 transmits the first information processing device.
- a mutual authentication request is sent to the receiving device 170 at 100 (step 3). After that, mutual authentication is performed between the two parties, and the session key is shared (step 1).
- the receiving device 270 of the second information processing device 2000 encrypts the registration request command including the second storage key Ks ′ with the session key, and sends the registration request command to the first receiving device 170. send.
- the receiving device 170 of the first information processing device 100 that has received these registers the second storage key Ks ′ of the second information processing device 200 in the storage module 152 (procedure 5).
- the receiving device 270 of the second information processing device 200 encrypts the content request command including the content number of the content to be copied from the first information processing device 100 with the session key, and performs the first information processing device 1 Send to 00's receiver 1 70 (Procedure 1).
- the receiving device 170 of the first information processing device 100 decrypts the received data with the session key and acquires the content number. Then, the receiving device 170 of the first information processing device 100 receives, from the large-capacity receiving device 180, the encrypted content data Kc (Cont) and the encrypted content key Kd (Kc ) Search and retrieve (step 7).
- the receiving device 170 of the first information processing device 100 decrypts the content key Kc from the encrypted content key Kd (Kc) using the distribution key Kd in the storage module 152 (procedure I), and decrypts the content key Kc.
- the self-identification information ID 1 is added to the obtained content key Kc (step (1)).
- this data (Kc + ID 1) is encrypted using the second storage key Ks ′ registered in the storage module 152 (procedure 10).
- the receiving device 170 of the first information processing device 100 includes the encrypted content key Ks ′ (Kc + ID 1) to which the identification information ID 1 has been added and encrypted, and the encrypted content key Kc (Cont).
- step (2) Is transmitted to the receiving device 270 of the second information processing device 200 via the communication unit 110 (step (2)).
- the receiving device 270 of the second information processing device 200 transmits the encrypted content key Ks, (Kc + IDl) transmitted from the receiving device 170 of the first information processing device 100 and the encrypted content data.
- Kc (Cont) is received and loaded into the mass storage device 32 (step (1)).
- the receiving device 270 is configured to store the second data stored in the storage module 252.
- the content key Kc and the identification information ID1 are decrypted from the received encrypted content key Ks '(Kc + IDl) by the content key decryption unit 33 by using the storage key Ks' of Step 2 (procedure 13).
- the receiving device 270 of the second information processing device 200 decrypts the encrypted content key Ks ′ (Kc + ID 1) to obtain the content key Kc and the identification information of the receiving device 170 of the first information processing device 100. You can get ID 1.
- the receiving device 270 of the second information processing device 200 uses the content key Kc to cause the content decryption unit 34 to decrypt the content from the encrypted content data Kc (Cont) (procedure 1).
- the decompression unit 35 performs decompression processing on the content data decrypted by the content decryption unit 34.
- the decompression unit 35 performs, for example, ATRAC decompression processing to generate PCM data (procedure 1).
- the electronic watermark embedding unit 36 has a unique content of the first information processing device 100 obtained by decrypting the encrypted content key Ks ′ (Kc + ID 1) by the content key decrypting unit 33.
- the identification information ID 1 is embedded in the content data decompressed by the decompression unit 35 by digital watermarking, and is output from the output terminal 37 (procedure 1).
- the above is the second procedure of transferring the content data stored in the large-capacity receiving device 180 of the first information processing device 100 to the second information processing device 200 for playback.
- the identification information ID 1 of the first information processing apparatus 100 is copied.
- the identification information ID 1 of the first information processing device 100 is added to the content key Kc in advance and stored in the large-capacity receiving device 180. Keep it.
- the storage module 152 of the receiving device 170 of the first information processing device 100 The delivery key Kd and the unique identification information ID 1 of the first information processing device are stored in advance. Then, the first information processing apparatus 100 transmits the encrypted content data decrypted with the content key Kc transmitted from the service provider 20 via the satellite communication terminal 1 to the receiver Kc ( Cont) and the encrypted content key Kd (Kc) encrypted with the distribution key Kd are received by the receiving device 170 (step (2)), and the received encrypted content data Kc (Cont) is encrypted.
- the content key Kd (Kc) is stored in the large-capacity receiving device 180 (step (1)).
- the content key decryption unit 23 stores the encrypted content key Kd (Kc) encrypted with the delivery key Kd in the storage module 152. Decryption is performed using the distribution key Kd stored in (step 3).
- the identification information adding unit 24 adds the identification information ID 1 of the first information processing device 100 to the content key Kc decrypted by the content key decrypting unit 23 (procedure 1). Then, the content key Kc + ID1 to which the identification information ID1 has been added by the identification information adding unit 24 is encrypted using the first storage key Ks (step (2)).
- the encrypted content key Ks (Kc + IDl) encrypted by the content key encryption unit 25 is received in a large capacity. It is stored in the communication device 180 (step (1)).
- the encrypted content data Kc (Cont) encrypted with the content key Kc and the encrypted content key Ks (Kc + ID1) encrypted with the first storage key Ks have a large capacity.
- Mutual authentication is performed between the first information processing device 100 and the second information processing device 200 (step (1)).
- the receiving device 270 of the second information processing device 200 uses the session key to send a content request command including the content number of the content to be copied (transferred) from the first information processing device 100.
- the data is encrypted and sent to the receiving device 170 of the first information processing device 100.
- the receiving device 170 of the first information processing device 100 completes the mutual authentication in step (2), decrypts the received data with the session key to obtain the content number, and From the capacity receiving device 180, an encrypted content data Kc (Cont) and an encrypted content key Ks (Kc + ID1) corresponding to the content number are retrieved and retrieved (procedure 1).
- the receiving device 170 of the first information processing device 100 uses the first storage key Ks in the storage module 152 to cause the content key decryption unit 23 to execute the above-described encrypted content key Ks (Kc + ID 1).
- the decrypted content key (Kc + ID 1) is encrypted by the content key encryption unit 25 using the second storage key Ks registered in the storage module 152 (procedure 11).
- the encrypted content key Ks ′ (Kc + ID 1) to which the identification information ID 1 has been added and the encrypted content key Kc (Cont) are transmitted to the second information processing unit via the communication unit 110.
- the data is transmitted to the receiving device 270 of the device 200 (step (1)). Subsequently, the receiving device 270 of the second information processing device 200 transmits the encrypted content key Ks, (Kc + IDl) transmitted from the receiving device 170 of the first information processing device 100 and the encrypted content data. Kc (Cont) is received and taken into the mass storage device 280 (step (1)). Then, the receiving device 270 uses the second storage key Ks ′ stored in the storage module 252 to generate the content to which the identification information has been added from the received encrypted content key Ks ′ (K c + ID 1). The key (Kc + ID 1) is decrypted by the content key decryption unit 33 (step (2)). Note that the identification information need not be added to the content key if transmitted together.
- the receiving device 270 of the second information processing device 200 decrypts the encrypted content key Ks ′ (Kc + IDl), thereby obtaining the content key Kc and the receiving device 170 of the first information processing device 100. Can be obtained.
- the receiving device 270 of the second information processing device 200 uses the content key Kc to decrypt the content from the encrypted content data Kc (Cont) by the content decryption unit 34 (procedure I). .
- the decompression unit 35 performs decompression processing on the content data decrypted by the content decryption unit 34.
- the extension 35 The PCM data is converted to ATDM data by ATRAC decompression (Step 1).
- the digital watermark embedding unit 36 generates the content key (Kc + ID1) to which the identification information is added from the encrypted content key Ks, (Kc + ID1) in the content key decrypting unit 33.
- the above is the third procedure of transferring the content data stored in the large-capacity receiving device 180 of the first information processing device 100 to the second information processing device 200 for playback. .
- the content data stored in the large-capacity receiving device 180 of the first information processing device 100 is transferred to the second information processing device 200 so that the content data is copied.
- the unique identification information ID 1 of the first information processing device 100 from which the content data was purchased is embedded by digital watermark processing. Therefore, for example, even if a malicious user attempts to duplicate and sell the content, the identification information of the first information processing apparatus 100 of the purchased user is written in the content, and the contract is made. It is possible to track users who have made illegal copies outside of the building, thus improving crime deterrence.
- the first information processing apparatus 100 and the second information processing apparatus 200 have a simplified configuration, and the identification information ID 1 of the first information processing apparatus 100 is efficiently stored in the content data. Can be embedded in
- the content data and the content key received by satellite communication or the Internet are once stored in the large-capacity receiving device 180 of the first information processing device 100.
- the content data may be directly transferred to the second information processing device 200 according to the first to third procedures.
- the content key Kc to be encrypted is copied (transferred). May be added.
- the second information processing apparatus 200 that has received the content key can restrict the conditions for using the content key K c. For example, if information indicating that copying (transferring) is not allowed is added as copyright information of the content, the second information processing device 200 may stop outputting the contents of the content file. Can be.
- the encrypted content data is distributed electronically via the Internet or satellite communication, but the encrypted content data is transmitted to an information recording medium such as a CR-ROM. It may be supplied more.
- the receiving device 170 of the first information processing device 100 includes, as shown in FIG. 12, a mutual authentication module 1504 of the cryptographic processing unit 150.
- a mutual authentication unit 43 that performs mutual authentication with the receiving device 27 of the second information processing apparatus 200 via the mutual authentication interface 45, and generates a session key used for mutual authentication A session key generation unit 44.
- the receiving device 170 converts the content key Kc from the encrypted content key Kd (Kc) encrypted with the delivery key Kd as the encryption / decryption module 155 of the encryption processing unit 150.
- a content key decryption unit 23 for decryption, an identification information addition unit 24 for adding identification information ID 1 unique to the first information processing device 100 to the decrypted content key Kc, and a content key Kc is encrypted using the session key Kt.
- the storage module 152 of the receiving device 170 of the first information processing device 100 the delivery key Kd, the first storage key Ks, and the unique identification information ID 1 of the first information processing device 100 are stored.
- the mass storage device 180 stores the content data Kc (Cont) encrypted with the content key Kc and the encrypted content key Kd (Kc) encrypted with the delivery key Kd. .
- the receiving device 270 of the second information processing device 200 serves as a mutual authentication module of the cryptographic processing unit 250 and the receiving device 170 of the first information processing device 100 for mutual authentication.
- the content key decryption unit 52 decrypts the encrypted encrypted content key Kt (Kc), and the second storage key Ks ′ uniquely stored by the second information processing apparatus 200, thereby decrypting the content key Kc.
- a content key encryption unit 55 for encrypting and storing the encrypted content in the large-capacity storage device 280 is provided.
- the receiving device 270 of the second information processing device 200 serves as a decryption module and a digital watermark embedding module in the content processing unit 260, and receives the encrypted data encrypted with the content key K c.
- Content decryption unit 34 that decrypts the content data from the encrypted content data K c (Cont), an expansion unit 35 that expands the content data decrypted by the content decryption unit 34, and an expansion unit 35 that expands the content data.
- a digital watermark embedding section 36 for embedding the first information processing apparatus 100's unique identification information ID 1 by digital watermark processing on the attached content data.
- the content terminal in which the identification information ID 1 is embedded is output from the output terminal 37.
- the first information processing apparatus 100 is encrypted with a content key Kc sent from the service provider 20 via the satellite communication network.
- the encrypted content data K c (Cont) and the encrypted content key K d (K c) are stored in the mass storage device 180 (step (1)).
- the first information processing apparatus 100 When transferring (copying) the encrypted content data Kc (Cont) from the first information processing apparatus 100 to the second information processing apparatus 200, for example, as shown in FIG.
- operation input data that is, user instruction information from the operation input unit 230 of the receiving device 270 of the second information processing device 270 to the upper controller 224
- the first The mutual authentication unit 43 of the receiving device 170 of the information processing device 100 and the mutual authentication unit 53 of the receiving device 270 of the second information processing device 200 Perform authentication (step 3).
- the session key generation unit 44 of the receiving device 170 of the first information processing device 100 and the session key generation unit 54 of the receiving device 270 of the second information processing device 200 Kt is generated, and this session key Kt is shared (step (2)).
- the receiving device 270 of the second information processing device 200 sends a content request command containing the content number to be copied from the receiving device 170 of the first information processing device 100—the content number of the evening. Is encrypted with the session key Kt and sent to the receiving device 100 of the first information processing device 100 (step (2)).
- the receiving device 170 of the first information processing device 100 that has received the content request command decrypts the received data with the session key Kt and acquires the content number. Then, from the large-capacity storage device 180 of the first information processing device 100, the encrypted content server Kc (Cont) and the encrypted content key Kd (Kc) corresponding to the content number are searched. Remove (step (1)).
- the receiving device 170 of the first information processing device 100 uses the content key decryption unit 23 to transmit the encrypted content key with the distribution key Kd held in the storage module 152.
- the content key Kc is decrypted from Kd (Kc) (procedure 7), and its own identification information ID1 is added to the content key Kc decrypted by the identification information adding unit 24 (procedure 8).
- the receiving device 41 of the first information processing device 100 uses the content key encryption unit 42 to convert the content key (Kc + IDl) with its own identification information ID1 into the session key Kt (Step ⁇ ). Then, the encrypted content key Kt (Kc + ID1) and the encrypted content data Kc (Cont) are transmitted via the communication unit 110. The data is transmitted to the receiving device 270 of the second information processing device 200 (step (1)). The receiving device 270 of the second information processing device 200 receives the encrypted content key Kt (Kc + IDl) encrypted with the session key Kt transmitted from the receiving device 170 of the first information processing device 100. Then, the encrypted content data Kc (Cont) encrypted with the content key Kc is received via the communication unit 210 (step (1)).
- the receiving device 270 of the second information processing device 200 decrypts the encrypted content key Kt (Kc + ID 1) received by the content key decrypting unit 52 using the session key Kt generated by the session key generating unit 54. (Procedure 12).
- the receiving device 51 of the second information processing device 200 decrypts the content key (Kc + ID 1) to which the identification information is added from the encrypted content key Kt (Kc + ID 1), thereby obtaining the content key Kc
- the identification information ID 1 of the first information processing device 100 can be obtained.
- the receiving device 51 of the second information processing device 200 uses the content key Kc to decrypt the content data Cont from the encrypted content data Kc (Cont) using the content decrypting unit 34 (procedure). 13).
- the decompression unit 35 performs a decompression process such as ATRAC on the content data decrypted by the content decryption unit 34 (procedure 1).
- the electronic watermarking unit 36 decrypts the first content key (Kc + ID 1) to which the identification information is added from the content key Kt (Kc + ID 1) by the content key decrypting unit 33.
- the ID information 1 unique to the information processing device 100 of the present embodiment is embedded in the content-de-contant Cont decrypted by the content decryption unit 34 by the digital watermarking process, and output via the output terminal 37 (procedure 1). ).
- the receiving device 270 of the second information processing device 200 ⁇ ⁇ ⁇ ⁇ ⁇ ⁇
- the content key K c decrypted by the key decryption unit 52 is encrypted by the content key encryption unit 55 using the second storage key K s ′ stored in the storage module 25 2.
- the encrypted content key K s ′ (K c) encrypted with the second storage key K s ′ is stored in the mass storage device 280 (procedure 16).
- the unique identification information ID1 of the first information processing device 100 from which the content was purchased is embedded by digital watermarking. Therefore, for example, even if a malicious user attempts to duplicate and sell the content, the content contains the identification information of the user who purchased the content, and it is possible to track the user who has illegally copied the content out of the contract, and Deterrence improves.
- the first information processing apparatus 100 and the second information processing apparatus 200 have a simplified configuration, and the identification information ID 1 of the first information processing apparatus 100 is efficiently stored in the content data. Can be embedded in Also, in particular, in the second embodiment, there is no need to transmit the second storage key K s ′ of the second information processing device 200 and supply it to the first information processing device 100. , More secure.
- a content that stores unencrypted content (for example, music data, video data, document data such as a book, still image data, etc.) 10 is content with the content key K c held or generated by itself. —Encrypt the evening (Cont) and supply it to service provider 20 (step 1). Further, the content provider 20 supplies the content key Kc to the key management center 30 (step (1)).
- the content key Kc may be different for each content or may be the same.
- the key management center 30 encrypts the content key Kc with its own distribution key (the key may be different for each user's receiving device 170 or may be the same for all).
- the encrypted content key Kd (Kc) encrypted with the delivery key Kd is supplied to the user's receiving device 170 (step (3)).
- the receiving device 170 of the information processing device 100 of the user transmits the encrypted content encrypted by the content key Kc from the service provider 20 via satellite communication, cable communication, the Internet, or the like. ⁇ Receive Kc (Cont) for one night (Procedure 4).
- the receiving device 170 which has received the encrypted content data Kc (Cont), requests the key management center 30 for the content key Kc for decryption in order to decrypt the content (step (2)).
- the key management center 30 Upon receiving a request to transmit the content key Kc, the key management center 30 transmits the encrypted content key Kd (Kc) encrypted with the delivery key Kd to the information processing apparatus 100 of the user ( Step i). At this time, the key management center 30 also performs billing processing at the same time.
- the fee may be deducted from the user's bank account registered in the key management server 30, or the credit card number may be transmitted from the user's receiving device 170 to this card number. May be charged.
- the information is stored in the IC card provided in the receiving device 100 of the information processing device 100.
- the required fee may be deducted from the prepaid fee.
- the receiving device 170 of the user device 100 receiving the encrypted content key Kd (Kc) receives the encrypted content key Kd () using the delivery key Kd held in the storage module 152.
- the content key Kc can be decrypted from Kc), and the encrypted content can be decrypted using the decrypted content key Kc.
- the receiving device 170 of the information processing device 100 encrypts the decrypted content key Kc with the storage key Ks that is uniquely stored, and stores the encrypted content key Kc in the large-capacity storage device 180 (procedure 1). This is because the delivery key Kd used to deliver the content key Kc may change on a regular basis. Also, storing the content key Kc without encrypting it is essentially the same as storing the content without encrypting it, and there is a possibility that others can freely view the content. In addition, the user's receiving device 170 encrypts the content key Kc with the storage key Ks held by the user, so that the user can use the same content without being charged again when decrypting the same content. it can.
- the information processing device 100 of the user decrypts the encrypted content data Ks (Cont) encrypted with the storage key Ks, and transfers the decrypted content data to another device.
- the procedure for performing this is explained.
- the mass storage device 180 of the receiving device 170 in the information processing device 100 stores the encrypted content data Kc (Cont) and the encrypted content key Ks (Kc). I have.
- the storage module 152 provided inside the receiving device 170 stores a storage key Ks and identification information (ID) of the receiving device 170.
- the receiving device 170 of the information processing device 100 First, the encrypted content key Ks (Kc) is read from the large-capacity storage device 180 (procedure 1), and the content key decryption unit 113 uses the storage key Ks read from the storage module 152.
- the usable content key Ks is decrypted from the encrypted content key Ks (Kc) (step (2)).
- the receiving device 170 reads the encrypted content data Kc (Cont) from the mass storage device 180 (step 3), and the content decrypting unit 114 uses the content key K c to read the encrypted content.
- the content data is decrypted from the above-mentioned encrypted content data Kc (Cont) (procedure 4), and the content data decrypted by the decompression unit 116 is decompressed by ATRAC to obtain a PCM data (procedure 5) and decompressed.
- the digital watermark embedding unit 115 embeds the unique identification information of the receiving device 170 in the content data, and outputs the content data via the output terminal 118 (procedure 1).
- the receiving device 170 When transferring this content to another device, the receiving device 170 encrypts the content data with the same content key Kc using the content encrypting unit 117 and encrypts the content data.
- the encrypted content data Kc (Cont) is output via the output terminal 119 (step (1)).
- the identification information unique to the receiving device 170 is subjected to digital watermark processing. More embedded. So, for example, if a malicious user tries to duplicate and sell content, the content will buy it Since the user identification information is written, the user can be tracked, and the deterrence of crime is improved.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Mathematical Physics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
Description
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP99933206A EP1014618A1 (en) | 1998-07-30 | 1999-07-30 | Content processing system |
| US09/509,583 US6834346B1 (en) | 1998-07-30 | 1999-07-30 | Content processing system |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP21580998 | 1998-07-30 | ||
| JP10/215809 | 1998-07-30 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/897,684 Continuation US7310731B2 (en) | 1998-07-30 | 2004-07-23 | Contents processing system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2000007329A1 true WO2000007329A1 (en) | 2000-02-10 |
Family
ID=16678626
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP1999/004132 Ceased WO2000007329A1 (en) | 1998-07-30 | 1999-07-30 | Content processing system |
Country Status (3)
| Country | Link |
|---|---|
| US (2) | US6834346B1 (ja) |
| EP (1) | EP1014618A1 (ja) |
| WO (1) | WO2000007329A1 (ja) |
Cited By (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2001211161A (ja) * | 1999-11-15 | 2001-08-03 | Pumpkin House:Kk | コンテンツ配信方法,コンテンツ配信システムのためのコンピュータおよび装置ならびにその制御方法 |
| JP2001237819A (ja) * | 2000-02-24 | 2001-08-31 | Nec Corp | 著作物再生システム,著作物復号装置,およびユーザ固有情報格納装置 |
| JP2002007325A (ja) * | 2000-06-23 | 2002-01-11 | Shinkichi Morimoto | デジタルコンテンツの配信方法およびデジタルコンテンツの配信システム |
| WO2002080064A1 (en) * | 2001-03-28 | 2002-10-10 | Sony Computer Entertainment Inc. | Content distribution system |
| JP2004507175A (ja) * | 2000-08-11 | 2004-03-04 | エヌディーエス リミテッド | 送信コンテントの事前暗号化のためのシステムおよび方法 |
| JP2006013693A (ja) * | 2004-06-23 | 2006-01-12 | Toppan Printing Co Ltd | コンテンツ配信装置および同装置における復号化鍵の送信方法ならびにプログラム |
| JP2006163951A (ja) * | 2004-12-08 | 2006-06-22 | Kobe Univ | ディジタルコンテンツ管理システム、及びその管理方法 |
| JP2006518469A (ja) * | 2003-02-19 | 2006-08-10 | シンセリカ・コーポレイション | 代替抗体の集合を用いてスクリーニングするための組成物及び方法 |
| JP2007305083A (ja) * | 2006-05-15 | 2007-11-22 | Xing Inc | コンテンツ提示装置及びコンテンツ提示方法等 |
| JP2008015919A (ja) * | 2006-07-07 | 2008-01-24 | Fujitsu Ltd | コンテンツ再生装置 |
| JP2010541068A (ja) * | 2007-09-28 | 2010-12-24 | サンディスク コーポレイション | デジタルコンテンツ配布のためのシステムおよび方法 |
| US8117128B2 (en) | 2000-03-14 | 2012-02-14 | Sony Corporation | Content usage management system method, and program providing medium therefor |
| US9083685B2 (en) | 2009-06-04 | 2015-07-14 | Sandisk Technologies Inc. | Method and system for content replication control |
| US11024200B2 (en) | 2014-08-01 | 2021-06-01 | Sony Corporation | Content format conversion verification |
Families Citing this family (56)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2000007329A1 (en) * | 1998-07-30 | 2000-02-10 | Sony Corporation | Content processing system |
| JP4206529B2 (ja) * | 1998-09-17 | 2009-01-14 | ソニー株式会社 | コンテンツ管理方法及びコンテンツ記憶システム |
| GB2397673B (en) * | 2000-06-05 | 2004-10-27 | Sealedmedia Ltd | Digital rights management |
| US7903822B1 (en) * | 2000-11-10 | 2011-03-08 | DMT Licensing, LLC. | Method and system for establishing a trusted and decentralized peer-to-peer network |
| JP3993385B2 (ja) * | 2000-12-28 | 2007-10-17 | 株式会社エヌ・ティ・ティ・ドコモ | コンテンツ配信システム、著作権保護システム及びコンテンツ受信端末 |
| JP4512280B2 (ja) * | 2001-02-16 | 2010-07-28 | 日立コンシューマエレクトロニクス株式会社 | ストリームデータ再生装置 |
| US7043051B2 (en) * | 2001-02-21 | 2006-05-09 | Lg Electronics Inc. | Proprietary watermark system for secure digital media and content distribution |
| US7111169B2 (en) * | 2001-03-29 | 2006-09-19 | Intel Corporation | Method and apparatus for content protection across a source-to-destination interface |
| US20020166056A1 (en) * | 2001-05-04 | 2002-11-07 | Johnson William C. | Hopscotch ticketing |
| KR100493284B1 (ko) * | 2001-05-11 | 2005-06-03 | 엘지전자 주식회사 | 디지털 미디어의 복제 제어 방법 및 시스템 |
| CN100428212C (zh) * | 2001-05-21 | 2008-10-22 | 卡拉网络科技有限公司 | 一种下载和播放音乐文件的系统及其方法 |
| JP2002358239A (ja) * | 2001-06-04 | 2002-12-13 | Fuji Electric Co Ltd | 著作権保護システム |
| JP4545994B2 (ja) * | 2001-07-02 | 2010-09-15 | 三洋電機株式会社 | データ再生装置それに用いるデータ再生回路、およびデータ記録装置 |
| JP4604422B2 (ja) * | 2001-07-31 | 2011-01-05 | ソニー株式会社 | 通信システム、通信装置及び通信方法 |
| JP4934923B2 (ja) * | 2001-08-09 | 2012-05-23 | ソニー株式会社 | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにコンピュータ・プログラム |
| JP4064647B2 (ja) * | 2001-08-24 | 2008-03-19 | 富士通株式会社 | 情報処理装置及び入力操作装置 |
| US20030188183A1 (en) * | 2001-08-27 | 2003-10-02 | Lee Lane W. | Unlocking method and system for data on media |
| WO2003021849A2 (en) * | 2001-08-31 | 2003-03-13 | Hamilton John W | A non-algebraic cryptographic architecture |
| AU2002211191A1 (en) * | 2001-10-12 | 2003-06-10 | Kent Ridge Digital Labs | A method of sale auditing in private transaction of e-goods |
| JP2003242714A (ja) * | 2001-10-24 | 2003-08-29 | Fuji Electric Co Ltd | 情報記録媒体、その媒体の製造方法、情報処理装置、並びに、著作権管理システム |
| WO2003056425A2 (en) * | 2001-12-21 | 2003-07-10 | Xmlcities, Inc. | Method and mechanism for managing content objects over a network |
| NZ534192A (en) * | 2001-12-25 | 2005-05-27 | Ntt Docomo Inc | Device and method for restricting content access and storage |
| US7328345B2 (en) * | 2002-01-29 | 2008-02-05 | Widevine Technologies, Inc. | Method and system for end to end securing of content for video on demand |
| JP2003296197A (ja) * | 2002-01-31 | 2003-10-17 | Matsushita Electric Ind Co Ltd | 記録装置、記録媒体および課金処理装置 |
| US20040010628A1 (en) * | 2002-07-11 | 2004-01-15 | Gillam Richard J. | System and method for discouraging unauthorized duplication of data stored on a storage media |
| JP2004054834A (ja) * | 2002-07-24 | 2004-02-19 | Matsushita Electric Ind Co Ltd | プログラム開発方法、プログラム開発支援装置およびプログラム実装方法 |
| US7170999B1 (en) * | 2002-08-28 | 2007-01-30 | Napster, Inc. | Method of and apparatus for encrypting and transferring files |
| JP2004094677A (ja) * | 2002-08-30 | 2004-03-25 | Toshiba Corp | コンテンツ流通システムの管理装置、閲覧用装置、プログラム及び方法 |
| JP4099039B2 (ja) * | 2002-11-15 | 2008-06-11 | 松下電器産業株式会社 | プログラム更新方法 |
| JP3878542B2 (ja) * | 2002-11-29 | 2007-02-07 | 株式会社東芝 | 記録装置 |
| CN1839609A (zh) | 2003-08-20 | 2006-09-27 | 松下电器产业株式会社 | 内容再现系统 |
| US7734932B2 (en) * | 2003-11-10 | 2010-06-08 | Broadcom Corporation | System and method for securing executable code |
| US20050138139A1 (en) * | 2003-12-23 | 2005-06-23 | Jain Naveen K. | System and method for distribution and tracking of digital content |
| EP1580644A3 (en) * | 2004-03-15 | 2005-11-09 | Yamaha Corporation | Electronic musical apparatus for recording and reproducing music content |
| CA2570340A1 (en) * | 2004-06-14 | 2005-12-29 | The University Of North Carolina At Greensboro | Systems and methods for digital content security |
| JP2006127485A (ja) * | 2004-09-30 | 2006-05-18 | Sanyo Electric Co Ltd | コンテンツ再生装置およびコンテンツ再生方法 |
| WO2006053304A2 (en) * | 2004-11-12 | 2006-05-18 | Pufco, Inc. | Volatile device keys and applications thereof |
| US7899189B2 (en) * | 2004-12-09 | 2011-03-01 | International Business Machines Corporation | Apparatus, system, and method for transparent end-to-end security of storage data in a client-server environment |
| US8826023B1 (en) * | 2006-06-30 | 2014-09-02 | Symantec Operating Corporation | System and method for securing access to hash-based storage systems |
| US20080091615A1 (en) * | 2006-10-16 | 2008-04-17 | Samsung Electronics Co., Ltd. | Contents service apparatus and method |
| JP4895113B2 (ja) * | 2007-02-21 | 2012-03-14 | ソニー株式会社 | 記録装置、制御方法、及びプログラム |
| EP1975831A1 (en) * | 2007-03-27 | 2008-10-01 | Thomson Licensing, Inc. | Device and method for digital processing management of content so as to enable an imposed work flow |
| US20080304664A1 (en) * | 2007-06-07 | 2008-12-11 | Shanmugathasan Suthaharan | System and a method for securing information |
| US7907735B2 (en) * | 2007-06-15 | 2011-03-15 | Koolspan, Inc. | System and method of creating and sending broadcast and multicast data |
| KR100783811B1 (ko) * | 2007-08-28 | 2007-12-10 | 주식회사 파수닷컴 | 압축 파일에 대한 디지털 저작권 관리 방법 |
| US8868464B2 (en) | 2008-02-07 | 2014-10-21 | Google Inc. | Preventing unauthorized modification or skipping of viewing of advertisements within content |
| JP4692600B2 (ja) * | 2008-09-25 | 2011-06-01 | 富士ゼロックス株式会社 | 情報処理装置、通信システム、及びプログラム |
| US8365279B2 (en) | 2008-10-31 | 2013-01-29 | Sandisk Technologies Inc. | Storage device and method for dynamic content tracing |
| JP5326815B2 (ja) * | 2009-05-26 | 2013-10-30 | 富士通株式会社 | パケット送受信装置およびパケット送受信方法 |
| US8429365B2 (en) * | 2009-06-26 | 2013-04-23 | Sandisk Technologies Inc. | Memory device and method for embedding host-identification information into content |
| WO2011146898A2 (en) | 2010-05-21 | 2011-11-24 | Bologh Mark J | Internet system for ultra high video quality |
| GB2509046B (en) * | 2012-10-19 | 2016-01-13 | Kraft Foods R & D Inc | Improvement in or relating to capsules |
| US9817990B2 (en) * | 2014-03-12 | 2017-11-14 | Samsung Electronics Co., Ltd. | System and method of encrypting folder in device |
| CN106599698B (zh) * | 2015-10-19 | 2019-09-20 | 腾讯科技(深圳)有限公司 | 一种加密图片、解密图片的方法和装置 |
| TWI630826B (zh) * | 2016-08-26 | 2018-07-21 | Play management device, play management method, play management program, content receiving system, and content distribution system | |
| US11575657B2 (en) * | 2020-02-25 | 2023-02-07 | International Business Machines Corporation | Mitigating misinformation in encrypted messaging networks |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10133955A (ja) * | 1996-10-29 | 1998-05-22 | Matsushita Electric Ind Co Ltd | 可搬型メディア駆動装置とその方法、及び可搬型メディアとネットワークの連携装置とその方法 |
| JPH10191036A (ja) * | 1996-11-08 | 1998-07-21 | Monorisu:Kk | デジタルコンテンツに対するidの刷込および読出方法 |
Family Cites Families (33)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US576479A (en) * | 1897-02-02 | Olof l | ||
| US5742677A (en) * | 1995-04-03 | 1998-04-21 | Scientific-Atlanta, Inc. | Information terminal having reconfigurable memory |
| US4424414A (en) * | 1978-05-01 | 1984-01-03 | Board Of Trustees Of The Leland Stanford Junior University | Exponentiation cryptographic apparatus and method |
| US4386233A (en) * | 1980-09-29 | 1983-05-31 | Smid Miles E | Crytographic key notarization methods and apparatus |
| EP0085130A1 (en) * | 1982-02-02 | 1983-08-10 | Omnet Associates | Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission |
| US4633036A (en) * | 1984-05-31 | 1986-12-30 | Martin E. Hellman | Method and apparatus for use in public-key data encryption system |
| US4881264A (en) * | 1987-07-30 | 1989-11-14 | Merkle Ralph C | Digital signature system and method based on a conventional encryption function |
| US5247575A (en) * | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
| US5016274A (en) * | 1988-11-08 | 1991-05-14 | Silvio Micali | On-line/off-line digital signing |
| US4956863A (en) * | 1989-04-17 | 1990-09-11 | Trw Inc. | Cryptographic method and apparatus for public key exchange with authentication |
| US5003597A (en) * | 1989-12-21 | 1991-03-26 | Xerox Corporation | Method and apparatus for data encryption |
| US5337361C1 (en) * | 1990-01-05 | 2001-05-15 | Symbol Technologies Inc | Record with encoded data |
| US5299262A (en) * | 1992-08-13 | 1994-03-29 | The United States Of America As Represented By The United States Department Of Energy | Method for exponentiating in cryptographic systems |
| US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
| US5341429A (en) * | 1992-12-04 | 1994-08-23 | Testdrive Corporation | Transformation of ephemeral material |
| US5400403A (en) | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
| US5394469A (en) * | 1994-02-18 | 1995-02-28 | Infosafe Systems, Inc. | Method and apparatus for retrieving secure information from mass storage media |
| US5469506A (en) * | 1994-06-27 | 1995-11-21 | Pitney Bowes Inc. | Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic |
| US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
| US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| US5592549A (en) * | 1995-06-15 | 1997-01-07 | Infosafe Systems, Inc. | Method and apparatus for retrieving selected information from a secure information source |
| DE69636084T2 (de) | 1995-09-28 | 2006-09-14 | Nec Corp. | Verfahren und Vorrichtung zum Einfügen eines Spreizspektrumwasserzeichens in Multimediadaten |
| US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
| US5764769A (en) * | 1996-07-31 | 1998-06-09 | International Business Machines Corporation | Digital recording system with time-bracketed authentication by on-line challenges and method of authenticating recordings |
| US5835595A (en) * | 1996-09-04 | 1998-11-10 | At&T Corp | Method and apparatus for crytographically protecting data |
| US5832515A (en) * | 1996-09-12 | 1998-11-03 | Veritas Software | Log device layered transparently within a filesystem paradigm |
| JP3109575B2 (ja) | 1996-09-30 | 2000-11-20 | 日本電気株式会社 | 画像データ処理装置 |
| JP3570114B2 (ja) * | 1996-10-21 | 2004-09-29 | 富士ゼロックス株式会社 | データ検証方法およびデータ検証システム |
| US5915027A (en) | 1996-11-05 | 1999-06-22 | Nec Research Institute | Digital watermarking |
| US5940507A (en) * | 1997-02-11 | 1999-08-17 | Connected Corporation | Secure file archive through encryption key management |
| US5991402A (en) * | 1997-09-23 | 1999-11-23 | Aegisoft Corporation | Method and system of dynamic transformation of encrypted material |
| WO2000007329A1 (en) * | 1998-07-30 | 2000-02-10 | Sony Corporation | Content processing system |
| US6321981B1 (en) * | 1998-12-22 | 2001-11-27 | Eastman Kodak Company | Method and apparatus for transaction card security utilizing embedded image data |
-
1999
- 1999-07-30 WO PCT/JP1999/004132 patent/WO2000007329A1/ja not_active Ceased
- 1999-07-30 EP EP99933206A patent/EP1014618A1/en not_active Withdrawn
- 1999-07-30 US US09/509,583 patent/US6834346B1/en not_active Expired - Fee Related
-
2004
- 2004-07-23 US US10/897,684 patent/US7310731B2/en not_active Expired - Fee Related
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10133955A (ja) * | 1996-10-29 | 1998-05-22 | Matsushita Electric Ind Co Ltd | 可搬型メディア駆動装置とその方法、及び可搬型メディアとネットワークの連携装置とその方法 |
| JPH10191036A (ja) * | 1996-11-08 | 1998-07-21 | Monorisu:Kk | デジタルコンテンツに対するidの刷込および読出方法 |
Non-Patent Citations (2)
| Title |
|---|
| HARUMITSU NAKAJIMA, KAZUYA MIYAZAKI, TETSUO NAKAKAWAJI, "Secure digital contents distribution system-DIGITEX-no kaihatsu", Denshi Jouhou Tsuushin Gakkai 1998 Nen Sougou Taikai Kouen Rombunshuu, SD-3-7, (06.03.98), XP002921951. * |
| SHIN'ICHI IKENO, KENJI OYAMA, "Gendai angou riron", 3rd edition, IEICE, (20.05.89), page 268, XP002921952. * |
Cited By (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2001211161A (ja) * | 1999-11-15 | 2001-08-03 | Pumpkin House:Kk | コンテンツ配信方法,コンテンツ配信システムのためのコンピュータおよび装置ならびにその制御方法 |
| JP2001237819A (ja) * | 2000-02-24 | 2001-08-31 | Nec Corp | 著作物再生システム,著作物復号装置,およびユーザ固有情報格納装置 |
| US8117128B2 (en) | 2000-03-14 | 2012-02-14 | Sony Corporation | Content usage management system method, and program providing medium therefor |
| JP2002007325A (ja) * | 2000-06-23 | 2002-01-11 | Shinkichi Morimoto | デジタルコンテンツの配信方法およびデジタルコンテンツの配信システム |
| JP2004507175A (ja) * | 2000-08-11 | 2004-03-04 | エヌディーエス リミテッド | 送信コンテントの事前暗号化のためのシステムおよび方法 |
| US7409063B2 (en) | 2001-03-28 | 2008-08-05 | Sony Computer Entertainment Inc. | Contents distribution system |
| WO2002080064A1 (en) * | 2001-03-28 | 2002-10-10 | Sony Computer Entertainment Inc. | Content distribution system |
| JP2006518469A (ja) * | 2003-02-19 | 2006-08-10 | シンセリカ・コーポレイション | 代替抗体の集合を用いてスクリーニングするための組成物及び方法 |
| JP2006013693A (ja) * | 2004-06-23 | 2006-01-12 | Toppan Printing Co Ltd | コンテンツ配信装置および同装置における復号化鍵の送信方法ならびにプログラム |
| JP2006163951A (ja) * | 2004-12-08 | 2006-06-22 | Kobe Univ | ディジタルコンテンツ管理システム、及びその管理方法 |
| JP2007305083A (ja) * | 2006-05-15 | 2007-11-22 | Xing Inc | コンテンツ提示装置及びコンテンツ提示方法等 |
| JP2008015919A (ja) * | 2006-07-07 | 2008-01-24 | Fujitsu Ltd | コンテンツ再生装置 |
| JP2010541068A (ja) * | 2007-09-28 | 2010-12-24 | サンディスク コーポレイション | デジタルコンテンツ配布のためのシステムおよび方法 |
| US8761402B2 (en) | 2007-09-28 | 2014-06-24 | Sandisk Technologies Inc. | System and methods for digital content distribution |
| US9083685B2 (en) | 2009-06-04 | 2015-07-14 | Sandisk Technologies Inc. | Method and system for content replication control |
| US11024200B2 (en) | 2014-08-01 | 2021-06-01 | Sony Corporation | Content format conversion verification |
Also Published As
| Publication number | Publication date |
|---|---|
| US7310731B2 (en) | 2007-12-18 |
| EP1014618A1 (en) | 2000-06-28 |
| US6834346B1 (en) | 2004-12-21 |
| US20050005148A1 (en) | 2005-01-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2000007329A1 (en) | Content processing system | |
| JP4206529B2 (ja) | コンテンツ管理方法及びコンテンツ記憶システム | |
| US6950941B1 (en) | Copy protection system for portable storage media | |
| US6728379B1 (en) | Information processor and information processing method | |
| KR100798199B1 (ko) | 데이터 처리 장치, 데이터 처리 시스템, 및 데이터 처리방법 | |
| US7496756B2 (en) | Content usage-right management system and management method | |
| JP4294322B2 (ja) | コンテンツアイテムを保護しながら記憶するための受信デバイスおよび再生デバイス | |
| WO2002075550A1 (en) | Data recorder restoring original data allowed to exist only uniquely | |
| WO2001022242A1 (en) | Data providing system and method therefor | |
| WO2001019017A1 (en) | Contents management system, device, method, and program storage medium | |
| WO2001016776A1 (en) | Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method | |
| JP2001175606A5 (ja) | ||
| WO2001043342A1 (en) | Data distribution system and recorder for use therein | |
| WO2004109972A1 (ja) | ライセンス受信用ユーザ端末 | |
| WO2006064768A1 (ja) | 不正機器検出装置、不正機器検出システム、不正機器検出方法、プログラム、記録媒体及び機器情報更新方法 | |
| JP2000293586A (ja) | 情報処理装置および方法、並びに提供媒体 | |
| WO2006003883A1 (ja) | 記録媒体並びに記録媒体に情報を記録する記録装置及び記録方法 | |
| JP2004072721A (ja) | 認証システム、鍵登録装置及び方法 | |
| JP2000122539A (ja) | 著作物保護システム | |
| JP2001175605A (ja) | データ処理装置 | |
| JP2001094554A (ja) | 情報送信システム、情報送信装置、情報受信装置、情報送信方法 | |
| JP2000124890A (ja) | 情報処理装置および方法、管理装置および方法、情報利用システム、提供媒体、並びに外部記憶媒体 | |
| JP5209945B2 (ja) | 記憶装置、暗号化コンテンツの有効化方法及び端末装置 | |
| JP4296698B2 (ja) | 情報処理装置、情報処理方法、並びに記録媒体 | |
| JP2001067324A (ja) | 情報送信システム、情報送信装置及び情報受信装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 1999933206 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 09509583 Country of ref document: US |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWP | Wipo information: published in national office |
Ref document number: 1999933206 Country of ref document: EP |
|
| WWW | Wipo information: withdrawn in national office |
Ref document number: 1999933206 Country of ref document: EP |