WO2001069842A1 - Dispositif de reproduction de contenus - Google Patents

Dispositif de reproduction de contenus Download PDF

Info

Publication number
WO2001069842A1
WO2001069842A1 PCT/JP2001/002003 JP0102003W WO0169842A1 WO 2001069842 A1 WO2001069842 A1 WO 2001069842A1 JP 0102003 W JP0102003 W JP 0102003W WO 0169842 A1 WO0169842 A1 WO 0169842A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
key
encrypted
data
calculation function
Prior art date
Application number
PCT/JP2001/002003
Other languages
English (en)
Japanese (ja)
Inventor
Takashi Tsunehiro
Kunihiro Katayama
Nagamasa Mizushima
Takashi Totsuka
Hiroyuki Mano
Kazuo Nakamura
Shigeo Todoroki
Toshiaki Hioki
Takahisa Hatakeyama
Original Assignee
Hitachi,Ltd.
Nippon Columbia Co.,Ltd.
Sanyo Electric Co.,Ltd.
Fujitsu Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi,Ltd., Nippon Columbia Co.,Ltd., Sanyo Electric Co.,Ltd., Fujitsu Limited filed Critical Hitachi,Ltd.
Priority to AU2001241131A priority Critical patent/AU2001241131A1/en
Publication of WO2001069842A1 publication Critical patent/WO2001069842A1/fr

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00137Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users

Definitions

  • the present invention relates to a technology for permitting only a rightful person to reproduce content data such as audio data and video data, and in particular, can reproduce a large amount of content data.
  • the present invention relates to technology suitable for a simple stationary content reproducing apparatus.
  • BACKGROUND ART In recent years, attempts have been made to distribute content data such as audio data and video data via a network. For example, a dedicated memory card is prepared, attached to a dedicated terminal installed at a store, etc., and the desired content data is downloaded to the memory card using an online system. Alternatively, a dedicated memory card is attached to a personal terminal such as a mobile phone, and the content is delivered from the content distribution center to the memory card using the Internet.
  • the memory card storing the content data is attached to a dedicated playback device and played back.
  • a system comprising the above-mentioned dedicated memory force and a playback device
  • content can be easily copied, it is necessary to protect the content creator by providing a copy protection function on a dedicated memory card for storing the content. .
  • a memory card cannot store a large amount of content overnight because of its limited capacity.
  • users may want to keep a collection of content that is not currently being used.
  • the memory card is provided with a copy protection function, the user must purchase a new memory card every time the memory card becomes full of content data, which imposes an economic burden. large.
  • the user when the user wants to play back the content data stored as a collection, the user finds a memory card storing the content data to be played from a large number of memory cards, and uses a dedicated playback device. Must be attached to Each time the memory card storing the content to be played changes, the memory card attached to the playback device must be changed.
  • Such a system consisting of a memory card with a copy protection function and a playback device is suitable for portable use, but for example, a stationary type that can enjoy content playback overnight at home. Not suitable for
  • the present invention has been made in view of the above circumstances, and an object of the present invention is to provide a method for reproducing a large amount of content data without exchanging a memory card while protecting the content creator. Is to do.
  • the content reproducing apparatus of the present invention reproduces content data encrypted with a different key for each content or each group of the data.
  • the key for decrypting the encrypted content data which is prepared for each content data group or the data group, is a content storage for storing the encrypted content data. It is stored in storage means with a calculation function provided separately from the means.
  • the key storage unit with the calculation function has an authentication unit for authenticating the communication partner, and performs encryption communication when the reproduction unit of the content reproduction device is authenticated as the communication partner by the authentication unit.
  • the key corresponding to the encrypted content to be reproduced is transmitted to the reproducing means by using the key.
  • the reproducing means uses the encrypted content data to be reproduced, read from the content storing means, by using a key transmitted from the key storing means with calculation function using cryptographic communication. Decrypt and play.
  • the content data stored in the content storage means is encrypted, it cannot be decrypted and reproduced without the corresponding key. Therefore, it is not necessary to provide a special function such as a copy protection function in the content storage means, so that a large-capacity hard disk device or the like which is generally commercially available can be used as the content storage means. For this reason, a large amount of content data can be stored.
  • the content storage means since a corresponding key is required to decrypt the content data stored in the content storage means, if the key is not stored in the key storage unit with a calculation function, the content data is not stored. Cannot be played. Therefore, only the rightful right holder (the person who has the corresponding key) can be permitted to reproduce the content data overnight, and the content creator can be protected.
  • the decryption of the encrypted content data is performed by the reproducing means for reproducing the content data.
  • the key storage unit with the calculation function when authenticating that the transmission destination of the key is the reproduction unit, sends the key to the reproduction unit using encrypted communication.
  • the size of the key for decrypting the encrypted content data is significantly smaller than the size of the key of the encrypted content data.
  • FIG. 1 is a diagram showing a schematic configuration of a content reproducing apparatus to which one embodiment of the present invention is applied.
  • FIG. 2 is a diagram showing a schematic configuration of the key storage device 14 shown in FIG.
  • FIG. 3 is a diagram showing a schematic configuration of the audio reproducing device 18 shown in FIG.
  • FIG. 4 is a diagram showing a schematic configuration of the video playback device 19 shown in FIG.
  • FIG. 5 is a diagram showing an example of an overview of a content reproducing apparatus to which an embodiment of the present invention has been applied.
  • FIG. 6 is a flowchart for explaining the playback operation of the content playback device to which the first embodiment of the present invention has been applied.
  • FIG. 7 is a sequence diagram for explaining an example of data exchange between the key storage dedicated device 14 and the audio playback device 18 / video playback device 19 in the flow shown in FIG.
  • FIG. 8 is a flow chart for explaining an operation when a license key is obtained from the memory card 30 connected to the content reproduction device to which the first embodiment of the present invention is applied. .
  • FIG. 9 is a sequence diagram for explaining an example of a data exchange between the dedicated key storage device 14 and the memory card 30 in the flow shown in FIG.
  • FIG. 10 shows an operation when the license key is transferred from the key storage device 14 of the content reproduction device to which the embodiment of the present invention is applied to the memory card 30 connected to the content reproduction device. It is a flow diagram for explanation. BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, one embodiment of the present invention will be described.
  • FIG. 1 is a diagram showing a schematic configuration of a content reproducing apparatus to which an embodiment of the present invention is applied.
  • CPU 11 comprehensively controls each section of the content reproducing apparatus.
  • the memory 12 is composed of ROM and RAM.
  • R ⁇ M stores a program for the CPU 11 to control each part of the content reproducing apparatus in an integrated manner.
  • the RAM functions as a work area for the CPU 11.
  • the content storage device 13 is composed of a large-capacity storage device such as a hard disk device, for example, and content such as encrypted audio data and video data is associated with the content name. Stored.
  • the dedicated key storage device 14 is an encrypted content prepared for each content. Stores a key (hereinafter referred to as license key) for decrypting content.
  • the communication device 15 is connected to a mobile phone or a stationary phone, and distributes, for example, encrypted content data and a license key via a network such as an online system or the Internet. It is used to access a content distribution center (not shown) and obtain an encrypted content data license key.
  • the input device 16 is composed of, for example, various buttons and a touch panel, and receives a reproduction instruction from a user, an instruction to obtain content data, and a license key.
  • the display device 17 is composed of, for example, a liquid crystal panel, and displays a list of the content names of the encrypted content data stored in the content storage device 13 and encrypts the playback target. Displays the content name of the content data.
  • the audio reproducing device 18 reads out the encrypted audio data to be reproduced from the content storage device 13 and decrypts and reproduces it using the corresponding license key to obtain an audio signal. Then, the video playback device 19 outputs the audio signal to a stereo connected to the content playback device. The video playback device 19 reads the encrypted video data to be played back from the content storage device 13 and outputs the read video signal. The video signal is obtained by decrypting and reproducing using the license key corresponding to. Then, the video signal is output to a monitor connected to the content reproducing apparatus.
  • the card connection device 20 connects the memory card 30 and obtains an encrypted content data or a license key from the memory card 30.
  • the memory card 20 is encrypted. Or send encrypted content data or license keys.
  • the interface 21 controls transmission and reception of data between the CPU 11 and the memory 12 and other devices constituting the content reproducing apparatus.
  • the key storage dedicated device 14 the audio playback device 18 and the video playback device 19 will be described in further detail.
  • FIG. 2 is a diagram showing a schematic configuration of the key storage dedicated device 14.
  • the key storage device 14 is composed of CPU 14 1 and memory 1
  • a flash memory 144 for transmitting and receiving data to and from each section of the content reproducing apparatus via the interface 21.
  • the CPU 141 controls the components of the key storage device 14 in an integrated manner. Further, the CPU 141 has an authentication function and an encryption / decryption function.
  • the memory 144 is composed of ROM and RAM.
  • the ROM stores a program for the CPU 141 to control each part of the dedicated key storage device 14 as a whole, and a program for implementing the authentication function and the encryption / decryption function.
  • the RAM functions as a work area of the CPU 141.
  • the license key is stored in the flash memory 144 in association with the content name of the content to be decrypted.
  • the license key should be stored in a so-called tamper resistant area (TRM: Tamper Resistant Module) in order to strengthen security.
  • TRM Tamper Resistant Module
  • Each part constituting the dedicated key storage device 14 shown in FIG. 2 may be built on one chip, for example, or may be made up of a plurality of chips. When using multiple chips, the key storage It is preferable to take measures to prevent a signal between chips from being stolen from the outside of the device 14.
  • FIG. 3 is a diagram showing a schematic configuration of the audio reproducing device 18.
  • the audio playback device 18 transmits and receives data to and from each section of the content playback device via an encryption / decryption circuit 181, a decoder circuit 182, and an interface 21. And an I / O circuit 184 for performing the operation.
  • the encryption / decryption circuit 18 1 obtains the license key corresponding to the encrypted audio data to be reproduced from the key storage device 14, and uses this key to generate the content storage device 1. Decrypt the encrypted audio data to be reproduced read from step 3.
  • the decoder circuit 182 expands the audio data decoded by the decoding circuit 181 as necessary and reproduces the audio data to obtain an audio signal. Then, the audio signal is output to stereo.
  • FIG. 4 is a diagram showing a schematic configuration of the video playback device 19.
  • the video playback device 19 reproduces the present content via a decoding circuit 191, a decoder circuit 1992, a frame buffer 1993, and an interface 21. It has a 1/0 circuit 194 for transmitting and receiving data to and from each part of the device.
  • the encryption / decryption circuit 191 obtains the license key corresponding to the encrypted video data to be reproduced from the key storage device 14 and uses this key to transmit the license key from the content storage device 13. It decrypts the read encrypted video data to be reproduced.
  • the decoder circuit 182 uses the frame buffer 193 to expand and reproduce the video data decoded by the encryption / decryption circuit 181 as necessary, and reproduce the video signal. obtain. And the video signal Output to monitor.
  • the schematic configuration of the memory card 30 is the same as the key storage device 14 shown in FIG.
  • the memory card 30 stores not only the license key but also the encrypted content. That is, the memory card 30 is mounted on a dedicated terminal installed in, for example, a store, and allows a user to use an online system to obtain a desired encrypted content and its license key. The user obtains or encrypts the desired encrypted content data and its license key from the content distribution center by using the Internet or by attaching it to a personal terminal such as a mobile phone. Or it can be used to obtain it.
  • FIG. 5 shows an example of an overview of a content reproducing apparatus to which the present embodiment is applied.
  • the content reproducing apparatus has a stationary shape suitable for enjoying content at home.
  • reference numeral 41 denotes a play button, a stop button, a play content selection button, and the writing of content data and a license key to the content storage device 13 and the key storage device 14, and a card connection device 30.
  • An operation panel including various setting buttons for moving to a memory card 20 connected to the PC.
  • Reference numeral 42 denotes a receiving unit for receiving an instruction from a remote controller 50 having the same various buttons as the operation panel 41.
  • Reference numeral 43 denotes a display panel, which displays a list of content names of the content stored in the content storage device 13 and a content name of the encrypted content to be reproduced. Or display.
  • Reference numeral 44 denotes a slot for mounting the memory card 30.
  • a monitor 51 and a stereo Terminals are provided for connecting the phone 52, the mobile phone 53 or the phone.
  • FIG. 6 is a flow chart for explaining a reproducing operation of the content reproducing apparatus to which the present embodiment is applied. This flow is, for example, when the user uses the input device 16 to display a list of the content names of the content data stored in the content storage device 13 displayed on the display device 17. It starts when the user selects the content to be played and inputs the playback instruction.
  • the CPU 11 reproduces the content reproduction instruction received from the user via the input device 16 and reproduces the type of the content data (audio data / video data).
  • the data is transmitted to the audio reproducing device 18 / video reproducing device 19 (S1001).
  • the audio decryption circuit 18 1/19 1 of the audio playback device 18 / video playback device 19 which receives the playback instruction from the CPU 11 1 sends its own authentication data and the encrypted content to be played back.
  • a license key transmission instruction including the identification information (for example, the name of the content) for reproducing the content is transmitted to the key storage device 14 (S1002).
  • the CPU 14 1 of the key storage dedicated device 14 When receiving the license key transmission instruction for reproducing the content data, the CPU 14 1 of the key storage dedicated device 14 performs verification using the authentication data included in the instruction (S 1003). ). For example, it is checked whether or not the authentication data indicates that the device is a video / video playback device registered in the dedicated key storage device 14 in advance. If it is authenticated that the transmission source of the instruction is the audio playback device 18 / video playback device 19 (in the case of Yes in S104), the identification information included in the instruction is used. It is checked whether or not the license key for the identified content is stored in the flash memory 144 (S1005). If the license key is stored (Yes in S106), the license key is read out from the flash memory 144, and the audio playback device 1 which is the transmission source of the instruction is transmitted using encrypted communication. 8 / Send to the video playback device 19 (S1008).
  • the CPU 14 of the key storage device 14 informs the CPU 11 accordingly. In response, the CPU 11 performs a predetermined error process such as displaying an error on the display device 17 (S1007).
  • the encryption / decryption circuit 18 1/19 1 of the audio playback device 18 / video playback device 19 which has transmitted the license key transmission instruction for content data playback receives a license from the key storage dedicated device 14.
  • the encrypted content data to be reproduced is read out from the content storage device 13 (S109). Then, it is decrypted with the license key and passed to the decoder circuit 182/192.
  • the decoder circuit 18 2/19 2 expands the content data received from the encryption / decryption circuit 18 1/19 1 as necessary, reproduces it to obtain audio / video data, and sends it to the stereo / monitor. Output (S1010).
  • FIG. 7 is a sequence diagram for explaining an example of data exchange between the key storage dedicated device 14 and the audio playback device 18 / video playback device 19 in the flow shown in FIG.
  • the decryption circuit 18 1/191 of the audio playback device 18 / video playback device 19 determines its own authentication data and the encrypted content to be played back in S102 of FIG. Evening identification information and the media class secret key K PMC and the media class public key K paired in advance.
  • a license key transmission instruction including the MC is created and transmitted to the key storage dedicated device 14 (T1001).
  • the CPU 14 1 of the key storage device 14 authenticates the audio playback device 18 and the video playback device 19 in S 1004 to S 1007 in FIG. It is confirmed that the requested license key is stored in the memory 143 (T1002). Then, the CPU 14 1 generates a session key K S1 (T 1003) , encrypts this with the media class public key K QMC included in the license key transmission instruction, and To the audio playback device 18 / video playback device 19, which is the source of the transmission (T1004).
  • the encryption / decryption circuit 18 1/191 of the audio playback device 18 / video playback device 19 has a media class that holds the encrypted session key K S1 in advance. Decryption is performed using the secret key K PMC to obtain a session key K S1 (T1005). Then, a random number K S2 is generated (T 1 0 6), encrypted with the session key K S 1 , and transmitted to the key storage device 14 (T 1 0 7) o
  • FIG. 8 is a flowchart for explaining the operation when the license key is obtained from the memory card 30 connected to the content reproduction apparatus to which the present embodiment is applied. This flow is performed, for example, in a state where the memory card 30 is attached to the present content reproducing apparatus, and the user uses the input device 16.
  • the memory card 30 displayed on the display device 17 is stored in the memory card 30. It is started when the user selects the content corresponding to the license key to be obtained from the list of content names corresponding to the license key in question, and inputs a license key acquisition instruction.
  • the CPU 11 upon receiving a license key acquisition instruction from the user via the input device 16, the CPU 11 transmits the fact to the key storage device 14 (S 200 1) o
  • the CPU 14 of the dedicated key storage device 14 that has received the license key acquisition instruction from the CPU 11 transmits its own authentication data and identification information of the license key to be obtained (for example, content that can be decrypted with the key). ) Is transmitted to the memory card 30 connected to the card connection device 20 (S2002).
  • the CPU of the memory card 30 Upon receiving the license key transmission instruction for obtaining the license key, the CPU of the memory card 30 performs verification using the authentication data included in the instruction (S2003). For example, it is checked whether or not the authentication data indicates that it is a key storage device registered in the memory card 30 in advance. Then, the transmission source of the instruction is the key storage dedicated device 14. (In the case of Yes in S204), it is determined whether the license key specified by the identification information included in the instruction is stored in the memory card 30 or not. Examine (S205). If it is stored (Yes in S2006), the license key is read out and transmitted to the dedicated key storage device 14 which is the transmission source of the instruction using the encrypted communication (S2 0 0 8). Then, the transmitted license key is erased from the memory card 30 (S209).
  • the CPU with memory card 30 informs CPU] 1.
  • the CPU 11 performs predetermined error processing such as displaying an error on the display device 17 (S207).
  • the CPU 14 1 of the key storage device 14 that has transmitted the license key transmission instruction for obtaining the license key receives the license key from the memory card 30 connected to the card connection device 20.
  • This is stored in the flash memory 144 in association with, for example, the content name of the content data that can be decrypted with the key (S210).
  • FIG. 9 is a sequence diagram for explaining an example of data exchange between the key storage dedicated device 14 and the memory card 30 in the flow shown in FIG.
  • the CPU 141 of the key storage device 14 determines its own authentication data, the identification information of the license key to be obtained, and the media class secret key K ′ held in advance.
  • a license key transmission instruction including the MC is created, and this is transmitted to the memory card 30 (T2001).
  • the CPU of the memory card 30 is required to authenticate the key storage device 14 and to request the memory card 30 from S204 to S207 in FIG. Confirm that the license key is stored (T202). Then, the CPU of the memory card 30 generates a session key K sl (T 203 ), and encrypts it with the media class public key K ′ 0MC included in the license key transmission instruction. It is transmitted to the key storage device 14 which is the transmission source of the instruction (T20004).
  • the CPU 14 1 of the key storage device 14 decrypts the encrypted session key K s i with the media class secret key K ′ P M c that holds the session key K s i in advance. Obtain the key K S 1 (T 2 0 5). Then, a random number K S 2 is generated (T 2 0 6), and this is stored in a session with a previously stored media unique private key ⁇ , ⁇ ⁇ and a pair of media unique public key ⁇ ′ 0 ⁇ . The data is encrypted with the key K S1 and transmitted to the memory card 30 (T207).
  • the memory card 3 0 of the CPU the encrypted random number K S 2 and media-specific public key K '0M, decrypted by session key K S 1, the random number K S2 and media-specific Obtain the public key K'0M ( T2008 ). Then, 'encrypted with 0MC, further this random number K' the license key K c which is requested to send media ⁇ unique public key K encrypted with S2, the key storage that is the source of the license key transmission instruction The data is transmitted to the dedicated device 14 (T209).
  • the CPU 14 1 of the key storage dedicated device 14 decrypts the encrypted license key Kc using the random number K S 2 and the media-specific secret key K ′ PM , and obtains the license key K c Get (T2 0 10).
  • FIG. 10 shows an operation when the memory card 30 connected to the content playback device is moved from the key storage device 14 of the content playback device to which the present embodiment is applied. It is a flowchart for the description. This flow is, for example, a key storage device that is displayed on the display device 17 by the user using the input device 16 in a state where the memory card 30 is mounted on the content reproducing device. Start by selecting the content corresponding to the license key to be moved from the list of content names corresponding to the license key stored in 14 and inputting the license key transfer instruction. When receiving the license key movement instruction from the user via the input device 16, the CPU 11 transmits the effect to the memory card 30 (S 3001).
  • the CPU of the memory card 30 that has received the license key transfer instruction from the CPU 11 transmits its own authentication data and the identification information of the license key to be moved (for example, the content of the content that can be decrypted with the key).
  • a license key transmission instruction for moving the license key including the name is transmitted to the key storage dedicated device 14 (S3002).
  • the CPU 1441 of the key storage device 14 Upon receiving the license key transmission instruction for moving the license key, the CPU 1441 of the key storage device 14 performs verification using the authentication data included in the instruction (S3003). ). For example, it is determined whether or not the authentication data indicates that the memory card 30 is registered in the dedicated key storage device 14 in advance. Then, if it is authenticated that the transmission source of the instruction is the memory card 30 (in the case of Yes in S304), the license specified by the identification information included in the instruction Key is a flash memo It is checked whether it is stored in the memory 144 (S 305). If it is stored (Yes in S3006), the license key is read out. It is transmitted to the memory card 30 that is the transmission source of the instruction by using cryptographic communication (S 3 0 8). Then, the transmitted license key is deleted from the flash memory 144 (S3009).
  • the sender of the instruction cannot be authenticated to be the memory card 30 in S 304, and the desired license key is stored in the flash memory 144 in S 300 6 If not, the CPU 14 1 of the key storage device 14 informs the CPU 11 accordingly. In response to this, the CPU 11 performs predetermined error processing such as displaying an error on the display device 17 (S3007).
  • the CPU of the memory card 30 that has transmitted the license key transmission instruction for moving the license key receives the license key from the key storage device 14, the CPU that can decrypt the license key with the key, for example. It is stored in the memory card 30 in association with the content name of the content data (S31010).
  • This data exchange is the exchange of the operations of the key storage device 14 and the memory card 30 in the sequence diagram shown in FIG.
  • a content delivery center (not shown) is connected via an online system or a network such as an internet connection.
  • the operation of obtaining a license key may be the same as a general download over the network. However, only those who have legitimate rights can obtain the license key.
  • the download of content data to the content storage device 13 may be performed by, for example, copying the content stored in the memory card 30 and storing it in the content storage device 13.
  • a mobile phone / stationary phone connected to the communication device 15 to access the content via a network such as an online system or Internet connection. It may be obtained from a distribution center (not shown) and stored in the content storage device 13. In any case, the content is encrypted and cannot be decrypted or played without a corresponding license key.
  • the content stored in the content storage device 13 since the content stored in the content storage device 13 is encrypted, it cannot be decrypted and reproduced without the corresponding license key. Therefore, it is not necessary to provide a special function such as a copy protection function in the content storage device 13, and a generally available large-capacity hard disk device or the like can be used as the content storage device 13. . Therefore, it is possible to store a large amount of content overnight.
  • the license key since a corresponding license key is required to decrypt the content data stored in the content storage device 13, the license key must be stored in the key storage device 14. The content day cannot be played. Therefore, it is possible to permit only a rightful right holder (a person who has a corresponding license key) to reproduce the content data overnight, thereby protecting content authors and the like. Further, in the present embodiment, the decryption of the encrypted content data is performed by the audio playback device 18 / video playback device 19 for playing back the content overnight. Then, if the key storage dedicated device 14 authenticates that the license key transmission destination is the audio playback device 18 / video playback device 1, the key storage dedicated device 14 uses the encryption key to transmit the license key using encryption communication. Video playback device 18 / video playback device 19. By doing so, the possibility of the license key leaking to the outside can be further reduced, and the security can be improved.
  • the key storage device 14 deletes the transmitted license key from the stored contents of the key storage device 14. I am trying to do it. That is, the key storage device 14 is provided with a license key copy protection function. In this way, the likelihood of unauthorized copying of the license key can be reduced.
  • the key data size is significantly smaller than the data size of the encrypted content data. Therefore, even when the storage unit of the key storage device 14 is constituted by the flash memory 144, many license keys can be stored in the flash memory 144. Therefore, it is possible to provide a content reproducing apparatus suitable for a stationary type in which content data can be reproduced in a house.
  • the above embodiment has been described taking as an example a case where the encrypted content data is stored in the content storage device 13 which is a storage device such as a hard disk device.
  • the encrypted content file is D It may be provided in a form stored in a portable storage medium such as a VD or a CD.
  • a reading device that reads encrypted content data from the portable storage medium may be provided instead of the content storage device 13.
  • the key storage dedicated device 14 may be configured to be freely attachable.
  • a memory card 30 may be used as the key storage device 14, and the key storage device 14 may be attached to the card connection device 20.
  • a slot dedicated to the key storage device 14 may be provided in the present content reproduction device, and the key storage device 14 may be attached to this slot.
  • the license key is prepared for each encrypted content, but the present invention is not limited to this.
  • a license key for decrypting the encrypted content data belonging to the group may be prepared for each group with a plurality of encrypted content groups as one group.

Abstract

Une clé de licence prévue pour chaque élément de données de contenus est stockée dans un dispositif dans lequel sont uniquement stockées des clés, ce dispositif étant séparé du dispositif de stockage de contenus. Le dispositif de stockage de clés uniquement effectue un traitement d'authentification sur un partenaire de communication et, suite à l'authentification, envoie à un dispositif de reproduction, au moyen d'une communication cryptée, une clé de licence correspondant aux données de contenus devant être reproduites, ledit dispositif de reproduction décodant les données de contenus devant être reproduites au moyen de la clé de licence et reproduisant ensuite lesdites données.
PCT/JP2001/002003 2000-03-14 2001-03-14 Dispositif de reproduction de contenus WO2001069842A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001241131A AU2001241131A1 (en) 2000-03-14 2001-03-14 Contents reproducing device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2000070672 2000-03-14
JP2000-70672 2000-03-14

Publications (1)

Publication Number Publication Date
WO2001069842A1 true WO2001069842A1 (fr) 2001-09-20

Family

ID=18589374

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2001/002003 WO2001069842A1 (fr) 2000-03-14 2001-03-14 Dispositif de reproduction de contenus

Country Status (3)

Country Link
AU (1) AU2001241131A1 (fr)
TW (1) TW515950B (fr)
WO (1) WO2001069842A1 (fr)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007531149A (ja) * 2004-03-29 2007-11-01 サムスン エレクトロニクス カンパニー リミテッド 携帯型保存装置とデバイス間のデジタル著作権管理を用いたコンテンツ再生方法及び装置と、このための携帯型保存装置
JP2008523725A (ja) * 2004-12-07 2008-07-03 タイム ワーナー ケーブル、インコーポレイテッド プログラム・コンテンツを安全に通信するための技術
JP2008236089A (ja) * 2007-03-16 2008-10-02 Ricoh Co Ltd 暗号鍵復旧方法、情報処理装置及び暗号鍵復旧プログラム
US7650328B2 (en) 2002-07-25 2010-01-19 Sanyo Electric Co., Ltd. Data storage device capable of storing multiple sets of history information on input/output processing of security data without duplication
US7716746B2 (en) 2002-03-05 2010-05-11 Sanyo Electric Co., Ltd. Data storing device for classified data
US7752461B2 (en) 2002-01-15 2010-07-06 Sanyo Electric Co., Ltd. Storage apparatus that can properly recommence input and output of classified data
WO2014147836A1 (fr) * 2013-03-22 2014-09-25 株式会社日立製作所 Procédé de maintenance et de remplacement pour une fonction de chiffrement dans un système de stockage, et dispositif de stockage
US9083513B2 (en) 2004-07-20 2015-07-14 Time Warner Cable Enterprises Llc Technique for securely communicating and storing programming material in a trusted domain
US9313458B2 (en) 2006-10-20 2016-04-12 Time Warner Cable Enterprises Llc Downloadable security and protection methods and apparatus
US9565472B2 (en) 2012-12-10 2017-02-07 Time Warner Cable Enterprises Llc Apparatus and methods for content transfer protection
US9602864B2 (en) 2009-06-08 2017-03-21 Time Warner Cable Enterprises Llc Media bridge apparatus and methods
US9674224B2 (en) 2007-01-24 2017-06-06 Time Warner Cable Enterprises Llc Apparatus and methods for provisioning in a download-enabled system
US9742768B2 (en) 2006-11-01 2017-08-22 Time Warner Cable Enterprises Llc Methods and apparatus for premises content distribution
US9918345B2 (en) 2016-01-20 2018-03-13 Time Warner Cable Enterprises Llc Apparatus and method for wireless network services in moving vehicles
US9935833B2 (en) 2014-11-05 2018-04-03 Time Warner Cable Enterprises Llc Methods and apparatus for determining an optimized wireless interface installation configuration
US9986578B2 (en) 2015-12-04 2018-05-29 Time Warner Cable Enterprises Llc Apparatus and methods for selective data network access
US10164858B2 (en) 2016-06-15 2018-12-25 Time Warner Cable Enterprises Llc Apparatus and methods for monitoring and diagnosing a wireless network
US10368255B2 (en) 2017-07-25 2019-07-30 Time Warner Cable Enterprises Llc Methods and apparatus for client-based dynamic control of connections to co-existing radio access networks
US10492034B2 (en) 2016-03-07 2019-11-26 Time Warner Cable Enterprises Llc Apparatus and methods for dynamic open-access networks
US10560772B2 (en) 2013-07-23 2020-02-11 Time Warner Cable Enterprises Llc Apparatus and methods for selective data network access
US10638361B2 (en) 2017-06-06 2020-04-28 Charter Communications Operating, Llc Methods and apparatus for dynamic control of connections to co-existing radio access networks
US10645547B2 (en) 2017-06-02 2020-05-05 Charter Communications Operating, Llc Apparatus and methods for providing wireless service in a venue
US10965727B2 (en) 2009-06-08 2021-03-30 Time Warner Cable Enterprises Llc Methods and apparatus for premises content distribution
US11076203B2 (en) 2013-03-12 2021-07-27 Time Warner Cable Enterprises Llc Methods and apparatus for providing and uploading content to personalized network storage
US11197050B2 (en) 2013-03-15 2021-12-07 Charter Communications Operating, Llc Methods and apparatus for client-based dynamic control of connections to co-existing radio access networks
US11540148B2 (en) 2014-06-11 2022-12-27 Time Warner Cable Enterprises Llc Methods and apparatus for access point location
US11792462B2 (en) 2014-05-29 2023-10-17 Time Warner Cable Enterprises Llc Apparatus and methods for recording, accessing, and delivering packetized content
US11831955B2 (en) 2010-07-12 2023-11-28 Time Warner Cable Enterprises Llc Apparatus and methods for content management and account linking across multiple content delivery networks

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04102185A (ja) * 1990-08-21 1992-04-03 N T T Data Tsushin Kk Icカードの秘密鍵制御方法
JPH09307543A (ja) * 1996-05-14 1997-11-28 Matsushita Electric Ind Co Ltd 著作物データ再生方法および装置
JPH1040172A (ja) * 1996-07-25 1998-02-13 Toshiba Corp コンピュータシステム及びデータ転送方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04102185A (ja) * 1990-08-21 1992-04-03 N T T Data Tsushin Kk Icカードの秘密鍵制御方法
JPH09307543A (ja) * 1996-05-14 1997-11-28 Matsushita Electric Ind Co Ltd 著作物データ再生方法および装置
JPH1040172A (ja) * 1996-07-25 1998-02-13 Toshiba Corp コンピュータシステム及びデータ転送方法

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Kogata memory card de ongaku chosakuken wo mamoru", NIKKEI ELECTRONICS, no. 739, 22 March 1999 (1999-03-22), pages 49 - 53, XP002942132 *
KIYOSHI YAMANAKA ET AL.: "Multimedia on demande service ni okeru joho hogo system", NTT R & D, vol. 44, no. 9, 10 September 1995 (1995-09-10), pages 813 - 818, XP002942131 *

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7752461B2 (en) 2002-01-15 2010-07-06 Sanyo Electric Co., Ltd. Storage apparatus that can properly recommence input and output of classified data
US7716746B2 (en) 2002-03-05 2010-05-11 Sanyo Electric Co., Ltd. Data storing device for classified data
US7650328B2 (en) 2002-07-25 2010-01-19 Sanyo Electric Co., Ltd. Data storage device capable of storing multiple sets of history information on input/output processing of security data without duplication
JP2007531149A (ja) * 2004-03-29 2007-11-01 サムスン エレクトロニクス カンパニー リミテッド 携帯型保存装置とデバイス間のデジタル著作権管理を用いたコンテンツ再生方法及び装置と、このための携帯型保存装置
US7810162B2 (en) 2004-03-29 2010-10-05 Samsung Electronics Co., Ltd. Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same
US11088999B2 (en) 2004-07-20 2021-08-10 Time Warner Cable Enterprises Llc Technique for securely communicating and storing programming material in a trusted domain
US9973798B2 (en) 2004-07-20 2018-05-15 Time Warner Cable Enterprises Llc Technique for securely communicating programming content
US9083513B2 (en) 2004-07-20 2015-07-14 Time Warner Cable Enterprises Llc Technique for securely communicating and storing programming material in a trusted domain
US9313530B2 (en) 2004-07-20 2016-04-12 Time Warner Cable Enterprises Llc Technique for securely communicating programming content
US10848806B2 (en) 2004-07-20 2020-11-24 Time Warner Cable Enterprises Llc Technique for securely communicating programming content
US10178072B2 (en) 2004-07-20 2019-01-08 Time Warner Cable Enterprises Llc Technique for securely communicating and storing programming material in a trusted domain
JP2008523725A (ja) * 2004-12-07 2008-07-03 タイム ワーナー ケーブル、インコーポレイテッド プログラム・コンテンツを安全に通信するための技術
JP2011239454A (ja) * 2004-12-07 2011-11-24 Time Warner Cable Inc プログラム・コンテンツを安全に通信するための技術
JP4853930B2 (ja) * 2004-12-07 2012-01-11 タイム ワーナー ケーブル、インコーポレイテッド プログラム・コンテンツを安全に通信するための技術
US9313458B2 (en) 2006-10-20 2016-04-12 Time Warner Cable Enterprises Llc Downloadable security and protection methods and apparatus
US9923883B2 (en) 2006-10-20 2018-03-20 Time Warner Cable Enterprises Llc Downloadable security and protection methods and apparatus
US10362018B2 (en) 2006-10-20 2019-07-23 Time Warner Cable Enterprises Llc Downloadable security and protection methods and apparatus
US11381549B2 (en) 2006-10-20 2022-07-05 Time Warner Cable Enterprises Llc Downloadable security and protection methods and apparatus
US10069836B2 (en) 2006-11-01 2018-09-04 Time Warner Cable Enterprises Llc Methods and apparatus for premises content distribution
US9742768B2 (en) 2006-11-01 2017-08-22 Time Warner Cable Enterprises Llc Methods and apparatus for premises content distribution
US9674224B2 (en) 2007-01-24 2017-06-06 Time Warner Cable Enterprises Llc Apparatus and methods for provisioning in a download-enabled system
US10404752B2 (en) 2007-01-24 2019-09-03 Time Warner Cable Enterprises Llc Apparatus and methods for provisioning in a download-enabled system
US11552999B2 (en) 2007-01-24 2023-01-10 Time Warner Cable Enterprises Llc Apparatus and methods for provisioning in a download-enabled system
JP2008236089A (ja) * 2007-03-16 2008-10-02 Ricoh Co Ltd 暗号鍵復旧方法、情報処理装置及び暗号鍵復旧プログラム
US9749677B2 (en) 2009-06-08 2017-08-29 Time Warner Cable Enterprises Llc Media bridge apparatus and methods
US10965727B2 (en) 2009-06-08 2021-03-30 Time Warner Cable Enterprises Llc Methods and apparatus for premises content distribution
US9602864B2 (en) 2009-06-08 2017-03-21 Time Warner Cable Enterprises Llc Media bridge apparatus and methods
US10652607B2 (en) 2009-06-08 2020-05-12 Time Warner Cable Enterprises Llc Media bridge apparatus and methods
US11831955B2 (en) 2010-07-12 2023-11-28 Time Warner Cable Enterprises Llc Apparatus and methods for content management and account linking across multiple content delivery networks
US9565472B2 (en) 2012-12-10 2017-02-07 Time Warner Cable Enterprises Llc Apparatus and methods for content transfer protection
US10050945B2 (en) 2012-12-10 2018-08-14 Time Warner Cable Enterprises Llc Apparatus and methods for content transfer protection
US10958629B2 (en) 2012-12-10 2021-03-23 Time Warner Cable Enterprises Llc Apparatus and methods for content transfer protection
US11076203B2 (en) 2013-03-12 2021-07-27 Time Warner Cable Enterprises Llc Methods and apparatus for providing and uploading content to personalized network storage
US11197050B2 (en) 2013-03-15 2021-12-07 Charter Communications Operating, Llc Methods and apparatus for client-based dynamic control of connections to co-existing radio access networks
US9369278B2 (en) 2013-03-22 2016-06-14 Hitachi, Ltd. Method for maintenance or exchange of encryption function in storage system and storage device
WO2014147836A1 (fr) * 2013-03-22 2014-09-25 株式会社日立製作所 Procédé de maintenance et de remplacement pour une fonction de chiffrement dans un système de stockage, et dispositif de stockage
US10560772B2 (en) 2013-07-23 2020-02-11 Time Warner Cable Enterprises Llc Apparatus and methods for selective data network access
US11792462B2 (en) 2014-05-29 2023-10-17 Time Warner Cable Enterprises Llc Apparatus and methods for recording, accessing, and delivering packetized content
US11540148B2 (en) 2014-06-11 2022-12-27 Time Warner Cable Enterprises Llc Methods and apparatus for access point location
US9935833B2 (en) 2014-11-05 2018-04-03 Time Warner Cable Enterprises Llc Methods and apparatus for determining an optimized wireless interface installation configuration
US9986578B2 (en) 2015-12-04 2018-05-29 Time Warner Cable Enterprises Llc Apparatus and methods for selective data network access
US11412320B2 (en) 2015-12-04 2022-08-09 Time Warner Cable Enterprises Llc Apparatus and methods for selective data network access
US10687371B2 (en) 2016-01-20 2020-06-16 Time Warner Cable Enterprises Llc Apparatus and method for wireless network services in moving vehicles
US9918345B2 (en) 2016-01-20 2018-03-13 Time Warner Cable Enterprises Llc Apparatus and method for wireless network services in moving vehicles
US11665509B2 (en) 2016-03-07 2023-05-30 Time Warner Cable Enterprises Llc Apparatus and methods for dynamic open-access networks
US10492034B2 (en) 2016-03-07 2019-11-26 Time Warner Cable Enterprises Llc Apparatus and methods for dynamic open-access networks
US10164858B2 (en) 2016-06-15 2018-12-25 Time Warner Cable Enterprises Llc Apparatus and methods for monitoring and diagnosing a wireless network
US11146470B2 (en) 2016-06-15 2021-10-12 Time Warner Cable Enterprises Llc Apparatus and methods for monitoring and diagnosing a wireless network
US11356819B2 (en) 2017-06-02 2022-06-07 Charter Communications Operating, Llc Apparatus and methods for providing wireless service in a venue
US10645547B2 (en) 2017-06-02 2020-05-05 Charter Communications Operating, Llc Apparatus and methods for providing wireless service in a venue
US11350310B2 (en) 2017-06-06 2022-05-31 Charter Communications Operating, Llc Methods and apparatus for dynamic control of connections to co-existing radio access networks
US10638361B2 (en) 2017-06-06 2020-04-28 Charter Communications Operating, Llc Methods and apparatus for dynamic control of connections to co-existing radio access networks
US10368255B2 (en) 2017-07-25 2019-07-30 Time Warner Cable Enterprises Llc Methods and apparatus for client-based dynamic control of connections to co-existing radio access networks

Also Published As

Publication number Publication date
AU2001241131A1 (en) 2001-09-24
TW515950B (en) 2003-01-01

Similar Documents

Publication Publication Date Title
WO2001069842A1 (fr) Dispositif de reproduction de contenus
KR100736717B1 (ko) 저작권관리데이터를 포함하는 기록매체의 기록재생방법 및기록재생장치
US6581160B1 (en) Revocation information updating method, revocation information updating apparatus and storage medium
US7933837B2 (en) Content information providing system, content information providing server, content reproduction apparatus, content information providing method, content reproduction method and computer program
US20020138442A1 (en) Content provision device and method and license server capable of facilitating circulation of encrypted content data
WO2001043339A1 (fr) Dispositif de reproduction de donnees
WO2001043342A1 (fr) Systeme de distribution de donnees et enregistreur utilise avec ce systeme
JP2002094499A (ja) データ端末装置およびヘッドホン装置
US20090276862A1 (en) Content providing system
US20070064936A1 (en) Content data delivery method and content data delivery system and handheld device for use therein
JP2010267240A (ja) 記録装置
WO2006008909A1 (fr) Procede de traitement de support de stockage, dispositif de traitement de support de stockage et programme
JP2004072721A (ja) 認証システム、鍵登録装置及び方法
JP2004362547A (ja) スマートカードを用いた装置認証によりホームドメインを構成する方法、及びホームドメインを構成するためのスマートカード
JP2000156676A (ja) デジタルコンテント用の安全配布システム
WO2006011527A1 (fr) Dispositif d’enregistrement, dispositif de traitement de cle de contenu, support d’enregistrement et procede d’enregistrement
JP5209945B2 (ja) 記憶装置、暗号化コンテンツの有効化方法及び端末装置
JP2000122539A (ja) 著作物保護システム
JP3682840B2 (ja) コンテンツ情報記録方法及びコンテンツ情報記録装置
JP2004133654A (ja) 記憶装置、端末装置およびサーバ装置
JP3556891B2 (ja) デジタルデータ不正使用防止システム及び再生装置
JP2002374244A (ja) 情報配信方法
JP4765574B2 (ja) コンテンツ配信システム、コンテンツ受信装置及びそのプログラム
TW514776B (en) Content memory device and content reading device
KR100996992B1 (ko) Drm이 적용된 컨텐츠를 저장 및 사용하기 위한 포터블저장매체 그리고 이를 구현하기 위한 방법 및 시스템

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref country code: JP

Ref document number: 2001 567173

Kind code of ref document: A

Format of ref document f/p: F

122 Ep: pct application non-entry in european phase