+

US20060005257A1 - Encrypted contents recording medium and apparatus and method for reproducing encrypted contents - Google Patents

Encrypted contents recording medium and apparatus and method for reproducing encrypted contents Download PDF

Info

Publication number
US20060005257A1
US20060005257A1 US10/880,504 US88050404A US2006005257A1 US 20060005257 A1 US20060005257 A1 US 20060005257A1 US 88050404 A US88050404 A US 88050404A US 2006005257 A1 US2006005257 A1 US 2006005257A1
Authority
US
United States
Prior art keywords
key
playback
acquisition source
information
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/880,504
Other languages
English (en)
Inventor
Nakahara Tohru
Okamoto Ryuichi
Masaya Yamamoto
Tokuda Katsumi
Miyazaki Masaya
Masayuki Kozuka
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Holdings Corp
Sovereign Peak Ventures LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/880,504 priority Critical patent/US20060005257A1/en
Assigned to MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. reassignment MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KOZUKA, MASAYUKI, MIYAZAKI, MASAYA, NAKAHARA, TOHRU, OKAMOTO, RYUICHI, TOKUDA, KATSUMI, YAMAMOTO, MASAYA
Priority to US11/629,352 priority patent/US7940935B2/en
Priority to CNA2005800224020A priority patent/CN1989560A/zh
Priority to PCT/IB2005/003092 priority patent/WO2006046099A2/fr
Priority to JP2007518740A priority patent/JP4778965B2/ja
Publication of US20060005257A1 publication Critical patent/US20060005257A1/en
Assigned to SOVEREIGN PEAK VENTURES, LLC reassignment SOVEREIGN PEAK VENTURES, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PANASONIC CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00166Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
    • G11B20/00181Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software using a content identifier, e.g. an international standard recording code [ISRC] or a digital object identifier [DOI]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00188Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
    • G11B20/00195Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier using a device identifier associated with the player or recorder, e.g. serial numbers of playback apparatuses or MAC addresses
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00492Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00797Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of times a content can be reproduced, e.g. using playback counters
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/0084Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific time or date
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00847Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction is defined by a licence file
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00855Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server
    • G11B20/00862Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server wherein the remote server can grant the permission to use a content
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/10Indexing; Addressing; Timing or synchronising; Measuring tape travel
    • G11B27/102Programmed access in sequence to addressed parts of tracks of operating record carriers
    • G11B27/105Programmed access in sequence to addressed parts of tracks of operating record carriers of operating discs
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/10Indexing; Addressing; Timing or synchronising; Measuring tape travel
    • G11B27/19Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier
    • G11B27/28Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording
    • G11B27/32Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording on separate auxiliary tracks of the same or an auxiliary record carrier
    • G11B27/327Table of contents
    • G11B27/329Table of contents on a disc [VTOC]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B2220/00Record carriers by type
    • G11B2220/20Disc-shaped record carriers
    • G11B2220/25Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
    • G11B2220/2537Optical discs
    • G11B2220/2541Blu-ray discs; Blue laser DVR discs

Definitions

  • the present invention relates to apparatuses and methods for playing back contents of which the copyrights are protected and recording media for storing data used by the apparatuses and in the methods.
  • CSS Contents Scrambling System
  • DRM digital Rights Management
  • BDs Blu-ray Discs
  • a BD has a capacity five times as large as a DVD and is capable of having not only images with SD quality but also images with HD quality recorded thereon.
  • BDs Like CSS for a conventional DVD, BDs have a mechanism by which a piece of information unique to a medium is recorded and a media key is generated from this piece of information and another piece of information stored in the playback apparatus. Further, contents are encrypted using the media key, and the encrypted contents are recorded on the medium. This method prevents unauthorized copying of the contents like in the case of DVDs.
  • DRM digital versatile disc
  • contents encrypted with a license key are stored into a medium, and a license is distributed separately via a network.
  • the encrypted contents recorded on the medium are decrypted with the license key and then played back.
  • the object of the present invention is to provide a data structure suitable for, in a case where a medium stores therein contents to which conventional copy protection is applied and contents to which DRM is applied, playing back both kinds of contents properly, as well as a recording medium that stores therein data having such a data structure, and a playback apparatus and a playback method for playing back such data.
  • the present invention provides a terminal device that plays back a medium on which an encrypted content is recorded, comprising: a content key acquiring unit operable to acquire a content key from outside the medium; an acquisition source specifying unit operable to specify an acquisition source from which the content key is acquired; a communication establishing unit operable to establish communication with the acquisition source; and a decrypting unit operable to decrypt the encrypted content, using the content key.
  • FIG. 1 shows the overall structure of the contents playback system of the first embodiment of the present invention
  • FIG. 2 shows the internal structure of the terminal device 101 and information recorded on the medium 102 according to the first embodiment of the present invention
  • FIG. 3 shows the internal structures of the license server 104 and the license management client 230 according to the first embodiment of the present invention
  • FIG. 4 shows the data structure of the playback control information 211 according to the first embodiment of the present invention
  • FIG. 5 shows the data structure of the key control information 213 according to the first embodiment of the present invention
  • FIG. 6 shows the data structure of the media unique information 214 according to the first embodiment of the present invention
  • FIG. 7 shows the table configuration of the rights storing unit 315 according to the first embodiment of the present invention
  • FIG. 8 shows the table configuration of the key storing unit 305 according to the first embodiment of the present invention
  • FIG. 9 shows the table configuration of the use condition storing unit 306 according to the first embodiment of the present invention.
  • FIG. 10 shows the configuration of communication message according to the first embodiment of the present invention
  • FIG. 11 shows the configuration of rights according to the first embodiment of the present invention
  • FIG. 12 shows the configuration of contents playback information according to the first embodiment of the present invention
  • FIG. 13 is a flow chart that shows the processing procedure to play back the contents and complete the playback, according to the first embodiment of the present invention
  • FIG. 14 is a flow chart that shows the processing procedure in the content key acquisition process 1 according to the first embodiment of the present invention.
  • FIG. 15 is a flow chart that shows the processing procedure in the rights key acquisition process 1 according to the first embodiment of the present invention.
  • FIG. 16 is a flow chart that shows the processing procedure in the rights key transmission process 1 according to the first embodiment of the present invention.
  • FIG. 17 is a flow chart that shows the processing procedure in the media key acquisition process 1 according to the first embodiment of the present invention.
  • FIG. 18 is a flow chart that shows the processing procedure in the contents playback process 1 according to the first embodiment of the present invention.
  • FIG. 19 is a flow chart that shows the processing procedure in the use condition update process 1 according to the first embodiment of the present invention.
  • FIG. 20 is a flow chart that shows the processing procedure in the next playback content specification process 1 according to the first embodiment of the present invention.
  • FIG. 21 shows the internal structure of the terminal device 101 and information recorded on the medium 102 according to the second embodiment of the present invention
  • FIG. 22 shows the internal structures of the license server 104 and the license management client 230 of the second embodiment of the present invention
  • FIG. 23 shows the data structure of the playback control information 211 of the second embodiment of the present invention.
  • FIG. 24 shows the data structure of the key control information 213 of the second embodiment of the present invention.
  • FIG. 25 is a flowchart that shows the processing procedure to play back the contents and complete the playback, according to the second embodiment of the present invention.
  • FIG. 26 is a flowchart that shows the processing procedure in the content key acquisition storing process 2 according to the second embodiment of the present invention.
  • FIG. 27 is a flow chart that shows the processing procedure in the rights key acquisition process 2 according to the second embodiment of the present invention.
  • FIG. 28 is a flowchart that shows the processing procedure in the rights key transmission process 2 according to the second embodiment of the present invention.
  • FIG. 29 is a flow chart that shows the processing procedure in the contents playback process 2 according to the second embodiment of the present invention.
  • FIG. 30 is a flow chart that shows the processing procedure in the use condition update process 2 according to the second embodiment of the present invention.
  • FIG. 1 is a schematic drawing of the overall structure of the contents playback system according to the first embodiment of the present invention.
  • the contents playback system comprises: a terminal device 101 operable to play back contents; a medium 102 that stores therein encrypted contents and other data; a display device 103 operable to display contents played back by the terminal device 101 ; a license server 104 operable to generate and distribute a license; and a transmission line 105 that connects the terminal device 101 with the license server 104 .
  • FIG. 2 shows the internal structure of the terminal device 101 and information recorded on the medium 102 .
  • the internal structure of the terminal device 101 is to be described.
  • the terminal device 101 comprises: a contents playback unit 200 that plays back contents; an operation unit 221 operable to receive user operations; a display unit 222 operable to transmit display data to the display device 103 ; a key acquisition intermediary unit 223 operable to intermediate the acquisition of rights key performed by the contents playback unit 200 ; a license management client A 230 operable to transmit a rights key based on a request form the contents playback unit 200 ; and a license management client B 240 that has a different security level from the license management client A 230 .
  • the security level of the license management client A 230 is higher than that of the license management client B 240 .
  • the contents playback unit 200 comprises: a reading unit 201 operable to read data from the medium 102 ; a playback control unit 202 operable to control playback of contents; a decrypting unit 203 operable to decrypt encrypted contents; a key acquisition control unit 204 operable to control acquisition processing of a content key; and a media key generating unit 205 operable to generate a media key according to an instruction from the key acquisition control unit 204 .
  • An example of implementing the terminal device 101 is a client computer including a CPU, a work memory, a flash memory, a BD drive, a remote controller, a video adaptor, a network adaptor, and so on. More specifically, the reading unit 201 is a BD drive, the operation unit 221 is a remote controller, and the display unit 222 is a video adaptor.
  • a model may be presumed in which the contents playback unit 200 is arranged to be tamper-resistant hardware-wise or software-wise, the license management client A 230 is arranged to be tamper-resistant hardware-wise, and the license management client B 240 is arranged to be tamper-resistant software-wise.
  • the contents playback unit 200 may comprise a secure LSI arranged to be tamper-resistant hardware-wise
  • the license management client A 230 may be a program that operates on an IC card arranged to be tamper-resistant hardware-wise
  • the license management client B 240 may be a program operating in a secure program execution environment of the terminal device 101 .
  • the medium 102 stores therein playback control information 211 which is information for controlling playback order, encrypted contents 212 being contents data having been encrypted, key control information 213 being information on control of the key acquisition processing, and media unique information 214 being information unique to the medium 102 .
  • the medium 102 is specifically a BD medium.
  • a BD medium has a file system such as UDF; consequently, a method is normally used in which the playback control information 211 , the encrypted contents 212 , the key control information 213 , and the media unique information 214 are recorded as one or more files on a file system.
  • the present invention is not limited to this method.
  • BCA Burst Cutting Area
  • FIG. 3 shows the internal structures of the license server 104 , the license management client A 230 , and the license management client B 240 . It should be noted that, in FIG. 3 , the internal structure of the license management client A 230 is shown as a representative, since the license management client A 230 and the license management client B 240 have the same structure.
  • the following describes the internal structure of the license server 104 .
  • the license server 104 comprises: a rights transmitting unit 301 operable to transmit a right to the terminal device 101 ; a transmission control unit 302 operable to control data transmission to the terminal device 101 ; a rights generating unit 303 operable to generate a right from a rights key and conditions of use; a key transmitting unit 304 operable to transmit a rights key to the terminal device 101 ; a usability judging unit 307 operable to judge whether or not it is acceptable to transmit a key based on the conditions of use; a key storing unit 305 operable to store there in a rights key; and a use condition storing unit 306 operable to store therein the conditions of use.
  • An example of implementing the license server 104 is a server computer including a CPU, a work memory, an HDD, and a network adaptor. More specifically, the rights transmitting unit 301 is a network adaptor, and the transmission control unit 302 and the rights generating unit 303 are software that operates using a CPU and a work memory. These specific examples are mere examples, and the configuration of the license server 104 is not limited to these examples.
  • the following describes the internal structure of the license management client A 230 .
  • the license management client A 230 comprises: a rights acquiring unit 311 operable to acquire a right from the outside; a key extracting unit 312 operable to extract a rights key from a right; a usability judging unit 313 operable to judge whether or not it is acceptable to transmit a key based on the conditions of use; a key transmitting unit 314 operable to transmit a rights key to the outside; a rights storing unit 315 operable to store therein a right; and a use condition updating unit 316 operable to update the conditions of use.
  • Each of the license server 104 , the terminal device 101 , the license management client A 230 , and the license management client B 240 comprises a data storing unit and various processing units.
  • Each data storing unit is realized with a recording medium such as an HDD, a flash memory, or the like.
  • Each processing unit is realized with hardware such as an LSI, and a program executed with the use of a CPU, a RAM, or a ROM.
  • the following describes data and data structure to be dealt within the first embodiment. Firstly, the data structure of the data to be stored in the medium 102 will be described. Secondly, the data structure of data to be stored in each storing unit is described, starting with the license management client A 230 , and then the license server 104 . Lastly, explanation will be provided on the rights distributed from the license server 104 and the data structure of the contents playback information acquired by the contents playback unit 200 from the outside when the contents are to be played back, according to the present embodiment.
  • FIG. 4 shows an example of data structure of the playback control information 211 .
  • the playback control information 211 includes four kinds of information as below:
  • Each content is stored into a BD medium as a file, and a file name of a corresponding content is recorded as the content name.
  • the Next-playback Number is “2”. It therefore means that when the playback of Opening.mpg is completed, playback of Trailer.mpg will start.
  • the encrypted contents 212 are data obtained by encrypting a transport stream into which an MPEG (Moving Picture Experts Group) 2 video elementary stream and an MPEG 2 audio elementary stream are multiplexed according to a multiplex method defined by MPEG 2.
  • AES Advanced Encryption Standard
  • AES Advanced Encryption Standard
  • a transport stream may store therein data for displaying buttons, in addition to a video elementary stream and an audio elementary stream.
  • the data for displaying buttons is normally recorded as a private stream; however, the present invention is not limited to this.
  • FIG. 5 shows an example of data structure of the key control information 213 .
  • the key control information 213 includes nine kinds of information as below:
  • One of a media key, a rights key, and a composite key is specified.
  • the Playback Possibility Information may include quality of playback, for example.
  • the Copiability Information may include other information such as one that identifies quality of a copy or one that identifies a copy destination medium.
  • This information is paired with “Corresponding Rights Format Information” and is for specifying a connection destination when a rights key is to be acquired, for a line in which the key generation information is specified as a rights key or a composite key.
  • the contents playback unit 200 is connected to, in order to acquire a rights key for the content in this line, the license management client A 230 in Format D 1 .
  • connection destination module specified by “Corresponding Rights Format Information” and “Connection Destination Type”, for a line in which the key generation information is specified as a rights key or a composite key.
  • the public key certificate of the connection destination module is set.
  • a public key certificate of the license management client A 230 in Format D 1 is set.
  • a public key certificate of a connection destination module is set; however, it is acceptable to have an arrangement wherein a piece of identification information that uniquely identifies a public key certificate of the connection destination module is set, and the contents playback unit 200 acquires the public key certificate of the connection destination module according to the piece of identification information. Alternatively, it is acceptable to set the public key of the connection destination module in each line.
  • the piece of identification information that uniquely identifies a public key certificate of the connection destination module may be, for example, a piece of information in which a piece of Corresponding Rights Format Information and the Connection Destination Type are expressed as a code such as “001-00A”.
  • connection destination module it is acceptable to have an arrangement wherein no such information is set in each line and a public key certificate of the connection destination module is acquired based on “Rights Format Information” and “Connection Destination Type”.
  • the contents playback unit 200 makes an acquisition request for a rights key, first to the license management client A 230 in Format D 1 , and if the acquisition of a rights key is impossible for the reason that the client does not exist or such, then to the license management client B 240 in Format D 1 .
  • FIG. 6 shows an example of data structure of the media unique information 214 .
  • the media unique information 214 includes two kinds of information as below:
  • an encrypted media key is recorded as media unique information 214 for each playback device.
  • a playback device becomes unauthentic as having been hacked, or for some other reasons, it is possible to prevent the unauthentic playback device to perform playback by not recording the device unique information of the unauthentic playback device and the corresponding encrypted media key.
  • the following describes the data structure of data stored in the storing unit of the license management client A 230 , with reference to FIG. 7 .
  • FIG. 7 shows an example of data structure of rights information stored in the rights storing unit 315 .
  • the rights information includes five kinds of information as below. It should be noted that what is included in the rights information is not limited to these five kinds of information. Particularly, various kinds of information may be included in the information related to the conditions of use of rights, such as the playback number of times and the playback expiration.
  • One package identifier is set for one medium, the medium 102 . It is information that uniquely identifies, for example, “Top 50 Hits of 2003 for domestic music” or “Movie Collection directed by xx”.
  • the following describes the data structure of the data stored in the storing unit of the license server 104 , with reference to FIGS. 8 and 9 .
  • FIG. 8 shows an example of data structure of the key information stored in the key storing unit 305 .
  • the key information includes three kinds of information as below:
  • FIG. 9 shows an example of data structure of the use condition information stored in the use condition storing unit 306 .
  • the use condition information includes four kinds of information as below. It should be noted that what is included in the use condition information is not limited to these examples, as noted for the rights information.
  • One package identifier is set for one medium, the medium 102 .
  • FIG. 10 shows the substance of the message format of a communication message transmitted and received through communication between the license server 104 and the terminal device 101 .
  • the communication message shown in FIG. 10 is made up of a message header and a message body.
  • the message header includes, at least, a piece of information that identifies a transmission destination and a piece of information that identifies a transmission source.
  • the piece of information that identifies a transmission destination is referred to as a destination of the message.
  • the piece of information that identifies a transmission source is referred to as a destination to which a reply message is to be transmitted in response to the message.
  • An IP address is a typical example of a piece of information that identifies a transmission source or a transmission destination. It is acceptable to have an arrangement wherein a message header includes information required for authentication processing, in a case where authentication processing is performed between a server and a machine that transmit and receive the communication message.
  • a message body includes information that is unique to the message. This type of information that is unique to each message body will be described later for each of the messages.
  • FIG. 11 shows an example of a right that is acquired by the license management client A 230 or the license management client B 240 from the license server 104 .
  • the rights information includes two kinds of information as below and specified in the message body shown in FIG. 10 .
  • FIG. 12 shows an example of contents playback information acquired by the contents playback unit 200 from the license server 104 , the license management client A 230 , or the license management client B 240 , when the contents are used.
  • the contents playback information includes four kinds of information as below:
  • Image quality and sound quality of the playback at the times of using contents are specific examples.
  • the terminal device 101 Immediately after the power of the terminal device 101 is turned on or immediately after the medium 102 is inserted, upon an instruction from the user to start the playback via the operation unit 221 , the terminal device 101 starts the playback processing of the contents stored in the medium 102 .
  • the playback control unit 202 controls the reading unit 201 so that the playback control information 211 is read from the medium 102 , acquires the content name that corresponds to the Playback Number 1, and specifies the content to be played back.
  • the playback control unit 202 transmits the content name and a package identifier of the medium 102 to the key acquisition control unit 204 , and instructs the key acquisition control unit 204 to acquire the content key of the content that corresponds to the content name ( FIG. 13 : Step S 1301 ).
  • the key acquisition control unit 204 performs the content key acquisition process 1 to be described later with reference to the flow chart in FIG. 14 , and transmits the acquired content key, the content name, and a playback instruction to the decrypting unit 203 . When it is not possible to acquire the content key, the key acquisition control unit 204 transmits an error message to the decrypting unit 203 ( FIG. 13 : Step S 1302 ).
  • the decrypting unit 203 When having received the content key from the key acquisition control unit 204 , the decrypting unit 203 performs the subsequent processing. In a case where a content key has not been acquired even after the processing by the key acquisition control unit 204 is completed, the playback processing of the contents is completed. It is acceptable to have an arrangement wherein, in a case where it is not possible to acquire the content key, the user is notified, by the display on the display device 103 via the display unit 222 , that it is not possible to play back the contents and of the reason why the content key cannot be acquired ( FIG. 13 : Step S 1303 ).
  • the decrypting unit 203 performs the contents playback process 1 to be described later with reference to the flow chart in FIG. 18 ( FIG. 13 : Step S 1304 ).
  • Step S 1304 When the playback of the contents being the playback target in Step S 1304 is completed, the decrypting unit 203 notifies the playback control unit 202 that the playback is completed.
  • the playback control unit 202 judges whether or not there is a playback continuation instruction from the user ( FIG. 13 : Step S 1305 ). When there is no playback continuation instruction, the playback control unit 202 completes the playback processing. When there is a playback continuation instruction, the playback control unit 202 performs the next playback content specification process 1 , to be described later with reference to the flow chart in FIG. 20 , and the procedure returns to the processing in Step S 1302 ( FIG. 13 : Step S 1306 ).
  • the key acquisition control unit 204 controls the reading unit 201 so that key control information 213 is acquired from the medium 102 ( FIG. 14 : Step S 1401 ).
  • the key acquisition control unit 204 specifies a piece of key generation information that corresponds to the content being the playback target from the key control information 213 , based on the content name acquired from the playback control unit 202 .
  • the key acquisition control unit 204 judges whether or not a rights key is required, based on the piece of key generation information ( FIG. 14 : Step S 1402 ). More specifically, when the piece of key generation information is a rights key or a composite key, the key acquisition control unit 204 judges that a rights key is required. When the piece of key generation information is a media key, the key acquisition control unit 204 judges that a rights key is not required.
  • the key acquisition control unit 204 When having judged that a rights key is required, the key acquisition control unit 204 performs the rights key acquisition process 1 ( FIG. 14 : S 1403 ), to be described later with reference to the flow chart in FIG. 15 . When having judged that a rights key is not required, the key acquisition control unit 204 instructs the media key generating unit 205 to generate a media key and performs the media key acquisition process 1 ( FIG. 14 : Step S 1411 ), to be described later with reference to the flow chart in FIG. 17 .
  • the key acquisition control unit 204 checks whether or not a rights key has been acquired ( FIG. 14 : Step S 1404 ).
  • connection destination when it is not possible to establish the connection with the connection destination, or when the connection destination does not own a rights key, it will be a case where it is not possible to acquire a rights key.
  • the key acquisition control unit 204 When it is not possible to acquire a rights key, the key acquisition control unit 204 returns to the rights key acquisition process 1 , to be described later with reference to the flow chart in FIG. 15 .
  • the key acquisition control unit 204 When having acquired a rights key, the key acquisition control unit 204 performs the subsequent processing.
  • the key acquisition control unit 204 judges whether or not a media key is required, based on the piece of key generation information ( FIG. 14 : Step S 1405 ). More specifically, when the piece of key generation information is a composite key, the key acquisition control unit 204 judges that a media key is required. When the piece of key generation information is a rights key, the key acquisition control unit 204 judges that a media key is not required.
  • the key acquisition control unit 204 takes the acquired rights key as a content key.
  • the method of generating a content key is not limited to just taking a rights key as a content key. It is acceptable to generate a content key from a rights key and content unique information, using a one-way function. The method of generating a content key may be specified in advance at the key acquisition control unit 204 . Alternatively, information that identifies a generating method may be included in key generation information. Further, it is acceptable to determine a method for generating a content key depending on the type of contents to be played back.
  • the key acquisition control unit 204 instructs the media key generating unit 205 to generate a media key, and performs the media key acquisition process 1 ( FIG. 14 : Step S 1406 ), to be descried later with reference to the flow chart in FIG. 17 .
  • the key acquisition control unit 204 generates a content key from the acquired rights key and media key, using a one-way function ( FIG. 14 : Step S 1407 ).
  • the method of generating a content key is not limited to the one using a one-way function. There are various ways to generate a content key, for example, by decrypting content unique information with a media key, or by simply combining the content unique information with a media key and taking a hash thereof.
  • the method of generating a content key may be specified in advance at the key acquisition control unit 204 . Alternatively, information that identifies a generating method may be included in key generation information. Further, it is acceptable to determine a method for generating a content key depending on the type of contents to be played back.
  • the key acquisition control unit 204 specifies a connection destination module ( FIG. 15 : Step S 1501 ). To be more specific, description is provided for a case where a rights key is to be acquired for a content name with which two or more corresponding rights formats and connection destination types are specified. In such a case, the key acquisition control unit 204 determines, as the connection destination module, starting from a corresponding rights format and a connection destination type that has a smallest value of the priority order indicated in the key control information 213 .
  • the key acquisition control unit 204 specifies a connection destination module having the second priority order as a connection destination.
  • the key acquisition control unit 204 is able to find out about connection destination modules from which a rights key cannot be acquired by, for example, keeping a record of connection destination modules to which an error message has been sent during a predetermined length of time in the past, with regard to a rights key acquisition processing, or polling connection destination modules regularly to keep a record of the connectability and holding table information showing modules from which a rights key cannot be acquired.
  • the key acquisition control unit 204 transmits five kinds of information including the information of the connection destination specified in Step S 1501 to the key acquisition intermediary unit 223 ( FIG. 15 : Step S 1502 ).
  • the transmitted information contains: a package identifier, a content name, corresponding rights format information, connection destination type, a public key certificate of the contents playback unit 200 .
  • the key acquisition intermediary unit 223 receives the information transmitted by the key acquisition control unit 204 in Step S 1502 ( FIG. 15 : Step S 1511 ).
  • the key acquisition intermediary unit 223 extracts the corresponding rights format information and the connection destination type from the information received in Step S 1511 , and establishes communication with the connection destination module specified by these two kinds of information ( FIG. 15 : Step S 1512 ). More specifically, when the corresponding rights format information indicates Format D 1 , and the connection destination type indicates a license management client A, connection with a license management client A that corresponds to Format D 1 is established. There are various ways for the key acquisition intermediary unit 223 to specify a license management client A that corresponds to Format D 1 . For example, it is acceptable to use methods such as holding a table showing the correspondence between MAC addresses or IP addresses and clients, or making inquiries to all connection destinations modules that are connectable and specifying a client according to the responses.
  • the key acquisition intermediary unit 223 extracts the package identifier, the content name, and the public key certificate of the contents playback unit 200 from the information received in Step S 1511 , and transmits the extracted information to the connection destination module ( FIG. 15 : Step S 1513 ).
  • the connection destination module which is one of the license management client A 230 , the license management client B 240 , and the license server 104 , performs the rights key transmission process 1 ( FIG. 15 : Step S 1521 ), to be described later with reference to the flow chart in FIG. 16 .
  • the key acquisition intermediary unit 223 receives a message with a signature from the connection destination module ( FIG. 15 : Step S 1514 ).
  • the message with a signature is a message obtained by signing a piece of data that contains at least the rights key encrypted with the public key of the contents playback unit 200 , the playback control conditions, and the use condition type with the secret key of the connection destination module.
  • the key acquisition intermediary unit 223 transmits the message with the signature to the key acquisition control unit 204 ( FIG. 15 : Step S 1515 ).
  • the key acquisition control unit 204 receives the message with the signature from the key acquisition intermediary unit 223 ( FIG. 15 : Step S 1503 ).
  • the key acquisition control unit 204 acquires the public key certificate from the key control information 213 and verifies the message with the signature ( FIG. 15 : Step S 1504 ). When the signature verification result is no good, the key acquisition control unit 204 completes the content key acquisition processing. It should be noted that description is provided here for the case where the public key certificate is set in the medium 102 ; however, it is acceptable to acquire the public key certificate from the outside and perform verification. Explanation will be omitted as to the method of acquiring the public key certificate and the specific procedure of the signature verification.
  • the key acquisition control unit 204 decrypts the encrypted rights key contained in the message with the signature, using the secret key of the contents playback unit 200 , and acquires the rights key ( FIG. 15 : Step S 1505 ).
  • the rights key transmission process 1 varies depending on which connection destination module is the subject of the operation; therefore, explanation is provided on each case.
  • connection destination module is either the license management client A 230 or the license management client B 240 , taking the license management client A 230 as a representative example.
  • the usability judging unit 313 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 1513 ( FIG. 16 : Step S 1601 ).
  • the usability judging unit 313 extracts the package identifier and the content name from the received information and specifies and acquires a right that corresponds to the content being the playback target from the rights storing unit 315 , based on these two kinds of information ( FIG. 16 : Step S 1602 ).
  • the usability judging unit 313 acquires the conditions of use contained in the right and judges whether or not the contents are usable based on the conditions of use ( FIG. 16 : Step S 1603 ). More specifically, the conditions of use include a playback number of times, and a playback expiration as described with reference to FIG. 7 . As for the playback number of times, when the playback number of times is one or more, it is judged that the contents are usable, whereas when the playback number of times is zero, it is judged that the contents are unusable.
  • the usability judging unit 313 acquires a reliable current time and when the current time is before the playback expiration, it is judged that the contents are usable, whereas when the current time is after the playback expiration, it is judged that the contents are unusable. It should be noted that information included in the conditions of use are not limited to these examples.
  • the usability judging unit 313 When having judged that the contents are unusable, the usability judging unit 313 signs the error judgment result with the secret key of the license management client A 230 and generates a message with a signature to be transmitted ( FIG. 16 : Step S 1607 ) It should be noted that it is also acceptable that the error judgment result contains the cause of the error, for example, “Playback Expiration is up”or “Playback Number of Times is zero”.
  • the us ability judging unit 313 sets a use condition type and transmits the use condition type along with the right to the key extracting unit 312 .
  • the use condition type is set as either stateless or stateful depending on the substance of the conditions of use.
  • the key extracting unit 312 extracts a rights key from the right and generates, if necessary, playback control conditions ( FIG. 16 : S 1604 ). More specifically, image quality and sound quality of the playback are set as the playback control conditions. These conditions may be set in advance at the license management client A 230 , may be set in the conditions of use, or may be determined depending on the type of contents to be played back. The information included in the playback control conditions is not limited to these examples. It is also acceptable to have no playback control conditions.
  • the key extracting unit 312 transmits the extracted rights key, the generated playback control conditions, and the use condition type to the key transmitting unit 314 .
  • the key transmitting unit 314 acquires the public key of the contents playback unit 200 from the public key certificate received in Step S 1601 , and encrypts the rights key so as to generate an encrypted rights key ( FIG. 16 : Step S 1605 ).
  • the rights key is encrypted with the public key of the contents playback unit 200 ; however, it is acceptable to encrypt a rights key with a media key, or to encrypt a rights key dually with the public key of the contents playback unit 200 and a media key.
  • the key acquisition control unit 204 or the key acquisition intermediary unit 223 generates a random number every time a rights key acquisition request is made, and stores the random number within itself as well as transmits the rights key acquisition request containing the random number, and the key transmitting unit 314 encrypts the rights key and the playback control conditions, using the random number.
  • the key transmitting unit 314 encrypts the playback control conditions with an encryption key generated from the random number and the public key of the contents playback unit 200 and signs the encrypted rights key and the encrypted playback control conditions. This method makes it possible to return a reply message that is different for every rights key request asking for one same right. Thus, security level is expected to be improved.
  • the key transmitting unit 314 signs a piece of data that contains at least the encrypted rights key, the playback control conditions, and the use condition type, with a secret key of the license management client A 230 so as to generate a message with a signature to be transmitted ( FIG. 16 : S 1606 ).
  • the key transmitting unit 314 signs a piece of data that contains the random number in addition to the encrypted rights key, the playback control conditions, and the use condition type, with a secret key of the license management client A 230 .
  • the key transmitting unit 314 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 16 : Step S 1608 ).
  • connection destination module is the license server 104 .
  • the usability judging unit 307 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 1513 ( FIG. 16 : Step S 1601 ).
  • the usability judging unit 307 extracts the package identifier and the content name form the received information and specifies and acquires conditions of use that correspond to the contents to be played back from the use condition storing unit 306 , based on these two kinds of information ( FIG. 16 : Step S 1602 ).
  • the usability judging unit 307 judges whether or not he contents are usable based on the conditions of use ( FIG. 16 : Step S 1603 ).
  • the usability judging unit 307 When having judged that the contents are unusable, the usability judging unit 307 signs the error judgment result with the secret key of the license server 104 and generates a message with a signature to be transmitted ( FIG. 16 : Step S 1607 ).
  • the usability judging unit 307 sets a use condition type, and transmits the use condition type and the conditions of use, along with the package identifier and the content name with which the conditions of use have been specified, to the key extracting unit 312 .
  • the key extracting unit 312 extracts a rights key from the key storing unit 305 based on the package identifier and the content name, and generates, if necessary, playback control conditions ( FIG. 16 : Step S 1604 ).
  • the key extracting unit 312 transmits the extracted rights key, the generated playback control conditions and the use condition type to the key transmitting unit 304 .
  • the key transmitting unit 304 acquires the public key of the contents playback unit 200 from the public key certificate received in Step S 1601 and encrypts the rights key so as to generate an encrypted rights key ( FIG. 16 : Step S 1605 ).
  • the key transmitting unit 304 signs the piece of data that contains at least the encrypted rights key, the playback control conditions, and the use condition type with the secret key of the license server 104 and generates a message with a signature to be transmitted ( FIG. 16 : Step S 1606 ).
  • the key transmitting unit 304 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 16 : Step S 1608 ).
  • the media key generating unit 205 controls the reading unit 201 so that media unique information 214 is acquired from the medium 102 ( FIG. 17 : Step S 1701 ).
  • the media key generating unit 205 stores therein device unique information that is unique to the device and judges whether the device unique information of its own is set in the media unique information 214 based on the device unique information ( FIG. 17 : Step S 1702 ).
  • the media key generating unit 205 completes the media key acquisition processing and also completes the contents playback processing. For instance, in FIG. 7 , the device unique information “0003” is not registered in the media unique information 214 . Consequently, the terminal device 101 having “0003” as the device unique information halts without starting the playback of the medium 102 .
  • the media key generating unit 205 acquires an encrypted media key that corresponds to the device of its own ( FIG. 17 : Step S 1703 ).
  • the media key generating unit 205 decrypts the acquired encrypted media key with the device unique key so as to acquire the media key ( FIG. 17 : Step S 1704 ).
  • Step S 1304 in FIG. 13 The following describes the contents playback process 1 in Step S 1304 in FIG. 13 , with reference to the flow chart in FIG. 18 .
  • the decrypting unit 203 acquires a content key, playback control conditions, a use condition type, and a content name from the key acquisition control unit 204 .
  • the decrypting unit 203 acquires an encrypted content 212 from the medium 102 based on the content name ( FIG. 18 : Step S 1801 ).
  • the decrypting unit 203 checks whether or not playback control conditions are set ( FIG. 18 : Step S 1802 ).
  • the decrypting unit 203 plays back the contents while controlling the image quality and sound quality of the contents according to the playback control conditions ( FIG. 18 : Step S 1803 ).
  • the decrypting unit 203 plays back the contents without any restriction ( FIG. 18 : Step S 1804 ).
  • the decrypting unit 203 When having received a user instruction to stop the playback or having completed the playback of the contents being playback target, the decrypting unit 203 completes the playback of the contents ( FIG. 18 : Step S 1805 ).
  • the decrypting unit 203 judges whether the conditions of use that correspond to the contents played back are stateless or stateful, based on the use condition type acquired from the key acquisition control unit 204 ( FIG. 18 : Step S 1806 ).
  • the decrypting unit 203 judges that the conditions of use do not need to be updated, and completes the playback processing of the contents.
  • the decrypting unit 203 When the conditions of use are stateful, the decrypting unit 203 generates a playback history for the purpose of updating the conditions of use ( FIG. 18 : Step S 1807 ). More specifically, a playback history is generated to indicate that, for example, “the playback number of times is one” or “the playback period is two hours”.
  • the decrypting unit 203 transmits the playback history and a history transmission instruction to the key acquisition control unit 204 .
  • the key acquisition control 204 transmits, to the key acquisition intermediary unit 223 , (i) transmission data containing six kinds of information including at least information of the connection destination specified in Steps S 1501 and (ii) a message with a signature obtained by signing, with the secret key of the contents playback unit 200 , the transmission data from which corresponding rights format information and connection destination type are excluded ( FIG. 18 : Step S 1808 ).
  • the transmission data contains a package identifier, a content name, corresponding rights format information, a connection destination type, a public key certificate of the contents playback unit 200 , and a playback history.
  • the key acquisition intermediary unit 223 receives the message with the signature transmitted by the key acquisition control unit 204 in Step S 1808 ( FIG. 18 : Step S 1811 ).
  • the key acquisition intermediary unit 223 extracts the corresponding rights format information and the connection destination type from the message with the signature received in Step S 1808 and establishes communication with the connection destination module specified by these two kinds of information ( FIG. 18 : Step S 1812 ).
  • the key acquisition intermediary unit 223 extracts the package identifier, the content name, the public key certificate of the contents playback unit 200 , the playback history, and the signature data from the message with the signature received in Step S 1808 , and transmits these kinds of information to the use condition updating unit 316 of the connection destination module ( FIG. 18 : Step S 1813 ). It should be noted that it is acceptable to have an arrangement wherein all the kinds of information in the transmission data are signed in Step S 1808 , and the message with the signature received in Step S 1808 is transmitted to the connection destination module as the way it is in Step S 1813 .
  • connection destination module which is one of the license management client A 230 , the license management client B 240 , and the license server 104 , performs the use condition update process 1 ( FIG. 18 : Step S 1821 ), to be described later with reference to the flow chart in FIG. 19 .
  • the key acquisition intermediary unit 223 receives, from the connection destination module, a message with a signature obtained by signing a piece of data that contains at least a result of the use condition processing with the secret key of the connection destination module ( FIG. 18 : Step S 1814 ).
  • the key acquisition intermediary unit 223 transmits the message with the signature to the key acquisition control unit 204 ( FIG. 18 : Step S 1815 ).
  • the key acquisition control unit 204 receives the message with the signature from the key acquisition intermediary unit 223 ( FIG. 18 : Step S 1809 ).
  • the key acquisition control unit 204 acquires a public key certificate from the key control information 213 and verifies the message with the signature ( FIG. 18 : step S 180 A). When the signature verification result is no good, the key acquisition control unit 204 performs a predetermined processing to be conducted in the event of a signature verification error ( FIG. 18 : Step S 180 B). For example, the key acquisition control unit 204 judges that the connection destination module is unreliable and registers it as an unconnectable connection destination module.
  • the key acquisition control unit 204 performs a predetermined processing according to the results of the use condition update processing ( FIG. 18 : Step S 180 C). For example, when the result of the processing indicates a use condition update error, the key acquisition control unit 204 performs the use condition update process 1 again, or prohibits the terminal device 101 from playing back contents thereafter. Conversely, when the result of the processing indicates a normal termination, the result as such may be displayed on the screen to notify the user.
  • the processing to be conducted in the event of a signature verification error and the processing to be conducted according to the use condition update processing result may be performed according to information having been set in the medium 102 or may be performed after making an inquiry to the outside.
  • connection destination module is the subject of the operation; therefore, explanation is provided on each case.
  • connection destination module is either the license management client A 230 or the license management client B 240 , taking the license management client A 230 as a representative example.
  • the use condition updating unit 316 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 1813 ( FIG. 19 : Step S 1901 ).
  • the use condition updating unit 316 extracts the public key certificate of the contents playback unit 200 from the received information and acquires the public key of the contents playback unit 200 .
  • the use condition updating unit 316 verifies the signature of the information received in Step S 1901 , based on the public key ( FIG. 19 : Step S 1902 ). When the signature verification result is no good, the use condition updating unit 316 does not update the conditions of use, and performs the processing in and after Step S 1905 .
  • the use condition updating unit 316 specifies and acquires a right that includes the conditions of use of the update target from the rights storing unit 315 , based on the package identifier and the content name contained in the information received in Step S 1901 ( FIG. 19 : Step S 1903 ).
  • the use condition updating unit 316 updates the conditions of use, based on the conditions of use contained in the right and the playback history contained in the information received in Step S 1901 and stores the right containing the updated conditions of use into the rights storing unit 315 ( FIG. 19 : Step S 1904 ). More specifically, when the conditions of use indicates the playback number of times is “five”, and the playback history indicates “two times” of playback, the conditions of use is updated to indicate that the playback number of times is “three”.
  • the use condition updating unit 316 signs a piece of data that contains at least a processing result, with the secret key of the license management client A 230 and generates a message with a signature to be transmitted ( FIG. 19 : Step S 1905 ). More specifically, a signature error, a normal termination, or use condition update error may be set as a processing result.
  • the use condition updating unit 316 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 19 : Step S 1906 ).
  • connection destination module is the license server 104 .
  • the use condition updating unit 308 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 1813 ( FIG. 19 : Step S 1901 ).
  • the use condition updating unit 308 extracts the public key certificate of the contents playback unit 200 from the received information and acquires the public key of the contents playback unit 200 .
  • the use condition updating unit 308 verifies the signature of the information received in Step S 1901 , based on the public key ( FIG. 19 : Step S 1902 ). When the signature verification result is no good, the use condition updating unit 308 does not update the conditions of use, and performs the processing in and after Step S 1905 .
  • the use condition updating unit 308 acquires the conditions of use of the update target from the use condition storing unit 306 , based on the package identifier and the content name contained in the information received in Step S 1901 ( FIG. 19 : Step S 1903 ).
  • the use condition updating unit 308 updates the conditions of use, from the conditions of use and the playback history contained in the information received in Step S 1901 and stores the updated conditions of use into the use condition storing unit 306 ( FIG. 19 : Step 1904 ).
  • the use condition updating unit 308 signs a piece of data that contains at least the processing result with the secret key of the license server 104 and generates a message with a signature to be transmitted ( FIG. 19 : Step S 1905 ).
  • the use condition updating unit 316 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 19 : Step S 1906 ).
  • Step S 1306 in FIG. 13 The following describes the next playback content specification process 1 in Step S 1306 in FIG. 13 , with reference to the flow chart in FIG. 20 .
  • the playback control unit 202 controls the reading unit 201 so that playback control information 211 is acquired from the medium 102 ( FIG. 20 : Step S 2001 ).
  • the playback control unit 202 searches in the playback control information 211 , based on a content name of the content of which the playback has just completed, to specify the Next-playback Number that corresponds to the content name ( FIG. 20 : Step S 2002 ).
  • the playback control unit 202 specifies a content name of the content to be played back next based on the Next-playback Number ( FIG. 20 : Step S 2003 ).
  • the rights acquiring unit 311 of the license management client A 230 transmits the package identifier and the content name to the license server 104 .
  • the transmission control unit 302 of the license server 104 performs user authentication and other processing and judges whether or not it is acceptable to transmit a right.
  • the transmission control unit 302 instructs the right generating unit 303 to generate a right.
  • the transmission control unit 302 replies to the license management client A 230 with a reason why the transmission of a right is no good.
  • the right generating unit 303 acquires conditions of use that corresponds to the package identifier and the content name from the use condition storing unit 306 and acquires a corresponding right key from the key storing unit 305 , so as to generate a right.
  • the right generating unit 303 transmits the right to the right transmitting unit 301 .
  • the rights transmitting unit 301 transmits the right to the right acquiring unit 311 of the license management client A 230 .
  • the right acquiring unit 311 stores the right received from the rights transmitting unit 301 into the rights storing unit 315 .
  • the right acquisition processing starts as a result of the user explicitly operates the operation unit 221 ; however, it is acceptable to have an arrangement wherein a right is automatically acquired when purchase of contents is completed, or a right is automatically acquired as a result of prediction of the contents to be played back next based on a playback history of contents.
  • the following describes the contents playback system of the second embodiment of the present invention.
  • the contents playback system of the second embodiment has almost the same configuration and operates almost in the same manner as the contents playback system of the first embodiment except that there are partial differences; therefore, only the differences from the first embodiment will be described. Also, the same reference signs are used in the drawings to describe the components in common.
  • the first embodiment describes a case where, when the contents playback unit 200 is to acquire a rights key, the connection destination module is the same as the module transmitting the rights key.
  • the second embodiment describes a case where, when the contents playback unit 200 is to acquire a rights key, the connection destination module is not necessarily the same as the module transmitting the rights key.
  • FIG. 21 shows the internal structure of the terminal device 101 and information recorded on the medium 102 .
  • the terminal device 101 comprises: a contents playback unit 200 ; an operation unit 221 ; a display unit 222 ; a key acquisition intermediary unit 223 ; a license management client A 230 ; and a license management client B 240 .
  • the contents playback unit 200 comprises: a reading unit 201 ; a playback control unit 202 ; a decrypting unit 203 ; a key acquisition control unit 204 ; a media key generating unit 205 ; and a key storing unit 206 operable to store therein a rights key.
  • FIG. 22 shows the internal structure of the license server 104 , the license management client A 230 , and the license management client B 240 .
  • the internal structure of the license management client A 230 is shown as a representative, since the license management client A 230 and the license management client B 240 have the same structure.
  • the following describes the internal structure of the license management client A 230 .
  • the license management client A 230 comprises: a rights acquiring unit 311 ; a key extracting unit 312 ; a usability judging unit 313 ; a key transmitting unit 314 operable to transmit a rights key to the outside; a rights storing unit 315 ; and a use condition updating unit 316 ; and an acquisition source judging unit 317 operable to judge an acquisition source from which a rights key is acquired.
  • Playback control information 211 and key control information 213 stored in the medium 102 will be described with reference to FIGS. 23 ad 24 .
  • the data structures of other kinds of data will be omitted since they are the same as those in the first embodiment.
  • FIG. 23 shows an example of data structure of the playback control information 211 .
  • the playback control information 211 includes eight kinds of information as below:
  • This information is paired with “Corresponding Rights Format Information” and is for specifying a connection destination when a rights key is to be acquired, for a line in which the key generation information is specified as a rights key or a composite key.
  • This information is paired with “Corresponding Rights Format Information” and is for specifying an acquisition source from which a rights key is acquired for a line in which the key generation information is specified as a rights key or a composite key.
  • “Client A” is specified as the connection destination
  • “Server” is specified as the acquisition source; consequently, when acquiring a rights key for the content, the contents playback unit 200 connects to the license management client A 230 in Format D 1 , and acquires a rights key from the license server 104 via the license management client A 230 .
  • the connection destination is different from the acquisition source
  • the acquisition source is the license server 104 .
  • the acquisition source is the license management client contents.
  • FIG. 24 shows an example of data structure of the key control information 213 .
  • the key control information 213 includes six kinds of information as below:
  • a public key certificate of the connection destination module is set. It should be noted that, in this example, a public key certificate of the connection destination module is set; however, it is acceptable to have an arrangement wherein a piece of identification information that uniquely identifies a public key certificate of the acquisition source module is set, and the contents playback unit 200 acquires the public key certificate of the acquisition source module according to the piece of identification information. Alternatively, it is acceptable to set the public key of the acquisition source module in each line.
  • the piece of identification information that uniquely identifies a public key certificate of the acquisition source module may be, for example, Corresponding Rights Format Information and Acquisition Source Type.
  • the following describes the processing performed by the terminal device 101 to playback the contents stored in the medium 102 and complete the playback, with reference to FIGS. 25 through 30 .
  • the key acquisition trigger detection unit instructs the playback control unit 202 to acquire a content key ( FIG. 25 : Step S 2501 ).
  • Examples of such an event include: turning the power of the terminal device 101 on; inserting the medium 102 into the terminal device 101 ; a key acquisition instruction from the user; and presenting a menu with a list of contents of which the playback is possible to the user based on the playback control information 211 .
  • the playback control unit 202 controls the reading unit 201 so that the playback control information 211 is read from the medium 102 , acquires the content name that corresponds to the Playback Number 1, and specifies the content to be played back.
  • the playback control unit 202 performs, with the use of the playback control information 211 and the content name, the content key acquisition storing process 2 to be described later with reference to the flowchart in FIG. 26 , and stores the acquired content key into the key storing unit 206 ( FIG. 25 : Step S 2502 ).
  • Step S 2502 in order to present a menu with a list of contents of which the playback is possible to the user, the processing in Step S 2502 is repeated for each of the content names, and the user will be notified that contents whose content keys have been acquired are the contents of which the playback is possible, and that contents whose contents key have not been acquired are the contents of which the playback is not possible.
  • those contents of which the playback is not possible may be indicated with gray shades.
  • the user selects a content to be played back from the list of contents via the operation unit 221 .
  • the operation unit 221 inputs the content name that corresponds to the content to the playback control unit 202 .
  • the playback control unit 202 specifies a content being a playback target based on the content name ( FIG. 25 : Step S 2503 )
  • the playback control unit 202 extracts the package identifier from the playback control information 211 and transmits the extracted package identifier along with the content name to the key acquisition control unit 204 .
  • the key acquisition control unit 204 acquires a content key, playback control conditions, and a use condition type that correspond to the content being the playback target, from the key storing unit 206 , based on the package identifier and the content name.
  • the key acquisition control unit 204 transmits the content name, the content key, the playback control conditions, and the use condition type to the decrypting unit 203 and instructs the decrypting unit 203 to play back the contents.
  • the decrypting unit 203 performs the contents playback process 2 ( FIG. 25 : Step S 2504 ), to be described later with reference to the flow chart in FIG. 29 .
  • the decrypting unit 203 When the playback of the contents being the playback target in Step S 2504 is completed, the decrypting unit 203 notifies the playback control unit 202 that the playback is completed.
  • the playback control unit 202 judges whether or not there is a playback continuation instruction from the user ( FIG. 25 : Step S 2505 ). When there is no playback continuation instruction, the playback control unit 202 completes the playback processing.
  • the playback control unit 202 When there is a playback continuation instruction, the playback control unit 202 performs the next playback content specification process 1 which has been described earlier with reference to the flow chart in FIG. 20 , and the procedure returns to the processing in Step S 2504 ( FIG. 25 : Step S 2506 ).
  • the playback control unit 202 specifies a piece of corresponding rights format information that corresponds to the content being the playback target from the playback control information 211 , based on the content name ( FIG. 26 : Step S 2601 ).
  • the playback control unit 202 judges whether or not a rights key is required, according to the corresponding rights format information ( FIG. 26 : Step S 2602 ). More specifically, when corresponding rights format information is set, the playback control unit 202 judges that a rights key is required. When no information is set as corresponding rights format information, the playback control unit 202 judges that a rights key is not required.
  • the playback control unit 202 When having judged that a rights key is required, the playback control unit 202 performs the rights key acquisition process 2 ( FIG. 26 : S 2603 ), to be described later with reference to the flow chart in FIG. 27 .
  • the playback control unit 202 After performing the rights key acquisition process 2 , the playback control unit 202 checks whether or not a rights key has been acquired ( FIG. 26 : Step S 2604 ).
  • the playback control unit 202 performs the rights key acquisition process 2 again.
  • the playback control unit 202 When having confirmed that a rights key has been acquired, the playback control unit 202 extracts a package identifier from the playback control information 211 , and transmits the acquired rights key, playback control conditions, a use condition type, the extracted package identifier, and the content name to the key acquisition control unit 204 , as well as instructs the key acquisition control unit 204 to generate a content key and store various data.
  • the key acquisition control unit 204 controls the reading unit 201 so that so that key control information 213 is acquired from the medium 102 .
  • the key acquisition control unit 204 specifies a piece of key generation information that corresponds to the content being the playback target from the key control information 213 , based on the content name.
  • the key acquisition control unit 204 judges whether or not a media key is required, based on the piece of key generation information ( FIG. 26 : Step S 2605 ). More specifically, when the piece of key generation information indicates a rights key or a composite key, the key acquisition control unit 204 judges that a media key is required. When the piece of key generation information indicates a rights key, the key acquisition control unit 204 judges that a media key is not required.
  • the key acquisition control unit 204 transmits the content name to the media key generating unit 205 and instructs the media key generating unit 205 to generate a media key.
  • the media key generating unit 205 performs the media key acquisition process 1 ( FIG. 26 : Step S 2606 ), which has been described earlier with reference to the flow chart in FIG. 17 .
  • the media key generating unit 205 transmits the media key generated in the media key acquisition process 1 to the key acquisition control unit 204 .
  • the key acquisition control unit 204 generates a content key from the rights key and the media key and stores the generated content key along with the playback control conditions and the use condition type into the key storing unit 206 ( FIG. 26 : Step S 2607 ).
  • the method of generating a content key from a rights key and a media key is the same as the one described in the first embodiment.
  • the key acquisition control unit 204 When the content key, the playback control conditions, the use condition type have been stored, the key acquisition control unit 204 notifies the playback control unit 202 that storing of the content key has been, completed.
  • the playback control unit 202 When having judged that a rights key is not required in Step S 2602 , the playback control unit 202 extracts a package identifier from the playback control information 211 and transmits the package identifier and the content name to the key acquisition control unit 204 and instructs the key acquisition control unit 204 to generate and store a content key.
  • the key acquisition control unit 204 transmits the content name to the media key generating unit 205 and instructs the media key generating unit 205 to generate a media key.
  • the media key generating unit 205 performs the media key acquisition process 1 ( FIG. 26 : Step S 2611 ), which has been described earlier with reference to the flow chart in FIG. 17 .
  • the media key generating unit 205 transmits the media key generated in the media key acquisition process 1 to the key acquisition control unit 204 .
  • the key acquisition control unit 204 stores the received media key being a content key along with the playback control conditions and the use condition type into the key storing unit 206 , in such a manner that the stored information is in correspondence with the package identifier and the content name.
  • the key acquisition control unit 204 When storing of the content key, the playback control conditions, and the use condition type has been completed, the key acquisition control unit 204 notifies the playback control unit 202 that storing of the content key is completed.
  • the playback control unit 202 specifies a connection destination module, according to the priority level indicated in the playback control information 211 ( FIG. 27 : Step S 2701 ).
  • the playback control unit 202 transmits five kinds of information including a piece of information that identifies the connection destination module specified in Step S 2701 to the key acquisition intermediary unit 223 ( FIG. 27 : Step S 2702 ).
  • the transmitted information includes a package identifier, a content name, corresponding rights format information, a connection destination type, an acquisition source type, and a public key certificate of the contents playback unit 200 .
  • the key acquisition intermediary unit 223 receives the information transmitted by the playback control unit 202 in Step S 2702 ( FIG. 27 : Step S 2711 ).
  • the key acquisition intermediary unit 223 extracts the corresponding rights format information and the connection destination type from the information received in Step S 2711 , and establishes communication with the connection destination module specified from these two kinds of information ( FIG. 27 : Step S 2712 ).
  • the key acquisition intermediary unit 223 extracts the package identifier, the content name, the acquisition source type, and the public key certificate of the contents playback unit 200 from the information received in Step S 2711 , and transmits the extracted information to the connection destination module ( FIG. 27 : Step S 2713 ).
  • connection destination module which is one of the license management client A 230 , the license management client B 240 , and the license server 104 , performs the rights key transmission process 2 ( FIG. 27 : Step S 2721 ), to be described later with reference to the flow chart in FIG. 28 .
  • the key acquisition intermediary unit 223 receives a message with a signature from the connection destination module ( FIG. 27 : Step S 2714 ).
  • the message with the signature is obtained by signing a data that contains at least a right key encrypted with the public key of the contents playback unit 200 , playback control conditions, and a use condition type, with the secret key of the acquisition source module.
  • the key acquisition intermediary unit 223 transmits the message with the signature to the playback control unit 202 (FIG. 27 : Step S 2715 ).
  • the playback control unit 202 receives the message with the signature from the key acquisition intermediary unit 223 ( FIG. 27 : Step S 2703 ).
  • the playback control unit 202 transmits the content name and the message with the signature to the key acquisition control unit 204 and instructs the key acquisition control unit 204 to verify the signature.
  • the key acquisition control unit 204 controls the reading unit 201 so that key control information 213 is acquired from the medium 102 .
  • the key acquisition control unit 204 acquires a public key certificate that corresponds to the content being the playback target from the key control information 213 , based on the content name.
  • the key acquisition control unit 204 verifies the message with the signature, using the public key certificate ( FIG. 27 : Step S 2704 ).
  • the key acquisition control unit 204 completes the content key acquisition processing and transmits an error message to the playback control unit 202 .
  • the key acquisition control unit 204 decrypts the encrypted rights key contained in the message with the signature, using the secret key of the contents playback unit 200 and acquires the rights key ( FIG. 27 : Step S 2705 ).
  • the key acquisition control unit 204 transmits the rights key, the playback control conditions, the use condition type to the playback control unit 202 and notifies that acquisition of the rights key is completed.
  • the rights key transmission process 2 varies depending on which connection destination module is the subject of the operation; therefore, explanation is provided on each case.
  • connection destination module is either the license management client A 230 or the license management client B 240 , taking the license management client A 230 as a representative example.
  • the acquisition source judging unit 317 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 2713 ( FIG. 28 : Step S 2801 ).
  • the acquisition source judging unit 317 extracts the corresponding rights format information and the acquisition source type from the received information.
  • the acquisition source judging unit 317 judges whether or not the acquisition source module from which the rights key is acquired is an outside module, based on the acquisition source type ( FIG. 28 : Step S 2831 ). More specifically, the acquisition source judging unit 317 judges whether the value being set as the acquisition source type matches the type information of its own. When the value does not match its own type information, the acquisition source judging unit 317 judges that the acquisition source is an outside module. When the value matches its own type information, the acquisition source judging unit 317 judges that the acquisition source is itself.
  • the acquisition source judging unit 317 When the acquisition source module is an outside module, the acquisition source judging unit 317 establishes connection with the outside module specified by the corresponding rights format information and the acquisition source type. More specifically, when Format D 1 is specified as the corresponding right format information, and a server is specified as the acquisition source type, the acquisition source judging unit 317 establishes communication with the license server 104 that corresponds to Format D 1 .
  • the acquisition source judging unit 317 extracts the package identifier, the content name, and the public key certificate of the contents playback unit 200 from the received information, and transmits the extracted information to the outside module ( FIG. 28 : Step S 2811 ).
  • the outside module When having received the information transmitted by the acquisition source judging unit 317 in Step S 2811 , the outside module performs the rights key transmission process 1 , which has been described earlier with reference to the flow chart in FIG. 16 , and transmits a message with a signature to the license management client A 230 .
  • the license management client A 230 receives the message with the signature ( FIG. 28 : Step S 2812 ).
  • the license management client A 230 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 28 : Step S 2813 ).
  • the acquisition source judging unit 317 transmits the received information to the usability judging unit 313 and instructs the usability judging unit 313 to perform usability judging processing based on the conditions of use.
  • Steps from S 2802 to S 2808 is the same as the processing in Steps from S 1602 to S 1608 described in the first embodiment; therefore, explanation will be omitted.
  • connection destination module is the license server 104 .
  • the connection destination is the license server 104
  • the rights key acquisition source is also the license server 104 .
  • connection destination and the acquisition source are both the license server 104
  • the processing performed when the connection destination and the acquisition source are both the license server 104 is the same as the rights key transmission process 1 in the first embodiment; therefore, explanation will be omitted.
  • the decrypting unit 203 acquires a content key, playback control conditions, a use condition type, and a content name from the key acquisition control unit 204 .
  • Steps from S 2901 to S 2907 is the same as the processing in Steps from S 1801 to Step 1807 described in the first embodiment; therefore, explanation will be omitted.
  • the decrypting unit 203 transmits the playback history and a history transmission instruction to the key acquisition control unit 204 .
  • the key acquisition control unit 204 transmits the playback history received from the decrypting unit 203 to the playback control unit 202 and instructs the playback control unit 202 to transmit the playback history.
  • the playback control unit 202 transmits, to the key acquisition intermediary unit 223 , (i) transmission data containing six kinds of information including at least information of a connection destination module and an acquisition source module, (ii) a message with a signature obtained by signing, with the secret key of the contents playback unit 200 , the transmission data from which corresponding rights format information and connection destination type are excluded ( FIG. 29 : Step S 2908 ).
  • the transmission data contains a package identifier, a content name, corresponding rights format information, a connection destination type, an acquisition source type, a public key certificate of the contents playback unit 200 , and a playback history.
  • the key acquisition intermediary unit 223 receives the message with the signature transmitted by the key acquisition control unit 204 in Step S 2908 ( FIG. 29 : Step S 2911 ).
  • the key acquisition intermediary unit 223 extracts the corresponding rights format information and the connection destination type from the message with the signature received in Step S 2908 and establishes communication with the connection destination module specified by these two kinds of information ( FIG. 29 : Step S 2912 ).
  • the key acquisition intermediary unit 223 extracts the package identifier, the content name, the acquisition source type, the public key certificate of the contents playback unit 200 , the playback history, and the signature data from the message with the signature received in Step S 2908 , and transmits the extracted information to the use condition updating unit 316 of the connection destination module ( FIG. 29 : Step S 2913 ).
  • connection destination module which is one of the license management client A 230 , the license management client B 240 , and the license server 104 , performs the use condition update process 2 ( FIG. 29 : Step S 2921 ), to be described later with reference to the flow chart in FIG. 30 .
  • the key acquisition intermediary unit 223 receives, from the connection destination module, a message with a signature obtained by signing a piece of data that contains at least a result of the use condition processing with the secret key of the acquisition source module ( FIG. 29 : Step S 2914 ).
  • the key acquisition intermediary unit 223 transmits the message with the signature to the key acquisition control unit 204 ( FIG. 29 : Step S 2915 ).
  • Steps from S 2909 to S 2907 B is the same as the processing in Steps from S 1809 to S 180 B described in the first embodiment; therefore, explanation will be omitted.
  • connection destination module is the subject of the operation; therefore, explanation is provided on each case.
  • connection destination module is either the license management client A 230 or the license management client B 240 , taking the license management client A 230 as a representative example.
  • the acquisition source judging unit 317 receives the information transmitted by the key acquisition intermediary unit 223 in Step S 2913 ( FIG. 30 : Step S 3001 ).
  • the acquisition source judging unit 317 extracts the corresponding rights format information and an acquisition source type from the received information.
  • the acquisition source judging unit 317 judges whether or not the module that updates the conditions of use is an outside module, based on the acquisition source type ( FIG. 30 : Step S 3002 ). More specifically, the acquisition source judging unit 317 judges whether the value being set as the acquisition source type matches the type information of its own. When the value does not match its own type information, the acquisition source judging unit 317 judges that the module that updates the conditions of use is an outside module. When the value matches its own type information, the acquisition source judging unit 317 judges that the module that updates the conditions of use is itself.
  • the acquisition source judging unit 317 establishes connection with the outside module specified by the corresponding rights format information and the acquisition source type.
  • the acquisition source judging unit 317 extracts the package identifier, the content name, and the public key certificate of the contents playback unit 200 , the playback history, and the signature data from the received information, and transmits the extracted information to the outside module ( FIG. 30 : Step S 3011 ).
  • the outside module When having received the information transmitted by the acquisition source judging unit 317 in Step S 3011 , the outside module performs the use condition update process 1 , which has been described earlier with reference to the flow chart in FIG. 19 , and transmits a message with a signature to the license management client A 230 .
  • the license management client A 230 receives the message with the signature ( FIG. 30 : Step S 3012 ).
  • the license management client A 230 transmits the message with the signature to the key acquisition intermediary unit 223 ( FIG. 30 : Step S 3013 ).
  • the acquisition source judging unit 317 transmits the received information to the usability judging unit 313 and instructs the usability judging unit 313 to perform the use condition update process.
  • Step S 3003 to Step S 3007 The processing in Steps from S 3003 to Step S 3007 is the same as the processing in Steps from S 1902 to S 1906 described in the first embodiment; therefore, explanation will be omitted.
  • connection destination module is the license server 104 .
  • the connection destination is the license server 104
  • the rights key acquisition source is also the license server 104 .
  • connection destination and the acquisition source are both the license server 104
  • the processing performed when the connection destination and the acquisition source are both the license server 104 is the same as the rights key transmission process 1 in the first embodiment; therefore, explanation will be omitted.
  • the following describes the processing to be performed in a case where the contents playback unit 200 does not include the key storing unit 206 .
  • the playback control unit 202 When having detected an event upon which a menu with a list of contents should be displayed, the playback control unit 202 has a menu with a list of contents displayed on the display device 103 . Examples of such an event include: turning the power of the terminal device 101 on; inserting the medium 102 into the terminal device 101 ; a key acquisition instruction from the user; and presenting a menu with a list of contents of which the playback is possible to the user based on the playback control information 211 .
  • the user specifies a desired content from the menu with a list of contents and notifies the content name to the playback control unit 202 via the operation unit 221 .
  • the playback control unit 202 performs the processing before the storing of the content key, the playback control conditions, and the use condition type performed by the key acquisition control unit 204 in the content key acquisition storing process 2 , which has been described earlier with reference to the flow chart in FIG. 26 .
  • the key acquisition control unit 204 transmits the content name, the content key, the playback control conditions, and the use condition type to the decrypting unit 203 and instructs the decrypting unit 203 to play back the content.
  • the decrypting unit 203 performs the contents playback process 2 , which has been described earlier with reference to the flow chart in FIG. 29 .
  • the key generation information in the key control information 213 indicates a media key or a composite key, and a media key is required for playback of a content
  • Steps from S 2605 through S 2607 and Step S 2611 shown in FIG. 26 are not performed in the content key acquisition storing process 2 .
  • Steps from S 2605 to S 2607 shown in FIG. 26 before Step S 2901 shown in FIG. 29 in the contents playback process 2 .
  • the signature of the transmission source module is used in order to check whether the transmission source module of the rights key is a predetermined module.
  • SAC secure authenticated channel
  • SSL Secure Socket Layer
  • TLS Transport Layer Security
  • the medium 102 stores therein a program of the license management client operating on the terminal device 101 , a playback control program operating on the contents playback unit 200 , a content decryption program, a key acquisition control program, and a media key generation program.
  • the programs stored in the medium 102 are read at a trigger of, for example, turning the power of the terminal device 101 on, inserting the medium 102 , or a user operation.
  • a connection destination is specified based on the corresponding rights format information and the connection destination type contained in the playback control information 211 or the key control information 213 stored in the medium 102 .
  • the contents playback unit 200 sequentially connects to connectable modules one by one and performs signature verification of a reply message in each processing. More specifically, it is acceptable to have an arrangement wherein the contents playback unit 200 sequentially connects to connectable modules one by one and verifies a signature of each message. In a case where the signature verification result is not good, the contents playback unit 200 connects to another module, and in a case where the signature verification result is OK, the contents playback unit 200 continues the contents playback processing.
  • the first and second embodiments describe that, in a case where there are two or more connection destinations with respect to a content name at the time of acquiring a rights key, the connection destination module is determined based on the priority order recorded in the key control information 213 or the playback control information 211 stored in the medium 102 ; however, it is acceptable to have an arrangement wherein the contents playback unit 200 stores therein a priority order, and the connection destination module is determined according to the priority order stored in the contents playback unit 200 .
  • the priority order may be set as “the license management client A 230 is prioritized over the license server 104 ” or “the license management client A 230 in Format D 2 is prioritized over the license management client A 230 in Format D 1 ”
  • the priority order stored in the contents playback unit 200 may be set when the contents playback unit 200 is manufactured. Alternatively, the priority order may be obtained from another device via the transmission line 105 , or may be obtained from the medium 102 . Further, when a priority order is set in both the medium 102 and the contents playback unit 200 , it is acceptable that medium 102 records thereon information that indicates which one of those two priority orders is prioritized. Furthermore, it is acceptable to have an arrangement wherein the contents playback unit 200 stores therein the corresponding rights format information, the connection destination type, and the acquisition source type, as well as the priority order.
  • the first and second embodiments describe that it is judged whether or not a playback history is transmitted to an acquisition source module based on the use condition type after the contents are played back; however, it is acceptable to have an arrangement wherein the contents playback information contains no use condition type, and a playback history is always transmitted or a playback history is never transmitted.
  • the license server 104 After a rights key is transmitted, the license server 104 , the license management client A 230 , and the license management client B 240 each lock the corresponding conditions of use so that they are not usable, and a request from a different terminal device for a rights key is rejected.
  • the apparatus and the method for playing back encrypted contents and the recording medium storing therein data to be used by the apparatus and the method according to the present invention is suitable for playback of contents from a medium that stores therein both contents to which conventional copy protection is applied and contents to which DRM is applied and is useful in the field of package media and contents distribution.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Finance (AREA)
  • Power Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Television Signal Processing For Recording (AREA)
US10/880,504 2004-07-01 2004-07-01 Encrypted contents recording medium and apparatus and method for reproducing encrypted contents Abandoned US20060005257A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US10/880,504 US20060005257A1 (en) 2004-07-01 2004-07-01 Encrypted contents recording medium and apparatus and method for reproducing encrypted contents
US11/629,352 US7940935B2 (en) 2004-07-01 2005-06-30 Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium
CNA2005800224020A CN1989560A (zh) 2004-07-01 2005-06-30 内容重放装置,内容重放方法,计算机程序,密钥传递装置,以及记录介质
PCT/IB2005/003092 WO2006046099A2 (fr) 2004-07-01 2005-06-30 Appareil de restitution de contenus, procede de restitution de contenus, programme d'ordinateur, appareil de relais de cles, et support d'enregistrement
JP2007518740A JP4778965B2 (ja) 2004-07-01 2005-06-30 コンテンツ再生装置、コンテンツ再生方法、コンピュータプログラム、鍵中継装置及び記録媒体

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/880,504 US20060005257A1 (en) 2004-07-01 2004-07-01 Encrypted contents recording medium and apparatus and method for reproducing encrypted contents

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/629,352 Continuation-In-Part US7940935B2 (en) 2004-07-01 2005-06-30 Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium

Publications (1)

Publication Number Publication Date
US20060005257A1 true US20060005257A1 (en) 2006-01-05

Family

ID=35515567

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/880,504 Abandoned US20060005257A1 (en) 2004-07-01 2004-07-01 Encrypted contents recording medium and apparatus and method for reproducing encrypted contents
US11/629,352 Expired - Fee Related US7940935B2 (en) 2004-07-01 2005-06-30 Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/629,352 Expired - Fee Related US7940935B2 (en) 2004-07-01 2005-06-30 Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium

Country Status (4)

Country Link
US (2) US20060005257A1 (fr)
JP (1) JP4778965B2 (fr)
CN (1) CN1989560A (fr)
WO (1) WO2006046099A2 (fr)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050201726A1 (en) * 2004-03-15 2005-09-15 Kaleidescape Remote playback of ingested media content
US20060020859A1 (en) * 2004-07-22 2006-01-26 Adams Neil P Method and apparatus for providing intelligent error messaging
US20060037055A1 (en) * 2004-08-04 2006-02-16 Konica Minolta Business Technologies, Inc. Audio data communication system, audio data transmission apparatus, audio data reception apparatus, composite data communication system, composite data transmission apparatus and composite data reception apparatus
US20060095384A1 (en) * 2004-10-28 2006-05-04 Fujitsu Limited Apparatus with electronic information transfer function or the like, program for electronic information transfer, and method for electronic information transfer
US20070083473A1 (en) * 2005-10-11 2007-04-12 Farrugia Augustin J Use of media storage structure with multiple pieces of content in a content-distribution system
US20070220585A1 (en) * 2006-03-01 2007-09-20 Farrugia Augustin J Digital rights management system with diversified content protection process
US20070260548A1 (en) * 2006-05-03 2007-11-08 Apple Computer, Inc. Device-independent management of cryptographic information
US20070283449A1 (en) * 2006-04-27 2007-12-06 Scott Blum Controlled content release system and method
US20080263582A1 (en) * 2004-08-20 2008-10-23 Ryuichi Okamoto Content Reproducing Device and Content Preproducing Method
US20080294561A1 (en) * 2007-05-22 2008-11-27 Microsoft Corporation Media content deciphered when initiated for playback
US20080294901A1 (en) * 2007-05-22 2008-11-27 Farrugia Augustin J Media Storage Structures for Storing Content, Devices for Using Such Structures, Systems for Distributing Such Structures
US20090282241A1 (en) * 2006-04-13 2009-11-12 Hemma Prafullchandra Method and apparatus to provide a user profile for use with a secure content service
US20100058047A1 (en) * 2008-08-28 2010-03-04 General Instrument Corporation Encrypting a unique cryptographic entity
US8346807B1 (en) 2004-12-15 2013-01-01 Nvidia Corporation Method and system for registering and activating content
US8359332B1 (en) 2004-08-02 2013-01-22 Nvidia Corporation Secure content enabled drive digital rights management system and method
US8402283B1 (en) 2004-08-02 2013-03-19 Nvidia Corporation Secure content enabled drive system and method
EP2571026A3 (fr) * 2011-09-15 2013-09-11 Sony Corporation Appareil de traitement d'informations, procédé et programme de traitement d'informations
WO2014011312A1 (fr) * 2012-07-10 2014-01-16 Raytheon Bbn Technologies Corp. Dispositif usb/cd anti-wikileaks
US8751825B1 (en) * 2004-12-15 2014-06-10 Nvidia Corporation Content server and method of storing content
US8788425B1 (en) 2004-12-15 2014-07-22 Nvidia Corporation Method and system for accessing content on demand
US8813257B2 (en) 2010-04-28 2014-08-19 Panasonic Corporation Download terminal, and content utilization system
US8875309B1 (en) 2004-12-15 2014-10-28 Nvidia Corporation Content server and method of providing content therefrom
US8893299B1 (en) 2005-04-22 2014-11-18 Nvidia Corporation Content keys for authorizing access to content
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US20160314283A1 (en) * 2013-11-05 2016-10-27 Fox Broadcasting Company Method and apparatus for portably binding license rights to content stored on optical media
US9712321B2 (en) 2008-02-27 2017-07-18 International Business Machines Corporation Unified broadcast encryption system
US11695796B1 (en) * 2020-12-10 2023-07-04 Amazon Technologies, Inc. Device vulnerability detection during device handshake
US20230401292A1 (en) * 2017-04-04 2023-12-14 Nagravision S.A. Security of surveillance media

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10181953B1 (en) * 2013-09-16 2019-01-15 Amazon Technologies, Inc. Trusted data verification
JP4692003B2 (ja) * 2005-02-10 2011-06-01 ソニー株式会社 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム
JP2007043389A (ja) * 2005-08-02 2007-02-15 Ricoh Co Ltd 情報管理方法、情報管理システム、情報管理用サーバ装置及び記録媒体
CN101887736B (zh) * 2005-11-15 2012-11-21 松下电器产业株式会社 再现装置及其控制方法
US8155506B2 (en) * 2006-01-17 2012-04-10 Broadcom Corporation System and method for transport PID version check
JP4864081B2 (ja) * 2006-03-30 2012-01-25 富士通株式会社 電子装置および情報処理装置
US8102863B1 (en) 2006-06-27 2012-01-24 Qurio Holdings, Inc. High-speed WAN to wireless LAN gateway
US8615778B1 (en) 2006-09-28 2013-12-24 Qurio Holdings, Inc. Personalized broadcast system
US7983440B1 (en) 2006-11-02 2011-07-19 Qurio Holdings, Inc. Selection of I-frames for client-side watermarking
US7738676B1 (en) 2006-11-02 2010-06-15 Qurio Holdings, Inc. Client-side watermarking using hybrid I-frames
US7802306B1 (en) 2006-11-30 2010-09-21 Qurio Holdings, Inc. Multiple watermarks for digital rights management (DRM) and content tracking
US8000474B1 (en) * 2006-12-15 2011-08-16 Quiro Holdings, Inc. Client-side protection of broadcast or multicast content for non-real-time playback
JP2008234721A (ja) * 2007-03-19 2008-10-02 Nippon Telegr & Teleph Corp <Ntt> 映像再生装置
US8135947B1 (en) 2007-03-21 2012-03-13 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US7895442B1 (en) 2007-06-18 2011-02-22 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US8935796B2 (en) * 2008-03-14 2015-01-13 Microsoft Corporation Segment based digital content protection
US8136139B1 (en) * 2008-04-10 2012-03-13 Sprint Communications Company L.P. Receiving over-the-air licenses to high-quality media content
WO2010041991A1 (fr) * 2008-10-06 2010-04-15 Telefonaktiebolaget L M Ericsson (Publ) Gestion de droits numériques dans un environnement commandé par un utilisateur
WO2010110193A1 (fr) * 2009-03-24 2010-09-30 日本電気株式会社 Dispositif, procédé, programme et système de partage d'informations
JP5652394B2 (ja) * 2009-05-27 2015-01-14 日本電気株式会社 通信装置及び通信方法
JP5560723B2 (ja) * 2010-01-13 2014-07-30 ソニー株式会社 情報処理装置および方法、並びに、情報処理システムおよび方法
JPWO2011111213A1 (ja) * 2010-03-11 2013-06-27 株式会社東芝 コンテンツ配信システム、配信サーバ、及びユーザ端末
JP5050114B1 (ja) * 2011-04-28 2012-10-17 株式会社東芝 情報記録装置
JP2012248135A (ja) * 2011-05-31 2012-12-13 Sony Corp 情報処理装置、および情報処理方法、並びにプログラム
US9223939B2 (en) * 2012-10-11 2015-12-29 Activision Publishing, Inc. Key generation method
CN104904156B (zh) * 2013-01-08 2018-09-18 三菱电机株式会社 认证处理装置、认证处理系统以及认证处理方法
US9348903B2 (en) 2013-02-08 2016-05-24 John Moran Methods, devices and computer readable mediums for a music recognition game
US10181040B2 (en) * 2013-07-19 2019-01-15 Disney Enterprises, Inc. Alternate content playlist for locked media content
WO2015075860A1 (fr) * 2013-11-21 2015-05-28 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Appareil de lecture et procédé de lecture
US10641423B2 (en) 2016-06-09 2020-05-05 Nordson Corporation Adapters for connecting a separated-outlet fluid cartridge to a single-inlet mixer, and related methods
CN109495252A (zh) * 2018-12-04 2019-03-19 深圳前海环融联易信息科技服务有限公司 数据加密方法、装置、计算机设备及存储介质
CN112511299B (zh) * 2020-12-14 2023-09-15 深圳数字电视国家工程实验室股份有限公司 接口数据传输方法、装置、电子设备及存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040039907A1 (en) * 2001-07-26 2004-02-26 Yoichiro Sako Data recording apparatus and method and data reproducing apparatus and method
US20050111663A1 (en) * 2003-11-26 2005-05-26 International Business Machines Corporation System, method, and service for delivering enhanced multimedia content on physical media

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6516064B1 (en) 1995-07-25 2003-02-04 Sony Corporation Signal recording apparatus, signal record medium and signal reproducing apparatus
JPH11194987A (ja) * 1998-01-05 1999-07-21 Toshiba Corp 通信装置
JP2000113050A (ja) * 1998-10-01 2000-04-21 Hitachi Ltd 電子書籍システム
US6516065B1 (en) * 1998-11-30 2003-02-04 Hughes Electronics Corporation Method for implementing ciphered communication for single-hop terminal-to-terminal calls in a mobile satellite system
JP2001209583A (ja) * 2000-01-26 2001-08-03 Sony Corp データ記録再生器およびセーブデータ処理方法、並びにプログラム提供媒体
EP1507261B1 (fr) * 2001-08-08 2016-07-20 Panasonic Intellectual Property Management Co., Ltd. Système de protection du droit d'auteur, dispositif d'enregistrement, dispositif de déchiffrage et support d'enregistrement
US20040078584A1 (en) * 2002-08-23 2004-04-22 General Instrument Corp. Interchip transport bus copy protection
US7693795B2 (en) * 2002-09-05 2010-04-06 Panasonic Corporation Digital work protection system
EP1537466A2 (fr) * 2002-09-05 2005-06-08 Matsushita Electric Industrial Co., Ltd. Systeme de gestion de groupe, dispositif de gestion de groupe et dispositif membre
JP2006004473A (ja) * 2004-06-15 2006-01-05 Sony Corp コンテンツ記録媒体、再生許可情報取得方法、コンテンツ再生方法およびコンテンツ再生装置

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040039907A1 (en) * 2001-07-26 2004-02-26 Yoichiro Sako Data recording apparatus and method and data reproducing apparatus and method
US20050111663A1 (en) * 2003-11-26 2005-05-26 International Business Machines Corporation System, method, and service for delivering enhanced multimedia content on physical media

Cited By (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050201726A1 (en) * 2004-03-15 2005-09-15 Kaleidescape Remote playback of ingested media content
US20110191642A1 (en) * 2004-07-22 2011-08-04 Research In Motion Limited Method and apparatus for providing intelligent error messaging
US8429456B2 (en) 2004-07-22 2013-04-23 Research In Motion Limited Method and apparatus for providing intelligent error messaging
US7802139B2 (en) 2004-07-22 2010-09-21 Research In Motion Limited Method and apparatus for providing intelligent error messaging
US7930591B2 (en) * 2004-07-22 2011-04-19 Research In Motion Limited Method and apparatus for providing intelligent error messaging
US20110010554A1 (en) * 2004-07-22 2011-01-13 Research In Motion Limited Method and apparatus for providing intelligent error messaging
US9110799B2 (en) 2004-07-22 2015-08-18 Blackberry Limited Method and apparatus for providing intelligent error messaging
US7565577B2 (en) * 2004-07-22 2009-07-21 Research In Motion Limited Method and apparatus for providing intelligent error messaging
US20090187796A1 (en) * 2004-07-22 2009-07-23 Research In Motion Limited Method and apparatus for providing intelligent error messaging
US20060020859A1 (en) * 2004-07-22 2006-01-26 Adams Neil P Method and apparatus for providing intelligent error messaging
US8402283B1 (en) 2004-08-02 2013-03-19 Nvidia Corporation Secure content enabled drive system and method
US8359332B1 (en) 2004-08-02 2013-01-22 Nvidia Corporation Secure content enabled drive digital rights management system and method
USRE47772E1 (en) 2004-08-02 2019-12-17 Nvidia Corporation Secure content enabled hard drive system and method
US20060037055A1 (en) * 2004-08-04 2006-02-16 Konica Minolta Business Technologies, Inc. Audio data communication system, audio data transmission apparatus, audio data reception apparatus, composite data communication system, composite data transmission apparatus and composite data reception apparatus
US9106797B2 (en) 2004-08-20 2015-08-11 Panasonic Intellectual Property Management Co., Ltd. Content reproducing device and content reproducing method
US8166555B2 (en) * 2004-08-20 2012-04-24 Panasonic Corporation Content reproducing device and content preproducing method
US20080263582A1 (en) * 2004-08-20 2008-10-23 Ryuichi Okamoto Content Reproducing Device and Content Preproducing Method
US20060095384A1 (en) * 2004-10-28 2006-05-04 Fujitsu Limited Apparatus with electronic information transfer function or the like, program for electronic information transfer, and method for electronic information transfer
US8788430B2 (en) * 2004-10-28 2014-07-22 Fujitsu Limited Apparatus with electronic information transfer function or the like, program for electronic information transfer, and method for electronic information transfer
US8875309B1 (en) 2004-12-15 2014-10-28 Nvidia Corporation Content server and method of providing content therefrom
US8346807B1 (en) 2004-12-15 2013-01-01 Nvidia Corporation Method and system for registering and activating content
US8751825B1 (en) * 2004-12-15 2014-06-10 Nvidia Corporation Content server and method of storing content
US8788425B1 (en) 2004-12-15 2014-07-22 Nvidia Corporation Method and system for accessing content on demand
US8893299B1 (en) 2005-04-22 2014-11-18 Nvidia Corporation Content keys for authorizing access to content
US11727376B2 (en) 2005-10-11 2023-08-15 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US8306918B2 (en) * 2005-10-11 2012-11-06 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US10296879B2 (en) 2005-10-11 2019-05-21 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US20070083473A1 (en) * 2005-10-11 2007-04-12 Farrugia Augustin J Use of media storage structure with multiple pieces of content in a content-distribution system
US20070220585A1 (en) * 2006-03-01 2007-09-20 Farrugia Augustin J Digital rights management system with diversified content protection process
US20090282241A1 (en) * 2006-04-13 2009-11-12 Hemma Prafullchandra Method and apparatus to provide a user profile for use with a secure content service
US20070283449A1 (en) * 2006-04-27 2007-12-06 Scott Blum Controlled content release system and method
US20070260548A1 (en) * 2006-05-03 2007-11-08 Apple Computer, Inc. Device-independent management of cryptographic information
US8224751B2 (en) 2006-05-03 2012-07-17 Apple Inc. Device-independent management of cryptographic information
US10417392B2 (en) 2006-05-03 2019-09-17 Apple Inc. Device-independent management of cryptographic information
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US10574458B2 (en) 2007-05-22 2020-02-25 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US8347098B2 (en) * 2007-05-22 2013-01-01 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US20080294561A1 (en) * 2007-05-22 2008-11-27 Microsoft Corporation Media content deciphered when initiated for playback
US20080294901A1 (en) * 2007-05-22 2008-11-27 Farrugia Augustin J Media Storage Structures for Storing Content, Devices for Using Such Structures, Systems for Distributing Such Structures
US9712321B2 (en) 2008-02-27 2017-07-18 International Business Machines Corporation Unified broadcast encryption system
US9866377B2 (en) 2008-02-27 2018-01-09 International Business Machines Corporation Unified broadcast encryption system
US8538890B2 (en) 2008-08-28 2013-09-17 Motorola Mobility Llc Encrypting a unique cryptographic entity
US20100058047A1 (en) * 2008-08-28 2010-03-04 General Instrument Corporation Encrypting a unique cryptographic entity
WO2010025318A3 (fr) * 2008-08-28 2010-06-10 Motorola, Inc. Cryptage d'une entité cryptographique unique
US8813257B2 (en) 2010-04-28 2014-08-19 Panasonic Corporation Download terminal, and content utilization system
EP2571026A3 (fr) * 2011-09-15 2013-09-11 Sony Corporation Appareil de traitement d'informations, procédé et programme de traitement d'informations
WO2014011312A1 (fr) * 2012-07-10 2014-01-16 Raytheon Bbn Technologies Corp. Dispositif usb/cd anti-wikileaks
US9361483B2 (en) 2012-07-10 2016-06-07 Forcepoint Federal Llc Anti-wikileaks USB/CD device
US10460081B2 (en) * 2013-11-05 2019-10-29 Fox Broadcasting Company, Llc Method and apparatus for portably binding license rights to content stored on optical media
US11086971B2 (en) * 2013-11-05 2021-08-10 Disney Enterprises, Inc. Method and apparatus for portably binding license rights to content stored on optical media
US20160314283A1 (en) * 2013-11-05 2016-10-27 Fox Broadcasting Company Method and apparatus for portably binding license rights to content stored on optical media
US20230401292A1 (en) * 2017-04-04 2023-12-14 Nagravision S.A. Security of surveillance media
US12261942B2 (en) * 2017-04-04 2025-03-25 Nagravision S.A. Security of surveillance media
US11695796B1 (en) * 2020-12-10 2023-07-04 Amazon Technologies, Inc. Device vulnerability detection during device handshake

Also Published As

Publication number Publication date
JP4778965B2 (ja) 2011-09-21
WO2006046099A2 (fr) 2006-05-04
CN1989560A (zh) 2007-06-27
WO2006046099A3 (fr) 2006-06-22
US20090214042A1 (en) 2009-08-27
US7940935B2 (en) 2011-05-10
JP2008504640A (ja) 2008-02-14

Similar Documents

Publication Publication Date Title
US20060005257A1 (en) Encrypted contents recording medium and apparatus and method for reproducing encrypted contents
US7760988B2 (en) Content use device and recording medium
US7353543B2 (en) Contents distribution system
US7650359B2 (en) Content reproduction apparatus and content reproduction method
CN100498948C (zh) 重放装置、重放方法
US8116452B2 (en) Content playback device
US20110110516A1 (en) Content receiver, content reproducer, management server, content use system, content use method, method of write-out from content receiver, method of possible viewing time management on content reproducer, method of time limit fixation in management server, and program
US20070256141A1 (en) Content distribution system
CN100585713C (zh) 信息处理装置和信息处理方法
US20020188840A1 (en) Method and system for contents control
JP2009044773A (ja) 暗号化方法、復号化方法、秘密鍵生成方法およびプログラム
TW200423676A (en) System for identification and revocation of audiovisual titles and replicators
US20070112685A1 (en) Contents distribution system, recording apparatus, signature apparatus, contents supply apparatus, and contents playback apparatus
WO2004086370A2 (fr) Appareil d&#39;enregistrement et systeme de protection de contenu
US7715558B2 (en) Encrypted-content recording medium, playback apparatus, and playback method
WO2008134463A1 (fr) Procédé et appareil permettant de faciliter les changements de clé de contenu
US20090041424A1 (en) Transmitting-side recording and reproducing apparatus, and receiving-side recording and reproducing apparatus
US7433488B2 (en) Information recording medium drive device, information processing apparatus, data replay control system, data replay control method, and computer program
WO2005121980A1 (fr) Dispositif d’acquisition d’information, méthode d’acquisition d’information et programme d’acquisition d’information
KR100695665B1 (ko) 엔티티 잠금 보안 레지스트리를 사용하여 자료에 액세스하는 장치 및 방법
MXPA05001869A (es) Metodo y sistema de comunicacion entre un dispositivo de grabacion y/o reproduccion y una unidad remota.

Legal Events

Date Code Title Description
AS Assignment

Owner name: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NAKAHARA, TOHRU;OKAMOTO, RYUICHI;YAMAMOTO, MASAYA;AND OTHERS;REEL/FRAME:016009/0566

Effective date: 20041019

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: SOVEREIGN PEAK VENTURES, LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PANASONIC CORPORATION;REEL/FRAME:047914/0675

Effective date: 20181012

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载