WO2013038592A1 - コンテンツ再生システム、情報処理端末、メディアサーバ、セキュアデバイスおよびサーバ・セキュアデバイス - Google Patents
コンテンツ再生システム、情報処理端末、メディアサーバ、セキュアデバイスおよびサーバ・セキュアデバイス Download PDFInfo
- Publication number
- WO2013038592A1 WO2013038592A1 PCT/JP2012/004981 JP2012004981W WO2013038592A1 WO 2013038592 A1 WO2013038592 A1 WO 2013038592A1 JP 2012004981 W JP2012004981 W JP 2012004981W WO 2013038592 A1 WO2013038592 A1 WO 2013038592A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- program
- information processing
- secure device
- content
- processing terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present invention relates to a technique for preventing an analysis act on digital content.
- Copyright protection standards have been proposed by various organizations in order to protect digital content such as video and music (hereinafter referred to as “content” when referring to digital content) from unauthorized copying.
- Such a standard generally includes a specification indicating a mounting standard called a robustness rule.
- the robustness rule it is required to implement a copyright protection technology that can prevent unauthorized tampering and analysis by a malicious user.
- the copyright protection technology that complies with the robustness rule is generally implemented by hardware or by using a tamper-resistant technology constructed by software described in Non-Patent Document 1 and Non-Patent Document 2. It is. In the tamper resistant technique, for example, obfuscation is performed such as compiling with a useless program code inserted. In recent years, as another copyright protection technique, a technique for switching an execution mode of a CPU (Central Processing Unit) as shown in Non-Patent Document 3 is also used. Implementation of such copyright protection standards is common in the field of PC (Personal Computer).
- PC Personal Computer
- an object of the present invention has been made in view of such a problem, and provides a content reproduction system and the like that can improve safety against unauthorized tampering and analysis.
- one aspect of a secure device is a secure device that operates in cooperation with an information processing terminal that reproduces predetermined content, and is a first device that can be executed by the information processing terminal.
- a first program in an execution format, a second execution format different from the first execution format that can be executed by a secure device, and a second program encrypted by a program key held by the secure device A second receiving unit that receives the second program from the information processing terminal, a key storage unit that stores the program key, and the program key using the first key.
- a second application executing unit that decrypts the second program and executes the decrypted second program includes: By executing the second program, using the authentication information of the information processing terminal to execute an authentication process for the media server for distributing the contents.
- the content reproduction system of the present invention can improve the safety against unauthorized tampering and analysis.
- FIG. 1 is an overall configuration diagram of the content distribution system according to the first embodiment.
- FIG. 2 is a configuration diagram of the media server in the first embodiment.
- FIG. 3 is a configuration diagram of the information processing apparatus according to the first embodiment.
- FIG. 4 is a configuration diagram of the DL copyright protection application in the first embodiment.
- FIG. 5 is a configuration diagram of the secure device according to the first embodiment.
- FIG. 6 is a flowchart (1) showing a content reproduction processing procedure in the first embodiment.
- FIG. 7 is a flowchart (2) showing the processing procedure of content reproduction in the first embodiment.
- FIG. 8 is a flowchart (3) showing a processing procedure of content reproduction in the first embodiment.
- FIG. 9 is a flowchart (4) showing the content reproduction processing procedure in the first embodiment.
- FIG. 10 is an overall configuration diagram of the content distribution system according to the second embodiment.
- FIG. 11 is an overall configuration diagram of the server / secure device according to the second embodiment.
- FIG. 12 is an overall configuration diagram of the server / secure device according to the first modification of the second embodiment.
- FIG. 13 is an overall configuration diagram of a server / secure device according to the second modification of the second embodiment.
- FIG. 14 is an overall configuration diagram of a server / secure device according to the third modification of the second embodiment.
- FIG. 15 is a configuration diagram of the media server according to the third embodiment.
- a content reproduction system includes an application distribution server that distributes a copyright protection application program for reproducing predetermined content, and the copyright protection application program.
- a content reproduction system comprising: an information processing terminal that reproduces the content by executing; and a secure device that operates in cooperation with the information processing terminal, wherein the application distribution server is executable by the information processing terminal.
- Said copyright protection application program including
- the information processing terminal extracts a first receiving unit that receives the copyright protection application program from the application distribution server, and extracts the first program from the copyright protection application program A first application execution unit that extracts the second program from the copyright protection application program and transmits the extracted program to the secure device, and the secure device stores the program key A key storage unit, a second receiving unit that receives the second program from the information processing terminal, and decrypts the second program using the program key, and executes the decrypted second program A second application execution unit, wherein the second application execution unit executes the second program
- the authentication information of the information processing terminal is used to execute an authentication process for the media server that distributes the content, and the first application execution unit is authenticated by the authentication process in the second application execution unit In this case, the content is reproduced by executing the first program.
- the second program related to copyright protection is the second execution format that can be executed by the secure device and does not operate on the information processing terminal. . Therefore, the content reproduction system of this configuration can prevent the second program from being analyzed even if an analysis tool such as a debugger is connected to the information processing terminal and the operation of the information processing terminal is analyzed. Even if a person who performs unauthorized tampering or the like can extract the second program, the second program has an execution format different from that of the information processing terminal, so that the analysis is difficult.
- the content reproduction system of this configuration it is not necessary to change the device configuration of the information processing terminal by including the extraction and transmission processing of the second program in the first program.
- the content playback system of this configuration even in an information processing terminal that does not have sufficient security functions for executing the copyright protection application program, it is possible to protect the copyright by linking with the server and the secure device. It is possible to more effectively prevent unauthorized copying of application programs.
- the content reproduction system further includes the media server, and the media server has a communication path capable of securely exchanging the content with the first program executed on the information processing terminal.
- the copyright protection processing unit of the media server may be tamper resistant.
- the media server may further include a unique information content adding unit that adds information specific to the media server to the content.
- the secure device may be configured not to include a connection unit that physically connects to an analysis tool that analyzes operations of the key storage unit and the second application execution unit.
- the second program may be tamper resistant.
- a secure device is a secure device that operates in cooperation with an information processing terminal that reproduces predetermined content, and a first program in a first execution format that can be executed by the information processing terminal;
- a copyright protection application program that includes a second execution format that is executable by the secure device and that is different from the first execution format and that is encrypted with a program key held by the secure device.
- a second receiving unit for receiving the second program from the information processing terminal, a key storage unit for storing the program key, and decrypting the second program using the program key.
- a second application execution unit that executes the second program, and the second application execution unit executes the second program And, by using the authentication information of the information processing terminal to execute an authentication process for the media server for distributing the contents.
- a server / secure device is a server / secure device that communicates with an information processing terminal that reproduces predetermined content, a media server that distributes the content to the information processing terminal, and the information
- a secure device that operates in cooperation with a processing terminal, and the secure device includes a first program in a first execution format that can be executed by the information processing terminal, and the first execution that can be executed by the secure device.
- the second program is the information processing terminal.
- a copyright protection processing unit that establishes a communication channel that can be used; a storage area that stores the content; and a data transmission / reception unit that transmits the content to the information processing terminal.
- An information processing terminal is an information processing terminal that operates in cooperation with a secure device and reproduces predetermined content, and is a first execution format that can be executed by the information processing terminal.
- Copyright including a program and a second execution format that can be executed by the secure device and is a second execution format different from the first execution format and encrypted with a program key held by the secure device Extracting and executing the first program from the application storage unit for storing the protection application program and the copyright protection application program, and extracting the second program from the copyright protection application program
- a first application execution unit that transmits to a secure device, the first application execution unit, If the serial media server in secure device for distributing the contents is authenticated, by executing the first program, which executes a reproduction process for reproducing the content.
- a media server is a media server that distributes content to an information processing terminal that reproduces predetermined content, and is a first execution format that can be executed by the information processing terminal. And a second execution format different from the first execution format that can be executed by a secure device that operates in cooperation with the information processing terminal, and is encrypted with a program key held by the secure device
- the first program executed by the information processing terminal by performing an authentication process with the second program executed by the secure device among the copyright protection application programs including the second program executed.
- a copyright protection processing unit that establishes a communication path capable of securely exchanging content with other programs, and storing the content
- a unique information content granting unit for granting information unique to the media server to the content, a data transmitting / receiving unit for encrypting the content to which the unique information is given, and transmitting the encrypted content to the information processing terminal Is provided.
- An integrated circuit of a secure device is an integrated circuit of a secure device that operates in cooperation with an information processing terminal that reproduces predetermined content, and is a first execution format that can be executed by the information processing terminal And a second execution format that is executable by the secure device and that is different from the first execution format, and that is encrypted with a program key held by the secure device;
- a second receiving unit that receives the second program from the information processing terminal, and decrypts the second program using the program key stored in the key storage unit
- a second application execution unit that executes the decrypted second program, and the second application execution unit executes the second program.
- a secure device control program is a secure device control program that operates in cooperation with an information processing terminal, and a first program in a first execution format that can be executed by the information processing terminal;
- a copyright that includes a second program that can be executed by the secure device and that is a second program that is different from the first program and that is encrypted with a program key held by the secure device.
- receiving the second program from the information processing terminal decrypting the second program using the program key stored in the key storage unit of the secure device; Execute the second program in cooperation with the first program executed on the information processing terminal
- an authentication process for a media server that distributes the content using the authentication information of the information processing terminal by executing the second program Execute.
- the recording program on which the secure device control program according to one aspect of the present invention is recorded has the secure device control program recorded thereon.
- An integrated circuit of a server and a secure device is an integrated circuit of a server and a secure device that communicates with an information processing terminal that reproduces predetermined content, and provides the content to the information processing terminal
- a secure device that operates in cooperation with the information processing terminal, and the secure device is executable by the first program in a first execution format that can be executed by the information processing terminal;
- the copyright protection application program which is a second execution format different from the first execution format and includes a second program encrypted with a program key held by the secure device,
- a second receiving unit for receiving a second program from the information processing terminal; and the program stored in the key storage unit.
- a second application executing unit that decrypts the second program using a gram key and executes the decrypted second program, and the second application executing unit executes the second program
- the media server communicates the content with the first program executed on the information processing terminal.
- a copyright protection processing unit that establishes a communication path that can be securely exchanged, and a data transmission / reception unit that transmits the content stored in the storage area to the information processing terminal.
- a server / secure device control program includes a media server that provides the content to an information processing terminal that reproduces predetermined content, and a secure device that operates in cooperation with the information processing terminal.
- a control program for a secure device the first program having a first execution format executable by the information processing terminal in the media server, and the first execution format executable by the secure device; Are different second execution formats, and among the copyright protection application programs including the second program encrypted with the program key held by the secure device, the information executed by the information processing terminal Establishing a communication path to securely exchange content with the first program Receiving the second program from the information processing terminal at the secure device, and decrypting the second program using the program key stored in the key storage unit at the secure device And executing the decrypted second program, and executing the second program executes authentication processing for the media server using authentication information of the information processing terminal.
- the server / secure device control program according to an aspect of the present invention is recorded on the recording medium.
- a recording medium on which a copyright protection application program according to an aspect of the present invention is recorded includes an information processing terminal that reproduces predetermined content and a copyright protection that is executed by a secure device that operates in cooperation with the information processing terminal.
- An application program is recorded on the recording medium, wherein the copyright protection application program is a first program in a first execution format that can be executed by the information processing terminal, and the first program that can be executed by the secure device.
- Using the authentication information of the information processing terminal to a media server that distributes the content A step of executing an authentication process, wherein the first program causes the information processing terminal to extract the second program from the copyright protection application program and transmit it to the secure device; and A step of causing the information processing terminal to reproduce the content when authenticated by the process.
- FIG. 1 is a configuration diagram of a content distribution system 100 according to the present embodiment.
- the content distribution system 100 is a system provided with an application distribution mechanism for devices (equivalent to the information processing apparatus 102 and the information processing terminal) in the field of Non-PC.
- the content distribution system 100 includes media servers 101a and 101b, an information processing apparatus 102, a secure device 103, and an application distribution server 113 (application distribution server 113).
- the information processing apparatus 102 and the secure device 103 correspond to a content reproduction system).
- the content distribution system 100 according to the present embodiment is connected to the broadcast station server 111 and the Web server 112.
- the content distribution system 100 may be configured not to be connected to the broadcast station server 111 or the Web server 112, or may be configured to be connected to any other server.
- the information processing apparatus 102 operates in cooperation with the secure device 103 and reproduces content stored in the media server 101a using an application distributed from the application distribution server 113. It is configured as follows.
- the content includes music content, video content, still image content, book content, map content, and the like.
- the broadcast station server 111 is a server installed in a broadcast station that performs terrestrial digital broadcasting (wireless broadcasting).
- the broadcast station server 111 transmits content to the media server 101a via the broadcast wave 114a.
- the broadcast station server 111 may be a server installed at a broadcast station that performs wired broadcasting, or may be a server installed at a place other than the broadcast station.
- the Web server 112 is a server that transmits content via a network such as the Internet.
- the Web server 112 transmits content to the media server 101a via the Internet 114b.
- the media server 101a is, for example, a pocket server or the like. As will be described in detail later, the media server 101a receives and records content from the broadcast station server 111, the Web server 112, or another media server 101b having the same type of function. . Note that the configuration of the media server 101b is the same as that of the media server 101a in the present embodiment. In the present embodiment, content can be exchanged between the media server 101a and the media server 101b via the Internet 114b.
- the application distribution server 113 is a server installed in an application distribution site that distributes applications, such as iPhone and Android, for example, and an application executable on the information processing apparatus 102 is transmitted to the information processing apparatus 102 via the Internet. Send.
- This application includes a DL copyright protection application (equivalent to a copyright protection application program).
- the DL copyright protection application is an application for reproducing content distributed from the broadcasting station server 111 or content distributed from the Web server 112.
- the information processing apparatus 102 receives content from the media server 101a, and reproduces the content by executing a DL copyright protection application. At this time, the information processing apparatus 102 performs processing in cooperation with the secure device 103 while exchanging messages such as data and commands.
- the secure device 103 cooperates with the information processing apparatus 102 when the information processing apparatus 102 performs processing related to a secret data algorithm related to copyright protection in the execution of the application. Operate.
- FIG. 2 is a diagram showing an overall configuration of the media server 101a in the present embodiment.
- the media server 101a is an electronic device that acquires content via the Internet 114b, a broadcast wave 114a, a local network (not shown), etc., and performs content right management.
- the media server 101a is, for example, a device such as an HDD recorder, a DVD / BD recorder, a set top box, a portable terminal, a tablet terminal, a mobile phone, a TV, or a game device having a communication unit and a storage unit.
- the media server 101a includes a network access unit 201, a broadcast wave reception unit 202, a data transmission / reception unit 204, a storage area access unit 206, a copyright protection processing unit 207, and an encryption / decryption unit 208. And a content reproduction unit 209 and a storage area 220.
- the net access unit 201, the broadcast wave reception unit 202, the data transmission / reception unit 204, the storage area access unit 206, the copyright protection processing unit 207, the encryption / decryption unit 208, and the content reproduction unit 209 are as follows. Individually, or a part or all of these may be configured by a dedicated LSI or the like, or may be configured by software.
- the net access unit 201 performs a connection process with a server on the Internet 114b and a device on another LAN (not shown).
- connection processing it is generally assumed that the IP protocol is used, but the method is not limited to this as long as it is a method for communicating with other devices.
- the broadcast wave receiving unit 202 receives broadcast waves via the antenna 115 shown in FIG.
- the data transmission / reception unit 204 transmits / receives data via the network access unit 201 and the broadcast wave reception unit 202.
- the data includes information stipulated to be exchanged between terminals according to copyright protection standards, data received from the broadcast station server 111 and the Web server 112, contents, contents transmitted / received between terminals, and the like.
- the content includes music content, moving image content, still image content, book content, map content, and the like.
- the content is encoded by a generally defined encoding method.
- MPEG2 Motion Picture Expert Group 2
- JPEG Joint Photographic Expert Group
- AAC Advanced Audio Codec
- the content encoding method is not limited to these. Note that when the content is reproduced, the encoded content is decoded.
- the storage area access unit 206 controls processing for reading data from the storage area 220 and processing for writing data to the storage area 220.
- the copyright protection processing unit 207 is responsible for the copyright processing, such as authentication processing using a terminal key between terminals specified by DTCP (Digital Transmission Content Protection), control of content encryption / decryption processing, content transmission / reception processing, etc. Execute the algorithm specified in the protection standard. Part of the processing using encryption and hash functions is performed by the encryption / decryption unit 208, not the copyright protection processing unit 207.
- DTCP Digital Transmission Content Protection
- the copyright protection processing unit 207 holds a series of data necessary for processing specified by the copyright protection standard.
- the series of data includes a terminal key A1, a certificate Acert, a terminal ID, a Root public key, and the like.
- the public key A1 included in the certificate Acert corresponds to the terminal key A1 that is a secret key.
- the copyright protection processing unit 207 holds a series of data necessary for processing defined by the copyright protection standard such as the terminal key A1, so that a malicious user receives the data.
- a copyright protection technology based on robustness rules is implemented so as to be resistant to analysis.
- the copyright protection technology may be implemented by hardware, for example, may be implemented by a tamper-resistant technology such as International Publication WO2004014744A2 (Patent Document), the terminal itself is not connected to a debugger, etc. It may be implemented with tolerance.
- the encryption / decryption unit 208 includes encryption / decryption processing such as AES (Advanced Encryption Standard), ECC (Elliptic Curve Cryptography), RSA (Rivest Shamir Adleman), and the like, and SHA1Hash (Sher1Hash).
- AES Advanced Encryption Standard
- ECC Elliptic Curve Cryptography
- RSA Raster Shamir Adleman
- SHA1Hash Sher1Hash
- the copyright protection processing part 207 which holds terminal key A1
- the encryption / decryption part 208 from a malicious user.
- a copyright protection technology based on robustness rules is implemented so as to be resistant to analysis.
- the copyright protection technology may be implemented by hardware similarly to the copyright protection processing unit 207, for example, may be implemented by a tamper-resistant technology such as International Publication WO2004014374A2 (Patent Document).
- the terminal itself may not be connected to the debugger and may be mounted with resistance.
- the content playback unit 209 performs playback processing of the encrypted content 216 stored in the storage area 220. Specifically, the content playback unit 209 acquires the encrypted content 216 and the local content key 215 stored in the storage area 220 via the storage area access unit 206. Further, the acquired encrypted content 216 and local content key 215 are sent to the encryption / decryption unit 208, and the encrypted content 216 decrypted from the encryption / decryption unit 208 is acquired and reproduced.
- the storage area 220 is a storage area for storing data used in the processing of various functional units of the media server 101a, such as an HDD (Hard disk drive), FlashROM (Flash Read Only Memory), SSD (Solid State Drive), and other power sources. This is realized by a non-volatile memory that can retain the stored contents even if the power is turned off.
- the storage area 220 may be realized by a volatile memory such as SRAM (Static Random Access Memory), and data may be maintained by battery backup using a battery as a power source.
- the storage area 220 is a terminal Ver. That indicates the version number of the media server 101a. 214, the encrypted content 216, and the local content key 215 for decrypting the encrypted content 216 are held.
- the local content key 215 is a key used locally only for the internal processing of the media server 101a.
- the encrypted content 216 encrypted with the local content key cannot be reproduced on other terminals.
- the media server 101a further includes an input / output unit and the like not shown in FIG. 2, but these are not the essence of the present invention and will not be described.
- the media server 101a includes general components necessary for a computer, such as a CPU, a RAM (Random Access Memory), and an OS (Operating System), but these are not the essence of the present invention. Omitted.
- FIG. 3 is a diagram illustrating an overall configuration of the information processing apparatus 102 according to the present embodiment.
- the information processing apparatus 102 is a mobile phone that supports application distribution, and operates in cooperation with the secure device 103 by executing an application downloaded from the application distribution server 113, so that the media server 101 a Play saved content.
- the information processing apparatus 102 is not limited to a mobile phone, and is a device having a communication unit and a storage area, such as a portable terminal, a tablet terminal, an HDD recorder, a DVD / BD recorder, a set-top box, a TV, and a game machine. I just need it.
- the information processing apparatus 102 includes a net access unit 301, an application DL unit 302, a data transmission / reception unit 304, a storage area access unit 306, a first application execution unit 307, and an encryption / decryption unit 308. And a storage area 320.
- the net access unit 301 performs a connection process with a server on the Internet 114b and a device on another LAN (not shown).
- a server on the Internet 114b and a device on another LAN (not shown).
- IP protocol In general, it is assumed that the IP protocol is used, but the present invention is not limited to this as long as it is a method for communicating with other devices.
- the application DL unit 302 (corresponding to the first receiving unit together with the data transmission / reception unit 304) receives the DL copyright protection application 315 from the application distribution server 113 via the network access unit 301 prior to content reproduction. to download.
- a part of the DL copyright protection application 315 is encrypted with the DL application key 515 held by the secure device 103, and details will be described later.
- the data transmission / reception unit 304 transmits / receives data via the network access unit 301.
- Data transmitted / received by the data transmitting / receiving unit 304 includes data such as random numbers and certificates that are specified to be exchanged between terminals according to copyright protection standards, data transmitted / received to / from the media server 101a, and the secure device 103. Data, contents, etc. transmitted to and received from are included.
- the storage area access unit 306 controls data reading processing from the storage area 320 and data writing processing to the storage area 320.
- the first application execution unit 307 executes the DL copyright protection application 315 stored in the storage area 320.
- the first application execution unit 307 is based on a copyright protection standard such as authentication processing using a terminal key between terminals stipulated by DTCP included in the DL copyright protection application 315 and control of content encryption / decryption processing.
- the specified algorithm is executed in cooperation with the secure device 103. Part of the processing using encryption and hash functions is performed not by the first application execution unit 307 but by the encryption / decryption unit 308.
- the encryption / decryption unit 308 performs encryption / decryption processing related to encryption such as AES, ECC, and RSA, hash function processing such as SHA1, and random number generation processing. Note that the processing performed by the encryption / decryption unit 308 may be processing related to encryption and hash functions, and is not limited to the above-described encryption / decryption processing, hash function processing, and random number generation processing.
- the storage area 320 (corresponding to the application storage unit) is a storage area for storing data used in processing of various functional units of the information processing apparatus 102.
- the storage area 320 is realized by, for example, a non-volatile memory that can retain stored contents even when the power is turned off, such as an HDD, FlashROM, or SSD.
- the storage area 320 may be realized by a volatile memory such as SRAM, and data may be maintained by battery backup using a battery as a power source.
- the storage area 320 may be realized by a combination of a nonvolatile memory and a volatile memory.
- the storage area 320 includes a PF Ver. Indicating the platform number such as the OS type and version number of the information processing apparatus 102. 314 and the DL copyright protection application 315 downloaded by the application DL unit 302 are stored.
- the information processing apparatus 102 further includes an input / output unit and the like not shown in FIG. 3, but these are not the essence of the present invention and will not be described.
- the information processing apparatus 102 includes general components necessary for a computer such as a CPU, a RAM, and an OS. However, these are not the essence of the present invention, and thus the description thereof is omitted.
- FIG. 4 is a diagram showing a configuration of the DL copyright protection application 315 in the present embodiment.
- the DL copyright protection application 315 includes a first program compiled into a first execution format executable by the information processing apparatus 102 and a second program compiled into a second execution format executable by the secure device 103. It consists of two programs.
- the second execution format is different from the first execution format.
- the second execution format is an execution format that cannot be executed by the information processing apparatus 102.
- the first program is a normal execution program in the information processing apparatus 102.
- the start program 1 the transmission program, the authentication program 1, the copyright protection program Sub, the content reproduction program, the application version, and the encryption Program header.
- the first program is executed by the first application execution unit 307 unless otherwise specified.
- the start program 1 is a program that is executed first when the DL copyright protection application 315 is executed by the first application execution unit 307.
- the transmission program is a program that extracts the second program from the DL copyright protection application 315 and transmits the extracted second program to the secure device 103.
- the authentication program 1 has an effective authentication key with the authentication unit 504 of the secure device 103, performs authentication processing with the authentication unit 504 of the secure device 103 using the authentication key, and is effective only in the connected session. Generate a communication key.
- a case will be described as an example where mutual authentication is performed in which both the challenge and response types are performed in the authentication process, but the present invention is not limited to this method as long as authentication can be performed between terminals.
- the authentication program 1 is executed by the first application execution unit 307, but part of processing using encryption and hash functions is executed by the encryption / decryption unit 308.
- the secure communication key is a key that is valid only in a session in which the information processing apparatus 102 and the secure device 103 are connected, but the present invention is not limited to this.
- the secure communication key may be an individual key generated individually for each secure device 103 based on the unique information of the information processing apparatus 102, for example.
- Specific information of the information processing apparatus 102 includes, for example, a telephone number, GUID (Globally Unique Identifier), UUID (Universally Unique Identifier), e-mail address, MAC address, IMEII Information combining these can be considered.
- the copyright protection program Sub is a program that is executed after the authentication program 1 is executed and secure communication with the secure device 103 is established. Specifically, the copyright protection program Sub is used for authentication processing using a terminal key between terminals (here, between the media server 101a and the information processing apparatus 102) defined by DTCP, An algorithm defined in the copyright protection standard such as encryption / decryption control is implemented so as to be executed in cooperation with the secure device 103. Note that the above-described authentication process and content encryption / decryption process control are executed by the copyright protection program Main executed by the secure device 103, and the copyright protection program Sub is executed between the media server 101 a and the secure device 103. , Exchange data (various keys, certificates, random numbers, etc.). In some cases, the encryption / decryption unit 308 may be used for processing using an encryption algorithm.
- the content reproduction program reproduces the content received from the media server 101a based on a method defined by DTCP or the like using a content key generated after the execution of the copyright protection program Main.
- the application version indicates version information of the DL copyright protection application 315.
- the second program is a program executed on the secure device 103, and includes an encryption program header, a start program 2, and a copyright protection program Main.
- the second program is partly encrypted with the DL application key 515 held by the secure device 103.
- the secure device 103 decrypts it using the DL application key 515.
- the encrypted program header is an area where header information of the second program is written. In the second program, only the encrypted program header is not encrypted.
- the start program 2 is a program that is executed first after being decrypted with the DL application key 515 and performs initialization and the like.
- the copyright protection program Main is a program for causing the secure device 103 to execute processing related to the algorithm defined by the copyright protection standard executed by the conventional information processing apparatus instead of the information processing apparatus 102. .
- the copyright protection program Main is decrypted with the DL application key 515, initialized with the start program 2, and then executed.
- the copyright protection program Main executes authentication processing using a terminal key between terminals stipulated by DTCP or the like, content key generation processing, and the like on the secure device 103 instead of the information processing apparatus 102.
- an encryption / decryption unit 508 of the secure device 103 which will be described later, is used for processing using encryption or a hash function.
- This program includes a series of data necessary for processing, a terminal key B1, a certificate Bcert, a terminal ID, a root public key, and the like.
- the public key B1 included in the certificate Bcert corresponds to the terminal key B1 that is a secret key.
- the second program is not only compiled into an executable format that can be executed by the secure device 103, but may be tamper resistant so as to operate on a secure execution function supported by the secure device 103.
- the first program and the second program may be configured as one application and are provided as the same file, but the present invention is not limited to this.
- the DL copyright protection application 315 may be composed of a plurality of files, for example, when a DLL file (Dynamic Link Library) is used.
- the decryption process using the DL device key of the start program 2 and the copyright protection program Main in the secure device 103 may be executed collectively or may be executed for each program. Furthermore, each program may be further subdivided and the decoding process may be executed for each subdivided program.
- FIG. 5 is a diagram showing an overall configuration of the secure device 103 in the present embodiment.
- the secure device 103 operates in cooperation with the information processing apparatus 102 when the information processing apparatus 102 acquires / reproduces content stored in the media server 101a.
- the secure device 103 includes a communication unit and a storage unit, and is a device that can be connected to the information processing apparatus 102.
- the secure device 103 may be a dedicated device, for example, a device such as a portable terminal, a tablet terminal, a mobile phone, an HDD recorder, a DVD / BD recorder, a set top box, a TV, or a game device. I do not care.
- the secure device 103 is mounted with resistance to an analysis action from the outside, such as the terminal itself does not connect to a debugger.
- the secure device 103 has a configuration that does not include a connection circuit with a debugger (JTAG debugger) such as a test terminal for a test circuit such as a JTAG mounted in a normal product.
- JTAG debugger a debugger
- the secure device 103 is more resistant to unauthorized analysis by the physical analysis tool.
- the secure device 103 includes a net access unit 501, a data transmission / reception unit 502, a second application execution unit 503, an authentication unit 504, a storage area access unit 506, an encryption / decryption unit 508, and a storage area 520. Yes.
- the net access unit 501 performs a connection process with a server on the Internet 114b and a device on another LAN (not shown).
- IP protocol In general, it is assumed that the IP protocol is used, but the present invention is not limited to this as long as it is a method for communicating with other devices.
- the data transmitting / receiving unit 502 (corresponding to the second receiving unit) transmits / receives data via the net access unit 501.
- the data to be transmitted / received includes information stipulated to be exchanged between terminals according to copyright protection standards, data to be transmitted / received to / from the information processing apparatus 102, and the like.
- the data transmission / reception unit 502 receives the second program from the information processing apparatus 102.
- the storage area access unit 506 controls data read processing from the storage area 520 and data write processing to the storage area 520.
- the second application execution unit 503 decrypts and executes the second program of the DL copyright protection application 315 received via the network access unit 501 and the data transmission / reception unit 502 using the DL application key 515 in the storage area 520. To do.
- the second application execution unit 503 executes the second program, thereby performing authentication processing using a terminal key between terminals stipulated in the copyright protection standard such as DTCP with the media server 101a,
- the algorithm defined in the copyright protection standard such as control of encryption / decryption processing is executed.
- the encryption / decryption unit 508 is used for processing using encryption and hash functions.
- the authentication unit 504 has an authentication key, performs authentication processing with the authentication program 1 executed by the information processing apparatus 102, and generates a secure communication key that is valid only in the connected session.
- a case of performing mutual authentication in which both challenge and response types are performed will be described as an example. However, if authentication can be performed between terminals, the present method is limited to this method.
- the encryption / decryption unit 508 is used in part for execution of processing using encryption or a hash function.
- the secure communication key is valid only in a session in which the information processing apparatus 102 and the secure device 103 are connected. However, the secure communication key is not limited to this and may be an individual key or the like.
- the encryption / decryption unit 508 performs encryption / decryption processing related to encryption such as AES, ECC, and RSA, hash function processing such as SHA1, and random number generation processing. Note that the processing performed by the encryption / decryption unit 508 may be processing related to encryption or hash function, and is not limited to the above-described encryption / decryption processing, hash function processing, and random number generation processing.
- the storage area 520 (corresponding to the key storage unit) is a storage area for storing the DL application key (corresponding to the program key) 515.
- the storage area 520 is realized by a nonvolatile memory such as an HDD, a Flash ROM, or an SSD that can retain stored contents even when the power is turned off.
- the storage area 520 may be realized by a volatile memory such as SRAM, and may be configured such that data is maintained by battery backup using a battery as a power source.
- the secure device 103 is implemented with resistance to an external analysis action such as the terminal itself is not connected to a debugger, and prevents the analysis action from being performed during the execution of the second application execution unit 503 and the encryption / decryption unit 508.
- an external analysis action such as the terminal itself is not connected to a debugger, and prevents the analysis action from being performed during the execution of the second application execution unit 503 and the encryption / decryption unit 508.
- the DL application key 515 is protected by a secure storage area that is realized by access restriction or the storage area 520 itself is protected by encryption.
- the secure device 103 is assumed to be mounted with durability
- the second program of the DL copyright protection application 315 is tamper resistant and supports its secure execution.
- the function to perform may be installed in secure hardware possessed by the second application execution unit 503 or the secure device 103.
- FIGS. 6 to 9 are diagrams showing processing procedures when the information processing apparatus 102 reproduces the content of the media server 101a in cooperation with the secure device 103.
- FIGS. 6 to 9 are diagrams showing processing procedures when the information processing apparatus 102 reproduces the content of the media server 101a in cooperation with the secure device 103.
- the first application execution unit 307 causes the DL copyright protection application 315 to be executed. Is called via the storage area access unit 306. Further, the first application execution unit 307 executes the start program 1 of the first program of the called DL copyright protection application 315.
- the information processing apparatus 102 performs mutual authentication processing with the secure device 103, and establishes a secure communication path when authenticated (step S602).
- the first application execution unit 307 of the information processing apparatus 102 performs an authentication process with the authentication unit 504 of the secure device 103 when the authentication program 1 of the DL copyright protection application 315 is executed. In the authentication process, the first application execution unit 307 performs PF Ver. 314 is transmitted to the secure device 103.
- the secure device 103 uses the PF Ver. Sent from the information processing apparatus 102 in the authentication process.
- the OS type and version number information included in 314 is verified. If the OS type is not supported, or if it is a version number, the communication is terminated without further communication. Further, the secure device 103 verifies the application version of the DL copyright protection application 315 sent from the information processing apparatus 102. If the application version is not compatible, the secure device 103 ends without performing future communication.
- the information processing apparatus 102 causes the encryption / decryption unit 308 to encrypt the second program of the DL copyright protection application 315 using the secure communication key generated by the authentication process (step S603).
- the first application execution unit 307 of the information processing apparatus 102 transmits the encrypted second program to the secure device 103 via the data transmission / reception unit 304 (step S604).
- the secure device 103 receives the encrypted second program of the DL copyright protection application 315 via the data transmission / reception unit 502. Further, the second application execution unit 503 of the secure device 103 decrypts and executes the second program received via the data transmission / reception unit 502 (step S605). Specifically, the secure device 103 causes the encryption / decryption unit 508 to decrypt the second program using the secure communication key. Further, the second application execution unit 503 decrypts and executes the start program 2 and the copyright protection program Main among the second programs using the DL application key 515.
- the information processing apparatus 102 transmits a random number Bn generation request to the secure device 103 (step S606).
- the secure device 103 When the secure device 103 receives the random number Bn generation request, the secure device 103 causes the encryption / decryption unit 508 to generate the random number Bn (step S607). Furthermore, the secure device 103 encrypts both the generated random number Bn and the certificate Bcert using a secure communication key.
- the secure device 103 transmits the encrypted random number Bn and certificate Bcert to the information processing apparatus 102 (step S608).
- the information processing apparatus 102 receives the encrypted random number Bn and certificate Bcert from the secure device 103 via the data transmission / reception unit 304. Then, the information processing apparatus 102 causes the encryption / decryption unit 308 to decrypt the random number Bn using the secure communication key (step S609).
- the information processing apparatus 102 transmits the decrypted random number Bn and the certificate Bcert encrypted with the secure communication key in the secure device 103 to the media server 101a via the data transmission / reception unit 304 (step S610). .
- the media server 101 a receives the random number Bn and the certificate Bcert via the data transmission / reception unit 204. Then, the media server 101a causes the encryption / decryption unit 208 to verify the certificate Bcert using the Root public key (part of step S611, signature verification). If the verification result is NG, the media server 101a returns an error and ends. If the verification result is OK, the media server 101a generates a random number An (part of step S611, random number An generation).
- the media server 101a transmits the random number An and the certificate Acert to the information processing apparatus 102 via the data transmission / reception unit 204 (step S612).
- the information processing apparatus 102 receives the random number An and the certificate Acert via the data transmission / reception unit 304. Then, the information processing apparatus 102 causes the encryption / decryption unit 308 to encrypt the random number An and the certificate Acert using the secure communication key (step S613).
- the information processing apparatus 102 transmits the encrypted random number An and certificate Acert to the secure device 103 via the data transmission / reception unit 304 (step S614).
- the secure device 103 receives the random number An and the certificate Acert via the data transmission / reception unit 502. Then, the secure device 103 causes the encryption / decryption unit 508 to decrypt the random number An and the certificate Acert using the secure communication key (part of step S615, random number An decryption). Further, the secure device 103 causes the encryption / decryption unit 508 to verify the certificate Acert using the Root public key (part of step S615, signature verification). If the verification result in step S615 is NG, the secure device 103 returns an error and ends.
- step S ⁇ b> 615 the verification result by the secure device 103 in step S ⁇ b> 615 is OK (if no error is returned)
- the first random number Bk generation request in the ECDH (Elliptic Curve Dirrie-Hellman) key sharing method is transmitted to the secure device 103 (step S701).
- the secure device 103 When the secure device 103 receives the ECDH random number Bk generation request via the data transmission / reception unit 502, the secure device 103 causes the encryption / decryption unit 508 to generate the random number Bk (step S702).
- the information processing apparatus 102 transmits an ECDH Bv generation request to the secure device 103 (step S703).
- the secure device 103 receives the ECDH Bv generation request via the data transmission / reception unit 502. Then, the secure device 103 verifies whether there is a certificate Acert in the SRM (System Renewability Message) (step S704). If the verification result in step S704 is NG, the secure device 103 returns an error and ends.
- SRM System Renewability Message
- step S704 the secure device 103 uses the random number Bk to generate Bv that is the first phase value in the ECDH key sharing method.
- Bv is obtained by calculating the Bk times of the base point of the elliptic curve.
- the media server 101a generates the random number Ak by the encryption / decryption unit 208 after transmitting the random number An and the certificate Acert in step S612 (step S706).
- the media server 101a verifies whether the SRM has the certificate Bert (step S707). If the verification result in step S707 is NG, the media server 101a returns an error and ends.
- step S707 If the verification result in step S707 is OK, the media server 101a generates Av as the first phase value (step S708).
- the media server 101a uses an ECDSA (Electric curve digital algorithm) method using a random number Bn, first phase value Av, SRM, a terminal key A1 of the media server 101a, and the like.
- ECDSA (1) is generated (step S801).
- the media server 101a transmits ECDSA (1) to the information processing apparatus 102 via the data transmission / reception unit 204 (step S802).
- the information processing apparatus 102 receives ECDSA (1) via the data transmission / reception unit 304. Then, the encryption / decryption unit 308 performs encryption using the secure communication key (step S803).
- the information processing apparatus 102 transmits the encrypted ECDSA (1) and the ECDSA (1) verification request to the secure device 103 via the data transmission / reception unit 304 (step S804).
- the secure device 103 receives the ECDSA (1) and the verification request via the data transmission / reception unit 502.
- the encryption / decryption unit 508 decrypts ECDSA (1) using the secure communication key.
- the secure device 103 verifies ECDSA (1) using the public key A1 of the certificate Acert (step S805). If the verification result in step S805 is NG, the secure device 103 returns an error and ends.
- step S805 the secure device 103 uses the ECDSA method by using the random number An, first phase Bv, SRM, the terminal key B1 included in the copyright protection program Main, and the like.
- ECDSA (2) is generated, and the encryption / decryption unit 508 encrypts ECDSA (2) using the secure communication key (step S806).
- the secure device 103 transmits ECDSA (2) to the information processing apparatus 102 via the data transmission / reception unit 502 (step S807).
- the information processing apparatus 102 receives the encrypted ECDSA (2) via the data transmission / reception unit 304.
- the information processing apparatus 102 decrypts the encrypted ECDSA (2) using the secure communication key in the encryption / decryption unit 308 (step S808).
- the information processing apparatus 102 transmits ECDSA (2) to the media server 101a via the data transmission / reception unit 304 (step S809).
- the media server 101 a receives ECDSA (2) via the data transmission / reception unit 204.
- the media server 101a verifies ECDSA (2) using the public key A1 of the certificate Acert (step S810). If the verification result in step S810 is NG, the media server 101a returns an error and ends.
- step S810 If the verification result in step S810 is OK, the information processing apparatus 102 transmits an Auth key generation request to the secure device 103 via the data transmission / reception unit 304 (step S811).
- the secure device 103 receives the Auth key generation request via the data transmission / reception unit 502. Then, an Auth key is generated by calculating Av of the random number Bk and first phase value (step S812).
- step S810 If the verification result in step S810 is OK, the media server 101a generates an Auth key by calculating the random number Ak and first phase value Bv in the copyright protection processing unit 207 (step S813).
- the media server 101a uses the copyright protection processing unit 207 to generate an exchange key (step S901).
- the media server 101a scrambles the exchange key using the Auth key in the encryption / decryption unit 208 (step S902).
- the media server 101a transmits the exchange key to the information processing apparatus 102 via the data transmission / reception unit 204 (step S903).
- the information processing apparatus 102 receives the exchange key via the data transmission / reception unit 304.
- the information processing apparatus 102 encrypts the exchange key using the secure communication key in the encryption / decryption unit 308 (step S904).
- the information processing apparatus 102 transmits the exchange key to the secure device 103 via the data transmission / reception unit 304 (step S905).
- the secure device 103 receives the exchange key via the data transmission / reception unit 502.
- the secure device 103 decrypts the exchange key using the secure communication key at the encryption / decryption unit 508 (step S906).
- the secure device 103 descrambles the exchange key using the Auth key in the encryption / decryption unit 508 (step S907).
- the media server 101a generates a content key based on a predetermined algorithm, and encrypts the content key using the exchange key (step S908).
- the media server 101a transmits the content key (E) encrypted with the exchange key to the information processing apparatus 102 via the data transmission / reception unit 204 (step S909).
- the information processing apparatus 102 receives the content key (E) via the data transmission / reception unit 304.
- the information processing apparatus 102 encrypts the content key (E) using the secure communication key in the encryption / decryption unit 308 (step S910).
- the information processing apparatus 102 transmits the content key (ES) encrypted with the exchange key and the secure communication key to the secure device 103 via the data transmission / reception unit 304 (step S911).
- the secure device 103 receives the content key (ES) encrypted with the exchange key and the secure communication key via the data transmission / reception unit 502.
- the secure device 103 decrypts the content key (ES) using the secure communication key, and further decrypts the decrypted content key (E) using the Exchange key. Further, the secure device 103 encrypts the content key using the secure communication key in the encryption / decryption unit 508 (step S912).
- the secure device 103 transmits the content key (S) encrypted with the secure communication key to the information processing apparatus 102 via the data transmission / reception unit 502 (step S913).
- the information processing apparatus 102 receives the content key (S) via the data transmission / reception unit 304.
- the information processing apparatus 102 decrypts the content key (S) using the secure communication key in the encryption / decryption unit 308 (step S914).
- the media server 101 a acquires the encrypted content 216 and the local content key 215 stored in the storage area 220 via the storage area access unit 206. Further, the media server 101a decrypts the encrypted content 216 using the local content key 215 in the encryption / decryption unit 208. The media server 101a encrypts the content using the content key in the encryption / decryption unit 208 (step S915).
- the media server 101a transmits the content to the information processing apparatus 102 via the data transmission / reception unit 204 (step S916).
- the information processing apparatus 102 receives content via the data transmission / reception unit 304. Then, the information processing apparatus 102 plays back the content (step S917).
- the data exchanged between the information processing apparatus 102 and the secure device 103 is encrypted, and the command (request) is not encrypted, but the command may also be encrypted. .
- the content is encrypted by the media server 101a, and the content is decrypted, decoded, and reproduced by the information processing apparatus 102.
- the present invention is not limited to this.
- the content may be decoded by the media server 101a, and the decoded content may be decrypted and reproduced by the information processing apparatus 102.
- step S602 authentication is performed using an authentication key held in advance by the authentication unit 504 of the secure device 103 and an authentication key embedded in the authentication program 1 executed by the information processing apparatus 102, and secure communication is performed.
- the key is generated, the present invention is not limited to this.
- the information processing apparatus 102 and the secure device 103 perform pairing by using each other's ID as initial registration, and at the same time generate and hold a key pair of a public key cryptosystem, or have a key of a common key cryptosystem It may be a method for realizing encrypted communication by a method such as matching.
- the exchange between the information processing apparatus 102 and the secure device 103 may be performed using a secure path using a secure communication key, including a random number generation request, for example.
- the application distribution server 113 may include a converter that generates a copyright protection application including a content reproduction program (first program) and a copyright protection program (second program).
- the program related to the authentication process between the media server 101a and the secure device 103 (information processing apparatus 102) is compiled as a second program that can be executed by the secure device 103 as a second program, Other programs are compiled into a first execution format that can be executed by the information processing apparatus 102. Then, the copyright protection application is generated by combining the first program and the second program.
- FIG. 10 is a configuration diagram illustrating an example of a content distribution system according to the present embodiment.
- the media server 101a and the secure device 103 are configured as independent devices in the first embodiment, whereas the media server 101a and the secure device 103 are integrated with each other. The difference is that it is configured and realized as a server / secure device 1001.
- the content distribution system 1000 includes a media server 101b, an information processing apparatus 102, a broadcast station server 111, a Web server 112, an application distribution server 113, and a server / secure device. 1001.
- the configurations of the media server 101b, the broadcast station server 111, the Web server 112, and the application distribution server 113 are the same as those in the first embodiment.
- the information processing apparatus 102 of the present embodiment has the same configuration as the information processing apparatus 102 of the first embodiment shown in FIG. Specifically, the information processing apparatus 102 performs communication performed with the media server 101a in the first embodiment with the media server unit 10aa of the server / secure device 1001. Further, the information processing apparatus 102 according to the present embodiment performs communication performed with the secure device 103 in the first embodiment with the secure device unit 10bb of the server / secure device 1001.
- the server / secure device 1001 includes a media server unit 10aa for receiving and recording content from the broadcast station server 111, the Web server 112, or another media server 101b having the same type of function,
- the information processing apparatus 102 performs a process related to a secret data algorithm related to copyright protection
- the information processing apparatus 102 includes a secure device unit 10bb that operates in cooperation with the information processing apparatus 102.
- the configuration of the media server unit 10aa is the same as that of the media server 101a of the first embodiment
- the configuration of the secure device function unit 11bb is the same as that of the secure device 103 of the first embodiment.
- the server / secure device 1001 includes a portable terminal, a tablet terminal, a mobile phone, an HDD recorder, a DVD / BD recorder, a set-top box, a TV having an arithmetic processing unit (CPU: Central Processing Unit), a communication unit, and a storage unit.
- a device such as a game device.
- FIG. 11 is a diagram illustrating an example of the overall configuration of the server / secure device 1001 according to the second embodiment.
- the server / secure device 1001 of this embodiment includes two CPUs, a CPU 1101 and a CPU 1102, a media server function unit 11aa, and a secure device function unit 11bb.
- the media server function unit 11aa and the secure device function unit 11bb are realized by processes.
- the media server function unit 11aa and the CPU 1101 realize the media server unit 10aa.
- the secure device function unit 11bb and the CPU 1102 realize the secure device unit 10bb.
- the server / secure device 1001 is further provided with an input / output unit not shown in FIG. 11, but these are not the essence of the present invention and will not be described.
- the server / secure device 1001 includes general components necessary for the computer, such as an OS and a RAM. However, these are not the essence of the present invention, and a description thereof will be omitted.
- the server / secure device 1001 shown in FIG. 11 is implemented with resistance to an external analysis action such as the terminal itself does not connect to a debugger.
- an external analysis action such as the terminal itself does not connect to a debugger.
- the server / secure device 1001 shown in FIG. 11 is implemented with resistance to an external analysis action such as the terminal itself does not connect to a debugger.
- the copyright protection processing unit 207 and encryption / decryption unit 208 of the media server function unit 11aa or during execution of processing in the second application execution unit 503 and encryption / decryption unit 508 of the secure device function unit 11bb Performing analysis is prevented.
- the DL application key 515 is protected by a secure storage area that is realized by access restriction or the storage area 520 itself is protected by encryption.
- the second program of the DL copyright protection application 315 is tamper-resistant, and the function for supporting the secure execution of the second program is provided by the second application. It may be mounted on secure hardware possessed by the execution unit 503 or the secure device function unit 11bb.
- FIG. 12 is a diagram illustrating an example of the overall configuration of the server / secure device 1001 according to the first modification of the present embodiment.
- the server secure device 1001 includes one CPU 1201, a VMM 1202 that is a virtual machine monitor that realizes platform virtualization, two OSs OS 1203 and OS 1204, and a media server function.
- Unit 12aa and secure device function unit 12bb are exemplary of the server secure device 1001 according to the first modification.
- the VMM 1202, the OS 1203, the OS 1204, the media server function unit 12aa, and the secure device function unit 12bb are realized by processes.
- the media server function unit 12aa operating on the OS 1203 realizes the media server unit 10aa shown in FIG.
- a secure device unit 10bb shown in FIG. 10 is realized by the secure device function unit 12bb operating on the OS 1204.
- the server / secure device 1001 in the present modification includes an input / output unit not shown in FIG. 12, but these are not the essence of the present invention, and the description thereof will be omitted.
- the server / secure device 1001 includes general components necessary for a computer such as a RAM in addition to a CPU and an OS. However, these are not the essence of the present invention, and a description thereof will be omitted.
- the server / secure device 1001 shown in FIG. 12 is implemented with resistance to an external analysis action such as the terminal itself does not connect to a debugger.
- an external analysis action such as the terminal itself does not connect to a debugger.
- the server / secure device 1001 shown in FIG. 12 is implemented with resistance to an external analysis action such as the terminal itself does not connect to a debugger.
- the copyright protection processing unit 207 and encryption / decryption unit 208 of the media server function unit 12aa or during execution of processing in the second application execution unit 503 and encryption / decryption unit 508 of the secure device function unit 12bb.
- the DL application key 515 is protected by a secure storage area that is realized by access restriction or the storage area 520 itself is protected by encryption.
- the second program of the DL copyright protection application 315 is tamper-resistant, and the function for supporting the secure execution of the second program is provided by the second application. It may be mounted on secure hardware possessed by the execution unit 503 or the secure device 103.
- FIG. 13 is a diagram illustrating an example of the overall configuration of the server / secure device 1001 according to the second modification of the present embodiment.
- the server / secure device 1001 includes one CPU 1301, two OSs 1303 and 1304, a media server function unit 12aa, and a secure device function unit 12bb.
- the CPU 1301 has a function of switching the execution mode of the CPU between the normal mode and the secure mode, and separating the normal execution environment and the secure execution environment. During execution in the secure execution environment, it is resistant to external analysis actions such as not connecting to a debugger.
- a CPU having a function of switching the execution mode for example, there is a CPU corresponding to the Trust Zone technology of ARM Co.
- the CPU is disclosed in the white paper “ARM Security Technology Building a Secure System using TrustZone Technology” (Non-patent Document 3), and the description thereof is omitted.
- the media server function unit 13aa implements the media server unit 10aa shown in FIG. 10, operates on the OS 1303, operates on the OS 1304, and operates on the OS 1304. And a media server secure unit configured with the required functions.
- the secure device function unit 13bb realizes the secure device unit 10bb shown in FIG. 10, and operates on the OS 1303 and operates on the OS 1304 and the secure device normal unit configured with functions not requiring security. And a secure device secure unit configured with the required functions.
- OS 1303, the OS 1304, the media server function unit 13aa, and the secure device function unit 13bb are realized by processes.
- the server / secure device 1001 in the present modification includes an input / output unit not shown in FIG. 13, but these are not the essence of the present invention, and the description thereof will be omitted.
- the server / secure device 1001 includes general components necessary for the computer, such as a RAM. However, these are not the essence of the present invention, and a description thereof will be omitted.
- the server / secure device 1001 shown in FIG. 13 is implemented with resistance to an analysis action from the outside by a CPU that switches the execution mode.
- the server / secure device 1001 in the present modification example is executing the processing in the copyright protection processing unit 207 and the encryption / decryption unit 208 of the media server secure unit constituting the media server function unit 13aa and configures the secure device function unit 13bb.
- execution of processing in the second application execution unit 503 and the encryption / decryption unit 508 of the secure device secure unit it is prevented to perform an analysis act.
- the DL application key 515 is protected by a secure storage area that is realized by access restriction or the storage area 520 itself is protected by encryption.
- FIG. 14 is a diagram illustrating an example of the overall configuration of the server / secure device 1001 according to the third modification of the present embodiment.
- the server / secure device 1001 includes one CPU 1401, one type of OS 1402, a media server function unit 12aa, and a secure device function unit 12bb.
- the media server function unit 14aa implements the media server unit 10aa shown in FIG.
- the secure device function unit 14bb implements the secure device unit 10bb shown in FIG.
- the OS 1402, the media server function unit 14aa, and the secure device function unit 14bb are realized by processes. Therefore, the media server function unit 14aa and the secure device function unit 14bb do not interfere with each other.
- the server / secure device 1001 according to the present modification includes an input / output unit and the like not shown in FIG. 14, but these are not the essence of the present invention and will not be described.
- the server / secure device 1001 according to the present modification includes general components necessary for a computer such as a RAM in addition to a CPU and an OS. However, these are not the essence of the present invention, and thus the description thereof is omitted. .
- the server / secure device 1001 shown in FIG. 14 is implemented with resistance to an external analysis action such as the terminal itself does not connect to a debugger.
- an external analysis action such as the terminal itself does not connect to a debugger.
- the server / secure device 1001 shown in FIG. 14 is implemented with resistance to an external analysis action such as the terminal itself does not connect to a debugger.
- the copyright protection processing unit 207 and encryption / decryption unit 208 of the media server function unit 14aa or during execution of processing in the second application execution unit 503 and encryption / decryption unit 508 of the secure device function unit 14bb.
- the DL application key 515 is protected by a secure storage area that is realized by access restriction or the storage area 520 itself is protected by encryption.
- the second program of the DL copyright protection application 315 is tamper-resistant, and the function for supporting the secure execution of the second program is provided by the second application. It may be mounted on secure hardware possessed by the execution unit 503 or the secure device 103.
- FIG. 15 is a diagram showing an overall configuration of the media server 1500 in the present embodiment.
- the content distribution system according to the present embodiment is different from the content distribution system according to the first embodiment in that the media server includes a unique information content adding unit 1501.
- the content distribution system according to the present embodiment is similar to the content distribution system 100 according to the first embodiment shown in FIG. 1, such as the media servers 101 a and 101 b, the information processing apparatus 102, the secure device 103, and the broadcast station server 111. Web server 112 and application distribution server 113 are provided.
- the configurations of the information processing apparatus 102, the secure device 103, the broadcast station server 111, the Web server 112, and the application distribution server 113 are the same as those of the content distribution system 100 according to the first embodiment.
- the media server 101a of the present embodiment is the media server 1500 shown in FIG. 15, and includes, for example, an HDD recorder, a DVD / BD recorder, a set top box, a portable terminal, a tablet terminal, and a mobile phone having a communication unit and a storage unit. , TV, or a game device.
- the media server 1500 includes a network access unit 201, a broadcast wave reception unit 202, a data transmission / reception unit 204, a storage area access unit 206, a copyright protection processing unit 207, and an encryption / decryption unit 208.
- a unique information content adding unit 1501 is provided in addition to the content reproduction unit 209 and the storage area 220.
- the configurations of the network access unit 201, broadcast wave receiving unit 202, data transmission / reception unit 204, storage area access unit 206, copyright protection processing unit 207, encryption / decryption unit 208, content playback unit 209, and storage area 220 are as follows. The same as in the first embodiment.
- the unique information content adding unit 1501 is located at a position that does not affect reproduction, such as the header information of the content, and the information processing device 102. Specific information is given.
- Specific information includes, for example, a phone number, GUID (Globally Unique Identifier), UUID (Universally Unique Identifier), e-mail address, MAC address, IMEIIn (International Mobile), and these.
- the unique information content adding unit 1501 may be provided with a unique information key that is assigned by the manufacturer that manufactures the media server 101a and is managed by the manufacturer, and the unique information may be encrypted using the unique information key.
- the device through which the content passes can be specified. In this case, even if illegal duplication or the like is performed, it is possible to narrow down the devices for which fraud has been performed from the content history. This makes it easier to take measures against unauthorized duplication.
- Each of the above devices is specifically a computer system including a microprocessor, ROM, RAM, a hard disk unit, a display unit, a keyboard, a mouse, and the like.
- a computer program is stored in the RAM or hard disk unit.
- Each device achieves its functions by the microprocessor operating according to the computer program.
- the computer program is configured by combining a plurality of instruction codes indicating instructions for the computer in order to achieve a predetermined function.
- a part or all of the constituent elements constituting each of the above-described apparatuses may be constituted by one system LSI (Large Scale Integration).
- the system LSI is an ultra-multifunctional LSI manufactured by integrating a plurality of components on a single chip.
- the system LSI is a computer system including a microprocessor, a ROM, a RAM, and the like. .
- a computer program is stored in the RAM.
- the system LSI achieves its functions by the microprocessor operating according to the computer program.
- system LSI may be called IC, LSI, super LSI, or ultra LSI depending on the degree of integration.
- present invention includes any case where the system LSI is realized at any of the above integration levels. Needless to say.
- an FPGA Field Programmable Gate Array
- a reconfigurable processor that can reconfigure the connection and setting of circuit cells inside the LSI may be used.
- a part or all of the constituent elements constituting each of the above devices may be constituted by an IC card or a single module that can be attached to and detached from each device.
- the IC card or the module is a computer system including a microprocessor, a ROM, a RAM, and the like.
- the IC card or the module may include the super multifunctional LSI described above.
- the IC card or the module achieves its function by the microprocessor operating according to the computer program. This IC card or this module may have tamper resistance.
- the present invention may be the method described above. Further, the present invention may be a computer program that realizes these methods by a computer as the processing of the CPU, or may be a digital signal composed of the computer program.
- the present invention also provides a computer-readable storage medium such as a flexible disk, hard disk, CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD (Blu-ray Disc). ), Or stored in a semiconductor memory or the like. Further, the digital signal may be stored in these storage media.
- a computer-readable storage medium such as a flexible disk, hard disk, CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD (Blu-ray Disc).
- the digital signal may be stored in these storage media.
- the computer program or the digital signal may be transmitted via an electric communication line, a wireless or wired communication line, a network represented by the Internet, a data broadcast, or the like.
- the present invention may be a computer system including a microprocessor and a memory, the memory storing the computer program, and the microprocessor operating according to the computer program.
- program or the digital signal is stored in the storage medium and transferred, or the program or the digital signal is transferred via the network or the like, and executed by another independent computer system. It is good.
- the content distribution system described above can be used as a content distribution system including an embedded device (information processing apparatus) that can use an application distribution mechanism. Further, the secure device, the information processing terminal (information processing apparatus), and the media server described above can each be realized as each component of the content distribution system.
- the content distribution system can also implement the copyright protection standard even in an embedded terminal having an application distribution mechanism.
- it is configured to give unique information, even if an unauthorized person illegally releases the copyright protection implementation and leaks the content, the unauthorized person can be identified or facilitated. Can do.
- DESCRIPTION OF SYMBOLS 100 Content delivery system 101a, 101b Media server 102 Information processing apparatus 103 Secure device 111 Broadcast station server 112 Web server 113 Application delivery server 201 Net access part 202 Broadcast wave receiving part 204 Data transmission / reception part 206 Storage area access part 207 Copyright protection process Unit 208 encryption / decryption unit 209 content reproduction unit 214 terminal Ver. 215 Local content key 216 Encrypted content 220 Storage region 301 Net access unit 302 Application DL unit 304 Data transmission / reception unit 306 Storage region access unit 307 First application execution unit 308 Encryption / decryption unit 314 PF Ver.
- DL copyright protection application 320 storage area 501 network access section 502 data transmission / reception section 503 second application execution section 504 authentication section 506 storage area access section 508 encryption / decryption section 515 DL application key 520 storage area 1000 content distribution system 1001 server secure Device 10aa Media server part 10bb Secure device part 1101 CPU 1102 CPU 11aa Media server function unit 11bb Secure device function unit 1201 CPU 1202 VMM 1203 OS 1204 OS 12aa Media server function unit 12bb Secure device function unit 1301 CPU 1303 OS 1304 OS 13aa Media server function unit 13bb Secure device function unit 1401 CPU 1402 OS 14aa Media server function unit 14bb Secure device function unit 1500 Media server 1501 Unique information content adding unit
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
近年、Non-PCの分野において、携帯電話機では、例えば、アップル社(Apple Inc.)が提供するiPhone(アイフォーン:登録商標)のAppStoreや、グーグル社(Google Inc.)が提供するAndroid(アンドロイド:登録商標)のAndroid Market等を用いて、アプリケーション(以下、「アプリ」とする)をダウンロードし、利用するアプリ配信の仕組みが利用可能となって来ている。アプリ配信を利用してダウンロードできるアプリとしては、例えば、各種コンテンツ(例えば、音楽コンテンツや動画コンテンツ等)を再生するコンテンツ再生用アプリがある。
実施の形態1に係るコンテンツ配信システムの構成および動作について、図1~図5を基に説明する。
先ず、コンテンツ配信システムの構成について、図1を基に説明する。図1は、本実施の形態におけるコンテンツ配信システム100の構成図である。
次に、メディアサーバ101aの構成について、図2を基に説明する。図2は、本実施の形態におけるメディアサーバ101aの全体構成を示す図である。
次に、情報処理装置102の構成について、図3を基に説明する。図3は、本実施の形態における情報処理装置102の全体構成を示す図である。
DL著作権保護アプリ315の構成について、図4を基に説明する。図4は、本実施の形態におけるDL著作権保護アプリ315の構成を示す図である。
次に、セキュアデバイス103の構成について、図5を基に説明する。図5は、本実施の形態におけるセキュアデバイス103の全体構成を示す図である。
次に、コンテンツ配信システムの動作について、図6~図9を基に説明する。図6~図9は、メディアサーバ101aのコンテンツを、情報処理装置102がセキュアデバイス103と連携しながら再生するときの処理手順を表した図である。
本実施の形態において、アプリ配信サーバ113は、コンテンツ再生プログラム(第一のプログラム)および著作権保護プログラム(第二のプログラム)を備える著作権保護アプリを生成するコンバータを備えていてもよい。
実施の形態2に係るコンテンツ配信システムの構成および動作について、図10~図14を基に説明する。図10は、本実施の形態におけるコンテンツ配信システムの一例を示す構成図である。
本実施の形態の変形例1について、図12を基に説明する。図12は、本実施の形態の変形例1におけるサーバ・セキュアデバイス1001の全体構成の一例を示す図である。
本実施の形態の変形例2について、図13を基に説明する。図13は、本実施の形態の変形例2におけるサーバ・セキュアデバイス1001の全体構成の一例を示す図である。
本実施の形態の変形例3について、図14を基に説明する。図14は、本実施の形態の変形例3におけるサーバ・セキュアデバイス1001の全体構成の一例を示す図である。
実施の形態3に係るコンテンツ配信システムの構成および動作について、図15を基に説明する。図15は、本実施の形態におけるメディアサーバ1500の全体構成を示す図である。
なお、本発明を上記実施の形態に基づいて説明してきたが、本発明は、上記の実施の形態に限定されないのはもちろんである。以下のような場合も本発明に含まれる。
101a、101b メディアサーバ
102 情報処理装置
103 セキュアデバイス
111 放送局サーバ
112 Webサーバ
113 アプリ配信サーバ
201 ネットアクセス部
202 放送波受信部
204 データ送受信部
206 保存領域アクセス部
207 著作権保護処理部
208 暗復号部
209 コンテンツ再生部
214 端末Ver.
215 ローカルコンテンツ鍵
216 暗号化コンテンツ
220 保存領域
301 ネットアクセス部
302 アプリDL部
304 データ送受信部
306 保存領域アクセス部
307 第一アプリ実行部
308 暗復号部
314 PF Ver.
315 DL著作権保護アプリ
320 保存領域
501 ネットアクセス部
502 データ送受信部
503 第二アプリ実行部
504 認証部
506 保存領域アクセス部
508 暗復号部
515 DLアプリ鍵
520 保存領域
1000 コンテンツ配信システム
1001 サーバ・セキュアデバイス
10aa メディアサーバ部
10bb セキュアデバイス部
1101 CPU
1102 CPU
11aa メディアサーバ機能部
11bb セキュアデバイス機能部
1201 CPU
1202 VMM
1203 OS
1204 OS
12aa メディアサーバ機能部
12bb セキュアデバイス機能部
1301 CPU
1303 OS
1304 OS
13aa メディアサーバ機能部
13bb セキュアデバイス機能部
1401 CPU
1402 OS
14aa メディアサーバ機能部
14bb セキュアデバイス機能部
1500 メディアサーバ
1501 固有情報コンテンツ付与部
Claims (17)
- 所定のコンテンツを再生するための著作権保護アプリケーションプログラムを配信するアプリ配信サーバと、
前記著作権保護アプリケーションプログラムを実行することにより前記コンテンツの再生を行う情報処理端末と、
前記情報処理端末と連携動作するセキュアデバイスとを備えるコンテンツ再生システムであって、
前記アプリ配信サーバは、
前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、前記セキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式であって、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含む前記著作権保護アプリケーションプログラムを記憶する記憶部を有し、
前記情報処理端末は、
前記アプリ配信サーバから前記著作権保護アプリケーションプログラムを受信する第一の受信部と、
前記著作権保護アプリケーションプログラムから前記第一のプログラムを抽出して実行することにより、前記著作権保護アプリケーションプログラムから前記第二のプログラムを抽出して前記セキュアデバイスに送信する第一アプリ実行部とを有し、
前記セキュアデバイスは、
前記プログラム鍵を格納する鍵格納部と、
前記情報処理端末から前記第二のプログラムを受信する第二の受信部と、
前記プログラム鍵を用いて前記第二のプログラムを復号し、復号した前記第二のプログラムを実行する第二アプリ実行部とを有し、
前記第二アプリ実行部は、前記第二のプログラムを実行することにより、前記情報処理端末の認証情報を用いて、前記コンテンツの配信を行うメディアサーバに対する認証処理を実行し、
前記第一アプリ実行部は、前記第二アプリ実行部における前記認証処理で認証された場合に、前記第一のプログラムを実行することにより、前記コンテンツを再生する
コンテンツ再生システム。 - 前記コンテンツ再生システムは、前記メディアサーバをさらに備え、
前記メディアサーバは、
前記情報処理端末で実行される前記第一のプログラムとの間で、前記コンテンツをセキュアに交換できる通信路を確立する著作権保護処理部と、
前記コンテンツを保存する保存領域と、
前記コンテンツを、前記情報処理端末へ送信するデータ送受信部とを有する
請求項1に記載のコンテンツ再生システム。 - 前記メディアサーバの前記著作権保護処理部は、耐タンパー化されている
請求項2に記載のコンテンツ再生システム。 - 前記メディアサーバは、さらに、前記コンテンツに、前記メディアサーバに固有の情報を付与する固有情報コンテンツ付与部を有する
請求項1~3の何れか1項に記載のコンテンツ再生システム。 - 前記セキュアデバイスは、前記鍵格納部および前記第二アプリ実行部の動作を解析する解析ツールと物理的に接続する接続部を備えない
請求項1~4の何れか1項に記載のコンテンツ再生システム。 - 前記第二のプログラムは、耐タンパー化されている
請求項1~5の何れか1項に記載のコンテンツ再生システム。 - 所定のコンテンツの再生を行う情報処理端末と連携動作するセキュアデバイスであって、
前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、セキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含む著作権保護アプリケーションプログラムのうち、前記第二のプログラムを前記情報処理端末から受信する第二の受信部と、
前記プログラム鍵を格納する鍵格納部と、
前記プログラム鍵を用いて前記第二のプログラムを復号し、復号した前記第二のプログラムを実行する第二アプリ実行部とを備え、
前記第二アプリ実行部は、前記第二のプログラムを実行することにより、前記情報処理端末の認証情報を用いて、前記コンテンツの配信を行うメディアサーバに対する認証処理を実行する
セキュアデバイス。 - 所定のコンテンツの再生を行う情報処理端末と通信するサーバ・セキュアデバイスであって、
前記情報処理端末に前記コンテンツを配信するメディアサーバと、
前記情報処理端末と連携動作するセキュアデバイスとを備え、
前記セキュアデバイスは、
前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、前記セキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含む著作権保護アプリケーションプログラムのうち、前記第二のプログラムを前記情報処理端末から受信する第二の受信部と、
前記プログラム鍵を格納する鍵格納部と、
前記プログラム鍵を用いて前記第二のプログラムを復号し、復号した前記第二のプログラムを実行する第二アプリ実行部とを有し、
前記第二アプリ実行部は、前記第二のプログラムを実行することにより、前記情報処理端末の認証情報を用いて、前記メディアサーバに対する認証処理を実行し、
前記メディアサーバは、
前記情報処理端末で実行される前記第一のプログラムとの間で、前記コンテンツをセキュアに交換できる通信路を確立する著作権保護処理部と、
前記コンテンツを保存する保存領域と、
前記コンテンツを、前記情報処理端末へ送信するデータ送受信部とを有する
サーバ・セキュアデバイス。 - セキュアデバイスと連携動作し、所定のコンテンツの再生を行う情報処理端末であって、
前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、前記セキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含む著作権保護アプリケーションプログラムを格納するアプリ格納部と、
前記著作権保護アプリケーションプログラムから、前記第一のプログラムを抽出して実行することにより、前記著作権保護アプリケーションプログラムから前記第二のプログラムを抽出して前記セキュアデバイスへ送信する第一アプリ実行部とを備え、
前記第一アプリ実行部は、さらに、前記セキュアデバイスにおいて前記コンテンツの配信を行うメディアサーバが認証された場合に、前記第一のプログラムを実行することにより、前記コンテンツを再生する再生処理を実行する
情報処理端末。 - 所定のコンテンツを再生する情報処理端末に対してコンテンツの配信を行うメディアサーバであって、
前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、前記情報処理端末と連携動作するセキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式であって、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含む著作権保護アプリケーションプログラムのうち、前記セキュアデバイスで実行される前記第二のプログラムとの間で、認証処理を行い、前記情報処理端末で実行される前記第一のプログラムとの間で、コンテンツをセキュアに交換できる通信路を確立する著作権保護処理部と、
前記コンテンツを保存する保存領域と、
前記コンテンツに、前記メディアサーバに固有の情報を付与する固有情報コンテンツ付与部と、
前記固有の情報が付与された前記コンテンツを暗号化し、前記情報処理端末へ送信するデータ送受信部とを備える
メディアサーバ。 - 所定のコンテンツの再生を行う情報処理端末と連携動作するセキュアデバイスの集積回路であって、
前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、前記セキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含む著作権保護アプリケーションプログラムのうち、前記第二のプログラムを前記情報処理端末から受信する第二の受信部と、
鍵格納部に格納された前記プログラム鍵を用いて前記第二のプログラムを復号し、復号した前記第二のプログラムを実行する第二アプリ実行部とを備え、
前記第二アプリ実行部は、前記第二のプログラムを実行することにより、前記情報処理端末の認証情報を用いて、前記コンテンツの配信を行うメディアサーバに対する認証処理を実行する
セキュアデバイスの集積回路。 - 情報処理端末と連携動作するセキュアデバイスの制御プログラムであって、
前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、前記セキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式であって、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含む著作権保護アプリケーションプログラムのうち、前記第二のプログラムを前記情報処理端末から受信するステップと、
前記セキュアデバイスの鍵格納部に格納された前記プログラム鍵を用いて前記第二のプログラムを復号するステップと、
前記情報処理端末で実行される前記第一のプログラムと連携しながら、前記第二のプログラムを実行するステップとを含み、
前記第二のプログラムを実行するステップでは、前記第二のプログラムを実行することにより、前記情報処理端末の認証情報を用いて、前記コンテンツの配信を行うメディアサーバに対する認証処理を実行する
セキュアデバイスの制御プログラム。 - 請求項12に記載のセキュアデバイスの制御プログラムが記録された記録媒体。
- 所定のコンテンツの再生を行う情報処理端末と通信するサーバ・セキュアデバイスの集積回路であって、
前記情報処理端末に前記コンテンツを提供するメディアサーバと、
前記情報処理端末と連携動作するセキュアデバイスとを備え、
前記セキュアデバイスは、
前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、前記セキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式であって、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含む著作権保護アプリケーションプログラムのうち、前記第二のプログラムを前記情報処理端末から受信する第二の受信部と、
鍵格納部に格納された前記プログラム鍵を用いて前記第二のプログラムを復号し、復号された前記第二のプログラムを実行する第二アプリ実行部とを有し、
前記第二アプリ実行部は、前記第二のプログラムを実行することにより、前記情報処理端末の認証情報を用いて、前記メディアサーバに対する認証処理を実行し、
前記メディアサーバは、
前記情報処理端末で実行される前記第一のプログラムとの間で、前記コンテンツをセキュアに交換できる通信路を確立する著作権保護処理部と、
保存領域に格納された前記コンテンツを、前記情報処理端末へ送信するデータ送受信部とを有する
サーバ・セキュアデバイスの集積回路。 - 所定のコンテンツの再生を行う情報処理端末に前記コンテンツを提供するメディアサーバと、前記情報処理端末と連携動作するセキュアデバイスとを備えるサーバ・セキュアデバイスの制御プログラムであって、
前記メディアサーバにおいて、前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、前記セキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式であって、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含む著作権保護アプリケーションプログラムのうち、前記情報処理端末で実行される前記第一のプログラムとの間で、コンテンツをセキュアに交換できる通信路を確立するステップと、
前記セキュアデバイスにおいて、前記第二のプログラムを前記情報処理端末から受信するステップと、
前記セキュアデバイスにおいて、鍵格納部に格納された前記プログラム鍵を用いて前記第二のプログラムを復号し、復号した前記第二のプログラムを実行するステップとを含み、
前記第二のプログラムを実行するステップでは、前記情報処理端末の認証情報を用いて、前記メディアサーバに対する認証処理を実行する
サーバ・セキュアデバイスの制御プログラム。 - 請求項15に記載のサーバ・セキュアデバイスの制御プログラムが記録された記録媒体。
- 所定のコンテンツの再生を行う情報処理端末、および、前記情報処理端末と連携動作するセキュアデバイスで実行される著作権保護アプリケーションプログラムが記録された記録媒体であって、
前記著作権保護アプリケーションプログラムは、
前記情報処理端末で実行可能な第一の実行形式の第一のプログラムと、
前記セキュアデバイスで実行可能な、前記第一の実行形式とは異なる第二の実行形式であって、且つ、前記セキュアデバイスが保持するプログラム鍵で暗号化された第二のプログラムとを含み、
前記第二のプログラムは、
前記セキュアデバイスに、前記情報処理端末の認証情報を用いて、前記コンテンツを配信するメディアサーバに対する認証処理を実行させるステップを有し、
前記第一のプログラムは、
前記情報処理端末に、前記著作権保護アプリケーションプログラムから前記第二のプログラムを抽出して前記セキュアデバイスに送信させるステップと、
前記認証処理で認証された場合に、前記情報処理端末に、前記コンテンツを再生させるステップとを有する
記録媒体。
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/814,773 US9152770B2 (en) | 2011-09-13 | 2012-08-06 | Content reproduction system, information processing terminal, media server, secure device, and server secure device |
| JP2012548301A JP5948680B2 (ja) | 2011-09-13 | 2012-08-06 | コンテンツ再生システム、情報処理端末、メディアサーバ、セキュアデバイスおよびサーバ・セキュアデバイス |
| CN201280002343.0A CN103140856B (zh) | 2011-09-13 | 2012-08-06 | 内容再生系统、信息处理终端、媒体服务器、安全器件以及服务器安全器件 |
| US14/834,904 US9866535B2 (en) | 2011-09-13 | 2015-08-25 | Content reproduction system, information processing terminal, media server, secure device, and server secure device |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2011-199932 | 2011-09-13 | ||
| JP2011199932 | 2011-09-13 |
Related Child Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/814,773 A-371-Of-International US9152770B2 (en) | 2011-09-13 | 2012-08-06 | Content reproduction system, information processing terminal, media server, secure device, and server secure device |
| US14/834,904 Division US9866535B2 (en) | 2011-09-13 | 2015-08-25 | Content reproduction system, information processing terminal, media server, secure device, and server secure device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013038592A1 true WO2013038592A1 (ja) | 2013-03-21 |
Family
ID=47882845
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2012/004981 Ceased WO2013038592A1 (ja) | 2011-09-13 | 2012-08-06 | コンテンツ再生システム、情報処理端末、メディアサーバ、セキュアデバイスおよびサーバ・セキュアデバイス |
Country Status (4)
| Country | Link |
|---|---|
| US (2) | US9152770B2 (ja) |
| JP (1) | JP5948680B2 (ja) |
| CN (1) | CN103140856B (ja) |
| WO (1) | WO2013038592A1 (ja) |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103237005A (zh) * | 2013-03-15 | 2013-08-07 | 福建联迪商用设备有限公司 | 密钥管理方法及系统 |
| CN103220271A (zh) * | 2013-03-15 | 2013-07-24 | 福建联迪商用设备有限公司 | 密钥下载方法、管理方法、下载管理方法及装置和系统 |
| CN104573416B (zh) * | 2013-10-25 | 2018-07-17 | 腾讯科技(深圳)有限公司 | 一种生成应用安装包、执行应用的方法及装置 |
| CN104680039B (zh) * | 2013-11-28 | 2019-02-26 | 腾讯科技(深圳)有限公司 | 一种应用程序安装包的数据保护方法及装置 |
| KR101566143B1 (ko) * | 2014-10-21 | 2015-11-06 | 숭실대학교산학협력단 | 사용자 단말기 및 상기 사용자 단말기의 주변기기를 이용한 핵심코드 보호 방법 |
| KR101566142B1 (ko) * | 2014-10-21 | 2015-11-06 | 숭실대학교산학협력단 | 사용자 단말기 및 그것을 이용한 응용 프로그램의 핵심코드 보호 방법 |
| US9716726B2 (en) * | 2014-11-13 | 2017-07-25 | Cleafy S.r.l. | Method of identifying and counteracting internet attacks |
| CN105160212B (zh) * | 2015-09-29 | 2018-10-12 | 上海斐讯数据通信技术有限公司 | 应用的安全保护方法及系统 |
| US20190028468A1 (en) | 2017-07-24 | 2019-01-24 | Bernard GARCIA | Biometric cloud authentication gateway database system and method of use |
| EP3912109B1 (en) | 2019-01-20 | 2022-07-27 | Helios Data Inc. | Data sharing architecture |
| JP7334492B2 (ja) * | 2019-01-28 | 2023-08-29 | オムロン株式会社 | セーフティシステムおよびメンテナンス方法 |
| WO2020158247A1 (ja) | 2019-01-28 | 2020-08-06 | オムロン株式会社 | セーフティシステムおよびメンテナンス方法 |
| US11611540B2 (en) * | 2020-07-01 | 2023-03-21 | Vmware, Inc. | Protection of authentication data of a server cluster |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH1173381A (ja) * | 1997-06-26 | 1999-03-16 | Fuji Xerox Co Ltd | 画像送信装置、画像受信装置および画像処理システム、並びに文書・画像フォーマット |
| JP2002063147A (ja) * | 2000-08-17 | 2002-02-28 | Sony Corp | 情報処理装置、情報処理方法、並びに記録媒体 |
| JP2003076553A (ja) * | 2001-09-05 | 2003-03-14 | Sharp Corp | 他コンピュータへのデータ移動及びその動作方法 |
| JP2008186386A (ja) * | 2007-01-31 | 2008-08-14 | Canon Inc | 情報処理装置及びその制御方法及び該方法を実行するプログラム |
| WO2009028606A1 (ja) * | 2007-08-29 | 2009-03-05 | Mitsubishi Electric Corporation | 認証用端末、及びネットワーク端末 |
Family Cites Families (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7664263B2 (en) * | 1998-03-24 | 2010-02-16 | Moskowitz Scott A | Method for combining transfer functions with predetermined key creation |
| US8191166B2 (en) * | 2002-09-27 | 2012-05-29 | Broadcom Corporation | System and method for securely handling control information |
| US6351809B1 (en) * | 1999-05-14 | 2002-02-26 | Xilinx, Inc. | Method of disguising a USB port connection |
| WO2003028283A1 (en) * | 2001-09-21 | 2003-04-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Arrangement and method for execution of code |
| JP2003330365A (ja) * | 2002-05-09 | 2003-11-19 | Toshiba Corp | コンテンツ配布/受信方法 |
| DE60317242T2 (de) | 2002-08-01 | 2008-02-14 | Matsushita Electric Industrial Co., Ltd., Kadoma | Apparate und Verfahren zum Entschlüsseln von verschlüsselten Datenblöcken und zum Lokalisieren der verschlüsselten Datenblöcke im für die Ausführung verwendeten Speicherbereich |
| US7930537B2 (en) * | 2002-08-13 | 2011-04-19 | Nokia Corporation | Architecture for encrypted application installation |
| CN1774687A (zh) * | 2003-04-14 | 2006-05-17 | 松下电器产业株式会社 | 使用挑战响应原理的客户端服务器鉴别 |
| WO2004097661A1 (en) * | 2003-05-01 | 2004-11-11 | Samsung Electronics Co., Ltd. | Authenticating method and apparatus |
| EP3043232A1 (en) * | 2003-08-26 | 2016-07-13 | Panasonic Intellectual Property Corporation of America | Program execution device |
| EP1632828A1 (en) * | 2004-09-02 | 2006-03-08 | Axalto SA | DRM system for device communicating with a portable device |
| US8479186B2 (en) * | 2005-12-22 | 2013-07-02 | Sandisk Technologies Inc. | Method for program code execution with memory storage controller participation |
| US20080215491A1 (en) * | 2007-03-02 | 2008-09-04 | Miller Bruce D | Content Distribution on Storage Media For Sale, Rental and Resale |
| KR20090065350A (ko) * | 2007-12-17 | 2009-06-22 | 한국전자통신연구원 | 재전송을 이용한 콘텐츠 스트리밍에서 콘텐츠 보호 장치 및방법 |
| WO2009083869A1 (en) * | 2007-12-20 | 2009-07-09 | Koninklijke Philips Electronics N.V. | Device and method for digital right management |
| CN101174295B (zh) * | 2008-01-16 | 2010-09-01 | 北京飞天诚信科技有限公司 | 一种可离线的drm认证的方法及系统 |
| KR20100001142A (ko) * | 2008-06-26 | 2010-01-06 | 삼성전자주식회사 | 권리 객체의 관리 방법과 그에 따른 컨텐츠 객체의 폐기방법 및 이를 이용한 디바이스 |
| US8213618B2 (en) * | 2008-12-30 | 2012-07-03 | Intel Corporation | Protecting content on client platforms |
| US8359657B2 (en) * | 2010-03-30 | 2013-01-22 | Sandcastles Technology Inc. | Method and apparatus for enabling secure distribution of digital content |
| US8516603B2 (en) * | 2010-07-21 | 2013-08-20 | Cox Communications, Inc. | Systems and methods providing a separable digital rights management application |
| US20140208441A1 (en) * | 2011-07-01 | 2014-07-24 | Nokia Corporation ` | Software Authentication |
-
2012
- 2012-08-06 WO PCT/JP2012/004981 patent/WO2013038592A1/ja not_active Ceased
- 2012-08-06 JP JP2012548301A patent/JP5948680B2/ja not_active Expired - Fee Related
- 2012-08-06 US US13/814,773 patent/US9152770B2/en not_active Expired - Fee Related
- 2012-08-06 CN CN201280002343.0A patent/CN103140856B/zh not_active Expired - Fee Related
-
2015
- 2015-08-25 US US14/834,904 patent/US9866535B2/en not_active Expired - Fee Related
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH1173381A (ja) * | 1997-06-26 | 1999-03-16 | Fuji Xerox Co Ltd | 画像送信装置、画像受信装置および画像処理システム、並びに文書・画像フォーマット |
| JP2002063147A (ja) * | 2000-08-17 | 2002-02-28 | Sony Corp | 情報処理装置、情報処理方法、並びに記録媒体 |
| JP2003076553A (ja) * | 2001-09-05 | 2003-03-14 | Sharp Corp | 他コンピュータへのデータ移動及びその動作方法 |
| JP2008186386A (ja) * | 2007-01-31 | 2008-08-14 | Canon Inc | 情報処理装置及びその制御方法及び該方法を実行するプログラム |
| WO2009028606A1 (ja) * | 2007-08-29 | 2009-03-05 | Mitsubishi Electric Corporation | 認証用端末、及びネットワーク端末 |
Also Published As
| Publication number | Publication date |
|---|---|
| JPWO2013038592A1 (ja) | 2015-03-23 |
| US20150372992A1 (en) | 2015-12-24 |
| US9152770B2 (en) | 2015-10-06 |
| CN103140856B (zh) | 2016-02-17 |
| US9866535B2 (en) | 2018-01-09 |
| CN103140856A (zh) | 2013-06-05 |
| JP5948680B2 (ja) | 2016-07-06 |
| US20130145477A1 (en) | 2013-06-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5948680B2 (ja) | コンテンツ再生システム、情報処理端末、メディアサーバ、セキュアデバイスおよびサーバ・セキュアデバイス | |
| US7739507B2 (en) | Hardware multimedia endpoint and personal computer | |
| KR101658959B1 (ko) | 하드웨어 신뢰 루트를 구축하고 보호 콘텐츠 처리를 개방 컴퓨팅 플랫폼 내에 제공하는 방법 및 장치 | |
| JP4680564B2 (ja) | 携帯用メディア上のコンテンツの暗号化およびデータ保護 | |
| RU2504005C2 (ru) | Устройство и способ управления цифровыми правами | |
| US9325505B2 (en) | Apparatus and method for content encryption and decryption based on storage device ID | |
| JP5869580B2 (ja) | 端末装置、検証装置、鍵配信装置、コンテンツ再生方法、鍵配信方法及びコンピュータプログラム | |
| US9990473B2 (en) | Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust | |
| CN101073238A (zh) | 数字数据内容的保护 | |
| WO2014030427A1 (ja) | 情報処理装置、情報記憶装置、サーバ、情報処理システム、および情報処理方法、並びにプログラム | |
| EP2979392B1 (en) | A challenge-response method and associated client device | |
| US20130145481A1 (en) | Recording medium apparatus and controller | |
| US20100241855A1 (en) | Systems and Methods for Secure Execution of Code Using a Hardware Protection Module | |
| JP6146476B2 (ja) | 情報処理装置及び情報処理方法 | |
| KR20090064698A (ko) | 신뢰 플랫폼 모듈을 이용한 drm 방법 및 시스템 | |
| JP5983727B2 (ja) | 情報処理装置、情報記憶装置、情報処理システム、および情報処理方法、並びにプログラム | |
| JPWO2009044508A1 (ja) | 著作権保護システム、再生装置、及び再生方法 | |
| CN102396179B (zh) | 内容数据再现系统、以及记录装置 | |
| JP2013150179A (ja) | 情報処理装置、情報記憶装置、情報処理システム、および情報処理方法、並びにプログラム | |
| EP1887489A2 (en) | Hardware multimedia endpoint and personal computer | |
| JP2013146014A (ja) | 情報処理装置、情報記憶装置、情報処理システム、および情報処理方法、並びにプログラム | |
| JP2005275926A (ja) | ドライブ装置、情報処理装置、コンテンツ利用管理システム、および方法、並びにコンピュータ・プログラム | |
| JP2013146012A (ja) | 情報処理装置、情報記憶装置、情報処理システム、および情報処理方法、並びにプログラム | |
| HK1186593A (en) | Digital rights management system, devices, and methods for binding content to an intelligent storage device | |
| HK1186262A (en) | Digital rights management system and methods for provisioning content to an intelligent storage |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 201280002343.0 Country of ref document: CN |
|
| ENP | Entry into the national phase |
Ref document number: 2012548301 Country of ref document: JP Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 13814773 Country of ref document: US |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12832664 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12832664 Country of ref document: EP Kind code of ref document: A1 |