WO2006011527A1 - 記録装置、コンテンツ鍵処理装置、記録媒体、及び記録方法 - Google Patents
記録装置、コンテンツ鍵処理装置、記録媒体、及び記録方法 Download PDFInfo
- Publication number
- WO2006011527A1 WO2006011527A1 PCT/JP2005/013760 JP2005013760W WO2006011527A1 WO 2006011527 A1 WO2006011527 A1 WO 2006011527A1 JP 2005013760 W JP2005013760 W JP 2005013760W WO 2006011527 A1 WO2006011527 A1 WO 2006011527A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- recording medium
- content key
- key
- encryption
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00224—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a remote server
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00543—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein external data is encrypted, e.g. for secure communication with an external device or for encrypting content on a separate record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00855—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server
- G11B20/00869—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server wherein the remote server can deliver the content to a receiving device
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/12—Formatting, e.g. arrangement of data block or words on the record carriers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/60—Solid state media
- G11B2220/61—Solid state media wherein solid state memory is used for storing A/V content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91342—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being an authentication signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/765—Interface circuits between an apparatus for recording and another apparatus
- H04N5/775—Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/92—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
- H04N5/9201—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving the multiplexing of an additional signal and the video signal
Definitions
- Recording device content key processing device, recording medium, and recording method
- the present invention relates to a recording apparatus and a recording method for recording a content encrypted with a content key and a content key converted into a B sound on a recording medium.
- a conventional mobile terminal encrypts content downloaded from the Internet with a content key, records the encrypted content in a data area of the recording medium, and encrypts the content key to record the content key.
- the encrypted content key is written in the protected area.
- Patent Document 1 when one device encrypts the content with the content key and transmits the content to the other device, the parameter information for generating the content key is also encrypted. A technique for transmitting the data in the same manner is disclosed.
- Patent Document 1 Japanese Patent Laid-Open No. 2000-100069
- the present invention provides a recording apparatus, a content key, and a content key that can reproduce content only by a specific device even when content is recorded and distributed in advance on a recording medium. It is an object to provide a processing device, a recording medium, and a recording method.
- the present invention has the following configuration.
- the recording apparatus of the present invention includes a content encryption unit that writes content encrypted with a content key to a recording medium, a key encryption unit that encrypts the content key and writes the content key to the recording medium, and a re-key of the content key.
- a re-encryption control information generation unit for writing re-encryption control information indicating whether encryption is necessary or not into the recording medium.
- the recording apparatus may obtain the content key and the content encrypted with the content key from a distribution server.
- the content key processing device of the present invention includes a key decryption unit that decrypts a content key that is used for content encryption and that is encrypted and recorded on a recording medium, and decrypted content
- a key encryption unit that re-encrypts the key using predetermined information and writes the key to the recording medium.
- Predetermined information is a composite key that also generates medium-specific information and additional information power.
- Additional information is information unique to a device that reproduces content stored in a recording medium.
- the additional information is information unique to the content key processing device.
- the content key processing device may obtain the additional information from another device.
- Re-encryption refers to encryption performed after the encryption content key is decrypted. According to the present invention, even when content is recorded on a recording medium and distributed, the content can be reproduced only by a specific device.
- the content key processing apparatus When the re-encryption control information indicating whether or not the content key needs to be re-encrypted is stored in the recording medium, the content key processing apparatus performs the re-encryption indicating whether or not the recording medium power content key needs to be re-encrypted.
- the encryption / decryption information is acquired to determine whether re-encryption is necessary, and the key decryption unit is configured to decrypt the encrypted content key only when it is determined that re-encryption is necessary.
- re-encrypting the content key when the content key is re-encrypted and a re-encryption control unit that controls the key encryption unit to re-encrypt the content key.
- a re-encryption control information correction unit that rewrites the control information to the content that re-encryption is not required and writes the control information on the recording medium may be further included.
- the content key processing apparatus determines whether or not re-encryption control information indicating whether re-encryption of the content key is necessary is stored in the recording medium, and the re-encryption key is determined.
- the key encryption unit controls the key decryption unit to decrypt the encrypted content key only when control information is stored, and then re-encrypts the content key.
- a re-encryption control unit for controlling the content key, and a re-encryption control information correction unit for deleting the re-encryption control information from the recording medium when the content key is re-encrypted. .
- the content key processing device may further include a content decrypting unit that decrypts the content, and a reproducing unit that reproduces the decrypted content.
- the recording medium of the present invention is a content key used for content encryption, and the encrypted content key and a re-encryption key indicating whether the content key needs to be re-encrypted. Control information.
- the recording medium stores the re-encryption control information in a data area that can be read and written regardless of the result of mutual authentication, or a protected area that can be read and written only when mutual authentication is successful.
- the recording method of the present invention shows a step of writing a content encrypted with a content key onto a recording medium, a step of encrypting the content key and writing it onto the recording medium, and whether or not the content key needs to be re-encrypted Writing re-encryption control information to the recording medium.
- a recording method is a content key used for content encryption, a step of decrypting a content key encrypted and recorded on a recording medium, and a decrypted content key Re-encrypting using predetermined information and writing to the recording medium.
- re-encryption control information indicating whether the content key needs to be re-encrypted is stored in the recording medium, and the re-encryption is performed from the recording medium. To determine whether or not the content key needs to be re-encrypted, and only when it is determined that re-encryption is necessary, it is encrypted and recorded on the recording medium.
- the step of decrypting the content key the step of re-encrypting the decrypted content key using predetermined information and writing it to the recording medium, and the case of re-encrypting the content key
- the re-encryption control information may be rewritten to the content that re-encryption is unnecessary, and may be written to the recording medium.
- the recording method includes a step of determining whether or not re-encryption control information indicating whether or not a re-encryption of a content key is necessary is stored in the recording medium, the re-encryption Only when the key control information is stored, the step of decrypting the content key encrypted and recorded on the recording medium, and re-encrypting the decrypted content key using predetermined information And writing the data into the recording medium, and deleting the re-encryption control information from the recording medium when the content key is re-encrypted.
- the invention's effect [0013] even when the recording device records and distributes the content in advance on the recording medium, the content can be reproduced only by a specific device. Further, an advantageous effect that a recording device, a content key processing device, a recording medium, and a recording method can be realized is obtained.
- FIG. 1 is a block diagram showing an internal configuration of a first recording device and a recording medium required when the first recording device writes content on the recording medium in Embodiment 1 of the present invention. Is
- FIG. 2 is a block diagram showing the internal configuration of the second recording device and the recording medium required when the second recording device re-encrypts the content key and writes it to the recording medium in the first embodiment of the present invention. It is.
- FIG. 3 is a block diagram showing an internal configuration of the second recording device and the terminal device required when the second recording device acquires additional information from the terminal device in the first embodiment of the present invention. .
- FIG. 4 is a block diagram showing an internal configuration of a terminal device and a recording medium required when the terminal device reproduces content in the first embodiment of the present invention.
- FIG. 5 is a block diagram showing an internal configuration of the first recording device and the recording medium required when the first recording device writes content onto the recording medium in the second embodiment of the present invention.
- FIG. 6 is a block diagram showing the internal configuration of the second recording device and the recording medium required when the second recording device re-encrypts the content key and writes it to the recording medium in the second embodiment of the present invention. It is.
- FIG. 7 is a block diagram showing an internal configuration of a second recording device and a recording medium required when the second recording device reproduces content in the second embodiment of the present invention.
- FIG. 8 Internal configuration of first recording device, distribution server, and recording medium required when first recording device acquires content from distribution sano in Embodiment 3 of the present invention
- a recording apparatus, a content key processing apparatus, a recording medium, and a recording method according to the first embodiment of the present invention will be described with reference to FIGS.
- FIG. 1 shows the internal configuration of the first recording device 10 and the recording medium 1.
- FIG. 1 mainly shows the configuration required when the first recording device 10 writes the content 19 to the recording medium 1.
- the first recording device 10 is a recording device that is assumed to be used on the content provider side that sells / distributes content, and is, for example, a personal computer.
- a second recording device which will be described later, is a content key processing device that is assumed to be used mainly at a store that sells recording media, and is, for example, a personal computer.
- the recording medium 1 is a semiconductor memory sold at a store.
- the recording medium 1 has a ROM area 2 that can only be read, a protected area 5 that can be read and written only when mutual authentication is successful, and a data area 7 that can be read and written regardless of the mutual authentication result.
- the ROM area 2 stores a recording medium ID 3 and a mutual authentication key 4.
- the first recording device 10 has an interface unit 11 connected to the recording medium 1.
- the interface unit 11 includes a mutual authentication processing unit 12 that performs mutual authentication with the connected recording medium 1, and a key encryption unit 15 that encrypts a content key 16 that is a key used for content encryption.
- the content encryption unit 17 encrypts the content 19.
- the interface unit 11 further stores a device key 14 and a content key 16 in a built-in storage area.
- the content 19 is data such as music, moving images, still images, or games, for example, and is stored in a predetermined storage area of the first recording device 10.
- the mutual authentication processing unit 12 of the first recording device 10 includes the recording medium ID3 of the recording medium 1, the mutual authentication key 4, and the first recording device.
- the medium specific information 13 is generated from the device key 14 of the device 10 and mutual authentication is performed between the recording medium 1 and the first recording device 10.
- the key encryption unit 15 encrypts the content key 16 using the medium specific information 13, and generates the generated encrypted content key 6 in the protected area 5 of the recording medium 1.
- the content encryption unit 17 encrypts the content 19 using the content key 16 and writes the generated encrypted content 8 in the data area 7 of the recording medium 1.
- the recording medium 1 in which the encrypted content key 6 and the encrypted content 8 are written on the content provider side is then delivered to the store. Then, the content key of the recording medium 1 is re-encrypted by the second recording device at the store side.
- the operation of the second recording apparatus will be described below.
- FIG. 2 shows the internal configuration of the second recording device 30 and the recording medium 1 of the present embodiment.
- parts having the same functions as those in FIG. FIG. 2 mainly shows a configuration necessary when the second recording device 30 re-encrypts the content key 16 and writes it in the recording medium 1.
- the second recording device 30 has an interface unit 31 connected to the recording medium 1.
- the interface unit 31 includes a mutual authentication processing unit 32 that performs mutual authentication with the connected recording medium 1, a key combining unit 36 that generates a composite key 37 using the medium specific information 33 and the additional information 35, and a composite key. 37, a key encryption unit 38 that encrypts the content key 16 using the 37, and a key decryption unit 39 that reads and decrypts the encrypted content key 6 from the recording medium 1.
- the interface unit 11 further stores a device key 34 and additional information 35 in a built-in storage area. Stored in the area.
- the additional information 35 is information unique to the terminal device that is permitted to reproduce the content 19.
- “unique to a terminal device” may be information unique to each terminal device, or may be information unique to a terminal device in a predetermined group. For example, even if the ID, serial number, or service number such as a telephone number is unique to a terminal device such as a mobile phone, the model, manufacturer, content pronoid Or the information regarding a communication company may be sufficient.
- the second recording device 30 acquires the attached calorie information 35 in advance for the terminal device power.
- the second recording device 30 writes the encrypted content key 6a to the recording medium 1
- the mutual authentication processing unit 32 of the second recording device 30 is connected to the recording medium ID 3 and the mutual authentication key 4 in the ROM area 2 of the recording medium 1.
- the medium specific information 33 is generated from the device key 34 stored in the interface unit 31, and mutual authentication is performed between the recording medium 1 and the second recording device 30.
- the key decryption unit 39 reads the encrypted content key 6 written in the protected area 5 of the recording medium 1 by the first recording device 10 and uses the medium specific information 33. The encrypted content key 6 is decrypted and the content key 16 is obtained.
- the key combining unit 36 combines the medium unique information 33 and the additional information 35 to generate a combined key 37.
- the key encryption unit 38 re-encrypts the decrypted content key 16 using the composite key 37, and uses the re-encrypted content key as the re-encryption content key 6a.
- Overwrite (rewrite) protection area 5 5.
- the encrypted content key 6 of the recording medium 1 is rewritten to the re-encrypted content key 6 a by the second recording device 30. This rewriting is performed before the recording medium 1 is handed over from the dealer side to the user having the terminal device 51.
- the terminal device 51 is a device that reproduces content, and is, for example, a mobile terminal such as a mobile phone owned by a user.
- the additional information 35 shown in FIG. 3 is acquired before the encrypted content key 6 is re-encrypted by the second recording device 30.
- the terminal device 51 includes additional information 35 that distinguishes itself from other terminal devices, and a communication unit 52 that transmits information to the second recording device 30 in a wired or wireless manner.
- the second recording device 30 has a communication unit 53 for transmitting information to the terminal device 51 in a wired or wireless manner.
- the second recording device 30 requests the terminal device 51 to acquire the additional information 35 through the communication unit 53.
- the terminal device 51 transmits the additional information 35 in the terminal device 51 to the second recording device 30 through the communication unit 52.
- the second recording device 30 receives the additional information 3 through the communication unit 53 and stores it in the interface unit 31.
- the communication units 52 and 53 of the terminal device 51 and the second recording device 30 are connected by wire or wirelessly.
- the communication units 52 and 53 are dial-up connection using a telephone line, LAN It may be connected via the Internet by ADSL or optical communication connection.
- the second recording device 30 obtains the additional information 35 of the terminal device 51 from the store side, and re-encrypts the encrypted content key 6 using the additional information 35.
- the recording medium 1 After being recorded on the recording medium 1, the recording medium 1 is delivered to the user who owns the terminal device 51. Then, the content stored in the recording medium 1 is reproduced by the terminal device 51 on the user side.
- the configuration ′ operation of the terminal device 51 will be described.
- FIG. 4 shows the internal configuration of the terminal device 51 and the recording medium 1.
- FIG. 4 mainly shows a configuration necessary for playing the terminal device 51 S content 19 .
- the terminal device 51 has an interface unit 21 that is connected to the recording medium 1 in addition to the communication unit 52 of FIG.
- the interface unit 21 is written in the mutual authentication processing unit 22 that performs mutual authentication with the recording medium 1, the key combining unit 26 that generates the composite key 37 by combining the medium specific information 23 and the additional information 35, and the recording medium 5.
- a key decryption unit 29 that decrypts the re-encrypted content key 6a, a content decryption unit 43 that decrypts the encrypted content 8, and a playback unit 20 that reproduces the decrypted content 19.
- the interface unit 21 further stores a device key 24 and additional information 35 in a built-in storage area. Stored in the area.
- the terminal device 51 reproduces the encryption key content 8 stored in the recording medium 1
- the mutual authentication processing unit 22 of the terminal device 51 is stored in the interface unit 21 and the recording medium ID 3 and the mutual authentication key 4 in the ROM area 2 of the recording medium 1.
- the medium specific information 23 is generated from the device key 24 and the recording medium 1 and the terminal device 51 perform mutual authentication.
- the key combining unit 26 combines the medium specific information 23 and the additional information 35 to generate a combined key 37.
- the key decryption unit 29 reads the re-encrypted content key 6 a from the protected area 5 of the recording medium 1, decrypts it using the composite key 37, and obtains the content key 16. Then, the content decryption unit 43 reads the encrypted content 8 from the data area 7 of the recording medium 1 and decrypts it using the content key 16. The playback unit 20 plays back the content 19 obtained by decryption.
- the content is pre-written on the recording medium and sold or distributed.
- the prerecorded media when the first recording device 10 writes the content on the recording medium 1, the content is reproduced. Since the terminal device 51 is not specified, the additional information 35 of the terminal device 51 cannot be used.
- the content key 16 is re-encrypted by the second recording device 30 using the additional information 35 of the terminal device 51 to the recording medium 1. Write. Therefore, only the terminal device 51 having the same additional information 35 as the additional information 35 used for the re-encryption of the content key 16 and the second recording device 30 that acquired the additional information 35 are used.
- Content 19 cannot be played. That is, even if the recording medium 1 is connected to another terminal device with different additional information, the other terminal device cannot decrypt the re-encrypted content key 6a and cannot reproduce the content 19.
- the content is recorded only by a specific terminal device by the second recording device 30. Can only be played.
- the encrypted content 8 itself can be processed in a short time because the processing is completed simply by re-encrypting the content key 16 that does not need to be re-encrypted.
- the constituent elements in each interface unit of the first recording device 10, the second recording device 30, and the terminal device 51 in the present embodiment are realized by individual hardware or software. That's right.
- the content 19 is audio information, video information, data usable on a computer, mixed data thereof, and the like, and the content of the content 19 is not limited in the present invention.
- the recording medium 1 can be applied regardless of the type of semiconductor memory, optical disk, magnetic disk, or the like.
- the additional information 35 may be, for example, information such as an ID or serial number recorded in the manufacturing capability in the ROM of the terminal device 51, or when the recording medium 1 is handed over to the user, Information such as a telephone number recorded in the device 51 may be used.
- the additional information 35 of the terminal device 51 is transmitted via the communication units 52 and 53.
- the additional information 35 of the terminal device 51 may be input via a keyboard or the like connected to the second recording device 30.
- the second recording device 30 is not limited to a content key processing device owned by a store that sells recording media, and content key processing such as a personal computer owned by a user who purchases the recording media. It may be a device.
- the second recording device 30 may be a portable terminal that is permitted to reproduce the content 19 that is not played by a personal computer. In this case, the second recording device 30 re-encrypts the content key 16 with the additional information unique to the second recording device 30 instead of acquiring the additional information 35 from the terminal device 51. Then, the content 19 may be reproduced by the second recording device 30.
- FIGS. 5 to 7 of the second embodiment components having the same functions as those in FIGS. Show.
- FIG. 5 shows the internal configuration of the first recording device 10a and the recording medium 1 in Embodiment 2 of the present invention.
- FIG. 5 mainly shows a configuration necessary when the first recording apparatus 1 Oa writes the content 19 to the recording medium 1.
- the first recording device 10a is a recording device that is supposed to be used on the content pronoider side that sells / distributes content, and is, for example, a personal computer.
- a second recording device which will be described later, is a content key processing device that is assumed to be used mainly on the user side, and is a mobile terminal such as a mobile phone that is permitted to reproduce the content 19, for example.
- Recording medium 1 is a semiconductor memory sold at a store.
- the first recording device 10a of the second embodiment includes a re-encryption control information generation unit 18 that writes the re-encryption control information 9 in the data area 7 of the recording medium 1.
- the re-encryption control information 9 is information indicating whether or not the re-encryption of the content key 16 is necessary.
- the first recording device 10a of the second embodiment records the encrypted content key 6 and the encrypted content 8 after mutual authentication with the recording medium 1 in the same procedure as in the first embodiment. Write to medium 1.
- the re-encryption control information generation unit 18 generates re-encryption control information 9 indicating information that re-encryption is necessary, and stores the re-encryption control information 9 in the data area 7 of the recording medium 1. Write.
- the recording medium 1 in which the encrypted content key 6, the encrypted content 8, and the re-encryption control information 9 are written on the content provider side is directly or via a store or the like. Passed to owning user. Then, the re-encryption of the content key of the recording medium 1 and the reproduction of the content are performed by the second recording device.
- the configuration of the second recording apparatus will be described.
- FIG. 6 shows the internal configuration of second recording device 30a and recording medium 1.
- FIG. 6 is mainly necessary when the second recording device 30a re-encrypts the content key 16 and writes it to the recording medium 1. The structure is shown.
- the second recording device 30a of the second embodiment reads the re-encryption control information 9 from the recording medium 1 and determines whether or not the re-encryption is necessary.
- the additional information 35 of the present embodiment may be information such as a unique ID and serial number recorded in the manufacturing time on the ROM of the second recording device 30a, for example. It may be information such as a telephone number recorded in the second recording device 30a when the recording medium 1 on which the number 6 is recorded is delivered from the content provider or the store side to the user.
- the re-encryption control unit 41 reads the re-encryption control information 9 from the data area 7 of the recording medium 1, and re-encrypts the control information 9 Based on the above, it is determined whether the content key needs to be re-encrypted.
- the second recording device 30a Only when the re-encryption control unit 41 determines that re-encryption is necessary, the second recording device 30a performs re-encryption processing of the content key 16. That is, when the mutual authentication processing unit 32 performs mutual authentication with the recording medium 1 and the mutual authentication is successful, the second recording device 30a receives the encrypted content key 6 as in the first embodiment. Rewrite to re-encrypted content key 6a
- the re-encryption control information correcting unit 42 converts the re-encryption control information 9 into information that re-encryption is unnecessary, and overwrites the data area 7 of the recording medium 1. Note that the re-encryption control information correction unit 42 records the re-encryption control information 9 instead of overwriting the re-encryption control information 9 indicating the information! It can be erased from Medium 1.
- FIG. 7 shows the internal configuration of the second recording device 30a and the recording medium 1 required when the second recording device 30a reproduces the content in the present embodiment. With reference to FIG. 7, the procedure in which the second recording device 30a reproduces the content 19 from the recording medium 1 will be described.
- the control unit 41 reads the re-encryption control information 9 from the data area 7 of the recording medium 1 and determines whether or not the re-encryption of the content key is necessary.
- the second recording device 30a stores the content key The re-encryption process is not performed.
- the second recording device 30a decrypts the re-encrypted key content key 6a. For this reason, the mutual authentication processing unit 32 performs mutual authentication with the recording medium 1, and if the mutual authentication is successful, it is stored in the protected area 5 of the recording medium 1 in the same manner as the terminal device 51 of the first embodiment. Read the re-encrypted content key 6a. Then, the key decryption unit 39 decrypts the re-encrypted content key 6a with the composite key 37 including the additional information 35, and acquires the content key 16.
- the content decryption unit 43 decrypts the encrypted content 8 stored in the data area 7 of the recording medium 1 using the content key 16, and the playback unit 20 plays back the content 19.
- the second recording device 30a reads the re-encryption control information 9 first, determines whether re-encryption is necessary, and processes the force.
- the content key 16 can be re-encrypted efficiently.
- the present embodiment is suitable for the case where the second recording device 30a is a device with low power consumption like a portable terminal.
- the first recording device 10a re-encrypts the encrypted content key 6 when writing the encrypted content 8 and the encrypted content key 6 into the recording medium 1.
- Re-encryption control information 9 is written to recording medium 1 with the content that ⁇ is necessary. Therefore, when the recording medium 1 is inserted into the second recording device 30a, the second recording device 30a determines that re-encryption is necessary, and the encryption is performed based on the re-encryption control information 9.
- Key content key 6 can be rewritten to re-encrypted content key 6a.
- the second recording device 30a rewrites the re-encryption control information 9 with information that does not require re-encryption or erases the re-encryption control information 9 from the recording medium 1. After that, even if another recording device connects the recording medium 1, it cannot be determined that the re-encryption is necessary based on the re-encryption control information. 6 can not be rewritten.
- the first recording device 10a is a device for reproducing content. Even if the content is written to the recording medium 1 at a stage, the content can be reproduced only by the second recording device.
- the encrypted content 8 itself can be processed in a short time because the processing is completed simply by re-encrypting the content key 16 that does not need to be re-encrypted.
- re-encryption control information 9 may be written in the protection area 5 instead of being written in the data area 7 of the recording medium 1.
- the recording medium 1 can be applied regardless of the type of semiconductor memory, optical disk, magnetic disk, or the like.
- constituent elements of the interface units of the first recording device 10a and the second recording device 30a in the present embodiment can be realized by individual hardware or software.
- the first recording device 10 or 10a may acquire the content 19 from a distribution server connected via a network.
- FIG. 8 shows the internal configuration of the first recording device 10, the distribution server 120, and the recording medium 1.
- FIG. 8 mainly shows a configuration necessary when the first recording device 10 acquires content from the distribution server 120.
- the distribution server 120 uses the content key 16, the content 19, and the content key 16 to generate the B sound key content 8 by generating the B sound key content 8 by using the content key B. Has 17.
- the first recording device 10 receives the content key 16 and the encrypted content 8 from the distribution server 120, respectively.
- the first recording device 10 includes a content recording unit 58 and records the received encrypted content 8 in the data area 7 of the recording medium 1.
- the key encryption unit 15 encrypts the content key 16 using the medium specific information 13 and writes the generated encrypted content key 6 in the protected area 5 of the recording medium 1.
- the first recording device 10 may obtain the B-coded content 8 and the content key 16 from the distribution server 120 having various contents.
- the first recording device 10 in FIG. 8 does not include the re-encryption key control information generation unit.
- the first recording apparatus of the present embodiment may have a re-encryption control information generation unit 18 as shown in FIG. 5 of the second embodiment.
- the corresponding second recording apparatus may have the same configuration as that in FIG. 6 or FIG.
- the present invention is useful for a recording apparatus and a recording method for recording a content encrypted with a content key and a content key encoded with B sound on a recording medium.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/658,317 US20080294908A1 (en) | 2004-07-30 | 2005-07-27 | Recording Device, Content Key Processing Device, Recording Medium, and Recording Method |
CN200580025754.1A CN101002422B (zh) | 2004-07-30 | 2005-07-27 | 记录装置、内容密钥处理装置、记录介质以及记录方法 |
JP2006527829A JPWO2006011527A1 (ja) | 2004-07-30 | 2005-07-27 | 記録装置、コンテンツ鍵処理装置、及び記録媒体 |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-223163 | 2004-07-30 | ||
JP2004223163 | 2004-07-30 | ||
JP2004353922 | 2004-12-07 | ||
JP2004-353922 | 2004-12-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006011527A1 true WO2006011527A1 (ja) | 2006-02-02 |
Family
ID=35786277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/013760 WO2006011527A1 (ja) | 2004-07-30 | 2005-07-27 | 記録装置、コンテンツ鍵処理装置、記録媒体、及び記録方法 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20080294908A1 (ja) |
JP (1) | JPWO2006011527A1 (ja) |
CN (1) | CN101002422B (ja) |
WO (1) | WO2006011527A1 (ja) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008065945A (ja) * | 2006-09-09 | 2008-03-21 | Sony Corp | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム |
WO2009004707A1 (ja) * | 2007-07-02 | 2009-01-08 | Pioneer Corporation | 情報記録媒体、記録装置及び再生装置 |
JP2010231458A (ja) * | 2009-03-26 | 2010-10-14 | Kyocera Corp | 電子機器 |
JP2010288123A (ja) * | 2009-06-12 | 2010-12-24 | Hagiwara Sys-Com:Kk | 暗号化記憶装置、情報機器、暗号化記憶装置のセキュリティ方法 |
JP2012004766A (ja) * | 2010-06-16 | 2012-01-05 | Mega Chips Corp | 情報管理システム、端末装置、および端末装置の動作方法 |
JP2012506583A (ja) * | 2008-10-23 | 2012-03-15 | エスティー‐エリクソン、ソシエテ、アノニム | メモリデバイスにデータを格納する方法およびそのようなデータを処理する処理デバイス |
JP2013255261A (ja) * | 2009-04-06 | 2013-12-19 | Panasonic Corp | 鍵実装システム |
JP2014072749A (ja) * | 2012-09-28 | 2014-04-21 | Toshiba Corp | 鍵付け替え管理装置および鍵付け替え管理方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8761402B2 (en) * | 2007-09-28 | 2014-06-24 | Sandisk Technologies Inc. | System and methods for digital content distribution |
US9083685B2 (en) * | 2009-06-04 | 2015-07-14 | Sandisk Technologies Inc. | Method and system for content replication control |
US20120124386A1 (en) * | 2010-11-16 | 2012-05-17 | Lin Jason T | Method and System for Refreshing Content in a Storage Device |
US9223942B2 (en) | 2013-10-31 | 2015-12-29 | Sony Corporation | Automatically presenting rights protected content on previously unauthorized device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1040100A (ja) * | 1996-03-29 | 1998-02-13 | Internatl Business Mach Corp <Ibm> | 暗号エンベロープの作成方法 |
JP2002539724A (ja) * | 1999-03-15 | 2002-11-19 | トムソン ライセンシング ソシエテ アノニム | デジタル・ホーム・ネットワーク用のグローバル・コピー保護システム |
JP2004139473A (ja) * | 2002-10-18 | 2004-05-13 | Toshiba Corp | コンテンツ記録装置、再生装置及び記録再生装置、並びに記憶媒体 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US101990A (en) * | 1870-04-19 | Improvement in wheat-drills | ||
JP2986476B2 (ja) * | 1988-07-29 | 1999-12-06 | 松下電器産業株式会社 | 記録システム |
EP0936812A1 (en) * | 1998-02-13 | 1999-08-18 | CANAL+ Société Anonyme | Method and apparatus for recording of encrypted digital data |
JP3925095B2 (ja) * | 2001-02-01 | 2007-06-06 | 株式会社日立製作所 | データ受信装置 |
JP2004139433A (ja) * | 2002-10-18 | 2004-05-13 | Toshiba Corp | 端末装置とこの装置で使用する記録媒体、及びコンテンツ管理システムとその管理サーバ |
-
2005
- 2005-07-27 CN CN200580025754.1A patent/CN101002422B/zh not_active Expired - Fee Related
- 2005-07-27 WO PCT/JP2005/013760 patent/WO2006011527A1/ja active Application Filing
- 2005-07-27 JP JP2006527829A patent/JPWO2006011527A1/ja active Pending
- 2005-07-27 US US11/658,317 patent/US20080294908A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1040100A (ja) * | 1996-03-29 | 1998-02-13 | Internatl Business Mach Corp <Ibm> | 暗号エンベロープの作成方法 |
JP2002539724A (ja) * | 1999-03-15 | 2002-11-19 | トムソン ライセンシング ソシエテ アノニム | デジタル・ホーム・ネットワーク用のグローバル・コピー保護システム |
JP2004139473A (ja) * | 2002-10-18 | 2004-05-13 | Toshiba Corp | コンテンツ記録装置、再生装置及び記録再生装置、並びに記憶媒体 |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008065945A (ja) * | 2006-09-09 | 2008-03-21 | Sony Corp | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム |
US7983416B2 (en) | 2006-09-09 | 2011-07-19 | Sony Corporation | Information processing device, information processing method, and computer program |
WO2009004707A1 (ja) * | 2007-07-02 | 2009-01-08 | Pioneer Corporation | 情報記録媒体、記録装置及び再生装置 |
JP2012506583A (ja) * | 2008-10-23 | 2012-03-15 | エスティー‐エリクソン、ソシエテ、アノニム | メモリデバイスにデータを格納する方法およびそのようなデータを処理する処理デバイス |
JP2010231458A (ja) * | 2009-03-26 | 2010-10-14 | Kyocera Corp | 電子機器 |
JP2013255261A (ja) * | 2009-04-06 | 2013-12-19 | Panasonic Corp | 鍵実装システム |
JP2010288123A (ja) * | 2009-06-12 | 2010-12-24 | Hagiwara Sys-Com:Kk | 暗号化記憶装置、情報機器、暗号化記憶装置のセキュリティ方法 |
JP2012004766A (ja) * | 2010-06-16 | 2012-01-05 | Mega Chips Corp | 情報管理システム、端末装置、および端末装置の動作方法 |
JP2014072749A (ja) * | 2012-09-28 | 2014-04-21 | Toshiba Corp | 鍵付け替え管理装置および鍵付け替え管理方法 |
US9166781B2 (en) | 2012-09-28 | 2015-10-20 | Kabushiki Kaisha Toshiba | Key change management apparatus and key change management method |
Also Published As
Publication number | Publication date |
---|---|
US20080294908A1 (en) | 2008-11-27 |
CN101002422B (zh) | 2010-11-10 |
CN101002422A (zh) | 2007-07-18 |
JPWO2006011527A1 (ja) | 2008-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006011527A1 (ja) | 記録装置、コンテンツ鍵処理装置、記録媒体、及び記録方法 | |
US7428307B2 (en) | Data reproduction apparatus capable of safely controlling reproduction time of encrypted content data and data reproduction circuit and data recording apparatus used for the same | |
US7353543B2 (en) | Contents distribution system | |
RU2286021C2 (ru) | Способ и устройство для передачи данных содержимого и устройство записи и/или воспроизведения | |
USRE42106E1 (en) | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon | |
JP4760101B2 (ja) | コンテンツ提供システム,コンテンツ再生装置,プログラム,およびコンテンツ再生方法 | |
US7933837B2 (en) | Content information providing system, content information providing server, content reproduction apparatus, content information providing method, content reproduction method and computer program | |
JP2010267240A (ja) | 記録装置 | |
JP2000236325A (ja) | デジタルデータファイルの暗号化装置及びその方法 | |
JP2001243707A (ja) | 情報送受信システム、及び電子機器 | |
WO2001069842A1 (fr) | Dispositif de reproduction de contenus | |
JP2003022219A (ja) | コンテンツデータを容易に再取得できるデータ端末装置、その端末装置において実行されるプログラム、およびそのプログラムを記録した記録媒体 | |
JP2003158514A5 (ja) | ||
JP4287097B2 (ja) | デジタル著作物保護システム、記録再生装置、記録媒体装置及び機種変更装置 | |
JP2002374244A (ja) | 情報配信方法 | |
JP4703591B2 (ja) | 情報配信システムと配信センター装置、ユーザ端末装置及び情報配信方法 | |
JP4110511B2 (ja) | コンテンツ利用管理システム、情報処理装置、および方法、並びにコンピュータ・プログラム | |
WO2003073295A1 (fr) | Dispositif hote | |
JP4779872B2 (ja) | 記録装置、情報処理装置、情報処理方法 | |
JP2005011105A (ja) | 再生装置、暗号化記録装置及びプログラム | |
JP2008099087A (ja) | 情報記録再生プログラム、情報処理装置、および情報記録再生方法 | |
JP2006085815A (ja) | 記録再生装置、コンテンツ再生方法及びコンテンツ記録方法 | |
JP2006254204A (ja) | コンテンツ再生システム、装置及びプログラム | |
JP2005080218A (ja) | 記録再生システム及び再生システム | |
JP5295640B2 (ja) | コンテンツ再生装置及びコンテンツ配信装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006527829 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580025754.1 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase | ||
WWE | Wipo information: entry into national phase |
Ref document number: 11658317 Country of ref document: US |