WO2006025589A1 - Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium - Google Patents

Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium Download PDF

Info

Publication number
WO2006025589A1
WO2006025589A1 PCT/JP2005/016365 JP2005016365W WO2006025589A1 WO 2006025589 A1 WO2006025589 A1 WO 2006025589A1 JP 2005016365 W JP2005016365 W JP 2005016365W WO 2006025589 A1 WO2006025589 A1 WO 2006025589A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
key
contents
node
keys
Prior art date
Application number
PCT/JP2005/016365
Other languages
French (fr)
Inventor
Yuji Suga
Original Assignee
Canon Kabushiki Kaisha
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Kabushiki Kaisha filed Critical Canon Kabushiki Kaisha
Publication of WO2006025589A1 publication Critical patent/WO2006025589A1/en
Priority to US11/614,556 priority Critical patent/US8000472B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the digital contents delivery service is a service for distributing contents among particular users. It is a matter of course that the service needs a system for preventing the contents from being leaked to entities other than the authorized users.
  • the contents delivery service using a large capacity medium similar mechanisms for controlling access from users are also developed. For such a mechanism, a system is provided for a situation where contents data is encrypted or scrambled to allow only authenticated users who have correct contents information or know descrambling way of contents to decrypt the contents data and to enjoy the authorized contents including a document and image data.
  • Such a contents delivery service has contents providers to deliver contents.
  • the contents providers have to set different access control information for each of the contents and expected to perform encryption with different key on each of the contents, each user and each action of the users (for example, viewing or coping the contents).
  • the contents providers suffer significant loads in managing key information such as generating, holding or delivering a key. To solve this problem, more efficient management methods without degrading the security level have been studied. Some of the conventional management methods will be described below. [Tree structure management method]
  • the tree structure management method is suitable for rejecting a user and is used in offline contents replaying appliances such as a DVD player.
  • key information used for encryption and the encrypted contents are concurrently delivered or stored in a medium so that only an authenticated user can decrypt the encrypted data.
  • the key information has to be delivered in an appropriate combination to each user. Tremendous user key information can be efficiently managed with the tree structure.
  • a typical tree structure management method is a contents delivery model described in the document "Management methods for protecting digital contents” encryption and information security symposium SCIS2001, pp.213-218 (hereinafter called Document 1).
  • Document 1 a tree structure for delivering keys as shown in FIG. 14 is used, with different keys being placed at respective nodes.
  • a user key in the above paper, a key held by a player such as a DVD is considered
  • terminal node leaf node
  • the contents are assumed to be updated frequently and keys are thus placed so as to improve efficiency of key revocation.
  • Key management considered in the hierarchical key management method is the same as that in the tree structure management method in that keys are placed at respective nodes but quite different in that a user is provided with not only a key placed at a terminal node but also keys placed at all the nodes including the root.
  • Documents disclosing this technique include C. H. Lin. "Dynamic key management schemes for access control in a hierarchy" Computer Communications, 20:1381-1385, 1997 (hereinafter called Document 2) and J.- C. Birget, X. Zou, G. Noubir, B. Ramamurthy, "Hierarchy-Based Access Control in Distributed Environments" in the Proceedings of IEEE ICC, June 2001 (hereinafter called Document 3) .
  • the method must have a system for allowing a key for the node n3 to be generated from both a key placed at the node nl and a key placed at the node n2.
  • the abovementioned paper by Birget and others proposes two methods shown below as a method for providing such a system.
  • FIG. 18 shows an example of this method, describing a set of key data to be delivered to each node.
  • the figure shows that key data k5 is included in the parent node of a node, to which ⁇ k5 ⁇ is delivered.
  • the figure also shows that it is the same in the other nodes that parent nodes include key data of their children nodes.
  • [(2) One-way function based keying schemes] This is a method of what proposed by Lin and the others (Document 2) extended. This method uses a one ⁇ way hash function to reduce key information held by each node.
  • the abovementioned rl2 and rl3 are generated to satisfy
  • an image encrypting/ decrypting system for encrypting and sending contents data such as an image configured by a plurality of frame images in a series in chronological order at a contents creating side and decrypting and replaying the sent contents data at a user's side is considered (for example,
  • FIG. 7 is a schematic diagram for illustrating a case where time sequential contents are encrypted for each unit.
  • object contents 701 is encrypted into encrypted contents 702.
  • the contents 701 are divided into parts from Ml to M4, which are encrypted by contents keys 703 (kl) - 706 (k4) respectively resulting in the encrypted data cl - c4.
  • contents keys 703 - 706 may be delivered concurrently with the encrypted contents 702, or may be separately delivered in an asynchronous manner from a license server, which is a third party, different from the deliverer.
  • the creator of the time sequential contents has to determine the minimum unit of the contents to be encrypted by the same key and generate a key for each of the atomic contents separated by the unit.
  • the creator also has to determine the range to be disclosed to the receiver and deliver a key for the range. If the atomic contents are set for a kind of contents by mesh, both the key information to be managed and the key delivery cost will be tremendous.
  • the key management method described in Document 4 encrypts each of the atomic contents with a different key not for the purpose of controlling delivery so that a different range will be shown for each user. In other words, whether the user has a correct key or not depends on whether the user wants to enjoy all the contents or not and the use of different keys does not control partial accessing.
  • a creator of time sequential contents can control delivering the contents in further segmented units by determining the minimum unit of contents to be encrypted with the same key, generating a key for each of the atomic contents separated by the unit and encrypting the contents with the respective keys. If the atomic contents are set by segmented mesh, however, both key information to be managed and key delivery cost is tremendous.
  • the present invention intends to provide a technique for facilitating management of key information even if contents information is divided into some partial contents, which are encrypted with different pieces of key information.
  • the information encrypting apparatus of the present invention includes the configuration below:
  • An information encrypting apparatus for encrypting contents information including partial contents arranged in a sequence along a predetermined axis, including: root key generating means for generating root key information of the contents information; hierarchical structure key generating means for generating i keys of the i th layer based on i-1 keys at an upper i-l th layer and generating key information for the number of the partial contents at a terminal position, wherein the hierarchical structure key generating means generates node keys P (i, 1) and P (i.
  • encrypting means for encrypting each of partial contents by using key information at a terminal layer generated by the hierarchical structure key generating means; and storing means for storing encrypted contents information including partial contents encrypted by the encrypting means, the root key information and information for determining a boundary position for each of partial contents.
  • FIG. 3 is a diagram for illustrating an example of a directed graph representing an access structure
  • FIG. 5 is a flowchart for illustrating a node key generating procedure according to a pruning method
  • FIG. 6 is a diagram for illustrating an example of a node-keys-assigning chart for the example shown in FIG. 3;
  • FIG. 7 is a schematic diagram for illustrating a case where time line contents are encrypted for each unit
  • FIG. 8 is a diagram for illustrating a hierarchy of all the range keys shown in FIG. 7 according to the embodiment;
  • FIG. 9 is a diagram for illustrating a hierarchy of a part of the range keys shown in FIG. 7 according to a second embodiment;
  • FIG. 10 is a diagram representing ranges to be decrypted in contents for range keys restricted in FIG.
  • FIG. 11 is a diagram representing ranges to be decrypted in contents for range keys restricted in FIG.
  • FIG. 12 is a diagram representing a hierarchy of a part of the range keys shown in FIG. 7 according to the third embodiment
  • FIG. 13 is a diagram representing a contents delivery system according to the embodiment
  • FIG. 16 is a conceptual diagram for illustrating an access structure in the hierarchical access control method
  • FIG. 18 is a diagram for illustrating an example of User multiple keying
  • FIG. 19 is a diagram for illustrating One-way function based keying schemes
  • FIG. 20 is a diagram representing a hierarchy of all the range keys for five contents keys according to a fourth embodiment
  • FIG. 1 is a block configuration diagram of an information processing unit according to the present invention. All the functions shown in FIG. 1 are not necessary to implement the present invention.
  • an information processing unit 100 includes a modem 118 for a public circuit or the like, a monitor 102 as a display part, a CPU 103, ROM 104, RAM 105, an HD (Hard Disk) 106, a network connecting part 107 for a network, a CD drive 108, an FD (Flexible Disk) drive 109, a DVD (Digital Video Disk or Digital Versatile Disk) drive 110, an interface
  • I/F. 117 for a printer 115
  • an interface (I/F) 111 for a pointing device 112 such as a mouse or a keyboard 113 as an operating part, which are communicatively interconnected via a bus 116.
  • the pointing device 112 and the keyboard 113 are operating parts for a user to input various instructions to the information processing unit 100.
  • Information input through the operating part (operating information) is taken in the information processing unit 100 via the interface 111.
  • Various types of information (character information, image information or the like) in the information processing unit 100 is adapted to be printed out from the printer 115.
  • the monitor 102 displays various types of instructing information for a user or various types of information including character information and image information.
  • the ROM 104 stores a BIOS and a boot program.
  • the RAM 105 is used as a working area for temporally storing processing programs and information on what is to be processed for various processes in the CPU 103.
  • the HD 106 is an exemplary component of a mass storage device, saving an OS, various application program files (including processing programs in the embodiment), a data file, or processing programs for information converting processing or the like, which are transferred to the RAM 105 or the like when the respective processes are performed.
  • the CD drive 108 has functions of reading data stored in a CD (CD-R) as an example of an external memory and writing out data to the CD.
  • the FD (Floppy (registered trademark) (R) disk) drive 109 reads data stored in a FD as an example of an external memory as the CD drive does.
  • the FD drive also has a function of writing various types of data to the FD.
  • the information processing unit 100 may be adapted to install an editing program or a printer driver on the HD 106 and transfer the programs to the RAM 105 if needed, when the programs are stored in external memory such as the CD, the FD and the DVD.
  • the network connecting part 107 is connected to an external network via an interface (I/F) 114.
  • Nodes are divided to fulfill the condition below in the given key delivery graph G in order to generate key generating data.
  • a set of all the nodes is denoted by Node (G)
  • the size of a set of subsets is denoted by N
  • divided subsets are denoted by SubG_l, SubG_2, ...SubG_N.
  • n_a ⁇ n_b or n_a > n_b is held in arbitrary two different nodes n_a and n_b included in SubG_i. That is to say, n_a and n_b have a parent-child relationship, such as one being the child node of the other.
  • the number of divided subsets N is called key delivery order of the key delivery graph G, represented by Ord (G) .
  • Ord (G) assignment of node keys
  • An initial key K_i is calculated for each subset SubG_i (1 ⁇ i ⁇ N) and assigned as a node key for the root node.
  • Node keys are assigned to children nodes subordinate to the root node in the rules shown below: i) Respective nodes are numbered by the numbers associated with N initial keys K_i (1 ⁇ i ⁇ N) . The numbers represent how many times the one-way function is performed on the respective initial keys K_i. "N" meaning "None" may be numbered. If a node is numbered "N" for an initial key K_i, the node has no key associated with the initial key K_i.
  • Nodes included in SubG_i are sorted in descending order according to the parent-child relationship on a directed graph in each set and numbered in ascending order from 0.
  • the numbers are associated with the initial keys K_i.
  • iii) The number associated with the initial key K_j (i ⁇ j) for a node included in SubG_i is "N", if the node is not the ancestor node of nodes included in SubG_j (a subset to the initial key K_j) .
  • the number is the minimum number among what assigned to nodes included in SubG_J as children nodes, if the node is the ancestor node.
  • FIG. 2 is a flowchart of the abovementioned node key assigning process.
  • all the nodes in a set are mutually prime and divided into subsets, which are not empty, ⁇ SubG_i ⁇ ⁇ 1 ⁇ i ⁇ N ⁇ , and initial keys K_i are calculated for respective subsets.
  • the number of nodes included in each of the subsets SubG_i is described as #N (i) .
  • the nodes included in each of the subsets SubG_i are sorted in descending order according to the parent-child relationship on the directed graph, and described as
  • SubG_i ⁇ n (i, 1), n(i, 2) n (i, #N(i))>.
  • the node key for node n (i, j) is what the one-way hash function is performed on an initial key K_k (1 ⁇ k ⁇ N) for predetermined time.
  • the predetermined time is described as h (i, j, k) .
  • Step S201 is a loop for a variable i varying from 1 to N
  • step S202 is a loop for a variable j varying from 1 to N
  • step S203 is a loop for a variable k varying from 1 to #N (i) .
  • node keys as shown in FIG. 4 are configured for the directed graph shown in FIG. 3.
  • a vector of each node shown in FIG. 4 represents how many times the hash function is performed on four initial keys x, y, z and t.
  • a cell described as [2, 2, N, N] is assumed to hold H (H (x) ) and H (H (y) ) as node keys.
  • N refers to "None", meaning that the node has no information on initial keys z and t. If a hash operation is to be performed for n times thereafter, it is briefly described as H"n ( ) .
  • the root key deliverer safely delivers a key for each node to an entity at each node.
  • the deliverer discloses a key delivery graph and delivers data for identifying the delivered key's location on the graph to each entity.
  • a pruning method is known. [Outline of pruning method]
  • each node key is represented by m vector(s), which describe node key information for each node represent the size of node division ⁇ SubG__i ⁇ (1 ⁇ i ⁇ m). It represents how many times the hash function is performed on an initial key as mentioned above.
  • the directed graph G is divided so that sub-graphs fulfill the conditions below:
  • M (G) can be represented as the same as the conventional node-keys-assignment chart, though, it is different in that the size of a vector varies for each sub-graph and a label for indicating a node associating the upper node and the lower node ⁇ is required.
  • FIG. 6 If this method is applied to the directed graph described in FIG. 3, FIG. 6 is obtained.
  • the initial key is less by one than that of FIG. 4, and both the calculation cost and the communication cost is reduced.
  • Kl and K2 described in FIG. 6 are not given as the actual key derived from the initial key. They are generated only from key information possessed by a node of [2, 2, 2] and a node of [N, N, 0], respectively.
  • Kl may be H(ET2(x)
  • K2 H(z
  • " refers to a coupling of pieces of data.
  • FIG. 7 is a schematic diagram for illustrating a case where time sequential contents are encrypted for each unit. It shows an example of contents to be managed divided into four of Ml, M2, M3 and M4. Contents to be managed are encrypted by using contents keys kl, k2, k3 and k4 for each of• atomic contents.
  • a range key k (i, j) (where i ⁇ j), which allows only adjoining atomic contents to be decrypted will be considered.
  • the range key k (i, j) is a key for allowing kj to be generated from contents key ki for atomic contents from Mi to Mj.
  • FIG. 8 is a diagram for illustrating a hierarchy of all the range keys shown in FIG. 7.
  • the nodes represented by circles at the bottom are contents keys.
  • the contents key Ki can be considered the same as the range key K(i, i) .
  • Each node represented as a triangle is a range key, which can generate a range key and a contents key at the lower node position.
  • the range key placed at the root is K(I, 4), which can decrypt all the four atomic contents.
  • FIG. 13 shows a delivery system in the embodiment.
  • a first deliverer 1301 delivers encrypted contents 1303 in the abovementipned configuration and a range key 1304 for decrypting the contents 1303 to a first receiver 1302.
  • the range key 1304 may be delivered separately from a third party such as a license server and not from the first deliverer 1301.
  • the first receiver 1302 can decrypt a part of the encrypted contents 1303 with the range key 1304.
  • the first receiver 1302 can re-deliver the contents. That is to say, the first receiver 1302 plays a role of the second deliverer and delivers the same encrypted contents 1306 to a second receiver 1305.
  • the deliverer can calculate and send, another range key 1307 placed below the range key 1304.
  • the range key 1304 is K(I,3) in FIG. 8 and another range key 1304 below is K (1, 2) in FIG. 8.
  • the first receiver 1302 can obtain contents Ml, M2 and M3.
  • the first receiver 1302 forms the range key 1307 so as to decrypt only Ml and M2, i.e., calculates K(I,2), and re-delivers it to the second receiver 1303.
  • the receiver can re-deliver the contents by restricting the range the receiver is allowed to disclose. This means that a contents receiver also plays a role of a contents deliverer.
  • the contents receiver also has a function of reforming a key at his own discretion.
  • FIG. 23 shows a procedure of application programs for encryption (stored in the HD drive 106) in an embodiment.
  • a file to be encrypted is designated.
  • the file can be designated with a file name with a path for the corresponding moving image file input from a keyboard, or with a file name designated on a dialog window for file designation in a manner of being traced back from a drive and a directory to the object file.
  • a dividing position of the designated contents i.e., an encrypting unit is input.
  • a method of inputting a dividing position may be a method of designating a boundary position of a moving image by time or a method of designating the position by chapter, if chapters are set.
  • the number of divisions for dividing the contents into equal parts may be input, when the contents are divided by the same time length.
  • the number of encrypting units set can be determined when the dividing position of the moving image file (contents) to be encrypted is designated, the number of units is set as L. Data between dividing positions are called partial contents here.
  • step S2305 1 is substituted into an initial variable i.
  • the variable i is for indicating both partial contents to be encrypted and a key to be used.
  • i th partial contents are encrypted with a key Ki. If relationship i ⁇ L is satisfied, or it is determined that partial contents remains to be encrypted at step S2307, the variable i is incremented by 1 at step S2308 and the process of step S2306 is performed.
  • step S2309 where encrypted contents (here, an encrypted moving image file) , a root key and dividing information indicating a dividing position of the encrypted contents (equal to dividing number) is stored in the HDD 106.
  • encrypted contents here, an encrypted moving image file
  • a root key and dividing information indicating a dividing position of the encrypted contents is stored in the HDD 106.
  • delivery of encrypted contents will be described. As described above, although delivery of encrypted contents is desirably performed at a server intended for that purpose, the embodiment is described as the device of the first deliverer functions as a delivering device Web server, FTP server.
  • the flowchart of FIG. 24 shows a procedure to be included in a server program.
  • step S2401 whether contents are requested via a network or not is determined at step S2401. If contents are requested, the process proceeds to step S2402, where authentication is performed. Then, at step S2403, the range of the object contents (a start position and an end position of sequential partial contents) to be permitted for decryption is determined based on the authentication.
  • the process proceeds to step S2405, where decrypting related information is generated.
  • the decrypting related information may be what shown in FIG. 25. That is to say, it may be the parent key information generated at step S2404, the number of children keys indicating how many pieces of children key information are generated from the parent key, the contents dividing information (described at FIG. 23) and information indicating the decrypting range.
  • step S2406 the generated decrypting related information and the encrypted contents information are sent to the terminal of the requesting first receiver.
  • the encrypted contents information may be sent separately or delivered independently through the Internet. Thus, at step S2406, only the decrypting related information may be sent.
  • the terminal of the first receiver can determine not only how many times the children keys should be generated from the received parent key information but also which partial contents of the encrypted contents the generated children keys are corresponding to. Therefore, the first receiver can decrypt and replay the objective partial contents.
  • the contents to be encrypted may be audio data or a document file.
  • pages forming the document may be considered as partial contents for processing. In such a case, however, a file structure of the document file may be disclosed.
  • a typical document file is a PDF file.
  • a data row forming the contents to be delivered is divided at desired positions and each of the partial contents between the dividing positions are encrypted with keys derived from the root key.
  • the deliverer side has to manage only one key. This facilitates the key management and also allows generating key information for decrypting only the range of desired sequential partial contents at the deliverer side.
  • the receiver side of the encrypted contents also has to manage only one piece of key information.
  • Range keys which can be configured in any range, have been described in the above embodiment. In the present embodiment, a method for reducing key management cost by restricting the range keys will be described.
  • This embodiment can reduce the total number of contents keys and reduce management cost by previously determining a range of contents to be managed in this manner and configuring mesh for dividing contents by unit different from general units.
  • the computer program can be generally executed when a computer readable storage medium such as a CD- ROM is set in a computer and copied or installed in the system, the computer readable storage medium can be included in the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention stores and manages only one piece of key information even if contents information includes a plurality of partial contents arranged in a sequence, and the partial contents are encrypted with different keys. When a piece of contents information includes four partial contents or divided into four partial contents, a key for each of four node positions is generated through four steps of operations from a key for the top root. Node keys P (i, 1) and P (i, i) at both sides are generated by a one-way function from node keys P (i-1, 1) and P (i-1, i-1) at the upper i-1th layer, and a node key P (i, m) (m = 2, 3, ..., i-1) are generated by a one-way function which can generate the keys from any of node keys P (i-1, m-1) and P(i-1, m) at the upper i-1th layer, where jth node key at the ith layer is represented as P (i, j) (j= 1, 2, ..., i-1). Then, each of partial contents is encrypted with key information generated at a terminal layer. If only a root key is saved, one encrypting key can be generated for a range of partial contents arranged in a sequence.

Description

DESCRIPTION
INFORMATION ENCRYPTION APPARATUS AND CONTROLLING METHOD OF THE SAME, COMPUTER PROGRAM AND COMPUTER READABLE
STORAGE MEDIUM
TECHNICAL FIELD
The present invention relates to a technique of encrypting contents information to be delivered.
BACKGROUND ART
With transfer rates of communication lines being speeded up and large capacity recording media such as a DVD being used, more and more digital contents including documents or image data are communicated these days. The digital contents delivery service is a service for distributing contents among particular users. It is a matter of course that the service needs a system for preventing the contents from being leaked to entities other than the authorized users. For the contents delivery service using a large capacity medium, similar mechanisms for controlling access from users are also developed. For such a mechanism, a system is provided for a situation where contents data is encrypted or scrambled to allow only authenticated users who have correct contents information or know descrambling way of contents to decrypt the contents data and to enjoy the authorized contents including a document and image data.
Such a contents delivery service has contents providers to deliver contents. The contents providers have to set different access control information for each of the contents and expected to perform encryption with different key on each of the contents, each user and each action of the users (for example, viewing or coping the contents). The contents providers suffer significant loads in managing key information such as generating, holding or delivering a key. To solve this problem, more efficient management methods without degrading the security level have been studied. Some of the conventional management methods will be described below. [Tree structure management method]
The tree structure management method is suitable for rejecting a user and is used in offline contents replaying appliances such as a DVD player. In this method, key information used for encryption and the encrypted contents are concurrently delivered or stored in a medium so that only an authenticated user can decrypt the encrypted data. The key information has to be delivered in an appropriate combination to each user. Tremendous user key information can be efficiently managed with the tree structure.
The three indicators below determine the efficiency of a method of the tree structure management methods :
1) a data size of key information to be delivered concurrently with the contents
2) a data size of previously delivered key information, which holds a user
3) a data size of key information required to be managed by a contents provider
In an online delivery service, 1) counts most as 1) determines the network traffic. From the view of contents providers, however, 3) counts most as 3) refers to its management cost. It should be noticed that the indicators' weights vary among situations.
A typical tree structure management method is a contents delivery model described in the document "Management methods for protecting digital contents" encryption and information security symposium SCIS2001, pp.213-218 (hereinafter called Document 1). In this model, a tree structure for delivering keys as shown in FIG. 14 is used, with different keys being placed at respective nodes. A user key (in the above paper, a key held by a player such as a DVD is considered) is considered as the same as a terminal node (leaf node) and is assumed to hold key data for all the nodes from the root to the terminal node. In this model, the contents are assumed to be updated frequently and keys are thus placed so as to improve efficiency of key revocation. [Hierarchical key management method]
Key management considered in the hierarchical key management method is the same as that in the tree structure management method in that keys are placed at respective nodes but quite different in that a user is provided with not only a key placed at a terminal node but also keys placed at all the nodes including the root. Documents disclosing this technique include C. H. Lin. "Dynamic key management schemes for access control in a hierarchy" Computer Communications, 20:1381-1385, 1997 (hereinafter called Document 2) and J.- C. Birget, X. Zou, G. Noubir, B. Ramamurthy, "Hierarchy-Based Access Control in Distributed Environments" in the Proceedings of IEEE ICC, June 2001 (hereinafter called Document 3) .
In this method, not a structure of n-ary trees as shown in FIG. 14 but an access structure as shown in FIGS. 15 and 16 are considered with some local places having relationship such as shown in FIG. 17. In this case, the method must have a system for allowing a key for the node n3 to be generated from both a key placed at the node nl and a key placed at the node n2. The abovementioned paper by Birget and others (Document 3) proposes two methods shown below as a method for providing such a system.
[(1) User multiple keying]
This is a method for making each node hold a plurality of keys with a parent node being adapted to hold all the keys for children nodes. FIG. 18 shows an example of this method, describing a set of key data to be delivered to each node. For example, the figure shows that key data k5 is included in the parent node of a node, to which {k5} is delivered. The figure also shows that it is the same in the other nodes that parent nodes include key data of their children nodes. [(2) One-way function based keying schemes] This is a method of what proposed by Lin and the others (Document 2) extended. This method uses a one¬ way hash function to reduce key information held by each node. When key data of a child node is generated from key data of a plurality of parent nodes as shown in FIG. 17, the operations shown below are required.
The operations will be described with reference to FIG. 19.
In FIG. 19, in order to generate key data k3 from key data kl or k2, computations below are performed: k3: = F (kl, n3) XOR rl3 k3: = F (k2, n3) XOR r23
Here, XOR refers to an exclusive OR for each bit. F ( ) is a one-way hash function to be described later in detail. n3 is an identifier of a node, to which key data k3 is associated, and rl3 and r23, both of which are public data, are random data which is associated with node nl (key data kl) via node n3 and which is associated with node n2 (key data k2) via node n3, respectively.
The function f ( ) is configured by F (k_i, n__j) = g~ {k_i + n_j} mod p (p is a prime and g is a generator) . The abovementioned rl2 and rl3 are generated to satisfy
F (kl, n3) XOR rl3 = F(k2, n3) XOR r23. [Delivery of time sequential image contents]
As an application of the abovementioned key generating method, an image encrypting/ decrypting system for encrypting and sending contents data such as an image configured by a plurality of frame images in a series in chronological order at a contents creating side and decrypting and replaying the sent contents data at a user's side is considered (for example,
Japanese Patent Laid-Open No. 2002-156905 (Document 4)),
FIG. 7 is a schematic diagram for illustrating a case where time sequential contents are encrypted for each unit. At a contents creating side, object contents 701 is encrypted into encrypted contents 702. The contents 701 are divided into parts from Ml to M4, which are encrypted by contents keys 703 (kl) - 706 (k4) respectively resulting in the encrypted data cl - c4. At a user's side, all or a part of the contents keys from kl to k4 are secretly received and the encrypted part of the contents keys is decrypted. The contents keys 703 - 706 may be delivered concurrently with the encrypted contents 702, or may be separately delivered in an asynchronous manner from a license server, which is a third party, different from the deliverer. Here, the creator of the time sequential contents has to determine the minimum unit of the contents to be encrypted by the same key and generate a key for each of the atomic contents separated by the unit. The creator also has to determine the range to be disclosed to the receiver and deliver a key for the range. If the atomic contents are set for a kind of contents by mesh, both the key information to be managed and the key delivery cost will be tremendous.
It should be noticed that the key management method described in Document 4 encrypts each of the atomic contents with a different key not for the purpose of controlling delivery so that a different range will be shown for each user. In other words, whether the user has a correct key or not depends on whether the user wants to enjoy all the contents or not and the use of different keys does not control partial accessing.
As mentioned above, a creator of time sequential contents can control delivering the contents in further segmented units by determining the minimum unit of contents to be encrypted with the same key, generating a key for each of the atomic contents separated by the unit and encrypting the contents with the respective keys. If the atomic contents are set by segmented mesh, however, both key information to be managed and key delivery cost is tremendous.
DISCLOSURE OF INVENTION
In the view of the abovementioned problems, the present invention intends to provide a technique for facilitating management of key information even if contents information is divided into some partial contents, which are encrypted with different pieces of key information.
In order to solve the problem, the information encrypting apparatus of the present invention includes the configuration below:
An information encrypting apparatus for encrypting contents information including partial contents arranged in a sequence along a predetermined axis, including: root key generating means for generating root key information of the contents information; hierarchical structure key generating means for generating i keys of the ith layer based on i-1 keys at an upper i-lth layer and generating key information for the number of the partial contents at a terminal position, wherein the hierarchical structure key generating means generates node keys P (i, 1) and P (i. i) at both sides by a one-way function from node keys P (i-1, 1) and P (i-1, i-1) at the upper i-lth layer, and a node key P (i, m) (m = 2, 3, ..., i-1) by a one-way function which can generate the keys from any of node keys P (i-1, m-1) and P(i-1, m) at the upper i-lth layer, where jth node key at the ith layer is represented as P (i, j) (j= 1, 2, ..., i-1); encrypting means for encrypting each of partial contents by using key information at a terminal layer generated by the hierarchical structure key generating means; and storing means for storing encrypted contents information including partial contents encrypted by the encrypting means, the root key information and information for determining a boundary position for each of partial contents.
Other features and advantages of the present invention will be apparent from the following description taken in conjunction with the accompanying drawings, in which like reference characters designate the same or similar parts throughout the figures thereof.
BRIEF DESCRIPTION OF DRAWINGS The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the invention and , together with the description, serve to explain the principles of the invention.
FIG. 1 is a block diagram for illustrating a configuration of a processing unit according to an embodiment;
FIG. 2 is a flowchart for illustrating a node key generating procedure according to a hash key generating method;
FIG. 3 is a diagram for illustrating an example of a directed graph representing an access structure;
FIG. 4 is a diagram for illustrating an example of a node key assigning chart for the example shown in FIG. 3;
FIG. 5 is a flowchart for illustrating a node key generating procedure according to a pruning method;
FIG. 6 is a diagram for illustrating an example of a node-keys-assigning chart for the example shown in FIG. 3;
FIG. 7 is a schematic diagram for illustrating a case where time line contents are encrypted for each unit;
FIG. 8 is a diagram for illustrating a hierarchy of all the range keys shown in FIG. 7 according to the embodiment; FIG. 9 is a diagram for illustrating a hierarchy of a part of the range keys shown in FIG. 7 according to a second embodiment; FIG. 10 is a diagram representing ranges to be decrypted in contents for range keys restricted in FIG.
9 according to the second embodiment;
FIG. 11 is a diagram representing ranges to be decrypted in contents for range keys restricted in FIG.
10 according to a third embodiment;
FIG. 12 is a diagram representing a hierarchy of a part of the range keys shown in FIG. 7 according to the third embodiment; FIG. 13 is a diagram representing a contents delivery system according to the embodiment;
FIG. 14 is a conceptual diagram for illustrating a binary tree access structure in a tree structure management method; FIG. 15 is a conceptual diagram for illustrating an access structure in a hierarchical access control method;
FIG. 16 is a conceptual diagram for illustrating an access structure in the hierarchical access control method;
FIG. 17 is a conceptual diagram for illustrating a local structure in the hierarchical access control method;
FIG. 18 is a diagram for illustrating an example of User multiple keying;
FIG. 19 is a diagram for illustrating One-way function based keying schemes; FIG. 20 is a diagram representing a hierarchy of all the range keys for five contents keys according to a fourth embodiment;
FIG. 21 is a diagram representing a hierarchy of a part of the range keys shown in FIG. 20 according to the fourth embodiment;
FIG. 22 is a diagram representing a hierarchy of a part of the range keys shown in FIG. 20 according to the fourth embodiment; FIG. 23 is a flowchart for illustrating an encrypting procedure in the embodiment;
FIG. 24 is a flowchart for illustrating a delivery procedure of decrypting information for encrypted contents in the embodiment; and FIG. 25 is a diagram for illustrating a data structure of decrypting information.
BEST MODE FOR CARRYING OUT THE INVENTION Embodiments according to the present invention will be described in detail below. [First Embodiment]
FIG. 1 is a block configuration diagram of an information processing unit according to the present invention. All the functions shown in FIG. 1 are not necessary to implement the present invention.
As shown in FIG. 1, an information processing unit 100 includes a modem 118 for a public circuit or the like, a monitor 102 as a display part, a CPU 103, ROM 104, RAM 105, an HD (Hard Disk) 106, a network connecting part 107 for a network, a CD drive 108, an FD (Flexible Disk) drive 109, a DVD (Digital Video Disk or Digital Versatile Disk) drive 110, an interface
(I/F.) 117 for a printer 115, and an interface (I/F) 111 for a pointing device 112 such as a mouse or a keyboard 113 as an operating part, which are communicatively interconnected via a bus 116. The pointing device 112 and the keyboard 113 are operating parts for a user to input various instructions to the information processing unit 100. Information input through the operating part (operating information) is taken in the information processing unit 100 via the interface 111.
Various types of information (character information, image information or the like) in the information processing unit 100 is adapted to be printed out from the printer 115. The monitor 102 displays various types of instructing information for a user or various types of information including character information and image information.
The CPU 103 controls over operation of the entire information processing unit 100. The CPU 103 controls over the information processing unit 100 by reading out processing programs (an OS and various application programs) from the HD (Hard Disk) 106 or the like and executing them. Particularly in the embodiment, the CPU 103 performs the information processing to be described later by reading out processing programs (corresponding to software in the embodiment) for achieving key generation from the HDD 106 or the like and executing the programs. The HDD 106 stores processing programs for generating a key and various types of data to be used in the programs (a graph for generating a key or the like) or the like.
The ROM 104 stores a BIOS and a boot program. The RAM 105 is used as a working area for temporally storing processing programs and information on what is to be processed for various processes in the CPU 103. The HD 106 is an exemplary component of a mass storage device, saving an OS, various application program files (including processing programs in the embodiment), a data file, or processing programs for information converting processing or the like, which are transferred to the RAM 105 or the like when the respective processes are performed.
The CD drive 108 has functions of reading data stored in a CD (CD-R) as an example of an external memory and writing out data to the CD. The FD (Floppy (registered trademark) (R) disk) drive 109 reads data stored in a FD as an example of an external memory as the CD drive does. The FD drive also has a function of writing various types of data to the FD.
The DVD (Digital Video Disk) drive 110 has functions of reading data stored in a DVD as an example of external memory and writing data in the DVD as the CD drive 108 or FD drive 109 does.
The information processing unit 100 may be adapted to install an editing program or a printer driver on the HD 106 and transfer the programs to the RAM 105 if needed, when the programs are stored in external memory such as the CD, the FD and the DVD.
The interface (I/F) 111 is for receiving an input from a user via the pointing device 112 or the keyboard 113. The modem 118 is a communication modem and connected to an external network though a public circuit or the like for example, via the interface (I/F) 119.
The network connecting part 107 is connected to an external network via an interface (I/F) 114.
Generation and management of a key in the abovementioned configuration of an apparatus will be described below. [Hash key management method] (1) [User multiple keying] of the conventional hierarchical key management method has a problem in that the amount of key data to be held increases as the hierarchies increases, i.e., in proportion to the total number of nodes, for each node has to hold many keys.
(2) [One-way function based keying schemes] uses a one-way hash function and reduces the amount of key data to be held at each node, though it also has a problem in that the amount of data to be held increases as the hierarchies increases like the case of (1), for public random data such as rl2 and rl3 have to be held separately. (2) uses a exponential calculation for the one-way hash function. (2) has tremendous amount of calculations as it includes calculations requiring a power method in any case even if (2) may include a trapdoor hash function. Particularly in a device with a little resource for calculations for a PDA or the like, much time is spent in calculating a key, which may risk interactive processing in decrypting data. A key management method with less calculations and the same access structure is needed to solve this problem. [Outline of key generation] Generation of a node key at each node by the hash key management method will be shown below. The access structure, which is the object of the key management, is represented by a directional graph where hierarchical relationship has no loop nor cycle as shown in FIG. 3.
[Division of nodes]
Nodes are divided to fulfill the condition below in the given key delivery graph G in order to generate key generating data. Here, a set of all the nodes is denoted by Node (G) , the size of a set of subsets is denoted by N and divided subsets are denoted by SubG_l, SubG_2, ...SubG_N.
SubG_l U SubG_2 U ...U SubG_N = Node (G)
All the subsets cover all the nodes. n_a < n_b or n_a > n_b is held in arbitrary two different nodes n_a and n_b included in SubG_i. That is to say, n_a and n_b have a parent-child relationship, such as one being the child node of the other.
The number of divided subsets N is called key delivery order of the key delivery graph G, represented by Ord (G) . [Assignment of node keys]
An initial key K_i is calculated for each subset SubG_i (1 ≤ i ≤ N) and assigned as a node key for the root node. Node keys are assigned to children nodes subordinate to the root node in the rules shown below: i) Respective nodes are numbered by the numbers associated with N initial keys K_i (1 ≤ i ≤N) . The numbers represent how many times the one-way function is performed on the respective initial keys K_i. "N" meaning "None" may be numbered. If a node is numbered "N" for an initial key K_i, the node has no key associated with the initial key K_i. ii) Nodes included in SubG_i are sorted in descending order according to the parent-child relationship on a directed graph in each set and numbered in ascending order from 0. The numbers are associated with the initial keys K_i. iii) The number associated with the initial key K_j (i ≠ j) for a node included in SubG_i is "N", if the node is not the ancestor node of nodes included in SubG_j (a subset to the initial key K_j) . The number is the minimum number among what assigned to nodes included in SubG_J as children nodes, if the node is the ancestor node.
FIG. 2 is a flowchart of the abovementioned node key assigning process. Here, it is considered that all the nodes in a set are mutually prime and divided into subsets, which are not empty, {SubG_i} {1 < i ≤N}, and initial keys K_i are calculated for respective subsets.
The number of nodes included in each of the subsets SubG_i is described as #N (i) . The nodes included in each of the subsets SubG_i are sorted in descending order according to the parent-child relationship on the directed graph, and described as
SubG_i = {n (i, 1), n(i, 2) n (i, #N(i))>. The node key for node n (i, j) is what the one-way hash function is performed on an initial key K_k (1 < k ≤ N) for predetermined time. The predetermined time is described as h (i, j, k) .
Step S201 is a loop for a variable i varying from 1 to N, step S202 is a loop for a variable j varying from 1 to N, and step S203 is a loop for a variable k varying from 1 to #N (i) .
At step S204, whether the variables i and k match or not is evaluated. If they match, the process proceeds to step S205. If they do not match, the process proceeds to step S206. j - 1 is substituted into h (i, j, k) at step S205 and the process returns to the start of the loop. At step S206, the presence of m, which fulfills n (k, m) < n (i, j), i.e., n (i, j) is the ancestor node of n (k, m) is evaluated. If m is not present, the process proceeds to step S207. If m is present, the process proceeds to step S208. "N" is substituted into h (i, j, k) at step S207 and the process returns to the start of the loop.
At step S208, min {h (k, m, k)|n (k, m) < n (i, j)} is substituted into h (i, j, k), i.e., the minimum value of h (k, m, k) among nodes, where n (i, j) is the ancestor node of n (k, m) , is substituted into h (i, j, k) , and the process returns to the start of the loop. This key generating method is adapted to fulfill the two requirements below: a) Ability of generation: an object node can generate the key for its grandchild node. b) Protect against collusion attacks: Even if entities at two or more arbitrary nodes work together (unless the one-way function becomes fragile) , a key for the ancestor node upper than the respective nodes cannot be generated.
With these conditions, a hierarchical key management method for allowing key generation and key delivery in a safe manner can be achieved. As an example, node keys as shown in FIG. 4 are configured for the directed graph shown in FIG. 3. A vector of each node shown in FIG. 4 represents how many times the hash function is performed on four initial keys x, y, z and t. For example, a cell described as [2, 2, N, N] is assumed to hold H (H (x) ) and H (H (y) ) as node keys. "N" refers to "None", meaning that the node has no information on initial keys z and t. If a hash operation is to be performed for n times thereafter, it is briefly described as H"n ( ) . According to this notation, a cell described as [2, 2, N, N] has two node keys of H"2 (x) and H~2 (y) . [Key delivery] A key delivery method by a root key deliverer (an entity of the root node) to each node and a key delivery method by an entity holding individual key other than the root key deliverer to lower nodes will be described below respectively. First, the root key deliverer generates parameter(s) {x_i} (1 ≤ i ≤ Ord (G)) in the number of key delivery order Ord(G) , which is determined by a key delivery graph (G), randomly and safely and makes them its own individual keys. The deliverer places a plurality of keys to respective nodes according to the abovementioned key generating procedure. The root key deliverer safely delivers a key for each node to an entity at each node. Alternatively, the deliverer discloses a key delivery graph and delivers data for identifying the delivered key's location on the graph to each entity. As a subspecies of more efficient hash key delivery method, a pruning method is known. [Outline of pruning method]
When a node division {SubG_i} (l≤ i ≤ m) is given to the directed graph G, an algorithm for calculating a node-keys-assigning chart M (G) representing key generation uses the conventional technique of the hash key generating method. The calculation algorithm is described as fl :G→M (G). In M (G), each node key is represented by m vector(s), which describe node key information for each node represent the size of node division {SubG__i} (1 ≤ i ≤ m). It represents how many times the hash function is performed on an initial key as mentioned above.
The given directed graph G is divided and ]J is performed on each of the divided sub-graphs G_i to obtain π (G_i) = M (G_i) . The directed graph G is divided so that sub-graphs fulfill the conditions below:
1) Each sub-graph has one root node.
2) If a root node of a sub-graph is not a root of the original graph G, it is a node of another sub-graph. FIG. 5 shows a flowchart of the abovementioned processing. At step S501, a directed graph G representing an access structure is input. At step S502, a graph division is performed and {G_i} (1 ≤ i < m) is obtained. At step S503, the algorithm f[ is performed on each of the obtained sub-graphs G_i and each node-keys-assigning chart M (G_i) is calculated. Finally at step S504, M (G_i) is merged into M (G). M (G) can be represented as the same as the conventional node-keys-assignment chart, though, it is different in that the size of a vector varies for each sub-graph and a label for indicating a node associating the upper node and the lower node^ is required.
If this method is applied to the directed graph described in FIG. 3, FIG. 6 is obtained. In FIG. 6, the initial key is less by one than that of FIG. 4, and both the calculation cost and the communication cost is reduced. Kl and K2 described in FIG. 6 are not given as the actual key derived from the initial key. They are generated only from key information possessed by a node of [2, 2, 2] and a node of [N, N, 0], respectively. For example, Kl may be H(ET2(x) | |H~2(y) | |H~2(z) ) . As just performing the hash function only for the initial key x may allow other nodes to attack and generate K2, the generation of K2 is avoided by including a correction value R common to all the nodes in the data to be hashed. For example, K2 = H(z| |R). Here, the sign " | | " refers to a coupling of pieces of data.
[Key derivation method in the time sequential contents]
The abovementioned FIG. 7 is a schematic diagram for illustrating a case where time sequential contents are encrypted for each unit. It shows an example of contents to be managed divided into four of Ml, M2, M3 and M4. Contents to be managed are encrypted by using contents keys kl, k2, k3 and k4 for each of• atomic contents.
A range key k (i, j) (where i ≤ j), which allows only adjoining atomic contents to be decrypted will be considered.
The range key k (i, j) is a key for allowing kj to be generated from contents key ki for atomic contents from Mi to Mj. FIG. 8 is a diagram for illustrating a hierarchy of all the range keys shown in FIG. 7. The nodes represented by circles at the bottom are contents keys. The contents key Ki can be considered the same as the range key K(i, i) . Each node represented as a triangle is a range key, which can generate a range key and a contents key at the lower node position. The range key placed at the root is K(I, 4), which can decrypt all the four atomic contents. When contents keys from kl to kn are assigned to respective n contents to be managed from Ml to Mn, the range key K(i, j) for all the range (Mi, Mj) (where i<j) can be placed hierarchically in a directed graph. A directed graph is generated and applied to the conventional example of a hash key management method to assign a key to each node. Keys described in FIG. 4 or 6 can be assigned to FIG. 8. By using the hash key management method with each range key treated as a node of a directed graph enables key generation to be performed. <Contents delivery>
Assignment of range keys has been described. Next, re-delivery of contents will be described. FIG. 13 shows a delivery system in the embodiment. A first deliverer 1301 delivers encrypted contents 1303 in the abovementipned configuration and a range key 1304 for decrypting the contents 1303 to a first receiver 1302. The range key 1304 may be delivered separately from a third party such as a license server and not from the first deliverer 1301. The first receiver 1302 can decrypt a part of the encrypted contents 1303 with the range key 1304. The first receiver 1302 can re-deliver the contents. That is to say, the first receiver 1302 plays a role of the second deliverer and delivers the same encrypted contents 1306 to a second receiver 1305. The deliverer can calculate and send, another range key 1307 placed below the range key 1304.
Specifically, a case can be considered where the range key 1304 is K(I,3) in FIG. 8 and another range key 1304 below is K (1, 2) in FIG. 8. As the first receiver 1302 has received the range key 1304 of K(I, 3), the first receiver 1302 can obtain contents Ml, M2 and M3. The first receiver 1302 forms the range key 1307 so as to decrypt only Ml and M2, i.e., calculates K(I,2), and re-delivers it to the second receiver 1303. The receiver can re-deliver the contents by restricting the range the receiver is allowed to disclose. This means that a contents receiver also plays a role of a contents deliverer. The contents receiver also has a function of reforming a key at his own discretion.
A specific case of applying the abovementioned example will be described below. The HD drive 106 in the unit shown in FIG. 1 stores contents, for example a moving image data file, which the first deliverer 1301 wants to deliver.
FIG. 23 shows a procedure of application programs for encryption (stored in the HD drive 106) in an embodiment.
First, at step S2301, a file to be encrypted is designated. The file can be designated with a file name with a path for the corresponding moving image file input from a keyboard, or with a file name designated on a dialog window for file designation in a manner of being traced back from a drive and a directory to the object file.
Then, at step S2302, a dividing position of the designated contents, i.e., an encrypting unit is input. As a method of inputting a dividing position may be a method of designating a boundary position of a moving image by time or a method of designating the position by chapter, if chapters are set. In some cases, the number of divisions for dividing the contents into equal parts may be input, when the contents are divided by the same time length. In any case, as the number of encrypting units set can be determined when the dividing position of the moving image file (contents) to be encrypted is designated, the number of units is set as L. Data between dividing positions are called partial contents here.
The process proceeds to step S2303, where the root key is generated based on key parameters, which are inputted via a keyboard by the number based on the dividing number L or previously stored in a key parameter file. The process proceeds to step S2304, where keys for L terminal nodes (contents keys) Kl, K2, ...KL are generated according to the abovementioned procedure.
At step S2305, 1 is substituted into an initial variable i. The variable i is for indicating both partial contents to be encrypted and a key to be used. At step S2306, ith partial contents are encrypted with a key Ki. If relationship i<L is satisfied, or it is determined that partial contents remains to be encrypted at step S2307, the variable i is incremented by 1 at step S2308 and the process of step S2306 is performed.
If it is determined that all the partial contents have been encrypted, the process proceeds to step S2309, where encrypted contents (here, an encrypted moving image file) , a root key and dividing information indicating a dividing position of the encrypted contents (equal to dividing number) is stored in the HDD 106. Next, delivery of encrypted contents will be described. As described above, although delivery of encrypted contents is desirably performed at a server intended for that purpose, the embodiment is described as the device of the first deliverer functions as a delivering device Web server, FTP server. The flowchart of FIG. 24 shows a procedure to be included in a server program.
First, whether contents are requested via a network or not is determined at step S2401. If contents are requested, the process proceeds to step S2402, where authentication is performed. Then, at step S2403, the range of the object contents (a start position and an end position of sequential partial contents) to be permitted for decryption is determined based on the authentication.
The process proceeds to step S2404, where key information on the lowest node among the nodes, which are the children node of all the nodes covered by the decrypting range, is generated on the basis of a root key for the entire contents held by a server. For example, in FIG. 8, in order to permit decryption of the second or the third partial contents, it is enough to generate keys K2 and K3. Thus, key K (2,3), which is for the lowest node among nodes whose children nodes are K2 and K3, is generated.
The process proceeds to step S2405, where decrypting related information is generated. The decrypting related information may be what shown in FIG. 25. That is to say, it may be the parent key information generated at step S2404, the number of children keys indicating how many pieces of children key information are generated from the parent key, the contents dividing information (described at FIG. 23) and information indicating the decrypting range.
At step S2406, the generated decrypting related information and the encrypted contents information are sent to the terminal of the requesting first receiver.
The encrypted contents information may be sent separately or delivered independently through the Internet. Thus, at step S2406, only the decrypting related information may be sent.
As a result, (the terminal of) the first receiver can determine not only how many times the children keys should be generated from the received parent key information but also which partial contents of the encrypted contents the generated children keys are corresponding to. Therefore, the first receiver can decrypt and replay the objective partial contents. Although a moving image is taken as an example for the contents to be encrypted in the above example, the contents to be encrypted may be audio data or a document file. In case of a document file, pages forming the document may be considered as partial contents for processing. In such a case, however, a file structure of the document file may be disclosed. A typical document file is a PDF file.
As mentioned above, according to the embodiment, a data row forming the contents to be delivered is divided at desired positions and each of the partial contents between the dividing positions are encrypted with keys derived from the root key. As a result, the deliverer side has to manage only one key. This facilitates the key management and also allows generating key information for decrypting only the range of desired sequential partial contents at the deliverer side. The receiver side of the encrypted contents also has to manage only one piece of key information. [Second Embodiment]
Range keys, which can be configured in any range, have been described in the above embodiment. In the present embodiment, a method for reducing key management cost by restricting the range keys will be described.
FIG. 8 shows a hierarchy of all the range keys shown in FIG. 7. A case where not all the range keys are needed by the deliverer's intention can be considered. FIG. 9 shows the case where only K (1, 4), K (1, 3) and K (3, 4) are treated as range keys and it is recognized that the other range keys of K (2, 4), K (1, 2) and K (2, 3) will not used for key delivery. If the hash key generating method is applied for FIG. 9, the initial key is only two in the directed graph shown in FIG. 9 as the key delivery order is two except for nodes that can be pruned, while the initial key is three in FIG. 6. This embodiment can reduce both the amount of key data and the amount of key generating calculation by restricting range keys in this manner and deleting nodes of the directed graph.
This embodiment can reduce the total number of contents keys and reduce management cost by previously determining a range of contents to be managed in this manner and configuring mesh for dividing contents by unit different from general units. [Third Embodiment]
A method of associating contents keys for the minimum unit of contents has been described in the second embodiment. In the present embodiment, a method of reducing key management cost by dividing contents after restricting range keys.
If range keys are restricted to what shown in FIG. 9, FIG. 10 shows ranges to be decrypted in contents corresponding to the ranges in FIG. 9. The contents to be managed 1000 includes Ml to M4, with the range keys 1001 to 1003 corresponding to ranges (Ml, M4), (Ml, M3) and (M3, M4), respectively. As the minimum unit of contents forming respective ranges, the contents to be managed 1100 including Ml to M4 are enough to include three configurations as represented by 1101. In other words, this embodiment can reduce the total number of contents keys from four to three by integrating Ml and M2 into a atomic contents Ml ' . The hierarchy of range keys in this case is shown in FIG. 12. [Fourth Embodiment]
In the Second Embodiment, a method of associating contents keys for the minimum unit of contents is described and the directed graph shown in FIG. 9 is generated from the directed graph shown in FIG. 8. In FIG. 9, two contents keys K (1, 3) and K (3, 4) share only one contents key (k3). 65
- 32 -
Here, a case of five contents keys as shown in FIG. 20 will be considered. The case where only K (1, 5), K (1, 4) and K (2, 5) are treated as range keys as shown in FIG. 21 by the deliverer's intention will be considered. Here, the contents keys shared by K (1, 4) and K (2, 5) are three of k2, k3 and k4. As the key delivery order is three except for nodes which can be pruned in the directed graph shown in FIG. 21, the initial key is three. The contents keys shared by two range keys are three even if range keys are two, which is considered ineffective. A method of reducing the number of initial keys by treating a range key for integrating the contents keys shared by range keys as a range key which can be delivered will be described. FIG. 22 is a directed graph added with K (2, 4).
As the key delivery order is two except for nodes which can be pruned in this directed graph, the initial key is two. This embodiment can reduce the total number of contents keys and key management cost in this manner. The Second and Fourth Embodiments have been described. Configuration and procedure of the apparatus according to the Second and the Fourth Embodiments are almost the same as those of the First Embodiment. As described in the First Embodiment, it is apparent that the present invention covers not only the time line contents such as a moving image, but also any contents with one-dimensional management axis such as page numbers or serial clause numbers in a general document. Therefore, the contents which can be divided into sub contents on the basis of some evaluating axis with the sub contents being ordered are included in the present invention.
The key information described in the embodiments are described as information on a key to be used both in encrypting and decrypting, though, different keys can be used for encrypting and decrypting like a secret key and a public key.
The present invention is not limited to the method of combining apparatuses and methods for achieving the abovementioned embodiments and methods described in the embodiments. The abovementioned embodiments implemented when program codes of software for implementing the abovementioned embodiment is provided to a computer (a CPU or an MPU) in the abovementioned system or apparatus and the computer of the abovementioned system or apparatus operates the abovementioned various devices according to the program codes can also be included in the present invention.
As the computer program can be generally executed when a computer readable storage medium such as a CD- ROM is set in a computer and copied or installed in the system, the computer readable storage medium can be included in the present invention.
According to the present invention as described above, contents information is considered, to be configured by sequential partial contents. Even if partial contents are encrypted with different keys, the invention needs to store only one piece of key information, facilitating key management.
As many apparently widely different embodiments of the present invention can be made without departing from the spirit and scope thereof, it is to be understood that the invention is not limited to the specific embodiments thereof except as defined in the claims.
CLAIM OF PRIORITY
This application claims priority from Japanese Patent Application No. 2004-254681 filed on September 1, 2004, the entire contents of which are hereby incorporated by reference herein.

Claims

1. An information encrypting apparatus comprising: hierarchical structure key generating means for generating key information on partial contents arranged in a sequence along a predetermined axis from root key information of contents information including said partial contents, wherein said root key information cannot be generated from said key information on partial contents; encrypting means for encrypting said partial contents by using key information on partial contents generated by said hierarchical structure key generating means; and storing means for storing encrypted contents information including partial contents encrypted by the encrypting means, said root key information and information for determining a boundary position of said partial contents.
2. The information encrypting apparatus according to claim 1, further comprising designating means for designating a boundary position of partial contents from said contents information.
3. An information encrypting method comprising: a hierarchical structure key generating step of generating key information on partial contents arranged in a sequence along a predetermined axis from root key information of contents information including said partial contents, wherein said root key information cannot be generated from said key information on partial contents; an encrypting step of encrypting said partial contents by using key information on partial contents generated at said hierarchical structure key generating step; and a storing step of storing encrypted contents information including partial contents encrypted at the encrypting step, said root key information and information for determining a boundary position of said partial contents in a predetermined storage.
4. The information encrypting method according to claim 3, further comprising a designating step of designating a boundary position of partial contents from said contents information.
5. A computer program for performing a control method of an information encrypting method according to claim 3.
6. A computer readable storage medium which stores the program according to claim 5 and can be read by a computer.
7. An information encrypting apparatus for encrypting contents information including partial contents arranged in a sequence along a predetermined axis, comprising: root key generating means for generating root key information of said contents information; hierarchical structure key generating means for generating i keys of the ith layer based, on i-1 keys at an upper i-lth layer and generating key information for the number of said partial contents at a terminal position, wherein the hierarchical structure key generating means generates node keys P (i, 1) and P (i, i) at both sides by a one-way function from node keys P (i-1, 1) and P (i-1, i-1) at the upper i-lth layer, and a node key P (i, m) (m = 2, 3, ..., i-1) by a one-way function which can generate the keys from any of node keys P (i-1, m-1) and P(i-1, m) at the upper i-lth layer, where jth node key at the ith layer is represented as P (i, j) (j= 1, 2, ..., i-1); encrypting means for encrypting each of partial contents by using key information at a terminal layer generated by said hierarchical structure key generating means; and storing means for storing encrypted contents information including partial contents encrypted by the encrypting means, said root key information and information for determining a boundary position for each of partial contents.
8. The information encrypting apparatus according to claim 7, wherein said root key generating means comprises inputting means for inputting pieces of data in the number corresponding to the number of said partial contents and. generates root key information based on data inputted by the inputting means.
9. The information encrypting apparatus according to claim 7, further comprising designating means for designating a boundary position for each partial contents from said contents information.
10. The information encrypting apparatus according to claim 7, wherein said contents information includes moving image information, audio information and document information.
11. The information encrypting apparatus according to claim 1, further comprising designating means for designating a boundary position of contents information, and wherein said partial contents are determined between boundary positions designated by said designating means or between a terminal of said contents and the closest boundary position.
12. An information delivering apparatus for delivering key information for decrypting contents encrypted in the information encrypting apparatus according to claim 7, comprising: determining means for determining a rage of partial contents to be decrypted; second hierarchical structure key generating means for generating hierarchical key information to be decrypted based on root key information stored in said storing means, wherein said second hierarchical 65
- 39 -
structure key generating means generates node keys P (i, 1) and P (i, i) at both sides by a one-way function from node keys P (i-1, 1) and P (±-l, i-1) at the upper i-lth layer, and a node key P (i, m) (m = 2, 3, ..., i-1) by a one-way function which can generate the keys from any of node keys P (i-1, m-1) and P(i-1, m) at the upper i-lth layer, where jth node key at the ith layer is represented as P (i, 3) (3= 1, 2, ..., i-1); and delivering means for delivering decrypting information including key information on the lowest node among the nodes, which are the children node of all the nodes at terminal position corresponding to a range for partial contents determined by said determining means and information indicating at least a boundary position for each partial contents in said range for partial contents.
13. A control method in an information encrypting apparatus for encrypting contents information including partial contents arranged in a sequence along a predetermined axis, comprising: a root key generating step of generating root key information of said contents information; a hierarchical structure key generating step of generating i keys of the ith layer based on i-1 keys at an upper i-lth layer and generating key information for the number of said partial contents at a terminal position, wherein said hierarchical structure key generating step generates node keys P (i, 1) and P (i, i) at both sides by a one-way function from node keys P (i-1, 1) and P (i-1, i-1) at the upper i-lth layer, and a node key P (i, m) (m = 2, 3, ..., i-1) by a one-way function which can generate the keys from any of node keys P (i-1, m-1) and P(i-1, m) at the upper i-lth layer, where jth node key at the ith layer is represented as P (i, j) (j= 1, 2, ..., i-1); an encrypting step of encrypting each of partial contents by using key information at a terminal layer generated at said hierarchical structure key generating step,- and a storing step of storing encrypted contents information including partial contents encrypted at the encrypting step, said root key information and information for determining a boundary position for each of partial contents in a predetermined storage.
14. A control method in an information delivering apparatus for delivering key information for decrypting contents encrypted in the information encrypting apparatus according to claim 7, comprising: a determining step of determining a rage of partial contents to be decrypted; a second hierarchical structure key generating step of generating hierarchical key information to be decrypted based on root key information stored in said storing means, wherein node keys P (i, 1) and P (i, i) at both sides are generated by a one-way function from node keys P (i-1, 1) and P (i-1, i-1) at the upper i- 1th layer, and a node key P (i, m) (m = 2, 3, ..., i-1) are generated by a one-way function which can generate the keys from any of node keys P (i-1, m-1) and P(i-1, m) at the upper i-lth layer, where jth node key at the ith layer is represented as P (i, j) (j= 1, 2, ..., i-1); and a delivering step of delivering decrypting information including key information on the lowest node among the nodes, which are the children node of all the nodes at terminal position corresponding to a range for partial contents determined at said determining step and information indicating at least a boundary position for each partial contents in said range for partial contents.
15. A computer program that functions as an information encrypting apparatus for encrypting contents information including partial contents arranged in a sequence along a predetermined axis, when read in a computer, wherein said computer program functions as: root key generating means for generating root key information of said contents information; hierarchical structure key generating means for generating i keys of the ith layer based on i-1 keys at an upper i-lth layer and generating key information for the number of said partial contents at a terminal position, wherein said hierarchical structure key generating means generates node keys P (i, 1) and P (i, i) at both sides by a one-way function from node keys P (i-1, 1) and P (i-1, i-1) at the upper i-lth layer, and a node key P (i, m) (m = 2, 3, ..., i-1) by a one-way function which can generate the keys from any of node keys P (i-1, m-1) and P(i-1, m) at the upper i-lth layer, where jth node key at the ith layer is represented as P (i, j) (j= 1, 2, ..., i-1); encrypting means for encrypting each of partial contents by using key information at a terminal layer generated by said hierarchical structure key generating means; and storing means for storing encrypted contents information including partial contents encrypted by the encrypting means, said root key information and information for determining a boundary position for each of partial contents.
16. A computer program that functions as an information delivering apparatus for delivering key information for decrypting contents encrypted in the information encrypting apparatus according to claim 7, when read in a computer, wherein said computer program functions as: determining means for determining a rage of partial contents to be decrypted; second hierarchical structure key generating means for generating hierarchical key information to be decrypted based on root key information stored in said storing means, wherein said second hierarchical structure key generating means generates node keys P (i, 1) and P (i, i) at both sides by a one-way function from node keys P (i-1, 1) and P (i-1, i-1) at the upper i-lth layer, and a node key P (i, m) (m = 2, 3, ..., i-1) by a one-way function which can generate the keys from any of node keys P (i-1, m-1) and P(I-I, m) at the upper i-lth layer, where jth node key at the ith layer is represented as P (i, j) (j= 1, 2, ..., i-1); and delivering means for delivering decrypting information including key information on the lowest node among the nodes, which are the parent node of all the nodes at terminal position corresponding to a range for partial contents determined by said determining means and information indicating at least a boundary position for each partial contents in said range for partial contents.
17. A computer readable storage medium which stores the computer program according to claim 15.
18. A computer readable storage medium which stores the program according to claim 16.
PCT/JP2005/016365 2004-09-01 2005-08-31 Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium WO2006025589A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/614,556 US8000472B2 (en) 2004-09-01 2006-12-21 Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2004254681A JP4632413B2 (en) 2004-09-01 2004-09-01 Information encryption device, information distribution device, control method therefor, computer program, and computer-readable storage medium
JP2004-254681 2004-09-01

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/614,556 Continuation US8000472B2 (en) 2004-09-01 2006-12-21 Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium

Publications (1)

Publication Number Publication Date
WO2006025589A1 true WO2006025589A1 (en) 2006-03-09

Family

ID=36000221

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/016365 WO2006025589A1 (en) 2004-09-01 2005-08-31 Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium

Country Status (3)

Country Link
US (1) US8000472B2 (en)
JP (1) JP4632413B2 (en)
WO (1) WO2006025589A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101641904B (en) * 2007-03-20 2012-10-03 索尼株式会社 Key providing system, terminal equipment, and information processing method

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2419972C (en) * 2001-03-29 2011-10-25 Matsushita Electric Industrial Co., Ltd. Data protection system that protects data by encrypting the data
US9313248B2 (en) * 2006-04-13 2016-04-12 Johnny Stuart Epstein Method and apparatus for delivering encoded content
US8261091B2 (en) * 2006-12-21 2012-09-04 Spansion Llc Solid-state memory-based generation and handling of security authentication tokens
JP2008236377A (en) * 2007-03-20 2008-10-02 Sony Corp Key providing system, device, and method, terminal device, and key generating method
JP5270894B2 (en) * 2007-10-01 2013-08-21 キヤノン株式会社 Information processing apparatus, control method therefor, information processing system, and program
JP5286748B2 (en) * 2007-11-09 2013-09-11 ソニー株式会社 Information processing apparatus, key setting method, and program
JP5152319B2 (en) * 2008-02-27 2013-02-27 日本電気株式会社 Data recording apparatus, data recording method and data recording control program used for the data recording apparatus
JP5043786B2 (en) * 2008-09-10 2012-10-10 Kddi株式会社 Access control system and access control method
US9451452B2 (en) * 2009-06-29 2016-09-20 Motorola Solutions, Inc. Method of triggering a key delivery from a mesh key distributor
US8254580B2 (en) * 2009-09-30 2012-08-28 Telefonaktiebolaget L M Ericsson (Publ) Key distribution in a hierarchy of nodes
US9712460B1 (en) * 2013-08-26 2017-07-18 F5 Networks, Inc. Matching port pick for RSS disaggregation hashing
US9703981B1 (en) * 2013-11-04 2017-07-11 Mobile Iron, Inc. Mobile device data encryption
WO2015097834A1 (en) * 2013-12-26 2015-07-02 株式会社東芝 Communication control apparatus, communication control method and program
JP6290443B2 (en) * 2014-10-31 2018-03-07 株式会社東芝 COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL METHOD, AND PROGRAM
JP6271808B2 (en) * 2015-03-16 2018-01-31 株式会社東芝 Management apparatus, program, system and method
EP3442160A1 (en) * 2017-08-07 2019-02-13 Siemens Aktiengesellschaft Pruning of authentication trees

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002080448A1 (en) * 2001-03-29 2002-10-10 Sony Corporation Information processing apparatus
JP2004120008A (en) * 2002-09-20 2004-04-15 Pioneer Electronic Corp Key management system
JP2004140667A (en) * 2002-10-18 2004-05-13 Canon Inc Information processing method

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100215586B1 (en) * 1992-11-09 1999-08-16 모리시타 요이찌 Digest image auto-generating apparatus and digest image auto-generating method
US5483598A (en) * 1993-07-01 1996-01-09 Digital Equipment Corp., Patent Law Group Message encryption using a hash function
US5708717A (en) * 1995-11-29 1998-01-13 Alasia; Alfred Digital anti-counterfeiting software method and apparatus
JPH1198487A (en) * 1997-09-24 1999-04-09 Mitsubishi Electric Corp Image coder and image decoder
US6598161B1 (en) * 1999-08-09 2003-07-22 International Business Machines Corporation Methods, systems and computer program products for multi-level encryption
JP2002156905A (en) 2000-11-20 2002-05-31 Nippon Telegr & Teleph Corp <Ntt> Method and device for video deciphering, program recording medium, method and device for video reproduction, and program recording medium
US7043024B1 (en) * 2001-04-18 2006-05-09 Mcafee, Inc. System and method for key distribution in a hierarchical tree
US7136840B2 (en) * 2001-04-20 2006-11-14 Intertrust Technologies Corp. Systems and methods for conducting transactions and communications using a trusted third party
JP4471337B2 (en) * 2002-08-01 2010-06-02 キヤノン株式会社 Image processing apparatus and method, computer program, and computer-readable storage medium
KR100940202B1 (en) * 2002-08-29 2010-02-10 삼성전자주식회사 Apparatus and method for hierarchical encryption using one-way function
US7512811B2 (en) * 2003-01-14 2009-03-31 Canon Kabushiki Kaisha Encryption/decryption method for data limited in value range, apparatus and program therefor
JP2004297778A (en) * 2003-03-07 2004-10-21 Canon Inc Image data encryption method and apparatus, computer program, and computer-readable storage medium
US7313814B2 (en) * 2003-04-01 2007-12-25 Microsoft Corporation Scalable, error resilient DRM for scalable media
WO2004099988A1 (en) * 2003-05-05 2004-11-18 Trustees Of Boston University Data storage distribution and retrieval
WO2005018136A1 (en) * 2003-07-11 2005-02-24 Canon Kabushiki Kaisha Key information processing method, device thereof, and program
JP2007081482A (en) * 2005-09-09 2007-03-29 Canon Inc Terminal authentication method, apparatus and program thereof
JP4993674B2 (en) * 2005-09-09 2012-08-08 キヤノン株式会社 Information processing apparatus, verification processing apparatus, control method thereof, computer program, and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002080448A1 (en) * 2001-03-29 2002-10-10 Sony Corporation Information processing apparatus
JP2004120008A (en) * 2002-09-20 2004-04-15 Pioneer Electronic Corp Key management system
JP2004140667A (en) * 2002-10-18 2004-05-13 Canon Inc Information processing method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101641904B (en) * 2007-03-20 2012-10-03 索尼株式会社 Key providing system, terminal equipment, and information processing method

Also Published As

Publication number Publication date
US8000472B2 (en) 2011-08-16
US20080152133A1 (en) 2008-06-26
JP2006074392A (en) 2006-03-16
JP4632413B2 (en) 2011-02-16

Similar Documents

Publication Publication Date Title
US8000472B2 (en) Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium
US7792867B2 (en) Information processing method and information processing apparatus
US7340054B2 (en) Information processing method, decrypting method, information processing apparatus, and computer program
US20050210014A1 (en) Information-processing method, decryption method, information-processing apparatus and computer program
Naidu et al. Design and implementation of cryptcloud system for securing files in cloud
CN114826696B (en) File content hierarchical sharing method, device, equipment and medium
EP2086161A1 (en) Information processing device
Kuo et al. Cryptographic key assignment scheme for dynamic access control in a user hierarchy
Hui-Min et al. A cryptographic implementation for dynamic access control in a user hierarchy
Sumathi et al. A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography
JP4676695B2 (en) Data division method, data division apparatus, and computer program
KR101485460B1 (en) Method of tracing device keys for broadcast encryption
CN116488814A (en) FPGA-based data encryption secure computing method
Sokouti et al. Genetic-based random key generator (GRKG): a new method for generating more-random keys for one-time pad cryptosystem
CN113194089B (en) Attribute-based encryption method for ciphertext strategy supporting attribute revocation
De Santis et al. Unconditionally secure key assignment schemes
KR101951545B1 (en) Wildcard identity-based key derivation, encryption and decryption method
JP2007189597A (en) Encryption device, encryption method, decoding device, and decoding method
KR20100003093A (en) Method of producing searchable keyword encryption based on public key for minimizing data size of searchable keyword encryption and method of searching data based on public key through that
CN114282922A (en) Block chain transaction processing method and device based on cold wallet
JP4789536B2 (en) Data division apparatus, data division method, and computer program
Chang A flexible hierarchical access control mechanism enforcing extension policies
CN111970296A (en) Efficient file hierarchical attribute-based encryption method and system
Lin et al. A secure fine-grained access control mechanism for networked storage systems
JP2005109753A (en) Method and apparatus for processing key information, and program

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase