WO2012153485A1 - 端末装置、コンテンツ記録システム、タイトル鍵記録方法及びコンピュータプログラム - Google Patents
端末装置、コンテンツ記録システム、タイトル鍵記録方法及びコンピュータプログラム Download PDFInfo
- Publication number
- WO2012153485A1 WO2012153485A1 PCT/JP2012/002891 JP2012002891W WO2012153485A1 WO 2012153485 A1 WO2012153485 A1 WO 2012153485A1 JP 2012002891 W JP2012002891 W JP 2012002891W WO 2012153485 A1 WO2012153485 A1 WO 2012153485A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- recording medium
- content
- unit
- medium device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/79—Processing of colour television signals in connection with recording
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/414—Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
- H04N21/4147—PVR [Personal Video Recorder]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
Definitions
- a device key is issued from the key issuing device to the playback device, and an MKB (Media Key Block) is issued from the key issuing device to the content production device.
- the content production device protects the content using the MKB and the title key generated by itself.
- the MKB, title key, and protected content are recorded on a BD-ROM and sold.
- the playback device uses the device key, the MKB, and the title key to release the content protection and play back the content.
- the terminal device 500 is, for example, a PC installed at the user's home.
- the terminal device 500 can be connected to the content distribution device 300 and the key distribution device 400 via a network such as the Internet.
- the key issuing device 100 is a computer system that includes a processor, a ROM, a RAM, a hard disk, and the like.
- the key issuing device 100 performs a key issuing process for generating and issuing a valid private key and public key certificate for each device constituting the content distribution system 1.
- FIG. 2 is a block diagram showing a functional configuration of the key issuing device 100.
- FIG. 3 is a diagram illustrating an example of a public key certificate generated by the certificate generation unit 105.
- FIG. 3A shows a content production device certificate 110 distributed to the content production device 200.
- the content production device certificate 110 includes a content production device ID, a content production device public key, and a signature.
- data obtained by adding a content production device ID that is an identifier of the content production device 200 to the content production device public key generated by the key pair generation unit 104 is used as signature target data.
- the certificate generation unit 105 generates a signature by applying a signature verification algorithm to signature target data using the root secret key as a signature generation key. Then, a content production device certificate 110 including a content production device ID, a content production device public key, and a signature is generated.
- the private key / certificate storage unit 106 stores the private key of each device generated by the key pair generation unit 104 and the public key certificate of each device generated by the certificate generation unit 105 as a pair.
- the key issuing device 100 generates a root key pair including a root public key and a root secret key (step S1) and stores the root key pair in the root key pair storage unit 102. Then, the route public key transmission unit 103 transmits the route public key to the key distribution device 400, the terminal device 500, and the recording medium device 600 in response to the route public key request (step S2).
- the key pair generation unit 104 generates a key pair for the content production device 200 (step S3).
- the certificate generation unit 105 generates the content production device certificate 110 (step 4).
- the private key / certificate transmission unit 107 transmits the content production device private key and the content production device certificate 110 to the content production device 200 (step 5).
- the key pair generation unit 104 generates a key pair for the key distribution device 400 (step S6).
- the certificate generation unit 105 generates a key distribution device certificate 120 (Step 7).
- the private key / certificate transmission unit 107 transmits the key distribution device private key and the key distribution device certificate 120 to the key distribution device 200 (step 8).
- the content registration unit 214 registers the content stored in the content storage unit 208 and the content identification information stored in the content identification information storage unit 211 in the content distribution device 400.
- the content registration unit 214 sends the content and content identification information as a set to the content distribution device 300 (step S27).
- the title key / UR registration unit 215 sets the title key, the UR, and the content identification information as a set and transmits them to the key distribution device 400 (step S28).
- the key distribution device 400 includes a root public key receiving unit 401, a root public key storage unit 402, a private key / certificate receiving unit 403, a private key / certificate storage unit 404, a title key / UR reception.
- Section 405 title key / UR storage section 406, title key calculation section 407, mutual authentication section 408, encryption / decryption section 409, recording medium device ID reception section 410, MAC calculation section 411, and UR transmission section 412.
- the private key / certificate receiving unit 403 receives the key distribution device private key and the key issuing device certificate from the key issuing device 100.
- the title key calculation unit 407 acquires the title key and UR from the title key / UR storage unit 406. Then, the title key calculation unit 407 calculates a UR hash value. The title key calculation unit 407 performs a reversible calculation using the UR hash value and the title key to generate a calculated title key. As an example, the title key calculation unit 407 generates an calculated title key (XORed title key) by calculating an exclusive OR (XOR) of the hash value of the UR and the title key.
- XOR exclusive OR
- the mutual authentication unit 408 of the key distribution device 400 generates a 160-bit random value Hn (Host nonce) (step S41).
- Hn HyperText nonce
- EC-DSA Electronic Curve-Digital Signature Algorithm
- the recording medium device 600 Upon receiving the challenge data from the key distribution device 400, the recording medium device 600 performs verification processing of the key distribution device certificate Hcert included in the challenge data received in step S42 using the root public key (step S43). If the verification process of the key distribution apparatus certificate Hcert fails (NO in step S44), the recording medium apparatus 600 stops the process. If the verification process of the key distribution device certificate Hcert is successful (YES in step S44), the recording medium device 600 generates a 160-bit random value Mn (Media nonce) (step S45).
- Mn Media nonce
- the key distribution device 400 Upon receiving the challenge data from the recording medium device 600, the key distribution device 400 performs verification processing of the recording medium device certificate Mcert included in the challenge data received in step S46, using the root public key (step S47). If the verification process of the recording medium apparatus certificate Mcert fails (NO in step S48), the key distribution apparatus 400 stops the process. If the verification process of the recording medium device certificate Mcert is successful (YES in step S48), the mutual authentication unit 408 of the key distribution device 400 proceeds to step S53.
- the recording medium device 600 transmits the challenge data in step S46, and then generates a 160-bit random value Mk (Media Key) (step S49).
- Mk Media Key
- the random value generated in step S49 is not necessarily 160 bits.
- the recording medium device 600 uses a recording medium device secret key (Mpriv) for Hn
- Mpriv recording medium device secret key
- step 54 If the verification of the digital signature fails (NO in step 54), the key distribution device 400 stops the process. If the verification of the digital signature is successful (YES in step S54), the mutual authentication unit 408 generates a 160-bit random value Hk (Host Key) (step S55).
- Hk HyperText Key
- the encryption / decryption unit 409 encrypts the MAC with the common key BK1 (step S81) and transmits it to the terminal device 500 (step S82).
- the terminal device 500 is a PC including a processor, a ROM, a RAM, a hard disk, a keyboard and mouse as input devices, a monitor as a display device, a card slot for inserting the recording medium device 600, a network connection unit, and the like.
- a computer program is recorded in the ROM, RAM, or hard disk, and some functions of the terminal device 500 can be realized by the processor executing the computer program.
- 16 and 17 are block diagrams illustrating a functional configuration of the terminal device 500.
- the MAC receiving unit 510 receives the MAC from the key distribution device 400 via the encryption / decryption unit 509.
- the MAC received by the MAC receiving unit 510 includes the title key used for encrypting the content written by the content writing unit 505 in the recording medium device 600, and the recording medium device ID / content identification information transmitting unit 508 as a key distribution device.
- the MAC is calculated from the recording medium device ID transmitted to 400.
- the calculated title key receiving unit 522 receives the calculated title key generated from the title key used for encrypting the content to be played back from the recording medium device 600 via the encryption / decryption unit 509 during content playback processing. Receive.
- the UR reading unit 523 reads the UR corresponding to the content to be reproduced from the recording medium device 600.
- the MAC reading unit 525 reads the MAC corresponding to the content to be reproduced from the recording medium device 600.
- the content receiving unit 503 receives content from the content distribution device 300 (step S92).
- the content identification information acquisition unit 504 analyzes the content, and acquires the content identification information from the content when the content identification information is embedded (step S93).
- the content writing unit 505 writes the content received in step S92 into the recording medium device 600 (step S94).
- the title key recalculation unit 524 calculates the hash value of the UR (step S206). Then, the title key recalculation unit 524 calculates an original title key by performing an exclusive OR (XOR) operation from the hash value of the UR and the calculated title key (step S207). The title key recalculation unit 524 passes the calculated title key to the reproduction determination unit 526 and the content decryption unit 528.
- XOR exclusive OR
- the mutual authentication unit 603 performs mutual authentication processing with the key distribution device 400 and shares the common key BK2 with the key distribution device 400 (step S301).
- the root public key storage unit 1401 stores the root public key generated by the key issuing device 100.
- the title key recalculation unit 1409 acquires the UR from the UR storage unit 1408, and acquires the calculated title key received from the recording medium device 600a via the encryption / decryption unit 1404 from the calculated title key receiving / transmitting unit 1406.
- the title key recalculation unit 1409 calculates the hash value of the UR. Further, the title key recalculation unit 1409 calculates the original title key by calculating the exclusive OR (XOR) of the hash value of the UR and the calculated title key.
- XOR exclusive OR
- the title key storage unit 1410 stores the title key calculated by the title key recalculation unit 1409.
- the UR transmission unit 1412 transmits the UR stored in the UR storage unit 1408 to the terminal device 1500.
- the encryption / decryption unit 1404 receives from the terminal device 1500 the transfer source recording medium device ID and the transfer destination recording medium device ID encrypted with the common key BK4. Then, decryption is performed using the common key BK4 (step S402).
- the encryption / decryption unit 1404 receives the computed title key encrypted with the common key BK5 from the recording medium device 600a (step S404).
- the encryption / decryption unit 1404 decrypts the received encrypted operation title key using the common key BK5 (step S405) and passes it to the operation title key reception / transmission unit 1406.
- the mutual authentication unit 1403 determines whether or not the transfer destination recording medium device ID acquired in step S409 matches the transfer destination recording medium device ID received in step S402.
- step S410 the key distribution apparatus 1400 ends the title key transfer process.
- the title key backed up in the key distribution device 1400 and other data necessary for reproducing the content are safely transferred to the recording medium device 600b.
- the mutual authentication unit 1403 determines whether the transfer source recording medium device ID acquired in step S417 matches the transfer source recording medium device ID decrypted in step S420.
- the MAC calculation unit 1411 calculates the MAC from the title key stored in the title key storage unit 1410 and the transfer source recording medium device ID received in step S419 (step S425).
- the encryption / decryption unit 1404 encrypts the MAC calculated in step S425 with the common key BK8 shared with the terminal device 1500 (step S426). Then, the encrypted MAC is transmitted to the terminal device 1500 (step S427).
- the title key backed up by the key distribution device 1400 and other data necessary for reproducing the content are safely returned to the recording medium device 600a.
- 27 and 28 are block diagrams showing a functional configuration of the terminal device 1500.
- FIG. 27 shows a functional configuration when the terminal device 1500 performs content movement processing.
- FIG. 28 shows a functional configuration when the terminal device 1500 performs a recovery process in which the title device backed up by the key distribution device 1400 during the content transfer processing is written back to the recording medium device 600a.
- the root public key, the terminal device private key, and the terminal device certificate are embedded in the terminal device 1500 by the device that manufactures the terminal device 1500 when the terminal device 1500 is manufactured.
- the content writing unit 1504 writes the content read by the content reading unit 1503 from the recording medium device 600a to the recording medium device 600b.
- the mutual authentication unit 1505 performs mutual authentication with the key distribution device 1400, confirms the validity of the key distribution device 1400, and shares a common key with the key distribution device 1400.
- the mutual authentication unit 1505 performs mutual authentication with the recording medium device 600a, confirms the validity of the recording medium device 600a, and shares a common key with the recording medium device 600a.
- the mutual authentication unit 1505 performs mutual authentication with the recording medium device 600b, confirms the validity of the recording medium device 600b, and shares a common key with the recording medium device 600b.
- the recording medium device ID acquisition unit 1506 acquires the recording medium device ID of the recording medium device 600a from the recording medium device certificate that the mutual authentication unit 1505 receives during the mutual authentication process with the recording medium device 600a.
- the recording medium device ID acquisition unit 1506 acquires the recording medium device ID of the recording medium device 600b from the recording medium device certificate received by the mutual authentication unit 1505 during the mutual authentication process with the recording medium device 600b.
- the MAC reception unit 1509 receives the MAC from the key distribution device 1400 via the encryption / decryption unit 1508.
- the MAC receiving unit 1509 receives the MAC generated based on the transfer destination recording medium device ID.
- the MAC receiving unit 1509 receives the MAC generated based on the transfer source recording medium device ID.
- the MAC receiving unit 1509 passes the received MAC to the MAC / UR writing unit 1512.
- the UR receiving unit 1514 receives a UR from the key distribution device 1400.
- the UR receiving unit 1514 passes the received UR to the MAC / UR writing unit 1512.
- the transmission unit 1513 When the terminal device 1500 performs a movement process, the transmission unit 1513 first transmits data transmitted and received on the session between the key distribution device 1400 and the recording medium device 600a. Specifically, the transmission unit 1513 receives, from the recording medium device 600a, the encrypted operation title key encrypted using the common key shared by the key distribution device 1400 and the recording medium device 600a by mutual authentication. Then, the transmission unit 1513 transmits the received encrypted calculation title key to the key distribution apparatus 1400. Next, the transmission unit 1513 transmits data transmitted / received on the session between the key distribution device 1400 and the recording medium device 600b.
- the transmission unit 1513 transmits data transmitted and received on the session between the key distribution device 1400 and the recording medium device 600a. Specifically, the transmission unit 1513 receives, from the key distribution device 1400, an encrypted operation title key encrypted using a common key shared by the key distribution device 1400 and the recording medium device 600a by mutual authentication. Then, the transmission unit 1513 transmits the received encrypted operation title key to the recording medium device 600a.
- the transmission unit 1513 is transmitted over the session, similarly to the transmission unit 513 of the first embodiment.
- the received communication data is simply transmitted without judging the contents or changing the data except for the control data for notifying the start of communication or the end of communication.
- the MAC / UR writing unit 1512 writes the MAC received by the MAC receiving unit 1509 via the encryption / decryption unit 1508 and the MAC read by the UR reading unit 1510 from the recording medium device 600a in the recording medium device 600b ( Step S513).
- step S516 If the content transfer process does not end normally due to a failure in the transfer destination recording medium device 600b or the like (NO in step S515), the terminal device 1500 proceeds to step S516 in FIG. 30 and reproduces the title key and other content. The data necessary for the transfer is written back to the transfer source recording medium device 600a.
- the encryption / decryption unit 1508 encrypts the transfer source recording medium device ID acquired by the recording medium device ID acquisition unit 1506 in step S516 with the common key BK8 (step S518), and transmits it to the key distribution device 1400 (step S519).
- the encryption / decryption unit 1508 receives the MAC encrypted with the common key BK8 from the key distribution apparatus 1400 (step S522).
- the MAC received in step S522 is a MAC generated based on the transfer source recording medium device ID.
- the encryption / decryption unit 1508 decrypts the MAC received in step S522 with the common key BK8 (step S523), and passes it to the MAC reception unit 1509.
- the key distribution device 400 and the terminal device 500 have a configuration for acquiring the recording medium device ID while performing mutual authentication with the recording medium device 600.
- the method for acquiring the recording medium device ID is not limited to this.
- a recording medium device ID for uniquely identifying the recording medium device 600 may be stored in the authentication area 607 of the recording medium device 600.
- the key distribution device 400 and the terminal device 500 perform mutual authentication with the recording medium device 600, share the common key, and then encrypt the recording medium device ID from the recording medium device 600 with the common key.
- the recording medium device ID is received.
- the key distribution device 400 and the terminal device 500 may be configured to decrypt the received encrypted recording medium device ID with a common key and obtain the recording medium device ID.
- the terminal device 500 performs content recording processing for recording content, title key, and the like on the recording medium device 600, and content reproduction processing for reading content from the recording medium device 600 and reproducing it.
- content recording processing for recording content, title key, and the like
- content reproduction processing for reading content from the recording medium device 600 and reproducing it.
- the terminal device 500 may be configured to perform only content recording processing.
- the content reproduction process may be executed by another terminal device different from the terminal device 500.
- the content distribution system shown in FIG. 31 includes a key distribution device 2000, a terminal device 3000, and a recording medium device 4000.
- step S601 data communicated between the recording medium device 4000 and the key distribution device 2000 using the common key.
- an example of content is described as a movie composed of video data and audio data.
- the content is not limited to movies.
- the content may be a still image such as JPEG data, a computer program, a computer game, music content not including video data, text data, or the like.
- the terminal device is not involved in data communicated using the common key between the recording medium device and the key distribution device after the recording medium device and the key distribution device perform mutual authentication. It is possible to prevent the title key from being illegally acquired.
- the terminal device detects a mutual authentication between the recording medium device and the key distribution device, and shifts to a state that does not relate to data communicated between the recording medium device and the key distribution device. be able to.
- the terminal device further includes: A transmission unit that acquires the content identification information from the recording medium device and transmits the acquired content identification information to the key distribution device, wherein the reception unit corresponds to the content identification information from the key distribution device.
- the encrypted title key is received.
- a title key necessary for decrypting the encrypted content can be stored in the recording medium device.
- the user can play and enjoy the content using a recording medium device in which the encrypted content and the title key are recorded.
- the terminal device includes a mutual authentication unit that performs mutual authentication with the key distribution device and shares a common key, and the reception unit includes the mutual authentication unit that communicates with the key distribution device.
- the authentication information encrypted with a shared common key is received, and the transmission unit uses the common key that the mutual authentication unit shares with the key distribution device for the content identification information and the medium identification information. It is characterized by being transmitted after being encrypted.
- the terminal device is involved in data communicated using the common key between the recording medium device and the key distribution device after the recording medium device and the key distribution device perform mutual authentication. Therefore, the title key can be prevented from being illegally acquired. Furthermore, after the other recording medium device and the key distribution device perform mutual authentication, the terminal device transmits data to be communicated between the other recording medium device and the key distribution device using a common key. Since it is not involved, it is possible to suppress illegal acquisition of the title key.
- the authentication information is a message authentication code (MAC) calculated from the title key and medium identification information of the other recording medium device.
- (L) a terminal device that is connected via a network to a key distribution device that distributes a title key necessary for use of the content, and on which a recording medium device for storing the content and the title key is mounted;
- a content recording system including the recording medium device, wherein the recording medium device and the key distribution device perform mutual authentication and share a common key, and the terminal device has the title key as the common
- a first receiving unit that receives an encrypted title key encrypted with a key from the key distribution device; and a transfer unit that transmits the received encrypted title key to the recording medium device.
- an authentication area that is a storage area that requires authentication processing at the time of writing and reading
- a second reception unit that receives the encrypted title key transmitted from the transfer unit
- a reception A decryption unit that decrypts the encrypted title key with the common key and writes the decrypted title key into the authentication area
- the first reception unit and the transfer unit include the recording medium device and the After mutual authentication with the key distribution device, it is not related to data communicated between the recording medium device and the key distribution device using the common key.
- the recording medium device and the key distribution device perform mutual authentication and share a common key.
- the title key is encrypted with the common key.
- the data communicated using the common key between the recording medium device and the key distribution device Characterized in that it does not Kumishi.
- the terminal device is not involved in data communicated between the recording medium device and the key distribution device using a common key after the recording medium device and the key distribution device perform mutual authentication. It is possible to prevent the title key from being illegally acquired.
- N Used in a terminal device that is connected via a network to a key distribution device that distributes a title key necessary for using the content, and in which a recording medium device for storing the content and the title key is mounted
- the recording medium device and the key distribution device perform mutual authentication and share a common key
- the computer program encrypts the title key with the common key in the terminal device.
- Receiving the received encrypted title key from the key distribution device and transferring the received encrypted title key to the recording medium device, wherein the receiving step and the transferring step include: After the recording medium device and the key distribution device perform mutual authentication, the common between the recording medium device and the key distribution device Characterized in that it does not participate in the data communicated with.
- the terminal device is not involved in data communicated using the common key between the recording medium device and the key distribution device after the recording medium device and the key distribution device perform mutual authentication. It is possible to prevent the title key from being illegally acquired.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
Description
先ず、本願発明者が本発明の一態様であるコンテンツ配信システムを得るに至った経緯について説明する。
ここでは、本発明の一態様であるコンテンツ配信システム1について説明する。
図1は、コンテンツ配信システム1の全体構成を示す図である。
鍵発行装置100は、プロセッサ、ROM、RAM、ハードディスクなどを備えるコンピュータシステムである。鍵発行装置100は、コンテンツ配信システム1を構成する各装置に対して、正当な秘密鍵や公開鍵証明書を生成し、発行する鍵発行処理を行う。
図4は、鍵発行装置100による鍵発行処理の動作を示すフローチャートである。
コンテンツ制作装置200は、プロセッサ、ROM、RAM、ハードディスクなどを備えるコンピュータシステムである。コンテンツ制作装置200は、コンテンツを生成して暗号化するコンテンツ制作処理を行う。
図6は、コンテンツ制作装置200によるコンテンツ制作処理の動作を示すフローチャートである。
コンテンツ配信装置300は、プロセッサ、ROM、RAM、ハードディスク、ネットワーク接続ユニットなどを備えるコンピュータシステムである。
図10は、コンテンツ配信装置300によるコンテンツ配信処理の動作を示すフローチャートである。
鍵配信装置400は、プロセッサ、ROM、RAM、ハードディスク、ネットワーク接続ユニットなどを備えるコンピュータシステムである。鍵配信装置400は、コンテンツの復号に用いるタイトル鍵を記録媒体装置600へ送信する鍵配信処理を行う。
ここでは、図13及び図14のフローチャートを用いて、相互認証部408が実行する相互認証処理の一例について説明する。ここでは、一例として、鍵配信装置400及び記録媒体装置600間で実行される相互認証処理について説明する。
図15は、鍵配信装置400による鍵配信処理の動作を示すフローチャートである。
端末装置500は、プロセッサ、ROM、RAM、ハードディスク、入力デバイスであるキーボード及びマウス、表示デバイスであるモニタ、記録媒体装置600を挿入するためのカードスロット、ネットワーク接続ユニット等を備えるPCである。ROM、RAM又はハードディスクにはコンピュータプログラムが記録されており、端末装置500の一部の機能は、プロセッサがコンピュータプログラムを実行することで実現することができる。
図18は、端末装置500によるコンテンツ記録処理の動作を示すフローチャートである。
図19は、端末装置500によるコンテンツ再生処理の動作を示すフローチャートである。なお、記録媒体装置600は、上述したコンテンツ記録処理を経て、コンテンツ、演算タイトル鍵、MAC、UR等を既に格納していることとする。
記録媒体装置600は、端末装置500に装着して用いるSDメモリカードである。
図21は、記録媒体装置600によるタイトル鍵取得処理の動作を示すフローチャートである。
ここでは、本発明の別の態様であるコンテンツ配信システム2について説明する。
図22は、コンテンツ配信システム2の全体構成を示す図である。
鍵配信装置1400は、プロセッサ、ROM、RAM、ハードディスクなどを備えるコンピュータシステムである。鍵配信装置1400は、コンテンツの復号に用いるタイトル鍵を記録媒体装置600aから記録媒体装置600bへ転送するタイトル鍵転送処理を行う。
図24及び図25は、鍵配信装置1400によるタイトル鍵転送処理の動作を示すフローチャートである。
端末装置1500は、端末装置500と同様に、プロセッサ、ROM、RAM、ハードディスク、入力デバイスであるキーボード及びマウス、表示デバイスであるモニタ、記録媒体装置600aおよび600bを挿入するためのカードスロット、ネットワーク接続ユニット等を備えるパーソナルコンピュータである。ROM、RAM又はハードディスクにはコンピュータプログラムが記録されており、端末装置1500の一部の機能は、プロセッサがコンピュータプログラムを実行することで実現することができる。
図29及び図30は、端末装置1500によるコンテンツ移動処理の動作を示すフローチャートである。
<4.変形例>
以上、本発明の実施の形態を説明したが、例示したコンテンツ配信システムを以下のように変形することも可能であり、本発明が上記の実施の形態で示した通りのコンテンツ配信システムに限られないことは勿論である。
<5.まとめ>
以下、更に本発明の一実施形態としての端末装置の構成及びその変形例と効果について説明する。
100 鍵発行装置
200 コンテンツ制作装置
300 コンテンツ配信装置
400,1400 鍵配信装置
500、1500 端末装置
600、600a、600b 記録媒体装置
Claims (14)
- コンテンツの利用に必要なタイトル鍵を配信する鍵配信装置とネットワークを介して接続されており、前記コンテンツと前記タイトル鍵とを格納するための記録媒体装置が装着される端末装置であって、
前記記録媒体装置と前記鍵配信装置とは、相互認証を行い、共通鍵を共有し、
前記端末装置は、
前記タイトル鍵が前記共通鍵で暗号化された暗号化タイトル鍵を前記鍵配信装置から受信する受信部と、
受信した前記暗号化タイトル鍵を前記記録媒体装置へ送信する転送部とを備え、
前記受信部及び前記転送部は、前記記録媒体装置と前記鍵配信装置とが相互認証を行った後は、前記記録媒体装置及び前記鍵配信装置間で前記共通鍵を用いて通信されるデータに関与しない
ことを特徴とする端末装置。 - 前記端末装置は、
前記記録媒体装置と前記鍵配信装置とが前記相互認証をすることを検知する検知部と、
前記相互認証が開始されると、前記記録媒体装置及び前記鍵配信装置間で前記共通鍵を用いて通信されるデータに関与することを禁止する禁止部と
を備えることを特徴とする請求項1に記載の端末装置。 - 前記記録媒体装置には、前記コンテンツが前記タイトル鍵を用いて暗号化された暗号化コンテンツと前記コンテンツを識別するためのコンテンツ識別情報とが記録されており、
前記端末装置は、さらに、
前記記録媒体装置から前記コンテンツ識別情報を取得し、取得した前記コンテンツ識別情報を前記鍵配信装置へ送信する送信部を備え、
前記受信部は、前記鍵配信装置から前記コンテンツ識別情報に対応する前記暗号化タイトル鍵を受信する
ことを特徴とする請求項2に記載の端末装置。 - 前記送信部は、さらに、前記記録媒体装置から当該記録媒体装置を識別するための媒体識別情報を取得し、取得した前記媒体識別情報を前記鍵配信装置へ送信し、
前記受信部は、さらに、前記鍵配信装置から前記コンテンツを前記記録媒体装置に関連付けるために生成された認証情報を受信し、
前記端末装置は、
受信した前記認証情報を前記記録媒体装置に書き込む書込部を備える
ことを特徴とする請求項3に記載の端末装置。 - 前記認証情報は、前記タイトル鍵と前記媒体識別情報とから演算されたメッセージ認証コード(MAC)である
ことを特徴とする請求項4に記載の端末装置。 - 前記端末装置は、前記鍵配信装置との間でセキュアな通信路を確立し、
前記受信部は、前記セキュアな通信路を介して前記認証情報を受信し、
前記送信部は、前記セキュアな通信路を介して前記コンテンツ識別情報および前記媒体識別情報を送信する
ことを特徴とする請求項5に記載の端末装置。 - 前記端末装置は、
前記鍵配信装置との間で相互認証を行い、共通鍵を共有する相互認証部を備え、
前記受信部は、前記相互認証部が前記鍵配信装置との間で共有した共通鍵で暗号化された前記認証情報を受信し、
前記送信部は、前記コンテンツ識別情報および前記媒体識別情報を、前記相互認証部が前記鍵配信装置との間で共有した共通鍵で暗号化して送信する
ことを特徴とする請求項6に記載の端末装置。 - 前記受信部は、さらに、前記コンテンツの利用条件を前記鍵配信装置から受信し、
前記書込部は、さらに、受信した前記利用条件を前記記録媒体装置に書き込む
ことを特徴とする請求項4に記載の端末装置。 - 前記記録媒体装置から他の記録媒体装置へ前記タイトル鍵を転送する前記端末装置であって、
前記記録媒体装置と前記鍵配信装置とは、相互認証を行い、第1の共通鍵を共有し、前記他の記録媒体装置と前記鍵配信装置とは、相互認証を行い、第2の共通鍵を共有し、
前記端末装置は、さらに、
前記タイトル鍵が前記第1の共通鍵で暗号化された第1暗号化タイトル鍵を前記記録媒体装置から受信する第1の受信部と、
受信した前記第1暗号化タイトル鍵を、前記鍵配信装置へ送信する第1の転送部と、
前記タイトル鍵が前記第2の共通鍵で暗号化された第2暗号化タイトル鍵を前記鍵配信装置から受信する第2の受信部と、
受信した前記第2暗号化タイトル鍵を、前記他の記録媒体装置へ送信する第2の転送部とを備え、
前記第1の受信部及び前記第1の転送部は、前記記録媒体装置と前記鍵配信装置とが相互認証を行った後は、前記記録媒体装置及び前記鍵配信装置間で前記第1の共通鍵を用いて通信されるデータに関与せず、
前記第2の受信部及び前記第2の転送部は、前記他の記録媒体装置と前記鍵配信装置とが相互認証を行った後は、前記他の記録媒体装置及び前記鍵配信装置間で前記第2の共通鍵を用いて通信されるデータに関与しない
ことを特徴とする請求項4に記載の端末装置。 - 前記送信部は、さらに、前記他の記録媒体装置から当該他の記録媒体装置を識別する媒体識別情報を取得し、前記媒体識別情報を前記鍵配信装置へ送信し、
前記受信部は、さらに、前記鍵配信装置から、前記コンテンツを前記他の記録媒体装置に関連付けるために生成された認証情報を受信し、
前記書込部は、さらに、受信した前記認証情報を前記他の記録媒体装置に書き込む
ことを特徴とする請求項9に記載の端末装置。 - 前記認証情報は、前記タイトル鍵と前記他の記録媒体装置の媒体識別情報とから演算されたメッセージ認証コード(MAC)である
ことを特徴とする請求項10に記載の端末装置。 - コンテンツの利用に必要なタイトル鍵を配信する鍵配信装置とネットワークを介して接続されており、前記コンテンツと前記タイトル鍵とを格納するための記録媒体装置が装着される端末装置と、前記記録媒体装置とから構成されるコンテンツ記録システムであって、
前記記録媒体装置と前記鍵配信装置とは、相互認証を行い、共通鍵を共有し、
前記端末装置は、
前記タイトル鍵が前記共通鍵で暗号化された暗号化タイトル鍵を前記鍵配信装置から受信する第1の受信部と、
受信した前記暗号化タイトル鍵を前記記録媒体装置へ送信する転送部とを備え、
前記記録媒体装置は、
書き込み及び読み出し時に認証処理が必要な記憶領域である認証領域と、
前記転送部から送信された前記暗号化タイトル鍵を受信する第2の受信部と、
受信した前記暗号化タイトル鍵を前記共通鍵で復号し、復号した前記タイトル鍵を、前記認証領域に書き込む復号部とを備え、
前記第1の受信部及び前記転送部は、前記記録媒体装置と前記鍵配信装置とが相互認証を行った後は、前記記録媒体装置及び前記鍵配信装置間で前記共通鍵を用いて通信されるデータに関与しない
ことを特徴とするコンテンツ記録システム。 - コンテンツの利用に必要なタイトル鍵を配信する鍵配信装置とネットワークを介して接続されており、前記コンテンツと前記タイトル鍵とを格納するための記録媒体装置が装着される端末装置で用いられるタイトル鍵記録方法であって、
前記記録媒体装置と前記鍵配信装置とは、相互認証を行い、共通鍵を共有し、
前記タイトル鍵記録方法は、
前記タイトル鍵が前記共通鍵で暗号化された暗号化タイトル鍵を前記鍵配信装置から受信する受信ステップと、
受信した前記暗号化タイトル鍵を前記記録媒体装置へ送信する転送ステップとを含み、
前記受信ステップ及び前記転送ステップは、前記記録媒体装置と前記鍵配信装置とが相互認証を行った後は、前記記録媒体装置及び前記鍵配信装置間で前記共通鍵を用いて通信されるデータに関与しない
ことを特徴とするタイトル鍵記録方法。 - コンテンツの利用に必要なタイトル鍵を配信する鍵配信装置とネットワークを介して接続されており、前記コンテンツと前記タイトル鍵とを格納するための記録媒体装置が装着される端末装置で用いられるコンピュータプログラムであって、
前記記録媒体装置と前記鍵配信装置とは、相互認証を行い、共通鍵を共有し、
前記コンピュータプログラムは、前記端末装置に、
前記タイトル鍵が前記共通鍵で暗号化された暗号化タイトル鍵を前記鍵配信装置から受信する受信ステップと、
受信した前記暗号化タイトル鍵を前記記録媒体装置へ送信する転送ステップとを実行させ、
前記受信ステップ及び前記転送ステップは、前記記録媒体装置と前記鍵配信装置とが相互認証を行った後は、前記記録媒体装置及び前記鍵配信装置間で前記共通鍵を用いて通信されるデータに関与しない
ことを特徴とするコンピュータプログラム。
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2013513914A JPWO2012153485A1 (ja) | 2011-05-09 | 2012-04-26 | 端末装置、コンテンツ記録システム、タイトル鍵記録方法及びコンピュータプログラム |
| CN201280003947.7A CN103583014A (zh) | 2011-05-09 | 2012-04-26 | 终端装置、内容记录系统、标题密钥记录方法及计算机程序 |
| US13/879,909 US9106882B2 (en) | 2011-05-09 | 2012-04-26 | Terminal device, content recording system, title key recording method, and computer program |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161483874P | 2011-05-09 | 2011-05-09 | |
| US61/483,874 | 2011-05-09 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2012153485A1 true WO2012153485A1 (ja) | 2012-11-15 |
Family
ID=47138974
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2012/002891 Ceased WO2012153485A1 (ja) | 2011-05-09 | 2012-04-26 | 端末装置、コンテンツ記録システム、タイトル鍵記録方法及びコンピュータプログラム |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US9106882B2 (ja) |
| JP (1) | JPWO2012153485A1 (ja) |
| CN (1) | CN103583014A (ja) |
| WO (1) | WO2012153485A1 (ja) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP6331031B2 (ja) * | 2015-03-26 | 2018-05-30 | パナソニックIpマネジメント株式会社 | 認証方法、認証システム及び通信機器 |
| CN106470104B (zh) | 2015-08-20 | 2020-02-07 | 阿里巴巴集团控股有限公司 | 用于生成共享密钥的方法、装置、终端设备及系统 |
| JP7024559B2 (ja) * | 2018-03-30 | 2022-02-24 | ブラザー工業株式会社 | 端末装置のためのコンピュータプログラム、端末装置、通信装置、及び、通信装置のためのコンピュータプログラム |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH07123086A (ja) * | 1993-10-27 | 1995-05-12 | Nippon Telegr & Teleph Corp <Ntt> | Icカードを利用した著作物通信管理システム |
| JP2010140298A (ja) * | 2008-12-12 | 2010-06-24 | Panasonic Corp | 記録媒体装置、および、記録媒体装置の認証方法 |
| JP2010251974A (ja) * | 2009-04-14 | 2010-11-04 | Nec System Technologies Ltd | データ転送方法、データ転送システム及びデータ中継プログラム |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2000341263A (ja) * | 1999-05-27 | 2000-12-08 | Sony Corp | 情報処理装置及び方法 |
| US7219227B2 (en) * | 1999-12-03 | 2007-05-15 | Sanyo Electric Co., Ltd. | Data distribution system and recording device and data provision device used therefor |
| JP4352600B2 (ja) * | 2000-09-01 | 2009-10-28 | ソニー株式会社 | データ改竄チェック装置および方法、ならびに、記録媒体 |
| JP4174237B2 (ja) * | 2001-05-22 | 2008-10-29 | 松下電器産業株式会社 | コンテンツ管理システム、コンテンツ管理端末、利用条件管理サーバ、コンテンツ管理方法およびコンテンツ管理プログラム |
| JP4602606B2 (ja) * | 2001-08-15 | 2010-12-22 | ソニー株式会社 | 認証処理システム、認証処理方法、および認証デバイス、並びにコンピュータ・プログラム |
| US7073066B1 (en) * | 2001-08-28 | 2006-07-04 | 3Com Corporation | Offloading cryptographic processing from an access point to an access point server using Otway-Rees key distribution |
| JP4434573B2 (ja) * | 2002-11-29 | 2010-03-17 | 株式会社東芝 | ライセンス移動装置及びプログラム |
| JP4802539B2 (ja) * | 2005-04-11 | 2011-10-26 | ソニー株式会社 | 通信システム、通信装置、および通信方法 |
-
2012
- 2012-04-26 WO PCT/JP2012/002891 patent/WO2012153485A1/ja not_active Ceased
- 2012-04-26 US US13/879,909 patent/US9106882B2/en active Active
- 2012-04-26 JP JP2013513914A patent/JPWO2012153485A1/ja active Pending
- 2012-04-26 CN CN201280003947.7A patent/CN103583014A/zh active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH07123086A (ja) * | 1993-10-27 | 1995-05-12 | Nippon Telegr & Teleph Corp <Ntt> | Icカードを利用した著作物通信管理システム |
| JP2010140298A (ja) * | 2008-12-12 | 2010-06-24 | Panasonic Corp | 記録媒体装置、および、記録媒体装置の認証方法 |
| JP2010251974A (ja) * | 2009-04-14 | 2010-11-04 | Nec System Technologies Ltd | データ転送方法、データ転送システム及びデータ中継プログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| US20130315565A1 (en) | 2013-11-28 |
| CN103583014A (zh) | 2014-02-12 |
| US9106882B2 (en) | 2015-08-11 |
| JPWO2012153485A1 (ja) | 2014-07-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5869580B2 (ja) | 端末装置、検証装置、鍵配信装置、コンテンツ再生方法、鍵配信方法及びコンピュータプログラム | |
| JP6119741B2 (ja) | 情報処理装置、情報記憶装置、サーバ、情報処理システム、および情報処理方法、並びにプログラム | |
| US9037863B2 (en) | Terminal device, server device, content recording control system, recording method, and recording permission control method | |
| JP6026630B2 (ja) | メモリシステム | |
| JP5848685B2 (ja) | ストレージシステム | |
| KR20090002660A (ko) | 암호화된 컨텐츠를 재생하는 방법 및 재생을 인가하는방법과 그 장치 | |
| JP5981923B2 (ja) | 記録媒体装置、端末装置、配信装置、制御方法、プログラム、及びプログラムの記録媒体 | |
| JP5983727B2 (ja) | 情報処理装置、情報記憶装置、情報処理システム、および情報処理方法、並びにプログラム | |
| WO2012153485A1 (ja) | 端末装置、コンテンツ記録システム、タイトル鍵記録方法及びコンピュータプログラム | |
| JP5644467B2 (ja) | 情報処理装置、および情報処理方法、並びにプログラム | |
| JP2014041582A (ja) | ストレージシステム | |
| JP2014041583A (ja) | ストレージシステム | |
| JP2010258795A (ja) | 送信装置、受信装置及びコンテンツ送受信方法 | |
| JP2014041581A (ja) | ストレージシステム | |
| JP5899751B2 (ja) | 情報処理装置、および情報処理方法、並びにプログラム | |
| JP4564572B1 (ja) | 送信装置、受信装置及びコンテンツ送受信方法 | |
| JP2009093731A (ja) | 情報処理装置、ディスク、および情報処理方法、並びにコンピュータ・プログラム | |
| JP2013150179A (ja) | 情報処理装置、情報記憶装置、情報処理システム、および情報処理方法、並びにプログラム | |
| JP2013141171A (ja) | 情報処理装置、および情報処理方法、並びにプログラム | |
| JP2008301119A (ja) | 端末間ライセンス伝送装置、端末間ライセンス伝送方法、および端末間ライセンス伝送プログラムを記録した記録媒体 | |
| JP2013146013A (ja) | 情報処理装置、情報記憶装置、情報処理システム、および情報処理方法、並びにプログラム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12782765 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 13879909 Country of ref document: US |
|
| ENP | Entry into the national phase |
Ref document number: 2013513914 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12782765 Country of ref document: EP Kind code of ref document: A1 |