US20060005257A1 - Encrypted contents recording medium and apparatus and method for reproducing encrypted contents - Google Patents
Encrypted contents recording medium and apparatus and method for reproducing encrypted contents Download PDFInfo
- Publication number
- US20060005257A1 US20060005257A1 US10/880,504 US88050404A US2006005257A1 US 20060005257 A1 US20060005257 A1 US 20060005257A1 US 88050404 A US88050404 A US 88050404A US 2006005257 A1 US2006005257 A1 US 2006005257A1
- Authority
- US
- United States
- Prior art keywords
- key
- playback
- acquisition source
- information
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 76
- 238000004891 communication Methods 0.000 claims description 27
- 238000012545 processing Methods 0.000 description 75
- 230000005540 biological transmission Effects 0.000 description 39
- FFBHFFJDDLITSX-UHFFFAOYSA-N benzyl N-[2-hydroxy-4-(3-oxomorpholin-4-yl)phenyl]carbamate Chemical compound OC1=C(NC(=O)OCC2=CC=CC=C2)C=CC(=C1)N1CCOCC1=O FFBHFFJDDLITSX-UHFFFAOYSA-N 0.000 description 35
- 230000008569 process Effects 0.000 description 23
- 239000000284 extract Substances 0.000 description 21
- 238000012795 verification Methods 0.000 description 17
- 239000002131 composite material Substances 0.000 description 15
- 239000000126 substance Substances 0.000 description 5
- 230000006870 function Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
- G11B20/00181—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software using a content identifier, e.g. an international standard recording code [ISRC] or a digital object identifier [DOI]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00188—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
- G11B20/00195—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier using a device identifier associated with the player or recorder, e.g. serial numbers of playback apparatuses or MAC addresses
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00797—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of times a content can be reproduced, e.g. using playback counters
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/0084—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific time or date
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00847—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction is defined by a licence file
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00855—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server
- G11B20/00862—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server wherein the remote server can grant the permission to use a content
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
- G11B27/10—Indexing; Addressing; Timing or synchronising; Measuring tape travel
- G11B27/102—Programmed access in sequence to addressed parts of tracks of operating record carriers
- G11B27/105—Programmed access in sequence to addressed parts of tracks of operating record carriers of operating discs
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
- G11B27/10—Indexing; Addressing; Timing or synchronising; Measuring tape travel
- G11B27/19—Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier
- G11B27/28—Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording
- G11B27/32—Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording on separate auxiliary tracks of the same or an auxiliary record carrier
- G11B27/327—Table of contents
- G11B27/329—Table of contents on a disc [VTOC]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/20—Disc-shaped record carriers
- G11B2220/25—Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
- G11B2220/2537—Optical discs
- G11B2220/2541—Blu-ray discs; Blue laser DVR discs
Definitions
- the present invention relates to apparatuses and methods for playing back contents of which the copyrights are protected and recording media for storing data used by the apparatuses and in the methods.
- CSS Contents Scrambling System
- DRM digital Rights Management
- BDs Blu-ray Discs
- a BD has a capacity five times as large as a DVD and is capable of having not only images with SD quality but also images with HD quality recorded thereon.
- BDs Like CSS for a conventional DVD, BDs have a mechanism by which a piece of information unique to a medium is recorded and a media key is generated from this piece of information and another piece of information stored in the playback apparatus. Further, contents are encrypted using the media key, and the encrypted contents are recorded on the medium. This method prevents unauthorized copying of the contents like in the case of DVDs.
- DRM digital versatile disc
- contents encrypted with a license key are stored into a medium, and a license is distributed separately via a network.
- the encrypted contents recorded on the medium are decrypted with the license key and then played back.
- the object of the present invention is to provide a data structure suitable for, in a case where a medium stores therein contents to which conventional copy protection is applied and contents to which DRM is applied, playing back both kinds of contents properly, as well as a recording medium that stores therein data having such a data structure, and a playback apparatus and a playback method for playing back such data.
- the present invention provides a terminal device that plays back a medium on which an encrypted content is recorded, comprising: a content key acquiring unit operable to acquire a content key from outside the medium; an acquisition source specifying unit operable to specify an acquisition source from which the content key is acquired; a communication establishing unit operable to establish communication with the acquisition source; and a decrypting unit operable to decrypt the encrypted content, using the content key.
- FIG. 1 shows the overall structure of the contents playback system of the first embodiment of the present invention
- FIG. 2 shows the internal structure of the terminal device 101 and information recorded on the medium 102 according to the first embodiment of the present invention
- FIG. 3 shows the internal structures of the license server 104 and the license management client 230 according to the first embodiment of the present invention
- FIG. 4 shows the data structure of the playback control information 211 according to the first embodiment of the present invention
- FIG. 5 shows the data structure of the key control information 213 according to the first embodiment of the present invention
- FIG. 6 shows the data structure of the media unique information 214 according to the first embodiment of the present invention
- FIG. 7 shows the table configuration of the rights storing unit 315 according to the first embodiment of the present invention
- FIG. 8 shows the table configuration of the key storing unit 305 according to the first embodiment of the present invention
- FIG. 9 shows the table configuration of the use condition storing unit 306 according to the first embodiment of the present invention.
- FIG. 10 shows the configuration of communication message according to the first embodiment of the present invention
- FIG. 11 shows the configuration of rights according to the first embodiment of the present invention
- FIG. 12 shows the configuration of contents playback information according to the first embodiment of the present invention
- FIG. 13 is a flow chart that shows the processing procedure to play back the contents and complete the playback, according to the first embodiment of the present invention
- FIG. 14 is a flow chart that shows the processing procedure in the content key acquisition process 1 according to the first embodiment of the present invention.
- FIG. 15 is a flow chart that shows the processing procedure in the rights key acquisition process 1 according to the first embodiment of the present invention.
- FIG. 16 is a flow chart that shows the processing procedure in the rights key transmission process 1 according to the first embodiment of the present invention.
- FIG. 17 is a flow chart that shows the processing procedure in the media key acquisition process 1 according to the first embodiment of the present invention.
- FIG. 18 is a flow chart that shows the processing procedure in the contents playback process 1 according to the first embodiment of the present invention.
- FIG. 19 is a flow chart that shows the processing procedure in the use condition update process 1 according to the first embodiment of the present invention.
- FIG. 20 is a flow chart that shows the processing procedure in the next playback content specification process 1 according to the first embodiment of the present invention.
- FIG. 21 shows the internal structure of the terminal device 101 and information recorded on the medium 102 according to the second embodiment of the present invention
- FIG. 22 shows the internal structures of the license server 104 and the license management client 230 of the second embodiment of the present invention
- FIG. 23 shows the data structure of the playback control information 211 of the second embodiment of the present invention.
- FIG. 24 shows the data structure of the key control information 213 of the second embodiment of the present invention.
- FIG. 25 is a flowchart that shows the processing procedure to play back the contents and complete the playback, according to the second embodiment of the present invention.
- FIG. 26 is a flowchart that shows the processing procedure in the content key acquisition storing process 2 according to the second embodiment of the present invention.
- FIG. 27 is a flow chart that shows the processing procedure in the rights key acquisition process 2 according to the second embodiment of the present invention.
- FIG. 28 is a flowchart that shows the processing procedure in the rights key transmission process 2 according to the second embodiment of the present invention.
- FIG. 29 is a flow chart that shows the processing procedure in the contents playback process 2 according to the second embodiment of the present invention.
- FIG. 30 is a flow chart that shows the processing procedure in the use condition update process 2 according to the second embodiment of the present invention.
- FIG. 1 is a schematic drawing of the overall structure of the contents playback system according to the first embodiment of the present invention.
- the contents playback system comprises: a terminal device 101 operable to play back contents; a medium 102 that stores therein encrypted contents and other data; a display device 103 operable to display contents played back by the terminal device 101 ; a license server 104 operable to generate and distribute a license; and a transmission line 105 that connects the terminal device 101 with the license server 104 .
- FIG. 2 shows the internal structure of the terminal device 101 and information recorded on the medium 102 .
- the internal structure of the terminal device 101 is to be described.
- the terminal device 101 comprises: a contents playback unit 200 that plays back contents; an operation unit 221 operable to receive user operations; a display unit 222 operable to transmit display data to the display device 103 ; a key acquisition intermediary unit 223 operable to intermediate the acquisition of rights key performed by the contents playback unit 200 ; a license management client A 230 operable to transmit a rights key based on a request form the contents playback unit 200 ; and a license management client B 240 that has a different security level from the license management client A 230 .
- the security level of the license management client A 230 is higher than that of the license management client B 240 .
- the contents playback unit 200 comprises: a reading unit 201 operable to read data from the medium 102 ; a playback control unit 202 operable to control playback of contents; a decrypting unit 203 operable to decrypt encrypted contents; a key acquisition control unit 204 operable to control acquisition processing of a content key; and a media key generating unit 205 operable to generate a media key according to an instruction from the key acquisition control unit 204 .
- An example of implementing the terminal device 101 is a client computer including a CPU, a work memory, a flash memory, a BD drive, a remote controller, a video adaptor, a network adaptor, and so on. More specifically, the reading unit 201 is a BD drive, the operation unit 221 is a remote controller, and the display unit 222 is a video adaptor.
- a model may be presumed in which the contents playback unit 200 is arranged to be tamper-resistant hardware-wise or software-wise, the license management client A 230 is arranged to be tamper-resistant hardware-wise, and the license management client B 240 is arranged to be tamper-resistant software-wise.
- the contents playback unit 200 may comprise a secure LSI arranged to be tamper-resistant hardware-wise
- the license management client A 230 may be a program that operates on an IC card arranged to be tamper-resistant hardware-wise
- the license management client B 240 may be a program operating in a secure program execution environment of the terminal device 101 .
- the medium 102 stores therein playback control information 211 which is information for controlling playback order, encrypted contents 212 being contents data having been encrypted, key control information 213 being information on control of the key acquisition processing, and media unique information 214 being information unique to the medium 102 .
- the medium 102 is specifically a BD medium.
- a BD medium has a file system such as UDF; consequently, a method is normally used in which the playback control information 211 , the encrypted contents 212 , the key control information 213 , and the media unique information 214 are recorded as one or more files on a file system.
- the present invention is not limited to this method.
- BCA Burst Cutting Area
- FIG. 3 shows the internal structures of the license server 104 , the license management client A 230 , and the license management client B 240 . It should be noted that, in FIG. 3 , the internal structure of the license management client A 230 is shown as a representative, since the license management client A 230 and the license management client B 240 have the same structure.
- the following describes the internal structure of the license server 104 .
- the license server 104 comprises: a rights transmitting unit 301 operable to transmit a right to the terminal device 101 ; a transmission control unit 302 operable to control data transmission to the terminal device 101 ; a rights generating unit 303 operable to generate a right from a rights key and conditions of use; a key transmitting unit 304 operable to transmit a rights key to the terminal device 101 ; a usability judging unit 307 operable to judge whether or not it is acceptable to transmit a key based on the conditions of use; a key storing unit 305 operable to store there in a rights key; and a use condition storing unit 306 operable to store therein the conditions of use.
- An example of implementing the license server 104 is a server computer including a CPU, a work memory, an HDD, and a network adaptor. More specifically, the rights transmitting unit 301 is a network adaptor, and the transmission control unit 302 and the rights generating unit 303 are software that operates using a CPU and a work memory. These specific examples are mere examples, and the configuration of the license server 104 is not limited to these examples.
- the following describes the internal structure of the license management client A 230 .
- the license management client A 230 comprises: a rights acquiring unit 311 operable to acquire a right from the outside; a key extracting unit 312 operable to extract a rights key from a right; a usability judging unit 313 operable to judge whether or not it is acceptable to transmit a key based on the conditions of use; a key transmitting unit 314 operable to transmit a rights key to the outside; a rights storing unit 315 operable to store therein a right; and a use condition updating unit 316 operable to update the conditions of use.
- Each of the license server 104 , the terminal device 101 , the license management client A 230 , and the license management client B 240 comprises a data storing unit and various processing units.
- Each data storing unit is realized with a recording medium such as an HDD, a flash memory, or the like.
- Each processing unit is realized with hardware such as an LSI, and a program executed with the use of a CPU, a RAM, or a ROM.
- the following describes data and data structure to be dealt within the first embodiment. Firstly, the data structure of the data to be stored in the medium 102 will be described. Secondly, the data structure of data to be stored in each storing unit is described, starting with the license management client A 230 , and then the license server 104 . Lastly, explanation will be provided on the rights distributed from the license server 104 and the data structure of the contents playback information acquired by the contents playback unit 200 from the outside when the contents are to be played back, according to the present embodiment.
- FIG. 4 shows an example of data structure of the playback control information 211 .
- the playback control information 211 includes four kinds of information as below:
- Each content is stored into a BD medium as a file, and a file name of a corresponding content is recorded as the content name.
- the Next-playback Number is “2”. It therefore means that when the playback of Opening.mpg is completed, playback of Trailer.mpg will start.
- the encrypted contents 212 are data obtained by encrypting a transport stream into which an MPEG (Moving Picture Experts Group) 2 video elementary stream and an MPEG 2 audio elementary stream are multiplexed according to a multiplex method defined by MPEG 2.
- AES Advanced Encryption Standard
- AES Advanced Encryption Standard
- a transport stream may store therein data for displaying buttons, in addition to a video elementary stream and an audio elementary stream.
- the data for displaying buttons is normally recorded as a private stream; however, the present invention is not limited to this.
- FIG. 5 shows an example of data structure of the key control information 213 .
- the key control information 213 includes nine kinds of information as below:
- One of a media key, a rights key, and a composite key is specified.
- the Playback Possibility Information may include quality of playback, for example.
- the Copiability Information may include other information such as one that identifies quality of a copy or one that identifies a copy destination medium.
- This information is paired with “Corresponding Rights Format Information” and is for specifying a connection destination when a rights key is to be acquired, for a line in which the key generation information is specified as a rights key or a composite key.
- the contents playback unit 200 is connected to, in order to acquire a rights key for the content in this line, the license management client A 230 in Format D 1 .
- connection destination module specified by “Corresponding Rights Format Information” and “Connection Destination Type”, for a line in which the key generation information is specified as a rights key or a composite key.
- the public key certificate of the connection destination module is set.
- a public key certificate of the license management client A 230 in Format D 1 is set.
- a public key certificate of a connection destination module is set; however, it is acceptable to have an arrangement wherein a piece of identification information that uniquely identifies a public key certificate of the connection destination module is set, and the contents playback unit 200 acquires the public key certificate of the connection destination module according to the piece of identification information. Alternatively, it is acceptable to set the public key of the connection destination module in each line.
- the piece of identification information that uniquely identifies a public key certificate of the connection destination module may be, for example, a piece of information in which a piece of Corresponding Rights Format Information and the Connection Destination Type are expressed as a code such as “001-00A”.
- connection destination module it is acceptable to have an arrangement wherein no such information is set in each line and a public key certificate of the connection destination module is acquired based on “Rights Format Information” and “Connection Destination Type”.
- the contents playback unit 200 makes an acquisition request for a rights key, first to the license management client A 230 in Format D 1 , and if the acquisition of a rights key is impossible for the reason that the client does not exist or such, then to the license management client B 240 in Format D 1 .
- FIG. 6 shows an example of data structure of the media unique information 214 .
- the media unique information 214 includes two kinds of information as below:
- an encrypted media key is recorded as media unique information 214 for each playback device.
- a playback device becomes unauthentic as having been hacked, or for some other reasons, it is possible to prevent the unauthentic playback device to perform playback by not recording the device unique information of the unauthentic playback device and the corresponding encrypted media key.
- the following describes the data structure of data stored in the storing unit of the license management client A 230 , with reference to FIG. 7 .
- FIG. 7 shows an example of data structure of rights information stored in the rights storing unit 315 .
- the rights information includes five kinds of information as below. It should be noted that what is included in the rights information is not limited to these five kinds of information. Particularly, various kinds of information may be included in the information related to the conditions of use of rights, such as the playback number of times and the playback expiration.
- One package identifier is set for one medium, the medium 102 . It is information that uniquely identifies, for example, “Top 50 Hits of 2003 for domestic music” or “Movie Collection directed by xx”.
- the following describes the data structure of the data stored in the storing unit of the license server 104 , with reference to FIGS. 8 and 9 .
- FIG. 8 shows an example of data structure of the key information stored in the key storing unit 305 .
- the key information includes three kinds of information as below:
- FIG. 9 shows an example of data structure of the use condition information stored in the use condition storing unit 306 .
- the use condition information includes four kinds of information as below. It should be noted that what is included in the use condition information is not limited to these examples, as noted for the rights information.
- One package identifier is set for one medium, the medium 102 .
- FIG. 10 shows the substance of the message format of a communication message transmitted and received through communication between the license server 104 and the terminal device 101 .
- the communication message shown in FIG. 10 is made up of a message header and a message body.
- the message header includes, at least, a piece of information that identifies a transmission destination and a piece of information that identifies a transmission source.
- the piece of information that identifies a transmission destination is referred to as a destination of the message.
- the piece of information that identifies a transmission source is referred to as a destination to which a reply message is to be transmitted in response to the message.
- An IP address is a typical example of a piece of information that identifies a transmission source or a transmission destination. It is acceptable to have an arrangement wherein a message header includes information required for authentication processing, in a case where authentication processing is performed between a server and a machine that transmit and receive the communication message.
- a message body includes information that is unique to the message. This type of information that is unique to each message body will be described later for each of the messages.
- FIG. 11 shows an example of a right that is acquired by the license management client A 230 or the license management client B 240 from the license server 104 .
- the rights information includes two kinds of information as below and specified in the message body shown in FIG. 10 .
- FIG. 12 shows an example of contents playback information acquired by the contents playback unit 200 from the license server 104 , the license management client A 230 , or the license management client B 240 , when the contents are used.
- the contents playback information includes four kinds of information as below:
- Image quality and sound quality of the playback at the times of using contents are specific examples.
- the terminal device 101 Immediately after the power of the terminal device 101 is turned on or immediately after the medium 102 is inserted, upon an instruction from the user to start the playback via the operation unit 221 , the terminal device 101 starts the playback processing of the contents stored in the medium 102 .
- the playback control unit 202 controls the reading unit 201 so that the playback control information 211 is read from the medium 102 , acquires the content name that corresponds to the Playback Number 1, and specifies the content to be played back.
- the playback control unit 202 transmits the content name and a package identifier of the medium 102 to the key acquisition control unit 204 , and instructs the key acquisition control unit 204 to acquire the content key of the content that corresponds to the content name ( FIG. 13 : Step S 1301 ).
- the key acquisition control unit 204 performs the content key acquisition process 1 to be described later with reference to the flow chart in FIG. 14 , and transmits the acquired content key, the content name, and a playback instruction to the decrypting unit 203 . When it is not possible to acquire the content key, the key acquisition control unit 204 transmits an error message to the decrypting unit 203 ( FIG. 13 : Step S 1302 ).
- the decrypting unit 203 When having received the content key from the key acquisition control unit 204 , the decrypting unit 203 performs the subsequent processing. In a case where a content key has not been acquired even after the processing by the key acquisition control unit 204 is completed, the playback processing of the contents is completed. It is acceptable to have an arrangement wherein, in a case where it is not possible to acquire the content key, the user is notified, by the display on the display device 103 via the display unit 222 , that it is not possible to play back the contents and of the reason why the content key cannot be acquired ( FIG. 13 : Step S 1303 ).
- the decrypting unit 203 performs the contents playback process 1 to be described later with reference to the flow chart in FIG. 18 ( FIG. 13 : Step S 1304 ).
- Step S 1304 When the playback of the contents being the playback target in Step S 1304 is completed, the decrypting unit 203 notifies the playback control unit 202 that the playback is completed.
- the playback control unit 202 judges whether or not there is a playback continuation instruction from the user ( FIG. 13 : Step S 1305 ). When there is no playback continuation instruction, the playback control unit 202 completes the playback processing. When there is a playback continuation instruction, the playback control unit 202 performs the next playback content specification process 1 , to be described later with reference to the flow chart in FIG. 20 , and the procedure returns to the processing in Step S 1302 ( FIG. 13 : Step S 1306 ).
- the key acquisition control unit 204 controls the reading unit 201 so that key control information 213 is acquired from the medium 102 ( FIG. 14 : Step S 1401 ).
- the key acquisition control unit 204 specifies a piece of key generation information that corresponds to the content being the playback target from the key control information 213 , based on the content name acquired from the playback control unit 202 .
- the key acquisition control unit 204 judges whether or not a rights key is required, based on the piece of key generation information ( FIG. 14 : Step S 1402 ). More specifically, when the piece of key generation information is a rights key or a composite key, the key acquisition control unit 204 judges that a rights key is required. When the piece of key generation information is a media key, the key acquisition control unit 204 judges that a rights key is not required.
- the key acquisition control unit 204 When having judged that a rights key is required, the key acquisition control unit 204 performs the rights key acquisition process 1 ( FIG. 14 : S 1403 ), to be described later with reference to the flow chart in FIG. 15 . When having judged that a rights key is not required, the key acquisition control unit 204 instructs the media key generating unit 205 to generate a media key and performs the media key acquisition process 1 ( FIG. 14 : Step S 1411 ), to be described later with reference to the flow chart in FIG. 17 .
- the key acquisition control unit 204 checks whether or not a rights key has been acquired ( FIG. 14 : Step S 1404 ).
- connection destination when it is not possible to establish the connection with the connection destination, or when the connection destination does not own a rights key, it will be a case where it is not possible to acquire a rights key.
- the key acquisition control unit 204 When it is not possible to acquire a rights key, the key acquisition control unit 204 returns to the rights key acquisition process 1 , to be described later with reference to the flow chart in FIG. 15 .
- the key acquisition control unit 204 When having acquired a rights key, the key acquisition control unit 204 performs the subsequent processing.
- the key acquisition control unit 204 judges whether or not a media key is required, based on the piece of key generation information ( FIG. 14 : Step S 1405 ). More specifically, when the piece of key generation information is a composite key, the key acquisition control unit 204 judges that a media key is required. When the piece of key generation information is a rights key, the key acquisition control unit 204 judges that a media key is not required.
- the key acquisition control unit 204 takes the acquired rights key as a content key.
- the method of generating a content key is not limited to just taking a rights key as a content key. It is acceptable to generate a content key from a rights key and content unique information, using a one-way function. The method of generating a content key may be specified in advance at the key acquisition control unit 204 . Alternatively, information that identifies a generating method may be included in key generation information. Further, it is acceptable to determine a method for generating a content key depending on the type of contents to be played back.
- the key acquisition control unit 204 instructs the media key generating unit 205 to generate a media key, and performs the media key acquisition process 1 ( FIG. 14 : Step S 1406 ), to be descried later with reference to the flow chart in FIG. 17 .
- the key acquisition control unit 204 generates a content key from the acquired rights key and media key, using a one-way function ( FIG. 14 : Step S 1407 ).
- the method of generating a content key is not limited to the one using a one-way function. There are various ways to generate a content key, for example, by decrypting content unique information with a media key, or by simply combining the content unique information with a media key and taking a hash thereof.
- the method of generating a content key may be specified in advance at the key acquisition control unit 204 . Alternatively, information that identifies a generating method may be included in key generation information. Further, it is acceptable to determine a method for generating a content key depending on the type of contents to be played back.
- the key acquisition control unit 204 specifies a connection destination module ( FIG. 15 : Step S 1501 ). To be more specific, description is provided for a case where a rights key is to be acquired for a content name with which two or more corresponding rights formats and connection destination types are specified. In such a case, the key acquisition control unit 204 determines, as the connection destination module, starting from a corresponding rights format and a connection destination type that has a smallest value of the priority order indicated in the key control information 213 .
- the key acquisition control unit 204 specifies a connection destination module having the second priority order as a connection destination.
- the key acquisition control unit 204 is able to find out about connection destination modules from which a rights key cannot be acquired by, for example, keeping a record of connection destination modules to which an error message has been sent during a predetermined length of time in the past, with regard to a rights key acquisition processing, or polling connection destination modules regularly to keep a record of the connectability and holding table information showing modules from which a rights key cannot be acquired.
- the key acquisition control unit 204 transmits five kinds of information including the information of the connection destination specified in Step S 1501 to the key acquisition intermediary unit 223 ( FIG. 15 : Step S 1502 ).
- the transmitted information contains: a package identifier, a content name, corresponding rights format information, connection destination type, a public key certificate of the contents playback unit 200 .
- the key acquisition intermediary unit 223 receives the information transmitted by the key acquisition control unit 204 in Step S 1502 ( FIG. 15 : Step S 1511 ).
- the key acquisition intermediary unit 223 extracts the corresponding rights format information and the connection destination type from the information received in Step S 1511 , and establishes communication with the connection destination module specified by these two kinds of information ( FIG. 15 : Step S 1512 ). More specifically, when the corresponding rights format information indicates Format D 1 , and the connection destination type indicates a license management client A, connection with a license management client A that corresponds to Format D 1 is established. There are various ways for the key acquisition intermediary unit 223 to specify a license management client A that corresponds to Format D 1 . For example, it is acceptable to use methods such as holding a table showing the correspondence between MAC addresses or IP addresses and clients, or making inquiries to all connection destinations modules that are connectable and specifying a client according to the responses.
- the key acquisition intermediary unit 223 extracts the package identifier, the content name, and the public key certificate of the contents playback unit 200 from the information received in Step S 1511 , and transmits the extracted information to the connection destination module ( FIG. 15 : Step S 1513 ).
- the connection destination module which is one of the license management client A 230 , the license management client B 240 , and the license server 104 , performs the rights key transmission process 1 ( FIG. 15 : Step S 1521 ), to be described later with reference to the flow chart in FIG. 16 .
- the key acquisition intermediary unit 223 receives a message with a signature from the connection destination module ( FIG. 15 : Step S 1514 ).
- the message with a signature is a message obtained by signing a piece of data that contains at least the rights key encrypted with the public key of the contents playback unit 200 , the playback control conditions, and the use condition type with the secret key of the connection destination module.
- the key acquisition intermediary unit 223 transmits the message with the signature to the key acquisition control unit 204 ( FIG. 15 : Step S 1515 ).
- the key acquisition control unit 204 receives the message with the signature from the key acquisition intermediary unit 223 ( FIG. 15 : Step S 1503 ).
- the key acquisition control unit 204 acquires the public key certificate from the key control information 213 and verifies the message with the signature ( FIG. 15 : Step S 1504 ). When the signature verification result is no good, the key acquisition control unit 204 completes the content key acquisition processing. It should be noted that description is provided here for the case where the public key certificate is set in the medium 102 ; however, it is acceptable to acquire the public key certificate from the outside and perform verification. Explanation will be omitted as to the method of acquiring the public key certificate and the specific procedure of the signature verification.
- the key acquisition control unit 204 decrypts the encrypted rights key contained in the message with the signature, using the secret key of the contents playback unit 200 , and acquires the rights key ( FIG. 15 : Step S 1505 ).
- the rights key transmission process 1 varies depending on which connection destination module is the subject of the operation; therefore, explanation is provided on each case.
- connection destination module is either the license management client A 230 or the license management client B 240 , taking the license management client A 230 as a representative example.
- the usability judging unit 313 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 1513 ( FIG. 16 : Step S 1601 ).
- the usability judging unit 313 extracts the package identifier and the content name from the received information and specifies and acquires a right that corresponds to the content being the playback target from the rights storing unit 315 , based on these two kinds of information ( FIG. 16 : Step S 1602 ).
- the usability judging unit 313 acquires the conditions of use contained in the right and judges whether or not the contents are usable based on the conditions of use ( FIG. 16 : Step S 1603 ). More specifically, the conditions of use include a playback number of times, and a playback expiration as described with reference to FIG. 7 . As for the playback number of times, when the playback number of times is one or more, it is judged that the contents are usable, whereas when the playback number of times is zero, it is judged that the contents are unusable.
- the usability judging unit 313 acquires a reliable current time and when the current time is before the playback expiration, it is judged that the contents are usable, whereas when the current time is after the playback expiration, it is judged that the contents are unusable. It should be noted that information included in the conditions of use are not limited to these examples.
- the usability judging unit 313 When having judged that the contents are unusable, the usability judging unit 313 signs the error judgment result with the secret key of the license management client A 230 and generates a message with a signature to be transmitted ( FIG. 16 : Step S 1607 ) It should be noted that it is also acceptable that the error judgment result contains the cause of the error, for example, “Playback Expiration is up”or “Playback Number of Times is zero”.
- the us ability judging unit 313 sets a use condition type and transmits the use condition type along with the right to the key extracting unit 312 .
- the use condition type is set as either stateless or stateful depending on the substance of the conditions of use.
- the key extracting unit 312 extracts a rights key from the right and generates, if necessary, playback control conditions ( FIG. 16 : S 1604 ). More specifically, image quality and sound quality of the playback are set as the playback control conditions. These conditions may be set in advance at the license management client A 230 , may be set in the conditions of use, or may be determined depending on the type of contents to be played back. The information included in the playback control conditions is not limited to these examples. It is also acceptable to have no playback control conditions.
- the key extracting unit 312 transmits the extracted rights key, the generated playback control conditions, and the use condition type to the key transmitting unit 314 .
- the key transmitting unit 314 acquires the public key of the contents playback unit 200 from the public key certificate received in Step S 1601 , and encrypts the rights key so as to generate an encrypted rights key ( FIG. 16 : Step S 1605 ).
- the rights key is encrypted with the public key of the contents playback unit 200 ; however, it is acceptable to encrypt a rights key with a media key, or to encrypt a rights key dually with the public key of the contents playback unit 200 and a media key.
- the key acquisition control unit 204 or the key acquisition intermediary unit 223 generates a random number every time a rights key acquisition request is made, and stores the random number within itself as well as transmits the rights key acquisition request containing the random number, and the key transmitting unit 314 encrypts the rights key and the playback control conditions, using the random number.
- the key transmitting unit 314 encrypts the playback control conditions with an encryption key generated from the random number and the public key of the contents playback unit 200 and signs the encrypted rights key and the encrypted playback control conditions. This method makes it possible to return a reply message that is different for every rights key request asking for one same right. Thus, security level is expected to be improved.
- the key transmitting unit 314 signs a piece of data that contains at least the encrypted rights key, the playback control conditions, and the use condition type, with a secret key of the license management client A 230 so as to generate a message with a signature to be transmitted ( FIG. 16 : S 1606 ).
- the key transmitting unit 314 signs a piece of data that contains the random number in addition to the encrypted rights key, the playback control conditions, and the use condition type, with a secret key of the license management client A 230 .
- the key transmitting unit 314 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 16 : Step S 1608 ).
- connection destination module is the license server 104 .
- the usability judging unit 307 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 1513 ( FIG. 16 : Step S 1601 ).
- the usability judging unit 307 extracts the package identifier and the content name form the received information and specifies and acquires conditions of use that correspond to the contents to be played back from the use condition storing unit 306 , based on these two kinds of information ( FIG. 16 : Step S 1602 ).
- the usability judging unit 307 judges whether or not he contents are usable based on the conditions of use ( FIG. 16 : Step S 1603 ).
- the usability judging unit 307 When having judged that the contents are unusable, the usability judging unit 307 signs the error judgment result with the secret key of the license server 104 and generates a message with a signature to be transmitted ( FIG. 16 : Step S 1607 ).
- the usability judging unit 307 sets a use condition type, and transmits the use condition type and the conditions of use, along with the package identifier and the content name with which the conditions of use have been specified, to the key extracting unit 312 .
- the key extracting unit 312 extracts a rights key from the key storing unit 305 based on the package identifier and the content name, and generates, if necessary, playback control conditions ( FIG. 16 : Step S 1604 ).
- the key extracting unit 312 transmits the extracted rights key, the generated playback control conditions and the use condition type to the key transmitting unit 304 .
- the key transmitting unit 304 acquires the public key of the contents playback unit 200 from the public key certificate received in Step S 1601 and encrypts the rights key so as to generate an encrypted rights key ( FIG. 16 : Step S 1605 ).
- the key transmitting unit 304 signs the piece of data that contains at least the encrypted rights key, the playback control conditions, and the use condition type with the secret key of the license server 104 and generates a message with a signature to be transmitted ( FIG. 16 : Step S 1606 ).
- the key transmitting unit 304 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 16 : Step S 1608 ).
- the media key generating unit 205 controls the reading unit 201 so that media unique information 214 is acquired from the medium 102 ( FIG. 17 : Step S 1701 ).
- the media key generating unit 205 stores therein device unique information that is unique to the device and judges whether the device unique information of its own is set in the media unique information 214 based on the device unique information ( FIG. 17 : Step S 1702 ).
- the media key generating unit 205 completes the media key acquisition processing and also completes the contents playback processing. For instance, in FIG. 7 , the device unique information “0003” is not registered in the media unique information 214 . Consequently, the terminal device 101 having “0003” as the device unique information halts without starting the playback of the medium 102 .
- the media key generating unit 205 acquires an encrypted media key that corresponds to the device of its own ( FIG. 17 : Step S 1703 ).
- the media key generating unit 205 decrypts the acquired encrypted media key with the device unique key so as to acquire the media key ( FIG. 17 : Step S 1704 ).
- Step S 1304 in FIG. 13 The following describes the contents playback process 1 in Step S 1304 in FIG. 13 , with reference to the flow chart in FIG. 18 .
- the decrypting unit 203 acquires a content key, playback control conditions, a use condition type, and a content name from the key acquisition control unit 204 .
- the decrypting unit 203 acquires an encrypted content 212 from the medium 102 based on the content name ( FIG. 18 : Step S 1801 ).
- the decrypting unit 203 checks whether or not playback control conditions are set ( FIG. 18 : Step S 1802 ).
- the decrypting unit 203 plays back the contents while controlling the image quality and sound quality of the contents according to the playback control conditions ( FIG. 18 : Step S 1803 ).
- the decrypting unit 203 plays back the contents without any restriction ( FIG. 18 : Step S 1804 ).
- the decrypting unit 203 When having received a user instruction to stop the playback or having completed the playback of the contents being playback target, the decrypting unit 203 completes the playback of the contents ( FIG. 18 : Step S 1805 ).
- the decrypting unit 203 judges whether the conditions of use that correspond to the contents played back are stateless or stateful, based on the use condition type acquired from the key acquisition control unit 204 ( FIG. 18 : Step S 1806 ).
- the decrypting unit 203 judges that the conditions of use do not need to be updated, and completes the playback processing of the contents.
- the decrypting unit 203 When the conditions of use are stateful, the decrypting unit 203 generates a playback history for the purpose of updating the conditions of use ( FIG. 18 : Step S 1807 ). More specifically, a playback history is generated to indicate that, for example, “the playback number of times is one” or “the playback period is two hours”.
- the decrypting unit 203 transmits the playback history and a history transmission instruction to the key acquisition control unit 204 .
- the key acquisition control 204 transmits, to the key acquisition intermediary unit 223 , (i) transmission data containing six kinds of information including at least information of the connection destination specified in Steps S 1501 and (ii) a message with a signature obtained by signing, with the secret key of the contents playback unit 200 , the transmission data from which corresponding rights format information and connection destination type are excluded ( FIG. 18 : Step S 1808 ).
- the transmission data contains a package identifier, a content name, corresponding rights format information, a connection destination type, a public key certificate of the contents playback unit 200 , and a playback history.
- the key acquisition intermediary unit 223 receives the message with the signature transmitted by the key acquisition control unit 204 in Step S 1808 ( FIG. 18 : Step S 1811 ).
- the key acquisition intermediary unit 223 extracts the corresponding rights format information and the connection destination type from the message with the signature received in Step S 1808 and establishes communication with the connection destination module specified by these two kinds of information ( FIG. 18 : Step S 1812 ).
- the key acquisition intermediary unit 223 extracts the package identifier, the content name, the public key certificate of the contents playback unit 200 , the playback history, and the signature data from the message with the signature received in Step S 1808 , and transmits these kinds of information to the use condition updating unit 316 of the connection destination module ( FIG. 18 : Step S 1813 ). It should be noted that it is acceptable to have an arrangement wherein all the kinds of information in the transmission data are signed in Step S 1808 , and the message with the signature received in Step S 1808 is transmitted to the connection destination module as the way it is in Step S 1813 .
- connection destination module which is one of the license management client A 230 , the license management client B 240 , and the license server 104 , performs the use condition update process 1 ( FIG. 18 : Step S 1821 ), to be described later with reference to the flow chart in FIG. 19 .
- the key acquisition intermediary unit 223 receives, from the connection destination module, a message with a signature obtained by signing a piece of data that contains at least a result of the use condition processing with the secret key of the connection destination module ( FIG. 18 : Step S 1814 ).
- the key acquisition intermediary unit 223 transmits the message with the signature to the key acquisition control unit 204 ( FIG. 18 : Step S 1815 ).
- the key acquisition control unit 204 receives the message with the signature from the key acquisition intermediary unit 223 ( FIG. 18 : Step S 1809 ).
- the key acquisition control unit 204 acquires a public key certificate from the key control information 213 and verifies the message with the signature ( FIG. 18 : step S 180 A). When the signature verification result is no good, the key acquisition control unit 204 performs a predetermined processing to be conducted in the event of a signature verification error ( FIG. 18 : Step S 180 B). For example, the key acquisition control unit 204 judges that the connection destination module is unreliable and registers it as an unconnectable connection destination module.
- the key acquisition control unit 204 performs a predetermined processing according to the results of the use condition update processing ( FIG. 18 : Step S 180 C). For example, when the result of the processing indicates a use condition update error, the key acquisition control unit 204 performs the use condition update process 1 again, or prohibits the terminal device 101 from playing back contents thereafter. Conversely, when the result of the processing indicates a normal termination, the result as such may be displayed on the screen to notify the user.
- the processing to be conducted in the event of a signature verification error and the processing to be conducted according to the use condition update processing result may be performed according to information having been set in the medium 102 or may be performed after making an inquiry to the outside.
- connection destination module is the subject of the operation; therefore, explanation is provided on each case.
- connection destination module is either the license management client A 230 or the license management client B 240 , taking the license management client A 230 as a representative example.
- the use condition updating unit 316 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 1813 ( FIG. 19 : Step S 1901 ).
- the use condition updating unit 316 extracts the public key certificate of the contents playback unit 200 from the received information and acquires the public key of the contents playback unit 200 .
- the use condition updating unit 316 verifies the signature of the information received in Step S 1901 , based on the public key ( FIG. 19 : Step S 1902 ). When the signature verification result is no good, the use condition updating unit 316 does not update the conditions of use, and performs the processing in and after Step S 1905 .
- the use condition updating unit 316 specifies and acquires a right that includes the conditions of use of the update target from the rights storing unit 315 , based on the package identifier and the content name contained in the information received in Step S 1901 ( FIG. 19 : Step S 1903 ).
- the use condition updating unit 316 updates the conditions of use, based on the conditions of use contained in the right and the playback history contained in the information received in Step S 1901 and stores the right containing the updated conditions of use into the rights storing unit 315 ( FIG. 19 : Step S 1904 ). More specifically, when the conditions of use indicates the playback number of times is “five”, and the playback history indicates “two times” of playback, the conditions of use is updated to indicate that the playback number of times is “three”.
- the use condition updating unit 316 signs a piece of data that contains at least a processing result, with the secret key of the license management client A 230 and generates a message with a signature to be transmitted ( FIG. 19 : Step S 1905 ). More specifically, a signature error, a normal termination, or use condition update error may be set as a processing result.
- the use condition updating unit 316 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 19 : Step S 1906 ).
- connection destination module is the license server 104 .
- the use condition updating unit 308 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 1813 ( FIG. 19 : Step S 1901 ).
- the use condition updating unit 308 extracts the public key certificate of the contents playback unit 200 from the received information and acquires the public key of the contents playback unit 200 .
- the use condition updating unit 308 verifies the signature of the information received in Step S 1901 , based on the public key ( FIG. 19 : Step S 1902 ). When the signature verification result is no good, the use condition updating unit 308 does not update the conditions of use, and performs the processing in and after Step S 1905 .
- the use condition updating unit 308 acquires the conditions of use of the update target from the use condition storing unit 306 , based on the package identifier and the content name contained in the information received in Step S 1901 ( FIG. 19 : Step S 1903 ).
- the use condition updating unit 308 updates the conditions of use, from the conditions of use and the playback history contained in the information received in Step S 1901 and stores the updated conditions of use into the use condition storing unit 306 ( FIG. 19 : Step 1904 ).
- the use condition updating unit 308 signs a piece of data that contains at least the processing result with the secret key of the license server 104 and generates a message with a signature to be transmitted ( FIG. 19 : Step S 1905 ).
- the use condition updating unit 316 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 19 : Step S 1906 ).
- Step S 1306 in FIG. 13 The following describes the next playback content specification process 1 in Step S 1306 in FIG. 13 , with reference to the flow chart in FIG. 20 .
- the playback control unit 202 controls the reading unit 201 so that playback control information 211 is acquired from the medium 102 ( FIG. 20 : Step S 2001 ).
- the playback control unit 202 searches in the playback control information 211 , based on a content name of the content of which the playback has just completed, to specify the Next-playback Number that corresponds to the content name ( FIG. 20 : Step S 2002 ).
- the playback control unit 202 specifies a content name of the content to be played back next based on the Next-playback Number ( FIG. 20 : Step S 2003 ).
- the rights acquiring unit 311 of the license management client A 230 transmits the package identifier and the content name to the license server 104 .
- the transmission control unit 302 of the license server 104 performs user authentication and other processing and judges whether or not it is acceptable to transmit a right.
- the transmission control unit 302 instructs the right generating unit 303 to generate a right.
- the transmission control unit 302 replies to the license management client A 230 with a reason why the transmission of a right is no good.
- the right generating unit 303 acquires conditions of use that corresponds to the package identifier and the content name from the use condition storing unit 306 and acquires a corresponding right key from the key storing unit 305 , so as to generate a right.
- the right generating unit 303 transmits the right to the right transmitting unit 301 .
- the rights transmitting unit 301 transmits the right to the right acquiring unit 311 of the license management client A 230 .
- the right acquiring unit 311 stores the right received from the rights transmitting unit 301 into the rights storing unit 315 .
- the right acquisition processing starts as a result of the user explicitly operates the operation unit 221 ; however, it is acceptable to have an arrangement wherein a right is automatically acquired when purchase of contents is completed, or a right is automatically acquired as a result of prediction of the contents to be played back next based on a playback history of contents.
- the following describes the contents playback system of the second embodiment of the present invention.
- the contents playback system of the second embodiment has almost the same configuration and operates almost in the same manner as the contents playback system of the first embodiment except that there are partial differences; therefore, only the differences from the first embodiment will be described. Also, the same reference signs are used in the drawings to describe the components in common.
- the first embodiment describes a case where, when the contents playback unit 200 is to acquire a rights key, the connection destination module is the same as the module transmitting the rights key.
- the second embodiment describes a case where, when the contents playback unit 200 is to acquire a rights key, the connection destination module is not necessarily the same as the module transmitting the rights key.
- FIG. 21 shows the internal structure of the terminal device 101 and information recorded on the medium 102 .
- the terminal device 101 comprises: a contents playback unit 200 ; an operation unit 221 ; a display unit 222 ; a key acquisition intermediary unit 223 ; a license management client A 230 ; and a license management client B 240 .
- the contents playback unit 200 comprises: a reading unit 201 ; a playback control unit 202 ; a decrypting unit 203 ; a key acquisition control unit 204 ; a media key generating unit 205 ; and a key storing unit 206 operable to store therein a rights key.
- FIG. 22 shows the internal structure of the license server 104 , the license management client A 230 , and the license management client B 240 .
- the internal structure of the license management client A 230 is shown as a representative, since the license management client A 230 and the license management client B 240 have the same structure.
- the following describes the internal structure of the license management client A 230 .
- the license management client A 230 comprises: a rights acquiring unit 311 ; a key extracting unit 312 ; a usability judging unit 313 ; a key transmitting unit 314 operable to transmit a rights key to the outside; a rights storing unit 315 ; and a use condition updating unit 316 ; and an acquisition source judging unit 317 operable to judge an acquisition source from which a rights key is acquired.
- Playback control information 211 and key control information 213 stored in the medium 102 will be described with reference to FIGS. 23 ad 24 .
- the data structures of other kinds of data will be omitted since they are the same as those in the first embodiment.
- FIG. 23 shows an example of data structure of the playback control information 211 .
- the playback control information 211 includes eight kinds of information as below:
- This information is paired with “Corresponding Rights Format Information” and is for specifying a connection destination when a rights key is to be acquired, for a line in which the key generation information is specified as a rights key or a composite key.
- This information is paired with “Corresponding Rights Format Information” and is for specifying an acquisition source from which a rights key is acquired for a line in which the key generation information is specified as a rights key or a composite key.
- “Client A” is specified as the connection destination
- “Server” is specified as the acquisition source; consequently, when acquiring a rights key for the content, the contents playback unit 200 connects to the license management client A 230 in Format D 1 , and acquires a rights key from the license server 104 via the license management client A 230 .
- the connection destination is different from the acquisition source
- the acquisition source is the license server 104 .
- the acquisition source is the license management client contents.
- FIG. 24 shows an example of data structure of the key control information 213 .
- the key control information 213 includes six kinds of information as below:
- a public key certificate of the connection destination module is set. It should be noted that, in this example, a public key certificate of the connection destination module is set; however, it is acceptable to have an arrangement wherein a piece of identification information that uniquely identifies a public key certificate of the acquisition source module is set, and the contents playback unit 200 acquires the public key certificate of the acquisition source module according to the piece of identification information. Alternatively, it is acceptable to set the public key of the acquisition source module in each line.
- the piece of identification information that uniquely identifies a public key certificate of the acquisition source module may be, for example, Corresponding Rights Format Information and Acquisition Source Type.
- the following describes the processing performed by the terminal device 101 to playback the contents stored in the medium 102 and complete the playback, with reference to FIGS. 25 through 30 .
- the key acquisition trigger detection unit instructs the playback control unit 202 to acquire a content key ( FIG. 25 : Step S 2501 ).
- Examples of such an event include: turning the power of the terminal device 101 on; inserting the medium 102 into the terminal device 101 ; a key acquisition instruction from the user; and presenting a menu with a list of contents of which the playback is possible to the user based on the playback control information 211 .
- the playback control unit 202 controls the reading unit 201 so that the playback control information 211 is read from the medium 102 , acquires the content name that corresponds to the Playback Number 1, and specifies the content to be played back.
- the playback control unit 202 performs, with the use of the playback control information 211 and the content name, the content key acquisition storing process 2 to be described later with reference to the flowchart in FIG. 26 , and stores the acquired content key into the key storing unit 206 ( FIG. 25 : Step S 2502 ).
- Step S 2502 in order to present a menu with a list of contents of which the playback is possible to the user, the processing in Step S 2502 is repeated for each of the content names, and the user will be notified that contents whose content keys have been acquired are the contents of which the playback is possible, and that contents whose contents key have not been acquired are the contents of which the playback is not possible.
- those contents of which the playback is not possible may be indicated with gray shades.
- the user selects a content to be played back from the list of contents via the operation unit 221 .
- the operation unit 221 inputs the content name that corresponds to the content to the playback control unit 202 .
- the playback control unit 202 specifies a content being a playback target based on the content name ( FIG. 25 : Step S 2503 )
- the playback control unit 202 extracts the package identifier from the playback control information 211 and transmits the extracted package identifier along with the content name to the key acquisition control unit 204 .
- the key acquisition control unit 204 acquires a content key, playback control conditions, and a use condition type that correspond to the content being the playback target, from the key storing unit 206 , based on the package identifier and the content name.
- the key acquisition control unit 204 transmits the content name, the content key, the playback control conditions, and the use condition type to the decrypting unit 203 and instructs the decrypting unit 203 to play back the contents.
- the decrypting unit 203 performs the contents playback process 2 ( FIG. 25 : Step S 2504 ), to be described later with reference to the flow chart in FIG. 29 .
- the decrypting unit 203 When the playback of the contents being the playback target in Step S 2504 is completed, the decrypting unit 203 notifies the playback control unit 202 that the playback is completed.
- the playback control unit 202 judges whether or not there is a playback continuation instruction from the user ( FIG. 25 : Step S 2505 ). When there is no playback continuation instruction, the playback control unit 202 completes the playback processing.
- the playback control unit 202 When there is a playback continuation instruction, the playback control unit 202 performs the next playback content specification process 1 which has been described earlier with reference to the flow chart in FIG. 20 , and the procedure returns to the processing in Step S 2504 ( FIG. 25 : Step S 2506 ).
- the playback control unit 202 specifies a piece of corresponding rights format information that corresponds to the content being the playback target from the playback control information 211 , based on the content name ( FIG. 26 : Step S 2601 ).
- the playback control unit 202 judges whether or not a rights key is required, according to the corresponding rights format information ( FIG. 26 : Step S 2602 ). More specifically, when corresponding rights format information is set, the playback control unit 202 judges that a rights key is required. When no information is set as corresponding rights format information, the playback control unit 202 judges that a rights key is not required.
- the playback control unit 202 When having judged that a rights key is required, the playback control unit 202 performs the rights key acquisition process 2 ( FIG. 26 : S 2603 ), to be described later with reference to the flow chart in FIG. 27 .
- the playback control unit 202 After performing the rights key acquisition process 2 , the playback control unit 202 checks whether or not a rights key has been acquired ( FIG. 26 : Step S 2604 ).
- the playback control unit 202 performs the rights key acquisition process 2 again.
- the playback control unit 202 When having confirmed that a rights key has been acquired, the playback control unit 202 extracts a package identifier from the playback control information 211 , and transmits the acquired rights key, playback control conditions, a use condition type, the extracted package identifier, and the content name to the key acquisition control unit 204 , as well as instructs the key acquisition control unit 204 to generate a content key and store various data.
- the key acquisition control unit 204 controls the reading unit 201 so that so that key control information 213 is acquired from the medium 102 .
- the key acquisition control unit 204 specifies a piece of key generation information that corresponds to the content being the playback target from the key control information 213 , based on the content name.
- the key acquisition control unit 204 judges whether or not a media key is required, based on the piece of key generation information ( FIG. 26 : Step S 2605 ). More specifically, when the piece of key generation information indicates a rights key or a composite key, the key acquisition control unit 204 judges that a media key is required. When the piece of key generation information indicates a rights key, the key acquisition control unit 204 judges that a media key is not required.
- the key acquisition control unit 204 transmits the content name to the media key generating unit 205 and instructs the media key generating unit 205 to generate a media key.
- the media key generating unit 205 performs the media key acquisition process 1 ( FIG. 26 : Step S 2606 ), which has been described earlier with reference to the flow chart in FIG. 17 .
- the media key generating unit 205 transmits the media key generated in the media key acquisition process 1 to the key acquisition control unit 204 .
- the key acquisition control unit 204 generates a content key from the rights key and the media key and stores the generated content key along with the playback control conditions and the use condition type into the key storing unit 206 ( FIG. 26 : Step S 2607 ).
- the method of generating a content key from a rights key and a media key is the same as the one described in the first embodiment.
- the key acquisition control unit 204 When the content key, the playback control conditions, the use condition type have been stored, the key acquisition control unit 204 notifies the playback control unit 202 that storing of the content key has been, completed.
- the playback control unit 202 When having judged that a rights key is not required in Step S 2602 , the playback control unit 202 extracts a package identifier from the playback control information 211 and transmits the package identifier and the content name to the key acquisition control unit 204 and instructs the key acquisition control unit 204 to generate and store a content key.
- the key acquisition control unit 204 transmits the content name to the media key generating unit 205 and instructs the media key generating unit 205 to generate a media key.
- the media key generating unit 205 performs the media key acquisition process 1 ( FIG. 26 : Step S 2611 ), which has been described earlier with reference to the flow chart in FIG. 17 .
- the media key generating unit 205 transmits the media key generated in the media key acquisition process 1 to the key acquisition control unit 204 .
- the key acquisition control unit 204 stores the received media key being a content key along with the playback control conditions and the use condition type into the key storing unit 206 , in such a manner that the stored information is in correspondence with the package identifier and the content name.
- the key acquisition control unit 204 When storing of the content key, the playback control conditions, and the use condition type has been completed, the key acquisition control unit 204 notifies the playback control unit 202 that storing of the content key is completed.
- the playback control unit 202 specifies a connection destination module, according to the priority level indicated in the playback control information 211 ( FIG. 27 : Step S 2701 ).
- the playback control unit 202 transmits five kinds of information including a piece of information that identifies the connection destination module specified in Step S 2701 to the key acquisition intermediary unit 223 ( FIG. 27 : Step S 2702 ).
- the transmitted information includes a package identifier, a content name, corresponding rights format information, a connection destination type, an acquisition source type, and a public key certificate of the contents playback unit 200 .
- the key acquisition intermediary unit 223 receives the information transmitted by the playback control unit 202 in Step S 2702 ( FIG. 27 : Step S 2711 ).
- the key acquisition intermediary unit 223 extracts the corresponding rights format information and the connection destination type from the information received in Step S 2711 , and establishes communication with the connection destination module specified from these two kinds of information ( FIG. 27 : Step S 2712 ).
- the key acquisition intermediary unit 223 extracts the package identifier, the content name, the acquisition source type, and the public key certificate of the contents playback unit 200 from the information received in Step S 2711 , and transmits the extracted information to the connection destination module ( FIG. 27 : Step S 2713 ).
- connection destination module which is one of the license management client A 230 , the license management client B 240 , and the license server 104 , performs the rights key transmission process 2 ( FIG. 27 : Step S 2721 ), to be described later with reference to the flow chart in FIG. 28 .
- the key acquisition intermediary unit 223 receives a message with a signature from the connection destination module ( FIG. 27 : Step S 2714 ).
- the message with the signature is obtained by signing a data that contains at least a right key encrypted with the public key of the contents playback unit 200 , playback control conditions, and a use condition type, with the secret key of the acquisition source module.
- the key acquisition intermediary unit 223 transmits the message with the signature to the playback control unit 202 (FIG. 27 : Step S 2715 ).
- the playback control unit 202 receives the message with the signature from the key acquisition intermediary unit 223 ( FIG. 27 : Step S 2703 ).
- the playback control unit 202 transmits the content name and the message with the signature to the key acquisition control unit 204 and instructs the key acquisition control unit 204 to verify the signature.
- the key acquisition control unit 204 controls the reading unit 201 so that key control information 213 is acquired from the medium 102 .
- the key acquisition control unit 204 acquires a public key certificate that corresponds to the content being the playback target from the key control information 213 , based on the content name.
- the key acquisition control unit 204 verifies the message with the signature, using the public key certificate ( FIG. 27 : Step S 2704 ).
- the key acquisition control unit 204 completes the content key acquisition processing and transmits an error message to the playback control unit 202 .
- the key acquisition control unit 204 decrypts the encrypted rights key contained in the message with the signature, using the secret key of the contents playback unit 200 and acquires the rights key ( FIG. 27 : Step S 2705 ).
- the key acquisition control unit 204 transmits the rights key, the playback control conditions, the use condition type to the playback control unit 202 and notifies that acquisition of the rights key is completed.
- the rights key transmission process 2 varies depending on which connection destination module is the subject of the operation; therefore, explanation is provided on each case.
- connection destination module is either the license management client A 230 or the license management client B 240 , taking the license management client A 230 as a representative example.
- the acquisition source judging unit 317 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 2713 ( FIG. 28 : Step S 2801 ).
- the acquisition source judging unit 317 extracts the corresponding rights format information and the acquisition source type from the received information.
- the acquisition source judging unit 317 judges whether or not the acquisition source module from which the rights key is acquired is an outside module, based on the acquisition source type ( FIG. 28 : Step S 2831 ). More specifically, the acquisition source judging unit 317 judges whether the value being set as the acquisition source type matches the type information of its own. When the value does not match its own type information, the acquisition source judging unit 317 judges that the acquisition source is an outside module. When the value matches its own type information, the acquisition source judging unit 317 judges that the acquisition source is itself.
- the acquisition source judging unit 317 When the acquisition source module is an outside module, the acquisition source judging unit 317 establishes connection with the outside module specified by the corresponding rights format information and the acquisition source type. More specifically, when Format D 1 is specified as the corresponding right format information, and a server is specified as the acquisition source type, the acquisition source judging unit 317 establishes communication with the license server 104 that corresponds to Format D 1 .
- the acquisition source judging unit 317 extracts the package identifier, the content name, and the public key certificate of the contents playback unit 200 from the received information, and transmits the extracted information to the outside module ( FIG. 28 : Step S 2811 ).
- the outside module When having received the information transmitted by the acquisition source judging unit 317 in Step S 2811 , the outside module performs the rights key transmission process 1 , which has been described earlier with reference to the flow chart in FIG. 16 , and transmits a message with a signature to the license management client A 230 .
- the license management client A 230 receives the message with the signature ( FIG. 28 : Step S 2812 ).
- the license management client A 230 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 28 : Step S 2813 ).
- the acquisition source judging unit 317 transmits the received information to the usability judging unit 313 and instructs the usability judging unit 313 to perform usability judging processing based on the conditions of use.
- Steps from S 2802 to S 2808 is the same as the processing in Steps from S 1602 to S 1608 described in the first embodiment; therefore, explanation will be omitted.
- connection destination module is the license server 104 .
- the connection destination is the license server 104
- the rights key acquisition source is also the license server 104 .
- connection destination and the acquisition source are both the license server 104
- the processing performed when the connection destination and the acquisition source are both the license server 104 is the same as the rights key transmission process 1 in the first embodiment; therefore, explanation will be omitted.
- the decrypting unit 203 acquires a content key, playback control conditions, a use condition type, and a content name from the key acquisition control unit 204 .
- Steps from S 2901 to S 2907 is the same as the processing in Steps from S 1801 to Step 1807 described in the first embodiment; therefore, explanation will be omitted.
- the decrypting unit 203 transmits the playback history and a history transmission instruction to the key acquisition control unit 204 .
- the key acquisition control unit 204 transmits the playback history received from the decrypting unit 203 to the playback control unit 202 and instructs the playback control unit 202 to transmit the playback history.
- the playback control unit 202 transmits, to the key acquisition intermediary unit 223 , (i) transmission data containing six kinds of information including at least information of a connection destination module and an acquisition source module, (ii) a message with a signature obtained by signing, with the secret key of the contents playback unit 200 , the transmission data from which corresponding rights format information and connection destination type are excluded ( FIG. 29 : Step S 2908 ).
- the transmission data contains a package identifier, a content name, corresponding rights format information, a connection destination type, an acquisition source type, a public key certificate of the contents playback unit 200 , and a playback history.
- the key acquisition intermediary unit 223 receives the message with the signature transmitted by the key acquisition control unit 204 in Step S 2908 ( FIG. 29 : Step S 2911 ).
- the key acquisition intermediary unit 223 extracts the corresponding rights format information and the connection destination type from the message with the signature received in Step S 2908 and establishes communication with the connection destination module specified by these two kinds of information ( FIG. 29 : Step S 2912 ).
- the key acquisition intermediary unit 223 extracts the package identifier, the content name, the acquisition source type, the public key certificate of the contents playback unit 200 , the playback history, and the signature data from the message with the signature received in Step S 2908 , and transmits the extracted information to the use condition updating unit 316 of the connection destination module ( FIG. 29 : Step S 2913 ).
- connection destination module which is one of the license management client A 230 , the license management client B 240 , and the license server 104 , performs the use condition update process 2 ( FIG. 29 : Step S 2921 ), to be described later with reference to the flow chart in FIG. 30 .
- the key acquisition intermediary unit 223 receives, from the connection destination module, a message with a signature obtained by signing a piece of data that contains at least a result of the use condition processing with the secret key of the acquisition source module ( FIG. 29 : Step S 2914 ).
- the key acquisition intermediary unit 223 transmits the message with the signature to the key acquisition control unit 204 ( FIG. 29 : Step S 2915 ).
- Steps from S 2909 to S 2907 B is the same as the processing in Steps from S 1809 to S 180 B described in the first embodiment; therefore, explanation will be omitted.
- connection destination module is the subject of the operation; therefore, explanation is provided on each case.
- connection destination module is either the license management client A 230 or the license management client B 240 , taking the license management client A 230 as a representative example.
- the acquisition source judging unit 317 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 2913 ( FIG. 30 : Step S 3001 ).
- the acquisition source judging unit 317 extracts the corresponding rights format information and an acquisition source type from the received information.
- the acquisition source judging unit 317 judges whether or not the module that updates the conditions of use is an outside module, based on the acquisition source type ( FIG. 30 : Step S 3002 ). More specifically, the acquisition source judging unit 317 judges whether the value being set as the acquisition source type matches the type information of its own. When the value does not match its own type information, the acquisition source judging unit 317 judges that the module that updates the conditions of use is an outside module. When the value matches its own type information, the acquisition source judging unit 317 judges that the module that updates the conditions of use is itself.
- the acquisition source judging unit 317 establishes connection with the outside module specified by the corresponding rights format information and the acquisition source type.
- the acquisition source judging unit 317 extracts the package identifier, the content name, and the public key certificate of the contents playback unit 200 , the playback history, and the signature data from the received information, and transmits the extracted information to the outside module ( FIG. 30 : Step S 3011 ).
- the outside module When having received the information transmitted by the acquisition source judging unit 317 in Step S 3011 , the outside module performs the use condition update process 1 , which has been described earlier with reference to the flow chart in FIG. 19 , and transmits a message with a signature to the license management client A 230 .
- the license management client A 230 receives the message with the signature ( FIG. 30 : Step S 3012 ).
- the license management client A 230 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 30 : Step S 3013 ).
- the acquisition source judging unit 317 transmits the received information to the usability judging unit 313 and instructs the usability judging unit 313 to perform the use condition update process.
- Step S 3003 to Step S 3007 The processing in Steps from S 3003 to Step S 3007 is the same as the processing in Steps from S 1902 to S 1906 described in the first embodiment; therefore, explanation will be omitted.
- connection destination module is the license server 104 .
- the connection destination is the license server 104
- the rights key acquisition source is also the license server 104 .
- connection destination and the acquisition source are both the license server 104
- the processing performed when the connection destination and the acquisition source are both the license server 104 is the same as the rights key transmission process 1 in the first embodiment; therefore, explanation will be omitted.
- the following describes the processing to be performed in a case where the contents playback unit 200 does not include the key storing unit 206 .
- the playback control unit 202 When having detected an event upon which a menu with a list of contents should be displayed, the playback control unit 202 has a menu with a list of contents displayed on the display device 103 . Examples of such an event include: turning the power of the terminal device 101 on; inserting the medium 102 into the terminal device 101 ; a key acquisition instruction from the user; and presenting a menu with a list of contents of which the playback is possible to the user based on the playback control information 211 .
- the user specifies a desired content from the menu with a list of contents and notifies the content name to the playback control unit 202 via the operation unit 221 .
- the playback control unit 202 performs the processing before the storing of the content key, the playback control conditions, and the use condition type performed by the key acquisition control unit 204 in the content key acquisition storing process 2 , which has been described earlier with reference to the flow chart in FIG. 26 .
- the key acquisition control unit 204 transmits the content name, the content key, the playback control conditions, and the use condition type to the decrypting unit 203 and instructs the decrypting unit 203 to play back the content.
- the decrypting unit 203 performs the contents playback process 2 , which has been described earlier with reference to the flow chart in FIG. 29 .
- the key generation information in the key control information 213 indicates a media key or a composite key, and a media key is required for playback of a content
- Steps from S 2605 through S 2607 and Step S 2611 shown in FIG. 26 are not performed in the content key acquisition storing process 2 .
- Steps from S 2605 to S 2607 shown in FIG. 26 before Step S 2901 shown in FIG. 29 in the contents playback process 2 .
- the signature of the transmission source module is used in order to check whether the transmission source module of the rights key is a predetermined module.
- SAC secure authenticated channel
- SSL Secure Socket Layer
- TLS Transport Layer Security
- the medium 102 stores therein a program of the license management client operating on the terminal device 101 , a playback control program operating on the contents playback unit 200 , a content decryption program, a key acquisition control program, and a media key generation program.
- the programs stored in the medium 102 are read at a trigger of, for example, turning the power of the terminal device 101 on, inserting the medium 102 , or a user operation.
- a connection destination is specified based on the corresponding rights format information and the connection destination type contained in the playback control information 211 or the key control information 213 stored in the medium 102 .
- the contents playback unit 200 sequentially connects to connectable modules one by one and performs signature verification of a reply message in each processing. More specifically, it is acceptable to have an arrangement wherein the contents playback unit 200 sequentially connects to connectable modules one by one and verifies a signature of each message. In a case where the signature verification result is not good, the contents playback unit 200 connects to another module, and in a case where the signature verification result is OK, the contents playback unit 200 continues the contents playback processing.
- the first and second embodiments describe that, in a case where there are two or more connection destinations with respect to a content name at the time of acquiring a rights key, the connection destination module is determined based on the priority order recorded in the key control information 213 or the playback control information 211 stored in the medium 102 ; however, it is acceptable to have an arrangement wherein the contents playback unit 200 stores therein a priority order, and the connection destination module is determined according to the priority order stored in the contents playback unit 200 .
- the priority order may be set as “the license management client A 230 is prioritized over the license server 104 ” or “the license management client A 230 in Format D 2 is prioritized over the license management client A 230 in Format D 1 ”
- the priority order stored in the contents playback unit 200 may be set when the contents playback unit 200 is manufactured. Alternatively, the priority order may be obtained from another device via the transmission line 105 , or may be obtained from the medium 102 . Further, when a priority order is set in both the medium 102 and the contents playback unit 200 , it is acceptable that medium 102 records thereon information that indicates which one of those two priority orders is prioritized. Furthermore, it is acceptable to have an arrangement wherein the contents playback unit 200 stores therein the corresponding rights format information, the connection destination type, and the acquisition source type, as well as the priority order.
- the first and second embodiments describe that it is judged whether or not a playback history is transmitted to an acquisition source module based on the use condition type after the contents are played back; however, it is acceptable to have an arrangement wherein the contents playback information contains no use condition type, and a playback history is always transmitted or a playback history is never transmitted.
- the license server 104 After a rights key is transmitted, the license server 104 , the license management client A 230 , and the license management client B 240 each lock the corresponding conditions of use so that they are not usable, and a request from a different terminal device for a rights key is rejected.
- the apparatus and the method for playing back encrypted contents and the recording medium storing therein data to be used by the apparatus and the method according to the present invention is suitable for playback of contents from a medium that stores therein both contents to which conventional copy protection is applied and contents to which DRM is applied and is useful in the field of package media and contents distribution.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Finance (AREA)
- Power Engineering (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Television Signal Processing For Recording (AREA)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/880,504 US20060005257A1 (en) | 2004-07-01 | 2004-07-01 | Encrypted contents recording medium and apparatus and method for reproducing encrypted contents |
US11/629,352 US7940935B2 (en) | 2004-07-01 | 2005-06-30 | Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium |
CNA2005800224020A CN1989560A (zh) | 2004-07-01 | 2005-06-30 | 内容重放装置,内容重放方法,计算机程序,密钥传递装置,以及记录介质 |
PCT/IB2005/003092 WO2006046099A2 (fr) | 2004-07-01 | 2005-06-30 | Appareil de restitution de contenus, procede de restitution de contenus, programme d'ordinateur, appareil de relais de cles, et support d'enregistrement |
JP2007518740A JP4778965B2 (ja) | 2004-07-01 | 2005-06-30 | コンテンツ再生装置、コンテンツ再生方法、コンピュータプログラム、鍵中継装置及び記録媒体 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/880,504 US20060005257A1 (en) | 2004-07-01 | 2004-07-01 | Encrypted contents recording medium and apparatus and method for reproducing encrypted contents |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/629,352 Continuation-In-Part US7940935B2 (en) | 2004-07-01 | 2005-06-30 | Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060005257A1 true US20060005257A1 (en) | 2006-01-05 |
Family
ID=35515567
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/880,504 Abandoned US20060005257A1 (en) | 2004-07-01 | 2004-07-01 | Encrypted contents recording medium and apparatus and method for reproducing encrypted contents |
US11/629,352 Expired - Fee Related US7940935B2 (en) | 2004-07-01 | 2005-06-30 | Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/629,352 Expired - Fee Related US7940935B2 (en) | 2004-07-01 | 2005-06-30 | Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium |
Country Status (4)
Country | Link |
---|---|
US (2) | US20060005257A1 (fr) |
JP (1) | JP4778965B2 (fr) |
CN (1) | CN1989560A (fr) |
WO (1) | WO2006046099A2 (fr) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050201726A1 (en) * | 2004-03-15 | 2005-09-15 | Kaleidescape | Remote playback of ingested media content |
US20060020859A1 (en) * | 2004-07-22 | 2006-01-26 | Adams Neil P | Method and apparatus for providing intelligent error messaging |
US20060037055A1 (en) * | 2004-08-04 | 2006-02-16 | Konica Minolta Business Technologies, Inc. | Audio data communication system, audio data transmission apparatus, audio data reception apparatus, composite data communication system, composite data transmission apparatus and composite data reception apparatus |
US20060095384A1 (en) * | 2004-10-28 | 2006-05-04 | Fujitsu Limited | Apparatus with electronic information transfer function or the like, program for electronic information transfer, and method for electronic information transfer |
US20070083473A1 (en) * | 2005-10-11 | 2007-04-12 | Farrugia Augustin J | Use of media storage structure with multiple pieces of content in a content-distribution system |
US20070220585A1 (en) * | 2006-03-01 | 2007-09-20 | Farrugia Augustin J | Digital rights management system with diversified content protection process |
US20070260548A1 (en) * | 2006-05-03 | 2007-11-08 | Apple Computer, Inc. | Device-independent management of cryptographic information |
US20070283449A1 (en) * | 2006-04-27 | 2007-12-06 | Scott Blum | Controlled content release system and method |
US20080263582A1 (en) * | 2004-08-20 | 2008-10-23 | Ryuichi Okamoto | Content Reproducing Device and Content Preproducing Method |
US20080294561A1 (en) * | 2007-05-22 | 2008-11-27 | Microsoft Corporation | Media content deciphered when initiated for playback |
US20080294901A1 (en) * | 2007-05-22 | 2008-11-27 | Farrugia Augustin J | Media Storage Structures for Storing Content, Devices for Using Such Structures, Systems for Distributing Such Structures |
US20090282241A1 (en) * | 2006-04-13 | 2009-11-12 | Hemma Prafullchandra | Method and apparatus to provide a user profile for use with a secure content service |
US20100058047A1 (en) * | 2008-08-28 | 2010-03-04 | General Instrument Corporation | Encrypting a unique cryptographic entity |
US8346807B1 (en) | 2004-12-15 | 2013-01-01 | Nvidia Corporation | Method and system for registering and activating content |
US8359332B1 (en) | 2004-08-02 | 2013-01-22 | Nvidia Corporation | Secure content enabled drive digital rights management system and method |
US8402283B1 (en) | 2004-08-02 | 2013-03-19 | Nvidia Corporation | Secure content enabled drive system and method |
EP2571026A3 (fr) * | 2011-09-15 | 2013-09-11 | Sony Corporation | Appareil de traitement d'informations, procédé et programme de traitement d'informations |
WO2014011312A1 (fr) * | 2012-07-10 | 2014-01-16 | Raytheon Bbn Technologies Corp. | Dispositif usb/cd anti-wikileaks |
US8751825B1 (en) * | 2004-12-15 | 2014-06-10 | Nvidia Corporation | Content server and method of storing content |
US8788425B1 (en) | 2004-12-15 | 2014-07-22 | Nvidia Corporation | Method and system for accessing content on demand |
US8813257B2 (en) | 2010-04-28 | 2014-08-19 | Panasonic Corporation | Download terminal, and content utilization system |
US8875309B1 (en) | 2004-12-15 | 2014-10-28 | Nvidia Corporation | Content server and method of providing content therefrom |
US8893299B1 (en) | 2005-04-22 | 2014-11-18 | Nvidia Corporation | Content keys for authorizing access to content |
US9311492B2 (en) | 2007-05-22 | 2016-04-12 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US20160314283A1 (en) * | 2013-11-05 | 2016-10-27 | Fox Broadcasting Company | Method and apparatus for portably binding license rights to content stored on optical media |
US9712321B2 (en) | 2008-02-27 | 2017-07-18 | International Business Machines Corporation | Unified broadcast encryption system |
US11695796B1 (en) * | 2020-12-10 | 2023-07-04 | Amazon Technologies, Inc. | Device vulnerability detection during device handshake |
US20230401292A1 (en) * | 2017-04-04 | 2023-12-14 | Nagravision S.A. | Security of surveillance media |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10181953B1 (en) * | 2013-09-16 | 2019-01-15 | Amazon Technologies, Inc. | Trusted data verification |
JP4692003B2 (ja) * | 2005-02-10 | 2011-06-01 | ソニー株式会社 | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム |
JP2007043389A (ja) * | 2005-08-02 | 2007-02-15 | Ricoh Co Ltd | 情報管理方法、情報管理システム、情報管理用サーバ装置及び記録媒体 |
CN101887736B (zh) * | 2005-11-15 | 2012-11-21 | 松下电器产业株式会社 | 再现装置及其控制方法 |
US8155506B2 (en) * | 2006-01-17 | 2012-04-10 | Broadcom Corporation | System and method for transport PID version check |
JP4864081B2 (ja) * | 2006-03-30 | 2012-01-25 | 富士通株式会社 | 電子装置および情報処理装置 |
US8102863B1 (en) | 2006-06-27 | 2012-01-24 | Qurio Holdings, Inc. | High-speed WAN to wireless LAN gateway |
US8615778B1 (en) | 2006-09-28 | 2013-12-24 | Qurio Holdings, Inc. | Personalized broadcast system |
US7983440B1 (en) | 2006-11-02 | 2011-07-19 | Qurio Holdings, Inc. | Selection of I-frames for client-side watermarking |
US7738676B1 (en) | 2006-11-02 | 2010-06-15 | Qurio Holdings, Inc. | Client-side watermarking using hybrid I-frames |
US7802306B1 (en) | 2006-11-30 | 2010-09-21 | Qurio Holdings, Inc. | Multiple watermarks for digital rights management (DRM) and content tracking |
US8000474B1 (en) * | 2006-12-15 | 2011-08-16 | Quiro Holdings, Inc. | Client-side protection of broadcast or multicast content for non-real-time playback |
JP2008234721A (ja) * | 2007-03-19 | 2008-10-02 | Nippon Telegr & Teleph Corp <Ntt> | 映像再生装置 |
US8135947B1 (en) | 2007-03-21 | 2012-03-13 | Qurio Holdings, Inc. | Interconnect device to enable compliance with rights management restrictions |
US7895442B1 (en) | 2007-06-18 | 2011-02-22 | Qurio Holdings, Inc. | Interconnect device to enable compliance with rights management restrictions |
US8935796B2 (en) * | 2008-03-14 | 2015-01-13 | Microsoft Corporation | Segment based digital content protection |
US8136139B1 (en) * | 2008-04-10 | 2012-03-13 | Sprint Communications Company L.P. | Receiving over-the-air licenses to high-quality media content |
WO2010041991A1 (fr) * | 2008-10-06 | 2010-04-15 | Telefonaktiebolaget L M Ericsson (Publ) | Gestion de droits numériques dans un environnement commandé par un utilisateur |
WO2010110193A1 (fr) * | 2009-03-24 | 2010-09-30 | 日本電気株式会社 | Dispositif, procédé, programme et système de partage d'informations |
JP5652394B2 (ja) * | 2009-05-27 | 2015-01-14 | 日本電気株式会社 | 通信装置及び通信方法 |
JP5560723B2 (ja) * | 2010-01-13 | 2014-07-30 | ソニー株式会社 | 情報処理装置および方法、並びに、情報処理システムおよび方法 |
JPWO2011111213A1 (ja) * | 2010-03-11 | 2013-06-27 | 株式会社東芝 | コンテンツ配信システム、配信サーバ、及びユーザ端末 |
JP5050114B1 (ja) * | 2011-04-28 | 2012-10-17 | 株式会社東芝 | 情報記録装置 |
JP2012248135A (ja) * | 2011-05-31 | 2012-12-13 | Sony Corp | 情報処理装置、および情報処理方法、並びにプログラム |
US9223939B2 (en) * | 2012-10-11 | 2015-12-29 | Activision Publishing, Inc. | Key generation method |
CN104904156B (zh) * | 2013-01-08 | 2018-09-18 | 三菱电机株式会社 | 认证处理装置、认证处理系统以及认证处理方法 |
US9348903B2 (en) | 2013-02-08 | 2016-05-24 | John Moran | Methods, devices and computer readable mediums for a music recognition game |
US10181040B2 (en) * | 2013-07-19 | 2019-01-15 | Disney Enterprises, Inc. | Alternate content playlist for locked media content |
WO2015075860A1 (fr) * | 2013-11-21 | 2015-05-28 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | Appareil de lecture et procédé de lecture |
US10641423B2 (en) | 2016-06-09 | 2020-05-05 | Nordson Corporation | Adapters for connecting a separated-outlet fluid cartridge to a single-inlet mixer, and related methods |
CN109495252A (zh) * | 2018-12-04 | 2019-03-19 | 深圳前海环融联易信息科技服务有限公司 | 数据加密方法、装置、计算机设备及存储介质 |
CN112511299B (zh) * | 2020-12-14 | 2023-09-15 | 深圳数字电视国家工程实验室股份有限公司 | 接口数据传输方法、装置、电子设备及存储介质 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040039907A1 (en) * | 2001-07-26 | 2004-02-26 | Yoichiro Sako | Data recording apparatus and method and data reproducing apparatus and method |
US20050111663A1 (en) * | 2003-11-26 | 2005-05-26 | International Business Machines Corporation | System, method, and service for delivering enhanced multimedia content on physical media |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6516064B1 (en) | 1995-07-25 | 2003-02-04 | Sony Corporation | Signal recording apparatus, signal record medium and signal reproducing apparatus |
JPH11194987A (ja) * | 1998-01-05 | 1999-07-21 | Toshiba Corp | 通信装置 |
JP2000113050A (ja) * | 1998-10-01 | 2000-04-21 | Hitachi Ltd | 電子書籍システム |
US6516065B1 (en) * | 1998-11-30 | 2003-02-04 | Hughes Electronics Corporation | Method for implementing ciphered communication for single-hop terminal-to-terminal calls in a mobile satellite system |
JP2001209583A (ja) * | 2000-01-26 | 2001-08-03 | Sony Corp | データ記録再生器およびセーブデータ処理方法、並びにプログラム提供媒体 |
EP1507261B1 (fr) * | 2001-08-08 | 2016-07-20 | Panasonic Intellectual Property Management Co., Ltd. | Système de protection du droit d'auteur, dispositif d'enregistrement, dispositif de déchiffrage et support d'enregistrement |
US20040078584A1 (en) * | 2002-08-23 | 2004-04-22 | General Instrument Corp. | Interchip transport bus copy protection |
US7693795B2 (en) * | 2002-09-05 | 2010-04-06 | Panasonic Corporation | Digital work protection system |
EP1537466A2 (fr) * | 2002-09-05 | 2005-06-08 | Matsushita Electric Industrial Co., Ltd. | Systeme de gestion de groupe, dispositif de gestion de groupe et dispositif membre |
JP2006004473A (ja) * | 2004-06-15 | 2006-01-05 | Sony Corp | コンテンツ記録媒体、再生許可情報取得方法、コンテンツ再生方法およびコンテンツ再生装置 |
-
2004
- 2004-07-01 US US10/880,504 patent/US20060005257A1/en not_active Abandoned
-
2005
- 2005-06-30 CN CNA2005800224020A patent/CN1989560A/zh active Pending
- 2005-06-30 WO PCT/IB2005/003092 patent/WO2006046099A2/fr active Application Filing
- 2005-06-30 JP JP2007518740A patent/JP4778965B2/ja not_active Expired - Fee Related
- 2005-06-30 US US11/629,352 patent/US7940935B2/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040039907A1 (en) * | 2001-07-26 | 2004-02-26 | Yoichiro Sako | Data recording apparatus and method and data reproducing apparatus and method |
US20050111663A1 (en) * | 2003-11-26 | 2005-05-26 | International Business Machines Corporation | System, method, and service for delivering enhanced multimedia content on physical media |
Cited By (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050201726A1 (en) * | 2004-03-15 | 2005-09-15 | Kaleidescape | Remote playback of ingested media content |
US20110191642A1 (en) * | 2004-07-22 | 2011-08-04 | Research In Motion Limited | Method and apparatus for providing intelligent error messaging |
US8429456B2 (en) | 2004-07-22 | 2013-04-23 | Research In Motion Limited | Method and apparatus for providing intelligent error messaging |
US7802139B2 (en) | 2004-07-22 | 2010-09-21 | Research In Motion Limited | Method and apparatus for providing intelligent error messaging |
US7930591B2 (en) * | 2004-07-22 | 2011-04-19 | Research In Motion Limited | Method and apparatus for providing intelligent error messaging |
US20110010554A1 (en) * | 2004-07-22 | 2011-01-13 | Research In Motion Limited | Method and apparatus for providing intelligent error messaging |
US9110799B2 (en) | 2004-07-22 | 2015-08-18 | Blackberry Limited | Method and apparatus for providing intelligent error messaging |
US7565577B2 (en) * | 2004-07-22 | 2009-07-21 | Research In Motion Limited | Method and apparatus for providing intelligent error messaging |
US20090187796A1 (en) * | 2004-07-22 | 2009-07-23 | Research In Motion Limited | Method and apparatus for providing intelligent error messaging |
US20060020859A1 (en) * | 2004-07-22 | 2006-01-26 | Adams Neil P | Method and apparatus for providing intelligent error messaging |
US8402283B1 (en) | 2004-08-02 | 2013-03-19 | Nvidia Corporation | Secure content enabled drive system and method |
US8359332B1 (en) | 2004-08-02 | 2013-01-22 | Nvidia Corporation | Secure content enabled drive digital rights management system and method |
USRE47772E1 (en) | 2004-08-02 | 2019-12-17 | Nvidia Corporation | Secure content enabled hard drive system and method |
US20060037055A1 (en) * | 2004-08-04 | 2006-02-16 | Konica Minolta Business Technologies, Inc. | Audio data communication system, audio data transmission apparatus, audio data reception apparatus, composite data communication system, composite data transmission apparatus and composite data reception apparatus |
US9106797B2 (en) | 2004-08-20 | 2015-08-11 | Panasonic Intellectual Property Management Co., Ltd. | Content reproducing device and content reproducing method |
US8166555B2 (en) * | 2004-08-20 | 2012-04-24 | Panasonic Corporation | Content reproducing device and content preproducing method |
US20080263582A1 (en) * | 2004-08-20 | 2008-10-23 | Ryuichi Okamoto | Content Reproducing Device and Content Preproducing Method |
US20060095384A1 (en) * | 2004-10-28 | 2006-05-04 | Fujitsu Limited | Apparatus with electronic information transfer function or the like, program for electronic information transfer, and method for electronic information transfer |
US8788430B2 (en) * | 2004-10-28 | 2014-07-22 | Fujitsu Limited | Apparatus with electronic information transfer function or the like, program for electronic information transfer, and method for electronic information transfer |
US8875309B1 (en) | 2004-12-15 | 2014-10-28 | Nvidia Corporation | Content server and method of providing content therefrom |
US8346807B1 (en) | 2004-12-15 | 2013-01-01 | Nvidia Corporation | Method and system for registering and activating content |
US8751825B1 (en) * | 2004-12-15 | 2014-06-10 | Nvidia Corporation | Content server and method of storing content |
US8788425B1 (en) | 2004-12-15 | 2014-07-22 | Nvidia Corporation | Method and system for accessing content on demand |
US8893299B1 (en) | 2005-04-22 | 2014-11-18 | Nvidia Corporation | Content keys for authorizing access to content |
US11727376B2 (en) | 2005-10-11 | 2023-08-15 | Apple Inc. | Use of media storage structure with multiple pieces of content in a content-distribution system |
US8306918B2 (en) * | 2005-10-11 | 2012-11-06 | Apple Inc. | Use of media storage structure with multiple pieces of content in a content-distribution system |
US10296879B2 (en) | 2005-10-11 | 2019-05-21 | Apple Inc. | Use of media storage structure with multiple pieces of content in a content-distribution system |
US20070083473A1 (en) * | 2005-10-11 | 2007-04-12 | Farrugia Augustin J | Use of media storage structure with multiple pieces of content in a content-distribution system |
US20070220585A1 (en) * | 2006-03-01 | 2007-09-20 | Farrugia Augustin J | Digital rights management system with diversified content protection process |
US20090282241A1 (en) * | 2006-04-13 | 2009-11-12 | Hemma Prafullchandra | Method and apparatus to provide a user profile for use with a secure content service |
US20070283449A1 (en) * | 2006-04-27 | 2007-12-06 | Scott Blum | Controlled content release system and method |
US20070260548A1 (en) * | 2006-05-03 | 2007-11-08 | Apple Computer, Inc. | Device-independent management of cryptographic information |
US8224751B2 (en) | 2006-05-03 | 2012-07-17 | Apple Inc. | Device-independent management of cryptographic information |
US10417392B2 (en) | 2006-05-03 | 2019-09-17 | Apple Inc. | Device-independent management of cryptographic information |
US9311492B2 (en) | 2007-05-22 | 2016-04-12 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US10574458B2 (en) | 2007-05-22 | 2020-02-25 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US8347098B2 (en) * | 2007-05-22 | 2013-01-01 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US20080294561A1 (en) * | 2007-05-22 | 2008-11-27 | Microsoft Corporation | Media content deciphered when initiated for playback |
US20080294901A1 (en) * | 2007-05-22 | 2008-11-27 | Farrugia Augustin J | Media Storage Structures for Storing Content, Devices for Using Such Structures, Systems for Distributing Such Structures |
US9712321B2 (en) | 2008-02-27 | 2017-07-18 | International Business Machines Corporation | Unified broadcast encryption system |
US9866377B2 (en) | 2008-02-27 | 2018-01-09 | International Business Machines Corporation | Unified broadcast encryption system |
US8538890B2 (en) | 2008-08-28 | 2013-09-17 | Motorola Mobility Llc | Encrypting a unique cryptographic entity |
US20100058047A1 (en) * | 2008-08-28 | 2010-03-04 | General Instrument Corporation | Encrypting a unique cryptographic entity |
WO2010025318A3 (fr) * | 2008-08-28 | 2010-06-10 | Motorola, Inc. | Cryptage d'une entité cryptographique unique |
US8813257B2 (en) | 2010-04-28 | 2014-08-19 | Panasonic Corporation | Download terminal, and content utilization system |
EP2571026A3 (fr) * | 2011-09-15 | 2013-09-11 | Sony Corporation | Appareil de traitement d'informations, procédé et programme de traitement d'informations |
WO2014011312A1 (fr) * | 2012-07-10 | 2014-01-16 | Raytheon Bbn Technologies Corp. | Dispositif usb/cd anti-wikileaks |
US9361483B2 (en) | 2012-07-10 | 2016-06-07 | Forcepoint Federal Llc | Anti-wikileaks USB/CD device |
US10460081B2 (en) * | 2013-11-05 | 2019-10-29 | Fox Broadcasting Company, Llc | Method and apparatus for portably binding license rights to content stored on optical media |
US11086971B2 (en) * | 2013-11-05 | 2021-08-10 | Disney Enterprises, Inc. | Method and apparatus for portably binding license rights to content stored on optical media |
US20160314283A1 (en) * | 2013-11-05 | 2016-10-27 | Fox Broadcasting Company | Method and apparatus for portably binding license rights to content stored on optical media |
US20230401292A1 (en) * | 2017-04-04 | 2023-12-14 | Nagravision S.A. | Security of surveillance media |
US12261942B2 (en) * | 2017-04-04 | 2025-03-25 | Nagravision S.A. | Security of surveillance media |
US11695796B1 (en) * | 2020-12-10 | 2023-07-04 | Amazon Technologies, Inc. | Device vulnerability detection during device handshake |
Also Published As
Publication number | Publication date |
---|---|
JP4778965B2 (ja) | 2011-09-21 |
WO2006046099A2 (fr) | 2006-05-04 |
CN1989560A (zh) | 2007-06-27 |
WO2006046099A3 (fr) | 2006-06-22 |
US20090214042A1 (en) | 2009-08-27 |
US7940935B2 (en) | 2011-05-10 |
JP2008504640A (ja) | 2008-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20060005257A1 (en) | Encrypted contents recording medium and apparatus and method for reproducing encrypted contents | |
US7760988B2 (en) | Content use device and recording medium | |
US7353543B2 (en) | Contents distribution system | |
US7650359B2 (en) | Content reproduction apparatus and content reproduction method | |
CN100498948C (zh) | 重放装置、重放方法 | |
US8116452B2 (en) | Content playback device | |
US20110110516A1 (en) | Content receiver, content reproducer, management server, content use system, content use method, method of write-out from content receiver, method of possible viewing time management on content reproducer, method of time limit fixation in management server, and program | |
US20070256141A1 (en) | Content distribution system | |
CN100585713C (zh) | 信息处理装置和信息处理方法 | |
US20020188840A1 (en) | Method and system for contents control | |
JP2009044773A (ja) | 暗号化方法、復号化方法、秘密鍵生成方法およびプログラム | |
TW200423676A (en) | System for identification and revocation of audiovisual titles and replicators | |
US20070112685A1 (en) | Contents distribution system, recording apparatus, signature apparatus, contents supply apparatus, and contents playback apparatus | |
WO2004086370A2 (fr) | Appareil d'enregistrement et systeme de protection de contenu | |
US7715558B2 (en) | Encrypted-content recording medium, playback apparatus, and playback method | |
WO2008134463A1 (fr) | Procédé et appareil permettant de faciliter les changements de clé de contenu | |
US20090041424A1 (en) | Transmitting-side recording and reproducing apparatus, and receiving-side recording and reproducing apparatus | |
US7433488B2 (en) | Information recording medium drive device, information processing apparatus, data replay control system, data replay control method, and computer program | |
WO2005121980A1 (fr) | Dispositif d’acquisition d’information, méthode d’acquisition d’information et programme d’acquisition d’information | |
KR100695665B1 (ko) | 엔티티 잠금 보안 레지스트리를 사용하여 자료에 액세스하는 장치 및 방법 | |
MXPA05001869A (es) | Metodo y sistema de comunicacion entre un dispositivo de grabacion y/o reproduccion y una unidad remota. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD., JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NAKAHARA, TOHRU;OKAMOTO, RYUICHI;YAMAMOTO, MASAYA;AND OTHERS;REEL/FRAME:016009/0566 Effective date: 20041019 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: SOVEREIGN PEAK VENTURES, LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PANASONIC CORPORATION;REEL/FRAME:047914/0675 Effective date: 20181012 |