WO2001078300A1 - Dispositif et procede d'enregistrement et de reproduction d'informations - Google Patents
Dispositif et procede d'enregistrement et de reproduction d'informations Download PDFInfo
- Publication number
- WO2001078300A1 WO2001078300A1 PCT/JP2001/002963 JP0102963W WO0178300A1 WO 2001078300 A1 WO2001078300 A1 WO 2001078300A1 JP 0102963 W JP0102963 W JP 0102963W WO 0178300 A1 WO0178300 A1 WO 0178300A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- data
- information
- recording medium
- encryption
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00115—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers wherein the record carrier stores a unique medium identifier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00188—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00188—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
- G11B20/00195—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier using a device identifier associated with the player or recorder, e.g. serial numbers of playback apparatuses or MAC addresses
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00507—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein consecutive physical data units of the record carrier are encrypted with separate encryption keys, e.g. the key changes on a cluster or sector basis
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00528—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein each title is encrypted with a separate encryption key for each title, e.g. title key for movie, song or data file
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
- G11B20/00768—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
- G11B20/00775—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags wherein said copy control information is encoded in an encryption mode indicator [EMI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to an information recording apparatus, an information reproducing apparatus, an information recording method, an information reproducing method, an information recording medium, and a program providing medium.
- the present invention provides a configuration capable of reducing the load of overnight distribution in updating a master key or a media key or the like by holding down the key.
- each recording / reproducing device is arranged on each leaf (reef) of an n-ary tree
- the content is transmitted to a recording medium of the content via a recording medium or a communication line.
- An information recording device that distributes the keys necessary for recording or playback from a recording medium (a key or a media key) and that each device records and plays back content data using this key.
- the present invention relates to an apparatus, an information recording method, an information reproducing method, an information recording medium, and a program providing medium.
- BACKGROUND ART With the progress and development of digital signal processing technology, in recent years, recording devices and recording media for digitally recording information have become widespread. According to such a digital recording device and recording medium, for example, recording and reproduction can be repeated without deteriorating images and sounds. In this way, digital data can be copied over and over again while maintaining image quality and sound quality. If recording media on which copying was illegally entered the market, various types of music, movies, etc. The interests of the copyright holder of the content or the legitimate sales right holder will be harmed. In recent years, in order to prevent such illegal copying of digital data, various mechanisms (systems) for preventing illegal copying on digital recording devices and recording media have been developed. Has been introduced.
- an MD Mini Disc
- MD is a trademark
- SCMS Serial Copy Management System
- the SCMS outputs a SCMS signal along with audio data from the digital interface (DIF) on the data playback side, and the recording side records audio data from the playback side based on the SCMS signal from the playback side.
- DIF digital interface
- the audio data is either copy-free data that can be copied any number of times, or data that is allowed to be copied only once (copy once allowed). Or a signal indicating that copying is prohibited (copy-prohibited).
- an SCMS signal transmitted together with the audio data is detected. If the S CMS signal is copy free, the audio data is recorded on the mini disc together with the S CMS signal. If the S CMS signal is permitted to be copied only once (copy once allowed), the S CMS signal is changed to “copy prohibited”, and the mini disc and the audio disc are changed together. To record. Further, if the S CMS signal is copy prohibited, the audio data is not recorded.
- the minidisk device prevents the copyrighted audio data from being illegally copied by the SCMS.
- the S CMS is based on the premise that the device that records the data itself has a configuration for controlling the recording of audio data from the playback side based on the S CMS signal. It is difficult to deal with a case where a mini-disk device is manufactured that does not have a configuration for performing the above control.
- a DVD player employs a content scramble system to prevent illegal copying of copyrighted data.
- video data and audio data are encrypted and recorded on DVD-Read Only Memory (R ⁇ M).
- the key (decryption key) used to decrypt the encrypted data is given to the licensed DVD player.
- a license is granted to DVD players designed to comply with prescribed operating rules, such as not to make unauthorized copies. Therefore, the licensed DVD player reproduces images and audio from the DVD-ROM by decrypting the encrypted data recorded on the DV D-ROM using the given key. be able to.
- an unlicensed DVD player does not have a key for decrypting encrypted data, so it can decrypt encrypted data recorded on DVD-ROM. Can not.
- a DVD player that does not meet the conditions required at the time of licensing will not be able to play the DVD with recorded digital data, preventing illegal copying. It has become to be.
- the content scramble system used in DVD-R0M is intended for recording media on which data cannot be written by the user (hereinafter referred to as ROM media as appropriate).
- ROM media the content scramble system used in DVD-R0M
- RAM media the application to recording media that can be used
- Japanese Patent Application No. 11-244244 Japanese Patent Application No. 10-25310
- medium identification information is recorded on a recording medium together with other data, and provided that the device is licensed for the medium identification information, and only when the condition is satisfied, the recording medium is recorded.
- the data on the recording medium is encrypted with the medium identification information and a secret key (master key) obtained by receiving the license, and the license is received. Even if a device that does not read this encrypted data, it cannot obtain meaningful data.
- the license is received, the operation is specified so that unauthorized duplication (illegal copying) cannot be performed.
- Unlicensed devices cannot access the media identification information, and since the media identification information is an individual value for each medium, the unlicensed device is recorded on the recording medium. Even if all of the encrypted data is copied to a new recording medium, the data recorded on the recording medium created in such a manner is, of course, unlicensed devices, Even on a licensed device, it cannot be decrypted correctly, which effectively prevents piracy.
- the master key stored in the licensed device is generally common to all devices. Storing a common master key for multiple devices in this way is necessary to enable the medium recorded on one device to be played on another device (to ensure interoperability). This is a condition.
- the entire system can decrypt the recorded data, and the entire system can be decrypted. Collapse.
- the master key is updated to a new one, and the newly updated master key is updated to all devices except the one that yielded to the attack. It becomes necessary to give a star key.
- the simplest method to realize this configuration is to assign a unique key (device key) to each device, prepare a new master key encrypted with each device key, and record it.
- a method of transmitting data to a device via a medium is conceivable, but there is a problem in that the total amount of messages to be transmitted increases in proportion to the number of devices.
- the present invention has been made to solve the above-described problem, and has a wooden structure.
- a layered key distribution method a configuration is provided that enables the amount of messages to be kept small and the load on the distribution of new updated keys to be reduced. That is, using a key distribution method in which each device is arranged on each leaf of the n-ary tree, recording of content data on or from a recording medium via a recording medium or a communication line.
- An information recording device an information reproducing device, an information recording method, an information reproducing method, in which a key (master key or media key) required for reproduction is distributed and each device records and reproduces content data using the key.
- a key master key or media key
- an information recording medium and a program providing medium.
- an information recording apparatus for recording information on a recording medium, comprising: a node key unique to each node constituting a hierarchical tree structure having a plurality of different information recording apparatuses as leaves; A cryptographic processing unit that holds a unique leaf key and executes a process of encrypting data stored on a recording medium, wherein the cryptographic processing unit is configured to perform encryption processing based on encryption key generation data built in the information recording device. And encrypting data stored in the recording medium by performing encryption processing.
- the encryption key generation data can be updated using at least one of the node key and the leaf key.
- the data for generating an encryption key is a master key common to a plurality of information recording devices.
- the data for generating an encryption key is a media key unique to a specific recording medium.
- the node key is configured as an updatable key
- the update node key is encrypted with a key including at least one of a lower-level node key and a leaf key during an update process.
- KRB key update block
- the key update block (KRB) is stored in a recording medium, and the encryption processing means reads the key update block (KRB) read from the recording medium. ) Is performed.
- the encryption key generation data has a configuration in which a generation number as update information is associated, and the encryption processing unit When the encrypted data is stored, the generation number of the used encryption key generation data is stored as a recording generation number in the recording medium.
- the first encryption key of data stored on the recording medium is generated based on the first encryption key generation data, and the first encryption key is generated.
- Performing a key-based encryption process on the stored data storing the first encryption key generation data in the recording medium, and performing a data encryption process without restriction on a playback device;
- a second encryption key for storing data on the recording medium is generated based on data for generating a second encryption key built in the recording device, and an encryption process based on the second encryption key is performed.
- the encryption processing means includes: a generation-managed master key stored in the information recording apparatus; A title unique key is generated based on a disc ID that is a medium identifier, a title key unique to data to be recorded on the recording medium, and a device ID that is an identifier of the information recording apparatus, and the title unique key is generated. Generating the first encryption key based on the generation-managed master key stored in the information recording device and the recording medium identifier unique to the recording medium in the encryption processing with the playback device restriction. A disc ID, a title key unique to the data to be recorded on the recording medium, and a device unique key that is a unique key of the information recording apparatus. And generating a second encryption key based on the title unique key based on the title unique key.
- a transport stream processing means for adding reception time information (ATS) to each packet constituting a transport stream composed of intermittent transport packets.
- the encryption processing means has a configuration for generating a block key as an encryption key for a block of one or more packets to which the reception time information (ATS) is added, and In the encryption processing of the stored data, a block key as an encryption key is generated based on data including the encryption key generation data and a block seed which is additional information unique to the block data including the reception time information (ATS). Is generated.
- the encryption processing means is configured to execute encryption processing of data stored in the recording medium in accordance with a DES algorithm.
- the information recording apparatus further includes interface means for receiving information to be recorded on a recording medium, and the interface means constitutes a device. It is characterized by having a configuration in which copy control information added to each packet included in the transport stream is identified, and whether or not recording on a recording medium can be executed is controlled based on the copy control information.
- the information recording apparatus further includes an interface unit for receiving information to be recorded on a recording medium, wherein the interface unit includes copy control information for controlling a copy.
- the present invention is characterized in that it has a configuration for identifying two-bit EMI (Encryption Mode Indicator) and controlling whether or not to execute recording on a recording medium based on the EMI.
- a second aspect of the present invention relates to an information reproducing apparatus for reproducing information from a recording medium, wherein a node key unique to each node constituting a hierarchical tree structure having a plurality of different information reproducing apparatuses as leaves and each information
- a cryptographic processing unit that holds a leaf key unique to the playback device and executes decryption processing of encrypted data stored in a recording medium, wherein the cryptographic processing unit includes decryption key generation data built in the information recording device. Based on The decryption key generation data is generated by using at least one of the node key and the leaf key.
- the information reproducing apparatus is characterized in that the information reproducing apparatus is configured as a simple device.
- the decryption key generation data is a master key common to a plurality of information recording apparatuses.
- the decryption key generation data is a media key unique to a specific recording medium.
- the node key is configured as an updatable key, and at the time of the updating process, the updated node key is encrypted with a key including at least one of a lower layer node key and a leaf key. And distributing the updated key update block (KRB) to the information reproducing device of the leaf to be updated, wherein the encryption processing means in the information recording device includes the decryption key generation data encrypted by the update node key.
- the update node key is obtained by encryption processing of a key update block (KRB), and update data of the decryption key generation data is calculated based on the obtained update node key. It is characterized by having a configuration.
- the key update block (KRB) is stored in a recording medium, and the encryption processing means includes a key update block (KRB) read from the recording medium. ) Is performed.
- the decryption key generation data is configured to be associated with a generation number as update information, and the encryption processing unit transmits the decryption key from the recording medium.
- the generation number of the encryption key generation data used in the encryption processing of the encrypted data is read from the recording medium, and the decryption key generation data corresponding to the read generation number is read.
- the decryption key is generated by using the key.
- the encryption processing means acquires a generation-controlled master key stored in the information recording apparatus, and From the medium, a disc ID that is a recording medium identifier unique to the recording medium, a title key that is unique to the data to be decrypted, and a device that is an identifier of the device ID information recording device that is an identifier of the information recording device that recorded the encrypted data. ID, and a title unique key is generated based on the master key, the disc ID, the title key, and the device ID, and based on the title unique key, the first decryption key is obtained.
- Is generated, and in the decoding process with the playback device restriction, the generation-managed master key stored in the information recording device and the information recording device are stored.
- Device ID which is a unique key of the information recording apparatus
- a disc ID which is a recording medium identifier unique to the recording medium
- a title key which is unique to the data to be decrypted, from the recording medium.
- a title-specific key is generated based on a master key, a disk ID, a title key, and a device-specific key, and the second decryption key is generated based on the title-specific key. I do.
- Transport / stream processing means for executing data output control, wherein the encryption processing means uses a block key as a decryption key for block data composed of one or more packets to which the reception time information (ATS) is added.
- the decryption key generation data and the reception time information are generated. It is characterized in that a block key as a decryption key is generated based on data including a block seed, which is additional information unique to a program including (ATS).
- the encryption processing means is configured to execute a decryption process of encrypted data stored in the recording medium according to a DES algorithm.
- the information reproducing apparatus has interface means for receiving information to be recorded on a recording medium, and the interface means comprises a transport stream constituting data. , The copy control information added to each packet included in the packet is identified, and whether or not the reproduction from the recording medium can be executed is controlled based on the copy control information. Further, in one embodiment of the information reproducing apparatus of the present invention, the information reproducing apparatus further includes an interface unit for receiving information to be recorded on a recording medium, wherein the interface unit includes a 2-bit copy control information for controlling a copy. EMI (Encryption Mode Indicator) is identified, and whether to execute reproduction from a recording medium is controlled based on the EMI.
- EMI Encryption Mode Indicator
- a third aspect of the present invention relates to an information recording method for recording information on a recording medium, comprising a node key unique to each node constituting a hierarchical tree structure having a plurality of different information recording devices as leaves.
- An information recording method is characterized in that:
- the encryption key generating device is a common key common to a plurality of information recording devices.
- the encryption key generating data is a media key unique to a specific recording medium.
- the node key is configured as an updatable key, and at the time of the updating process, the updated node key is encrypted with a key including at least one of a lower-level node key and a leaf key.
- the updated key update block (KRB) is distributed to the information recording device of the leaf to be updated, and the updating step obtains the update node key by encrypting the key update block (KRB).
- the encryption key generation data has a configuration in which a generation number as update information is associated with the data
- the encryption processing step further includes the recording medium A step of storing the used generation number of the encryption key generation data as a recording generation number in the recording medium when storing the encrypted data.
- the encryption processing step includes: generating a first encryption key of data stored in the recording medium based on the first encryption key generation data; Performing an encryption process based on a first encryption key on the stored data, storing the first encryption key generation data in the recording medium, and performing a data encryption process without restriction on a playback device; A second encryption key is generated based on the second encryption key generation data built in the information recording device and stored in the storage medium, and an encryption process is performed based on the second encryption key. It is characterized in that data encryption processing with playback device restriction is performed for the storage data described above, and is selectively performed.
- the encryption processing step includes: in the encryption processing without restriction on the reproduction device, a generation-managed master key stored in an information recording device; A title unique key is generated based on a disc ID that is a medium identifier, a title key unique to data to be recorded on the recording medium, and a device ID that is an identifier of the information recording apparatus, and the title is generated.
- a title unique key is generated based on a disc ID that is a recording medium identifier unique to a recording medium, a title key unique to data to be recorded on the recording medium, and a device unique key that is a unique key of the information recording apparatus,
- the second encryption key is generated based on the title unique key.
- a transport stream processing for adding reception time information (ATS) to each packet constituting a transport stream composed of intermittent transport packets includes the steps of: generating a block key as an encryption key for a sequence of one or more packets to which the reception time information (ATS) is added; and storing the block key in the recording medium.
- a block key as an encryption key is generated based on data including the encryption key generation data and a block that is additional information unique to block data including the reception time information (ATS). It is characterized by the following.
- the encryption processing of the storage data on the recording medium is executed in accordance with a DS algorithm.
- copy control information added to each packet included in a transport stream constituting data is identified, and recording on a recording medium is performed based on the copy control information.
- the feature is to control the execution.
- two-bit EMI Encryption Mode Indicator
- recording on a recording medium is performed based on the EMI. It is characterized by controlling whether or not to perform.
- a fourth aspect of the present invention is an information reproducing method for reproducing information from a recording medium, and includes a node key unique to each node constituting a hierarchical tree structure having a plurality of different information reproducing devices as leaves.
- An update step for executing a process of updating decryption key generation data for generating a decryption key for performing a decryption process of the encrypted data stored in the recording medium using at least one of the leaf keys unique to the information reproducing apparatus;
- Information reproduction method for executing a process of updating decryption key generation data for generating a decryption key for performing a decryption process of the encrypted data stored in the recording medium.
- the decryption key generation data is a master key common to a plurality of information recording devices.
- the decryption key generation data is a media key unique to a specific recording medium.
- the node key is configured as an updatable key
- the updated node key is encrypted with a key including at least one of a lower layer node key and a leaf key.
- the updated key update block (KRB) is distributed to the information reproducing apparatus of the leaf to be updated, and the updating step obtains the update node key by encrypting the key update block (KRB).
- the decryption key generation data is configured to be associated with a generation number as update information
- the decryption processing step includes: At the time of decryption of the encrypted data, the generation number of the encryption key generation data used in the encryption processing of the encrypted data is read from the recording medium, and a decryption key generation corresponding to the read generation number is generated. It is characterized in that a decryption key is generated using data for use.
- the first decryption key for the encrypted data stored in the recording medium is determined based on the first decryption key generation data stored in the recording medium.
- the decryption processing step comprises: in the decryption processing without restriction on the reproduction device, acquiring a generation-managed master key stored in an information recording device; From the above, the disc ID, which is the recording medium identifier unique to the recording medium, the title key, which is unique to the data to be decrypted, the device ID, which is the identifier of the information recording device that has recorded the encrypted data, and the device ID, which is the identifier of the information recording device Obtaining a title-specific key based on the master key, the disc ID, the title key, and the device ID; generating the first decryption key based on the title-specific key; In a decryption process with playback device restrictions, a generation-managed master key stored in an information recording device and an information recording device Acquire the device unique key, which is the unique key of the stored information recording device, and acquire the disc ID, which is the recording medium identifier unique to the recording medium, and the
- the information reproducing apparatus performs the data reproduction based on the reception time information (ATS) added to each of the plurality of transport packets constituting the decoded block data.
- Transport 'stream processing means for performing output control wherein the decryption processing step comprises using a block key as decryption key for decryption data of one or more packets to which the reception time information (ATS) is added.
- the decryption key generation data and the process data that is the additional information unique to the program data including the reception time information (ATS) are included based on the data. It is characterized in that a block key as a decryption key is generated.
- the decrypting step executes decryption processing of the encrypted data stored in the recording medium in accordance with a DS algorithm.
- the information reproducing method of the present invention It is characterized in that copy control information added to each packet included in the transport stream is identified, and based on the copy control information, whether or not reproduction of data stored in the recording medium can be executed is controlled.
- two bits of EMI Encryption Mode Indicator
- EMI Encryption Mode Indicator
- a fifth aspect of the present invention is an information recording medium capable of recording information, wherein a node key and each information unique to each node constituting a hierarchical tree structure having a plurality of different information recording devices as leaves are provided.
- An information recording medium characterized by storing a key update block (KRB) obtained by encrypting an update node key included in a leaf key unique to a recording device with a key including at least one of a lower-level node key and a leaf key.
- KRB key update block
- the information recording apparatus further includes an encryption key generating device for generating an encryption key used for encrypting data stored in the recording medium. It is characterized by including data encrypted with an updated node key.
- the decryption key generation data for generating a decryption key used for the decryption processing of the encrypted data stored in the recording medium is updated. It is characterized by including data encrypted by NordKey.
- one embodiment of the information recording medium of the present invention is characterized in that it is configured to store generation information relating to encryption key generation data or decryption key generation data.
- a sixth aspect of the present invention is a recording medium manufacturing apparatus for manufacturing an information recording medium, and includes a node key unique to each node constituting a hierarchical tree structure having a plurality of different information recording apparatuses as leaves.
- a memory for storing a key update block (KRB) obtained by encrypting an update node key included in a leaf key unique to an information recording apparatus with a key including at least one of a lower-level node key and a leaf key;
- a control unit for executing a write control of the key update block (KRB) stored in the storage medium on the storage medium.
- the memory further includes: a recording medium identifier; and an encrypted encryption key generation data or an encrypted decryption key generation data.
- the control unit stores at least one of the recording medium identifier, the encrypted data for generating an encryption key, or the encrypted data for generating a decryption key on the storage medium. It is characterized in that only control is performed.
- the memory further stores generation information relating to encryption key generation data or decryption key generation data
- the control unit includes: The writing control for the recording medium is executed.
- a seventh aspect of the present invention is a recording medium manufacturing method for manufacturing a recording medium, comprising: a node key unique to each node constituting a hierarchical structure having a plurality of different information recording devices as leaves; Storing a key update block (KRB) in a memory obtained by encrypting an update node key included in a leaf key unique to a recording device with a key including at least one of a lower-level node key and a leaf key; and storing the key update block (KRB) in the memory. Writing a key update block (KRB) to the recording medium.
- KRB key update block
- the memory further includes at least a recording medium identifier, encrypted encryption key generation data, or encrypted decryption key generation data. And writing the at least one of the recording medium identifier, the encrypted encryption key generation data, and the encrypted decryption key generation data to the recording medium. It is characterized by.
- an eighth aspect of the present invention is a program providing medium for providing a computer program for causing a computer system to execute an information recording process for recording information on a recording medium, wherein the computer program is In addition, using at least one of a node key unique to each node and a leaf key unique to each information recording device that constitutes a hierarchical tree structure having a plurality of different information recording devices as leaves, the storage data on the recording medium is used.
- a ninth aspect of the present invention is a program providing medium for providing a computer program for causing an information reproducing process for reproducing information stored on a recording medium to be executed on a computer system.
- a decryption processing step of performing decryption processing of the encrypted data stored in the recording medium In program providing medium characterized.
- the amount of distribution messages required for key update is suppressed to a small value by using a hierarchical key distribution method having a tree structure. That is, using a key distribution method in which each device is arranged on each leaf (reef) of the n-branch tree, and recording or recording on a recording medium of content overnight via a recording medium or a communication line. A key (master key or media key) required for playback from the body is distributed, and each device records and plays back content data using this key.
- the format of the content to be recorded on the recording medium is an MPEG 2 TS packet (packet), and this packet is recorded with the ATS, which is the time information received by the recording device, added. .
- ATS is 24 to 32 bits Data, with some randomness.
- ATS is an abbreviation for Arrival Time Stamp.
- X TS packets to which ATS is added are recorded, and the data of the block is written using the ATS added to the first TS packet. Generates a mouth, Sokuki, to be encrypted.
- encryption can be performed using a unique key for each work, and a special area for storing the key is not required, and data other than the main data area can be used for recording and playback. There is no need to access.
- ATS not only ATS but also copy control information (CCI) can be added to the TS packet for recording, and a packet can be generated using the ATS and CCI. is there.
- CCI copy control information
- the program providing medium according to the eighth and ninth aspects of the present invention is, for example, a general-purpose computer system capable of executing various program codes, and a computer-readable program in a computer-readable format. It is a medium provided by.
- the form of the medium is not particularly limited, such as a recording medium such as CDFD and MO, or a transmission medium such as a network.
- Such a program providing medium defines a structural or functional cooperative relationship between the program and the providing medium for realizing the functions of the predetermined combination program on the computer system. It was done. In other words, by installing the computer program in the computer system via the provided medium, a cooperative action is exerted on the computer system, and the same operation and effect as in the other aspects of the present invention are obtained. You can do it.
- FIG. 1 is a block diagram showing a configuration example (part 1) of an information recording / reproducing apparatus according to the present invention.
- FIG. 2 is a block diagram showing a configuration example (part 2) of the information recording / reproducing apparatus of the present invention.
- FIG. 3A and FIG. 3B are diagrams showing a data recording process flow of the information recording / reproducing apparatus of the present invention.
- FIG. 4A and FIG. 4B are diagrams showing a data reproducing process flow of the information recording / reproducing apparatus of the present invention.
- FIG. 5 is a diagram illustrating a data format processed in the information recording / reproducing apparatus of the present invention.
- FIG. 6 is a block diagram showing a configuration of a transport stream (TS) processing means in the information recording / reproducing apparatus of the present invention.
- TS transport stream
- FIGS. 7A to 7C are diagrams illustrating the configuration of a transport stream processed in the information recording / reproducing apparatus of the present invention.
- FIG. 8 is a block diagram showing the configuration of the transport stream (T S) processing means in the information recording / reproducing apparatus of the present invention.
- FIG. 9 is a block diagram showing a configuration of a transport stream (TS) processing means in the information recording / reproducing apparatus of the present invention.
- TS transport stream
- FIG. 10 is a diagram showing a configuration example of block data as additional information of block data processed in the information recording / reproducing apparatus of the present invention.
- FIG. 11 is a tree diagram illustrating a process of encrypting a key such as a master key and a media key for the information recording / reproducing apparatus of the present invention.
- FIGS. 12A and 12B are diagrams showing an example of a key update procedure (KRB) used for distributing a key such as a master key and a media key to the information recording / reproducing apparatus of the present invention.
- KRB key update procedure
- FIG. 13 is a diagram showing an example of distribution and an example of decryption processing using a key update block (KRB) of a master key in the information recording / reproducing apparatus of the present invention.
- KRB key update block
- FIG. 14 is a diagram showing a decryption processing flow using the key update block (KRB) of the key in the information recording / reproducing apparatus of the present invention.
- KRB key update block
- FIG. 15 is a diagram illustrating a flow of a process of comparing generations of a key in a content recording process in the information recording / reproducing apparatus of the present invention.
- FIG. 16 is a block diagram (part 1) for explaining an encryption process at the time of data recording in a system capable of restricting the reproduction device in the information recording / reproducing apparatus of the present invention.
- FIG. 18 is a block diagram (part 2) for explaining an encryption process at the time of overnight recording processing in a system in which the playback device can be restricted in the recording / playback device.
- FIG. 9 is a flowchart illustrating a data recording process in a system that can be restricted.
- FIG. 19 is a diagram for explaining an example of generating a disc unique key in the information recording / reproducing apparatus of the present invention.
- FIG. 20 is a diagram showing a flow of a process of generating a title-specific key in a system capable of restricting reproduction devices in the information recording / reproducing apparatus of the present invention.
- FIG. 21 is a diagram showing an example of a process of generating a title-specific key at the time of overnight recording in a system capable of restricting reproduction devices in the information recording / reproducing apparatus of the present invention.
- FIG. 22 is a diagram illustrating a method of generating a block key in the information recording / reproducing apparatus of the present invention.
- FIG. 23 is a block diagram illustrating a decoding process at the time of the overnight playback process in the system capable of limiting the playback devices in the information recording / playback apparatus of the present invention.
- FIG. 24 is a flowchart illustrating data reproduction processing in a system capable of restricting reproduction devices in the information recording / reproducing apparatus of the present invention.
- FIG. 25 is a flowchart showing details of the reproducibility control determining process in the data reproducing process in the system capable of restricting the reproducing device in the information recording / reproducing apparatus of the present invention.
- FIG. 26 is a diagram showing a flow of a process of generating a title-specific key at the peak of the day in a system capable of restricting the reproduction device in the information recording / reproducing apparatus of the present invention.
- FIG. 27 is a diagram showing an example of distribution and an example of decryption processing using a key update block (KRB) of a media key in the information recording / reproducing apparatus of the present invention.
- KRB key update block
- FIG. 28 is a diagram showing a decryption processing flow using the key update block (KRB) of the media key in the information recording / reproducing apparatus of the present invention.
- KRB key update block
- FIG. 29 is a diagram showing a content recording processing flow using a media key in the information recording / reproducing apparatus of the present invention.
- FIG. 30 is a block diagram (part 1) for explaining the encryption processing at the time of data recording processing using a media key in a system capable of restricting reproduction equipment in the information recording / reproducing apparatus of the present invention.
- FIG. 31 is a block diagram (part 2) for explaining the encryption processing at the time of data recording processing using a media key in a system capable of restricting reproduction equipment in the information recording / reproducing apparatus of the present invention.
- FIG. 32 is a flowchart illustrating a data recording process using a media key in a system capable of restricting reproduction devices in the information recording / reproducing apparatus of the present invention.
- FIG. 33 is a block diagram illustrating an encryption process in a data reproduction process using a media key in a system capable of restricting reproduction devices in the information recording / reproducing apparatus of the present invention.
- FIG. 34 is a flowchart illustrating data reproduction processing using a media key in a system capable of restricting reproduction devices in the information recording / reproducing apparatus of the present invention.
- FIG. 35 is a flowchart showing details of the reproducibility determination process in the data reproduction process using the media key in the system capable of restricting the reproduction device in the information recording / reproducing apparatus of the present invention.
- FIG. 36 is a professional / soc diagram showing a configuration of a recording / reproducing apparatus in which the information recording / reproducing apparatus of the present invention is configured to receive KRB from the outside via a communication means or the like and to store it on a recording medium.
- FIG. 37 is a block diagram showing a process in the information recording / reproducing apparatus of the present invention for receiving KRB from outside via communication means and storing the KRB in a recording medium.
- FIG. 38 is a diagram showing a processing flow in which the information recording / reproducing apparatus of the present invention receives KRB from the outside via a communication means or the like and stores it in a recording medium.
- FIG. 39 is a diagram illustrating a process in which the information recording / reproducing device of the present invention receives KRB from outside via a communication means or the like and stores it in a recording medium.
- FIGS. 4OA and 40B are flowcharts illustrating copy control processing during data recording processing in the information recording / reproducing apparatus of the present invention.
- FIGS. 41A and 4IB are flowcharts illustrating copy control processing during data reproduction processing in the information recording / reproducing apparatus of the present invention.
- FIG. 42 is a block diagram showing a configuration of a processing unit when data processing is executed by software in the information recording / reproducing apparatus of the present invention.
- FIG. 43 is a block diagram showing a configuration of a manufacturing apparatus for manufacturing an information recording medium used in the information recording / reproducing apparatus of the present invention.
- FIG. 44 is a diagram showing a processing flow of a manufacturing process for manufacturing an information recording medium used in the information recording / reproducing apparatus of the present invention.
- FIG. 45 is a diagram showing a format example of a key update block (KRB) used in the information recording / reproducing apparatus of the present invention.
- KRB key update block
- FIGS. 46A to 46C are diagrams illustrating the configuration of a tag of a key update block (KRB) used in the information recording / reproducing apparatus of the present invention.
- KRB key update block
- FIG. 1 is a block diagram showing a configuration of an embodiment of a recording / reproducing apparatus 100 to which the present invention is applied.
- the recording / reproducing device 100 includes an input / output I / F (Interface) 120, an MPEG (Moving Picture Experts Group) codec 130, an input / output I / F (Interface) 140 provided with an A / D, D / A converter 141, It has a cryptographic processing means 150, a ROM (Read Only Memory) 160, a CPU (Central Processing Unit) 170, a memory 180, a drive 190 for a recording medium 195, and a transport / stream processing means (TS processing means) 300. These are interconnected by a bus 110.
- I / F Interface
- MPEG Motion Picture Experts Group
- I / F Interface
- It has a cryptographic processing means 150, a ROM (Read Only Memory) 160, a CPU (Central Processing Unit) 170, a memory 180, a drive 190 for a recording
- the input / output port 120 receives digital signals constituting various contents such as images, sounds, and programs supplied from the outside, outputs the digital signals on the bus 110, and outputs the digital signals on the bus 110. Receive and output to outside.
- the MPEG codec 130 decodes the MPEG-encoded data supplied via the bus 110, performs MPEG decoding, outputs the data to the input / output I / F 140, and outputs the data to the input / output I / F 1
- the digital signal supplied from 40 is MPEG encoded and output on bus 110.
- the input / output I / F 140 has an A / D and D / A converter 141 built-in.
- the input / output I / F 140 receives an analog signal as an externally supplied content and converts it into an A / D (Analog Digital) signal by the A / D and D / A converter 141. Output to the MPEG codec 130 and D / A (Digital Analog) conversion of the digital signal from the MPEG codec 130 by the A / D and D / A converters 141 as analog signals. Output to the outside.
- a / D Analog Digital
- the encryption processing means 150 is composed of, for example, a one-chip LSI (Large Scale Integrated Curcuit), and encrypts or decrypts a digital signal as content supplied via the bus 110, and It has a configuration to output on 0. Note that the encryption processing means 150 is not limited to a one-chip LSI, and can be realized by a configuration combining various software or hardware. The configuration as the processing means by the software configuration will be described later.
- LSI Large Scale Integrated Curcuit
- the ROM 160 includes, for example, a leaf key which is a device key unique to each recording / reproducing device or a group of a plurality of recording / reproducing devices, and a device key shared by a plurality of recording / reproducing devices or a plurality of groups.
- the node key that is is stored.
- the CPU 170 controls the MPEG codec 130, the encryption processing means 150, and the like by executing the program stored in the memory 180.
- the memory 1.80 is, for example, a non-volatile memory, and stores a program executed by the CPU 170 and data necessary for the operation of the CPU 170.
- the drive 190 reads (reproduces) digital data from the recording medium 195 by driving a recording medium 195 capable of recording and reproducing digital data, outputs the digital data to the bus 110, and outputs the digital data to the bus 110.
- the digital data supplied via the is supplied to a recording medium 195 for recording.
- the program may be recorded in the ROM 160 and the device key may be recorded in the memory 180.
- the recording medium 195 is a medium capable of storing digital data such as an optical disk such as a DVD or a CD, a magneto-optical disk, a magnetic disk, a magnetic tape, or a semiconductor memory such as a RAM. , Removable to drive 1 90 It is assumed that the configuration is possible. However, the recording medium 195 may be built in the recording / reproducing device 100.
- the transport 'stream processing means (TS processing means) 300 will be described in detail later with reference to FIG. 6 and the like.
- TS processing means 300 For example, a transport stream in which a plurality of TV programs (contents) are multiplexed is described.
- An ATS Arriv Time Stamp
- T-STD Transport stream System Target Decoder
- TS processing means 300 executes these controls. For example, when transport packets are recorded on a recording medium, they are recorded as source packets with the intervals between each packet shortened, but the appearance timing of each transport packet must also be stored on the recording medium. This makes it possible to control the output timing of each packet during playback.
- Transport stream processing means (TS processing means) 300 is an ATS (Arrival Time Stamp) representing the input timing of each transport packet when data is recorded on a recording medium 195 such as a DVD. : Incoming time stamp) is recorded.
- the recording / reproducing apparatus 100 of the present invention executes the encryption processing in the encryption processing means 150 with respect to the content constituted by the transport stream to which the above-described ATS has been added, and executes the content subjected to the encryption processing. Is stored in the recording medium 195. Further, the encryption processing means 150 executes decryption processing of the encrypted content stored in the recording medium 195. The details of these processes will be described later.
- the configuration shown in FIG. 2 is possible.
- the recording medium 205 can be detached from a recording medium interface (I / F) 210 as a drive device, and this recording medium 205 is connected to another recording / reproducing apparatus. It is designed to be able to read and write data even if it is mounted on a.
- step S 30 When recording the content of the digital signal (digital content) is supplied to the input / output I / F 120 via, for example, an IEEE (Institute of Electrical and Electronics Engineers) 1394 serial bus or the like, step S 30 At 1, the input / output I / F 120 receives the supplied digital contents and outputs it to the TS processing means 300 via the bus 110.
- the content of the digital signal digital content
- step S 30 At 1, the input / output I / F 120 receives the supplied digital contents and outputs it to the TS processing means 300 via the bus 110.
- step S 302 the TS processing means 300 generates, in step S 302, block data in which ATS has been added to each transport packet constituting the transport stream, and outputs the encrypted data via the bus 110. Output to 50.
- step S303 the encryption processing means 150 executes an encryption process on the received digital content, and stores the encrypted content obtained as a result in the drive 190 or in the storage via the node 110. Output to media I / F 210.
- the encrypted content is recorded on the recording medium 195 via the drive 190 or the recording medium I / F 210 (S304), and the recording process ends.
- the encryption processing in the encryption processing means 150 will be described later.
- the input / output I / F 120 on the data receiving side receives the encrypted content via the IEEE1394 serial bus in step S301, and transmits the encrypted content. Is decrypted according to the DTCP standard, and is output to the encryption processing means 150 as plaintext content.
- Digital content encryption using DTCP generates a time-varying key, and is performed using the key.
- the encrypted digital content, including the key used for the encryption, is transmitted over the IEEE1394 serial bus, and the receiving side decrypts the encrypted digital content using the key contained therein. I do.
- the initial value of the key and the flag indicating the timing of changing the key used for encrypting the digital content are included in the encrypted content.
- the key used for the encryption is generated by changing the initial value of the key included in the encrypted content at the timing of the flag included in the encrypted content.
- the encrypted content is decrypted.
- DTCP is, for example, http:
- step S321 When the content of the analog signal (analog content) is supplied to the input / output I / F 140, The input / output I / F 140 receives the analog content in step S321, proceeds to step S322, and performs A / D conversion with the built-in A / D and D / A converter 141. , that (the digital content content of the digital signal (digital content) is supplied to the MP EG Kodedzuku 1 30, in Sutedzu flop S 323, MPEG encoding, that is, the encoding process by the MPE G compressed is executed, the bus 1 1 It is supplied to the cryptographic processing means 150 via 0.
- steps S S324 and S32 25 s S326 the same processing as the processing in steps S302 and S303 in FIG. 3A is performed. That is, the ATS is added to the transport packet by the TS processing means 300, the encryption processing in the encryption processing means 150 is executed, and the encrypted content obtained as a result is recorded on the recording medium 1995. The recording process ends.
- step S401 the encrypted content recorded on the recording medium 195 is read out by the drive 190 or the recording medium I / F 210, and is read via the bus 110. Then, it is output to the encryption processing means 150.
- step S402 the encrypted content supplied from the drive 190 or the recording medium I / F 210 is decrypted, and the decrypted data is transmitted via the bus 110. Then, it is output to the TS processing means 300.
- step S403 the TS processing means 300 determines the output timing from the ATS of each transport packet constituting the transport stream, executes control according to the ATS, and executes the bus 1 Supply to input / output I / F 120 through 10.
- the input / output I / F 120 outputs the digital content from the TS processing means 300 to the outside, and ends the reproduction processing.
- the processing of the TS processing means 300 and the decryption processing of the digital content in the encryption processing means 150 will be described later.
- the input / output port 1/12/20 uses the IEEE1394 serial bus in step S404.
- mutual authentication is performed with the other device in accordance with the DTCP standard as described above, and then the digital content is encrypted and transmitted.
- steps S421, S422, and S423 the same processing as that in steps S401, S402, and S403 in FIG. 4A is performed.
- the decoded digital content obtained at 50 is supplied to the MPEG codec 130 via the bus 110.
- step S 424 the digital content is subjected to MPEG decoding, that is, decompression processing, and is supplied to the input / output I / F 140.
- step S424 the input / output I / F 140 converts the digital content, which has been MPEG decoded by the MPEG codec 130, into D / A conversion by the built-in A / D, D / A converter 141 (S 425) Then, it becomes analog content. Then, proceeding to step S426, the input / output IZF 140 outputs the analog content to the outside, and ends the reproduction process.
- the minimum unit for reading and writing data on a recording medium in the present invention is called a block (bio ck).
- an ATS is added to an MPEG2 TS (transport stream) packet (188 bytes) to make 192 bytes, and X packets are collected to form one block of data.
- ATS is data indicating the arrival time of 24 to 32 bits, and is an abbreviation of Arrival Time Stamp (arrival time stamp) as described above.
- the ATS is configured as data having randomness according to the arrival time of each packet.
- X TS Transport Stream
- a unique key different for each block is generated.
- the encryption processing for each block is executed using the generated block unique key. Further, by using a configuration in which a block is generated using ATS, an area on a recording medium for storing an encryption key for each block becomes unnecessary, and the main data area can be used effectively. Furthermore, there is no need to access data other than the main data section during recording and playback of data overnight, and processing becomes more efficient.
- the block seed shown in FIG. 5 is additional information including ATS.
- the block 'seed' may have a configuration in which not only ATS but also copy restriction information (CCI: Copy Control Information) is added. In this case, it is possible to adopt a configuration in which a block key is generated by using ATS and CCE.
- CCI Copy Control Information
- ATS is an arrival time stamp added to save the appearance timing of each transport packet in the input transport stream as described above.
- a transport stream constituting the extracted transport stream is extracted.
- Top packets appear at irregular intervals (see Figure 7 (A)).
- the transport stream is important for the appearance timing of each transport packet, and this evening is a virtual decoder specified by MPEG2 Systems (IS0 / IEC 13818-1). It is determined at the time of encoding so that a certain T—STD (Transport stream System Target Decoder) is not broken.
- T—STD Transport stream System Target Decoder
- the appearance timing is controlled by the ATS added to each transport packet. Therefore, when recording a transport packet on a recording medium, it is necessary to save the input timing of the transport packet, and when recording the transport packet on a recording medium such as a DVD, ATS indicating the input timing of each transport bucket is added and recorded.
- FIG. 6 is a block diagram for explaining processing executed by the TS processing means 300 when recording a transport stream input via a digital interface on a storage medium such as a DVD. Show. From terminal 600, a transport stream is input as digital broadcast data such as digital broadcast. In FIG. 1 or FIG. 2, the transport stream is input from the terminal 600 via the input / output I / F 120 or the input / output I / F 140 and the MPEG codec 130.
- the transport stream is input to a bitstream parser 602.
- the bitstream parser 602 detects a PCR (Program Clock Reference) packet from the input small transport stream.
- the PCR packet is a packet in which the PCR specified by MPE G2 Systems is encoded.
- the PCR packet is encoded at a time interval within lOOmsec.
- the PCR indicates the time at which the transport packet arrives at the receiving side with an accuracy of 27 MHz.
- the 27 MHz PLL 603 locks the 27 MHz clock of the recording / reproducing device to the PCR of the transport stream.
- the time stamp generation circuit 604 generates a time stamp based on the count value of the 27 MHz clock. Then, add a Block 'seed (Block seed) additional circuit.
- Reference numeral 605 designates a time stamp at the time when the first byte of the transport packet is input to the smoothing buffer 606 as ATS, and adds it to the transport packet.
- the transport packet to which the ATS has been added passes through the smoothing buffer 606 and is output from the terminal 607 to the encryption processing means 150.
- the drive 190 (FIG. 1) is recorded on a recording medium 195 which is a storage medium via a recording medium I / F 210 (FIG. 2).
- FIG. 7 shows an example of processing when an input transport stream is recorded on a recording medium.
- Fig. 7 (A) shows the input of a transport packet that constitutes a specific program (content).
- the horizontal axis is a time axis indicating the time on the stream.
- the input of the transport packet appears at irregular timing as shown in Fig. 7 (A).
- FIG. 7 (B) is a block diagram showing the output of the block / seed (Block Seed) adding circuit 605.
- the c- block / seed (Block Seed) adding circuit 605 is provided for each transport packet on the stream of the packet.
- a source packet is output with the addition of a program seed (Block Seed) including ATS indicating the time.
- FIG. 7 (C) shows a source packet recorded on a recording medium. The source packets are recorded on the recording medium at short intervals as shown in FIG. 7 (C). The recording area of the recording medium can be effectively used by performing recording with the intervals shortened in this manner.
- FIG. 8 is a block diagram showing the processing configuration of the TS processing means 300 when reproducing the transport stream recorded on the recording medium 195.
- the transport packet with the ATS decrypted by the encryption processing means described later is input to a block / seed (Block seed) separation circuit 801 and the ATS and the transport packet are separated. Are separated.
- the timing generation circuit 804 calculates the time based on the clock count of the 27 MHz clock 805 of the regenerator.
- the first ATS is set in the timing generation circuit 804 as an initial value.
- the comparator 803 compares the ATS with the current time input from the timing generation circuit 804. And the evening timing generator 8 0 When the time when 4 occurs and the ATS become equal, the output control circuit 802 outputs the transport packet to the MPEG codec 130 or the digital input / output I / F 120.
- FIG. 9 shows a configuration in which the input AV signal is MPEG-encoded in the MPEG code 130 of the recording / reproducing device 100 and further the TS stream is encoded in the TS processing means 300. Therefore, FIG. 9 is a block diagram showing both the processing configurations of the MPEG codec 130 and the TS processing means 300 in FIG. 1 or FIG. From the terminal 901, a video signal is input, which is input to the MPEG video encoder 902.
- the MPEG video encoder 902 encodes the input video signal into an MPEG video stream and outputs it to the buffer video stream buffer 903. Also, the MPEG video encoder 902 outputs access unit information about the MPEG video stream to the multiplexing scheduler 908.
- the access unit of the video stream is a picture, and the access unit information is the picture type, coding bit amount, and decode time stamp of each picture.
- the picture type is information of an I / PZB picture.
- the decode time stamp is information specified by MPEG2 Systems.
- an audio signal is input, which is input to MPEG audio encoder 905.
- the MPEG audio encoder 905 encodes the input audio signal into an MPEG audio stream and outputs it to the buffer 906.
- the MPEG audio encoder 905 outputs access unit information on the MPEG audio stream to the multiplexing scheduler 908.
- the access unit of the audio stream is an audio frame
- the access unit information is a coded bit amount and a decode time stamp of each audio frame.
- the multiplexing scheduler 908 receives video and audio access unit information.
- the multiplexing scheduler 908 controls a method of encoding a video stream and an audio stream into a transport packet based on the access unit information.
- Multiplexing scheduler 908 has an internal 27 MHz accuracy reference It has a clock for generating time, and satisfies T-STD, which is a virtual decoder model specified by MPEG 2, to determine the packet coding control information of the transport packet.
- T-STD which is a virtual decoder model specified by MPEG 2
- the switch 976 is on the a side, and video data of the payload data length indicated by the packet coding control information from the video stream buffer 903 is read. And transmitted to the transport packet encoder 909.
- the switch 977 When the packet coding control information is an audio packet, the switch 977 is set to the b side, and the audio data of the pay mouth length indicated by the audio stream buffer 906 is read. And transmitted to the transport packet encoder 909.
- the transport packet coder 909 takes in the PCR input from the multiplexing scheduler 908 and outputs a PCR packet. If the packet coding control information indicates that the packet is not to be coded, nothing is input to the transport packet coder 909.
- the transport packet encoder 909 does not output a transport bucket when the packet encoding control information indicates that the packet is not encoded. Otherwise, it generates and outputs a transport packet based on the packet coding control information. Therefore, the transport packet encoder 909 outputs a transport packet intermittently.
- Arrival Time stamp calculating means 910 arrives at the receiving side at the first byte of the transport packet based on the PCR inputted from the multiplexing scheduler 908. Calculate ATS indicating time.
- the PCR input from the multiplexing scheduler 908 indicates the time of arrival of the transport packet specified by MPEG 2 at the 10th byte on the receiving side. It is the time when the byte 10 bytes before arrives.
- Block Seed Additional circuit 9 1 1 is a transport packet ATS is added to the transport packet output from encoder 909. A transport packet with ATS output from the block . Seed (additional circuit) 911 is input to the cryptographic processing means 150 through the smoothing buffer 912, and will be described later. After the encryption process is performed, the data is stored in a storage medium 195 that is a storage medium.
- the transport packet with ATS stored in the recording medium 195 is input at a narrow interval as shown in FIG. 7C before being encrypted by the encryption processing means 150, and thereafter, Stored in the recording medium 195. Even if transport packets are recorded at short intervals, it is possible to control the input time of the transport packet to the receiving side by referring to the ATS.
- the size of ATS is not fixed to 32 bits, but may be 24 bits to 31 bits.
- Fig. 10 shows an example of the structure of a work piece.
- Example 1 in FIG. 10 is an example in which ATS is used for 32 bits.
- Example 2 of FIG. 10 the ATS is set to 30 bits, and the copy control information is set.
- the copy control information is information indicating the status of the copy control in the evening to which the data is added.
- S CMS Serial Copy Management
- Syste melon and CGMS Copy Generation Management System force s is famous. With these pieces of copy control information, copy free (Copy Free), which indicates that copying is permitted without restriction, is permitted when the information is added, and one-generation copy permission (One Time), which permits copying of only one generation. Information such as Generation Copy Allowed and Copy Prohibited that copying is not allowed can be displayed.
- Example 3 shown in FIG. 10 is an example in which the ATS has 24 bits, the CCI uses 2 bits, and other information uses 6 bits. As other information, when this data is output in analog form, various information such as information indicating on / off of Macrovision, which is a copy control mechanism for analog video data, is used. It is possible to use.
- FIG. 11 is a diagram showing a key distribution configuration of a recording / reproducing device in a recording system using the present method.
- Namers' 0 to 15 shown at the bottom of FIG. 11 are individual recording / reproducing devices. That is, each leaf of the tree structure shown in FIG. 11 corresponds to a recording / reproducing device.
- each device 0 to 15 stores a key (node key) assigned to a node from its own leaf to the root and a leaf key of each leaf in a predetermined initial tree. Store it yourself.
- K 0000 to K 1 11 1 1 shown at the bottom of Fig. 11 are leaf keys assigned to each device 0 to 15 respectively. From the top KR, the second node (node) from the bottom Key described in: KR ⁇ : Kl 11 is the node key.
- device 0 has a leaf key ⁇ 000 0 and node keys: K 000, K 00, K 0, and KR.
- Device 5 owns K 0101, K 0110, K 01, K 0, and KR.
- Device 15 owns K i11, K11, K11, K11, and KR. Note that only 16 devices (0 to 15) are shown in the array in Fig. 11 and the array is also shown as a four-stage balanced left-right symmetric configuration. It is possible to have a different number of stages in each part of the tree.
- each recording / reproducing device included in the tree structure of FIG. 11 includes various types of recording / reproducing devices using various recording media, for example, DVD, CD, MD, and Memory Stick (trademark). Have been. Furthermore, it is assumed that various application services coexist. Such different devices, different applications The key distribution configuration shown in Fig. 11 is applied on the coexistence configuration.
- the portion enclosed by a dotted line in FIG. 11, that is, devices 0, 1, 2, and 3 are set as one group using the same recording medium.
- the common contents are collectively encrypted and sent from the provider, the master key commonly used is sent, or each device is encrypted.
- the payment data of the content fee is encrypted and output from the server to the provider or the settlement institution, the process is executed.
- Institutions that send and receive data to and from each device such as content providers or payment processing institutions, collectively download data in the area enclosed by the dotted line in Figure 11, that is, devices 0, 1, 2, and 3 as one group. Is executed. There are a plurality of such groups in the tree of FIG.
- the node key and the leaf key may be managed by a single key management center, or may be managed for each group by a provider or a settlement institution that performs various data transmission / reception to / from each group.
- These node keys and leaf keys are updated in the event of, for example, a key leak, and this update processing is executed by a key management center, a provider, a payment institution, or the like.
- three devices 0, 1, 2, and 3 included in one group have a common key K 00, K 0, and KR as node keys.
- this shared node key configuration for example, it is possible to provide a common master key to only devices 0, 1, 2, and 3.
- the common node key ⁇ 0 0 itself is set as the master key, only the devices 0, 1, 2, and 3 can set the common master key without sending a new key. is there.
- the value Enc (K00, Kmaster) obtained by encrypting the new master key Kmaster with the node key ⁇ 00 is stored over the network or in a recording medium, and stored in the devices 0, 1, 2, and 3.
- Enc (K a, K b) is the data obtained by encrypting K b with K a. Indicates that it is evening.
- K (t) a a a indicates that the generation of the key K a a a is an update key of t.
- the update key distribution process will be described.
- the key is updated by, for example, storing a table composed of block data called a key renewal block (KRB) shown in FIG. Performed by feeding to 2.
- KRB key renewal block
- Fig. 12 is a block diagram formed for the purpose of distributing an updated node key of generation t to devices 0, 1, and 2 in the tree structure shown in Fig. 11.
- device 0 and device 1 require K (seven) 00, K (t) 0, and K (t) R as update nodes, and device 2 has an update node key.
- K (7) 00 1, K (t) 00, K (t) 0, and K (t) R are required.
- the KRB contains multiple encryption keys.
- the encryption key at the bottom is Enc (K 001 0, K (7) 00 1). This is the updated node key encrypted with the leaf key K 00 10 of device 2 — K (7) 00 1 .
- Device 2 decrypts this encryption key with its own leaf key, and K (t ) 00 1 can be obtained.
- K (t) 00 1 obtained by decryption, the encryption key Enc (K (t) 00 1, K (t) 00) in the second stage from the bottom in FIG. Decryption becomes possible, and an updated node key K (t) 00 can be obtained.
- the encryption key E n in the second stage from the top in Fig. 12 (A) Decrypt c (K (t) 00, K (t) 0) and update node key K () 0, Figure 12
- the first-stage encryption key En c (K (t) 0, K (t) R) from (A) is decrypted to obtain K (t) R.
- the node key K 0000 is not included in the object to be updated, and K (t) 00, K
- the devices 0 and 1 decrypt the third-stage encryption key Enc (K 000, K (7) 00) from the top in FIG. 12 (A) to obtain K (t) 00, and thereafter, the device shown in FIG. (A) Second encryption key Enc (K (t) 00, K
- R can be obtained.
- the index in Fig. 12 (1) indicates the absolute addresses of the node key and leaf key used as the decryption key.
- Node keys at the upper stage of the tree structure shown in FIG. 11 ⁇ If the update of 0 and KR is not necessary and only the update process of node key K00 is necessary, the key of FIG. By using a new block (KRB: Key Renewal Block), the updated node key K
- the KRB shown in Fig. 12 (B) can be used, for example, when distributing a new master key shared by a specific group.
- a new master key K (t) master is required.
- (t) and K (t) master) are distributed together with the KRB shown in Fig. 12 (B). This distribution makes it possible to distribute data that cannot be decrypted by devices in other groups, such as device 4.
- devices 0, 1, and 2 can obtain the master key K (t) master at time t by decrypting the ciphertext using K (t) 00 obtained by processing the KRB. Become.
- Figure 13 shows an example of a process to obtain the master key K (t) master at time t, where a new common master key K (t) master is encrypted using K (t) 00. This shows the processing of device 0 that received the data Enc (K (7) 00, K (t) master) and the KRB shown in Fig. 12 (B) via the recording medium.
- device 0 performs the same KRB processing as described above using the KRB at time t and the node key K 000 stored in advance by the generation stored in the recording medium, and the device key K (t) 00 is generated. Further, the updated master key K (t) master is decrypted using the decrypted updated node key K (t) 00, and is later encrypted and stored by the leaf key K0000 which only the user owns in order to use it. If device 0 can safely store the updated master key K (t) master in itself, it need not be encrypted with leaf key K0000.
- the recording / reproducing device is provided with the latest master key: K (c) master at the time of shipment, and securely stores it in its own memory (specifically, for example, encrypted with its own leaf key).
- K (c) master at the time of shipment, and securely stores it in its own memory (specifically, for example, encrypted with its own leaf key).
- step S1401 the recording / reproducing apparatus reads the recording medium from the recording medium. Reads out the time (generation) number of the master key K (n) master stored in (this is called pre-recording generation information (Generation # n)). The time (generation) number: n of the master key K (n) master is stored in the recording medium in advance. Further, the encryption master key C held by itself is read, and in step S1402, the generation: c of the encryption master key is compared with the generation: n represented by the pre-recorded generation information Generations, and the generation is determined. Before and after.
- step S1402 when it is determined that the generation: n represented by the pre-recorded generation information Generation ⁇ is not later (not newer) than the generation of the encrypted master key C stored in its own memory: c.
- the generation of the encrypted mask key C stored in the memory: c is the same as or later than the generation indicated by the pre-recorded generation information Generations: n, skip steps S1403 to S1408.
- Mustaki One update process ends. In other words, in this case, since the key stored in its own memory—the key K (c) master (encryption master key C) need not be updated, it is not updated.
- step S1402 it is determined that the generation indicated by the blur record generation information Generation ⁇ : n is later (newer) than the generation of the encrypted master key C stored in the memory: c. If the generation of the encrypted master key C stored in the memory is earlier than the generation n represented by the pre-recorded generation information Generation ⁇ , the process proceeds to step S1403, Reads a key renewal block (KRB) from the recording medium.
- KRB key renewal block
- step S1404 the recording / reproducing apparatus reads the KRB read out in step S1403, the leaf key (K00000 in the device ⁇ in FIG. 11) stored in the memory itself, and the node key (FIG. 1).
- the key K (seven) 00 of the node 00 at the time of the pre-record generation information Generation # n (t in FIG. 13) is calculated using K 00, K 00...
- step S1405 it is checked whether (t) 00 has been obtained in step S1404. If it cannot be obtained, it indicates that the recording / reproducing device has been revoked (excluded) from the group of allied components at that time, so that steps S 1406 to S 1408 are skipped and the master is deleted.
- the key update processing ends.
- step S1406 Enc (K (t) 00, K (t) master) from the recording medium. That is, at time t using K () 00, Read out the encrypted value of the master key of. Then, in step S1407, the ciphertext is decrypted using K (t) 00 to calculate K (t) master.
- K (t) master is encrypted using the leaf key (K00000 in device 0 in FIG. 11) of the device itself and stored in the memory. This completes the master key update process.
- the master key is used in ascending order from the time (generation) 0, but the master key of the new generation must be used to calculate the master key of the old generation so that each device in the system is calculated. Is desirable. That is, the recording / reproducing device Holds a one-way function f and applies its own master key to the one-way function a number of times corresponding to the difference between the master key generation and the required master key generation As a result, a master key of the checked generation is created.
- the generation of the master key MK stored in the recording / reproducing device is generation i + 1, and the generation of the master key MK (used during recording) required for reproducing certain data.
- the master key K (i-1) master is the one-way function: used twice in the recording and playback device, and f (f (K (i + 1) master) ) Is calculated.
- the master key K (i-2) master is It is generated by calculating f (f (f (K (i + 1) maste r))) using the directional function f three times.
- K (0) master, K (1) master, K (2) master ⁇ ⁇ ⁇ , K (N) master is obtained in advance. That is, first, the Nth master key K (N) master is set, and the one-way function is applied to the master key K (N) master once. Master key of previous generation K (N-1) master, K (N-2) master,- ⁇ K (1) master, K (0) master are generated in order. Then, use the (old) master key K (0) master of the smaller generation in order. It is assumed that the one-way function used to generate the mass key of the generation before the own generation is set in all the recording and reproducing devices.
- the key issuing organization owns the private key of the public key cryptosystem and gives the public key corresponding to the private key to all playback devices. Then, the key issuing organization sets the master key K (0) master of the 0th generation, and uses the master key K (0) master. In other words, the key issuing institution must When a Starkey K (i) master is needed, the master key K (i— 1) master of the previous generation is generated and used by converting it with a secret key. In this case, there is no need for the key issuing institution to generate N generation master keys in advance using the one-way function. Also, this method can theoretically generate unlimited generations of master-keys. If the recording / reproducing apparatus has a master key of a certain generation, the master key of a generation before the generation can be obtained by converting the master key with a public key.
- the content data is encrypted by a master key of a certain generation and distributed from the content provider to each recording / reproducing device via a network or a recording medium.
- step S1501 the recording / reproducing apparatus reads pre-recorded generation information Generation ⁇ from the recording medium. Also, the generation c of the encryption master key C stored in its own memory is obtained, and in step S 1502, the generation c of the encryption master key and blur recording generation information Gene rat ion Compare the generation n indicated by #n to determine before and after that generation.
- step S1502 if it is determined that the generation c of the encrypted master key C stored in the memory is not later than the generation n represented by the pre-recorded generation information Generation ⁇ , that is, If the generation c of the encrypted master key C is an older generation than the generation n represented by the pre-recorded generation information Generation ⁇ , skip step S1503, that is, perform the content-one-time recording process.
- step S 1502 the generation of the encrypted master key C stored in the memory of its own recording / reproducing device is changed from generation n to the generation n indicated by the pre-recorded generation information General_n #. If it is determined that there is, that is, if the generation of the encrypted master key C stored in the memory is the same as or newer than the generation n indicated by the pre-recorded generation information Generation ⁇ , step S150 Proceed to step 3 to record the content data.
- an optical disk is taken as an example of the recording medium.
- a disc ID (Disc ID) as identification information unique to the recording medium is made to act on a key for encrypting the data.
- the recording / reproducing device 160 0 has a master key 160 1 stored in its own memory 180 (see FIGS. 1 and 2), a device ID 1631 as a device identifier, and a device-specific key.
- Read 1 6 3 2 The key 1 ⁇ 16 ⁇ 1 is a secret key stored in the licensed recording / reproducing device, and generation management is performed as described above, and each is associated with a generation number.
- This master key is a key common to a plurality of recording / reproducing devices, for example, a key common to devices belonging to the group of dotted frames shown in FIG.
- the device ID is an identifier of the recording / reproducing apparatus 160, and is an identifier such as a serial number stored in the recording / reproducing apparatus in advance. This device ID may be public.
- the device unique key is a secret key unique to the recording / reproducing device 160, and is a key that is set in advance so as to be different depending on each recording / reproducing device and stored. These are stored in the memory of the recording / reproducing device 160 in advance.
- the recording / reproducing apparatus 1650 checks whether or not a disc ID (Disc ID) 1603 as identification information is already recorded on the recording medium 1620 which is, for example, an optical disc. If it is recorded, read the disc ID (Disc ID) 16 03 (See Fig. 16 If it is not recorded, a disc ID (Disc ID) 1701 is generated randomly by the cryptographic processing means 150 or by a predetermined method such as random number generation, etc. Record (equivalent to Figure 17). Since only one disc ID (Disc ID) 16 03 is required for the disc, it can be stored in a lead area or the like.
- the recording / reproducing device 1602 generates a disc unique key (Disc Unique Key) using the mass key and the disc ID.
- a master key Master Key
- a disk ID Disc Key
- a hash function using a block encryption function.
- the bit of the master key and the disk ID (Disc ID)
- the method of Example 2 in which the data generated by the concatenation is input and only the required data length is used as the disc unique key from the 16-bit output can be applied.
- a title key which is a unique key for each record, is generated randomly by cryptographic processing means 150 (see FIGS. 1, 2 and 1) or by a predetermined method such as random number generation. 6 0 4 and record it on Disc 16 0.
- the playback device restriction flag (Player Restriction Flag) is set and recorded on the disk 1 3 6 3 and on the disk 1 6 3 0 c 1 6 3 5 c Further, the device ID as device identification information is extracted and 1 6 3 1, 1 6 3 4 to be recorded on the disc 1 6 2 0.
- the generation number of the master key to be used that is, the master key stored by itself.
- the generation number [generation number (Generation # n)] 1650 is obtained, and this is recorded on the recording medium 16 2 It is stored in 0 as generation number 1 6 5 1 at the time of recording.
- a pre-recording generation number is stored in the recording medium 1620 in advance, and is encrypted using a master key of the same generation as the pre-generation number or a newer generation than the pre-generation number. It is configured to be able to play back only the stored content. This configuration will be described later in the section of the reproduction process.
- the title unique key is obtained from the disc unique key (Title Unique Key), the title key (Title Key), and the device ID.
- a Title Unique Key (Title) is obtained from the Disc Unique Key, Title Key, and Device Unique Key. Unique Key).
- a specific method of generating this Title Unique Key is to add a Title Key and a Disk Unique Key to a hash function using a block cipher function.
- the method of Example 1 using the result obtained by inputting the “Disc Unique Key” and the device ID (when not restricting the playback device) or the device unique key (when restricting the playback device), the FIPS 180-1
- the method of Example 2 in which data generated by data concatenation is input and only the required data length is used as a Title Unique Key from the output of the 160 bits can be applied.
- a disc unique key (Disc Unique Key) is generated from a master key (Master Key) and a disc ID (Disc ID), and this is used as a title key.
- a title unique key is generated from the (Title Key) and device ID, or the title key (Title Key) and device unique key, but the disc unique key (Disc Unique Key) is generated.
- Master key as unnecessary may be generated directly from (Master Key), Disc ID (Disc ID), Title Key (Title Key), Device ID or Device Unique Key. Without using the Title Key, the master key (Master Key), disc ID (Disc ID), and device ID (when the playback device is not restricted) or device-specific key (when the playback device is restricted) are used for dinner.
- a key equivalent to the Title Unique Key may be generated.
- data may be transmitted in a TS packet of MPEG2.
- STB set-top box
- MPE G 2 TS packets over IEEE1394, as it does not require overnight conversion.
- the recording / reproducing apparatus 1600 receives the content data to be recorded in the form of this TS packet, and adds, in the above-mentioned TS processing means 300, ATS which is the time information when each TS packet is received.
- ATS which is the time information when each TS packet is received.
- the work seed added to the block data may be constituted by a value obtained by combining ATS, copy control information, and other information.
- Block Data of one block is formed (see the upper diagram of FIG. 5), and as shown in the lower part of FIGS.
- a block key (Block Key) which is a key for encrypting the data of the block, is generated 1607.
- Figure 22 shows an example of how to generate a block key.
- a 32-bit block seed (Block Seed) and a 64-bit title unique key (Title Unique Key) are used to generate a 64-bit block key (Block Key). Two examples of generating are shown.
- Example 1 at the top shows a cryptographic function with a 64-bit key length and 64-bit inputs and outputs. You are using The title unique key (Title Unique Key) is used as the key of this cryptographic function, and the value obtained by concatenating the block seed (Block Seed) and the 32-bit constant (constant) is input and the result of encryption is entered into the block key. (Block Key).
- Example 2 is an example using a hash function SHA-1 of FIPS 180-1. Enter the value obtained by concatenating the Title Unique Key and the Block Seed into SHA-1 and use the 160-bit output, for example, only the lower 64 bits For example, a block key reduced to 64 bits is used as a block key.
- the block key is encrypted using the generated block key.
- the unencrypted m-byte includes the first to fourth bytes as a work seed.
- the block data after the (m + 1) th byte separated by the selector 1608 is encrypted 1609 in accordance with the encryption algorithm preset in the encryption processing means 150.
- the encryption algorithm for example, DES (Data Encryption Standard) defined in FIPS 46-2 can be used.
- the block length (input / output data size) of the encryption algorithm to be used is 8 bytes like DES
- X is set to 32, for example, and m is set to a multiple of 8, for example.
- the encrypted block data after the m + 1st byte is the first to unencrypted block data! Together with the n-byte data, the data is combined by the selector 1610 and stored in the recording medium 1620 as encrypted content 1612.
- the content is encrypted in block units with a process key generated based on a generation-controlled master key, a block seed including ATS, and the like, and stored in the recording medium.
- the recording / reproducing device since the content data is encrypted by the generation-managed mask key and stored on the recording medium, the reproduction process of the recording medium by another recording / reproducing device is small. In both cases, the recording / reproducing device must have the same generation or a newer generation than the generation of the master key used when recording the data.
- the block key is generated based on the device ID when the playback device is not restricted as described above, and is generated based on the device unique key when the playback device is restricted. If the playback device is restricted, these encrypted data can only be played back on the device that recorded the data.
- a block key which is an encryption key for block data
- the device ID is stored in the recording medium. Therefore, a device that attempts to reproduce the content on the recording medium can acquire the device ID from the recording medium and generate a similar block, so that block decoding can be performed.
- the block key which is the encryption key for block data
- This device-specific key is a secret key that differs for each device, and other devices cannot obtain the key. Further, when the block data is encrypted and stored in the recording medium, the writing process to the recording medium of the device specific key is not executed.
- the recording / reproducing apparatus reads the master key, the device ID as a device identifier, and the device unique key stored in its own memory 180.
- Disc ID disc ID
- S1802 it is checked whether a disc ID (Disc ID) as identification information has already been recorded on the recording medium. If it has been recorded, this disk ID is read out in S1803, and if not recorded, in S1804, a disk ID is generated randomly or by a predetermined method, and the disk ID is written to the disk. Record.
- a disk unique key is generated using the mask key and the disk ID. As described above, the disk unique key is obtained by applying, for example, a method using a hash function SHA-1 defined in FIPS 180-1 or a method using a hash function based on a block cipher. .
- a title key (Title Key), a playback device restriction flag (Player Restration Flag) as a unique key for each recording, and further, device identification information. Extract the device ID and master key generation number and record them on the disk.
- a title-specific key is generated from the disc-specific key and the title key described above, and the device ID (when the playback device is not restricted) or the device-specific key (when the playback device is restricted). I do.
- FIG 20 shows the detailed flow of generating a title-specific key.
- the encryption processing means 150 determines in step S 2 001 whether or not to restrict the playback device. This determination is made based on the instruction data input by the user using the recording / reproducing device or the usage restriction information added to the content.
- step S 2 0 1 If the determination of S 2 0 1 is No, that is, if the playback device is not restricted, the process proceeds to step S 2 0 2, where the disc unique key (Title Unique Key) and the title key (Title K Generate a Title Unique Key from ey) and the device ID.
- step S 2 0 3 If the determination of S 2 0 1 is Yes, that is, if the playback device is to be restricted, proceed to step S 2 0 3 to set the disc unique key (Title Key) and device unique key. Generates a Title Unique Key from the key. For key generation, a method using SHA-1 or a hash function based on a block cipher is used.
- the recording / reproducing device receives the encrypted data of the content data to be recorded in the form of a TS packet.
- the encryption processing means 150 executes the first 32 bits of the block data (the program seed including the ATS) and the title unique key generated in S187. Then, a block key, which is a key for encrypting the data of the program, is generated.
- the block key formed in S1811 is encrypted using a block key.
- the data to be encrypted is from the m + 1st byte to the final data of the block data.
- the encryption algorithm for example, DES (Data Encryption Standard) specified in FIPS 46-2 is applied.
- the encrypted process data is recorded on a recording medium.
- the recording / reproducing apparatus 2300 reads the disk ID 2302 and the pre-recording generation number from the disk 2302, and reads the pre-recording generation number from its own memory. Read the star key 2 3 0 1, the device ID 2 3 3 1 as the device identifier, and the device unique key 2 3 3 2.
- the disk ID is recorded in advance on the disk, or otherwise, is a disk-specific identifier generated by the recording / reproducing device and recorded on the disk.
- the pre-recording recording generation number 2360 is disc-specific generation information stored in advance on a recording medium disk. This pre-recording generation number is compared with the generation number of the master key at the time of data recording, that is, the generation number 2350 at the time of recording to control whether or not reproduction processing is possible.
- the master key 2301 is a secret key stored in the licensed recording / reproducing device and subjected to generation management.
- the device ID is an identifier unique to the recording / reproducing device, and the device unique key is a unique key for the recording / reproducing device. It is a secret key.
- the recording / reproducing device 2300 responds in S2402 to the title key of the data to be read from the disk, and further, the device ID of the recording / reproducing device that recorded this data and the data corresponding to the data.
- Figure 25 shows the detailed flow of the judgment.
- step S2501 of FIG. 25 the recording / reproducing apparatus determines the old and new of the pre-generation number read in S2401 and the generation number at the time of recording read in S2402.
- the generation indicated by the generation number during recording is not later than the generation indicated by the pre-record generation information, that is, the generation indicated by the generation information during data recording is a generation older than the generation indicated by the pre-record generation information.
- steps S2404 through S2409 is skipped, and the processing ends without performing the reproduction processing. Therefore, if the content recorded on the recording medium is encrypted based on the master key of a generation older than the generation represented by the pre-recorded generation information, the reproduction is not permitted and the reproduction is not performed. I can't.
- step S2501 if it is determined that the generation indicated by the generation number at the time of recording is later than the generation indicated by the pre-record generation number, that is, the generation indicated by the generation information at the time of recording is the pre-record generation number
- the content recorded on the recording medium is the same as or newer to the generation n represented by, and is encrypted based on the master key of the generation after the generation represented by the pre-recorded generation information. If there is, the process proceeds to step S2502, and the recording / reproducing apparatus acquires the generation information of the encryption master key C stored in its own memory, and generates the generation of the encryption master key C and the encryption key.
- the generation indicated by the generation information is compared to determine before and after that generation.
- step S2502 when it is determined that the generation of the master key C stored in the memory is not later than the generation represented by the generation information at the time of recording, that is, the generation of the master key C stored in the memory is If the generation is older than the generation indicated by the generation information at the time of recording, it is determined that reproduction is impossible, and steps S2404 to S2409 are skipped, and the processing is terminated without performing the reproduction processing.
- step S2502 when it is determined that the generation of the encrypted master key C stored in the memory is equal to or later than the generation indicated by the generation information at the time of recording, that is, the master key stored in the memory If the generation of C is the same as or newer than the generation indicated by the generation information at the time of recording, proceed to step S2503 to check whether the data to be read is recorded with the playback device restricted. .
- step S2503 it is determined whether or not the reproduction device restriction information indicated by the read reproduction device restriction flag is set to "reproduction device restricted”. If yes, In step S2504, it is determined whether or not the device ID read from the recording medium matches its own device ID. If they match, it is determined that playback is possible. If it is determined in step S2503 that the setting is not "reproduction device limited”, it is determined that reproduction is possible. If the playback device restriction information indicated by the read playback device restriction flag is "reproduction device limited” and "the device ID read from the recording medium and its own device ID do not match", it is determined that playback is impossible. . If it is determined that reproduction is possible, the process proceeds to step S2404.
- a disk unique key (Disc Unique Key) is generated using the disk ID (Disc ID) and master key (Master Key).
- This key generation method uses, for example, a hash number SHA-1 defined in FIPS 180-1, a master key and a disk ID.
- the master key used here is the master key of the generation (hour ⁇ ) read from the recording medium in S2402 and represented by the generation number at the time of recording. If the recording / reproducing device holds a master key of a newer generation, a master key of the generation indicated by the generation number at the time of recording is created using the method described above, and the disc-specific key ( Disc Unique Key) may be generated.
- step S2405 a title unique key is generated.
- Figure 26 shows the detailed flow of generating a title-specific key.
- the encryption processing means 150 determines whether or not the setting is to restrict the playback device or not. This determination is made based on the playback device restriction flag read from the disc.
- the device restriction information is “reproduction device restricted” and “the device ID 2 3 3 4 read from the recording medium matches its own device ID 2 3 3 1” or the read reproduction device restriction flag 2 3 3 3 Playback device restrictions indicated If the information is "no playback device limitation”, playback is enabled, and the playback device restriction information indicated by the read playback device limitation flag 2 3 3 3 is "reproduction device limited” and
- the data is encrypted with a block key generated based on a device-specific key unique to the recording / reproducing device that recorded the data. Since the recording / reproducing device other than the device does not have the same device unique key, it is not possible to generate a work key for decrypting data.
- Disc Unique Key and Title Key and Device ID If it can be played, Disc Unique Key and Title Key and Device ID, or Disc Unique Key and Title Key ) And a device unique key, or any combination-Generates a Title Unique Key.
- a title unique key (Title Unique Key) is generated from the disc unique key (Title Unique Key), the title key (Title Key), and the device ID. If the playback device is restricted, the Title Unique Key (Title Unique Key), the Title Key (Title Key), and the unique Device Unique Key ) Is generated.
- a hash function SHA-1 and a hash function using a block cipher function can be applied.
- step S2601 determines whether the setting does not limit the playback device. If the determination of S2601 is No, that is, if the setting does not limit the playback device, proceed to step S2602, and enter the disc unique key (Disc Unique Key) and the title key (Title Key). Then, a Title Unique Key is generated from the device ID and the device ID.
- Disc Unique Key the disc unique key
- Title Key the title key
- step S2601 determines whether the playback device is to be limited. If the determination of S2601 is Yes, that is, if the playback device is to be limited, the process proceeds to step S2603, where the disc unique key (Disc Unique Key), the title key (TitleKey), and the self A Title Unique Key is generated from the device unique key of the recording / reproducing device.
- the disc unique key Disc Unique Key
- the title key TitleKey
- the self A Title Unique Key is generated from the device unique key of the recording / reproducing device.
- a method using SHA_1 ⁇ a hash function based on public encryption is used.
- a disc unique key (Disc scique key) is generated from the master key and disc ID (disc ID), and this is used as a title key.
- a title unique key (Title Unique Key) is generated from the (Title Key) and device ID, or the title key (Title Key) and device unique key, but the disc unique key (Disc Unique Key) is generated. No need for mass key
- a key equivalent to the title unique key may be generated from the device unique key (if the playback device is restricted).
- Block Data block data
- Block Seed the block seed generated using the block seed (Block Seed) and the title unique key generated in S2405.
- a 64-bit block key is generated from a 32-bit block seed and a 64-bit title unique key.
- the following configuration can be applied.
- a disc unique key, a title unique key, a block unique key, and a block key are generated.
- Key) and title unique key are not generated, and a block key (Master Key), disc ID (Disc ID), and title key (Title Key) are provided for each block.
- Block Seed, and a device ID (when not restricting playback devices) or a device-specific key (when restricting playback devices) may be used to generate a block key. .
- a work key (Block Key) is generated.
- the decryption unit 209 decrypts the encrypted data by using, and outputs the decrypted data via the selector 230.
- ATS is added to each of the transport packets constituting the transport stream during the decryption, and the TS processing means 300 described above executes the stream processing based on the ATS. It is. The data can then be used, for example, to display images or play music.
- the encrypted content encrypted in block units and stored in the recording medium can be reproduced by being subjected to decryption processing with a work key generated based on a work seed including an ATS in work units.
- the encrypted block data is decrypted using a block key, and in S 2409 it is determined whether all data has been read out. If all data has been read out, the process ends. Return to 406 and read the remaining data.
- the master key is a key valid for the entire data recording at that time, and the recording / reproducing device that can obtain the master key at a certain point in time has been recorded by this system at that time and before. Data can be decrypted.
- the recording / reproducing device that can obtain the master key at a certain point in time has been recorded by this system at that time and before. Data can be decrypted.
- Due to its nature that it is valid for the entire system there is also a problem that if a master key is exposed to an attacker, the effect will be on the entire system.
- FIG. 27 shows, as an example similar to FIG. 13, a KRB at time t when device 0 is stored in the recording medium, a leaf key K 0 00 0 stored in advance and a node key K 0 0 0, Generate an update node key K (t) 00 using K 00, and use it to update New media key: Shows how to get K () media.
- the K (t) media obtained here is used when recording and reproducing data on the recording medium.
- the pre-recorded generation number (Generation #n) in Fig. 27 is not essential and is set as an option because the media key does not have the concept of new or old generation unlike the master key.
- each recording / reproducing apparatus uses a flow chart shown in FIG. 28 to set a media key for the recording medium: K Calculate (t) media and use it later to access the storage medium.
- step S2803 the recording / reproducing apparatus encrypts the media key K (t) media with the node key K (t) 00 and encrypts Enc (K (t) 00, K (t) media. ) Is read from the recording medium, and is decrypted in step S2804 to obtain a media key. If this recording / reproducing apparatus is excluded from the group of the tree configuration shown in FIG. 11, that is, is revoked, the media key cannot be obtained, and recording and reproduction on the recording medium cannot be performed.
- the processing flow is as shown in FIG. In the processing flow of FIG. 29, the acquisition of the media key is determined in S2901, and only when the media key is acquired, the recording process of the capacitor is executed in step S2902.
- an optical disc is taken as an example of a recording medium as in the first embodiment.
- a disc ID (Disc ID) as identification information unique to the recording medium is made to act on a key for encrypting the data.
- FIGS. 30 and 31 respectively correspond to FIGS. 16 and 1 ⁇ ⁇ ⁇ ⁇ in the first embodiment, wherein a Media Key is used instead of a Master Key.
- the difference is that the generation number (Generation #) that indicates the generation of the master key is not used.
- the difference between FIG. 30 and FIG. 31 is the same as the difference between FIG. 16 and FIG.
- FIG. 32 shows a data recording process in this embodiment using a media key, and corresponds to the flowchart of FIG. 18 in the first embodiment.
- the processing flow of FIG. 32 will be described focusing on differences from the first embodiment.
- the recording / reproducing device 30000 stores the device identification information (Device ID) and the device unique key (Device Unique Key) stored in its own memory, Read the temporarily stored media key K (t) media, calculated in 284.
- the recording / reproducing apparatus checks whether or not a disc ID (Disc ID) as identification information has already been recorded on the recording medium (optical disc) 320.
- This disc ID (Disc ID) is read out in 03 (corresponding to FIG. 30), and if not recorded, the disc ID (Disc ID) is read out randomly or in a predetermined manner in S3204.
- Generate and record to disk (equivalent to Figure 31). Since only one disc ID (Disc ID) is required for the disc, it can be stored in a read-in area or the like. In any case, the process proceeds to S3205.
- a disc unique key (Disc Unique Key) is generated using the media key and the disc ID (Disc ID) read in S3201.
- Disc ID disc ID
- a media key may be used instead of the master key in the same manner as the method used in the first embodiment.
- Title Key is generated randomly or in a pre-defined manner and recorded on disk.
- a playback device restriction flag (information indicating whether this title (data) can be played back only on the device that recorded it (playback device limitation) or can be played back on other devices (no playback device limitation))
- the Player Restriction Flag and the device identification information (Device ID) of the recording device are recorded on the disc.
- This file contains the title key, playback device restriction flag (Player Restriction Flag), and device identification information ( Device ID) can be stored.
- Steps S 3207 to S 3215 are the same as S 1807 to S 1815 in FIG. 18, and a description thereof will be omitted.
- a disc unique key is generated from a media key (Media Key) and a disc ID (Disc ID), and the disc unique key is generated using a title key and a device ID, or a disc ID.
- the title unique key is generated from the title key (Title Key) and the device unique key, but the disc unique key (Disc Unique Key) is not required and the media key (Media Key) and the disc
- the title unique key may be generated directly from the ID (Disc ID) and the title key (Title Key), and the device ID or the device unique key.
- Media key (Medi a Key), disk ID (Disc ID), device ID (when not restricting playback devices), or device unique key (when restricting playback devices) Luo title unique key (Title Unique Key) may generate the equivalent of the key.
- data can be recorded on the recording medium using the media key.
- FIG. 33 is a diagram corresponding to FIG. 23 in the first embodiment, in which a media key (Media Key) is used in place of a master key (Master Key). The difference is that the generation number (Generation #) is omitted.
- Media Key Media Key
- Master Key master key
- Generation # generation number
- the recording / reproducing apparatus 3400 obtains the disc ID (Disc ID) from the disc 3420 as a recording medium, and the device ID (Device ID) as self-device identification information from its own memory.
- the device unique key (Device Unique Key), which is the device unique key, and the media key that was calculated and temporarily stored in S2804 in Fig. 28 are read.
- FIG. 35 shows the details of the processing in S3403.
- step S3501 it is determined whether a media key has been obtained. If the media key cannot be obtained, the reproduction becomes impossible. If the media key is obtained, the process proceeds to step S3502.
- the processing of steps S3502 and S3503 is the same as that of S2503 and S2504 in FIG. 25, respectively, and the state of the playback device restriction indicated by the playback device restriction flag (Player Restriction Flag) is “playback device restriction”.
- the device ID (Device ID) of the device read from the storage medium in S3503 and the device ID (Device ID) read from the memory in S3401 are restricted.
- steps S 3404 to S 3409 is the same as that in S 2404 to S 2409 in FIG. 24, and a description thereof will not be repeated.
- a disc unique key (Disc Unique Key) is generated from a media key (Media Key) and a disc ID (Disc ID), and the disc unique key (Title Key) and a device ID or a title key (Title key) are generated.
- Title Key and device
- the title unique key (Title Unique Key) is generated from the unique key, but the media unique key (Medi a Key) and the disc ID (Disc ID) are eliminated because the disc unique key is not required.
- the title unique key (Title Unique Key) may be directly generated from the device ID or device unique key, and the title unique key (Title Unique Key). Alternatively, the media may be generated without using the title key. From the key (Media Key), disc ID (Disc ID), and device ID (when not restricting playback devices) or device unique key (when limiting playback devices), a key equivalent to a Title Unique Key May be generated.
- data can be recorded on the recording medium and reproduced from the recording medium.
- KRB Key Renewal Block
- the recording / reproducing device 3600 receives a KRB (Key Renewal) received from another device via the input / output I / Fs 120, 140, the modem 3601, or the like. Block) can be recorded on the recording medium when data is first recorded on the recording medium, or each time data is recorded on the recording medium.
- the recording / reproducing apparatus previously performs a key update process via the input / output I / Fs 120, 140, the modem 3601, and the like.
- Obtain a KRB (Key Renewal Block) and an encrypted text obtained by encrypting the master key with the node key store it in its own storage device, such as memory 180, and record the content data on the recording medium.
- the processing may be performed according to the flowchart shown in FIG.
- step S3801 it is checked whether or not a key update block: KRB (Key Renewal Block) has already been recorded on the recording medium on which data is to be recorded. If a key renewal block: KRB (Key Renewal Block) has already been recorded on the recording medium, the process skips step S3802 and ends (proceeds to the recording process overnight). If not, the process proceeds to step S3902, and as shown in FIG. Key renewal block stored in memory 180: A process of recording the encrypted text obtained by encrypting the KRB (Key Renewal Block) and the master key on the recording medium. After the execution of the process, the process proceeds to the content data recording process.
- KRB Key Renewal Block
- This method is not specialized for the master key, but can be applied to a recording method using a media key as in the second embodiment, for example.
- FIG. 40 (A) When recording the content of an external digital signal on a recording medium, a recording process is performed according to the flowchart of FIG. 40 (A). The processing of FIG. 40 (A) will be described.
- the recording / reproducing device 100 in FIG. 1 will be described as an example.
- the digital signal content digital content
- the input / output I / F 120 via, for example, an IEEE1394 serial bus or the like
- the input / output I / F 12 If 0, the digital content is received, and the flow advances to step S4002.
- step S4002 the input / output I / F 120 determines whether or not the received digital content can be copied. That is, for example, if the content received by the input / output 1 F 120 is not encrypted (for example, the plain text content is supplied to the input / output I / F 120 without using the DTCP described above). In this case, the content is determined to be copyable.
- the recording / reproducing device 100 is a device conforming to DTCP, and the DTC It is assumed that processing is executed according to P.
- a 2-bit EMI Encryption Mode Indicator
- the EMI is 00 B (B indicates that the previous value is a binary number)
- the content is copy-free and the EMI is 0 1 B In some cases, it indicates that the content cannot be copied any more (No-more-copies).
- the EMI is 10 B, it indicates that the content is a copy-only-generation that can be copied only once. If the EMI is 11 B, Indicates that the content is forbidden (Copy -neve.).
- the signal supplied to the input / output I / F 120 of the recording / reproducing apparatus 100 includes EMI and its E Ml is Copy-free or Copy-one-generation, it is determined that the content can be copied. Is determined. When the EMI is No-more-copy or Copy-never, it is determined that the content cannot be copied.
- step S4002 If it is determined in step S4002 that the content is not copyable, steps S4003 to S405 are skipped, and the recording process ends. Therefore, in this case, the content is not recorded on the recording medium 10.
- step S4002 If it is determined in step S4002 that the content can be copied, the process proceeds to step S4003, and thereafter, in steps S4003 to S405, steps S302 and S302 in FIG. 303, processing similar to the processing in S304 is performed. That is, the TS processing means 30 ° adds the ATS to the transport packet, the encryption processing in the encryption processing means 150 is executed, and the resulting encrypted content is recorded on the recording medium 195. Then, the recording process ends.
- the EMI is included in the digital signal supplied to the input / output I / F 120.
- EMI or EMI is included together with the digital content.
- information indicating the copy control status (for example, embedded CCI in DTCP) is also recorded.
- the copy control information such as EMI or embedded CCI is recorded in a form to be added to the TS packet. That is, as shown in Example 2 and Example 3 of FIG. 10, ATS for 24 to 30 bits and 32 bits including copy control information are added to each TS packet as shown in FIG. Add.
- the determination processing in step S 4012 is performed, for example, by adding a Macrovision signal or a CGMS-A (Copy Generation Management System-Analog) signal to the signal received at the input / output I / F 140. This is done based on whether it is included.
- the macrovision signal is a signal that becomes noise when recorded on a VHS video cassette tape. If this signal is included in the signal received at the input / output I / F 140, the analog content is It is determined that copying is not possible. .
- the CGMS-A signal is a signal that applies the CGMS signal used for digital signal copy control to analog signal copy control. Indicates whether the item can be copied (Copy-one-generation) ⁇ or that copying is prohibited (Copy-never).
- the analog content can be copied. It is determined that there is.
- step S4012 If it is determined in step S4012 that the analog content is not copyable, steps S4013 to S4017 are skipped, and the recording process ends. Therefore, in this case, the content is not recorded on the recording medium 10.
- step S4012 If it is determined in step S4012 that the analog content can be copied, the process proceeds to step S4013, and thereafter, in steps S4031 to S4017, the steps shown in FIG.
- the same processing as the processing in S 322 to S 326 is performed, whereby the content is subjected to digital conversion, MPEG encoding, TS processing, and encryption processing, recorded on the recording medium, and the recording processing ends. .
- the C GMS-A signal is also recorded on the recording medium. You. That is, this signal is recorded in the CCI or other information part shown in FIG. At this time, generally, the information indicating Copy-One-Generation is converted to No-more-copies and recorded so as not to permit further copying. However, if the system has rules such as "Copy-one-generation copy control information is recorded without conversion to No-more-copies, but is treated as No-more-copy", However, this is not the case.
- FIG. 41A a reproduction process according to the flowchart in FIG. 41A is performed.
- the processing in FIG. 41A will be described.
- steps S4101, S4102, and S4103 the same processing as the processing in steps S401, S402, and S403 in FIG. 4A is performed, whereby the data is read from the recording medium.
- the output encrypted content is decrypted by the encryption processing means 150, and the TS process is performed.
- the digital content subjected to each processing is supplied to the input / output I / F 120 via the bus 110.
- step S4104 the input / output I / F 120 inputs the digital signal supplied thereto. It is determined whether the contents can be copied later. That is, for example, if the digital content supplied to the input / output I / F 120 does not include EMI or information indicating the copy control state (copy control information) like EMI, It is determined that the content can be copied later.
- the digital content supplied to the input / output I / F 120 includes EMI, and if the EMI is recorded in accordance with the DTCP standard when recording the content, If the EMI (Recorded EMI) is Copy-free, the digital content is determined to be copyable later. Also, if the EMI is No-more-copy, the content is determined not to be copyable later.
- EMI Recorded EMI
- the recorded E Ml is Copy-one-generation or Copy-never.
- Copy—one—generation E M I [Record B temple ⁇ : No—more— copies: Digital content with copy-never E M I is not recorded on the recording medium.
- rules such as "Copy-one-generation copy control information is recorded without conversion to No-more-copies but handled as No-more-copies" are defined in the system. Is not limited to this.
- step S4104 If it is determined in step S4104 that the content can be copied later, the process proceeds to step S4105, and the input / output I / F 1200 stores the digital content in , Output to the outside, and end the playback processing.
- step S410 If it is determined in step S410 that the content is not copyable later, the process proceeds to step S4106, and the input / output I / F 120 conforms to, for example, the DTCP standard. Then, the digital content is output to the outside in such a manner that the digital content is not copied later, and the reproduction process is terminated. That is, for example, as described above, when the recorded EMI is No-more-copy (or in the system, for example, “Copy-one-generation copy control information is converted to No-more-copy”. If the EMI recorded under that condition is a copy-one-generation, then the content is no more No copy is allowed. For this reason, the input / output I / ⁇ 1 120 is connected to the other device in accordance with the DTCP standard. If the other party is a legitimate device (here, a device conforming to the DTCP standard), the digital content is encrypted and output to the outside.
- the other party is a legitimate device (here, a device conforming to the DT
- steps S4111 to S4115 the same processing as the processing in steps S421 to S425 in FIG. 4B is performed. That is, readout of encrypted contents, decryption processing, TS processing, MPEG decoding, and D / A conversion are performed.
- the obtained analog content is received by the input / output I / F 140.
- step S4116 the input / output I / F 140 determines whether or not the content supplied thereto can be copied later. That is, for example, when copy control information such as EMI is not recorded in the recorded content at any time, it is determined that the content can be copied later.
- copy control information such as EMI
- copy control information is recorded at the time of recording the content, for example, in accordance with the DTCP standard, if the information is copy-free, the content can be copied later. Is determined.
- EMI or copy control information is No-more-copies, or in the system, for example, ⁇ Copy-one-generation copy control information is recorded without conversion to No-more-copies
- EMI or copy control information recorded under that condition is Copy-one-generation
- the content can be copied later. It is determined that it is not a thing.
- -Furthermore for example, when the analog content supplied to the input / output I / F 140 includes a CG MS-A signal, and thus, when the content is recorded, the C GMS-A signal is recorded together with the content. If the CGMS-A signal is copy-freely, it is determined that the analog content can be copied later.
- step S4116 when the CGMS-A signal is Copy-never, it is determined that the analog content cannot be copied later. If it is determined in step S4116 that the content can be copied later, the process proceeds to step S4117, and the input / output I / F140 outputs the analog signal supplied thereto. Is output to the outside as it is, and the reproduction process is terminated.
- step S4116 If it is determined in step S4116 that the content cannot be copied later, the process proceeds to step S4118, and the input / output I / F 140 converts the analog content into the analog content. Is output outside so that it will not be copied later, and the playback process ends.
- the input / output I / F 140 outputs the analog content to the outside, for example, by adding a macrovision signal or a GCMS-A signal indicating Copy-never. Also, for example, if the recorded CGMSA signal is Copy-never, further copying of the content is not allowed. For this reason, the I / O 1 / F4 changes the CGMSA signal to Copy-never and outputs it along with the analog content to the outside.
- the encryption processing means 150 can be configured as an encryption / decryption LSI.
- the encryption processing means 150 can be configured by executing a program on a general-purpose computer or a single-chip microcomputer. It is also possible.
- the TS processing means 300 can execute the processing by software. If a series of processing is performed by software, The programs that make up the software are installed on a general-purpose computer, a one-chip micro computer, and the like.
- FIG. 42 illustrates a configuration example of an embodiment of a computer in which a program for executing the above-described series of processes is installed.
- the program can be recorded in advance on a hard disk 4205 or a ROM 4203 as a recording medium built in the computer.
- the program is a removable recording medium such as a floppy disk, CD-ROM (Compact Disc Read Only Memory), M0 (Magneto optical) disk, DVD (Digital Versatile Disc), magnetic disk, semiconductor memory, etc. 42 10 can be stored (recorded) temporarily or permanently.
- a removable recording medium 4210 can be provided as so-called package software.
- the program can be installed on a computer from the removable recording medium 421 ⁇ as described above, or transmitted wirelessly from a download site to a computer via a satellite for digital satellite broadcasting. , LAN (Local Area Network), the Internet, and the like, the data is transferred to the computer via a wire, and the computer receives the transferred program in the communication unit 4208 and incorporates it. Can be installed on hard disk 4205.
- LAN Local Area Network
- the Internet and the like
- the data is transferred to the computer via a wire
- the computer receives the transferred program in the communication unit 4208 and incorporates it.
- the computer includes a CPU (Central Processing Unit) 4202.
- An input / output interface 4211 is connected to the CPU 4202 via a bus 4201, and the CPU 4202 is connected to the CPU 4202 via the input / output interface 4210 by a user.
- the program stored in the ROM (Read Only Memory) 4203 is executed according to the command.
- the CPU 4202 may be a program stored on the hard disk 4205, a program transferred from a satellite or a network, received by the communication unit 4208 and installed on the hard disk 4205, or The program read from the removable recording medium 42 10 attached to the drive 42 09 and installed on the hard disk 42 05 is transferred to a RAM (Random Access Memory) 4 Load to 204 and execute.
- RAM Random Access Memory
- the CPU 4202 performs the processing according to the above-described flowchart or the processing performed by the configuration of the above-described block diagram. Then, the CPU 4202 outputs the processing result as necessary, for example, through an input / output interface 4221, to an output unit 4 composed of an LCD (Liquid Crystal Display), a speaker, or the like.
- the data is output from 206 or transmitted from the communication unit 420 and further recorded on the hard disk 420.
- processing steps for describing a program for causing a computer to perform various types of processing do not necessarily have to be processed in chronological order in the order described as a flowchart, and may be performed in parallel or in parallel. It also includes processes that are executed individually (for example, parallel processing or processing by objects).
- the program may be processed by one computer, or may be processed in a distributed manner by a plurality of computers. Further, the program may be transferred to a remote computer and executed.
- the block for encrypting / decrypting the content has been mainly described as an example in which the block is configured by one-chip encryption / decryption LSI.
- the block for encrypting / decrypting the content is described.
- the processing of the TS processing means 300 can be realized as one software module executed by the CPU 170.
- Fig. 43 shows that the recording medium is manufactured, and a disk ID (Disk ID), a key renewal block: KRB (Key Renewal Block), and an encrypted mass key or an encrypted 1 shows a schematic configuration of a disc manufacturing apparatus for recording a media key.
- a disk ID disk ID
- KRB Key Renewal Block
- an encrypted mass key or an encrypted 1 shows a schematic configuration of a disc manufacturing apparatus for recording a media key.
- the disk manufacturing apparatus shown in FIG. 43 applies a disk ID (Key ID) and a key update blower to an information recording medium that has already been assembled by an assembly process (not shown).
- C Record the KRB (Key Renewal Block) and the encrypted key and media key or the encrypted media key.
- KRB Key Renewal Block
- pre-recording and generation information of the master key are also recorded if necessary.
- the disk manufacturing device 4300 has a memory 4 3 in which a disk ID (Disk ID), a key renewal process: KRB (Key Renewal Block), and an encrypted master key or an encrypted media key are stored in advance.
- a disk ID disk ID
- KRB Key Renewal Block
- an encrypted master key or an encrypted media key are stored in advance.
- 0 2 or other storage means a recording medium I / F 4330 that reads / writes from / to the recording medium 4350, and an input / output I / F 4340 that serves as an I / F with other devices
- a control unit 4301 that controls them, and a bus 4305 that connects them.
- the memory 4302 and the recording medium I / F 4304 are built in the manufacturing apparatus, but the memory 4302 and the recording medium The I / F 4303 may be external.
- disk ID disk ID
- key renewal block KRB (Key Renewal Block) and encrypted master key or encrypted media key, keypad pre-recording pre-recording information (Generation # n) is issued, for example, by a key issuing center (not shown), and is stored in advance in the internal or external memory.
- KRB Key Renewal Block
- Generation # n keypad pre-recording pre-recording information
- the disk ID (Disk ID) stored in the memory 4302, the key update procedure: KRB (Key Renewal Block), and the encrypted master key or encrypted media key are transmitted to the control unit. Under the control of 4301, the data is recorded on the recording medium via the recording medium I / F 4303. If necessary, the pre-recording generation information (Generation ⁇ ) of the master key is also recorded.
- KRB Key Renewal Block
- a disk ID (Disk ID), a key renewal process: KRB (Key Renewal Block), an encrypted master key or an encrypted media key, a pre-recording of a master key (pre-recording) recording generation information (Gener * ation # n) not only uses the one previously stored in the memory 4302 as described above, but also, for example, is sent from the key issuing center via the input / output I / F 4304. It is also possible to obtain what you have.
- KRB Key Renewal Block
- FIG. 44 shows that the recording medium is manufactured as a method of manufacturing the recording medium of the present invention.
- the disk ID (Disk ID) and the key renewal block: KRB (Key Renewal Block) and the encrypted master key or the encrypted media key and pre-recording of the master key 3) shows a flow of a manufacturing process in a method of manufacturing a recording medium for recording recording generation information (Generation # n).
- step S4401 various recording media such as a DVD and a CD are assembled by a known assembling process (not shown).
- a disk ID (Disk ID), a key renewal block: KRB (Key Renewal Block), and Execute the recording process of the encrypted master key or the encrypted media key. Also, pre-recording recording generation information (Generation # n) of the master key is recorded as necessary.
- the recording medium records the disk ID (Disk ID), the key renewal block: KRB (Key Renewal Block), and the encrypted master key or the encrypted media key. Shipped from the manufacturing plant. After recording the pre-recording generation information (Generation # n) of the master key as needed, it is shipped from the manufacturing plant.
- disk ID disk ID
- KRB Key Renewal Block
- Generation # n pre-recording generation information
- Figure 45 shows an example of the format of a key renewal block (KRB: Key Renewal Block).
- Version 4501 is an identifier indicating the version of a key renewal block (KRB: Key Renewal Block).
- Depth 4502 indicates the number of layers in the hierarchical tree for devices to which a key renewal block (KRB) is distributed.
- the data pointer 4503 is a bus pointer indicating the position of the data section in the key renewal block (KRB: Key Renewal Block). It is.
- the data section 4506 stores, for example, data obtained by encrypting a node key to be updated.
- the tag part 4507 is a tag indicating the positional relationship between the encrypted node key and the personal information stored in the data part.
- the tag assignment rule will be described with reference to FIG. In FIG. 46, the key update block described earlier with reference to FIG. An example of sending (KRB) is shown.
- the data at this time is as shown in the table on the right in FIG.
- the address of the top node included in the encryption key at this time is used as the top node address. In this case, since the root key update key K (t) R is included, the top node address is KR.
- the data Enc (K (t) 0, ⁇ (7) R) at the top of the encryption key is at the position shown in the left hierarchical tree in FIG.
- the next data is Enc (K (t) 0 0, K (t) 0), which is at the lower left position of the previous data on the tree.
- the tag is set to 0; otherwise, 1 is set.
- tags are set for all data, and the data sequence and tag sequence shown in Fig.
- the signature is an electronic signature executed by, for example, a key management center, a content provider, or a payment institution that issued a key update block (KRB).
- the device that has received the KRB verifies the signature by verifying that it is a key update block (KRB) issued by a valid key update block (KRB) issuer.
- the update process of the master key or the media key is updated by the key distribution configuration of the tree structure. Since it is configured to be transmitted together with the key (KRB), it is possible to transmit or distribute so that it can be decrypted only to the device that needs to update the key, and it is possible to reduce the amount of messages.
- KRB key
- a key that can be decrypted only to a specific group defined by the tree structure can be distributed with a reduced amount of messages, and it can be configured so that it cannot be decrypted to other devices that do not belong to the group. The security of key distribution or distribution is ensured.
- the type of key transmitted to each recording / reproducing device using the key distribution method of the tree structure can be a master key that can be commonly used in a system defined by a specific group forming a tree. It is also possible to use a unique media key for each medium, and by generating a unique KRB for it and distributing it over the network or via media, the key can be updated easily and safely .
- an information recording / reproducing system capable of preventing unauthorized (unintended copyright owner) duplication of copyrighted data such as movies and music.
- a new generation of master keys that are updated by the KRB are distributed, so that the updated master keys that are encrypted and distributed with the KRB are updated. Since it is possible to configure a unique key block that identifies possible devices, it is possible to create an encrypted master key that can be decrypted only by devices that need to be updated safely, without performing the conventional authentication process for each device. It can be configured to perform key updates securely.
- the information recording / reproducing apparatus and method of the present invention not only the encryption processing using the generation-controlled master key or the media key, but also the encryption processing that enables the reproduction device restriction processing is performed, and the recording medium is executed. Is stored. With this configuration, when data can be recorded on a recording medium so that it can be played back only by that device (restriction on the playback device), the device unique key (device unique key) is used as a decryption key. Otherwise, if not (reproduction device is not restricted), the device identification information (device ID) is applied to the data encryption key for encryption.
- the device identification information of the recorded device and the information (reproduction device restriction flag) indicating whether the recording was performed in the mode of restricting the reproduction device or not (reproduction device restriction flag) are recorded on a recording medium. Therefore, when playing back data, if the playback device is restricted, only the recording device that knows the device unique key can decrypt the data. The data can be decrypted using the device identification information.
- a block key for encrypting block data is generated using ATS configured as random data according to the arrival time of each packet, a unique key different for each block is generated. It is possible to change the encryption key for each block, and to increase the strength against cryptanalysis.
- a configuration in which a work key is generated using ATS an area on a recording medium for storing an encryption key for each work becomes unnecessary, and the main storage area can be used effectively. .
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU46845/01A AU781884B2 (en) | 2000-04-06 | 2001-04-05 | Information recording/reproducing apparatus and method |
AT01919796T ATE435537T1 (de) | 2000-04-06 | 2001-04-05 | Vorrichtung und verfahren zur informationsaufzeichnung und -wiedergabe mit einer baumstruktur von verschlüsselungsschlüsseln |
DE60139104T DE60139104D1 (de) | 2000-04-06 | 2001-04-05 | Vorrichtung und verfahren zur informationsaufzeichnung und -wiedergabe mit einer baumstruktur von verschlüsselungsschlüsseln |
US09/980,272 US7225339B2 (en) | 2000-04-06 | 2001-04-05 | Information recording/playback apparatus and method |
CA002372545A CA2372545C (en) | 2000-04-06 | 2001-04-05 | Information recording/reproducing apparatus and method |
MXPA01012405A MXPA01012405A (es) | 2000-04-06 | 2001-04-05 | Aparato y metodo de registro / reproduccion de informacion. |
EP01919796A EP1185022B1 (en) | 2000-04-06 | 2001-04-05 | Information recording/reproducing apparatus and method having a tree structure of encryption keys |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000105328 | 2000-04-06 | ||
JP2000-105328 | 2000-04-06 | ||
JP2000-243205 | 2000-08-10 | ||
JP2000243205A JP4622064B2 (ja) | 2000-04-06 | 2000-08-10 | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001078300A1 true WO2001078300A1 (fr) | 2001-10-18 |
Family
ID=26589611
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2001/002963 WO2001078300A1 (fr) | 2000-04-06 | 2001-04-05 | Dispositif et procede d'enregistrement et de reproduction d'informations |
Country Status (12)
Country | Link |
---|---|
US (1) | US7225339B2 (ja) |
EP (1) | EP1185022B1 (ja) |
JP (1) | JP4622064B2 (ja) |
KR (1) | KR100746892B1 (ja) |
CN (1) | CN1294718C (ja) |
AT (1) | ATE435537T1 (ja) |
AU (1) | AU781884B2 (ja) |
CA (1) | CA2372545C (ja) |
DE (1) | DE60139104D1 (ja) |
HU (1) | HUP0202148A2 (ja) |
MX (1) | MXPA01012405A (ja) |
WO (1) | WO2001078300A1 (ja) |
Families Citing this family (92)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10181953B1 (en) | 2013-09-16 | 2019-01-15 | Amazon Technologies, Inc. | Trusted data verification |
HU229298B1 (hu) * | 2000-06-21 | 2013-10-28 | Sony Corp | Eljárás és berendezés információk rögzítésére és/vagy lejátszására |
JP2002319932A (ja) * | 2001-04-19 | 2002-10-31 | Sony Corp | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにプログラム |
TWI308306B (en) * | 2001-07-09 | 2009-04-01 | Matsushita Electric Ind Co Ltd | Digital work protection system, record/playback device, recording medium device, and model change device |
JP2003050745A (ja) * | 2001-08-07 | 2003-02-21 | Sony Corp | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム |
JP4934923B2 (ja) * | 2001-08-09 | 2012-05-23 | ソニー株式会社 | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにコンピュータ・プログラム |
JP2005505873A (ja) * | 2001-10-12 | 2005-02-24 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | ブロックとして記憶されるユーザデータを読み取る又は書き込む装置及び方法 |
JP2003189232A (ja) * | 2001-12-21 | 2003-07-04 | Mitsubishi Electric Corp | 記録mpegデータ選択装置及びmpegデータ記録装置 |
JP4122777B2 (ja) * | 2002-01-18 | 2008-07-23 | 日本ビクター株式会社 | コンテンツ記録再生装置 |
US7349538B2 (en) * | 2002-03-21 | 2008-03-25 | Ntt Docomo Inc. | Hierarchical identity-based encryption and signature schemes |
EP1497948A4 (en) * | 2002-04-15 | 2007-03-21 | Ntt Docomo Inc | SIGNATURE SCHEMES USING BILINEAR PICTURES |
JP2004054834A (ja) * | 2002-07-24 | 2004-02-19 | Matsushita Electric Ind Co Ltd | プログラム開発方法、プログラム開発支援装置およびプログラム実装方法 |
EP1540875A4 (en) * | 2002-08-28 | 2011-01-26 | Ntt Docomo Inc | ENCRYPTION ON THE BASIS OF CERTIFICATES AND PUBLIC KEY INFRASTRUCTURE |
KR100940202B1 (ko) * | 2002-08-29 | 2010-02-10 | 삼성전자주식회사 | 일방향 함수를 사용하여 계층적으로 암호화하는 장치 및방법 |
JP4099039B2 (ja) * | 2002-11-15 | 2008-06-11 | 松下電器産業株式会社 | プログラム更新方法 |
JP4525350B2 (ja) * | 2003-01-15 | 2010-08-18 | ソニー株式会社 | 信号処理システム |
JP2004265194A (ja) * | 2003-03-03 | 2004-09-24 | Matsushita Electric Ind Co Ltd | 情報処理装置、および情報処理方法 |
JP4655452B2 (ja) * | 2003-03-24 | 2011-03-23 | 富士ゼロックス株式会社 | 情報処理装置 |
EP1623420B1 (en) * | 2003-06-18 | 2015-11-11 | Panasonic Intellectual Property Management Co., Ltd. | Playback apparatus, playback method, and program for reproducing an encrypted virtual package |
JP4692826B2 (ja) | 2003-07-28 | 2011-06-01 | ソニー株式会社 | 情報処理装置および方法、記録媒体、並びにプログラム |
US7730518B2 (en) * | 2003-07-31 | 2010-06-01 | Emc Corporation | Method and apparatus for graph-based partition of cryptographic functionality |
JP4161859B2 (ja) | 2003-09-11 | 2008-10-08 | ソニー株式会社 | 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム |
JP4469587B2 (ja) * | 2003-09-30 | 2010-05-26 | 株式会社東芝 | 情報記録装置及び情報記録方法、及びデジタル放送受信器 |
US20070127719A1 (en) * | 2003-10-14 | 2007-06-07 | Goran Selander | Efficient management of cryptographic key generations |
KR100643278B1 (ko) * | 2003-10-22 | 2006-11-10 | 삼성전자주식회사 | 휴대용 저장 장치의 디지털 저작권을 관리하는 방법 및 장치 |
CN1906882B (zh) * | 2003-11-14 | 2012-12-12 | 极速决件有限公司 | 内容到可写介质的安全传输 |
JP4114605B2 (ja) * | 2003-12-24 | 2008-07-09 | ソニー株式会社 | 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム |
CN100571132C (zh) | 2004-03-22 | 2009-12-16 | 国际商业机器公司 | 多密钥内容处理系统和方法 |
US20070226520A1 (en) * | 2004-07-07 | 2007-09-27 | Kazuo Kuroda | Information Recording Medium, Information Recording Device and Method, Information Distribution Device and Method, and Computer Program |
JP4936652B2 (ja) * | 2004-08-26 | 2012-05-23 | ソニー株式会社 | 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム |
US20060078790A1 (en) * | 2004-10-05 | 2006-04-13 | Polyplus Battery Company | Solid electrolytes based on lithium hafnium phosphate for active metal anode protection |
JP4110414B2 (ja) | 2004-12-03 | 2008-07-02 | ソニー株式会社 | 情報再生装置及び情報記録再生装置 |
US20060126831A1 (en) * | 2004-12-14 | 2006-06-15 | Cerruti Julian A | Systems, methods, and media for adding an additional level of indirection to title key encryption |
US8176565B2 (en) * | 2005-04-15 | 2012-05-08 | Sony Corporation | Information processing apparatus, information processing method, and computer program |
JP4372061B2 (ja) * | 2005-07-01 | 2009-11-25 | パナソニック株式会社 | 機密情報実装システム及びlsi |
WO2007028241A2 (en) * | 2005-09-07 | 2007-03-15 | Universal Data Protection Corporation | Method and system for data security of recording media |
US20070083467A1 (en) * | 2005-10-10 | 2007-04-12 | Apple Computer, Inc. | Partial encryption techniques for media data |
JP2007164540A (ja) * | 2005-12-14 | 2007-06-28 | Samsung Electronics Co Ltd | データ記憶装置,データ記憶方法およびプログラム |
KR101240053B1 (ko) * | 2005-12-16 | 2013-03-06 | 엘지전자 주식회사 | 멀티 스트림 컨텐츠 복제 방지 방법 및 시스템 |
US7769176B2 (en) * | 2006-06-30 | 2010-08-03 | Verint Americas Inc. | Systems and methods for a secure recording environment |
US7953750B1 (en) | 2006-09-28 | 2011-05-31 | Verint Americas, Inc. | Systems and methods for storing and searching data in a customer center environment |
KR20080046515A (ko) * | 2006-11-22 | 2008-05-27 | 삼성전자주식회사 | 콘텐츠 파일의 암호화 및 복호화 방법 |
US8908870B2 (en) * | 2007-11-01 | 2014-12-09 | Infineon Technologies Ag | Method and system for transferring information to a device |
US8627079B2 (en) * | 2007-11-01 | 2014-01-07 | Infineon Technologies Ag | Method and system for controlling a device |
US8401155B1 (en) | 2008-05-23 | 2013-03-19 | Verint Americas, Inc. | Systems and methods for secure recording in a customer center environment |
JP2009301666A (ja) * | 2008-06-16 | 2009-12-24 | Hitachi Ltd | 光ディスク再生装置、車載光ディスク再生装置、および、車載光ディスク再生システム、ならびに、光ディスク再生方法 |
KR101252549B1 (ko) * | 2008-11-21 | 2013-04-08 | 한국전자통신연구원 | 보안 도메인 환경에서의 암/복호화 프로그램 및 대칭키의 안전 배포 방법 및 이를 위한 데이터 분할 및 주입 장치 |
JP5552541B2 (ja) * | 2009-12-04 | 2014-07-16 | クリプトグラフィ リサーチ, インコーポレイテッド | 検証可能な耐漏洩性暗号化および復号化 |
US9237155B1 (en) | 2010-12-06 | 2016-01-12 | Amazon Technologies, Inc. | Distributed policy enforcement with optimizing policy transformations |
JP2012205088A (ja) * | 2011-03-25 | 2012-10-22 | Toshiba Corp | ノード及びグループ鍵更新方法 |
US8769642B1 (en) | 2011-05-31 | 2014-07-01 | Amazon Technologies, Inc. | Techniques for delegation of access privileges |
US9203613B2 (en) | 2011-09-29 | 2015-12-01 | Amazon Technologies, Inc. | Techniques for client constructed sessions |
US9178701B2 (en) | 2011-09-29 | 2015-11-03 | Amazon Technologies, Inc. | Parameter based key derivation |
US9197409B2 (en) | 2011-09-29 | 2015-11-24 | Amazon Technologies, Inc. | Key derivation techniques |
US8892865B1 (en) | 2012-03-27 | 2014-11-18 | Amazon Technologies, Inc. | Multiple authority key derivation |
US9215076B1 (en) | 2012-03-27 | 2015-12-15 | Amazon Technologies, Inc. | Key generation for hierarchical data access |
US8739308B1 (en) | 2012-03-27 | 2014-05-27 | Amazon Technologies, Inc. | Source identification for unauthorized copies of content |
US9391770B2 (en) * | 2012-06-12 | 2016-07-12 | Tigerspike Products, Pte. Ltd | Method of cryption |
US9258118B1 (en) | 2012-06-25 | 2016-02-09 | Amazon Technologies, Inc. | Decentralized verification in a distributed system |
US9660972B1 (en) | 2012-06-25 | 2017-05-23 | Amazon Technologies, Inc. | Protection from data security threats |
US8996869B1 (en) * | 2012-07-02 | 2015-03-31 | Bae Systems Information And Electronic Systems Integration Inc. | Secure mission module |
US10623386B1 (en) | 2012-09-26 | 2020-04-14 | Pure Storage, Inc. | Secret sharing data protection in a storage system |
US11032259B1 (en) | 2012-09-26 | 2021-06-08 | Pure Storage, Inc. | Data protection in a storage system |
US8745415B2 (en) | 2012-09-26 | 2014-06-03 | Pure Storage, Inc. | Multi-drive cooperation to generate an encryption key |
US9305172B2 (en) | 2013-03-15 | 2016-04-05 | Mcafee, Inc. | Multi-ring encryption approach to securing a payload using hardware modules |
US9407440B2 (en) | 2013-06-20 | 2016-08-02 | Amazon Technologies, Inc. | Multiple authority data security and access |
US9521000B1 (en) | 2013-07-17 | 2016-12-13 | Amazon Technologies, Inc. | Complete forward access sessions |
US9311500B2 (en) | 2013-09-25 | 2016-04-12 | Amazon Technologies, Inc. | Data security using request-supplied keys |
US9237019B2 (en) | 2013-09-25 | 2016-01-12 | Amazon Technologies, Inc. | Resource locators with keys |
US10243945B1 (en) | 2013-10-28 | 2019-03-26 | Amazon Technologies, Inc. | Managed identity federation |
US11128448B1 (en) | 2013-11-06 | 2021-09-21 | Pure Storage, Inc. | Quorum-aware secret sharing |
US10263770B2 (en) | 2013-11-06 | 2019-04-16 | Pure Storage, Inc. | Data protection in a storage system using external secrets |
US9516016B2 (en) | 2013-11-11 | 2016-12-06 | Pure Storage, Inc. | Storage array password management |
US9420007B1 (en) | 2013-12-04 | 2016-08-16 | Amazon Technologies, Inc. | Access control using impersonization |
US9374368B1 (en) | 2014-01-07 | 2016-06-21 | Amazon Technologies, Inc. | Distributed passcode verification system |
US9292711B1 (en) | 2014-01-07 | 2016-03-22 | Amazon Technologies, Inc. | Hardware secret usage limits |
US9369461B1 (en) | 2014-01-07 | 2016-06-14 | Amazon Technologies, Inc. | Passcode verification using hardware secrets |
US9262642B1 (en) | 2014-01-13 | 2016-02-16 | Amazon Technologies, Inc. | Adaptive client-aware session security as a service |
US9294276B2 (en) * | 2014-02-10 | 2016-03-22 | International Business Machines Corporation | Countering server-based attacks on encrypted content |
KR20150101683A (ko) * | 2014-02-27 | 2015-09-04 | 삼성전자주식회사 | 자기 암호화 드라이브 및 그것을 포함한 유저 장치 |
US10771255B1 (en) | 2014-03-25 | 2020-09-08 | Amazon Technologies, Inc. | Authenticated storage operations |
US9258117B1 (en) | 2014-06-26 | 2016-02-09 | Amazon Technologies, Inc. | Mutual authentication with symmetric secrets and signatures |
US10326597B1 (en) | 2014-06-27 | 2019-06-18 | Amazon Technologies, Inc. | Dynamic response signing capability in a distributed system |
GB2528959C (en) * | 2014-08-07 | 2017-06-28 | Gurulogic Microsystems Oy | Encoder, decoder and methods |
CN104240073A (zh) * | 2014-10-11 | 2014-12-24 | 上海众人科技有限公司 | 一种基于预付卡的脱机支付方法和系统 |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
US10122689B2 (en) | 2015-06-16 | 2018-11-06 | Amazon Technologies, Inc. | Load balancing with handshake offload |
US10122692B2 (en) | 2015-06-16 | 2018-11-06 | Amazon Technologies, Inc. | Handshake offload |
TWI602076B (zh) * | 2016-05-13 | 2017-10-11 | 矽統科技股份有限公司 | 音訊處理編碼鎖定方法與收音裝置 |
US10116440B1 (en) | 2016-08-09 | 2018-10-30 | Amazon Technologies, Inc. | Cryptographic key management for imported cryptographic keys |
CN106571915A (zh) * | 2016-11-15 | 2017-04-19 | 中国银联股份有限公司 | 一种终端主密钥的设置方法和装置 |
US11226867B2 (en) * | 2019-04-29 | 2022-01-18 | Hewlett Packard Enterprise Development Lp | Backups of file system instances of encrypted data objects |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0789361A2 (en) * | 1996-02-06 | 1997-08-13 | Matsushita Electric Industrial Co., Ltd. | Data reception apparatus, data transmission apparatus, information processing system, data reception method and information record medium storing the data reception method suitable for preventing illegal copy of documents |
JPH103256A (ja) * | 1995-10-16 | 1998-01-06 | Sony Corp | 暗号化方法、暗号化装置、記録方法、復号化方法、復号化装置及び記録媒体 |
JPH11126425A (ja) * | 1997-10-24 | 1999-05-11 | Sony Corp | 光ディスク装置、光ディスクの再生方法及び光ディスク |
JPH11187013A (ja) * | 1997-12-24 | 1999-07-09 | Ibm Japan Ltd | 暗号鍵配信システム |
JPH11224461A (ja) * | 1998-02-06 | 1999-08-17 | Sony Corp | 情報処理装置、情報処理方法、提供媒体、および記録媒体 |
JPH11250570A (ja) * | 1998-02-27 | 1999-09-17 | Matsushita Electric Ind Co Ltd | 秘密情報変更システム、秘密情報変更第1装置、秘密情報変更第2装置、及び媒体 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19511298B4 (de) | 1995-03-28 | 2005-08-18 | Deutsche Telekom Ag | Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder |
KR970024712A (ko) | 1995-10-16 | 1997-05-30 | 이데이 노부유키 | 암호화 방법 및 암호화 장치 및 기록 방법 및 복호 방법 및 복호 장치 및 기록 매체 |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
DE19847941A1 (de) | 1998-10-09 | 2000-04-13 | Deutsche Telekom Ag | Verfahren zum Etablieren eines gemeinsamen krytografischen Schlüssels für n Teilnehmer |
JP4505693B2 (ja) | 1998-12-11 | 2010-07-21 | ソニー株式会社 | 情報処理装置および情報処理方法、並びに記録媒体 |
US6240188B1 (en) | 1999-07-06 | 2001-05-29 | Matsushita Electric Industrial Co., Ltd. | Distributed group key management scheme for secure many-to-many communication |
-
2000
- 2000-08-10 JP JP2000243205A patent/JP4622064B2/ja not_active Expired - Fee Related
-
2001
- 2001-04-05 WO PCT/JP2001/002963 patent/WO2001078300A1/ja active Application Filing
- 2001-04-05 US US09/980,272 patent/US7225339B2/en not_active Expired - Lifetime
- 2001-04-05 EP EP01919796A patent/EP1185022B1/en not_active Expired - Lifetime
- 2001-04-05 CN CNB01801626XA patent/CN1294718C/zh not_active Expired - Fee Related
- 2001-04-05 DE DE60139104T patent/DE60139104D1/de not_active Expired - Lifetime
- 2001-04-05 AT AT01919796T patent/ATE435537T1/de not_active IP Right Cessation
- 2001-04-05 KR KR1020017015702A patent/KR100746892B1/ko not_active IP Right Cessation
- 2001-04-05 MX MXPA01012405A patent/MXPA01012405A/es active IP Right Grant
- 2001-04-05 AU AU46845/01A patent/AU781884B2/en not_active Ceased
- 2001-04-05 CA CA002372545A patent/CA2372545C/en not_active Expired - Fee Related
- 2001-04-05 HU HU0202148A patent/HUP0202148A2/hu unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH103256A (ja) * | 1995-10-16 | 1998-01-06 | Sony Corp | 暗号化方法、暗号化装置、記録方法、復号化方法、復号化装置及び記録媒体 |
EP0789361A2 (en) * | 1996-02-06 | 1997-08-13 | Matsushita Electric Industrial Co., Ltd. | Data reception apparatus, data transmission apparatus, information processing system, data reception method and information record medium storing the data reception method suitable for preventing illegal copy of documents |
JPH11126425A (ja) * | 1997-10-24 | 1999-05-11 | Sony Corp | 光ディスク装置、光ディスクの再生方法及び光ディスク |
JPH11187013A (ja) * | 1997-12-24 | 1999-07-09 | Ibm Japan Ltd | 暗号鍵配信システム |
JPH11224461A (ja) * | 1998-02-06 | 1999-08-17 | Sony Corp | 情報処理装置、情報処理方法、提供媒体、および記録媒体 |
JPH11250570A (ja) * | 1998-02-27 | 1999-09-17 | Matsushita Electric Ind Co Ltd | 秘密情報変更システム、秘密情報変更第1装置、秘密情報変更第2装置、及び媒体 |
Non-Patent Citations (4)
Title |
---|
5C DIGITAL TRANSMISSION CONTENT PROTECTION WHITE PAPER. REVISION 1.0, 14 July 1998 (1998-07-14), pages 01 - 13, XP002942951 * |
MAKOTO TATEBAYASHI ET AL.: "Kiroku media no contents hogo system", 2000 NEN DENSHI JOHO TSUSHIN GAKKAI KISO KYOUKAI SOCIETY TAIKAI KOUEN RONBUNSHUU, 7 September 2000 (2000-09-07), pages 367 - 368, XP002942952 * |
WALDVOGEL M. ET AL.: "The VersaKey Framework: Versatile Group Key Management", IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, vol. 17, no. 9, September 1999 (1999-09-01), pages 1614 - 1631, XP002942949 * |
WONG C.K. ET AL.: "Secure group communications using key graphs", PROCEEDINGS OF ACM SIGCOMM'98, 1998, pages 68 - 79, XP002942950, Retrieved from the Internet <URL:http://www.acm.org/sigcomm/sigcom98/tp/technical.html> * |
Also Published As
Publication number | Publication date |
---|---|
CA2372545C (en) | 2008-06-17 |
CN1294718C (zh) | 2007-01-10 |
EP1185022A4 (en) | 2006-07-26 |
AU4684501A (en) | 2001-10-23 |
DE60139104D1 (de) | 2009-08-13 |
HUP0202148A2 (en) | 2002-10-28 |
US20030016826A1 (en) | 2003-01-23 |
JP2001352322A (ja) | 2001-12-21 |
CA2372545A1 (en) | 2001-10-18 |
EP1185022B1 (en) | 2009-07-01 |
KR100746892B1 (ko) | 2007-08-07 |
MXPA01012405A (es) | 2002-06-07 |
CN1383645A (zh) | 2002-12-04 |
JP4622064B2 (ja) | 2011-02-02 |
KR20020021119A (ko) | 2002-03-18 |
ATE435537T1 (de) | 2009-07-15 |
EP1185022A1 (en) | 2002-03-06 |
US7225339B2 (en) | 2007-05-29 |
AU781884B2 (en) | 2005-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4622064B2 (ja) | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 | |
JP4595182B2 (ja) | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 | |
JP4269501B2 (ja) | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 | |
KR100740360B1 (ko) | 정보 기록/재생 장치 및 방법 | |
KR100763693B1 (ko) | 정보 처리 장치 및 처리 방법 | |
US7088822B2 (en) | Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith | |
JP4934923B2 (ja) | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにコンピュータ・プログラム | |
US20030051151A1 (en) | Information processing apparatus, information processing method and program | |
US7093128B2 (en) | Information recording/reproducing apparatus and method | |
KR100746537B1 (ko) | 정보 기록/재생 장치 및 방법 | |
JP2001351323A (ja) | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにプログラム提供媒体 | |
JP4442063B2 (ja) | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにコンピュータ・プログラム | |
JP2002244552A (ja) | 情報再生装置、情報再生方法、および情報記録媒体、並びにプログラム記憶媒体 | |
JP5338879B2 (ja) | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにコンピュータ・プログラム | |
JP4649797B2 (ja) | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにコンピュータ・プログラム | |
JP2002236622A (ja) | 情報再生装置、情報記録装置、情報再生方法、情報記録方法、および情報記録媒体、並びにプログラム記憶媒体 | |
AU2005201512A1 (en) | Information recording/playback apparatus and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: IN/PCT/2001/01491/MU Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2001/012405 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 2372545 Country of ref document: CA Ref document number: 2372545 Country of ref document: CA Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001919796 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020017015702 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 46845/01 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 01801626X Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09980272 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2001919796 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020017015702 Country of ref document: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |