WO2006082961A1 - 記録装置、再生装置、集積回路及び制御プログラム - Google Patents
記録装置、再生装置、集積回路及び制御プログラム Download PDFInfo
- Publication number
- WO2006082961A1 WO2006082961A1 PCT/JP2006/301979 JP2006301979W WO2006082961A1 WO 2006082961 A1 WO2006082961 A1 WO 2006082961A1 JP 2006301979 W JP2006301979 W JP 2006301979W WO 2006082961 A1 WO2006082961 A1 WO 2006082961A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- area
- recorded
- recording
- information
- recording medium
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 57
- 238000012545 processing Methods 0.000 claims description 41
- 230000002708 enhancing effect Effects 0.000 abstract 1
- 238000004590 computer program Methods 0.000 description 13
- 238000010200 validation analysis Methods 0.000 description 7
- 238000006243 chemical reaction Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000012795 verification Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 239000000470 constituent Substances 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006866 deterioration Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00115—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers wherein the record carrier stores a unique medium identifier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/0026—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored as a barcode
- G11B20/00268—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored as a barcode said barcode being recorded in a burst cutting area [BCA]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00297—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in a management area, e.g. the video manager [VMG] of a DVD
- G11B20/00304—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in a management area, e.g. the video manager [VMG] of a DVD the key being stored in the lead-in area [LIA]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00347—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier wherein the medium identifier is used as a key
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00362—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being obtained from a media key block [MKB]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/0042—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the copy protection scheme being related to a specific access protection standard
- G11B20/00442—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the copy protection scheme being related to a specific access protection standard content protection for recordable media [CPRM]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00528—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein each title is encrypted with a separate encryption key for each title, e.g. title key for movie, song or data file
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/20—Disc-shaped record carriers
- G11B2220/21—Disc-shaped record carriers characterised in that the disc is of read-only, rewritable, or recordable type
- G11B2220/215—Recordable discs
- G11B2220/216—Rewritable discs
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/20—Disc-shaped record carriers
- G11B2220/25—Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
- G11B2220/2537—Optical discs
- G11B2220/2562—DVDs [digital versatile discs]; Digital video discs; MMCDs; HDCDs
Definitions
- Recording device playback device, integrated circuit and control program
- the present invention relates to a recording apparatus that performs recording on a recording medium, and more particularly to a technique for improving reproduction compatibility of a recording medium.
- DVDs capable of recording content such as movies with high quality are widely used as package media for distributing content.
- Content is recorded in DV D as digital data.
- digital data is less likely to lose its value due to duplication where degradation caused by duplication is extremely small. For this reason, if recording media with illegal copies are distributed at a low price on the market, it will lead to a decrease in consumers trying to purchase genuine packaging media, and copyright holders such as copyright holders who have the copyright to the content. May suffer a great deal of damage.
- CPRM Content Protection for Recordable Media
- a recording apparatus that records data on a recording medium encrypts and records the data in order to prevent unauthorized duplication of the data.
- data encryption is performed using information pre-recorded in a predetermined area of the recording medium.
- the recording device uses the MKB (Media Key Block) recorded in the Initial Zone of the recording medium, the media ID recorded in the BCA (Burst Cutting Area), etc.
- MKB Media Key Block
- Non-Patent Document 1 ECMA-337 3rd Edition-December 2005
- Non-Patent Document 2 ECMA-272 2nd Edition-June 1999 Disclosure of the invention
- each DVD standard may have a different disk layout depending on the standard. If the disc layout is different, the data recording position may be different, so the playback device may not be able to use a recording medium that is recorded according to a standard that is not supported. For this reason, in order to avoid any disadvantage to the user of the playback device, the manufacturer who manufactures the playback device usually designs and manufactures the playback device so as to be able to cope with the established standards as much as possible.
- decryption information used for decryption processing of encrypted data is recorded on the inner periphery of a disk-shaped recording medium, and a reading unit of a playback device that reads data on the recording medium If the inner peripheral portion cannot be physically read, the playback device cannot read the decryption information and cannot decrypt the encrypted data. In this case, the information necessary for decrypting the encrypted data is not physically readable, so measures such as updating the program that performs the playback processing of the playback device are ineffective. In this way, the inability to use the data on the recording medium is a disadvantage to the user of the playback device, and even to a content owner who distributes the content, the user who can become a content IJ user. This is not preferable because the options for the distribution method are narrowed.
- the present invention provides a recording apparatus for recording on a recording medium in which decryption information used for decryption processing of encrypted data is recorded in the first area in advance. Reading means for reading out the decoding information from one area, and the read-out decoding information can be read out by a device that cannot physically read data in the first area Recording means for recording in the second area of the recording medium.
- the recording apparatus having the above-described configuration reads the decoding information from the first area, and records the read decoding information in the second area.
- the second area force can also read the decryption information, so that the encrypted data recorded on the recording medium can be decrypted. Can do.
- the playback device decrypts the encrypted data using the illegal decryption information.
- the rights of the right holder may not be sufficiently protected.
- the decryption information recorded in the second area is destroyed due to some reason such as recording failure, the playback device cannot decrypt the encrypted data.
- the recording apparatus further includes a detection unit that detects that information is recorded in the second area, and when information is recorded in the second area, the information is stored in the second area.
- Determining means for determining whether or not the information is for decoding recorded in one area; and when the determining means determines that the information is not for decoding, the decoding information is stored in the second area. It is good also as providing the overwrite recording means to record.
- the decryption information may be a key ring.
- the decryption information may be a media ID that identifies the recording medium.
- the second area may be a buffer area included in a lead-in area of the recording medium.
- the first area may be an initial zone of the recording medium! /.
- the present invention is an integrated circuit used in a recording apparatus in which decryption information used for decryption processing of encrypted data is recorded in advance in a first area and recorded on the recording medium.
- a read processing unit that reads the decoding information from one area and a device that cannot read the data in the first area can read the read decoding information.
- a recording processing unit for performing processing for recording in the second area of the recording medium.
- a control program for causing a recording apparatus that records in a recording medium in which the decryption information used for the decryption process of the encrypted data is recorded in the first area to execute the process, A reading step for reading the decoding information from the first area, and the read decoding information is recorded in the second area of the recording medium that can be read by a device that cannot physically read the data in the first area. And a recording step.
- the playback device decrypts the encrypted data using the illegal information recorded in the second area of the recording medium, it causes a disadvantage to the right holder who has the copyright of the data.
- a playback device that controls execution of a decryption process that reads and decrypts encrypted data from a recording medium
- the recording medium includes a first area and a second area, and the first area
- the decryption information used for the decryption process of the encrypted data is recorded in advance before recording the encrypted data by a recording device, and the encrypted data is recorded in the first area in advance.
- Data that is generated by encrypting the data to be recorded using the decoding information that is recorded, information is recorded in the second area, and the playback device is in the first area.
- a determination unit that determines whether or not information that matches the recorded decoding information is recorded in the second area, and controls execution of the decoding process according to a determination result by the determination unit And control means Moyo,.
- a reproducing apparatus having the above-described configuration determines whether or not the information recorded in the first area and the second area matches each other. Controls execution of decryption processing of encrypted data according to the determination result.
- control means may execute the decoding process only when it is determined by the determination means that they match.
- control unit may stop the decoding process when it is determined by the determination unit that they do not match.
- information that matches the decryption information recorded in the first area is recorded in the second area, so that the information in the second area is not necessarily handled by an unauthorized person. It is not necessarily recorded.
- the information recorded in the second area may be damaged due to deterioration or damage of the recording medium after the decryption information is recorded in the second area by the rightful owner.
- the playback device In such a case, that is, when information that matches the decoding information recorded in the first area is not recorded in the second area due to damage of the recording medium or the like, the playback device operates in the first area. Even if the decryption information can be read from the area, the playback device cannot decrypt the encrypted data. Will be unduly disadvantageous for the user of the playback device.
- control means may read the decoding information and execute the decoding process when the determining means determines that they do not match.
- the integrated circuit is used in a reproducing apparatus that controls execution of a decryption process for reading out and decrypting encrypted data from a recording medium
- the recording medium includes a first area and a second area.
- decryption information used for the decryption process of the encrypted data is recorded in advance before recording the encrypted data by a recording device, and the encrypted data is stored in the first area. This is data generated by encrypting the data to be recorded using the decryption information recorded in advance in the area.
- a determination processing unit that performs a process of determining whether or not the information that matches the decoding information recorded in the first area is recorded in the second area, and according to a determination result by the determination unit Control the execution of the decryption process It also includes a control processing unit that performs processing.
- a control program for causing a playback device to perform a process of controlling the execution of a decryption process of reading out and decrypting encrypted data from a recording medium
- the recording medium includes a first area and a second area.
- the first area is pre-recorded with the decryption information used for decrypting the encrypted data before the encrypted data is recorded by a recording device.
- the control program determines whether or not the information coincident with the decoding information recorded in the first area is a force recorded in the second area, and according to the determination result of the determination step.
- the decryption Yo it is also possible and a control step of controlling the execution of management.
- FIG. 1 is a functional block diagram of a recording apparatus 1000 according to the present invention.
- FIG. 2 is a functional block diagram of a playback device 3000 that reads data from the recording medium 2000 and decodes it.
- FIG. 3 is a diagram showing a disk layout of a recording medium 2000.
- FIG. 4 is a flowchart showing an operation process of the recording apparatus 1000.
- FIG. 5 is a flowchart showing an operation process of the playback device 3000.
- FIG. 6 is a functional block diagram of the playback device 3100.
- FIG. 7 is a flowchart showing an operation process of the playback device 3100. Explanation of symbols
- the recording apparatus of the present invention records AV data on a recording medium compatible with CPRM (Content Protection for Recordable Media).
- CPRM Content Protection for Recordable Media
- the AV data is encrypted and recorded using the information recorded in advance on the recording medium.
- the encryption method shall use CPRM.
- the information recorded in advance on the recording medium is a key bundle such as MKB (Media Key Block), MKB Validation Data, and MedialD.
- the recording device encrypts AV data using these MKB and MedialD.
- the recording device cannot read MKB, MedialD, etc. physically due to restrictions on the specifications, and the playback device can read the AV data so that AV data can be decoded using MKB. Record MKB etc. in the specified area of the recording medium.
- the playback apparatus can read MKB and the like as the recording medium power, and can decode AV data.
- the recording apparatus records MKB or the like in Buffer Zone 2 of the recording medium will be described as an example.
- the recording device verifies whether the information is MKB or MedialD previously recorded in the Initial Zone of the recording medium, and the verification result. Overwrite Buffer Zone 2 with MKB or MedialD accordingly.
- the playback device cannot read information recorded in the Initial Zone of the recording medium, and can read information recorded in the Buffer Zone 2 of the 1S recording medium.
- FIG. 1 is a functional block diagram of the recording apparatus 1000 of the present invention. In the figure, a recording medium 2000 is also shown.
- the recording apparatus 1000 includes a device key storage unit 101 and an MKB processing unit 102. And a check unit 103, a key conversion unit 104, an encryption unit 105, and an AV pack storage unit 106.
- the encryption key unit 105 includes a title key generation unit 111, a title key combination unit 112, a title key encryption unit 113, a DCL-CCI generation unit 114, an intermediate key generation unit 115, and a content key generation unit 116.
- AV pack encryption unit 117 includes a title key generation unit 111, a title key combination unit 112, a title key encryption unit 113, a DCL-CCI generation unit 114, an intermediate key generation unit 115, and a content key generation unit 116.
- the device key storage unit 101 stores a device key assigned to the recording apparatus 1000.
- the MKB processing unit 102 reads the MKB from the initial zone of the recording medium 2000, and the device key storage unit 101 stores it, decrypts the MKB using the device key of the recording device 1000, and obtains the media key (Km). Generate. In addition, the generated media key is recorded in Buffer Zone 2 of the recording medium 2000.
- the check unit 103 calculates the hash value of the MKB recorded in the Initial Zone, and verifies the validity of the MKB by comparing with the MKB Validation Data recorded in the BCA. Also, it has a function to detect that information is recorded in Buffer Zone 2, and when it detects that MKB is recorded in Buffer Zone 2, the MKB recorded in Buffer Zone 2 And the validity of the MKB recorded in Buffer Zone 2 is verified by comparison with the MKB Validation Data. When it is detected that MedialD is recorded in Buffer Zone 2, it is recorded in Buffer Zone 2 by comparing MedialD recorded in BCA with MedialD recorded in Buffer Zone 2. Verify the correctness of MedialD. For example, if each MedialD is the same as a result of the above comparison, it is determined that the MedialD recorded in BZ2 is valid.
- the key conversion unit 104 reads MedialD recorded in the BCA, converts the MKB read by the MKB processing unit 102 using the read MedialD, and generates a media unique key (Kmu). Also, MedialD read from BCA is recorded in Buffer Zone 2.
- the encryption unit 105 encrypts the AV data input from the AV pack storage unit 106 in the 2048-byte AV Pack format, and records the encrypted data in the Data Area of the recording medium 2000.
- the AV data encrypted by the encryption unit 105 is recorded in the Data Area using the 2048-byte Encrypted AV Pack opening method.
- Encrypted AV Pack has 2048 bytes, the first 128 bytes are plain text Unencrypted Portion, and the remaining 1920 bytes are encrypted Encrypted Po rtion.
- the first 128 bytes are used to generate a content key (Kc) for encrypting AV data, and the plaintext Unencrypted Portion To be recorded.
- the B-sign part 105 encrypts the remaining 1920 bytes of the 2048-byte AV Pack, excluding the first 128 bytes, using the content key, and records it in the Data Area as an Encrypted Portion.
- the title key generation unit 111 generates a title key.
- the generated title key is output to the title key combining unit 112 and the intermediate key generating unit 115.
- the title key combining unit 112 combines the arbitrary value V and the title key generated by the title key generating unit 111.
- the title key encryption unit 113 encrypts the title key combined by the title key combining unit 112 using the media unique key generated by the key conversion unit 104, and obtains the encryption key title key. Generate. The generated encryption key title key is recorded in the Data Area.
- the DCL_CCI generation unit 114 generates AV data copy control information and the like as DCL_CCI, and records the generated DCL_CCI in the Data Area. Also, the analog protection information (AP STB: Analog Protection Single Trigger Bit) is output to the intermediate key generation unit 115.
- API STB Analog Protection Single Trigger Bit
- the intermediate key generation unit 115 receives the APSTB from the DCL_CCI generation unit 114, combines the received APSTB with the title key received from the title key generation unit 111, and generates an intermediate key (Ki). The generated intermediate key is output to the content key generation unit 116.
- the content key generation unit 116 receives the first 128 bytes (Dtkc) of the 2048-noyte AV Pack, and uses the first 128 bytes of the received AV Pack to receive the intermediate key received from the intermediate key generation unit 115. Convert to generate a content key.
- the first 128 bytes of the AV Pack are recorded in the Data Area as a plaintext Unencrypted AV Pack as described above.
- AV pack encryption section 117 encrypts the latter half 1920 bytes of the 2048-byte AV Pack using the content key generated by content key generation section 116, and records it in the Data Area as an Encrypted Portion. .
- the AV pack storage unit 106 stores AV data. Next, the configuration of the playback device will be described.
- FIG. 2 is a functional block diagram of a playback device 3000 that reads data from the recording medium 2000 and performs a decoding process.
- the playback device 3000 includes a device key storage unit 301, an MKB processing unit 302, a key conversion unit 303, a decryption unit 304, and an AV pack playback processing unit 305.
- the decryption unit 304 includes a title key decryption unit 311, a 0 page 1 storage unit 312, an intermediate key generation unit 313, a content key generation unit 314, and an AV pack decryption unit 315.
- the device key storage unit 301 stores the device key of the playback device 3000.
- the MKB processing unit 302 reads the MKB recorded in Buffer Zone 2 of the recording medium 2000, decrypts the MKB using the device key of the playback device 3000 stored in the device key storage unit 301, and decrypts the media key. Is generated.
- the key conversion unit 303 reads MedialD recorded in Buffer Zone 2, converts the media key generated by the MKB processing unit 302 using the read MedialD, and generates a media unique key.
- Decryption section 304 reads Encrypted AV Pack from the Data Area of recording medium 2000, decrypts the read Encrypted AV Pack, and obtains AV data. The obtained AV data is output to the AV pack reproduction processing unit 305. Also, the data area force DCL_CCI is read and stored.
- the title key decryption unit 311 reads the cipher key title key from the data area of the recording medium 2000, and decrypts the read cipher key title key using the media unique key generated by the key conversion unit 303. Generate a title key.
- the DCL_CCI storage unit 312 stores the DCL_CCI read from the Data Area.
- the intermediate key generation unit 313 receives analog protection information (APSTB) included in DCL_CCI recorded in the Data Area, and combines it with the title key generated by the title key decryption unit 311 to generate an intermediate key.
- the generated intermediate key is output to the content key generation unit 314.
- the content key generation unit 314 converts the intermediate key received from the intermediate key generation unit 313 by using the first 128 bytes of the Encrypted AV Pack read from the Data Area to convert the content key. Is generated.
- the AV pack decryption unit 315 decrypts the latter half 1920 bytes of the Encrypted AV Pack using the content key generated by the content key generation unit 314.
- the AV pack playback processing unit 305 performs video output and playback processing of the AV data decoded by the decoding unit 304.
- the recording device 1000 and the playback device 3000 include a reading unit that reads data from the recording medium 2000, although not shown.
- each of the above-described components specifically constitutes a computer system having CPU (Central Processing Unit), ROM (Read Only Memory) ⁇ RAM (Random Access Memory), etc., and operates according to a program. .
- a part of processing such as encryption processing may be performed by a dedicated processor.
- FIG. 3 shows a disk layout of the recording medium 2000.
- the DVD + RW standard is described as an example.
- the Inner Drive Area of the recording medium 2000 includes an Initial Zone.
- MedialD and MKB Validation Data are recorded in advance in the initial zone BCA. Information recorded in the BCA cannot be altered.
- MKB is recorded in advance in the Initial Zone.
- the Lead-in includes Buffer Zone 2.
- the recording apparatus 1000 records the MKB and MedialD read from the initial zone of the recording medium 2000 in the Buffer Zone 2 of the recording medium 2000. Further, as described above, the playback device 3000 cannot read the information recorded in the Initial Zone, and reads the MKB and MedialD recorded in the Buffer Zone 2 by the recording device 1000 and performs the decoding process. And
- FIG. 4 is a flowchart showing an operation process of the recording apparatus 1000.
- the recording apparatus 1000 reads Buffer Zone 2 of the recording medium 2000 and determines whether or not MKB and MedialD are recorded in Buffer Zone 2 (Step S1). S41).
- step S41: NO determines whether there is enough free space to write MKB and MedialD to Buffer Zone 2. If there is no free space (step S42), the process is terminated (step S42: NO). If there is free space in buffer zone 2 (step S42: YES), it is determined whether MKB and Me dialD are recorded in the initial zone. If not, the process is terminated (step S43: NO). If MKB and MedialD are recorded in the Initial Zone (step S43: YES), MKB and MedialD are acquired from the Initial Zone (step S44). The acquired MKB and MedialD are recorded in Buffer Zone 2 (step S45).
- step S45 the AV data stored in the AV pack storage unit 106 is encrypted using the MKB, MedialD, title key, etc., and recorded in the data area (step S46).
- Step S41 if it is determined that MKB and MedialD are recorded in Buffer Zone 2 (Step S41: YES), the MKB recorded in Buffer Zone 2 is also read. The Validation Data is read and the MKB recorded in Buffer Zone 2 is verified by the check unit 103 (step S47).
- step S47: NO If the MKB is not valid in step S47 (step S47: NO), the process is terminated. If MKB is valid in step S47 (step S47: YES), it is similarly verified in the check unit 103 whether MediaD recorded in Buffer Zone 2 is valid (step S48).
- step S48 if MedialD is not valid (step S48: NO), MedialD recorded in Initial Zone is overwritten with MedialD recorded in Buffer Zone 2 (step S49). If MedialD is valid in step S48 (step S48: YES), the overwrite process in step S49 is not performed. Thereafter, the AV data stored in the AV pack storage unit 106 using the MKB, MedialD, title key, etc. is encrypted and recorded in the Data Area (step S46). Note that the encryption process in step S46 is the same as the encryption process in CPRM, as described in detail in the description of the encryption key unit 105 above. The same thing will be used. In step S47, the processing is terminated when the MKB is not valid (step S47: NO).
- step S48 if MedialD is not valid (step S48: N0), MedialD recorded in Initial Zone is overwritten with Medial D recorded in Buffer Zone 2 (step S49).
- the present invention is not limited to this, and the processing may be terminated.
- FIG. 5 is a flowchart showing an operation process of the playback device 3000.
- the reproducing device 3000 determines whether MKB and MedialD are recorded in Buffer Zone 2 (step S51). If it is determined that it will be recorded!
- step S52 When MKB and MedialD are acquired (step S52), AV data is decoded using the acquired MKB and MedialD (step S53).
- step S51 If it is determined in step S51 that the data is not recorded in Buffer Zone 2 (step S51: NO), the process ends.
- the recording apparatus according to the present invention has been described based on the embodiments.
- the present invention can be modified as follows, and the present invention is applicable to the recording apparatus described in the above embodiments. Of course, it is not limited to.
- the playback device has been described as being unable to read the information of the Initial Zone.
- the playback device is not limited to this, and may be a device that can read the information of the Initial Zone.
- the playback device may further include a check unit 306 that reads MKB and the like from the Initial Zone and Buffer Zone 2 and verifies the validity as in the playback device 3100 shown in FIG. Good.
- the check unit 306 verifies the validity of the MKB recorded in Buffer Zone 2 by calculating the hash value of the MKB recorded in Buffer Zone 2 and comparing it with the MKB Validation Data recorded in BCA. .
- M recorded in Buffer Zone 2 The validity of MedialD recorded in Buffer Zone 2 is verified by comparing edialD and MedialD recorded in BCA.
- the playback device 3100 can verify the validity of the MKB and MedialD recorded in the Buffer Zone 2 of the recording medium 2000.
- FIG. 7 shows a flowchart of the operation processing of such a playback apparatus 3100.
- the playback device 3100 determines whether MKB and MedialD are recorded in Buffer Zone 2 (step S71). If it is determined that it is not recorded in Buffer Zone 2 (step S71: NO), MKB and MedialD are acquired from the initial zone (step S74), and AV data is decoded using the acquired MKB and MedialD ( Step S75).
- Step S71 When it is determined that it is recorded in Buffer Zone 2! In Step S71 (Step S71: YES), the validity of the MKB recorded in the check unit 306 force uffer Zone 2 is determined. (Step S72).
- the MKB recorded in Buffer Zone 2 is valid, that is, when the MKB recorded in Buffer Zone 2 is the same as the MKB recorded in the Initial Zone (step S72: YES), the same Validate MedialD recorded in Buffer Zone 2 (Step S73), and if MedialD recorded in Buffer Zone 2 is valid (Step S73: YES), MKB from Buffer Zone 2 or Initial Zone And MedialD (step S74), and AV data is decoded using the obtained MKB and MedialD (step S75).
- step S72 If the MKB or MedialD recorded in Buffer Zone 2 is not valid in step S72 or step S73 (step S72: NO, step S73: NO), the process is performed without decoding the AV data. finish.
- step S72 and step S73 if the verification results indicate that MKB or MedialD recorded in Buffer Zone 2 is valid! (Step S 72: NO, step S 73: N 0), Processing such as decryption may be performed using MKB or the like recorded in the Initial Zone.
- the recording apparatus 1000 has been described as reading the information recorded in the initial zone and recording the read information in the buffer zone 2.
- the recording is not limited to the uffer zone 2 and may be recorded in another area such as a data area.
- the information recorded in Buffer Zone 2 may be ADIP (Address In Pre-groove).
- the information recorded in other areas is not limited to the information recorded in the Initial Zone. It is good also as recording on.
- MedialD is read or recorded.
- the present invention is not limited to MedialD, and may be a MedialD seed.
- MedialD is generated by processing the MedialD seed with the random number generation function.
- the force described by using the case where a DVD + RW medium compatible with CPRM is used as a recording medium is not limited to this, and the present invention also applies when recording on an optical disk or other recording medium. included.
- Each of the above devices is specifically a computer system that includes a microprocessor, ROM, RAM, a hard disk unit, a display unit, a keyboard, a mouse, and the like.
- a computer program is stored in the RAM or the hard disk unit.
- Microprocessor power Each device achieves its functions by operating according to the computer program.
- the computer program is configured by combining a plurality of instruction codes indicating instructions to the computer in order to achieve a predetermined function.
- a part or all of the constituent elements constituting each of the above devices may be constituted by one system LSI (Large Scale Integration).
- a system LSI is an ultra-multifunctional LSI manufactured by integrating multiple components on a single chip. Specifically, it is a computer system that includes a microprocessor, ROM, RAM, and so on. is there. A computer program is stored in the RAM. The system LSI achieves its functions by the microprocessor operating according to the computer program.
- each of the above devices may be configured as an IC card that can be attached to and detached from each device or a single module force.
- the IC card or the module is a computer composed of a microprocessor, ROM, RAM, etc. System.
- the IC card or the module may include the super multifunctional LSI described above.
- the IC card or the module achieves its function by the microprocessor operating according to the computer program. This IC card or module may be tamper resistant.
- the present invention may be the method described above. Further, the present invention may be a computer program that realizes these methods by a computer, or may be a digital signal that also has the computer program power! /.
- the present invention provides a computer-readable recording medium for the computer program or the digital signal, such as a flexible disk, hard disk, CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD ( Blu-ray Disc), semiconductor memory, etc. may be recorded. Further, the present invention may be the computer program or the digital signal recorded on these recording media.
- the present invention may transmit the computer program or the digital signal via an electric communication line, a wireless or wired communication line, a network typified by the Internet, a data broadcast, or the like.
- the present invention may also be a computer system including a microprocessor and a memory.
- the memory may store the computer program, and the microprocessor may operate according to the computer program.
- the present invention can be used in a recording apparatus that records data such as content on a recording medium such as a DVD for which a plurality of standards are formulated.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2007501662A JP4861975B2 (ja) | 2005-02-07 | 2006-02-06 | 記録装置 |
EP06713122A EP1847995A4 (en) | 2005-02-07 | 2006-02-06 | RECORDING DEVICE, PLAYING DEVICE, INTEGRATED CIRCUIT AND CONTROL PROGRAM |
US11/883,353 US7979915B2 (en) | 2005-02-07 | 2006-02-06 | Recording device, replay device, integrated circuit, and control program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US65013205P | 2005-02-07 | 2005-02-07 | |
US60/650,132 | 2005-02-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006082961A1 true WO2006082961A1 (ja) | 2006-08-10 |
Family
ID=36777338
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/301979 WO2006082961A1 (ja) | 2005-02-07 | 2006-02-06 | 記録装置、再生装置、集積回路及び制御プログラム |
Country Status (5)
Country | Link |
---|---|
US (1) | US7979915B2 (ja) |
EP (1) | EP1847995A4 (ja) |
JP (1) | JP4861975B2 (ja) |
CN (1) | CN101116143A (ja) |
WO (1) | WO2006082961A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009004707A1 (ja) * | 2007-07-02 | 2009-01-08 | Pioneer Corporation | 情報記録媒体、記録装置及び再生装置 |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100030838A1 (en) * | 1998-08-27 | 2010-02-04 | Beepcard Ltd. | Method to use acoustic signals for computer communications |
IL127569A0 (en) | 1998-09-16 | 1999-10-28 | Comsense Technologies Ltd | Interactive toys |
WO2000021020A2 (en) | 1998-10-02 | 2000-04-13 | Comsense Technologies, Ltd. | Card for interaction with a computer |
US6607136B1 (en) | 1998-09-16 | 2003-08-19 | Beepcard Inc. | Physical presence digital authentication system |
US8019609B2 (en) | 1999-10-04 | 2011-09-13 | Dialware Inc. | Sonic/ultrasonic authentication method |
US9219708B2 (en) * | 2001-03-22 | 2015-12-22 | DialwareInc. | Method and system for remotely authenticating identification devices |
TWI277870B (en) * | 2004-11-22 | 2007-04-01 | Toshiba Corp | Copyright management method, information recording/reproducing method and device, and information recording medium and method of manufacturing the medium |
CN101779209B (zh) * | 2007-08-24 | 2012-10-31 | 国际商业机器公司 | 用于保护存储在存储设备中的内容的系统和方法 |
WO2009027125A1 (en) * | 2007-08-24 | 2009-03-05 | International Business Machines Corporation | System and method for content protection |
JP5025009B2 (ja) * | 2008-02-15 | 2012-09-12 | 株式会社東芝 | 認証方法、ホスト計算機及び記録媒体 |
JP2012084071A (ja) | 2010-10-14 | 2012-04-26 | Toshiba Corp | デジタルコンテンツの保護方法、復号方法、再生装置、記憶媒体、暗号装置 |
US8661527B2 (en) | 2011-08-31 | 2014-02-25 | Kabushiki Kaisha Toshiba | Authenticator, authenticatee and authentication method |
JP5275432B2 (ja) | 2011-11-11 | 2013-08-28 | 株式会社東芝 | ストレージメディア、ホスト装置、メモリ装置、及びシステム |
JP5112555B1 (ja) | 2011-12-02 | 2013-01-09 | 株式会社東芝 | メモリカード、ストレージメディア、及びコントローラ |
JP5204291B1 (ja) | 2011-12-02 | 2013-06-05 | 株式会社東芝 | ホスト装置、装置、システム |
JP5100884B1 (ja) | 2011-12-02 | 2012-12-19 | 株式会社東芝 | メモリ装置 |
JP5204290B1 (ja) | 2011-12-02 | 2013-06-05 | 株式会社東芝 | ホスト装置、システム、及び装置 |
JP5275482B2 (ja) * | 2012-01-16 | 2013-08-28 | 株式会社東芝 | ストレージメディア、ホスト装置、メモリ装置、及びシステム |
US9201811B2 (en) | 2013-02-14 | 2015-12-01 | Kabushiki Kaisha Toshiba | Device and authentication method therefor |
US8984294B2 (en) | 2013-02-15 | 2015-03-17 | Kabushiki Kaisha Toshiba | System of authenticating an individual memory device via reading data including prohibited data and readable data |
US9363075B2 (en) * | 2013-10-18 | 2016-06-07 | International Business Machines Corporation | Polymorphic encryption key matrices |
US9537652B2 (en) * | 2015-03-27 | 2017-01-03 | International Business Machines Corporation | Polymorphic encryption key allocation scheme |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0802527A1 (en) | 1995-10-09 | 1997-10-22 | Matsushita Electric Industrial Co., Ltd. | Optical disk, optical recorder, optical reproducing device, encrypted communication system, and authorizing system for use of program |
JP2000076141A (ja) * | 1998-09-02 | 2000-03-14 | Hitachi Ltd | コピ―防止装置および方法 |
EP0997899A2 (en) | 1998-09-22 | 2000-05-03 | Matsushita Electric Industrial Co., Ltd. | Optical disk, method for recording and reproducing additional information to and from optical disk, reproducing apparatus for optical disk, and recording and reproducing apparatus for optical disk |
EP1058254A2 (en) | 1999-04-28 | 2000-12-06 | Matsushita Electric Industrial Co., Ltd. | Optical disk, optical disk recording and reproducing apparatus, method for recording, reproducing and deleting data on optical disk, and information processing system |
US20020141576A1 (en) | 2001-03-30 | 2002-10-03 | Ripley Michael S. | Validating keying material by using a validation area of read-only media to prevent playback of unauthorized copies of content stored on the media |
JP2003536193A (ja) * | 2000-06-02 | 2003-12-02 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 保護データ領域を備える記録可能記憶媒体 |
JP2004186825A (ja) * | 2002-11-29 | 2004-07-02 | Toshiba Corp | コンテンツ管理方法、記録再生装置、及び記録媒体 |
JP2005502975A (ja) * | 2000-12-28 | 2005-01-27 | インテル・コーポレーション | 媒体のカッティング領域に妥当性検査データを格納することによるメディア・キー・ブロックの保全性の検証 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
JP4209564B2 (ja) * | 1998-09-22 | 2009-01-14 | パナソニック株式会社 | 光ディスク、および、光ディスクの追記情報の記録再生方法並びに光ディスクの再生装置と記録再生装置 |
JP3169366B1 (ja) * | 1999-04-28 | 2001-05-21 | 松下電器産業株式会社 | 光ディスク、光ディスク記録装置及び方法、並びに光ディスク再生装置及び方法 |
JP4394250B2 (ja) * | 1999-04-28 | 2010-01-06 | パナソニック株式会社 | 光ディスク、光ディスク記録装置及び光ディスク再生装置 |
JP2002073396A (ja) | 2000-08-30 | 2002-03-12 | Toshiba Corp | 記録方法、再生方法、装置及び情報記録媒体 |
US7111175B2 (en) * | 2000-12-28 | 2006-09-19 | Intel Corporation | Method and apparatus for verifying the integrity of a media key block |
JP2004220317A (ja) * | 2003-01-15 | 2004-08-05 | Sony Corp | 相互認証方法、プログラム、記録媒体、信号処理システム、再生装置および情報処理装置 |
EP1616329A2 (en) * | 2003-04-22 | 2006-01-18 | Matsushita Electric Industrial Co., Ltd. | Aggregation system |
JP2005050490A (ja) * | 2003-07-16 | 2005-02-24 | Ricoh Co Ltd | 情報記録再生装置と情報再生制御装置と情報記録再生方法 |
US7971070B2 (en) * | 2005-01-11 | 2011-06-28 | International Business Machines Corporation | Read/write media key block |
-
2006
- 2006-02-06 WO PCT/JP2006/301979 patent/WO2006082961A1/ja active Application Filing
- 2006-02-06 JP JP2007501662A patent/JP4861975B2/ja not_active Expired - Fee Related
- 2006-02-06 CN CNA2006800042563A patent/CN101116143A/zh active Pending
- 2006-02-06 EP EP06713122A patent/EP1847995A4/en not_active Withdrawn
- 2006-02-06 US US11/883,353 patent/US7979915B2/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0802527A1 (en) | 1995-10-09 | 1997-10-22 | Matsushita Electric Industrial Co., Ltd. | Optical disk, optical recorder, optical reproducing device, encrypted communication system, and authorizing system for use of program |
JP2000076141A (ja) * | 1998-09-02 | 2000-03-14 | Hitachi Ltd | コピ―防止装置および方法 |
EP0997899A2 (en) | 1998-09-22 | 2000-05-03 | Matsushita Electric Industrial Co., Ltd. | Optical disk, method for recording and reproducing additional information to and from optical disk, reproducing apparatus for optical disk, and recording and reproducing apparatus for optical disk |
EP1058254A2 (en) | 1999-04-28 | 2000-12-06 | Matsushita Electric Industrial Co., Ltd. | Optical disk, optical disk recording and reproducing apparatus, method for recording, reproducing and deleting data on optical disk, and information processing system |
JP2003536193A (ja) * | 2000-06-02 | 2003-12-02 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 保護データ領域を備える記録可能記憶媒体 |
JP2005502975A (ja) * | 2000-12-28 | 2005-01-27 | インテル・コーポレーション | 媒体のカッティング領域に妥当性検査データを格納することによるメディア・キー・ブロックの保全性の検証 |
US20020141576A1 (en) | 2001-03-30 | 2002-10-03 | Ripley Michael S. | Validating keying material by using a validation area of read-only media to prevent playback of unauthorized copies of content stored on the media |
JP2004186825A (ja) * | 2002-11-29 | 2004-07-02 | Toshiba Corp | コンテンツ管理方法、記録再生装置、及び記録媒体 |
Non-Patent Citations (1)
Title |
---|
See also references of EP1847995A4 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009004707A1 (ja) * | 2007-07-02 | 2009-01-08 | Pioneer Corporation | 情報記録媒体、記録装置及び再生装置 |
Also Published As
Publication number | Publication date |
---|---|
CN101116143A (zh) | 2008-01-30 |
EP1847995A4 (en) | 2009-11-11 |
EP1847995A1 (en) | 2007-10-24 |
JP4861975B2 (ja) | 2012-01-25 |
JPWO2006082961A1 (ja) | 2008-06-26 |
US7979915B2 (en) | 2011-07-12 |
US20080152137A1 (en) | 2008-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4861975B2 (ja) | 記録装置 | |
US6938162B1 (en) | Optical disk, optical disk recording and reproducing apparatus, method for recording, reproducing and deleting data on optical disk, and information processing system | |
EP1623420B1 (en) | Playback apparatus, playback method, and program for reproducing an encrypted virtual package | |
TWI277870B (en) | Copyright management method, information recording/reproducing method and device, and information recording medium and method of manufacturing the medium | |
US20100275036A1 (en) | Recording/reproducing system, recording medium device, and recording/reproducing device | |
US20080069354A1 (en) | Information Processing Device, Information Processing Method, and Computer Program | |
US7894603B2 (en) | Recording system and method, recording device and method, input device and method, reproduction system and method, reproduction device and method, recording medium, and program | |
JP2003208755A (ja) | 記録方法、記録装置、再生方法及び再生装置 | |
CN101246724B (zh) | 使用用户密钥来限制存储介质的使用的方法和装置 | |
KR20050073748A (ko) | 저장 매체의 데이터 복사 및 재생 방법 | |
JP5407482B2 (ja) | 情報処理装置、および情報処理方法、並びにプログラム | |
JP4062842B2 (ja) | 記録装置及び方法、再生装置及び方法並びに記録媒体 | |
US20070198855A1 (en) | Information Recording Media, Information Recording Device And Method, Information Distribution Device And Method, And Computer Program | |
US20080059377A1 (en) | Method for managing copy protection information of recording medium | |
JP2008103007A (ja) | 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム | |
US7620993B2 (en) | Copyright protection system, key generation apparatus, recording apparatus, reproduction apparatus, read-out apparatus, decryption apparatus, recording medium, recording method and program | |
JP3735591B2 (ja) | 信号処理装置、信号処理方法、及び記憶媒体 | |
WO2003081587A1 (fr) | Support d'enregistrement inscriptible, procede d'enregistrement de donnees d'identification, dispositif d'enregistrement de donnees, procede de reproduction de donnees d'identification et dispositif de reproduction de donnees | |
JP4284799B2 (ja) | データ記録再生方法及びデータ記録再生装置 | |
US8171566B2 (en) | Copyright protection data processing system and reproduction device | |
JP4602702B2 (ja) | コンテンツ再生装置、コンテンツ再生方法、及びプログラム | |
US20080168276A1 (en) | Recording Medium, and Contents Reproduction System | |
JP2001155421A (ja) | 記録装置、記録方法、再生装置、再生方法及び記録媒体 | |
JP2000354030A (ja) | 流通システム及び送信装置及び受信装置 | |
JPWO2009004716A1 (ja) | 情報記録媒体、再生装置及びコンピュータプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2007501662 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11883353 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200680004256.3 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006713122 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2006713122 Country of ref document: EP |