WO2003067590A1 - Dispositif d'enregistrement de donnees et procede d'enregistrement - Google Patents
Dispositif d'enregistrement de donnees et procede d'enregistrement Download PDFInfo
- Publication number
- WO2003067590A1 WO2003067590A1 PCT/JP2003/001191 JP0301191W WO03067590A1 WO 2003067590 A1 WO2003067590 A1 WO 2003067590A1 JP 0301191 W JP0301191 W JP 0301191W WO 03067590 A1 WO03067590 A1 WO 03067590A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- recording
- processing unit
- circuit
- encrypted
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 103
- 238000001514 detection method Methods 0.000 claims abstract description 81
- 238000007906 compression Methods 0.000 claims description 70
- 230000006835 compression Effects 0.000 claims description 62
- 230000006837 decompression Effects 0.000 claims description 42
- 238000006243 chemical reaction Methods 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 7
- 230000006866 deterioration Effects 0.000 description 5
- 239000000284 extract Substances 0.000 description 4
- 230000002427 irreversible effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000013139 quantization Methods 0.000 description 3
- 230000000873 masking effect Effects 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 230000002542 deteriorative effect Effects 0.000 description 1
- 238000005184 irreversible process Methods 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
- G11B20/00181—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software using a content identifier, e.g. an international standard recording code [ISRC] or a digital object identifier [DOI]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00115—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers wherein the record carrier stores a unique medium identifier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00224—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a remote server
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00478—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier wherein contents are decrypted and re-encrypted with a different key when being copied from/to a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00884—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
Definitions
- the present invention relates to a data recording device and a recording method for efficiently recording data whose copyright or the like is managed using a watermark signal on a recording medium.
- copyright management data may be embedded in content data with a watermark signal.
- SDMI Secure Digital Music Init iative
- the purpose of this study is to embed copyright management data in the music data using a watermark signal, with the aim of developing security technology that can be provided to customers.
- the watermark signal is copyright management data such as copy permission data of content data and data on the number of copies that can be made.
- the data recording device When recording the encrypted and compressed content data in which such a watermark signal is embedded, the data recording device first decrypts the content data and then compresses the compressed content data. After decompression, a watermark signal is extracted from the content data. When the extracted watermark signal permits recording, the data recording device compresses the expanded content data again, encrypts the compressed content data, and then records the data. Record on recording media.
- the watermark of the content data is decrypted and the compressed content data is decompressed to detect the watermark signal, and then the watermark is detected. After detecting the signal and detecting the watermark signal, the content data is recompressed and re-encrypted, and then the encrypted and compressed content data is recorded on the recording medium.
- the above method is very inefficient because, before recording the content data on the recording medium, duplicate processing such as re-encryption and re-compression is performed. . '
- An object of the present invention is to provide a data recording apparatus capable of solving the problems of the above-mentioned conventionally proposed means for recording data on which copyright or the like is managed on a recording medium. And a recording method.
- Another object of the present invention is to provide a data recording apparatus and a recording method that can efficiently record without re-encryption or re-compression while managing the copyright of recorded data such as content data. Is to do.
- Still another object of the present invention is to prevent signal conversion processing from intervening until recording data is recorded on a recording medium, so that the recording data can be recorded on the recording medium without deterioration of the data. It is an object of the present invention to provide a data recording apparatus and method capable of performing the above.
- a data recording device includes: a decryption processing unit that performs decryption processing and / or decompression processing of input encryption and encryption of Z or compressed data; A detection unit for detecting whether or not a watermark signal is included in the output data; a data processing unit to which at least data from a decoding process is supplied and for performing signal processing for recording on the supplied data; A recording unit that records output data from the processing unit on a recording medium, and a detection unit that detects that a watermark signal is included; when the detection unit detects that the watermark signal is included, the operation of the data processing unit is performed based on the detected watermark signal. And a control unit for controlling. ⁇ .
- the data recording method performs decryption processing of input encryption and encryption of Z or compressed data and / or decompression processing of compression, and the decrypted data includes a watermark signal. Is detected, and when a watermark signal is detected, the processing operation for recording the input encrypted and / or compressed data on the recording medium based on the detected watermark signal is switched. .
- FIG. 1 is a block diagram illustrating the configuration of a data recording device to which the present invention is applied.
- FIG. 2 is a diagram illustrating a watermark signal.
- FIG. 3 is a flowchart for explaining the operation of the data recording apparatus shown in FIG.
- FIG. 4 is a block diagram illustrating another example of the data recording device to which the present invention is applied.
- FIG. 5 is a flowchart for explaining the operation of the data recording apparatus shown in FIG. BEST MODE FOR CARRYING OUT THE INVENTION
- a data recording device to which the present invention is applied and a data recording device using this data recording device will be described.
- the data recording method will be described with reference to the drawings.
- a data recording device 10 to which the present invention is applied has a built-in storage device such as a removable recording medium such as an optical disk or an IC card or a hard disk or the like through an input terminal 11.
- Content data read from the type recording medium and content data received via a network such as the Internet are input.
- the content data input to the input terminal 11 is content data such as music data, movie data, and game software, and is compressed and encrypted.
- copyright management data is embedded as a watermark signal.
- the copyright management data is data on the number of times that the content data can be reproduced, the number of times that the content data can be copied, authentication data, the copyright holder, and the like, and is used to prevent the content data from being illegally copied and distributed.
- such copyright management data is used to prevent the copyright management data from being reproduced only by extracting a part of the content data.
- the lock signal WM is distributed and recorded throughout the content data. Specifically, when the content data is audio data such as music data, the copyright management data is superimposed in the critical band (Cri ti cal B and) on the frequency axis using the audibility limit and masking effect. Also, using the temporal (temporal) masking effect, it is superimposed within the critical band on the time axis and recorded as a minute signal.
- the copyright management data is embedded in the content data as the watermark signal WM, so that the content data is not affected, that is, the copyright management data is superimposed and recorded on the content data so that it cannot be sensed by human hearing. .
- this copyright management data is recorded so as to be superimposed on the content data by spread spectrum.
- the content data is image data
- the copyright management data is the high-frequency component of the image data or redundant data. You can embed it as a watermark signal in the component.
- the data recording device 10 into which the content data, which is compressed and encrypted and in which the copyright management data is embedded, is input from the input terminal 11 is, as shown in FIG.
- Decryption circuit for decrypting data encryption 1 2 A decompression circuit 13 for decompressing the compressed content data decrypted by the encryption / decryption circuit 12; and a watermark detection circuit 14 for detecting a watermark signal from the decrypted and decompressed content data.
- an encryption circuit 15 for re-encrypting the content data ′ from the watermark detection circuit 14 and a recording medium 1 for recording the content data
- a compression circuit 17 for compressing the content data to be recorded on the recording medium 6 an encryption circuit 18 for encrypting the content data compressed by the compression circuit 17 and a content data for recording on the recording medium 16. It has a recording processing circuit 19 for performing recording processing on it, and a reproduction processing circuit 20 for reproducing content data.
- the data recording device 10 is used to selectively input the compressed and encrypted content data from the input terminal 11 and the content data decrypted by the encryption / decryption circuit 12 to the watermark detection circuit 14.
- 1 selector 21 and the compressed and encrypted content data from the watermark detection circuit 14 and the re-encrypted content data from the encryption circuit 15 are selectively sent to the recording processing circuit 19. It comprises a second selector 22 for outputting and a recording control circuit 23 for controlling a recording operation of the content data on the recording medium 16.
- the encryption / decryption circuit 12 receives compressed and encrypted content data transmitted from another device or read from a recording medium such as an optical disk from the input terminal 11.
- the encryption / decryption circuit 12 stores the encryption key data for decrypting the encryption of the content data in a memory (not shown), and when the compressed and encrypted content data is input from the input terminal 11. Then, the content data is decrypted using the encryption key data stored in the memory.
- the signal decoding circuit 12 outputs the decrypted content data in a compressed state to the decompression circuit 13 and to the first selector 21.
- the decompression circuit 13 decompresses the compressed content data decrypted by the encryption / decryption circuit 12.
- the decompression circuit 13 is provided with an ATRAC 3 (Adaptive Transform “Acoustic Coding 3: trademark”), an MPEG-2 AAC (Motion Picture Expert Group 2 Advanced Audio Coding), an MP3 ( MPEG-1 Audio Layer3), Twin VQ (Transform-Doma Decompresses content data that has been compressed using a method such as in Weighed Interleave Vector Qualification (trademark), MSA udio (WMA .- Windows Media Audio: trademark), or OggVorbis (trademark).
- the decompression circuit 13 decompresses the content data compressed by a method such as MPEG4 or MPEG7.
- the decompression circuit 13 outputs the decompressed content data to the watermark detection circuit 14.
- the watermark detection circuit 14 is composed of a detection circuit 26 for detecting a watermark signal and a compression / encryption input from the input terminal 11; the content data or the compressed / decrypted data decrypted by the encryption / decryption circuit 12 A first switching circuit 27 and a second switching circuit 28 for controlling the output of the content data in the state of being turned on.
- the detection circuit 26 receives the content data decrypted by the encryption / decryption circuit 12 and decompressed by the decompression circuit 13.
- the detection circuit 26 extracts a watermark signal from a critical band on the frequency axis or the time axis from the input content data, and decodes the extracted watermark signal to generate copyright management data.
- the detection circuit 26 outputs the copyright management data to the recording control circuit 23, and controls the switching between the first switching circuit 27 and the second switching circuit 28 based on the copyright management data. I do.
- the detection circuit 26 detects the first switching circuit 27 and the second switching circuit 28. When either of them is switched to the ON state to permit the recording of the content data on the recording medium 16 and the generated copyright management data prohibits the recording of the content data, the first switching circuit 27, The switching circuit 28 of Step 2 is turned off to prohibit the recording of the content data on the recording medium 16.
- the detection circuit 26 is used for recording the compressed and encrypted content data input from the input terminal 11 as it is on the recording medium 16 or for detecting the compressed and decrypted content data decoded by the symbol decoding circuit 12.
- the first switching circuit 27 When content data is re-encrypted to improve security, the first switching circuit 27 is switched on and the second switching circuit 28 is switched off.
- the detection circuit 26 performs the first switching when the content data decrypted by the encryption / decryption circuit 12 and decompressed by the decompression circuit 13 is recompressed and re-encrypted and then recorded on the recording medium 16.
- the circuit 27 is switched off, and the second switching circuit 28 is switched on.
- the encryption circuit 15 stores the compressed content data decrypted by the signal decoding circuit 12. Data is input.
- the encryption circuit 15 encrypts the input compressed content data using, for example, encryption key data different from the encryption key data of the content data input from the input terminal 11.
- the encryption key data is, for example, data based on the serial number of the recording medium 16 for recording the content data, and the encryption circuit 15 is used for the content data input from the input terminal 11 as described above.
- the encryption circuit 15 outputs the encrypted content data to the recording processing circuit 19 via the second selector 22.
- the compression circuit 17 receives the compressed content data decrypted by the encryption / decryption circuit 12. .
- the compression circuit 17 decompresses it using the above-mentioned ATRAC 3, MP EG-2 AAC, MP 3, Tw in VQ, MS Au dio, Ogg V orbis, etc.
- the content data expanded by the circuit 13 is compressed again.
- the compression circuit 17 re-compresses the content data expanded by the expansion circuit 13 using a method such as MPEG4 or MPEG7.
- the compression circuit 17 outputs the compressed content data to the encryption circuit 18.
- the compression circuit 17 may re-compress the content data by the same compression method as the compression method of the content data input to the input terminal 11, or the recording medium 16 for recording the content data. May be recompressed by a compression method different from that of the content data input to the input terminal 11 according to the type of the content data.
- the encryption circuit 18 receives the content data compressed by the compression circuit 17.
- the encryption circuit 18 stores encryption key data in a memory (not shown), and encrypts the input content data using the encryption key data read from this memory.
- the encryption circuit 15 outputs the encrypted content data to the recording processing circuit 19.
- the encryption circuit 18 may re-encrypt the content data using the same encryption method as the encryption method of the content data input to the input terminal 11, or may change the encryption key data to change the content data. May be re-encrypted.
- the content data input to the input terminal 11 may be re-encrypted using a different encryption method.
- the recording processing circuit 19 is connected to the compressed / encrypted content data or the encryption circuit 15 inputted from the input terminal 11 via the first switching circuit 27 of the watermark detection circuit 14. Re-encrypted compressed and encrypted content data or content data re-compressed by the compression circuit 17 and re-encrypted by the encryption circuit 18 is input, and the input content data is recorded on the recording medium 16. Perform recording processing for recording in The recording processing circuit 19 performs, for example, error correction encoding processing, modulation processing such as 8-14 modulation and 8-16 modulation on the content data, and performs recording data for recording on the recording medium 16. Generate
- the recording medium 16 is a hard disk, a rewritable or write-once optical disk, a magneto-optical disk, a magnetic disk, a magnetic tape, an IC card using a semiconductor memory as a recording medium, or the like. It is a removable recording medium. On such a recording medium 16, recording data is recorded by recording means such as a magnetic head and an optical pickup according to the type of the recording medium.
- the reproduction processing circuit 20 receives content data input from the input terminal 11, decoded by the signal decoding circuit 12, and expanded by the expansion circuit 13.
- the reproduction processing circuit 20 performs a process such as converting a digital signal to an analog signal on the content data, and outputs the content data to the output terminal 24.
- a speaker, a monitor, and the like are connected to the output terminal 24. Audio data and the like are output as audible sounds from the speaker, and image data and the like are displayed on the monitor.
- the first selector 21 selectively switches between the compressed and encrypted content data from the input terminal 11 and the content data decrypted by the decryption circuit 12 by the first switching of the watermark detection circuit 14.
- Circuit 27 can be input.
- the second selector 22 is configured to store the compressed and encrypted content data input from the input terminal 11 from the watermark detection circuit 14 and the re-encrypted code from the encryption circuit 15. : Can be selectively output to the recording processing circuit 19.
- the recording control circuit 23 controls the watermark detection circuit 14, the first selector 21, and the second selector 22 according to the input from the encryption / decryption circuit 12. Specifically, the recording control circuit 23 determines whether the compressed and encrypted content data input from the input terminal 11 is data that can be recorded on the recording medium 16 as it is, In step 5, it is determined whether the data needs to be re-encrypted or needs to be re-compressed and re-encrypted. The recording control circuit 23, for example, directly controls the recording medium based on the copyright management data generated from the watermark signal.
- the recording control circuit 23 records the compressed and encrypted content data inputted from the input terminal 11 onto the recording medium 16 as it is, so that the input terminal 11 and the first of the watermark detection circuit 14
- the switching circuit 27 is connected, and the first selector 21 is controlled so that the compressed and encrypted content data input from the input terminal 11 is input to the first switching circuit 27.
- the recording control circuit 23 connects the first switching circuit 27 and the recording processing circuit 19, and the compressed and encrypted content data input from the input terminal 11 is directly used as the recording processing circuit 1.
- the second selector 22 is controlled so as to be input to '9.
- the recording control circuit 23 decrypts only the encryption of the compressed and encrypted content data input from the input terminal 11 and re-encrypts it for security and records it on the recording medium 16,
- the circuit 12 is connected to the first switching circuit 27, and the first selector 2 is connected so that the compressed content data decoded by the signal decoding circuit 12 is input to the first switching circuit 27. Control one.
- the recording control circuit 23 connects the encryption circuit 15 and the recording processing circuit 19, and the compressed and encrypted content data encrypted by the encryption circuit 15 is recorded by the recording processing circuit 19
- the second selector 22 is controlled so as to be input to the second selector 22.
- the data recording device 10 When the data recording device 10 receives the compressed and encrypted content data from the input terminal 11, the data recording device 10 decrypts the code using the symbol key data stored in the memory by the symbol decryption circuit 12. , And then compressed by the decompression circuit 13 Decompress the content data.
- the content data decoded by the signal decoding circuit 12 and decompressed by the decompression circuit 13 is input to a detection circuit 26 constituting the watermark detection circuit 14.
- the detection circuit 26 extracts a watermark signal from a critical band on the frequency axis or the time axis from the input content data, decodes the watermark signal to generate copyright management data, and generates the copyright management data.
- the data is output to the recording control circuit 23.
- the recording control circuit 23 proceeds to any one of steps S2 to S5 according to the copyright management data input from the detection circuit 26.
- the recording control circuit 23 can directly record the compressed and encrypted content data input from the input terminal 11 on the recording medium 16 based on the copyright management data input from the detection circuit 26.
- step S2 the following processing is performed. That is, in step S6, the detection circuit 26 switches the first switching circuit 27 to the ON state, switches the second switching circuit 28 to the OFF state, and furthermore, the recording control circuit 23 11 1 is connected to the first switching circuit 27 of the watermark detection circuit 14, and the compressed and encrypted content data input from the input terminal 11 is input to the first conversion circuit 27. Switch the first selector 21 as described above.
- the recording control circuit 23 connects the first switching circuit 27 to the recording processing circuit 19, and the compressed and encrypted content data input from the input terminal 11 is transmitted to the first switching circuit 27.
- the second selector 22 is switched so as to be directly input to the recording processing circuit 19 via 27.
- the compressed and encrypted content data input from the input terminal 11 is transferred to the path including the decryption circuit 12 for detecting the watermark signal, the decompression circuit 13 and the detection circuit 26.
- the signal is input to the recording processing circuit 19 via the first switching circuit 27 constituting the watermark detection circuit 14, and is recorded on the recording medium 16 as it is.
- the decoding of the symbol and the expansion of the compression are performed exclusively for detecting the watermark signal, and the recording on the recording medium i 6 is performed by the compression and encryption input from the input terminal 11. Since the entered content data is recorded as it is, the input content data can be efficiently recorded on the recording medium 16.
- step S2 the compressed and encrypted content is recorded on the recording medium 16. Until the data is recorded, decrypt the code and decompress it, detect the watermark signal, and after detecting the watermark signal, re-compress the content data and re-encrypt it before encrypting it on the recording medium. This eliminates the need to perform signal O when processing the compressed and compressed content data, thereby preventing data deterioration due to irreversible signal conversion of the content data.
- Step S' 2 is performed when the copyright management data indicates that the compressed and encrypted content data input from the input terminal 11 is to be directly recorded on the recording medium 16, and the detection circuit 2 This may be performed even if the watermark signal cannot be extracted in step 6. This is because the recording and reproduction of this content data is controlled based on the detected watermark signal. Therefore, when the watermark signal cannot be detected, the content data is decrypted and reproduced. Cannot be done, and there is no risk of harming the interests of the copyright owner.
- the recording control circuit 23 re-encrypts the compressed and encrypted content data input from the input terminal 11 based on the copyright management data input from the detection circuit 26 to improve security. When it is determined that is necessary, the following processing is performed in step S3.
- step S7 the detection circuit 26 switches the first switching circuit 27 to the ON state, switches the second switching circuit 28 to the OFF state, and furthermore, the recording control circuit 23
- the decoding circuit 12 and the first switching circuit 27 are connected to each other, and the first content data decoded by the decoding circuit 12 is input to the first switching circuit 27 so as to be input to the first switching circuit 27.
- Switch selector 21 the recording control circuit 23 connects the encryption circuit 15 to the recording processing circuit 19, and the compressed and encrypted content data encoded by the encryption circuit 15 is recorded in the recording processing circuit 19
- the second selector 22 is switched so as to be input to the second selector 22.
- the compressed and encrypted content data input from the input terminal 11 is decrypted by the encryption / decryption circuit 12 using the encryption key data stored in the memory (not shown), and then the watermark is detected.
- the compressed re-encryption re-encrypted by the encryption circuit 15 The converted content data is input to the recording processing circuit 19 and recorded on the recording medium 16.
- step S3 the decryption of the encryption and the decompression of the compression are performed exclusively for detecting the watermark signal, and the recording on the recording medium 16 is performed by the compression and encryption input from the input terminal 11. Since the encrypted content data is decrypted by the encryption circuit 15 and re-encrypted by the encryption circuit 15, the content data can be efficiently recorded on the recording medium 16. In the method of step S3, since the re-encryption is performed by the encryption circuit 15 until the content data is recorded on the recording medium 16, the content data to be recorded on the recording medium 16 is Security, that is, it is possible to prevent the decryption of the code by an unauthorized third party. Further, in the method of step S3, the watermark signal is detected after the encryption is decrypted and decompressed, and the content and data are not re-compressed after the detection of the watermark signal. Data deterioration due to conversion can be prevented.
- the recording control circuit 23 decodes the compressed and encrypted content data input from the input terminal 11 by the encryption / decryption circuit 12 based on the copyright management data input from the detection circuit 26.
- the following processing is performed in step S4. That is, in step S8, the detection circuit 26 switches the second switching circuit 28 to the on state, switches the first switching circuit 27 to the off state, and outputs the compressed encryption data inputted from the input terminal 11. This prevents the input content data or the content data decrypted by the decryption circuit 12 from being input to the encryption circuit 15 and the recording processing circuit 19 subsequent to the first switching circuit 27.
- the compressed and encrypted content data input from the input terminal 11 is decrypted by the decryption circuit 12 using the key data stored in the memory (not shown), and then expanded by the decompression circuit.
- it is then input to the detection circuit 26 and to the compression circuit 17 via the second switching circuit 28. That is, here, in step S1, the content data input to the encryption / decryption circuit 12 and the decompression circuit 13 to detect the watermark signal is cut off.
- the signal is input to the compression circuit 17 via the conversion circuit 2.
- the content data decompressed by the compression circuit 17 is then recompressed by the compression circuit 17, encrypted by the encryption circuit 18, recorded by the recording processing circuit 19, and subjected to the recording processing by the recording medium 1. Recorded in 6. ...
- step S4 when it is necessary to record content data input from the input terminal 11 ⁇ 1 on the recording medium 16 using a compression encryption method different from the compression encryption method,
- the content data decompressed by the decompression / decompression circuit 13 by the circuit 12 is recompressed by the predetermined method by the compression circuit 17 and re-encrypted by the predetermined method by the encryption circuit 18, that is, the input terminal 11
- the data can be recorded on the recording medium 16 by changing the compression / encryption method as compared with the time of input to the storage medium.
- the recording control circuit 23 prohibits the recording of the compressed and encrypted content data input from the input terminal 11 on the recording medium 16 based on the copyright management data input from the detection circuit 26. If it is determined that the process is performed, the following processing is performed in step S5. That is, in step S9, the detection circuit 26 switches both the first switching circuit 27 and the second switching circuit 28 to the OFF state, and the compressed and encrypted data inputted from the input terminal 11 is inputted. Content data or the compressed content data decrypted by the encryption / decryption circuit 12 is not input to the recording processing circuit 19 or the encryption circuit 15 via the first switching circuit 27. Alternatively, the decompressed content data output from the decompression circuit 13 is prevented from being input to the compression circuit 17 via the second switching circuit 28. That is, here, by switching the first switching circuit 27 and the second switching circuit 28 to the off state, the content data input from the input terminal 11 is input to the recording processing circuit 19 and recorded. Do not record on medium 16.
- step S5 copyright management data is generated from the watermark signal embedded in the content data, and the generated copyright management data prohibits recording on the recording medium 16.
- the recording on the recording medium 16 can be reliably prohibited, and the interest of the copyright holder is unreasonable. Can be prevented from being harmed.
- the compressed and encrypted content data input from the input terminal 11 is reproduced, the compressed and encrypted content data input from the input terminal 11 is stored in a memory (not shown) by the encryption / decryption circuit 12. The data is decrypted using the “#” key data that has been extracted, decompressed by the decompression circuit 13 and input to the detection circuit 2.6.
- the detection circuit 26 extracts the watermark signal from the critical band on the frequency axis or the time axis from the content data input from the decompression circuit 13 and decodes the watermark signal to obtain the copyright management data. Then, it is determined whether the generated copyright management data permits reproduction of the content data.
- the content data decoded by the decoding circuit 12 and decompressed by the decompression circuit 13 is input to the reproduction processing circuit 20, and the reproduction processing is performed.
- demodulation and error correction decoding by circuit 20 if the content data is image data including audio data, it is output as an audible sound from the speed connected to output terminal 24. Is displayed on the monitor as an image.
- the compressed and encrypted content data input to the input terminal 11 is directly recorded on the recording medium 16 as in step S2.
- the compressed and encrypted content data input to the input terminal 11 is only re-encrypted to improve security, and is stored on the recording medium 16 without recompression. Since the recording is performed, the content data can be recorded on the recording medium 16 efficiently, that is, quickly.
- at least irreversible recompression processing such as DCT processing and quantization processing is not performed, so that signal degradation of the content data can be prevented.
- the data recording / reproducing device 30 has a first input terminal 31 and a second input terminal 32 as input terminals.
- the first input terminal 31 receives content data read from a recording medium such as an optical disk, an IC card, or a hard disk, and content data received via a network such as the Internet.
- the content data input to the first input terminal 31 is content data of music data, movie data, game software, etc. as described above, and is compressed and encrypted. Have been.
- this content data is encrypted using DRM (Digital Rights Management) that manages copyright, and the content itself is key code data combined with content ID data issued by an authentication agency. It is encrypted.
- This content data is copyright-managed by DRM, and includes copyright management data such as the number of times of reproduction and the number of times of copying for each content.
- unencrypted that is, plaintext compressed content data is input from a recording medium such as an optical disk, an IC card, a hard disk, or a network such as the Internet.
- Copyright management data is embedded in this content data by a watermark signal. Note that the watermark signal is the same as that input to the data recording device 10, and therefore detailed description is omitted.
- the first input terminal 31 and the second input terminal 32 may be input with content data that has been authenticated by a secure authentication channel (SAC) or the like, or with predetermined secure content data.
- SAC secure authentication channel
- the data recording / reproducing device 30 to which such content data is input includes an encryption / decryption circuit 33 for decoding the symbol of the compressed and encrypted content data input from the first input terminal 31.
- the decompression circuit 34 expands the compressed content data decrypted by the encryption / decryption circuit 33 and the compressed content data input from the second input terminal 32, and the decompression circuit 34 expands the content data.
- a watermark detection control circuit 35 for extracting a watermark signal from the extracted content data
- a first switching circuit 36 for controlling the output based on the watermark signal extracted by the watermark detection control circuit 35
- a compression circuit 37 for recompressing the content data expanded by the decompression circuit 34
- an encryption circuit 38 for re-encrypting the content data recompressed by the compression circuit 37
- a recording medium 3 And a recording processing circuit 40 for performing recording processing on the content data for recording on the content data 9.
- the data recording / reproducing device 30 includes a detection circuit 4 for detecting whether the content data input from the first input terminal 31 or the second input terminal 32 is encrypted or authenticated. 1 and a second switching circuit 42 and a decompression circuit for controlling the output of the compressed and encrypted content data inputted from the first input terminal 31 And a third switching circuit 43 for controlling the output of the content data expanded in 34.
- the encryption / decryption circuit 33 receives the compressed and encrypted content data input to the first input terminal 31.
- the signal decryption circuit 33 stores encryption key data for decrypting the encryption of the content data in a memory (not shown), and compresses and decodes the content data from the first input terminal 31.
- the content data is decrypted using the encryption key data stored in a memory (not shown) and, for example, content ID data.
- the encryption / decryption circuit 33 outputs the decrypted compressed content data to the decompression circuit 34.
- the decompression circuit 34 decompresses the compressed content data decoded by the ⁇ decoding circuit 33.
- the decompression circuit 34 when the content data is audio data, the decompression circuit 34 outputs the compressed data in a format such as ATRAC 3, MPEG-2 AAC, MP3, Tw in VQ, MS Au dio, Ogg V orbis, or the like. Decompress the data.
- the decompression circuit 34 decompresses the content data compressed by a method such as MPEG4 or MPEG7.
- the decompression circuit 34 outputs the content data decrypted by the encryption / decryption circuit 33 via the third switching circuit 43 and decompressed by the decompression circuit 34 to the watermark detection control circuit 35 or the compression circuit 37.
- the watermark detection control circuit 35 receives the content data decrypted by the encryption / decryption circuit 33 and decompressed by the decompression circuit 34 via the third switching circuit 43. ⁇ Otamaku detection control circuit 35, from the input content data, to extract the watermark signal than the critical band on the frequency axis or the time axis and decodes it to generate a copyright management data.
- the watermark detection control circuit 35 controls switching of the first switching circuit 36 based on the generated copyright management data. When the generated copyright management data permits recording of the content data on the recording medium 39, the watermark detection control circuit 35 switches the first switching circuit 36 to the ON state, and switches the content data. Output to the compression circuit 37.
- the watermark control circuit 35 turns off the first switching circuit 36 when the generated copyright management data prohibits the recording of content data on the recording medium 39. Switch so that the content data is not output to the compression circuit 37.
- the compression circuit 37 receives the content data expanded by the expansion circuit 34 via the third switching circuit 43 or the watermark detection control circuit 35 or the first switching circuit 36. You. When the content data is audio data, the compression circuit 37 decompresses the data in the decompression circuit 34 using the above-described ATRAC 3, MPEG-2 AAC, MP3, Twin VQ, MSA udio, Ogg V orbis, etc. The compressed content data is compressed again. When the content data is video data, the compression circuit 37 re-compresses the content data expanded by the expansion circuit 34 using a method such as .MPEG 4 or MPEG 7. The compression circuit 37 outputs the compressed content data to the encryption circuit 38.
- the compression circuit 37 may re-compress the content data by the same compression method as the compression method of the content data input to the first input terminal 31 or the second input terminal 32. Re-compression may be performed using a compression method different from that of the content data input to the first input terminal 31 or the second input terminal 32.
- the encryption circuit 38 receives the content data compressed by the compression circuit 37.
- the encryption circuit 38 stores the encryption key data in a memory (not shown). And encrypted using the encryption key data.
- the encryption circuit 38 outputs the encrypted content data to the recording processing circuit 40.
- the encryption circuit 38 may re-encrypt the content data using the same encryption method as the encryption method of the content data input to the first input terminal 31 or the second input terminal 32, Further, the content data input to the first input terminal 31 or the second input terminal 32 may be re-encrypted by an encryption method different from that of the content data.
- the recording processing circuit 40 receives the content data recompressed by the compression circuit 37 and re-encrypted by the encryption circuit 38, and performs a recording process for recording the input content data on the recording medium 39. Is applied.
- the recording processing circuit 40 performs, for example, error correction coding processing, modulation processing such as 8-14 modulation and 8-16 modulation on the content data, and performs recording for recording on the recording medium 39. Generate data.
- the recording medium 39 is the same as the recording medium 16 used in the data recording device 10 described above, and is described in detail here. Although detailed description is omitted, recording data supplied from the recording processing circuit 40 is recorded on the recording medium 39 by recording means such as a magnetic disk and an optical pickup according to the type of the recording medium. .
- Content data is input to the detection circuit 41 from the first input terminal 31 or the second input terminal 32.
- the detection circuit 41 detects the input data by detecting an identifier or the like in the input content data, and determines whether the content data is encrypted data or authenticated data.
- the detection circuit 41 switches the second switching circuit 42 to the ON state, or The third switching circuit 43 is switched so that the decompression circuit 34 and the compression circuit 37 are connected.
- the detection circuit 41 switches the second switching circuit 42 to the off state and expands the third switching circuit 43. Switch so that the circuit 34 and the watermark detection control circuit 35 are connected.
- step S11 the data recording / reproducing device 30 detects an identifier from the input content data by the detection circuit 41, and based on the detected identifier, the input content data; It is determined whether the data is correct.
- step S12 the data recording / reproducing device 30 determines that the input content data is encrypted based on the identifier included in the content data
- step S12 the data is not encrypted.
- the data recording / reproducing device 30 detects an identifier included in the input content data by the detection circuit 41, and It determines whether the authenticated content data is authenticated data. That is, the detection circuit 41 refers to the identifier included in the content data and transmits the data from the device of the authorized user. Content data that has been copied or read from a legitimate recording medium.
- step S13 determines that the data is not authenticated.
- step S16 determines that the data is not authenticated.
- step S13 the data recording / reproducing device 30 detects the identifier of the input content data by the detection circuit 41, and decrypts the encrypted content data based on the identifier based on the identifier. It is determined whether the data needs to be processed. When the data recording / reproducing device 30 determines that it is not necessary to decrypt the ⁇ ′ symbol of the input content data, the process proceeds to step S 14, and it is necessary to decrypt the content data. When it is determined, the process proceeds to step S17.
- step S14 the data recording / reproducing device 30 records the compressed and encrypted content data inputted from the first input terminal 31 on the recording medium 39 as it is. That is, the detection circuit 41 switches the second switching circuit 42 on and the third switching circuit 43 off, that is, no data is output to the watermark detection control circuit 35 or the compression circuit 37. Switch to state. As a result, the compressed and encrypted content data input from the first input terminal 31 is input to the recording processing circuit 40 via the second switching circuit 42, and the recording processing circuit 40 After the recording process is performed, it is recorded on the recording medium 39.
- the data recording / reproducing device 30 When determining that the content data input in step S11 is unencrypted data, the data recording / reproducing device 30 includes the content data input in the detection circuit 41 in step S15. Then, it determines whether or not the input content data is authenticated data. When the data recording / reproducing device 30 determines that the input content data is the authenticated data based on the identifier included in the content data, the process proceeds to step S15, and the data recording / reproducing device 30 proceeds to step S15. When it is determined that there is, the process proceeds to step S23.
- step S12 determines that the content data input in step S12 is unauthenticated data
- the data recording / reproducing apparatus 30 determines in step S16 that the content data input in the detection circuit 41 is Detect the identifier contained in and input It is determined whether or not the obtained content data is decoded data.
- the process proceeds to step S13, and the unauthenticated data
- the process proceeds to step S.23.
- the recording on the recording medium 39 is input from the first input terminal 31 or the second input terminal 32. Since the content data is directly recorded on the recording medium 39, the content data can be efficiently recorded on the recording medium 39. Still, in this method, the content data is recompressed and re-encrypted before recording the compressed and encrypted content data on the recording medium 39, and then the encrypted and compressed content is recorded on the recording medium. Since signal processing such as data recording is not performed, data deterioration due to irreversible signal conversion can be prevented.
- step S13 When it is determined in step S13 that the encryption of the content data input from the first input terminal 31 must be decrypted, the data recording / reproducing apparatus 30 proceeds to step S17 where the encryption / decryption circuit 33 The symbol of the compressed and encrypted content data input to the server is decrypted using the content ID data included in the content data and the encryption key data stored in a memory (not shown).
- the data recording / reproducing device 30 After decoding the symbol of the content data, the data recording / reproducing device 30 detects the identifier included in the content data by the detection circuit 41 in step S18, and based on the detected identifier, the input content. Determine if the data is compressed. When the data recording / reproducing device 30 determines that the input content data is compressed based on the identifier included in the content data, the process proceeds to step S 19, and the input content data is compressed. When it is determined that it has not been performed, the process proceeds to step S20.
- step S19 the data recording / reproducing device 30 decompresses the compressed content data decoded by the encryption / decryption circuit 33.
- the detection circuit 41 switches the second switching circuit 42 to the off state and switches the third switching circuit 43 to connect the decompression circuit 34 and the compression circuit 37.
- the expansion circuit 34 outputs the compressed and expanded content data via the third switching circuit 43 to the compression circuit 37.
- step S20 the compression circuit 37 performs recompression processing of the content data expanded by the expansion circuit 34 using the same or different compression method as the compression method of the input content data.
- the content data is output to the encryption circuit 38.
- step S21 the encryption circuit 38 re-encrypts the content data compressed by the compression circuit 37 using the same or different encryption method as that of the input content data.
- the content data encrypted by the encryption circuit 38 is input to the recording processing circuit 40 in step S22, subjected to recording processing, and recorded on the recording medium 39.
- step S17 to step S22 it is necessary to record the content data inputted from the first input terminal 31 on the recording medium 39 in a method different from the compression method or the encryption method.
- the content data decrypted by the decoding circuit 33 and decompressed by the expansion circuit 34 is recompressed by the compression circuit 37 by a predetermined method, and re-encrypted by the encryption circuit 38 by a predetermined method. That is, the content data can be recorded on the recording medium 39 by changing the compression / encryption method from that at the time of input to the first input terminal 31.
- step S23 the data recording / reproducing apparatus 30 determines in step S23 that the detection circuit 41 An identifier is detected from the input content data, and it is determined whether or not the input content data is compressed based on the identifier.
- the process proceeds to step S24, and when it is determined that the content data is not compressed, the process proceeds to step S25.
- step S24 the decompression circuit 34 receives the compressed content data. When pressed, it expands the input content data.
- the content data which is not encrypted and whose authentication cannot be confirmed is unencrypted plaintext content data such as a compact disk.
- the data is illegal data such as data transmitted from the transmission device of the unauthorized user.
- content data that is not encrypted and for which authentication cannot be confirmed may be data whose source is unclear and harms the interests of the copyright owner.
- the data recording / reproducing device 30 when the data recording / reproducing device 30 according to the present invention is not encrypted in step S11, step S15, and step S16 and the authentication cannot be confirmed, the data recording / reproducing device 30 performs the water-based processing based on the content data. Extract the mark signal and refer to the copyright management data.
- step S25 the data recording / reproducing device 30
- step S26 the watermark detection control circuit 35 includes the third switching circuit
- step S26 the data recording / reproducing device 30 determines that the watermark detection control circuit 35 has determined that the generated copyright management data permits recording on the recording medium 39.
- step S20 If the watermark detection control circuit 35 does not embed a watermark signal in the content data or cannot decode the content data, the process proceeds to step S20, and the content data is stored in the recording medium.
- the content data output from the watermark detection control circuit 35 is supplied to the compression circuit in steps S20 to S22.
- step S27 the first switching circuit 36 is turned off. To prevent the content data of the watermark detection control circuit 35 from being input to the compression circuit 37. That is, the data recording / reproducing device 30 turns off the first switching circuit 36 and also turns off the second switching circuit 42 to record the content data on the recording medium 39. Ban.
- the content data input in step S11, step S15, and step S16 is encrypted data and Z or authenticated data. If the content data is determined to be encrypted and / or authenticated secure content data, the content data input to the first input terminal 31 is directly recorded on the recording medium 39. Therefore, the content data can be efficiently, that is, quickly recorded on the recording medium 39. Further, in the data recording / reproducing apparatus 30, when the compressed and decoded content data is directly recorded on the recording medium 39, at least irreversible recompression processing such as DCT processing and quantization processing is not performed. Therefore, it is possible to prevent the deterioration of the content data signal.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
- Television Signal Processing For Recording (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2003-7012912A KR20040077446A (ko) | 2002-02-05 | 2003-02-05 | 데이터 기록 장치 및 기록 방법 |
US10/473,812 US7436959B2 (en) | 2002-02-05 | 2003-02-05 | Data recording apparatus and recording method |
JP2003566850A JP3925496B2 (ja) | 2002-02-05 | 2003-02-05 | データ記録装置及び記録方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002-28648 | 2002-02-05 | ||
JP2002028648 | 2002-02-05 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/041,201 Continuation US20050124950A1 (en) | 2002-08-20 | 2005-01-25 | Disposable wearing article |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003067590A1 true WO2003067590A1 (fr) | 2003-08-14 |
Family
ID=27677865
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/001191 WO2003067590A1 (fr) | 2002-02-05 | 2003-02-05 | Dispositif d'enregistrement de donnees et procede d'enregistrement |
Country Status (5)
Country | Link |
---|---|
US (1) | US7436959B2 (ja) |
JP (1) | JP3925496B2 (ja) |
KR (1) | KR20040077446A (ja) |
CN (1) | CN100458951C (ja) |
WO (1) | WO2003067590A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005141525A (ja) * | 2003-11-07 | 2005-06-02 | Sony Corp | 電子機器、情報処理システム、情報処理装置および方法、プログラム、並びに記録媒体 |
JP2007142810A (ja) * | 2005-11-18 | 2007-06-07 | Matsushita Electric Ind Co Ltd | データ記録システム |
US7436959B2 (en) | 2002-02-05 | 2008-10-14 | Sony Corporation | Data recording apparatus and recording method |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002074831A (ja) * | 2000-08-31 | 2002-03-15 | Sony Corp | データ出力方法および装置、データ再生方法および装置、データ記録方法および装置、データ記録再生方法および装置 |
JP4214347B2 (ja) * | 2000-10-04 | 2009-01-28 | ソニー株式会社 | データ出力方法および装置並びにデータ再生方法および装置 |
WO2002037493A1 (en) * | 2000-10-31 | 2002-05-10 | Sony Corporation | Apparatus and method for recording/reproducing audio data embedded with additive information |
WO2004064318A1 (ja) * | 2003-01-14 | 2004-07-29 | Matsushita Electric Industrial Co., Ltd. | コンテンツ再生装置、ライセンス発行サーバ及びコンテンツ再生システム |
JP2004220317A (ja) * | 2003-01-15 | 2004-08-05 | Sony Corp | 相互認証方法、プログラム、記録媒体、信号処理システム、再生装置および情報処理装置 |
US20040252615A1 (en) * | 2003-06-13 | 2004-12-16 | Darknoise Technologies Ltd. | Digital content protection |
JP4370800B2 (ja) * | 2003-04-21 | 2009-11-25 | ヤマハ株式会社 | 音楽コンテンツ利用装置及びプログラム |
JP2004341768A (ja) * | 2003-05-15 | 2004-12-02 | Fujitsu Ltd | 磁気ディスク装置、暗号処理方法及びプログラム |
JP2005216376A (ja) * | 2004-01-29 | 2005-08-11 | Toshiba Corp | 記録媒体処理装置 |
EP2119230B1 (en) * | 2007-01-11 | 2013-07-03 | NDS Limited | Processing video content |
US9069703B2 (en) | 2011-04-29 | 2015-06-30 | Seagate Technology Llc | Encrypted-transport solid-state disk controller |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11275516A (ja) * | 1997-12-10 | 1999-10-08 | Hitachi Ltd | ディジタル放送信号の受信装置、記録再生装置及び受信・記録再生システム |
JP2000090569A (ja) * | 1998-09-16 | 2000-03-31 | Sony Corp | 情報信号の再生制限方法、情報信号記録再生装置、情報信号記録装置、情報信号再生装置および書き換え可能記録媒体 |
JP2000123480A (ja) * | 1998-10-16 | 2000-04-28 | Sony Corp | 信号変換装置および信号変換方法 |
JP2000197012A (ja) * | 1998-10-23 | 2000-07-14 | Hitachi Ltd | デ―タ記録再生装置及び方法 |
JP2000201269A (ja) * | 1999-01-05 | 2000-07-18 | Sony Corp | デ―タ記録装置とデ―タ再生装置とデ―タ記録再生装置 |
JP2000244726A (ja) * | 1999-02-22 | 2000-09-08 | Sony Corp | 付加情報重畳方法、付加情報検出方法、付加情報重畳装置および付加情報検出装置 |
JP2000339851A (ja) * | 1999-06-01 | 2000-12-08 | Sony Corp | 情報信号複製管理方法、情報信号記録装置、情報信号出力装置および記録媒体 |
JP2001084694A (ja) * | 1999-09-09 | 2001-03-30 | Hitachi Ltd | データ転送装置及び集積回路 |
JP2001145055A (ja) * | 1999-11-15 | 2001-05-25 | Hitachi Ltd | 記録装置及び再生装置 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7162642B2 (en) * | 1999-01-06 | 2007-01-09 | Digital Video Express, L.P. | Digital content distribution system and method |
US7487363B2 (en) * | 2001-10-18 | 2009-02-03 | Nokia Corporation | System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage |
US20030081777A1 (en) * | 2001-10-26 | 2003-05-01 | Robert Brondijk | System, method and recording unit for protected copying of material |
KR20040077446A (ko) | 2002-02-05 | 2004-09-04 | 소니 가부시끼 가이샤 | 데이터 기록 장치 및 기록 방법 |
-
2003
- 2003-02-05 KR KR10-2003-7012912A patent/KR20040077446A/ko not_active Abandoned
- 2003-02-05 JP JP2003566850A patent/JP3925496B2/ja not_active Expired - Fee Related
- 2003-02-05 CN CNB038001098A patent/CN100458951C/zh not_active Expired - Fee Related
- 2003-02-05 US US10/473,812 patent/US7436959B2/en not_active Expired - Fee Related
- 2003-02-05 WO PCT/JP2003/001191 patent/WO2003067590A1/ja active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11275516A (ja) * | 1997-12-10 | 1999-10-08 | Hitachi Ltd | ディジタル放送信号の受信装置、記録再生装置及び受信・記録再生システム |
JP2000090569A (ja) * | 1998-09-16 | 2000-03-31 | Sony Corp | 情報信号の再生制限方法、情報信号記録再生装置、情報信号記録装置、情報信号再生装置および書き換え可能記録媒体 |
JP2000123480A (ja) * | 1998-10-16 | 2000-04-28 | Sony Corp | 信号変換装置および信号変換方法 |
JP2000197012A (ja) * | 1998-10-23 | 2000-07-14 | Hitachi Ltd | デ―タ記録再生装置及び方法 |
JP2000201269A (ja) * | 1999-01-05 | 2000-07-18 | Sony Corp | デ―タ記録装置とデ―タ再生装置とデ―タ記録再生装置 |
JP2000244726A (ja) * | 1999-02-22 | 2000-09-08 | Sony Corp | 付加情報重畳方法、付加情報検出方法、付加情報重畳装置および付加情報検出装置 |
JP2000339851A (ja) * | 1999-06-01 | 2000-12-08 | Sony Corp | 情報信号複製管理方法、情報信号記録装置、情報信号出力装置および記録媒体 |
JP2001084694A (ja) * | 1999-09-09 | 2001-03-30 | Hitachi Ltd | データ転送装置及び集積回路 |
JP2001145055A (ja) * | 1999-11-15 | 2001-05-25 | Hitachi Ltd | 記録装置及び再生装置 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7436959B2 (en) | 2002-02-05 | 2008-10-14 | Sony Corporation | Data recording apparatus and recording method |
JP2005141525A (ja) * | 2003-11-07 | 2005-06-02 | Sony Corp | 電子機器、情報処理システム、情報処理装置および方法、プログラム、並びに記録媒体 |
US8006284B2 (en) | 2003-11-07 | 2011-08-23 | Sony Corporation | Electronic device, information processing system, information processing apparatus and method, program, and recording medium |
JP2007142810A (ja) * | 2005-11-18 | 2007-06-07 | Matsushita Electric Ind Co Ltd | データ記録システム |
Also Published As
Publication number | Publication date |
---|---|
US20040131183A1 (en) | 2004-07-08 |
US7436959B2 (en) | 2008-10-14 |
JPWO2003067590A1 (ja) | 2005-06-02 |
CN100458951C (zh) | 2009-02-04 |
KR20040077446A (ko) | 2004-09-04 |
JP3925496B2 (ja) | 2007-06-06 |
CN1498405A (zh) | 2004-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2305904C2 (ru) | Способ и устройство для передачи данных содержимого и устройство записи и/или воспроизведения | |
JP3508680B2 (ja) | コンテンツ不正コピー防止方法およびシステム | |
KR100320183B1 (ko) | 디지탈데이터 플레이어의 파일 암호화 장치 | |
KR100972831B1 (ko) | 엔크립트된 데이터의 보호방법 및 그 재생장치 | |
US7299499B2 (en) | Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium | |
EP1148489B1 (en) | Recording medium for storing encrypted audio data, apparatus and method of recording the same, and apparatus and method of reproducing the same | |
US6480607B1 (en) | Encrypted data reproducing transmitting and processing method and apparatus with separately encrypted control data | |
JP3925496B2 (ja) | データ記録装置及び記録方法 | |
US20020141737A1 (en) | Audio data recording medium and related apparatuses | |
JP2002094924A (ja) | 画像データ記録装置および方法ならびに画像データ再生装置および方法 | |
JP2004030882A (ja) | レンダリング装置、コピー制御方法及びプログラム | |
KR20050122209A (ko) | 디지털 데이터 보존·재생방법 및 장치 | |
JP2006512804A (ja) | アナログ信号を処理する方法 | |
KR100365916B1 (ko) | 데이터 암호화 장치 및 방법 | |
JP2004109177A (ja) | コンテンツデータ記録媒体、コンテンツデータ復号装置、コンテンツデータ暗号化装置、コンテンツデータ復号方法及びコンテンツデータ暗号化方法 | |
JP2007286938A (ja) | 情報処理装置および方法、プログラム、並びに記録媒体 | |
JP4622208B2 (ja) | 圧縮暗号および復号復元装置、圧縮暗号および復号復元方法 | |
JP2002330128A (ja) | 半導体音楽再生装置 | |
JP2001175170A (ja) | ストリーム再生方法及びストリーム再生装置 | |
JP2004288338A (ja) | 磁気ディスク装置 | |
JP2001197041A (ja) | オーディオデータ符号化/復号化装置及びその方法 | |
US20060092048A1 (en) | Semiconductor device | |
JP2008135165A (ja) | 画像データ記録装置および方法ならびに画像データ再生装置および方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP KR US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003566850 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 038001098 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020037012912 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10473812 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11041201 Country of ref document: US |