WO2000046804A1 - Systeme d'enregistrement/de reproduction d'informations - Google Patents
Systeme d'enregistrement/de reproduction d'informations Download PDFInfo
- Publication number
- WO2000046804A1 WO2000046804A1 PCT/JP2000/000658 JP0000658W WO0046804A1 WO 2000046804 A1 WO2000046804 A1 WO 2000046804A1 JP 0000658 W JP0000658 W JP 0000658W WO 0046804 A1 WO0046804 A1 WO 0046804A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- information recording
- recording medium
- authentication
- medium
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00115—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers wherein the record carrier stores a unique medium identifier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00123—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
- G11B20/00173—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software wherein the origin of the content is checked, e.g. determining whether the content has originally been retrieved from a legal disc copy or another trusted source
Definitions
- Item Information recording and playback system
- the present invention relates to an information recording / reproducing system, an information recording device, an information reproducing device, an authentication data recording device, an authentication processing device, an information recording / reproducing method, an information recording / reproducing method, which prevents unauthorized copying on a recordable medium,
- the present invention relates to an information reproducing method, an authentication data recording method, an information recording medium authentication method, and an information recording medium.
- Such copyright protection systems include, for example, Digita Certain content scramble system power s at 1 Vi deo D i sc (DVD ) ROM.
- the method adopted by the DVD system as described above is effective for a read-only medium (ROM medium), but is not effective for a recordable medium on which a user can record data. Because, in the case of RAM media, even if the unauthorized person cannot decode the ⁇ symbol, the entire data on the disk can be copied to a new disk to create a new disk that can be operated on a legitimate device. Because.
- an object of the present invention is to provide an information recording / reproducing system, an information recording device, an information reproducing device, an authentication data recording device, an authentication processing device, and an information recording / reproducing system in which an illegal copy protection system effective for a RAM medium is constructed.
- An object of the present invention is to provide an information recording / reproducing method, an information recording method, an information reproducing method, an authentication data recording method, an information recording medium authentication method, and an information recording medium.
- the present invention relates to an information recording / reproducing system for recording and reproducing information, comprising a random pattern caused by a random physical phenomenon on an information recording medium.
- Random pattern information based on a random physical phenomenon is detected from a random pattern information recording unit on which information is recorded, medium identification information is generated from the random pattern information, and the medium identification information is used as authentication data on the information recording medium.
- An authentication data recording control unit for performing control for recording in the authentication data recording unit; detecting the random pattern information from the random pattern information recording unit; generating medium identification information inspection data from the random pattern information;
- An authentication processing unit that reads authentication data from an authentication data recording unit on an information recording medium and performs authentication processing on the information recording medium based on the medium identification information inspection data generated from the random pattern information and the authentication data. And information on the information recording medium based on the authentication result of the authentication processing unit. Characterized by comprising an information recording reproduction control unit that performs information playback control from the recording and the information recording medium.
- the present invention provides a random pattern information recording unit that records random pattern information due to a random physical phenomenon, and media identification information generated based on the random pattern information detected from the random pattern information recording unit.
- An information recording apparatus for recording information on an information recording medium having an authentication data recording section stored as data, wherein the random pattern information detecting section detects random pattern information from the random pattern information recording section on the information recording medium.
- An inspection data generation unit that generates medium identification information inspection data from the random pattern information detected by the random pattern information detection unit; and reads authentication data from an authentication data recording unit on the information recording medium, and generates the inspection data.
- the media identification information inspection data generated by the Authentication processing for the information recording medium based on the authentication data, and based on the authentication result.
- An information processing medium that controls whether information can be written to the information recording medium, and a recording control section that controls recording of the information on the information recording medium.
- the present invention provides a random pattern information recording section that records random pattern information due to a random physical phenomenon, and a medium identification generated based on the random pattern information.
- An information reproducing apparatus for reproducing information from an information recording medium having an authentication data recording section storing information as authentication data, the random number detecting random pattern information from the random pattern information recording section on the information recording medium.
- the inspection data generated by the inspection data generation unit and the authentication Characterized comprising an authentication processing unit for performing authentication processing for the information recording medium based on chromatography data, and a reproduction control section for controlling to read out information from the information recording medium.
- the present invention provides an authentication data recording device for recording information for authentication on an information recording medium, wherein the random pattern information recording unit on the information recording medium on which random pattern information due to random physical phenomena is recorded.
- a random pattern information detecting section for detecting the random pattern information; a medium identifying information generating section for generating medium identifying information from the random pattern information detected by the random pattern information detecting section; and the medium identifying information generating section Is recorded in the authentication data recording unit on the information recording medium as authentication data.
- an authentication data recording control unit for performing such control.
- the present invention provides an authentication processing device for performing an authentication process on an information recording medium, comprising: a random pattern information detection unit that detects random pattern information from a random pattern information recording unit on the information recording medium; An inspection data generation unit for generating medium identification information inspection data from the detected random pattern information; and reproducing the authentication data from the authentication data recording unit on the information recording medium, and the medium identification information generated by the inspection data generation unit.
- An authentication processing unit for performing an authentication process on an information recording medium based on the inspection data and the authentication data is provided.
- the present invention relates to an information recording / reproducing method for recording and reproducing information, wherein the method comprises the steps of: storing a random pattern information by a random physical phenomenon on an information recording medium; Detecting random pattern information due to the phenomenon, generating medium identification information from the random pattern information, and performing control to record the medium identification information as authentication data in an authentication data recording unit on the information recording medium.
- a data recording control step detecting the random pattern information from the random pattern information recording unit, generating medium identification information inspection data from the random pattern information, and transmitting authentication data from the authentication data recording unit on the information recording medium.
- the present invention provides a random pattern information recording unit that records random pattern information due to a random physical phenomenon, and media identification information generated based on the random pattern information detected from the random pattern information recording unit.
- the medium identification information detection data generated by the data Performs authentication processing on the information recording medium based on the authentication data, and controls whether information can be written on the information recording medium based on the authentication result, and controls recording information on the information recording medium. It is characterized by having a recording control step.
- the present invention provides a random pattern information recording unit that records random pattern information based on a random physical phenomenon, and a medium identification information generated based on the random pattern information detected from the random pattern information recording unit.
- An information reproducing method for reproducing information from an information recording medium having an authentication data recording section storing authentication information as authentication data comprising: detecting random pattern information from a random pattern information recording section on the information recording medium.
- the present invention provides an authentication data recording method for recording information for authentication on an information recording medium, wherein the random pattern information recording section on the information recording medium on which random pattern information due to random physical phenomena is recorded.
- the present invention provides an authentication processing method for performing authentication processing on an information recording medium, comprising: a random pattern information detecting step of detecting random pattern information from a random pattern information recording unit on the information recording medium; A test data generation step for generating medium identification information test data from the detected random pattern information; and a medium generated by the test data generation step by reproducing authentication data from an authentication data recording unit on the information recording medium.
- An authentication processing step of performing authentication processing on the information recording medium based on the identification information inspection data and the authentication data.
- the present invention also provides an information recording medium on which information is recorded, wherein a random pattern information recorded by random physical phenomena is recorded.
- FIG. 1 is a diagram for explaining an optical disk to which the present invention has been applied.
- FIG. 2 is a block diagram showing a configuration of an authentication data recording device that records authentication data on the optical disc.
- FIG. 3 is a flowchart showing the specific processing contents of the authentication data generation unit in the authentication data recording device.
- FIG. 4 is a block diagram showing a configuration of an optical disk recording / reproducing apparatus using the above optical disk.
- FIG. 5 is a flowchart showing the specific processing contents of the authentication processing unit in the optical disk recording / reproducing apparatus.
- FIG. 6 is a diagram showing a revocation list used for authentication processing by the authentication processing unit.
- FIG. 7 is a view showing a public key list used for authentication processing by the authentication processing unit.
- FIG. 8 is a block diagram showing a configuration of an encryption processing unit of a recording / reproducing circuit in the optical disc recording / reproducing apparatus.
- FIG. 9 is a diagram schematically showing a structure of data recorded on an optical disk by the optical disk recording / reproducing apparatus.
- FIG. 10 shows a recording / reproducing cycle in the optical disc recording / reproducing apparatus. / 46804
- FIG. 11 is a flowchart showing an operation of the optical disk recording / reproducing apparatus in a recording mode.
- FIG. 12 is a flowchart showing the operation of the optical disk recording / reproducing apparatus in the reproducing mode.
- FIG. 13 is a block diagram showing another configuration example of the encryption processing unit of the recording / reproducing circuit in the optical disc recording / reproducing apparatus. .
- FIG. 14 is a block diagram showing another configuration example of the decoding processing unit of the recording Z reproduction circuit in the optical disc recording / reproduction device.
- FIG. 15 is a diagram for explaining a card-shaped information recording medium to which the present invention is applied.
- the present invention is applied to, for example, a recording / reproducing system using an optical disc 1 having a configuration as shown in FIG.
- the optical disk 1 shown in FIG. 1 is a disk medium on which information can be recorded / reproduced, and has a user data recording section 3, which is three information recording areas formed annularly around a center hole 2, and a random pattern. It has an information recording unit 4 and an authentication data recording unit 5.
- the user data recording unit 3, the random pattern information recording unit 4, and the authentication data recording unit 5 can access and read information independently of each other. For example, they are arranged in a two-dimensionally separated state or a three-dimensionally separated state.
- the user data recording section 3, the random pattern information recording section 4, and the authentication data recording section 5 are formed by separating the information recording area two-dimensionally in the radial direction of the disc.
- a user data recording section 3 formed on the outer peripheral side is a data area in which user data is recorded and reproduced. That is, it is an area in which content such as video or music is recorded.
- the random pattern information recording section 4 formed on the inner peripheral side is a read-only area in which random pattern information due to random physical phenomena is recorded.
- the random pattern information recording section 4 is formed by, for example, randomly arranging magnetic fine fibers in the area of the random pattern information recording section 4 at the time of manufacturing the medium and fixing the fibers.
- the random pattern information recording section 4 formed in this manner is a piece in which the random pattern information of the fine magnetic fibers is recorded so as to be detectable.
- the random pattern information recording section 4 may be configured to form bits randomly and detect the jitter as random pattern information.
- the authentication data recording section 5 formed on the outer peripheral side of the random pattern information recording section 4 includes the medium identification information generated based on the random pattern information detected from the random pattern information recording section 4 and The digital signature of each manufacturer for the medium identification information is —This is the area recorded as data.
- This authentication data recording unit 5 is provided in the read-only directory.
- authentication data is recorded in the authentication data recording section 5 by the authentication data recording device 10 having a configuration as shown in FIG. 2, for example.
- the authentication data recording device 10 shown in FIG. 2 includes a spindle motor 12 controlled by a servo circuit 11, a recording Z reproduction head 13 for optically scanning the information recording surface of the optical disc 1, and a recording Z reproduction head 13.
- a random pattern information detecting section 14 for detecting random pattern information from the random pattern information recording section 4 of the optical disc 1; a medium identifying information generating section 15 for generating medium identifying information r; and an authentication data generating section for generating authentication data.
- a control unit 18 for controlling the servo circuit 11 and the authentication data generation unit 16 based on the setting information input from the input operation unit 17 is provided.
- the spindle motor 12 drives the optical disc 1 to rotate at a constant linear velocity, for example, based on the control by the servo circuit 11. '
- the recording / reproducing head 13 includes an optical head that optically scans the authentication data recording unit 5 of the optical disc 1 that is rotated and driven by the spindle motor 12. Record authentication data and perform Z playback.
- the random pattern information detecting section 14 is composed of a magnetic head that scans the random pattern information recording section 4 of the optical disk 1 that is rotated and driven by the spindle motor 12. Information is detected in an analog manner. This The random pattern information detecting section] _4 supplies the random pattern information detected from the random pattern information recording section 4 to the medium identification information generating section 15.
- the medium identification information generation unit 15 converts the random pattern information detected analogously by the random pattern information detection unit 14 into digital random pattern information, and uses this as the medium identification information r.
- the data is supplied to the data generator 16.
- the authentication data generation unit 16 attaches a digital signature for each manufacturer to the medium identification information r supplied from the medium identification information generation unit 15 to obtain authentication data.
- the authentication data generation unit 16 uses a trusted Trusted Center (TC). Register your public key required for digital signature verification in TC and have it issued a certificate (Cert).
- a certificate (Cert) is data in which the TC digitally signs the manufacturer's identification information ID and public key.
- Digital signature technology is a technology that can prove that the data was generated by a specific user.For example, the Elliptic Curve Digital Signature Algori thm (E) used in IEEEP 136 3 The C-DSA) method is well known.
- the medium identification information supplied from the medium identification information generation unit 15 is provided.
- Data m is generated by adding additional information u such as the media production date and the manufacturer's identification information ID to r (step S l). Register this data m in a trusted center
- the digital signature data s is generated using the manufacturer's private key corresponding to the public key (step S2).
- the additional information u is data that can be added to the medium identification information r as needed.
- the authentication data generation unit 16 combines the data m, the digital signature data s, and the certificate (Cert) data with the revocation list to obtain authentication data w (step S3), and converts the authentication data w into The data is supplied to the recording / reproducing head 13 (step S 4) to record the data on the authentication data recording section 5 of the optical disc 1.
- the additional information u, the secret key and certificate (Cert) data for each manufacturer are input to the control unit 18 from the input operation unit 17, for example.
- the data is provided to the authentication data generation unit 16 described above.
- the revocation list provided from the trusted center is input from the input operation unit 17 to the control unit 18, so that the revocation list is stored in the control unit 1. From 8, the data is given to the authentication data generating unit 16 and can be recorded in the authentication data recording unit 5 of the optical disk 1.
- the authentication data recording section 5 of the optical disk 1 records the latest version of the revocation list provided by the trust center.
- the revocation list is a monotonically increasing version number and the identification information ID of the manufacturer whose private key has been determined to have been exposed or misappropriated. It is a thing.
- the manufacturer of the recording medium must use the authentication data recording device 10 having such a configuration. Accordingly, the optical disc 1 in which the data m, the digital signature data s, the certificate (Cert) data, and the revocation list are recorded as the authentication data w in the authentication data recording unit 5 can be manufactured.
- random pattern information detected from the random pattern information recording section 4 in which random pattern information due to random physical phenomena is recorded, and the authentication data recording section 16 are recorded.
- the validity can be verified by the authentication process using the authentication data.
- the random pattern information recorded in the random pattern information recording section 4 cannot be copied because it is due to a random physical phenomenon.
- optical disc 1 having the above-described configuration
- data recording / reproduction is performed by an optical disc recording / reproduction apparatus 20 having a configuration as shown in FIG.
- the optical disk recording / reproducing device 20 shown in FIG. 4 includes a spindle motor 22 controlled by a servo circuit 21, a recording / reproducing head 23 for optically scanning the information recording surface of the optical disk 1, A random pattern information detecting section 24 for detecting random pattern information from the random pattern information recording section 4 of the optical disc 1, a medium identification information inspection data generating section 25 for generating medium identification information inspection data r ', an authentication processing section 2. 6, a control unit 19 for controlling the servo circuit 21 and the recording / reproducing unit 27 based on the setting information input from the recording / reproducing unit 27 and the input operation unit 28, and the like.
- the spindle motor 22 rotationally drives the optical disc 1 at a constant linear velocity, for example, based on the control by the servo circuit 21.
- the recording Z reproducing head 23 is composed of an optical head that optically scans the information recording surface of the optical disk 1 rotated by the spindle motor 22 on the authentication data recording unit 5, and records the authentication data. Reproduction of the authentication data recorded in the section 5 and recording Z reproduction of the data in the user data section 3 are performed.
- the random pattern information detecting section 24 is composed of a magnetic head that scans the random pattern information recording section 4 of the optical disc 1 that is rotationally driven by the spindle motor 22. Detect information in an analogous manner.
- the random pattern information detecting section 24 supplies the random pattern information detected from the random pattern information recording section 4 to the medium identification information inspection data generating section 25.
- the medium identification information inspection data generator 25 converts the random pattern information detected analogously by the random pattern information detector 24 into digital random pattern information, and converts this into medium identification information inspection data r. 'To the above-mentioned authentication processing unit 26.
- the authentication processing unit 26 performs a process of authenticating that the optical disc 1 is manufactured by a valid manufacturer.
- the authentication processing unit 26 supplies the authentication data w "reproduced from the authentication data recording unit 5 of the optical disc 1 by the recording Z reproduction head 23 through the recording / reproduction unit 27.
- the authentication processing is performed based on the medium identification information inspection data r ′ supplied from the medium identification information generation unit 25 and the authentication data W.
- FIG. 5 shows specific processing contents of the authentication processing unit 26. That is, the authentication processing unit 26 is configured to execute the medium identification information inspection data r 'and and take in the authentication data w ⁇ (step SI 1), first of all, the validity ie trusted revocation re-scan Bok contained in the authentication data w' trustee the authenticity of the digital signature of the center Verification is performed using the public key of the center (step s12).
- the public key of the trusted center is common to the entire system, and is stored in non-volatile memory in the device when the device is manufactured.
- the nonvolatile memory stores a revocation list as shown in FIG.
- step S15 the certificate (Cert) data in the authentication data w is extracted (step S15), and the identification information ID of the manufacturer included in the certificate (Cert) data is stored in the nonvolatile memory. It verifies that it is not on the revocation list (step S16), and verifies that the digital signature of the trusted center included in the certificate (Cert) data is correct (step S1). 7)
- the data m8 and the digital signature data s8 are extracted from the authentication data w (step S18), and the digital signature data s in the authentication data w is the manufacturer's data for the data m ⁇ .
- the correct digital signature is verified using the manufacturer's public key in the certificate (Cert) data (step S19).
- the verification result J2 is regarded as passed (step S20).
- the medium identification information r "and the additional information u are extracted from the authentication data w (step S21).
- the medium identification information r extracted from the authentication data w ⁇ is compared with the medium identification information inspection data r ′ generated by the medium identification information generation unit 25, and is compared with a predetermined error. Is verified (step S22).
- the digital medium identification information inspection data r ' is generated from random pattern information detected as an analog signal, there is a possibility that an error may be included due to some noise, so an allowable error range is provided. . If the random pattern information is configured to be recorded and read out digitally, the allowable error range may not be set.
- step S 2 If this verification is passed, the verification result J 1 is passed (step S 2 3) 0
- the recording medium is determined to be valid, and the recording / reproducing unit 2 determines the medium identification information r ⁇ as the authenticated medium identification information Disc ID. 7 (Step S2 4).
- the nonvolatile memory may store a public key list as shown in FIG.
- the public key list stores the manufacturer's identification information ID and a flag indicating whether the public key and the identification information ID have been revoked.
- the version number of the latest version of the revocation list that has been handled by the device is stored.
- This device is newer than any of the If a valid revocation list is obtained, the revocation flag corresponding to the identification information ID listed in the list is set to YES, that is, revoked.
- the item is newly created and the flag is set to YES.
- the manufacturer's identification information ID is checked, and the item of the identification information ID is listed in the list. If the public key is recorded and the revocation flag is NO, the certificate (Cert) data need not be verified, and the public key recorded in the table is used. If the ID information item is in the table, the flag is NO, and the public key is not recorded, the certificate (Cert) data is verified, and if correct, the public key is stored in the table. .
- the certificate (Cert) data is verified, and if correct, a new item corresponding to the ID information is created and the public key is stored. At this time, the flag is set to NO. Having a public key list in this way often means verifying the certificate (Cert) data most of the time, using media manufactured by the same manufacturer, but most often the second time or later. Can be omitted.
- the operation mode of the recording / playback section 27 is switched by the control section 29 in accordance with a control command input from the input operation section 28.
- the recording / reproducing unit 27 includes an encryption processing unit 30 and a decryption processing unit 40.
- user data input from the outside is encrypted by the encryption processing unit 30.
- the encrypted user data is recorded on the user data section 3 of the optical disk 1 via the recording / reproducing head 23, and in the reproducing mode, the recording / reproducing head 23 is used.
- the encrypted user data reproduced from the user data section 3 of the optical disc 1 is decrypted by the decryption processing section 40 and output to the outside.
- the encryption processing unit 30 includes a Kem generation module 31, a random number generation circuit 32, a Kd encryption Z decryption circuit 33, and a Ks encryption circuit. 3 4 and content data encryption circuit 3 5 etc.
- the Kem generation module 31 receives the master key Km from the Km memory 31A storing the master key Km and the master key Km from the Km memory 31A and has been authenticated from the authentication processing unit 26. And a hash function circuit 31 B to which the medium identification information DiscID is supplied.
- the master key Km is a secret key given when receiving a copyright license.
- the hash function circuit 31B connects the n-bit master key K m and the m-bit medium identification information Disc ID, for example, using the lower bit as the master key K m and identifying the upper bit as the medium identification.
- Information Generate n + m-bit concatenated data (Discid II Km) as DiscID, and generate the concatenated data (Discid II Km) as shown in the following equation (1).
- hash function Apply number H
- K e m H (DiscID
- the hash function circuit 31 B supplies the effective master key Kem generated from the master key Km and the authenticated medium identification information DiscID to the Kd encryption Z decryption circuit 33.
- B means concatenation of data A and data B.
- the hash function can be applied to input data of arbitrary length, for example, 64 bits or 128 bits.
- a function that outputs fixed-length data such as bits.
- the random number generation circuit 32 generates a random number to be used as the sector key K si and the disk key K d, and supplies the sector key K si to the K s decoding circuit 34 and the content data encryption circuit 35. Then, the disk key Kd is supplied to the Kd encryption Z decryption circuit 33 and the Ks encryption circuit 34.
- the Kd encryption Z decryption circuit 33 encrypts the disk key Kd supplied from the random number generation circuit 32 with the effective master key Kem to generate an encrypted disk key EKd.
- the encrypted disk key EK d generated by the K d decoding Z decryption circuit 33 is 0/46804
- the Kd encryption Z decryption circuit 33 decrypts the encrypted disk key EKd reproduced from the lead-iner of the optical disk 1 through the recording Z reproduction head 23 and performs the disk key K Generate d.
- the disk key Kd generated by the Kd encryption Z decryption circuit 33 is supplied to the Ks encryption circuit 35.
- the Ks encryption circuit 34 encrypts the sector key Ksi supplied from the random number generation circuit 32 with the disk key Kd to generate an encrypted sector key EKs.
- the encrypted sector key E Ks generated by the Ks encryption circuit 34 is recorded in the data area of the optical disk 1 via the recording Z playback head 23.
- the content data encryption circuit 35 generates encrypted content data by encrypting the user data supplied as content data from the outside with the sector key K si.
- the encrypted content data generated by the content data encryption circuit 35 is recorded in the data area of the optical disc 1 via the recording Z playback head 23.
- the above i 1, 2,... Indicates the sector number. For simplicity, the sector numbers are omitted in some figures and explanations.
- the decoding processing unit 40 includes a Kem generation module 41, an EK d decoding circuit 43, an EK s decoding circuit 44, a content data decoding circuit 45, and the like, as shown in FIG. Consists of
- the Kem generation module 41 is composed of a Km memory 41 A storing a master key Km which is a secret key given when receiving a copyright license, and a master key Km provided by the Km memory 41 A. And a hash function circuit 41 B for generating an effective master key Chem from the authenticated medium identification information DiscID given by the authentication processing unit 26 by the arithmetic processing shown in the above equation (1). .
- the hash function circuit 41 B supplies the EK d decryption circuit 43 with the effective master key Kem generated from the master key Km and the authenticated medium identification information DiscID.
- the Kem generation module 41 has the same configuration as the Kem generation module 31 of the above-described encryption processing unit 30. .
- the EK d decryption circuit 43 decrypts the encrypted disk key EK d reproduced by the recording / reproducing head 23 from the lead-in area of the optical disk 1 with the effective master key Km and decrypts the disk key. Kd is generated, and the decrypted disk key Kd is supplied to the EKs decryption circuit 44.
- the EKs decryption circuit 44 decrypts the encrypted sector key EKs reproduced by the recording / reproducing head 23 from the data layer of the optical disk 1 with the disk key Kd and converts the sector key Ks.
- the content data decryption circuit 45 decrypts the encrypted content data reproduced by the recording Z reproduction head 23 from the data area of the optical disk 1 with the sector key Ks.
- the control section 29 when a recording mode is set in the control section 29 by inputting a recording command from the input operation section 28, the control section 29
- the recording / reproducing unit 27 is controlled so that the user data is recorded on the optical disc 1 according to the procedure shown in the flowchart of 11.
- the encryption processing unit 30 of the recording Z playback unit 27 is in an operating state, and the Kem generation module 31 of the encryption processing unit 30 is operated by the authentication processing unit 26.
- the master key K m is read from the K m memory 31 A (step S 32), and the medium identification information is read by the hash function circuit 31 B.
- An effective master key Kem is generated from the DiscID and the master key Km (step S33).
- the Kd encryption / decryption circuit 33 determines whether or not the encrypted disk key EKd is recorded in the read window of the optical disk 1 (step S34).
- the Kd encryption Z decryption circuit 33 When the encrypted disk key EK d is not recorded, the Kd encryption Z decryption circuit 33 generates the random number generation circuit 32. For example, a 40-bit random number is set as a disk key K d (step S35), and the disk key K d is encrypted with the effective master key K em to generate an encrypted disk key EK d. The encryption disk key EKd is recorded in the lead-in area of the optical disk 1 (step S36).
- the Kd encryption Z decryption circuit 33 decrypts the encrypted disk key EKd with the effective master key Km to obtain a disk.
- the key Kd is obtained (step S37).
- the Ks encryption circuit 34 sets the 40-bit random number generated by the random number generation circuit 32 as a sector key K si (step S38), and uses this sector key K si as the disk key K d To generate an encrypted sector key EK si and record the encrypted sector key EK si in the sector header (step S39).
- the content data encryption circuit 35 encrypts the user data with the sector key Ksi to generate encrypted content data, and records the encrypted content data in the main data section (step S 40) c
- step S41 determines whether or not all the user data to be recorded has been recorded (step S41), and if there is user data to be recorded, the next The sector is accessed (step S42), and the process returns to step S38 to repeat the processing from step S38 to step S42.
- the recording mode is ended. Also, in the optical disc recording / reproducing apparatus 20, the input operation section
- the control unit 29 When the playback mode is set in the control unit 29 by inputting a recording command from the optical disk 28, the control unit 29 reproduces the user data from the optical disc 1 according to the procedure shown in the flowchart of FIG.
- the recording / reproducing unit 27 is controlled so as to perform the above operation.
- the decryption processing unit 40 of the recording / reproduction unit 27 is in an operating state, and the Kem generation module 41 of the decryption processing unit 40 has been authenticated by the authentication processing unit 26.
- the master key Km is read from the Km memory 41A (step S52), and the medium identification information is read by the hash function circuit 41B.
- An effective master key Kem is generated from the DiscID and the master key Km (step S53).
- the EK d decryption circuit 43 decrypts the encrypted disk key EK d reproduced from the read layer of the optical disk 1 with the effective master key K em to generate a disk key K d ( Step S54).
- the E Ks decryption circuit 44 decrypts the encrypted sector key E Ks i reproduced from the data area of the optical disc 1, and generates a sector key K S i (step S55).
- the content data decryption circuit 45 decrypts the encrypted content data reproduced from the data area of the optical disk 1 with the sector key Ks (step S56). Further, the content data decoding circuit 45 determines whether or not all the content data to be reproduced has been reproduced (step S57). The sector is accessed (step S58), and the process returns to step S25 to repeat the processing from step S55 to step S58.
- the encryption key of the user data that is, the sector key Ks
- the disk key Kd is stored in the optical disk.
- 1 is recorded in the lead-in area as an encrypted disk key EK d encrypted with a progressive master key K em generated based on the medium identification information Disc ID unique to 1 and the master key K m.
- the medium identification information Disc ID is used to perform an authentication processing function for performing authentication processing and a regular reproduction having a master key Km.
- the playback can be performed only by the device, and the playback device that does not have the authentication processing function or the master key Km cannot decrypt and play the user data.
- the data is recorded in the random pattern information recording section 4 of the optical disk 1. Since the random pattern information obtained is based on random physical phenomena, even if the new disc is a regular disc having a random pattern information recording section, the random disc information recording section of the new disc is used to read the optical disc 1 from the random pattern information recording section. The same random pattern information as the random pattern information recorded in the random pattern information recording unit 4 cannot be detected. Therefore, the illegally copied disc will not be played back by the authorized playback device.
- the encryption processing section 30 uses the master key based on the medium identification information Disc ID of the optical disk 1 authenticated by the authentication processing section 26.
- An effective master key K em is generated from K m
- a disk key K d is encrypted with the effective master key K em
- an encryption key used for encrypting the user data that is, a sector key K s is used as the disk key K s
- the user data encrypted with the d and the sector key Ks and the encrypted disk key Kd and the sector key Ks are recorded on the optical disk 1, but the authentication processing unit 26
- the user data may be encrypted based on the medium identification information Disc ID of the optical disk 1 authenticated by the above. For example, as shown in FIG.
- an effective sector key K es is generated from the sector key K s generated as a random number by the random number generation circuit 32 based on the effective master key K em.
- An active sector key generation circuit (Kes generation circuit) 130 is provided.
- the effective sector key generation circuit 130 generated by the effective sector key generation circuit 130 is used. Encrypt user data to encrypt content data / 46804 r
- the decryption processing unit 40 includes an effective sector key generation circuit (which generates an effective sector key K es from the sector key K s based on the effective master key K em).
- a Kes generation circuit is provided, and the encrypted sector key EKs reproduced from the data area of the optical disk 1 by the recording Z reproduction head 23 is transmitted to the disk key by the EKs decryption circuit 44. It decrypts with K d to generate a sector key K s, generates an effective sector key Kes from the sector key K s by the effective sector key generation circuit 140,
- the content data decryption circuit 45 decrypts the encrypted content data using the effective sector key Kes.
- the present invention is applied to the recording / reproducing system using the optical disk 1 having the configuration as shown in FIG. 1, but the card-shaped recording medium 51 as shown in FIG. You may construct the recording Z playback system used.
- the force-type recording medium shown in FIG. 13 is composed of a user data recording section 53 in which user data is recorded, and random pattern information in which random pattern information is recorded by random physical phenomena.
- a recording unit 54, medium identification information generated based on the random pattern information detected from the random pattern information recording unit 54, and a digital signature for each manufacturer for the medium identification information are recorded as authentication data.
- the random pattern information recording section 54 detects random pattern information based on random physical phenomena, generates medium identification information from the random pattern information, and performs authentication from the authentication data recording section 55 on the information recording medium.
- the authentication processing for the information recording medium can be performed based on the medium identification information generated from the random pattern information and the authentication data, and the medium identification information of the information recording medium authenticated by the authentication processing
- the user data is recorded. It is possible to reliably prevent unauthorized copying of the information in Part 53.
- the random pattern information recording of the information recording medium provided with the random pattern information recording unit that records the random pattern information by the random physical phenomenon on the information recording medium Detect random pattern information based on random physical phenomena from the unit, generate medium identification information from the random pattern information, and use the medium identification information as authentication data together with a digital signature for each manufacturer for the medium identification information.
- An information recording medium is provided in which the medium identification information is recorded in the authentication data recording section as authentication data together with a digital signature for each manufacturer for the medium identification information by recording the information in the authentication data recording section on the information recording medium. be able to.
- a random pattern information recording unit that records random pattern information based on random physical phenomena; a medium identification information generated based on the random pattern information detected from the random pattern information recording unit; Authenticate digital signatures of manufacturers for information For an information recording medium having an authentication data recording section stored as data and a user data recording section for recording user data, random pattern information due to a random physical phenomenon is detected from the random pattern information recording section. Generating medium identification information from the random pattern information, reproducing authentication data from an authentication data recording unit on the information recording medium, and generating the medium identification information based on the medium identification information generated from the random pattern information and the authentication data.
- Authentication processing can be performed on the information recording medium, an encryption key is generated from medium identification information of the information recording medium authenticated by the authentication processing, and data obtained by encrypting data using the encryption key is authenticated by the authentication processing. Recording / playback via the user data recording unit on the information recording medium An effective illegal copy protection system can be constructed for the body.
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/647,961 US6999587B1 (en) | 1999-02-08 | 2000-02-07 | Information recording/reproducing system |
EP00902124A EP1069567A1 (en) | 1999-02-08 | 2000-02-07 | Information recording/reproducing system |
JP2000597802A JP4524920B2 (ja) | 1999-02-08 | 2000-02-07 | 情報記録装置、情報再生装置、認証処理装置、情報記録方法、情報再生方法及び認証処理方法 |
US11/325,413 US7761926B2 (en) | 1999-02-08 | 2006-01-05 | Information recording/playback system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP11/30600 | 1999-02-08 | ||
JP3060099 | 1999-02-08 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/647,961 A-371-Of-International US6999587B1 (en) | 1999-02-08 | 2000-02-07 | Information recording/reproducing system |
US11/325,413 Continuation US7761926B2 (en) | 1999-02-08 | 2006-01-05 | Information recording/playback system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000046804A1 true WO2000046804A1 (fr) | 2000-08-10 |
Family
ID=12308369
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2000/000658 WO2000046804A1 (fr) | 1999-02-08 | 2000-02-07 | Systeme d'enregistrement/de reproduction d'informations |
Country Status (4)
Country | Link |
---|---|
US (2) | US6999587B1 (ja) |
EP (1) | EP1069567A1 (ja) |
JP (1) | JP4524920B2 (ja) |
WO (1) | WO2000046804A1 (ja) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002132587A (ja) * | 2000-10-20 | 2002-05-10 | Sony Corp | データ再生装置、データ記録装置、およびデータ再生方法、データ記録方法、並びにプログラム提供媒体 |
JP2003098963A (ja) * | 2001-09-20 | 2003-04-04 | Ricoh Co Ltd | 記録装置及び記憶媒体ユニット |
WO2004084208A1 (ja) * | 2003-03-20 | 2004-09-30 | Sony Corporation | 記録媒体及びその製造方法、再生方法及び再生装置、並びに著作権管理方法 |
JP2007317180A (ja) * | 2006-05-12 | 2007-12-06 | Hitachi Global Storage Technologies Netherlands Bv | ネットワーク検証により認証されるhdd |
US7421078B2 (en) | 2002-01-31 | 2008-09-02 | Fujitsu Limited | Valid medium management system |
JP2010141639A (ja) * | 2008-12-12 | 2010-06-24 | Dainippon Printing Co Ltd | 通信システムおよび通信方法 |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4524920B2 (ja) * | 1999-02-08 | 2010-08-18 | ソニー株式会社 | 情報記録装置、情報再生装置、認証処理装置、情報記録方法、情報再生方法及び認証処理方法 |
US7228425B1 (en) * | 2000-02-07 | 2007-06-05 | Koninklijke Philips Electronics N. V. | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections |
US7987510B2 (en) * | 2001-03-28 | 2011-07-26 | Rovi Solutions Corporation | Self-protecting digital content |
US20020141582A1 (en) * | 2001-03-28 | 2002-10-03 | Kocher Paul C. | Content security layer providing long-term renewable security |
GB2374718A (en) | 2001-04-11 | 2002-10-23 | Hewlett Packard Co | Data authentication |
JP4064647B2 (ja) * | 2001-08-24 | 2008-03-19 | 富士通株式会社 | 情報処理装置及び入力操作装置 |
US20050084645A1 (en) * | 2002-02-07 | 2005-04-21 | Selinfreund Richard H. | Method and system for optical disc copy-protection |
KR20040108774A (ko) * | 2002-05-09 | 2004-12-24 | 마츠시타 덴끼 산교 가부시키가이샤 | 인증 통신시스템, 인증 통신장치 및 인증 통신방법 |
KR100915875B1 (ko) * | 2002-06-05 | 2009-09-07 | 엘지전자 주식회사 | 고밀도 재생 전용 광디스크와, 그 광디스크의 암호화 기록및 재생방법 |
CA2497645A1 (en) * | 2002-09-26 | 2004-04-08 | Verification Technologies, Inc. | Authentication of items using transient optical state change materials |
US20060203700A1 (en) * | 2003-02-06 | 2006-09-14 | Verification Technologies, Inc. | Method and system for optical disk copy-protection |
KR20040092649A (ko) * | 2003-04-24 | 2004-11-04 | 엘지전자 주식회사 | 광디스크의 복사 방지 정보 관리방법 |
KR100972831B1 (ko) * | 2003-04-24 | 2010-07-28 | 엘지전자 주식회사 | 엔크립트된 데이터의 보호방법 및 그 재생장치 |
KR100974448B1 (ko) * | 2003-04-24 | 2010-08-10 | 엘지전자 주식회사 | 광디스크의 복사 방지 정보 관리방법 |
US20050234949A1 (en) * | 2003-04-30 | 2005-10-20 | Sony Corporation | Data processing method, program thereof, device thereof, and recording medium |
CN100356391C (zh) * | 2003-05-21 | 2007-12-19 | 皇家飞利浦电子股份有限公司 | 验证身份的方法、识别设备和读/写设备 |
KR101081729B1 (ko) | 2003-07-07 | 2011-11-08 | 로비 솔루션스 코포레이션 | 저작권 침해를 제어하고 쌍방향 컨텐츠를 인에이블시키기 위한 재프로그램가능한 보안 |
JP4110414B2 (ja) * | 2004-12-03 | 2008-07-02 | ソニー株式会社 | 情報再生装置及び情報記録再生装置 |
US20090276635A1 (en) * | 2004-12-13 | 2009-11-05 | Koninklijke Philips Electronics, N.V. | Controlling distribution and use of digital works |
US8306918B2 (en) | 2005-10-11 | 2012-11-06 | Apple Inc. | Use of media storage structure with multiple pieces of content in a content-distribution system |
JP2008059561A (ja) * | 2006-08-04 | 2008-03-13 | Canon Inc | 情報処理装置、データ処理装置、および、それらの方法 |
JP2008131557A (ja) * | 2006-11-24 | 2008-06-05 | Matsushita Electric Ind Co Ltd | 映像音声出力機器、認証処理方法及び映像音声処理システム |
KR20080067075A (ko) * | 2007-01-15 | 2008-07-18 | 주식회사 히타치엘지 데이터 스토리지 코리아 | 광디스크의 암호화 데이터 기록 및 재생방법 |
US9311492B2 (en) | 2007-05-22 | 2016-04-12 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US8347098B2 (en) * | 2007-05-22 | 2013-01-01 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
CN101978378A (zh) * | 2008-03-25 | 2011-02-16 | 罗伯特·博世有限公司 | 用于对记录装置进行认证的方法 |
EP2330533B1 (en) * | 2008-09-24 | 2021-02-17 | Panasonic Intellectual Property Management Co., Ltd. | Recording/reproducing system, recording medium device, and recording/reproducing device |
JP5899751B2 (ja) * | 2011-09-28 | 2016-04-06 | ソニー株式会社 | 情報処理装置、および情報処理方法、並びにプログラム |
US20130290360A1 (en) * | 2012-04-30 | 2013-10-31 | John Cunningham | Consumable identifier |
CN102929806B (zh) * | 2012-10-24 | 2015-09-09 | 威盛电子股份有限公司 | 适用于存储装置的编码操作的进度记录方法和恢复方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07182766A (ja) * | 1993-11-10 | 1995-07-21 | Matsushita Electric Ind Co Ltd | ディジタル情報伝送方式 |
JPH1021144A (ja) * | 1996-07-03 | 1998-01-23 | Hitachi Ltd | ディジタル著作物配布システム及び不正な複製物の検出方法 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4734796A (en) * | 1983-04-14 | 1988-03-29 | Amiram Grynberg | Technique for preventing unauthorized copying of information recorded on a recording medium and a protected recording medium |
US4584641A (en) * | 1983-08-29 | 1986-04-22 | Paul Guglielmino | Copyprotecting system for software protection |
US4577289A (en) * | 1983-12-30 | 1986-03-18 | International Business Machines Corporation | Hardware key-on-disk system for copy-protecting magnetic storage media |
US4849836A (en) * | 1985-06-07 | 1989-07-18 | Software Heaven, Inc. | Copy protection for computer discs |
DE69233335T2 (de) * | 1991-12-02 | 2005-02-10 | Koninklijke Philips Electronics N.V. | Geschlossenes Informationssystem mit Kopierschutz |
US5400319A (en) * | 1993-10-06 | 1995-03-21 | Digital Audio Disc Corporation | CD-ROM with machine-readable I.D. code |
JPH0836747A (ja) * | 1994-07-26 | 1996-02-06 | Kyodo Printing Co Ltd | 磁気記録媒体 |
JPH08339629A (ja) * | 1995-06-12 | 1996-12-24 | Matsushita Electric Ind Co Ltd | 不正コピー防止装置、記録装置、再生装置および記録媒体 |
JP4023849B2 (ja) * | 1995-06-30 | 2007-12-19 | ソニー株式会社 | データ記録方法及び装置、並びにデータ再生方法及び装置 |
JP3796772B2 (ja) * | 1995-08-11 | 2006-07-12 | ソニー株式会社 | データ処理方法、データ記録装置及びデータ再生装置 |
DE69610860T2 (de) * | 1995-10-09 | 2001-03-15 | Matsushita Electric Ind Co Ltd | Optische Scheibe die Information in der Form eines Strichkodes trägt |
JPH10233019A (ja) * | 1996-01-22 | 1998-09-02 | Matsushita Electric Ind Co Ltd | 光ディスク、光ディスク製造装置、光ディスク再生装置 |
JPH106673A (ja) * | 1996-06-21 | 1998-01-13 | Japan Exlan Co Ltd | 真正さがチェックされる被検出物とその製造方法 |
SE514352C2 (sv) | 1996-07-05 | 2001-02-12 | Ifunga Test Equipment Bv | Sätt att förse en optisk databärare med identitetsinformation |
JPH1079119A (ja) * | 1996-09-03 | 1998-03-24 | Toyobo Co Ltd | 磁気記録カード用基材および磁気記録カード |
JP3741236B2 (ja) * | 1996-09-27 | 2006-02-01 | 日本ビクター株式会社 | 光ディスク及びその再生装置 |
JPH10336172A (ja) * | 1997-06-04 | 1998-12-18 | Kyushu Syst Joho Gijutsu Kenkyusho | 電子認証用公開鍵の管理方法 |
JPH117412A (ja) | 1997-06-18 | 1999-01-12 | Oputoromu:Kk | 電子回路を有する記憶媒体とその管理方法 |
JP4496440B2 (ja) * | 1998-01-12 | 2010-07-07 | ソニー株式会社 | 暗号化コンテンツ送信装置 |
JP4524920B2 (ja) * | 1999-02-08 | 2010-08-18 | ソニー株式会社 | 情報記録装置、情報再生装置、認証処理装置、情報記録方法、情報再生方法及び認証処理方法 |
-
2000
- 2000-02-07 JP JP2000597802A patent/JP4524920B2/ja not_active Expired - Fee Related
- 2000-02-07 EP EP00902124A patent/EP1069567A1/en not_active Withdrawn
- 2000-02-07 WO PCT/JP2000/000658 patent/WO2000046804A1/ja not_active Application Discontinuation
- 2000-02-07 US US09/647,961 patent/US6999587B1/en not_active Expired - Fee Related
-
2006
- 2006-01-05 US US11/325,413 patent/US7761926B2/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07182766A (ja) * | 1993-11-10 | 1995-07-21 | Matsushita Electric Ind Co Ltd | ディジタル情報伝送方式 |
JPH1021144A (ja) * | 1996-07-03 | 1998-01-23 | Hitachi Ltd | ディジタル著作物配布システム及び不正な複製物の検出方法 |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002132587A (ja) * | 2000-10-20 | 2002-05-10 | Sony Corp | データ再生装置、データ記録装置、およびデータ再生方法、データ記録方法、並びにプログラム提供媒体 |
JP4674396B2 (ja) * | 2000-10-20 | 2011-04-20 | ソニー株式会社 | データ再生装置、データ記録装置、およびデータ再生方法、データ記録方法、並びにプログラム提供媒体 |
JP2003098963A (ja) * | 2001-09-20 | 2003-04-04 | Ricoh Co Ltd | 記録装置及び記憶媒体ユニット |
US7421078B2 (en) | 2002-01-31 | 2008-09-02 | Fujitsu Limited | Valid medium management system |
WO2004084208A1 (ja) * | 2003-03-20 | 2004-09-30 | Sony Corporation | 記録媒体及びその製造方法、再生方法及び再生装置、並びに著作権管理方法 |
JP2007317180A (ja) * | 2006-05-12 | 2007-12-06 | Hitachi Global Storage Technologies Netherlands Bv | ネットワーク検証により認証されるhdd |
JP2010141639A (ja) * | 2008-12-12 | 2010-06-24 | Dainippon Printing Co Ltd | 通信システムおよび通信方法 |
Also Published As
Publication number | Publication date |
---|---|
US7761926B2 (en) | 2010-07-20 |
US6999587B1 (en) | 2006-02-14 |
US20060120237A1 (en) | 2006-06-08 |
JP4524920B2 (ja) | 2010-08-18 |
EP1069567A1 (en) | 2001-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4524920B2 (ja) | 情報記録装置、情報再生装置、認証処理装置、情報記録方法、情報再生方法及び認証処理方法 | |
KR101017002B1 (ko) | 상호 인증 방법, 기록 매체, 신호 처리 시스템, 재생 장치 및 정보 처리 장치 | |
JP5269145B2 (ja) | ユーザキーを利用した記録媒体のディスク使用制限方法及び装置 | |
JP2002215465A (ja) | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム記憶媒体 | |
JP2000076141A (ja) | コピ―防止装置および方法 | |
EA004199B1 (ru) | Носитель данных с возможностью записи информации, имеющий участок защищенных данных | |
AU2707401A (en) | Data authentication system | |
US20090276635A1 (en) | Controlling distribution and use of digital works | |
JPWO2004064314A1 (ja) | 信号処理システム | |
CN1175413C (zh) | 用于提供或录放内容资料的方法和设备 | |
JP4314713B2 (ja) | データ記録方法及び装置、データ再生方法及び装置、並びにデータ記録再生システム | |
JPH11224461A (ja) | 情報処理装置、情報処理方法、提供媒体、および記録媒体 | |
WO2003088055A1 (fr) | Procede de traitement de donnees de contenu, dispositif d'enregistrement et dispositif de reproduction | |
JP4062842B2 (ja) | 記録装置及び方法、再生装置及び方法並びに記録媒体 | |
JP4461183B2 (ja) | 情報記録媒体、再生装置 | |
WO2003081587A1 (fr) | Support d'enregistrement inscriptible, procede d'enregistrement de donnees d'identification, dispositif d'enregistrement de donnees, procede de reproduction de donnees d'identification et dispositif de reproduction de donnees | |
US20050141011A1 (en) | Apparatus and method for recording data on and reproducing data from storage medium | |
JP4284925B2 (ja) | 記録装置、リストア方法、プログラム、記録媒体 | |
JP2000242563A (ja) | 記録媒体及び記録再生装置 | |
CN100382156C (zh) | 用于管理记录介质的复制保护信息的方法 | |
JP2000231760A (ja) | 情報記録装置および方法、情報再生装置および方法、並びに記録媒体 | |
JP2001155421A (ja) | 記録装置、記録方法、再生装置、再生方法及び記録媒体 | |
US20070118765A1 (en) | Method and system of decrypting disc | |
JP2000242564A (ja) | 記録媒体及び記録再生装置 | |
JP2007142810A (ja) | データ記録システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000902124 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09647961 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2000902124 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000902124 Country of ref document: EP |