WO2004046936A1 - 記録システムおよび方法、記録装置および方法、入力装置および方法、再生システムおよび方法、再生装置および方法、記録媒体、並びにプログラム - Google Patents
記録システムおよび方法、記録装置および方法、入力装置および方法、再生システムおよび方法、再生装置および方法、記録媒体、並びにプログラム Download PDFInfo
- Publication number
- WO2004046936A1 WO2004046936A1 PCT/JP2003/013752 JP0313752W WO2004046936A1 WO 2004046936 A1 WO2004046936 A1 WO 2004046936A1 JP 0313752 W JP0313752 W JP 0313752W WO 2004046936 A1 WO2004046936 A1 WO 2004046936A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- recording
- bus
- protected
- unit
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00115—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers wherein the record carrier stores a unique medium identifier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00347—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier wherein the medium identifier is used as a key
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00507—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein consecutive physical data units of the record carrier are encrypted with separate encryption keys, e.g. the key changes on a cluster or sector basis
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00543—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein external data is encrypted, e.g. for secure communication with an external device or for encrypting content on a separate record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- Recording system and method recording device and method, input device and method, reproduction system and method, reproduction device and method, recording medium, and program
- the present invention relates to a recording system and method, a recording device and method, an input device and method, a reproduction system and method, a reproduction device and method, a recording medium, and a program.
- the present invention relates to a recording system and method, a recording device and method, an input device and method, a reproduction system and method, a reproduction device and method, a recording medium, and a program that can be protected flexibly.
- recording / reproducing devices for example, CD-RW drives
- legitimate recording / reproducing control and prevention of illegal copying are required to protect the contents.
- Japanese Patent Application Laid-Open Publication No. 2000-52021 proposes recording or reproducing data on or from a disc using a data format composed of user data and user control data. I have.
- the content is protected from unauthorized copying by encrypting and recording the user data portion with a key having a disk ID, which is an ID unique to the disk, applied thereto.
- Japanese Patent Application Laid-Open No. 2002-84271 discloses the recording / reproducing apparatus 1 shown in FIG.
- the recording / reproducing apparatus 1 includes a drive 11, an AV board 12, and a dedicated bus 13.
- the drive 11 has a recording / playback processing unit 21.
- the AV board 12 has an AV content processing unit 31, a content protection unit 32, and an input unit. 33 and an output section 34.
- the recording / reproducing processing section 21 acquires the disc ID and RKB (Renewal Key Block) unique to the optical disc 41, and transmits the AV board 12 via the dedicated bus 13 to the Supply to the content protection unit 32.
- the content protection unit 32 generates and stores a link using the disk key obtained from the obtained disk ID and RKB.
- the AV content processing unit 31 supplies to the content protection unit 32 the content which needs to protect the copyright received via the input unit 33 constituted by an antenna or the like.
- the content protection unit 32 encrypts the content with a key that has a previously stored disk ID and a key such as a disk key obtained from the RKB that acts, and records the content to be protected via the dedicated bus 13. It is supplied to the reproduction processing section 21.
- the recording / reproducing processor 21 receives the encrypted content and records it on the optical disc 41.
- the recording / reproducing processing unit 21 reproduces predetermined encrypted content from the optical disk 41 and supplies the content to the content protecting unit 32 via the dedicated bus 13.
- the content protection unit 32 decrypts the encrypted content with a key obtained by operating a disk key obtained from the disk ID and RKB, and supplies the decrypted content to the AV content processing unit 31.
- the AV content processing unit 31 decodes the decoded content by, for example, the Moving Picture Experts Group (MPEG) method and reproduces the decoded content.
- the output unit 34 outputs the reproduced content.
- MPEG Moving Picture Experts Group
- the drive 11 and the AV board 12 are connected via the dedicated bus 13 in the recording / reproducing device 1, they are not accessed externally and use the disk ID or RKB. Content can be protected.
- a recording / reproducing device 51 as shown in FIG. 2 can be considered.
- the parts corresponding to those in FIG. 1 are denoted by the corresponding reference numerals, and the description thereof will not be repeated. Therefore, in the case of FIG. 2, the drive 11 and the AV board 1 2 are separated via bus 6 1 (general purpose bus) (for example, It is separated by a home LAN (Local Area Network).
- bus 6 1 general purpose bus
- bus 6 1 for example, It is separated by a home LAN (Local Area Network).
- the HDD (Hard Disk Drive) 71 is connected to the path 61 to obtain the “disk ID”, “RKB j” and “disk ID and RKB” on the bus 61.
- the content encrypted using the encrypted disk key is downloaded (monitored) and copied to the HDD 71.
- the HDD 71 stores the 16B disk ID, several MB of RKB, 20 GB of encrypted content, and several KB of programs that were downloaded as described above. Have been.
- the HDD 71 provides the “disk ID”, “RKB” and “contents encoded using the disk ID and the disk key obtained from the RKB” to the AV board 12, the AV board 1 2 Cannot reproduce the content reproduced from the legitimate optical disc 41, so that the content is reproduced.
- the “spoofing program” may be commonly distributed as a replay-executable device or program.
- a recording / reproducing apparatus 81 for performing mutual authentication as shown in FIG. 3 is proposed.
- a mutual authentication unit 91 is provided in the drive 11 and a mutual authentication unit 92 is provided in the AV board 12, and the mutual authentication processing is executed between them to be shared. Content is transmitted and received by encrypting using the common key.
- the “disk ID”, “RKB” and “disk” are compatible with the optical disk recorded by the recording / reproducing device 1 or the recording / reproducing device 51 and does not have the mutual authentication function, the “disk ID”, “RKB” and “disk Even if the “content encrypted using the disk key obtained from the ID and RKB” is copied, it cannot be decrypted, making it virtually impossible to copy. Therefore, the above-described “spoofing drive” or “spoofing program” can be prevented.
- the HDD 71 of a general PC does not have a function of executing a mutual authentication process. Therefore, in the recording / reproducing device 81, only the specific content to be protected is stored in the HDD 71. In addition, there was a problem that it was not possible to copy even unprotected content for PC storage use. Disclosure of the invention
- the present invention has been made in view of such a situation, and aims to flexibly protect contents based on the necessity of protection.
- the input device includes a determination unit that determines whether or not the input content is to be protected, and the recording device transmits the content on the bus based on a result determined by the determination unit. It is characterized by comprising recording means for recording, on the recording medium, protection information indicating whether or not the content is to be protected in 1 / transmission of the content.
- the recording means records the protection information for each predetermined unit of the content. Can be.
- the predetermined unit may be 248 bytes.
- the recording device may further include an encryption unit that encrypts the content by applying the ID of the recording medium and the recording medium key when the determination unit determines that the content is to be protected.
- the recording apparatus may further include at least encryption means for encrypting the content by operating the recording medium key of the recording medium when the determination means determines that the content is not to be protected.
- the input device and the recording device may further include an authentication unit for mutually authenticating each other.
- the input device further includes a first encryption unit for encrypting the content before transmitting the content to the bus when the determination unit determines that the content is to be protected, and the recording device determines the content by the determination unit.
- the content recording apparatus may further include a second encryption unit that encrypts the content before recording the content by the recording unit.
- the first encrypting means can prohibit encrypting the content before transmitting the content to the bus.
- the input device determines whether to protect the input content, and the recording device should protect the content in transmission on the bus based on the determined result. It is characterized in that protection information indicating whether or not the content is content is recorded together with the content on a recording medium.
- the recording apparatus of the present invention is obtained by authenticating means for performing mutual authentication with another apparatus connected via a bus, and encrypted by a first encryption method supplied via a bus from another apparatus.
- Encryption means for encrypting the decrypted content by the second encryption method can be further provided.
- the encrypting means can encrypt the decrypted content by using the ID of the recording medium and the recording medium key.
- the recording means determines that the content is not content to be protected in transmission on the bus. It can be recorded together with the protection information shown.
- a second recording method of the present invention there is provided an authentication step of mutually authenticating with another device connected via a bus, and decoding of decrypted content supplied from another device via the bus. And a recording step of recording, on a recording medium, protection information indicating that the content is to be protected in transmission on the bus together with the content decrypted by the processing of the decrypting step.
- a program of a first recording medium includes an authentication step of mutually authenticating with another device connected via a bus, and decrypting an encrypted content supplied from another device via the bus. And a recording step of recording, on a recording medium, protection information indicating that the content is to be protected in transmission on the bus, together with the content decrypted by the processing of the decrypting step. I do.
- a first program according to the present invention includes an authentication step for mutually authenticating with another device connected via a bus, and a decryption for decrypting encrypted content supplied from another device via the bus. And a recording step of recording, on a recording medium, protection information indicating that the content is to be protected in transmission on the bus, together with the content decoded by the processing of the decoding step.
- the input device according to the present invention includes an authentication unit that performs mutual authentication with a recording device connected via a bus, and determines whether or not input content is content to be protected in transmission on the bus. To encrypt the content with the first encryption method. Encryption means; and supply means for supplying the content encrypted by the first encryption means to the recording device via a bus.
- the content encrypted by the first encrypting means may be further provided with a second encrypting means for encrypting the content by the second encrypting method.
- One of the first encryption means and the second encryption means can operate the ID of the recording medium and the recording medium key to encrypt the content.
- An input method includes an authentication step of mutually authenticating a recording device connected via a bus, and determining whether the input content is content to be protected in transmission on the bus. And an encryption step of encrypting the content, and a supply step of supplying the encrypted content by the processing of the encryption step to the recording device via a bus.
- the program of the second recording medium of the present invention is an authentication step of mutually authenticating with a recording device connected via a bus, and the input content is a content to be protected in transmission on the bus. It is characterized by including an encryption step of encrypting the content according to whether the content is encrypted, and a supply step of supplying the content encrypted by the processing of the encryption step to the recording device via the bus.
- a second program includes an authentication step of mutually authenticating with a recording device connected via a bus, and determining whether the input content is content to be protected in transmission on the bus. And a supply step of supplying the content encrypted by the processing of the encryption step to a recording device via a bus.
- the playback system is characterized in that the playback device includes: a playback unit that plays back the content from the recording medium and protection information indicating whether the content is content to be protected in transmission on the bus; Transmission control means for controlling transmission of content to an output device on the bus based on the protection information reproduced by the transmission device.
- the output device includes an output device for outputting the content transmitted by the transmission control device to the outside. It is characterized by having. The protection information can be recorded for each predetermined unit of content.
- the predetermined unit may be 248 bytes.
- the playback device may further include a decoding unit that decodes the content played back by the playback unit.
- the playback device may further include authentication means for authenticating the device on the bus.
- the playback device sends the content to the bus if the protection information indicates that the content is content to be protected during transmission on the bus and if the output device on the bus is authenticated by the authentication means.
- the output device may further include an encryption unit that encrypts the content, and the output device may further include a first decryption unit that decrypts the content encrypted by the encryption unit.
- the output device may further include second decryption means for decrypting the content decrypted by the first decryption means by applying the ID of the recording medium and the recording medium key.
- the transmission control means sends the content to the device on the bus. Can be prohibited.
- the reproduction apparatus reproduces, from a recording medium, content and protection information indicating whether or not the content is content to be protected in transmission on a bus, and the reproduced protection information
- the transmission of content to the output device on the bus is controlled based on the content, and the output device outputs the content transmitted from the playback device to the outside.
- a playback device includes a playback unit that plays back content from a recording medium and protection information indicating whether the content is content to be protected in transmission on a bus, and a protection unit that plays back the protection information played back by the playback unit.
- Other equipment via the bus Output control means for controlling output of content to the device.
- the protection information can be recorded for each predetermined unit of content.
- the predetermined unit may be 248 bytes.
- an authentication means for authenticating another device and an encryption means for encrypting the content wherein the protection information indicates that the content is content to be protected in transmission on the bus, and
- the encryption means can encrypt the content before sending the content to the bus.
- a second reproducing method comprises: a reproducing step of reproducing, from a recording medium, content and protection information indicating whether or not the content is content to be protected in transmission on a bus; An output control step of controlling output of the content to another device via the bus based on the reproduced protection information.
- the program of the third recording medium of the present invention comprises: a reproducing step of reproducing, from the recording medium, content and protection information indicating whether or not the content is content to be protected in transmission on the bus; An output control step of controlling output of content to another device via the bus based on the protection information reproduced by the processing.
- the third program of the present invention is a reproduction program for reproducing a content from a recording medium and protection information indicating whether the content is a content to be protected in transmission on a bus, and a reproduction step for reproducing the content.
- the input device may be an independent device or a block that performs input processing of the input recording device.
- the recording device may be an independent device, or may be a block that performs a recording process of a recording / reproducing device.
- mutual authentication is performed with another device connected via the bus. Then, the encrypted content supplied from another device via the bus is decrypted, and together with the decrypted content, protection information indicating that the content is to be protected in transmission on the bus is recorded on a recording medium. Recorded in.
- mutual authentication is performed with the recording device connected via the bus. Then, depending on whether or not the input content is content to be protected in transmission on the bus, the content is encrypted, and the encrypted content is supplied to the recording device via the bus. Is done.
- the content and the protection information indicating whether or not the content is content to be protected in transmission on the bus are reproduced from the recording medium by the reproducing device, and based on the reproduced protection information.
- transmission of content to an output device on the bus is controlled.
- the output device outputs the content sent from the playback device to the outside.
- the playback device may be an independent device or a block that performs a playback process of the recording and playback device.
- the output device may be an independent device or a block that performs output processing of the reproduction output device.
- content and protection information indicating whether the content is content to be protected in transmission on a bus are reproduced from a recording medium, Output of content to other devices via the bus is controlled based on the reproduced protection information.
- FIG. 1 is a block diagram showing a configuration example of a conventional recording / reproducing apparatus.
- FIG. 2 is a block diagram showing another configuration example of the conventional recording / reproducing apparatus.
- FIG. 3 is a block diagram showing still another configuration example of the conventional recording / reproducing apparatus.
- FIG. 4 is a block diagram showing a configuration example of a recording / reproducing apparatus to which the present invention is applied.
- FIG. 5 is a diagram showing a configuration example of the data format of the present invention.
- FIG. 6 is a diagram showing a configuration example of the data frame of FIG.
- FIG. 7 is a diagram showing a configuration example of the scrambled data frame of FIG.
- FIG. 8 is a diagram showing a configuration example of the user control data of FIG.
- FIG. 9 is a block diagram showing an example of a configuration of the content protection unit 132 of FIG.
- FIG. 10 is a tree structure diagram for explaining the disk key of the present invention.
- FIG. 11A is a diagram illustrating an example of RKB used for the disk key of the present invention.
- FIG. 11B is a diagram for explaining an example of RKB used for the disk key of the present invention.
- FIG. 12 is a diagram illustrating an example of use of the RKBs in FIG. 11A and FIG. 11B.
- FIG. 13 is a flowchart illustrating the mutual authentication processing of the AV board in FIG.
- FIG. 14 is a flowchart for explaining the mutual authentication processing of the drives in FIG.
- FIG. 15 is a flowchart for explaining the recording request processing of the AV board in FIG.
- FIG. 16 is a flowchart illustrating the block key generation processing in step S103 of FIG.
- FIG. 17 is a flowchart illustrating a disk information reproducing process of the drive in FIG. 4 corresponding to the process in FIG.
- FIG. 18 is a flowchart illustrating the recording processing of the drive in FIG.
- FIG. 19 is a flowchart illustrating the playback processing of the drive in FIG.
- FIG. 20 is a flowchart for explaining the AV board reproduction processing of FIG.
- FIG. 21 is a block diagram showing another configuration example of the recording / reproducing apparatus of FIG.
- FIG. 22 is a flowchart for explaining the recording process of the drive in FIG.
- FIG. 23 is a flowchart illustrating the playback processing of the drive in FIG.
- FIG. 24 is a block diagram showing another configuration example of the recording / reproducing apparatus of the present invention.
- FIG. 25 is a block diagram showing a configuration example of the content protection unit 411 in FIG.
- FIG. 26 is a flowchart for explaining the block key generation processing of the drive in FIG. 24. '
- FIG. 27 is a flowchart for explaining the recording request processing of the AV board in FIG.
- FIG. 28 is a flowchart illustrating the recording process of the drive in FIG.
- FIG. 29 is a flowchart illustrating the playback processing of the drive in FIG.
- FIG. 30 is a flowchart for explaining the AV port reproducing process of FIG.
- FIG. 31 is a block diagram showing another configuration example of the recording / reproducing apparatus of FIG.
- FIG. 32 is a flowchart illustrating the recording processing of the drive in FIG. 31.
- FIG. 33 is a flowchart illustrating the playback processing of the drive in FIG. 31.
- FIG. 34 is a block diagram illustrating another configuration example of the recording / reproducing apparatus of the present invention. BEST MODE FOR CARRYING OUT THE INVENTION
- FIG. 4 shows a configuration example of a recording / reproducing device 101 to which the present invention is applied.
- a drive 1 1 1, an AV port 1 1 2, and an HDD (hard disk drive) 1 1 4 are connected to a bus 1 13 represented by a home LAN (Local Area Network).
- the drive 111, the AV board 112, and the HDD 114 are sold separately and are connected to the bus 113 by the user.
- the drive 111 and the AV board 112 have their own private and public keys, respectively.
- the registration of the public key and the private key is performed in advance at the time of shipment, for example, by a means.
- the public key is It is stored in the digital signature issued by the certificate authority.
- a public key encryption method such as RSA is used for the transfer of content between the drive 111 and the AV board 1'12.
- the secret key and the corresponding public key have a relationship in which a cipher text generated based on one key can be decrypted using the other key.
- the drive 111 is a mutual authentication unit that executes mutual authentication processing with other devices (in the case of the example in FIG. 4, the AV board 112), and controls each part of the drive 111. It comprises an output control section 122 and a recording / reproducing processing section 123 for recording or reproducing content on / from the optical disc 141 mounted on the drive 111.
- the AV board 112 is a mutual authentication unit that executes mutual authentication processing with other devices (in the example of FIG. 4, the drive 111), and content protection that encrypts the content stored on the optical disk 141.
- the unit 132 includes an AV content processing unit 133 that receives contents via an input unit 134 constituted by an antenna or the like, decodes the contents, and outputs the decoded contents to an output unit 135.
- the mutual authentication unit 121 of the drive 111 executes a mutual authentication process with the mutual authentication unit 131 of the AV board 112. More specifically, when the drive 1 1 1 and the AV board 1 1 2 are connected and their power is turned on, the mutual authentication unit 1 31 of the AV board 1 1 2 (Not shown), generates a common key, encrypts the generated common key with the public key of drive 111, and encrypts the common key with the secret key of AV port 112. Generate a signature for.
- the mutual authentication unit 131 reads the AV board electronic certificate acquired and stored in advance from the certificate authority from the built-in memory, and decrypts the common key and the common key using the AV board 112. The signature on the key and the digital certificate of the AV board are sent to the drive 1 1 1 via the bus 1 1 3.
- the mutual authentication unit 121 of the drive 111 receives these, decrypts the encrypted common key with the secret key of the drive 111, and obtains a common key (first common key).
- the AV board digital certificate is decrypted with the certificate authority public key obtained in advance from the certificate authority, and it is confirmed that the AV board 112 is a valid AV board.
- Mutual Authentication Department 1 2 1 uses the public key of the AV board 112 obtained from the decrypted AV board digital certificate to decrypt the signature on the common key and obtain a common key (second common key).
- the mutual authentication unit 1 2 1 of the drive 1 1 1 1 compares the first common key with the second common key, and if the two are determined to be equal, the common key has been falsified on the bus 1 1 3. Judge that there is no. Thus, the common key is shared between the drive 111 and the AV board 112.
- the mutual authentication unit 1 2 1 of the drive 1 1 1 1 1 executes the mutual authentication processing with the mutual authentication unit 1 3 1 of the AV board 1 1 2, and performs mutual authentication of the AV board 1 1 2. Testify.
- the mutual authentication unit 122 and the mutual authentication unit 131 can mutually encrypt and transmit the content and decrypt the received content using the common key.
- the HDD 114 does not have a mutual authentication function like the mutual authentication unit 13 1 of the AV board 112. Therefore, the HDD 111 can send and receive free content (content that does not need to be protected) to and from the drive 111 without any problem (there is no need to protect it). Can be.
- the AV content processing unit 13 3 of the A board 112 receives a broadcast signal (a signal corresponding to encrypted or scrambled content) via the input unit 134, it is stored in advance.
- the content encrypted or scrambled by the key (the key shared with the device that transmits the broadcast signal) is decrypted and supplied to the content protection unit 132.
- the AV content processing unit 133 determines whether the input content is content to be protected based on whether the input content is encrypted or scrambled. can do.
- “Copy Free (copy permitted)” “Copy Once (—generation only can be copied)”
- “No More Copy ( Copy generation management information) “Copy Prohibited”. Examples are: When CCI (Copy Control Information) such as CGMS (Copy Generation Management System) signal is added, if the copy generation management information is Copy FreeJ, the input content is not content to be protected. However, in the case of "Copy OnceJ", “No More CopyJ” or “Copy ProhibitedJ", it may be determined that the input content is content to be protected.
- CCI Copy Control Information
- CGMS Copy Generation Management System
- the content protection unit 13 2 inputs the content from the AV content processing unit 13 3, and if the AV content processing unit 13 3 determines that the content is content to be protected, the mutual authentication unit 1 3 Obtains a disk key with the RKB of the optical disk 14 1 supplied from 1 acting on it, and generates a block key based on the obtained disk key and the disk ID of the optical disk 14 1. Using the block key, the content protection unit 132 encrypts the content to be protected to protect the content on the optical disc 141, and supplies the encrypted content to the mutual authentication unit 131. The mutual authentication unit 13 1 encrypts the content encrypted by the content protection unit 13 2 using the common key with the drive 11 1 to protect the content on the bus 11 13, and the bus 1 1 3 Output to drive 1 1 1 via
- the AV content processing unit 13 3 determines that the content is not content to be protected, the content protection unit 13 2 and the mutual authentication unit 13 1 do not encrypt the content, and Output to drive 1 1 1 via 3.
- the mutual authentication unit 1 2 1 of the drive 1 1 1 inputs contents from the AV board 1 1 2 via the bus 1 1 3. Further, when the input content is encrypted, the mutual authentication unit 121 decrypts the content with a common key for the drive 111 and supplies the decrypted content to the recording / reproducing processing unit 123.
- the input / output control unit 122 encrypts the content input to the mutual authentication unit 121 with the common key with the AV board 112 by the mutual authentication unit 131 of the AV port 112.
- On the bus 113 based on whether or not the content is protected (ie, whether or not the content is to be protected by the AV content processing unit 133). To determine whether the content is to be protected. Then, the input / output control unit 122 determines whether or not the input content is content to be protected on the bus 113 and whether the input content is compatible with the AV port 112 by the mutual authentication unit 122.
- Content recording control is performed by the recording / reproducing processing unit 123 based on whether mutual authentication has been performed between them.
- the input / output control unit 122 determines whether or not the input content is content to be protected, and performs mutual authentication with the AV board 112 by the mutual authentication unit 121.
- the recording / reproducing processing section 123 is controlled based on whether or not the disc information has been recorded, and the disc information recorded on the optical disc 141 and the disc information of the optical disc 144 such as RKB (Renewal Key Block) are reproduced.
- the recording / reproducing processing unit 123 determines whether the content to be recorded is the content to be protected or the content to be protected on the bus 113 based on the instruction of the input / output control unit 122.
- the protection information indicating whether the content does not need protection is generated on the bus 113, and the protection information is recorded on the optical disk 141 together with the content.
- FIG. 5 shows a configuration example of the data format recorded on the optical disk 141.
- 2 K (2048) bytes per frame are 32 frames of user data 201, and 18 bytes per frame are 32 frames of user control data. 2022 constitutes 32 sectors.
- the user data 201 is composed of content data and the like.
- four (4 bytes) EDCs error detection codes
- one data frame is composed of 2052 bytes. That is, one data frame is composed of 204 user data bytes, numbered Ud0 to Ud247, numbered ed2048 to ed2051 4 EDs that were shaken. It consists of.
- the data frames 203 are collected for 32 frames, and are configured as scrambled data frames 205 as shown in FIG. 7 based on the physical addresses 204 arranged in 16 ⁇ 9 bytes.
- the first frame (in the leftmost column in the figure) is numbered d (0, 0), d (1, 0),..., d (2051, 0).
- the second frame (in the second row from the left in the figure) is composed of d (0, 1) d (1, 1), ⁇ -, d (2051 , 1) are composed of 2052 bytes.
- the first frame is composed of 20 52 bytes numbered d (0, F), d (1, F), ⁇ , d (2051, F).
- the second frame (in the rightmost column in the figure) is numbered d (0, 3 1), d (1, 3 1),... d (2 0 5 1, 3 1) It consists of 2052 bytes.
- a data block 206 of 2 16 rows and 304 columns is formed.
- an LDC (long-distance code: error correction) block 207 is formed.
- an LDC cluster 208 of 1502 lines is formed.
- the LDC cluster 208 is divided into four LDC rows 209—1 to 209—14, each having 38 rows, and ECC is performed by a BIS row 213—1 to 213—13 described later. Construct cluster 2 2 1
- the user control data (logical address and control data) 202 is arranged in 32 ⁇ 18 bytes as shown in FIG.
- the first frame (in the leftmost column in the figure) is numbered UC (0, 0) UC (1, 0), ⁇ ⁇ , UC (1, 7, 0).
- UC (0, 1), UC (1, 1), ' ⁇ , UC (17) , 1) is composed of 18 bytes.
- S the first frame consists of 18 bytes numbered UC (0, S), UC (1, S),..., UC (17, S), and 3 2 Th
- the frame (in the rightmost column in the figure) is composed of 2052 bytes numbered UC (0, 31), UC (1, 31),..., UC (17, 31). Is done.
- 2 K (2 048) bytes of user data 201 and 18 bytes of user control data 202 correspond to each frame unit. Therefore, protection information indicating whether or not the data (content) recorded in the user data 201 (2 Kbytes) is content to be protected on the bus 113 is generated.
- the content to be recorded is content to be protected on the bus 113
- the least significant bit of the first byte UC (0, S) of the user control data 202 (18 bytes) is used as protection information. Then, “0” is generated and recorded. If the content to be recorded does not need to be protected on the bus 113, the least significant bit of the first byte UC (0, S) of the user control data 2 ⁇ 2 (18 bytes) is used as protection information. A “1” is generated and recorded in the bit. Note that in the existing data format, “0” is originally stored in the least significant bit of the first byte UC (0, S) of the user control data 202 (18 bytes) (not yet). Have been used).
- the information to be protected is stored on the bus 113, so that the compatibility with the existing content is maintained. be able to. It is also possible to set the protection information for content that needs protection to “1” and the protection information for content that does not need protection to be “0”. However, in such a case, all the existing contents become unprotected contents on the bus 113 and cannot be practically protected. Therefore, it is preferable to set the protection information of the content requiring protection to “0i” and the protection information of the content not requiring protection to “1”.
- the physical address 204 is arranged in 16 ⁇ 9 bytes. This physical address The space 204 relates to the physical distance on the disk 141.
- An access block 210 of 24 columns ⁇ 30 rows is formed based on the physical address 204 of the user control data of 32 ⁇ 18 bytes.
- the access block 210 is added with 32 rows of parity, and forms a BIS (burst indication subcode) block 211.
- the BIS blocks 2 1 1 are arranged in a 3 column X 4 9 6 row of BIS clusters 2 1 2.
- the BIS clusters 2 1 2 are filled into three BIS rows 2 1 3-1 to 2 1 3-3, respectively, between the L DC rows 209-1 to 209-4, An ECC cluster 2 2 1 of 5 5 columns x 4 9 6 rows is formed. From the ECC cluster 222, a physical cluster 222 is formed by a combination of 42 data of 45 channel bits (data) and control data of one channel bit (dc contr.), And the optical disk 1 4 Recorded in 1.
- This physical cluster 222 is grouped into 4996 recording frames of 1932 channel bits (1288 data bits). Note that, out of the first data (data) of the physical cluster 222, the 20 channel bits are a group of synchronization bits (Frame Sync).
- the content to be recorded is the content to be protected on the bus 113 by the recording / reproduction processing unit 123
- “0” is generated (stored) as protection information
- the content to be recorded is recorded.
- “1” is generated (stored) as protection information, and the generated protection information is recorded in the user control data 202.
- a BIS error correction operation As an error correction operation when reproducing the content recorded on the optical disc 144 of this data format, generally, a BIS error correction operation is performed, and the result of the BIS error correction operation is used as an LDC error correction operation. Used as erasure information when performing a correction operation. Therefore, before the LDC error correction operation is completed and user data can be output. Since the BIS error correction operation has been completed, the user control data included in the BIS has already been obtained. Therefore, the user Output control of user data is possible using troll data.
- the protection information recorded on the optical disk 14 1 is reproduced by the recording / reproduction processing unit 12 3 before the content is reproduced when reproducing the content recorded on the optical disk 14 1.
- the input / output control unit 122 controls output of the content to the bus 113 based on the reproduced protection information.
- the input / output control unit 122 determines whether or not mutual authentication has been performed with the AV board 112 by the mutual authentication unit 121, and whether the reproduced content is protected on the bus 113. Based on whether or not the content should be protected (the protection information is “0”), the output of the content to the bus 113 is controlled by the mutual authentication unit 121. Based on the control of the input / output control unit 122, the mutual authentication unit 122 encrypts the reproduced content with a common key for the drive 111, and performs AV Output to ports 1 1 and 2.
- the mutual authentication unit 131 of the AV 'board 112 decrypts the content, and the content protection unit 131 3 to 2
- the content protection unit 1332 applies the content decrypted by the mutual authentication unit 1331 using the common key with the AV board 112 to the disk ID and disk key of the optical disk 1411.
- the data is decrypted by the block key and supplied to the AV content processing unit 133.
- the AV content processing unit 133 decodes the decoded content by, for example, the Moving Picture Experts Group (MPEG) method and reproduces the decoded content.
- the output unit 135 outputs the reproduced content.
- MPEG Moving Picture Experts Group
- the AV board 112 is mutually authenticated with the drive 111, the content that should be protected by copyright (content to be protected) or the content that does not need to be protected can be transmitted and received by each other. can do.
- FIG. 9 shows a configuration example of the content protection unit 132.
- FIG. 9 shows only the content protection unit 132 and the optical disk 141 for convenience of explanation, in actuality, there is no diagram between the content protection unit 132 and the optical disk 141.
- a mutual authentication unit 131, a bus 113, a mutual authentication unit 121, and a recording / reproducing processing unit 123 execute respective processes.
- the content protection unit 1332 includes a 1118 processing unit 252, a key generation unit 253, and an encryption unit 2554.
- the RKB processing unit 252 performs the RKB and content supplied from the optical disc 144 based on the information as to whether or not the content input from the AV content processing unit 133 is the content to be protected.
- a disk key is obtained by operating a device ID and a device key stored in advance in the protection unit 132 (this processing for obtaining a disk key is described in Japanese Patent Application Laid-Open No. 2002-84227). And further detailed below with reference to FIGS. 10 to 12).
- the key generation unit 253 stores the disk key obtained by the RKB processing unit 252, the disk ID supplied from the optical disk 141, and the recording information stored in the content protection unit 132. (For example, information used when recording such as a block seed, title key, or recording mode) to generate a block key.
- the encrypting unit 25 4 decrypts the encrypted content using the block key generated by the key generating unit 25 3, and Output to the content processing section 1 3 3.
- the encryption unit 254 outputs the content as it is to the AV content processing unit 133.
- the encryption unit 254 is supplied from the AV content processing unit 133 based on information on whether or not the content input from the AV content processing unit 133 is content to be protected. If the content to be protected is content that should be protected, the content is encrypted using the block key generated by the key generation unit 25 3 for content protection on the optical disc 141, and supplied to the optical disc 141. I do.
- the encryption unit 254 supplies the content as it is (without encryption) to the optical disk 141.
- FIG. 10 is a diagram showing a key distribution configuration of the recording / reproducing device 101 of the present invention. Numbers 0 to 15 shown at the bottom of FIG. 10 correspond to the individual recording / reproducing devices (devices). That is, each leaf of the tree structure shown in FIG. 10 corresponds to a recording / reproducing device.
- Each of the devices 0 to 15 has a key (node key) assigned to a node from its own leaf to the root (top row) in a preset initial file at the time of manufacture (shipment) and Store the leaf key for each leaf yourself.
- K 0000 to K 1 1 1 1 force shown at the bottom of FIG. 10 These are leaf keys assigned to each of the devices 0 to 15 and are described in the second node (node) from the bottom, starting from the top KR. Keys KR to K 1 1 1 are node keys.
- device 0 owns leaf key K0000 and node keys K000, K00, 0, KR.
- Device 5 owns K0101, K0110, $ 01, K0, and KR.
- Device 15 owns Kl l l l, 11 1, K 11, K 1, KR.
- the tree structure is also shown as a balanced symmetrical configuration of 4-stage configuration. However, more devices are configured in the tree. Also, each section of the tree may have a different number of stages.
- Each recording / reproducing device included in the tree structure of FIG. 10 includes various recording media, For example, various types of recording / reproducing devices using DVD, CD, MD (trademark), Memory Stick (trademark) and the like are included. Furthermore, it is assumed that various application services coexist. On such a coexistence configuration of different devices and different applications, a key distribution configuration as shown in FIG. 10 is applied.
- devices 0, 1, 2, and 3 are a group using the same recording medium. Is set.
- four devices 0, 1, 2, and 3 included in one group have a common key KOO, ⁇ 0, KR as a node key.
- the common node key # 0 itself is set as the master key, it is possible to set a common master key only for devices 0, 1, 2, and 3 without sending a new key.
- the value Enc (K00, Kmaster) obtained by encrypting the new master key Kmaster with the node key ⁇ 00 is stored via the network or in a recording medium, and is stored in the devices 0, 1, 2, and 3.
- Enc (Ka, Kb) indicates that Kb is data encrypted by Ka.
- K (t) aaa indicates that the generation of the key Kaaa is an update key of t.
- a table composed of block data called RKB (Renewal Key Block) shown in Fig. 11A is stored on a network or a recording medium and supplied to devices 0, 1, and 2. Performed by RKB (Renewal Key Block) shown in Fig. 11A.
- the RKB shown in Fig. 11A is configured as block data that has a data structure that can be updated only by devices that need to update the node key.
- FIG. 11A shows an example of block data formed for the purpose of distributing an updated node key of generation t to devices 0, 1, and 2 in the tree structure shown in FIG. As described above, device 0 and device 1 use K (t) ⁇ ⁇ , ⁇ as the update node key.
- the RKB contains multiple encryption keys.
- the encryption key at the bottom is En c (K0010, K (t) 00 1).
- This is the updated node key K (t) 00 1 encrypted with the leaf key K001 0 of device 2, and device 2 decrypts this encrypted key with its own leaf key to obtain K (t) 00 1. be able to.
- the encryption key Enc (K (t) 00 1, K (t) 00) in the second stage from the bottom in FIG. 11A can be decrypted.
- the updated node key K (t) 00 can be obtained.
- the node key K000 is not included in the object to be updated, and the devices 0, 1 1 that are required as the update node keys are ⁇ (t) 00, K (t) 0,
- the devices 0 and 1 are the third encryption key En c (K0 0 0, K (t) 00) is decrypted, and K (t) 00 is obtained.
- the encryption key E nc (K (t) 0 0, K (t) 0) to obtain an updated node key K (t) 0,
- the first encryption key Enc (K (t) 0, K (t) R from the top of Fig. 11A) ) To obtain K (t) R.
- devices 0, 1, and 2 can obtain the updated key K (t) R.
- the index in Fig. 11A indicates the absolute address of the node key and leaf key used as the decryption key.
- the R KB in Fig. 11B can be used.
- the updated node key K (t) 00 can be distributed to devices 0, 1, and 2.
- the RKB shown in Fig. 11B can be used, for example, when distributing a new master key shared by a specific group.
- Fig. 10 uses a recording medium with devices 0, 1, 2, and 3 in the group indicated by dots and lines, and requires a new common master key K (t) master. Suppose there is. At this time, device 0,
- devices 0, 1, 2, and 3 can obtain the master key K (t) master at time t by decrypting the above ciphertext using K (t) 00 obtained by processing the RKB. Will be possible.
- the master key is transmitted to each recording / reproducing device using the RKB, and the recording / reproducing device records and reproduces data using the master key.
- a master key a disk key limited to only a recording medium is used. This disk key is recorded as shown in Figure 12. Generated using the recording medium's R KB (Renewal Key Block). Note that the disk key K (t) media limits the master key to only its recording medium, and its basic configuration is the same as the above-mentioned master key, and therefore, description thereof is omitted.
- the device 0 uses the generation stored in the recording medium: the RKB at time t, the leaf key K0 00 0 stored in advance, and the node keys K0 0 0 and K0 0.
- the K (t) rae dia obtained here is used when recording and reproducing data on the recording medium.
- This disc key acquisition process may be performed, for example, when the optical disc 14 1 is mounted on the drive 1 11 of the recording / reproducing device 101 for recording or reproducing content.
- the program may be executed when the optical disk 141 is mounted and recording or reproduction of content is instructed.
- the mutual authentication process of the AV board 112 of the recording / reproducing apparatus 101 will be described with reference to the flowchart of FIG.
- step SI 1 the mutual authentication unit 1 3 1 of the AV board 1 1 2 converts the random number of the built-in random number generator into a random number. Generate a secret key based on the secret key.
- step S12 the mutual authentication unit 1331 decrypts the generated common key with the public key of the drive 111.
- step S13 the mutual authentication unit 1331 generates a signature for the common key encrypted with the secret key of the AV board 112.
- step S14 mutual authentication The unit 1331 reads an AV board digital certificate obtained and stored in advance from a certificate authority (not shown) from a built-in memory.
- step S15 the mutual authentication unit 1331 transmits the encrypted common chain, the signature of the common key by the AV board 112, and the digital certificate of the AV board via the bus 113. Send to the drive 1 1 1.
- the encrypted common key, the signature on the common key by the AV board 112, and the AV board digital certificate are transmitted from the AV board 112 to the drive 111.
- the mutual authentication process of the drive 111 corresponding to the mutual authentication process of the AV board 112 will be described with reference to the flowchart of FIG.
- step S31 the mutual authentication unit 122 of the drive 111 decrypts the received AV board digital certificate based on the certificate authority public key that has been acquired in advance or acquired each time.
- step S32 the mutual authentication unit 122 determines whether the AV board 112 is a valid AV port based on the AV board digital certificate decrypted in step S31. If the AV board digital certificate cannot be decrypted or has been tampered with, it is determined in step S32 that the AV board 112 is not a valid AV board, and the process ends.
- step S32 If it is determined in step S32 that the AV board 112 is a valid AV board, the public key of the AV board 112 is obtained by decrypting the AV board electronic certificate.
- step S33 the mutual authentication unit 121 decrypts the decrypted common key by using the secret key of the drive 111.
- step S34 the mutual authentication unit 121 decrypts the signature on the common key by the AV board 112 using the public key of the AV board 112.
- step S35 the mutual authentication unit 122 compares the common key decrypted in step S33 with the common key attached to the signature in plain text, and determines whether or not the two match. As a result, it is determined whether or not the common key is a valid common key. If it is determined in step S35 that the common key matches the common key of the signature, the mutual authentication unit 121 determines that a valid common key has been transmitted from the AV board 112, and proceeds to step S36. In, the common key is stored. Meanwhile, step If it is determined in S35 that the common key does not match the common key of the signature, the mutual authentication unit 121 modifies the common key between the AV board 112 and the drive 111. And ends the processing.
- the mutual authentication is performed between the drive 111 and the AV board 112, and the subsequent processing is executed in a state where the common key is shared.
- the mutual authentication unit 1 2 1 of the drive 1 1 1 1 encrypts the common key obtained from the AV board 1 1 2 with the public key of the drive 1 1 1
- the signature by 1 11 and the drive digital certificate may be transmitted to the AV board 112 so that the AV board 112 authenticates it.
- step S101 the AV content processing unit 133 waits until content is input.
- the AV content processing unit 133 Upon receiving a broadcast signal (a signal corresponding to the content) via the input unit 134 constituted by an antenna or the like, the AV content processing unit 133 receives the content in step S101.
- step S102 it is determined whether or not the input content is content to be protected based on whether or not the input content is encrypted or scrambled.
- step S102 if the AV content processing section 133 determines that the content is content to be protected, the AV content processing section 133 replaces the encrypted or scrambled content with a key (broadcast signal) stored in advance.
- step S103 the AV content processing unit 133 causes the content protection unit 132 to execute a block key generation process.
- This block key generation processing will be described with reference to the flowchart in FIG.
- the drive information acquisition process of the drive 111 corresponding to the block key generation process in the AV board 112 of FIG. 16 will also be described with reference to the flowchart of FIG.
- step S121 the RKB processing unit 252 A request to read disk information (eg, disk ID and RKB) is output to drive 111.
- the RKB processing unit 252 outputs a request for reading the disk ID of the optical disc 1411 and the RKB to the mutual authentication unit 1331.
- the mutual authentication unit 131 outputs a request for reading the disk ID and RKB to the mutual authentication unit 122 of the drive 111 via the bus 113.
- step S141 the mutual authentication unit 121 of the drive 111 reads the disk ID and RKB of the optical disk 141 from the AV board 112 via the bus 113. To receive.
- step S142 the input / output control unit 122, based on the information from the mutual authentication unit 121, sends the disk ID and RKB read request to the AV board 112, 1 1 It is determined whether or not mutual authentication has been performed. If it is determined in step S142 that the AV board 112 is not mutually authenticated in the drive 111, the disc information reproduction processing of the drive 111 ends. As a result, requests from unauthorized devices are rejected.
- step S142 since the AV board 112 is mutually authenticated in the drive 111, it is determined in step S142 that the AV board 112 is mutually authenticated in the drive 111. Is done. In this case, in step S143, the recording / reproducing processing unit 123 reproduces the disk ID and the RKB recorded on the optical disk 141, and supplies them to the mutual authentication unit 122.
- step S144 the mutual authentication unit 122 encrypts the disk ID and RKB supplied by the recording / reproducing processing unit 123 using a common key with the AV board 112, and Output to AV board 1 1 2 via 1 3.
- step S122 the mutual authentication unit 1311 of the AV port 112 receives the encrypted disk ID and RKB via the bus 113, and receives the common key with the drive 111. And supplies it to the RKB processing unit 25 1.
- the RKB processing unit 251 operates the supplied RKB and the device ID and device key stored in the built-in memory in advance, Obtain a disk key.
- the RKB process ⁇ P 2 51 1 encrypts the disk key K (t) media from the supplied R KB with the key K (t) ⁇ 0 and encrypts Enc (K (t) 00 , K (t) media), and decrypts it to obtain the disk key K (t) media.
- step S124 the key generation unit 2553 stores the disk ID supplied from the mutual authentication unit 131, the disk key obtained in step S123, and the record of the content protection unit 132.
- the block key is generated by applying information or the like, and is stored in a memory or the like built in the encryption unit 254.
- the encryption unit 254 uses the content supplied from the AV content processing unit 133 in step S1 Encrypt with the block key generated in 124 and output to mutual authentication unit 13 1.
- step S105 the mutual authentication unit 1331 encrypts the content decrypted with the block key in step S104 using the common key with the drive 111, and in step S105, At 106, it outputs to the drive 111 via the bus 113.
- step S 102 if it is determined in step S 102 that the content input from the AV content processing section 133 is not required to be protected, the content is encrypted in the encryption section 254 (the optical disc 1). 4 Protected on 1) There is no need, and encryption is also required for the mutual authentication unit 13 1 (protected on the bus 113). Therefore, the processing in steps S103 to S105 is not necessary. Is skipped. In other words, the encryption unit 255 does not encrypt the content (as raw data). ) And output to the mutual authentication unit 13 1. In step S106, the mutual authentication unit 1331 outputs the unencrypted content to the drive 111 via the bus 113.
- the content to be protected is encrypted using the block key with the RKB and the disk ID. Furthermore, the content to be protected is temporarily encrypted with a common key with the drive 111 and output to the bus 113. Unprotected content is output to the bus 113 as raw data.
- the recording process of the drive 111 executed corresponding to this will be described with reference to the flowchart of FIG.
- step S161 the mutual authentication unit 121 of the drive 111 receives the content from the AV board 112 via the bus 113.
- step S162 the input / output control unit 122 determines whether or not the device that has input the content has been mutually authenticated in the drive 111 based on the information from the mutual authentication unit 121. Judge. If it is determined in step S 162 that the AV board 112 has been mutually authenticated in the drive 111, in step S 163, the input / output control unit 122 becomes the mutual authentication unit. 12 1 Based on whether or not the content input to 1 is encrypted with a common key, it is determined whether the input content recording command is a content recording command to be protected on the bus 113. to decide.
- step S166 If it is determined in step S166 that this content recording command is a content recording command to be protected on the bus 113, in step S166, the input / output control unit 122 is It controls the mutual authentication unit 121 so that the received content is decrypted with the common key with the AV board 112. Therefore, this content is now encrypted only with the block key that has acted on the disk ID and RKB.
- the input / output control unit 122 controls the recording / reproduction processing unit 123.
- step S165 the UC (0, S) of the user control data corresponding to the content is set.
- step S 168 protection information “0” indicating that the content is to be protected on the bus 113 is generated and stored, and in step S 168, the content is decrypted with the block key and recorded on the optical disc 141. Let it.
- step S 161 the content stored in the HDD 114 having no mutual authentication unit is input.
- step S 162 the content is received from the HDD 114 by the mutual authentication unit 122 via the bus 113. Since the HDD 114 does not have a mutual authentication unit, it is determined in step S162 that the device that has input the content has not been mutually authenticated in the drive 111, and the processing proceeds to step S166. Proceed to.
- step S166 the input / output control unit 122 sets the input content recording command based on whether or not the content input to the mutual authentication unit 122 is encrypted with a common key. It is determined whether or not the command is a recording command of the content to be protected on the bus 113.
- step S163 If it is determined in step S163 or in step S166 that the input content recording command is a recording command for content that does not need protection on bus 113, in step S167, The input / output control unit 122 controls the recording / playback processing unit 123 to protect the UC (0, S) of the user control data corresponding to the content that does not need protection on the bus 113.
- Information “1” is generated (stored), and the generated protection information is recorded on the optical disk 141 together with the unencrypted content in step S 168.
- step S166 If it is determined in step S166 that the input recording command of the content is a recording command of the content to be protected on the bus 113, an error occurs, and the recording process of the drive 111 stops. , Forced termination. Therefore, in the drive 111, content from the HDD 114 that is not mutually authenticated is not recorded as content to be protected on the bus 113.
- the content to be protected from the mutually authenticated AV board 112 is protection information "0" indicating that the content is to be protected on the bus 113. It is recorded on the optical disk 14 1.
- the content to be protected is encrypted using a block key with the disk ID and RKB.
- Unprotected content from a mutually certified AV board 112 or unprotected content from an HDD 114 that is not mutually certified is unprotected content on the bus 113. It is stored on the optical disk 14 1 together with the protection information “1” that there is. In this case, unprotected content is not encrypted.
- the protection information stored as described above is reproduced and used by the content reproduction processing of the drive 111 described below. The content reproduction process of the drive 111 will be described with reference to the flowchart of FIG.
- the user In order to output the content to be protected recorded on the optical disk 141 from the output unit 135 of the AV board 112, the user operates the AV board 111 via an operation input unit (not shown). 2. Enter the content playback command.
- the mutual authentication unit 13 1 of the AV board 112 sends a playback command to the drive 111 via the bus 113, so in step S 191, the mutual authentication unit 1 2 1 inputs a playback command from the AV board 112.
- step S 192 the input / output control unit 122, based on the information of the mutual authentication unit 121, outputs the content output device (in this case, the AV board 112) power S, It is determined whether or not the drive 1 is mutually authenticated. If it is determined in step S192 that the AV boards 112 are mutually authenticated, in step S193, the input / output control unit 122 determines that the playback command from the AV board 112 has been issued. Is a playback command of the content to be protected. If it is determined in step S193 that the playback command from the AV port 112 is a playback command for the content to be protected, in step S194, the recording / playback processing unit 123 is executed. Plays the content specified from the optical disk 14 1.
- the protection information (user control data) recorded on the optical disc 144 is In step S195, the input / output control unit 122 determines whether the UC (0, S) power S of the user control data corresponding to the content is "0". If the UC (0, S) corresponding to the content is determined to be “0”, this content is content to be protected on the bus 113, so that step S 1 In 96, the input / output control unit 122 controls the mutual authentication unit 122, encrypts the reproduced content using the common key with the AV board 112, and connects the bus 113. Output to AV board 1 1 2 via Therefore, unauthorized data acquisition (hacking) on the bus 113 is prevented.
- step S195 when it is determined that the UC (0, S) power S corresponding to the content is not “0” (the UC (0, S) power s corresponding to the content s is determined to be “1”) If the content is not protected on the bus 113, this content is inconsistent with the playback command of the content to be protected from the AV board 112. Ends. In other words, the drive 111 is controlled so as not to output data on the bus 113.
- the user may operate the HDD 114 via an operation input unit (not shown). 4 Enter the content playback command. Since the HDD 1 1 4 sends a playback command to the drive 1 1 1 via the bus 1 1 3, in step S 19 1, the mutual authentication unit 1 2 1 sends the playback command from the HDD 1 1 4 Enter a command.
- step S 192 the input / output control unit 122, based on the information from the mutual authentication unit 122, outputs content (in this case, the HDD 114) and the mutual authentication is not performed. Is determined.
- step S197 the input / output control unit 122 determines whether the playback command from the HDD 114 is a playback command of the content to be protected.
- step S193 or in step S197 the playback command from the device that outputs the content is a playback command of the content that does not need protection. If it is determined that there is, in step S 198, the recording / reproducing processing unit 123 reproduces the content specified from the optical disk 141.
- step S 199 the input / output control unit 122 determines whether or not the UC (0, S) power S “1” of the user control data corresponding to the content. If it is determined that the UC (0, S) power S corresponding to the content is “1”, this content is content that does not need protection on the bus 113, so that the input is performed in step S200.
- the output control unit 122 controls the mutual authentication unit 122 so that the reproduced content can be used as it is (as raw data), and the device that outputs the content via the bus 113 can be used. , AV port 1 1 2 or HDD 1 1 4).
- step S 197 If it is determined in step S 197 that the command from the HDD 114 is a playback command for the content to be protected, or in step S 199, the UC (0 , S) If it is determined that the force S is not “1” (if it is determined that the UC (0, S) power S corresponding to the content is “0”), the HDD 1 1 4 that has not been mutually authenticated Cannot output the contents to be protected, an error occurs and the output processing of drive 111 is forcibly terminated. That is, in the drive 111, a playback command of content to be protected from the HDD 114 is rejected. Even if it is a playback command for content that does not require protection, it is not output if the content is to be protected on the bus 113.
- the content to be protected on the bus 113 is encrypted with the common key and transmitted via the bus 113.
- the content is output to the AV port 112 and the protection-free content on the bus 113 is output to the AV board 112 via the bus 113 as it is (without encryption).
- step S201 of FIG. 20, which will be described later it is received by the mutual authentication unit 1331 of the AV board 112.
- the content to be protected on the bus 113 is not output for the playback command to the HDD 111 that has not been mutually authenticated, but protection is not required on the bus 113. Is output to the HDD 114 via the bus 113 as it is (without encryption). As a result, contents that do not need to be protected can be stored in the HDDs 114, thereby enabling storage operation.
- the content to be protected is a block key with the disk ID and RKB applied, and a common key that is mutually authenticated between the devices that transmit and receive the content (in this case, the drive 111 and the AV board 112). Since both keys are used for encryption, illegal copying can be suppressed even through the general-purpose bus 113.
- the least significant bit of the first byte UC (0, S) of the user control data 202 (18 bytes) corresponding to the content to be protected recorded on the optical disc in the existing recording / reproducing device is Originally, “0” is stored. Therefore, the above-described reproduction processing of the content to be protected is also performed on the content to be protected recorded in the existing data format (for a device that has been mutually authenticated, a common key is used). (The output is prohibited for devices that are not encrypted and are not mutually authenticated.) Therefore, illegal copying can be suppressed even through the general-purpose bus 113. In other words, compatibility with existing ones is maintained.
- the drive 111 receives the playback command of the content to be protected from the AV board 112, plays the content from the optical disk 141, and outputs it via the bus 113.
- the mutual authentication unit 1131 of 1112 receives the content
- the received content is transmitted by the mutual authentication unit 1221 of the drive 111. Judge whether the content is encrypted (content to be protected) or not.
- step S202 when it is determined that the content is encrypted using the common chain and is content to be protected, in step S203, the mutual authentication unit 1331 executes Using the common key with drive 1 1 1 The content is decrypted and output to the content protection unit 1 32. In other words, this content is in the state of being encrypted only with the block key with the disk ID and RKB applied.
- step S204 the content protection unit 132 executes a block key generation process. Since the block key generation process is the same as the block key generation process described with reference to FIG. 16, the description thereof will not be repeated and thus will be omitted. Since the disk key on which the RKB of 141 is applied is obtained and the obtained disk key and the disk ID of the optical disk 141 are generated, in step S 205, the encryption unit 254 The content from the mutual authentication unit 1331 is decrypted using the block key and supplied to the AV content processing unit 133.
- step S202 determines whether the received content is not encrypted and does not need to be protected. Therefore, the processes in steps S203 to S205 are skipped in order to pass through the mutual authentication unit 131 and the content protection unit 1332.
- step S206 the AV content processing unit 133 decodes and reproduces the content supplied from the content protection unit 132 by, for example, the MPEG (Moving Picture Experts Group) method.
- step S207 the output unit 135 outputs the reproduced content.
- both the content to be protected and the content that does not need to be protected recorded on the optical disc 141 must be output. Can be.
- FIG. 21 shows another configuration example of the recording / reproducing apparatus of the present invention. Note that in Fig. 21 The basic configuration of the recording / reproducing apparatus 301 is the same as that of the recording / reproducing apparatus 101 in FIG. 4. In the recording / reproducing apparatus 301 in FIG. 21, the recording / reproducing apparatus 101 in FIG. The mutual authentication unit 1 2 1 of the drive 1 1 in 1 is removed.
- the drive 111 does not have a mutual authentication function.
- the content is not mutually authenticated in 1 1 2 (the common key is not shared), and the content playback request processing from the AV board 1 1 2 is not executed. Is performed.
- the recording process of the drive 111 of the recording / reproducing apparatus 301 will be described with reference to the flowchart of FIG. Steps S 211 to S 214 in FIG. 22 are the same as steps S 161 and S 166 to S 168 in FIG. 18, and are described in detail. Will be omitted because it is repeated.
- step S 211 unprotected content from the HDD 114 is received by the recording / reproducing processing unit 123 via the bus 113.
- step S212 since the content input to the recording / reproducing processing unit 123 is not encrypted by the common key by the input / output control unit 122, the current recording command is transmitted to the bus 113. It is determined that the command is not a content recording command to be protected.
- step S213 the recording / reproducing processing unit 123 places the protection information indicating that the content does not need to be protected on the bus 113 in the UC (0, S) of the user control data corresponding to the content. "1" is generated and stored, and in step S214, the recording / reproducing processing unit 123 records the unprotected content from the HDD 114 on the optical disc 144.
- step S212 if the content encrypted with the common key is input and it is determined that the current recording command is a recording command of the content to be protected, an error occurs and the drive 1 1 1 The recording process of 1 is forcibly terminated.
- the user plays back the content on the HDD 114 via the input unit in order to store (record) the unprotected content recorded on the optical disc 144 on the HDD 114.
- Enter a command The HDD 114 sends a playback command to the drive 111 via the bus 113.
- a playback command from the HDD 114 is input.
- step S222 when the input / output control unit 122 determines that the playback command from the HDD 114 is a playback command for content that does not require protection, in step S222, recording and playback are performed.
- the specified content is reproduced from the optical disk 1441 by the processing unit 123.
- step S224 when the input / output control unit 122 determines that uc (0, S) of the user control data corresponding to the content is "1", protection is performed on the bus 113. It is determined that the content is unnecessary.
- step S225 the content reproduced by the recording / reproduction processing unit 123 is output to the HDD 114 via the bus 113 as it is (as raw data).
- step S 2 2 2 determines whether the command from HDD 1 1 4 is a playback command of the content to be protected, or in step S 2 2 4, the UC corresponding to the content (0, S) If it is determined that the force S is not “1”, an error occurs because the content to be protected cannot be output on the bus 113 to the HDD 111 that has not been mutually authenticated. The recording process of 1 1 1 is forcibly terminated.
- the protection information “1” when the protection information “1” is reproduced in response to the reproduction command to the HDD 111, the reproduced content that does not need to be protected on the bus 113 is reproduced.
- the data is output to the HDD 14 via the bus 113 without being encrypted (without encryption). Therefore, the content that does not need to be protected is not encrypted with the common key, so that the content can be supplied to the HDD 14 and stored. As a result, storage operation becomes possible in the HDD 14.
- FIG. 24 shows a configuration example of still another recording / reproducing apparatus to which the present invention is applied.
- the recording / reproducing device 401 in FIG. 24 has basically the same configuration as the recording / reproducing device 101 in FIG. 4, but the AV board 112 shown in FIG.
- the content protection section 13 of FIG. 12 is removed, and instead, the content protection section 4 11 of the drive 1 11 is arranged.
- the content supplied from the AV content processing unit 133 is output to the mutual authentication unit 1331.
- the content output from the mutual authentication unit 13 1 is supplied to the AV content processing unit 13 3.
- the content input to the mutual authentication unit 12 1 is Supplied to the content protection unit 4 1 1.
- the basic configuration of the content protection unit 4 11 1 is the same as that of the content protection unit 13 2 in FIG. Therefore, the content protection unit 4111 transmits the content supplied from the mutual authentication unit 1221 to the disk ID and RKB of the optical disk 1441 under the control of the input / output control unit 122.
- the recording / reproducing processing unit 123 supplies the content reproduced from the optical disk 141 to the content protecting unit 411.
- the content protection unit 4111 decrypts the disk ID of the optical disk 141 with a block key with the RKB applied or a block key with only the RKB applied. And outputs the result to the mutual authentication unit 1 2 1.
- FIG. 25 shows the configuration of the content protection unit 411 in FIG.
- the content protection unit 4 11 in FIG. 24 has basically the same configuration as the content protection unit 13 2 in FIG. Therefore, for example, the input / output control unit 122 If it is determined that the content input from the code 1 1 2 is a content to be protected (the input content recording command is a content recording command to be protected), the encryption unit 2 54 encrypts the content using a block key for the content to be protected, which is generated by applying the disk key, the disk ID, and the recording information.
- the content input from the AV board 112 by the input / output control unit 122 is content that does not require protection (the input recording command of the content is a recording command of content that does not need protection).
- the encrypting unit 254 encrypts the content using at least a block key for unprotected content generated by applying a disk key created by the RKB.
- the purpose of using the disk key created by RKB is to eliminate unauthorized drives.
- step S224 the recording / reproducing processing unit 123 waits until a new optical disk 141 is loaded in the drive 111, and in step S241, the optical disk 141 is If it is determined that the disc is mounted, in step S224, the recording / reproducing processing section 123 reproduces the disc ID and RKB (disc information) recorded on the optical disc 141, and the content protection section 41.
- Supply 1 the disc ID and RKB (disc information) recorded on the optical disc 141, and the content protection section 41.
- step S243 the RKB processing unit 252 acquires the disk key using the supplied RKB and the device ID and device key stored in advance in the built-in memory. Note that this processing is the same as the processing in step S123 of FIG. 16, and the description thereof will not be repeated, so will be omitted.
- step S224 the key generation unit 2553 is provided from the recording / playback processing unit 123. Feeding disk ID, the disk key generated in step S 2 4 3, and, like the by applying the recording information of the content protection unit 4 1 1 generates a proc key for near point Tsu be protected, It is stored in the memory built in the encryption unit 254.
- step S 245 the link generation unit 253 generates at least the lock key for unprotected content by applying the disk key generated in step S 243, and performs encryption. It is stored in the memory built in the unit 254.
- each time the optical disk 141 is mounted two types of block keys are generated for the content to be protected and the content not to be protected, It is memorized.
- the block key is generated.
- a disk ID, a disk key, and the like for generating the block key are stored, and when encrypting, the block key is generated according to the protection state of the content.
- a lock key may be generated.
- the recording request processing of FIG. 27 is the same as the recording request processing of FIG. 15 except that steps S103 and S104 of the recording request processing of FIG. 15 are omitted. It is.
- the mutual authentication is performed, and the subsequent processing is executed in a state where the common key is shared with the AV board 112.
- step S2661 the AV content processing unit 133 inputs the content. If it is determined in step S266 that the content is to be protected by the AV content processing unit 133, in step S266, the content is transmitted to the drive 111 by the mutual authentication unit 131. It is encrypted using the common key with 1. In step S264, the encrypted content is output to the drive 111. If it is determined in step S 262 that the content does not need protection, the content is not encrypted (the process in step S 263 is skipped), and output to drive 111 in step S 264 Is done.
- Steps S301 to S304, steps S306 and S307, and steps S309 and S310 in FIG. 28 are processes similar to steps S161 to S168 in FIG. Therefore, detailed description is omitted.
- step S301 the mutual authentication unit 121 of the drive 111 receives the content from the AV board 112 via the bus 113.
- step S302 the input / output control unit 122 transmits the AV board 112, which has input this content, based on the mutual authentication unit 122, It is determined whether or not the AV board 112 is mutually authenticated in the drive 111, and in step S303, the input / output control unit 122 sets the mutual authentication unit in step S303. 12 1 Based on whether or not the content input to 1 is encrypted with a common key, whether the input content recording command is a content recording command to be protected on bus 113 Judge.
- step S303 When it is determined in step S303 that the input content recording command is a content recording command to be protected on the bus 113, in step S304, the input / output control unit 122 performs mutual authentication. It controls the section 121 to decrypt the received content with the common key with the AV board 112 and supplies the content to the content protection section 411.
- step S305 the encryption unit 254 encrypts the supplied content using a block key for the content to be protected.
- the content block key to be protected is stored in advance in the memory of the encryption unit 254 as described above with reference to FIG.
- the input / output control unit 122 controls the recording / reproduction processing unit 123, and in step S306, protects the UC (0, S) of the user control data corresponding to the content on the bus 113. Should be content Is generated and stored, and in step S310, it is recorded on the optical disk 141, together with the content encrypted using the block key for the content to be protected.
- step S301 the content stored in the HDD 114 having no mutual authentication unit is input.
- step S301 the content from the HDD 114 is received by the mutual authentication unit 122 via the bus 113.
- step S302 it is determined that the device that has input the content has not been mutually authenticated in drive 111.
- step S307 the input / output control unit 122 sets a command to record the input content based on whether or not the content input to the mutual authentication unit 122 is encrypted with a common key. Is a recording command of the content to be protected on the bus 113.
- step S3 In 08 the encryption unit 255 encrypts the content supplied from the mutual authentication unit 121 using a protection-free content key.
- the block key for the content that does not need to be protected is stored in advance in the memory of the encryption unit 254 as described above with reference to FIG.
- step S309 the input / output control unit 122 controls the recording / playback processing unit 123 to protect the user control data UC (0, S) corresponding to the content on the bus 113.
- the protection information “1”, which is unnecessary content, is generated and stored, and in step S310, the generated protection information is recorded on the optical disk 141 together with the content.
- step S307 If it is determined in step S307 that the input recording command of the content is a recording command of the content to be protected on the bus 113, an error occurs, and the recording process of the drive 111 stops. , Forced termination.
- the content to be protected from the mutually authenticated AV board 112 is encrypted with the disk ID and the block key with the RKB applied.
- the content is recorded on the optical disk 141 together with the protection information “0” indicating that the content is to be protected on the bus 113.
- Unprotected content from a mutually authenticated AV board 112 or unprotected content from a non-mutually authenticated HDD 114 is encrypted with a block key using only RKB.
- the protection information “1” indicating that the content does not need protection is recorded on the optical disk 141 along with the bus 113.
- the content to be protected from the HDD 114 that has not been mutually authenticated is not recorded on the optical disc 141.
- Steps S 3 21 to S 3 25 and Steps S 3 27 to S 3 30 in FIG. 29 are the same processing as Steps S 19 1 to S 200 in FIG. Therefore, the detailed description is omitted.
- the user In order to output the content to be protected recorded on the optical disk 14 1 from the output unit 135 of the AV board 112, the user sends the content to the AV board 112 via the operation input unit. Enter the playback command of The mutual authentication unit 1331 of the AV board 112 sends a playback command to the drive 111 via the bus 113. In step S321, the mutual authentication unit 1221 inputs a playback command from the AV board 112.
- step S 3 22 If it is determined in step S 3 22 that the AV board 112 that outputs the content is mutually authenticated in the drive 111 based on the information from the mutual authentication unit 122, In step 23, the input / output control unit 122 determines whether or not the playback command from the AV board 112 is a playback command for the content to be protected.
- step S32 when it is determined that the playback command from the AV board 112 is a playback command for the content to be protected, in step S324, the recording / playback processing unit 123 causes The content specified from the optical disk 14 1 is played.
- step S325 when the input / output control unit 122 determines that UC (0, S) of the user control data corresponding to the content is "0", the reproduced content is transmitted to the bus. 1 1 3 It is assumed that it is.
- the encryption unit 254 decrypts the reproduced content using the block key for content to be protected stored in the built-in memory.
- step S3227 the mutual authentication unit 1221 encrypts the content supplied from the encryption unit 2554 using the common key with the AV board 112, and transmits the encrypted content via the bus 113. Output to AV port 1 1 2
- the user transfers the content to the HDD 114 via the operation input unit.
- the mutual authentication unit 1 2 1 sends the playback command from the HDD 1 1 4 Enter the command.
- step S32 based on the information from the mutual authentication unit 121, it is determined that the HDDs 1 and 4 that output the content are not mutually authenticated. It is determined whether the playback command from 4 is a playback command for the content to be protected.
- step S32 If the playback command from the HDD 114 is determined to be a playback command for content that does not require protection in step S32, or in step S328, recording is performed in step S329.
- the content specified by the playback processing unit 123 is played back from the optical disc 141, and in step S330, the input / output control unit 122 sets the UC (0, S) of the user control data corresponding to the content. ) Determine whether the force S is “1”.
- step S330 when the input / output control unit 122 determines that UC (0, S) of the user control data corresponding to the content is "1", the reproduced content is transferred to the bus 111. Assume that the content does not need protection in 3 above.
- step S331 the encryption unit 254 uses the block key for unprotected content stored in the built-in memory to decrypt the content, and decrypts the content as it is (as raw data). Output to AV port 112 or HDD 114 via bus 21 and bus 113. Also, in step S325, the UC (0, S) corresponding to the content is "If it is determined that it is not 0J, in step S328, it is determined that the playback command from HDD 111 is a playback command for the content to be protected, or step S330 In, if it is determined that the UC (0, S) power S corresponding to the content is not “1”, an error occurs and the recording process of drive 111 is forcibly terminated.
- the content to be protected on the bus 113 in response to the mutually authenticated playback command from the AV port 112 is encrypted with the common key and transmitted via the bus 113.
- the content that is output to the AV board 112 and that does not require protection on the bus 113 is output to the AV board 112 via the bus 113 as it is (without encryption).
- step S3661 in FIG. 30, which will be described later it is received by the mutual authentication unit 1331 of the AV board 112.
- the playback process of the AV board 112 corresponding to the content playback process of the drive 111 of FIG. 29 will be described with reference to the flowchart of FIG.
- the reproduction process in FIG. 30 is the same as that in FIG. 20 except that steps S 204 and S 205 of the reproduction process in FIG. 20 are omitted.
- step S3661 the mutual authentication unit 1331 receives the content from the drive 111, and in step S3652, the content is encrypted using the common key and protected. If it is determined that the content should be reproduced, the received content is decrypted using the common key with the drive 111 in step S366.
- step S3652 determines whether the content is not encrypted and does not need protection. If it is determined in step S3652 that the content is not encrypted and does not need protection, this content does not need to be decrypted because it is not encrypted. Therefore, the processing in step S366 is skipped in order to bypass the mutual authentication unit 1311 and the content protection unit 1332.
- step S364 the AV content processing unit 133 decodes and reproduces the content supplied from the content protection unit 132 by, for example, the MPEG method.
- step S365 the output unit 135 outputs the reproduced content. Power.
- FIG. 31 shows another configuration example of the recording / reproducing apparatus of the present invention. Note that the basic configuration of the recording / reproducing device 501 in FIG. 31 is the same as that of the recording / reproducing device 401 in FIG. 24, but the recording / reproducing device 501 in FIG. The mutual authentication unit 1 2 1 of the drive 1 1 1 in the recording / reproducing apparatus 4 1 of 4 1 is removed.
- the AV board 112 is connected to the bus 113, but the drive 111 has no mutual authentication function.
- the content is not mutually authenticated in 1 1 2 (the common key is not shared), and the content playback request processing from the AV board 1 1 2 is not executed. Is performed.
- the recording process of the drive 111 of the recording / reproducing device 501 will be described with reference to the flowchart of FIG. Steps S401 to S405 in FIG. 32 are the same as steps S301 and S307 to S310 in FIG. 28, and the description thereof will be repeated. Therefore, the description is appropriately omitted.
- step S401 the unprotected content from the HDD 114 is received by the recording / reproducing processing unit 123 via the bus 113, and the input / output control is performed in step S402.
- Unit 122 protects the input content recording command on bus 113 based on whether the content input to mutual authentication unit 122 is encrypted with a common key or not. It is determined that the command is not a recording command for the content that should be.
- step S4 ⁇ 3 the content is encrypted by the encryption unit 254 using the block key for the content that does not need protection.
- step S404 the recording / reproducing processing unit 123 puts no protection on the bus 113 on the UC (0, S) of the user control data corresponding to the content.
- the protection information “1” that is a content is generated and stored, and is recorded on the optical disc 141 together with the content that does not need protection from the HDD 114 in step S405.
- step S402 the content encrypted with the common key is input, and it is determined that the input content recording command is a content recording command to be protected on the bus 113. In this case, an error occurs and the recording process of drive 1 1 1 is forcibly terminated.
- the content is encrypted by another method instead of the common key, it is possible to process the content as protection-free content on the path 113.
- unprotected content is recorded on the optical disk 141 on the bus 113 from the HDD 114 having no mutual authentication function.
- steps S421 to S425 in FIG. 33 are the same as steps S321 and S328 to S331 in FIG. 29, and thus detailed description thereof will be omitted.
- the user inputs the unprotected content to the HDD 114 via the operation input unit. Enter a playback command. Since the HDD 114 sends a playback command to the drive 111 via the bus 113, the playback command from the HDD 114 is input in step S421, and the HDD 114 receives the playback command in step S422. If it is determined that the playback command from 1 14 is a playback command for content that does not require protection, in step S 423, the recording / playback processing unit 1 2 3 plays the content specified from the optical disc 141. .
- step S424 if the input / output control unit 122 determines that the UC (0, S) of the user control data corresponding to the content is “1”, the reproduced content is transferred to the bus 1 If the content is unprotected on 13 Is, in step S 4 2 5, by the encrypting unit 2 5 4, using the block key for protecting unwanted content is decrypted, the content is, as it is (the raw data or until), the mutual authentication unit 1 2 1 The content is output to the AV board 112 or the HDD 114 that outputs the content via the bus 113 and the bus 113.
- step S 4 2 2 determines whether the command from HDD 1 1 4 is a playback command of the content to be protected, or in step S 4 2 4, the UC (0 , S) If it is determined that the force S is not “1”, an error occurs because the content to be protected cannot be output to the HDD 1 14 that has not been mutually authenticated, and the recording process of the drive 1 1 1 Forced termination.
- the protection information "1J" is played, and the unprotected content that has been played is sent to the bus 113 as it is (without encryption).
- the content is output to the HDD 14 via the HDD 14. Therefore, the content that does not need to be protected on the bus 113 is not encrypted, so that the content can be supplied to the HDD 14 and stored therein.
- HDD 14 Even if content from HDD 14 that is not mutually authenticated is indicated as content to be protected by HDD 14, it is not recognized as content to be protected by drive 111, and the content is not protected. If it is unnecessary content, it can be handled. As described above, storage operation without mutual authentication that handles only copy-free content becomes possible.
- the recording medium is the optical disk 141, but the recording medium is not limited to the optical disk 141, but may be a memory card (registered trademark) other than the optical disk 141, and other recording media. You can also.
- the series of processes described above can be executed by hardware or can be executed by software.
- the recording / reproducing device 101 of FIG. 4 the recording / reproducing device 301 of FIG. 21, the recording / reproducing device 401 of FIG. 24, and the recording / reproducing device 501 of FIG.
- a CPU (Central Processing Unit) 611 is a program stored in a ROM (Read Only Memory) 6 12 or a HDD (Random Access Memory) 6 1 Executes various processes according to the program loaded in 3.
- the RAM 613 also appropriately stores data and the like necessary for the CPU 611 to execute various processes.
- the CPU 611, the ROM 612, and the RAM 613 are mutually connected via the bus 614.
- An input / output interface 615 is also connected to the bus 614.
- the input / output interface 615 has an AV board 616 that controls the input and output of content, an input section 617 consisting of a keyboard, mouse, etc., a CRT (Cathode Ray Tube), and an LCD (Liquid Crystal Display). ) And a communication section 620 composed of an output section 618 composed of a speaker and the like, an HDD 619, a modem, a terminal adapter and the like.
- the communication unit 620 performs communication processing via a network (not shown).
- the input / output interface 615 is also connected to a drive 630 as necessary, and includes a magnetic disk 633, an optical disk 632, a magneto-optical disk 633, or a semiconductor memory 634.
- the computer program which is appropriately mounted and read out, is installed on the HDD 619 as needed.
- the programs that make up the software are installed in a computer that is built into dedicated hardware, or by installing various programs to perform various functions. It can be executed, for example, installed on a general-purpose personal computer from a network or a recording medium.
- this recording medium is a magnetic disk 631 (including a flexible disk) on which the program is recorded, which is distributed to provide the program to the user separately from the apparatus main body, and an optical disk.
- 6 3 2 CD-ROM (Compact Dis k-Read Only Memory), DVD (Digital Versatile Disk), magneto-optical disk 63 (including MD (Mini-Disk) (trademark)), or semiconductor memory 634 It is not only composed of package media, but also composed of ROM 612 and HDD 610, etc., in which programs are stored, which are provided to the user in a state of being pre-installed in the main body of the device.
- optical disk shown in Fig. 4 for recording or reproducing contents and protection information.
- disk-type recording such as CD-R and other optical disks, MD and other magneto-optical disks, and magnetic disks
- information is recorded by forming pits or marks based on data recording waveforms on concentric or spiral “tracks” on the disk surface. ing.
- media that press and record data such as CD-ROMs and DVD-ROMs
- media that press and record data actually have pits that are physically recessed on the surface.
- a laser beam instead of physically recessing, a laser beam is used. The heat causes a chemical change in the phase change film inside the media, forming a mark that substitutes for the depression.
- the laser beam emitted from the head to read the data is reflected on the media surface, and the reflected light changes depending on the presence or absence of this pit or mark.
- the data is reproduced.
- the latter recognizes pits read with a constant reflectivity as "0" and pits whose reflectivity has changed in the pits as "1", reducing track loss when recording data. This contributes to reducing the pit length.
- the method of recording or reproducing information on a disk-type recording medium such as a magnetic disk 633, a ROM 612, or an HDD 619 also depends on the optical disk 1441 shown in Fig. 4 being a disk-type recording medium. Same as in some cases.
- steps for describing a program recorded on a recording medium are not only performed in a chronological order according to the order described, but also in a parallel or individual manner even if not necessarily performed in a chronological order. It also includes the processing executed in
- system refers to an entire device including a plurality of devices.
- content can be flexibly protected based on the necessity of protection. Further, according to the present invention, illegal copying of content is suppressed. Further, according to the present invention, PC storage operation becomes possible.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/500,851 US7894603B2 (en) | 2002-11-20 | 2003-10-28 | Recording system and method, recording device and method, input device and method, reproduction system and method, reproduction device and method, recording medium, and program |
AU2003275695A AU2003275695A1 (en) | 2002-11-20 | 2003-10-28 | Recording system and method, recording device and method, input device and method, reproduction system and method, reproduction device and method, recording medium, and program |
EP03758969.4A EP1564641B1 (en) | 2002-11-20 | 2003-10-28 | Recording system and method, recording device and method, reproduction system and method, reproduction device and method, recording medium, and program |
BR0306937-0A BR0306937A (pt) | 2002-11-20 | 2003-10-28 | Sistema, método, aparelho e meio de gravação, programa para um aparelho de gravação, dispositivo de entrada, método de entrada e programa para um dispositivo de entrada, sistema, método e aparelho de reprodução, e, programa para um aparelho de reprodução |
JP2004553144A JP4543927B2 (ja) | 2002-11-20 | 2003-10-28 | 記録システムおよび方法、記録装置および方法、入力装置および方法、出力装置および方法、再生システムおよび方法、再生装置および方法、記録媒体、並びにプログラム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002336754 | 2002-11-20 | ||
JP2002-336754 | 2002-11-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004046936A1 true WO2004046936A1 (ja) | 2004-06-03 |
Family
ID=32321813
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/013752 WO2004046936A1 (ja) | 2002-11-20 | 2003-10-28 | 記録システムおよび方法、記録装置および方法、入力装置および方法、再生システムおよび方法、再生装置および方法、記録媒体、並びにプログラム |
Country Status (9)
Country | Link |
---|---|
US (1) | US7894603B2 (ja) |
EP (1) | EP1564641B1 (ja) |
JP (1) | JP4543927B2 (ja) |
KR (1) | KR100990191B1 (ja) |
CN (1) | CN100458740C (ja) |
AU (1) | AU2003275695A1 (ja) |
BR (1) | BR0306937A (ja) |
TW (1) | TWI253068B (ja) |
WO (1) | WO2004046936A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006035356A2 (en) * | 2004-09-28 | 2006-04-06 | Koninklijke Philips Electronics N.V. | Method and device for storing data on a record medium and for transferring information |
JP2006173853A (ja) * | 2004-12-14 | 2006-06-29 | Sony Corp | 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム |
US7584511B2 (en) | 2004-06-11 | 2009-09-01 | Sony Corporation | Data processing apparatus, data processing method, program, program recording medium, data recording medium, and data structure |
US8249252B2 (en) | 2004-10-01 | 2012-08-21 | Sony Corporation | Information processing apparatus, information processing method, and program |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100985784B1 (ko) * | 2003-05-02 | 2010-10-06 | 엘지전자 주식회사 | 대화형 광디스크의 인증 방법 |
US20050078822A1 (en) * | 2003-10-08 | 2005-04-14 | Eyal Shavit | Secure access and copy protection management system |
US7958369B2 (en) * | 2004-10-22 | 2011-06-07 | Hewlett-Packard Development Company, L.P. | Systems and methods for multiple level control of access of privileges to protected media content |
US7809949B2 (en) * | 2005-07-26 | 2010-10-05 | Apple Inc. | Configuration of a computing device in a secure manner |
US9489496B2 (en) | 2004-11-12 | 2016-11-08 | Apple Inc. | Secure software updates |
US8090105B2 (en) * | 2004-11-24 | 2012-01-03 | International Business Machines Corporation | Broadcast encryption with dual tree sizes |
CN100426405C (zh) * | 2006-01-19 | 2008-10-15 | 华中科技大学 | 用于光盘存储的数据加扰、解读方法 |
KR100890720B1 (ko) * | 2006-10-25 | 2009-03-27 | 이니텍(주) | 웹 콘텐츠를 선택적으로 암호화하는 방법 및 그러한 방법을수행하는 프로그램이 기록된 컴퓨터 판독 가능 기록 매체 |
JP2009054255A (ja) * | 2007-08-29 | 2009-03-12 | Hitachi Ltd | 光ディスクドライブ、データ記録再生装置 |
US9003197B2 (en) * | 2008-03-27 | 2015-04-07 | General Instrument Corporation | Methods, apparatus and system for authenticating a programmable hardware device and for authenticating commands received in the programmable hardware device from a secure processor |
WO2010001544A1 (ja) * | 2008-07-01 | 2010-01-07 | パナソニック株式会社 | ドライブ装置、コンテンツ再生装置、記録装置、データ読み出し方法、プログラム、記録媒体、および集積回路 |
US8842840B2 (en) | 2011-11-03 | 2014-09-23 | Arvind Gidwani | Demand based encryption and key generation and distribution systems and methods |
US20140056438A1 (en) * | 2012-08-21 | 2014-02-27 | Harman International Industries, Incorporated | System for vehicle sound synthesis |
US8643168B1 (en) | 2012-10-16 | 2014-02-04 | Lattice Semiconductor Corporation | Integrated circuit package with input capacitance compensation |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0763936A2 (en) | 1995-09-18 | 1997-03-19 | Lg Electronics Inc. | Illegal view/copy protection method and apparatus for digital broadcasting system |
JPH11306677A (ja) * | 1998-02-18 | 1999-11-05 | Sony Corp | 情報記録装置および方法、情報再生装置および方法、並びに提供媒体 |
JP2000187935A (ja) * | 1998-07-22 | 2000-07-04 | Matsushita Electric Ind Co Ltd | ディジタルデ―タ記録装置及びその方法並びにそのプログラムを記録したコンピュ―タ読み取り可能な記録媒体 |
JP2000285027A (ja) * | 1999-03-29 | 2000-10-13 | Matsushita Electric Ind Co Ltd | キャッシュ装置、送信装置及びプログラム記録媒体 |
EP1050887A1 (en) | 1999-04-27 | 2000-11-08 | Matsushita Electric Industrial Co., Ltd. | Semiconductor memory card and data reading apparatus |
JP2002084271A (ja) * | 2000-09-07 | 2002-03-22 | Sony Corp | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
EP1202271A2 (en) | 2000-10-20 | 2002-05-02 | Pioneer Corporation | Copy control for information output apparatus and method, information recording apparatus and method, information output recording system and method and information recording medium |
JP2002132457A (ja) * | 2000-10-26 | 2002-05-10 | Victor Co Of Japan Ltd | 情報記録装置及び情報再生装置並びに情報記録再生装置 |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69634850T2 (de) * | 1995-10-09 | 2006-05-18 | Matsushita Electric Industrial Co., Ltd., Kadoma | Informationsaufzeichnungsträger, informationswiedergabegerät und informationswiedergabeverfahren |
KR100481596B1 (ko) * | 1995-10-09 | 2005-04-11 | 마쯔시다덴기산교 가부시키가이샤 | 컨텐츠 재생 장치 및 컨텐츠 재생 방법 |
JP4162294B2 (ja) * | 1998-07-03 | 2008-10-08 | パイオニア株式会社 | 複製制限機能を有する情報再生装置 |
JP4208998B2 (ja) * | 1998-07-03 | 2009-01-14 | パイオニア株式会社 | 複製制限機能を備えた記録再生システム、記録装置および再生装置 |
JP2000057713A (ja) * | 1998-08-05 | 2000-02-25 | Mitsubishi Electric Corp | 光ディスクの欠陥管理方法、光ディスク装置、及び、光ディスク |
CN1303599C (zh) * | 1998-11-02 | 2007-03-07 | 松下电器产业株式会社 | 高速缓存设备 |
JP4045393B2 (ja) | 1999-06-01 | 2008-02-13 | ソニー株式会社 | 情報信号複製管理方法および情報信号記録装置 |
JP4153629B2 (ja) * | 1999-09-29 | 2008-09-24 | 株式会社東芝 | 静止画像つき音声情報の編集方法 |
JP2001274786A (ja) * | 2000-01-21 | 2001-10-05 | Victor Co Of Japan Ltd | コンテンツ情報伝送方法、コンテンツ情報記録方法、コンテンツ情報伝送装置、コンテンツ情報記録装置、伝送媒体、及び記録媒体 |
JP3973346B2 (ja) * | 2000-07-06 | 2007-09-12 | 株式会社日立製作所 | コンテンツ配信システム、コンテンツ再生装置、コンテンツ配信装置および記憶媒体 |
JP2002093057A (ja) * | 2000-09-19 | 2002-03-29 | Sony Corp | 光ディスク、光ディスク再生装置、および光ディスク再生方法、光ディスク記録装置、および光ディスク記録方法、並びに記録媒体 |
JP2004532571A (ja) * | 2001-04-19 | 2004-10-21 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 情報ワードを符号化する方法と装置、情報ワードを復号する方法と装置、記憶媒体および信号 |
TW566041B (en) * | 2001-07-06 | 2003-12-11 | Hitachi Ltd | Digital data recording device and output device |
CN1620780A (zh) * | 2001-10-26 | 2005-05-25 | 松下电器产业株式会社 | 密钥管理装置 |
US6952479B2 (en) * | 2001-11-27 | 2005-10-04 | Macrovision Europe Limited | Dynamic copy protection of optical media |
US6999390B2 (en) * | 2002-05-06 | 2006-02-14 | Samsung Electronics Co., Ltd. | Optical disk and method of recording data in the same |
US7107461B2 (en) * | 2002-06-03 | 2006-09-12 | Sony Computer Entertainment America, Inc. | Methods and apparatus for customizing a rewritable storage medium |
-
2003
- 2003-10-28 WO PCT/JP2003/013752 patent/WO2004046936A1/ja active Application Filing
- 2003-10-28 BR BR0306937-0A patent/BR0306937A/pt not_active Application Discontinuation
- 2003-10-28 CN CNB2003801001340A patent/CN100458740C/zh not_active Expired - Fee Related
- 2003-10-28 KR KR1020047011179A patent/KR100990191B1/ko not_active IP Right Cessation
- 2003-10-28 AU AU2003275695A patent/AU2003275695A1/en not_active Abandoned
- 2003-10-28 US US10/500,851 patent/US7894603B2/en not_active Expired - Fee Related
- 2003-10-28 EP EP03758969.4A patent/EP1564641B1/en not_active Expired - Fee Related
- 2003-10-28 JP JP2004553144A patent/JP4543927B2/ja not_active Expired - Fee Related
- 2003-10-31 TW TW092130494A patent/TWI253068B/zh not_active IP Right Cessation
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0763936A2 (en) | 1995-09-18 | 1997-03-19 | Lg Electronics Inc. | Illegal view/copy protection method and apparatus for digital broadcasting system |
JPH11306677A (ja) * | 1998-02-18 | 1999-11-05 | Sony Corp | 情報記録装置および方法、情報再生装置および方法、並びに提供媒体 |
JP2000187935A (ja) * | 1998-07-22 | 2000-07-04 | Matsushita Electric Ind Co Ltd | ディジタルデ―タ記録装置及びその方法並びにそのプログラムを記録したコンピュ―タ読み取り可能な記録媒体 |
JP2000285027A (ja) * | 1999-03-29 | 2000-10-13 | Matsushita Electric Ind Co Ltd | キャッシュ装置、送信装置及びプログラム記録媒体 |
EP1050887A1 (en) | 1999-04-27 | 2000-11-08 | Matsushita Electric Industrial Co., Ltd. | Semiconductor memory card and data reading apparatus |
JP2002084271A (ja) * | 2000-09-07 | 2002-03-22 | Sony Corp | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
EP1202271A2 (en) | 2000-10-20 | 2002-05-02 | Pioneer Corporation | Copy control for information output apparatus and method, information recording apparatus and method, information output recording system and method and information recording medium |
JP2002132457A (ja) * | 2000-10-26 | 2002-05-10 | Victor Co Of Japan Ltd | 情報記録装置及び情報再生装置並びに情報記録再生装置 |
Non-Patent Citations (2)
Title |
---|
HITACHI LTD.: "5C digital transmission content protection white paper", DLTA, 14 July 1998 (1998-07-14), pages 1 - 13, XP002213172, Retrieved from the Internet <URL:http://www.dtcp.com/data/wp_spec.pdf> [retrieved on 20040108] * |
See also references of EP1564641A4 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7584511B2 (en) | 2004-06-11 | 2009-09-01 | Sony Corporation | Data processing apparatus, data processing method, program, program recording medium, data recording medium, and data structure |
WO2006035356A2 (en) * | 2004-09-28 | 2006-04-06 | Koninklijke Philips Electronics N.V. | Method and device for storing data on a record medium and for transferring information |
WO2006035356A3 (en) * | 2004-09-28 | 2006-05-26 | Koninkl Philips Electronics Nv | Method and device for storing data on a record medium and for transferring information |
JP2008515124A (ja) * | 2004-09-28 | 2008-05-08 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 記録媒体上へのデータの記憶および情報の転送のための方法および装置 |
US8249252B2 (en) | 2004-10-01 | 2012-08-21 | Sony Corporation | Information processing apparatus, information processing method, and program |
JP2006173853A (ja) * | 2004-12-14 | 2006-06-29 | Sony Corp | 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム |
Also Published As
Publication number | Publication date |
---|---|
EP1564641B1 (en) | 2018-09-19 |
JPWO2004046936A1 (ja) | 2006-03-16 |
CN100458740C (zh) | 2009-02-04 |
EP1564641A4 (en) | 2011-11-02 |
TW200418013A (en) | 2004-09-16 |
EP1564641A1 (en) | 2005-08-17 |
US20050144465A1 (en) | 2005-06-30 |
KR100990191B1 (ko) | 2010-10-29 |
TWI253068B (en) | 2006-04-11 |
KR20050072668A (ko) | 2005-07-12 |
CN1685322A (zh) | 2005-10-19 |
BR0306937A (pt) | 2004-12-14 |
AU2003275695A1 (en) | 2004-06-15 |
JP4543927B2 (ja) | 2010-09-15 |
US7894603B2 (en) | 2011-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100740360B1 (ko) | 정보 기록/재생 장치 및 방법 | |
AU778592B2 (en) | Information processing device, information processing method and program storage medium | |
US20050038997A1 (en) | Contents recording method, recording medium and contents recording device | |
WO2004046936A1 (ja) | 記録システムおよび方法、記録装置および方法、入力装置および方法、再生システムおよび方法、再生装置および方法、記録媒体、並びにプログラム | |
JP2004220317A (ja) | 相互認証方法、プログラム、記録媒体、信号処理システム、再生装置および情報処理装置 | |
JP2000076141A (ja) | コピ―防止装置および方法 | |
US20040076404A1 (en) | Region restrictive playback system | |
WO2004086370A2 (en) | Recording apparatus and content protection system | |
JPWO2004053699A1 (ja) | 記録再生装置、データ処理装置および記録再生処理システム | |
US7874004B2 (en) | Method of copying and reproducing data from storage medium | |
KR100881524B1 (ko) | 데이터 기록 장치, 데이터 기록 방법, 및 데이터 전송시스템 | |
JP2005512258A (ja) | システムデータの完全性の検証方法及び装置 | |
JPH11224461A (ja) | 情報処理装置、情報処理方法、提供媒体、および記録媒体 | |
JP4482970B2 (ja) | Dvdレコーダ、dvdレコーダの記録再生方法、およびプログラム記録媒体 | |
JP2004311000A (ja) | 記録装置及び著作権保護システム | |
KR20060133958A (ko) | 콘텐츠 보호 방법 및 시스템 | |
JP4078792B2 (ja) | 情報記録装置、情報再生装置、暗号処理キー更新方法、並びにプログラム提供媒体 | |
JP2002244552A (ja) | 情報再生装置、情報再生方法、および情報記録媒体、並びにプログラム記憶媒体 | |
JP2002236622A (ja) | 情報再生装置、情報記録装置、情報再生方法、情報記録方法、および情報記録媒体、並びにプログラム記憶媒体 | |
JP2001155421A (ja) | 記録装置、記録方法、再生装置、再生方法及び記録媒体 | |
JP2007515736A (ja) | ディスク解読方法及びシステム | |
KR20010046616A (ko) | 디스크의 암호화 기록/재생 장치 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004553144 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003758969 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10500851 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020047011179 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20038A01340 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 2003758969 Country of ref document: EP |