WO2007119324A1 - コンテンツ検索装置 - Google Patents
コンテンツ検索装置 Download PDFInfo
- Publication number
- WO2007119324A1 WO2007119324A1 PCT/JP2007/054661 JP2007054661W WO2007119324A1 WO 2007119324 A1 WO2007119324 A1 WO 2007119324A1 JP 2007054661 W JP2007054661 W JP 2007054661W WO 2007119324 A1 WO2007119324 A1 WO 2007119324A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- database
- decryption key
- encrypted content
- encrypted
- Prior art date
Links
- 238000000034 method Methods 0.000 description 64
- 230000008569 process Effects 0.000 description 56
- 238000012545 processing Methods 0.000 description 48
- 238000007726 management method Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 15
- 238000004364 calculation method Methods 0.000 description 13
- 238000000926 separation method Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 5
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 2
- YLQBMQCUIZJEEH-UHFFFAOYSA-N Furan Chemical compound C=1C=COC=1 YLQBMQCUIZJEEH-UHFFFAOYSA-N 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002250 progressing effect Effects 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 238000003892 spreading Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to an electronic device that accesses a recording medium that stores content such as music, moving images, and books, and searches for the desired content, and more particularly to encrypted content and decryption of the encrypted content.
- the present invention relates to an apparatus for searching for a combination of decryption keys for the purpose.
- information recording media for recording various digital data (hereinafter referred to as “content”) such as music content and moving image content, such as a hard disk and an optical disk.
- content such as music content and moving image content
- Memory cards one of these information recording media, are small and light, and are rapidly spreading, especially in small information devices such as digital still cameras and mobile phone terminals.
- An example of a copyright protection mechanism in a memory card having a copyright protection function is realized by providing two types of recording areas (a normal area and a secret area) in a memory card (for example, patents). Reference 1).
- the memory card in this example has a secret area that can be accessed only by authenticating each other's legitimacy between an access device such as a digital audio player and the memory card.
- a normal area that can be freely accessed from the access device regardless of the success or failure of the authentication.
- the encrypted content hereinafter referred to as “encrypted content”
- key data hereinafter referred to as “decryption key” for decrypting the content is concealed.
- Patent Document 1 Japanese Patent No. 3389186
- Patent Document 2 Japanese Patent Laid-Open No. 2003-30056
- the key-separated content management method when content is reproduced, it is necessary that the encrypted content and the corresponding decryption key exist together. For this reason, when displaying a list of reproducible content to select the content to be played prior to playback, the correspondence relationship between the encrypted content and the corresponding decryption key is searched, and both of them exist. It is necessary to identify and display the content to be displayed.
- the number of encrypted content and the number of decryption keys is not always the same, so there are many cases where unnecessary encrypted content or decryption keys are included. In this case, it takes a long time to search for this correspondence, and there is a problem that it takes time to display.
- the present invention has been made in view of the above problems, and the object of the present invention is to provide an encrypted content and a decryption key even when there is a difference between the number of encryption keys and the number of decryption keys. It is an object of the present invention to provide a content search apparatus that can perform a search for a combination (correspondence) of the above at high speed.
- encrypted content obtained by encrypting content data;
- a content search device that searches for a combination (correspondence) with a decryption key that is key information for decrypting encrypted content.
- the content search apparatus includes a reference DB determination unit and an ID comparison unit.
- the reference DB determination unit accesses the encryption key content database, which is a database storing the encryption key content, and the decryption key database, which is the database storing the decryption key, and is included in the encryption key content database, and The number of encryption contents satisfying the above condition and the number of decryption keys included in the decryption key database and satisfying the predetermined condition are calculated, and the calculated number of the encryption content database and the decryption key database is calculated. Decide the smaller database as the reference database.
- the ID comparison unit searches for the combination of the encrypted content and the corresponding decryption key while sequentially reading the entries included in the reference database.
- Both the encrypted content and the decryption key may include identification information for uniquely specifying the content data.
- the ID comparison unit may search for a combination of the encrypted content and the corresponding decryption key via the identification information.
- the predetermined condition may be a condition that satisfies all the encryption key contents included in the encryption key content database and all the decryption keys included in the decryption key database.
- the encrypted content and the decryption key may have a content type indicating the content type as an attribute.
- the predetermined condition is the same type as the type of the content to be searched. You may set to have.
- the identification information may include information indicating the type of content.
- both the encrypted content and the decryption key include identification information for uniquely identifying content data
- the encrypted content and the decryption key indicate the type of content as information independent of the identification information. May contain information!
- the ID comparison unit sequentially refers to the encrypted content or the decryption key information of one of the encrypted content database and the decryption key database determined as the reference database, and the corresponding decryption key or encryption key It can be determined whether the encrypted content is included in the other database.
- the ID comparison unit transmits the encrypted content or decryption of one database via the identification information. It is possible to determine whether the decryption key corresponding to the key or the encryption key content power is included in the other database.
- both the encrypted content and the decryption key include identification information for uniquely specifying the content data
- at least one of the encrypted content database and the decryption key database is an entry included in each database. Include sorting information that includes the result of sorting the based on identification information.
- At least one of the encrypted content database and the decryption key database may be constructed for each content type.
- At least one of the encrypted content database and the decryption key database may hold information on the number of entries included in the database.
- the content search device may further include a display unit. Only when both the encrypted content and the corresponding decryption key exist, information related to the content corresponding to the encrypted content may be displayed on the display unit.
- At least one of the encrypted content database and the decryption key database may be constructed on a recording device provided inside or outside the content search device.
- a content search device that searches for a combination of an encrypted content obtained by encrypting content data and a decryption key that is key information for decrypting the encrypted content. Provided.
- the content search apparatus includes an ID comparison unit.
- the ID comparison unit refers to the encrypted content database and the decryption key database based on the identification information for uniquely identifying the content data included in the encrypted content, and the identification included in the currently referenced encrypted content The information and the identification information included in the decryption key are compared to search for a combination of the encrypted content and the corresponding decryption key.
- the encryption key content database is a database that is sorted and stored.
- the decryption key database is a database in which the decryption keys are sorted and stored based on the identification information included in the decryption key.
- the ID comparison unit shows that the value of one identification information is the other identification information. If the value of one identification information is smaller than the value of the other identification information, the entry in the database including the one identification information is skipped.
- the combination of the encrypted content and the corresponding decryption key It is possible to search for matching (correspondence) at high speed.
- FIG. 1 is a diagram illustrating a configuration of a content search apparatus according to Embodiment 1 of the present invention.
- FIG. 2 is a diagram illustrating an example of content storage of a key separation type content management method according to Embodiment 1 of the present invention.
- FIG. 3 is a diagram showing the configuration of the decryption key DB in Embodiment 1 of the present invention.
- FIG. 4 is a diagram showing the configuration of the encrypted content DB in the first embodiment of the present invention.
- FIG. 5 is a flowchart showing the content reproduction processing in the first embodiment of the present invention.
- FIG. 6 is the first embodiment of the present invention.
- FIG. 7 A flowchart showing a correspondence search process in the first embodiment of the present invention.
- FIG. 8 A diagram showing a configuration of a content ID in the first embodiment of the present invention.
- FIG. 9 Flowchart showing the encryption key content count calculation process in Embodiment 1 of the present invention
- FIG. 10 A flowchart showing the calculation process of the number of decryption keys in the first embodiment of the present invention.
- FIG. 11 A flowchart showing the ID comparison process in the first embodiment of the present invention. Diagram showing an example of the decryption key DB
- FIG. 13 A diagram showing an example of the encrypted content DB according to the first embodiment of the present invention.
- FIG. 14 A diagram showing an example of the effective content list according to the first embodiment of the present invention.
- FIG. 16 A diagram showing another configuration of the decryption key DB in the first embodiment of the present invention.
- FIG. 17 is a diagram showing another configuration of the decryption key DB and the encrypted content DB in Embodiment 1 of the present invention.
- FIG. 18 Further description of the decryption key DB and the encrypted content DB in Embodiment 1 of the present invention Figure showing another configuration
- FIG. 19 A diagram showing a configuration of a content search apparatus in Embodiment 2 of the present invention.
- ⁇ 20] A flowchart showing correspondence search processing in Embodiment 2 of the present invention.
- FIG. 21 Embodiment 2 of the present invention. Showing an example of the decryption key DB
- FIG. 22 is a diagram showing an example of encrypted content DB according to the second embodiment of the present invention.
- FIG. 1 is a configuration diagram of a content search apparatus according to Embodiment 1 of the present invention.
- the content search device 1 is an external recording device interface (IZF) that is a connection with an external recording device such as a server or PC connected on the network, or an external hard disk connected via usB. ) 11, an internal recording device 12 such as an internal hard disk, a removable recording medium interface (IZF) 13 that is a connection part of the removable recording medium 2 such as a memory card, and a database ( DB) is accessed via each IZF or directly, and the database access unit 14 reads and writes information in the database, and the reference DB decision unit 15 searches the correspondence (combination) between encrypted content and decryption key.
- IZF external recording device interface
- DB database
- an ID comparison unit 16 and a display unit 17 such as a liquid crystal panel for displaying content search results and the like to the user.
- the database (DB) manages decryption keys for encrypted content.
- the display unit 17 may have only a function of generating and outputting a signal for display.
- the internal recording device 12 includes an encrypted content database (DB) 121, and the removable recording medium 2 includes a decryption key database (DB) 21. Furthermore, outside of the content search device 1, an external encryption content database (DB) 3 constructed on a server or PC connected via a network or USB, an external hard disk, etc., an external decryption key database (DB) 4 exists! / Both the encryption content DB 121 and the external encryption content DB3 are databases that store and manage encrypted content. Decryption key DB21 and external decryption key DB4 are both databases that store and manage decryption keys.
- the content search device 1 acquires information about the encrypted content and the decryption key from these databases, and searches for the correspondence (combination) between the encrypted content and the corresponding decryption key. .
- the main process of searching for correspondence (combination) is performed by the standard DB determination unit 15 and the ID comparison unit 16. Details of this processing will be described later.
- the copyrighted content is recorded in the final encrypted state (encrypted content).
- the key information (decryption key) stored in the recording medium and decrypting the content is also stored in the recording medium. Since the present invention assumes a key-separated content management method, the encrypted content and the decryption key are independently distributed to the user and are not necessarily stored in the same recording medium.
- the encrypted content is constructed on the encryption content DB 12 1 constructed on the internal recording device 12 in the content retrieval device 1 and the recording medium outside the content retrieval device 1. A case where the content is stored in the external encrypted content DB3 will be described as an example.
- the decryption key is stored in the content search device 1 on the external removable recording medium 2 on the decryption key DB 21 and on the content search device 1 on the external decryption key DB 4 constructed on the external recording medium. Let's say.
- FIG. 2 shows an example in which the encrypted content is stored in the encrypted content DB 121 and the decryption key is stored in the decryption key DB 21.
- the encrypted content and composite key have the same configuration when stored in the external encrypted content DB3 and the external decryption key DB4.
- a removable recording medium 2 having a special area, a secret area, and a normal area is assumed as a removable recording medium 2 for storing copyrighted content.
- the special area is a special area that cannot be directly read / written by the external force of the removable recording medium 2, and stores a media unique key that is a value unique to the removable recording medium 2.
- a device external to the removable recording medium 2 cannot directly read the media unique key itself, but does not receive information that is sent and received in the process of authenticating the mutual recording device with the removable recording medium 2. Based on this, it is possible to calculate the media unique key.
- the secret area is an area that can be read and written only when it can be authenticated that the devices are mutually valid, and stores key data and the like necessary for decrypting the content.
- the normal area is an area that can be freely read and written without authentication, and stores large volumes of encrypted content.
- Contents are digital data such as video data, still image data, music data, book data, and the like. It is distributed via communication networks such as the Internet and mobile phone terminals, or stored and distributed on package media such as CD, MD, and DVD.
- N plaintext decryption keys plaintext decryption key # 1, ..., plaintext decryption key #N
- N encrypted content It is stored in the encrypted content DB 121 as encrypted content # 1, ..., encrypted content #N.
- N plaintext decryption keys plaintext decryption key # 1, ..., plaintext decryption key #N
- N decryption keys decryption key # 1, ..., Decryption key #N
- the service-specific key is a key that differs depending on the type of service that provides the content.
- the service unique key is encrypted with a different media unique key for each removable recording medium 2 and stored in a secret area in the removable recording medium 2 as an encryption service unique key.
- the media unique key is stored in a special area in the removable recording medium 2, and the devices external to the removable recording medium 2 are in the process of authenticating each other as a valid device.
- the media unique key can be calculated based on the information sent and received.
- the encrypted content and the decryption key necessary for decrypting the encrypted content are managed separately, and in order to use the content, the correspondence between the two is searched. However, it is necessary to find out the correct combination of the encryption key content and the decryption key.
- the decryption key DB 21 is composed of two files, a sort file 51 and a decryption key file 52.
- the decryption key file 52 information on all decryption keys stored in the database 21 is stored.
- N entries are stored as decryption key information corresponding to N contents.
- Each entry in the decryption key file 52 stores the encrypted key data that is the substance of the decryption key and decrypts the content.
- Encryption key content key (Key—1,..., Key—N), content ID for uniquely identifying the content (0x8A728C ', etc.), and the title name (AAAAA, ...;) etc. are stored.
- the sort file 51 is an entry in the decryption key file 52 that is sorted and stored with respect to the content ID.
- the same number of content IDs and decryption key entry numbers as the total number of entries included in the decryption key file 52 are stored.
- the decryption key entry number indicates the entry number in the decryption key file 52 corresponding to each entry in the sort file 51.
- the decryption key entry number of the first entry in the sort file 51 is “2”. This indicates that the first entry in the sort file 51 corresponds to the second entry in the decryption key file 52.
- the encrypted content DB 121 is composed of a sort file 61 and encrypted content files 62a, 62b,.
- B-encoded content files 62a, 62b, ... are encrypted contents obtained by encrypting the content itself (EncryptedContent 1 ... EncryptedContent 1 M) and
- the content ID (0x8A728C ' ⁇ ', etc.) that uniquely identifies is stored.
- the example in Fig. 4 shows a case where encrypted content files 62a, 62b, ... are generated for each content, and there are a total of M files.
- the sort file 61 is obtained by sorting and storing the encrypted content file 62 with respect to the content ID, like the decryption key DB21 and the external decryption key DB4.
- the file number is information that can uniquely identify the encryption content files 62a, 62b,..., And indicates a uniquely assigned number included in the file name.
- the file names of the encrypted content files 62a, 62b,... are set to include the file number.
- the file number of the first entry in the sort file 61 is “2”. This means that the first entry force file name in sort file 61 contains "2""FILE0002. C This indicates that it corresponds to the encrypted content file 62a named "ON".
- the content ID in the description of FIGS. 3 and 4 is information commonly used in each database (DB), and is an ID assigned to uniquely identify the content.
- DB database
- both the encrypted content and the corresponding decryption key must be available. Therefore, it is necessary to search for the correspondence between the two at the time of reproduction, and the corresponding content is displayed to the user as reproducible content, the user is prompted to select the content, and the selected content is reproduced.
- FIG. 5 is a flowchart of content reproduction processing by the content search device 1 according to Embodiment 1 of the present invention.
- FIG. 6 is a diagram showing an example of content displayed on display unit 17 of content search device 1 in the content reproduction processing according to Embodiment 1 of the present invention.
- a content reproduction process performed by the content search device 1 according to the first embodiment of the present invention will be described with reference to FIGS.
- the following processing is mainly controlled by the DB access unit 14.
- a trigger for starting the content list display is issued (S501).
- the initial menu “Menu Red, 71” is displayed as shown in Fig. 6.
- the content search device 1 (DB access unit 14) recognizes that a trigger for starting display of a content list (Audio content list 72 in FIG. 6) related to Audio content has been issued.
- the comparison unit 16 performs a search process for the correspondence between the encrypted content and the decryption key (S502), which will be described in detail later.
- the search result is displayed on the display unit 17 (S503).
- information on reproducible content is displayed as shown in “Audio content list” 72 in FIG. 6.
- the displayed content power is also reproduced by the user.
- the content to be selected is selected (S504). This selection is performed when the user refers to “Audio content '72” in FIG. 6, selects a check box at the left end of the row displaying the content to be played, and presses the “play” button.
- the DB access unit 14 accesses the encrypted content DB 121 and Z or the external encrypted content DB 3 and acquires the encrypted content to be played back (S505). Further, the DB access unit 14 accesses the decryption keys DB21 and Z or the external decryption key DB4, and acquires the decryption key corresponding to the encrypted content to be played (S506). Finally, the DB access unit 14 decrypts and plays back the acquired encrypted content using the acquired decryption key (S507).
- the correspondence search is performed in the content reproduction process, particularly the correspondence search process in step S502, the number of encrypted content and the number of decryption keys are not necessarily the same. As a result, it takes a lot of time for the processing, and it may take a lot of time to display the content list.
- the present embodiment provides a method for performing this correspondence search process at high speed.
- the correspondence search processing in step S502 in Embodiment 1 of the present invention will be described.
- FIG. 7 is a flowchart of the correspondence search process (S502) according to Embodiment 1 of the present invention.
- the reference DB determination unit 15 first calculates the number of encrypted contents (CONT-NUM) of the target type (S701).
- the target type means the type of content currently being searched, such as Audio or Video. This is specified by the user.
- the content type can be determined using a part of the content ID. Specifically, the content ID is configured as shown in Fig. 8, and 1 byte in the 4th byte position indicates the content type. For example, this 1-byte value OxOl indicates "Audio" content, and 0x02 indicates "Video” content.
- step S701 the content type is determined with reference to the content type information included in the content ID. Then, the number of encrypted content whose content type is equal to the target type is calculated.
- the reference DB determination unit 15 calculates the number of decryption keys (KEY—NUM) for content having a type equal to the target type, similarly to step S701 (S702).
- the reference DB determination unit 15 compares the number of encrypted contents (CONT-NUM) and the number of decryption keys (KEY-NUM) (S703). If CONT—NUM is larger, select database 4 or 21 that stores the decryption key as the base (base) for content ID comparison (hereinafter “base DB” t) (S704) .
- the reference DB determination unit 15 selects the database 3 or 12 storing the encrypted content as the base DB (S705).
- CONT is set in the variable BASE—DB indicating the base DB.
- the ID comparison unit 16 performs an ID comparison process between the database storing the encrypted content and the database (KEY) storing the decryption key based on the database selected as the base DB. A set of the encrypted key content and the decryption key is searched (S706).
- FIG. 9 is a flowchart of the calculation process of the number of encrypted contents in step S701.
- the DB access unit 14 first initializes CONT-NUM, which is a variable for storing the number of encrypted contents, to 0 (S901). Next, the DB access unit 14 determines whether or not the search processing for all databases of the encrypted content DB 121 and the external encrypted content DB 3 to be searched is completed (S902). When the search is completed! /, The calculation of the number of encrypted contents is terminated. The finally calculated number of encryption contents is equal to the value of CONT—NUM! /.
- the DB access unit 14 determines that the search processing for all encrypted content included in the currently referenced database has been completed (S903). ). If the search is complete, the database to be searched is switched from the current database to another database (S908), and the process returns to step S902. For example, if the search of the encrypted content DB 121, which is the database to be searched, is completed and the search for the external encrypted database DB3 has not yet been performed, the database to be searched is externally transferred from the encrypted content DB 121. Encrypted content Switch to any database included in DB3.
- the DB access unit 14 refers to the content ID included in the entry in the currently referenced database, and confirms the content type (S904).
- the content type matches the target type (S905). In this determination process, as described with reference to FIG. 8, the consistency is determined based on whether or not the content type in the content ID matches the content type currently being searched. If it matches the target type, CONT_NUM is incremented by 1 (S906).
- the search position is changed from the currently referenced entry to the next entry (S907), and the process returns to step S903.
- FIG. 10 is a flowchart of the decryption key number calculation process in step S702.
- the processing contents are almost the same as in the case of the encryption content number calculation processing shown in FIG.
- the flow in Fig. 10 shows that the target to be calculated is not the number of encrypted content (CONT-NUM) but the number of decryption keys (KEY-NUM), and that the search target DB is encrypted content DB121 and externally encrypted content. Since the decryption key DB21 and the external decryption key DB4 are different from the flow in Fig. 9, the detailed description is omitted.
- FIG. 11 is a flowchart of the ID comparison process in step S706.
- the ID comparison unit 16 first determines whether the search process for all databases included in the base DB (BASE-DB) to be searched is completed (S 1101).
- the base DB to be searched here is the encrypted content DB12 when the variable BASE—DB is “CONT”.
- the ID comparison unit 16 determines whether or not the search processing for all entries included in the currently referenced database has been completed (S1102). If the search is complete, the search target database is switched from the current database to another database (S 1108), and the process returns to step S1101.
- step S1102 the content ID included in the entry in the database that is currently referred to is acquired (S1103).
- the content ID acquired in step SI 103 it is determined whether or not the content type matches the current search target (S 1104). If they match, the other database different from the base DB is referred to, and it is confirmed whether or not it exists in the other database including the content ID acquired in step S1103 (S1105).
- the other database is the decryption key DB21 or external decryption key DB4 when the variable BASE—DB is “CONT”, and the encrypted content DB12 1 or external encryption when the variable BASE—DB is “KEY”. I Content DB3.
- the effective content list is a list of effective content found in this ID comparison process. Finally, the list of valid contents stored in this list is displayed on the display unit 17 as a contents list.
- step S1104 or S1105 results in No, or if the processing in step S1106 ends, the entry search position is changed from the currently referenced entry to the next entry ( S1107), the process returns to step S1102.
- a list of corresponding encrypted content and decryption key can be retrieved from each database and displayed on the display unit 17.
- FIG. 12 shows an example in which only a decryption key DB21 including four entries exists as a database (DB) for storing decryption keys.
- Figure 13 shows the encrypted content DB 121, external encrypted content DB (# 1) 3a, external encrypted content DB (# 2) that contains four, four, and three entries respectively. ) Shows an example where 3b exists.
- the circle at the left end of the database means that the entry to which it is added is an entry related to Audio content in which both encrypted content and decryption key exist, and the triangle mark indicates that it is added.
- the entry is an entry related to video content in which both the encryption content and the decryption key exist.
- searching for 0x01 (Audio content) as the target type in the examples of FIGS. 12 and 13 will be described.
- the calculation process for the encrypted content DB 121 is first performed, and all entries of sort numbers 1 to 4 are sequentially performed. Refer to the content ID and determine whether it matches the target type.
- CONT—NUM Since the type matches the target type, 1 is added to the value of CONT—NUM. In addition, since the sort types 2 and 4 also have the same target type, the value of CONT-NUM is 3 when the B-sound content DB 121 search is completed. Similarly, search the external encrypted content DB (# 1) 3a and external encrypted content DB (# 2) 3b, and the number of entries that match the target type is 1 or 2, respectively. , CONT—NUM becomes 6 when the search of the three databases is completed.
- the content ID is sequentially referred to all the entries of the sort No. 1 force 4 in the decryption key DB21 to It is determined whether the type included in the ID matches the target type.
- the number of entries with the same target type is 3 in the entries included in this database, so KEY_NUM becomes 3.
- ID comparison is performed using the database including the decryption key as the base DB.
- First refer to the content ID for the sort No. 1 entry of the decryption key DB21 and compare it with the target type. In the example of FIG. 12, since the value of the fourth byte in the content ID is “01” (0x01, (Audio content)), it is determined that the target type matches.
- the entries of sort No. 2 in the encrypted content DB 121 have the same content ID. to add.
- An example of an effective content list is shown in FIG.
- “decryption key DB” is stored in the DB (database) name
- “2” is stored in the decryption key entry number
- “encrypted content DB” is stored in the DB name
- “2” is stored in the file number as information on the encrypted content.
- content information “0x10183401...” Is stored in the content ID, and “BBBB B” is stored in the title name. Information other than the content and title name is also stored as information related to the content.
- step S706 by setting the decryption key DB21 (KEY) having a smaller number of entries than the encrypted content DB3a, 3b, and 112 as the base DB (BASE—DB), the comparison process of step S706 is performed.
- the number of loops is three, and it becomes possible to perform correspondence search processing faster than when the base DB is encrypted content DB3a, 3b, 121.
- Setting the database with the smaller number of entries as the base DB is, for example, the ability to perform a binary search based on the sorted entries in the database and to find a match with the desired content ID. It is effective when confirming. If the number of valid entries with the smaller number of valid entries is M and the number of larger entries is N, and the binary search is performed in the confirmation process of step S1105, the time required for the comparison process is 0 (Mlog N). Become. this thing
- the correspondence search process can be performed at a higher speed when the number of valid entries is the base DB.
- the content search device 1 is an entry in which the content type matches the target type in each of the database storing the encrypted content and the database storing the decryption key.
- Calculate the number of (valid entries) CONT—NUM, KEY—NUM), set the smaller number of valid entries in the base DB, and set the other entry corresponding to each entry contained in that base DB.
- Database power Search .
- the total number of entries may be calculated, and the base DB may be set based on the total number of entries! /, .
- the present invention has been described based on the above embodiment, it is needless to say that the present invention is not limited to the above embodiment. Various modifications can be made without departing from the spirit of the present invention.
- the various numerical values described in the first embodiment of the present invention are examples, and may be changed to other values.
- the content ID does not necessarily have to take the form shown in Fig. 8, and the size need not be 16 bytes.
- the content ID may be generated and added when, for example, at least a plaintext decryption key or content is encrypted and becomes a decryption key or encrypted content.
- the decryption key DB21 is disposed in the removable recording medium 2, the encrypted content DB 121 is disposed in the internal recording device 12, and the other DB is disposed in the external recording device has been described. You may take it.
- the decryption key DB21 may exist in the recording device inside the content search device 1, or the external encrypted content DB3 and the external decryption key DB4 may not exist.
- the information shown in the example in which the information for identifying the content type is stored in the fourth byte of the content ID may be stored in another format. For example, it may be stored at the beginning of the content ID as shown in FIG. In this case, since the position where the target type entry is stored in the sort files 51 and 61 is fixed, the search efficiency is further improved. Further, as shown in FIG. 16, “type” may be stored in the sort files 51 and 61 in the decryption key DB 21 and the encrypted content DB 121 as information independent of the content ID.
- the decryption key DB 21 and the encrypted content DB 121 may be prepared independently for each content type.
- various files in the database can be stored in the Audio dedicated directory, Video dedicated directory, etc. There are methods such as storing them in separate directories or creating sort files 51 and 61 in the database for each type such as “AUDI O. SOT”, “VIDEO. SOT”, etc. If the database is made independent in this way, comparison with the target type is unnecessary and search efficiency is improved.
- the power of explaining the method of using the sort files 51 and 61 as an example of the key separation type content management method is not necessarily the use of the sort files 51 and 61.
- the decryption key file 52 and the encrypted content file 62 are not necessarily used. This method may be applied to configurations that only exist.
- the present invention may be applied to a DB that holds the number of entries.
- the number of entries to be held may be the number of entries including all content types, or may be the number of individual entries for each content type.
- FIG. 19 is a configuration diagram of the content search apparatus according to the second embodiment of the present invention.
- the configuration shown in FIG. 19 is that there is no external recording device IZF11 and reference DB determination unit 15 in the content search device 1, and there is no external encrypted content DB3 and external decryption key DB4 outside the content search device 1.
- the configuration of the decryption key DB 21 and the encryption key content DB 121 is the same as that shown in FIGS.
- the content ID format is the same as that shown in Fig. 8.
- the flow of content reproduction processing in the second embodiment is basically the same as that shown in FIG. 5, but the correspondence search processing in step S502 is different from that in the first embodiment.
- the correspondence search processing in the second embodiment will be described with reference to FIG.
- the search position is initialized (S2001).
- the search position exists individually for each database.
- KEY—POS is used as a variable indicating the search position of the decryption key DB 21
- CONT—POS is used as a variable indicating the search position of the encrypted content DB 121.
- "1" is set to each of KEY-POS and CONT-POS as initial values.
- the entries in the decryption key DB 21 are referred to in order, and the entries matching the target type are skipped (S2002). Specifically, referring to the sort file 51 of the decryption key DB21, the content ID included in the entry whose sort number is the same value as KEY—POS is acquired. If the content type included in the content ID matches the type currently being searched, the skip process ends and the process proceeds to the next step. If the type does not match, the KEY—POS is incremented by 1, and the same processing is performed for the entry whose sort number in the sort file 51 of the decryption key DB21 is the same as that of the KEY—POS. Repeat until the entry with the same type is obtained.
- the content ID (ID_A) of the entry that is currently referred to is acquired (S2003).
- the entries in the encrypted content DB 121 are sequentially referred to, the entries are skipped until the target types match, and the content ID (ID—B) is acquired (S2004, S2005).
- step S2002 it is determined whether or not the search has been completed up to the end of the decryption key DB 21 and the encrypted content DB 121 in the processing so far (S2006). If the search is complete, the process ends. If the search is not complete, ID—A and ID—B are compared (S2007). Them If the values match, it means that valid content has been found, so add information such as the decryption key entry number and title name to the valid content list, and add 1 each to KEY—POS and CONT—POS. And return to the processing of step S2002 (S2008, S200 9).
- step S2010 the magnitude relationship between ID-A and ID-B is determined (S2010). If ID—A force D—B is greater than ID—B force D—A, the entry in encrypted content DB 121 is skipped (S2011), and the process returns to step S2002. Specifically, refer to the sort file 61 in the encrypted content DB 121, read the content ID in order for the entry power that is the same value as the sort No. force SCONT_POS, and continue until the ID—A value or more is reached. The content ID is searched in order while adding 1 to. Similarly, if ID—A force D—B is smaller than ID—A, the entry in decryption key DB 21 is skipped until ID—A is equal to or greater than the value of I D—B (S2012), and the processing returns to step S2002.
- FIG. 21 shows an example in which four entries are stored in the decryption key DB21.
- FIG. 22 shows an example in which 8 entries are stored in the encrypted content DB 121.
- the circle at the left end of the database means that it is an entry related to audio content where both encrypted content and decryption key are added, and the triangular mark is the entry to which it is added. However, this means that the entry is for video content where both encrypted content and decryption key exist.
- 0x01 Anaudio content
- the content ID is referred to the entry of sort number 1 of the sort file 51 of the decryption key DB 21 and compared with the target type.
- the content ID is referred to the sort No. 1 entry in the encrypted content DB 121 and compared with the target type.
- the content ID of the entry corresponding to KEY—POS 2 (4th byte of 0xl07FB302 ' ⁇ is “02”, which is different from the target type and skipped.
- this content ID is acquired as ID—B.
- the content search device 1 in Embodiment 2 of the present invention uses the encrypted content DB and the decryption key stored in the encrypted content DB 121 and the decryption key DB 21 in a sorted state, respectively.
- searching for information on the content and searching for the correspondence (combination) between the two compare the content ID of the encryption content that is currently referenced and the content ID of the decryption key. Skip entries in the DB until the value is reached. As a result, it is possible to reduce unnecessary ID comparisons and perform a correspondence search between the encrypted content and the decryption key at high speed.
- the present invention has been described based on the above embodiment, it is needless to say that the present invention is not limited to the above embodiment. Various modifications can be made without departing from the spirit of the present invention.
- the various numerical values described in the second embodiment of the present invention are examples, and may be changed to other values.
- the content ID does not necessarily have to take the form shown in Fig. 8, and the size need not be 16 bytes.
- the configuration in which the decryption key DB 21 is arranged in the removable recording medium 2 and the encrypted content DB 121 is arranged in the internal recording device 12 has been described, but other configurations may be adopted.
- the decryption key DB21 may exist in the recording device inside the content search device 1.
- the information shown in the example in which the information for identifying the content type is stored in the fourth byte of the content ID may be stored in another format.
- the position where the target type entry is stored in the sort files 51 and 61 is fixed, so that the search efficiency is further improved.
- “type” may be stored in the sort files 51 and 61 in the decryption key DB2 1 and the encrypted content DB 121 as information independent of the content ID!
- the decryption key DB 21 and the encrypted content DB 121 may be prepared independently for each content type.
- various files in the database can be created and stored in separate directories such as the Audio dedicated directory and Video dedicated directory, or the sort files 51 and 61 in the database can be stored in "AU DIO. SOT "," VIDEO. SOT "etc., there is a method such as creating for each type. If the database is made independent in this way, comparison with the target type is unnecessary and search efficiency improves.
- the power described in the example in which the number of entries is not held in the database may be applied to a DB that holds the number of entries as shown in Fig. 18.
- the number of entries to be held may be the number of entries including all content types, or may be the number of entries for each content type.
- the content search apparatus when searching the correspondence between two parties with respect to the encrypted content and the decryption key managed by the key-separated content management method, Compare IDs based on the smaller number. This makes it possible to retrieve the correspondence (combination) between the encryption content and the decryption key at high speed.
- a content search device includes a PC application, a DVD recorder, an HDD recorder, a digital audio player, a digital TV, a digital TV, a digital TV, and a digital TV that support a key-separated content management method. It can be used as a digital still camera.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200780009428.0A CN102084376B (zh) | 2006-03-17 | 2007-03-09 | 内容检索装置 |
EP07738146A EP2000943A4 (en) | 2006-03-17 | 2007-03-09 | DEVICE FOR CONTINUOUS PURCHASE |
JP2008510758A JP5039693B2 (ja) | 2006-03-17 | 2007-03-09 | コンテンツ検索装置 |
US12/293,165 US20090147960A1 (en) | 2006-03-17 | 2007-03-09 | Content search device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006-073798 | 2006-03-17 | ||
JP2006073798 | 2006-03-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007119324A1 true WO2007119324A1 (ja) | 2007-10-25 |
Family
ID=38609130
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2007/054661 WO2007119324A1 (ja) | 2006-03-17 | 2007-03-09 | コンテンツ検索装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20090147960A1 (ja) |
EP (1) | EP2000943A4 (ja) |
JP (1) | JP5039693B2 (ja) |
CN (1) | CN102084376B (ja) |
WO (1) | WO2007119324A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010061374A (ja) * | 2008-09-03 | 2010-03-18 | Toshiba Corp | 表示装置および鍵管理方法 |
WO2010061801A1 (ja) * | 2008-11-28 | 2010-06-03 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 機密ファイルを保護するためのクライアント・コンピュータ、及びそのサーバ・コンピュータ、並びにその方法及びコンピュータ・プログラム |
JP2010237480A (ja) * | 2009-03-31 | 2010-10-21 | Toshiba Corp | コンテンツ保護装置およびコンテンツ保護方法 |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8161383B2 (en) * | 2007-06-26 | 2012-04-17 | Canon Kabushiki Kaisha | Information processing apparatus and information processing method |
US9059851B2 (en) * | 2010-02-23 | 2015-06-16 | Salesforce.Com, Inc. | Method and computer program product for order preserving symbol based encryption |
US8806223B2 (en) * | 2011-05-03 | 2014-08-12 | Douglas Norman Crowe | System and method for management of encrypted data |
US9116991B2 (en) * | 2011-08-16 | 2015-08-25 | Google Inc. | Searching encrypted electronic books |
US9256762B1 (en) | 2011-12-20 | 2016-02-09 | Amazon Technologies, Inc. | Securing a remote database |
US9514329B2 (en) * | 2012-03-30 | 2016-12-06 | Intellisist, Inc. | Computer-implemented system and method for individual message encryption using a unique key |
US8824680B2 (en) * | 2012-08-08 | 2014-09-02 | Verizon Patent And Licensing Inc. | Centralized key generation |
CN108270574B (zh) * | 2018-02-11 | 2021-02-09 | 浙江中控技术股份有限公司 | 一种白名单库文件的安全加载方法及装置 |
CN111010275A (zh) * | 2019-12-31 | 2020-04-14 | 嘉兴太美医疗科技有限公司 | 密钥管理方法、生成密钥的方法和密钥管理系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002288453A (ja) * | 2001-03-27 | 2002-10-04 | Sanyo Electric Co Ltd | 情報端末装置 |
JP2003030056A (ja) | 2001-07-16 | 2003-01-31 | Nec Corp | 電子情報配布システム及び方法 |
JP2003058430A (ja) * | 2001-08-14 | 2003-02-28 | Sony Corp | 情報記録処理装置、コンテンツ入出力管理装置、コンテンツ管理システム、および情報記録処理方法、コンテンツ入出力管理方法、コンテンツ管理方法、並びにコンピュータ・プログラム |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69228039T2 (de) * | 1991-05-08 | 1999-08-05 | Digital Equipment Corp., Maynard, Mass. | Lizenz-verwaltungssystem |
EP1531379B9 (en) * | 1995-02-13 | 2013-05-29 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7073063B2 (en) * | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
JP3389186B2 (ja) * | 1999-04-27 | 2003-03-24 | 松下電器産業株式会社 | 半導体メモリカード及び読み出し装置 |
JP2002062880A (ja) * | 2000-08-17 | 2002-02-28 | Sony Corp | コンテンツ再生装置 |
KR20020018011A (ko) * | 2000-08-29 | 2002-03-07 | 마츠시타 덴끼 산교 가부시키가이샤 | 컨텐츠 유통 시스템의 제어방법, 시스템, 컨텐츠의유통제어 프로그램, 및 그 프로그램을 기록한 기록매체 |
WO2002099558A2 (en) * | 2000-11-07 | 2002-12-12 | Matsushita Electric Industrial Co., Ltd. | Digital data distribution system |
US20040054678A1 (en) * | 2000-12-08 | 2004-03-18 | Ryuichi Okamoto | Distribution device, terminal device, and program and method for use therein |
JP2003058660A (ja) * | 2001-06-07 | 2003-02-28 | Matsushita Electric Ind Co Ltd | コンテンツ利用管理システム及びこれに用いられるサーバ |
JP4000846B2 (ja) * | 2001-12-12 | 2007-10-31 | 日本電気株式会社 | コンテンツ配信補償システム及びその方法、配信サーバ端末、クライアント端末並びにプログラム |
WO2003085929A1 (en) * | 2002-04-05 | 2003-10-16 | Matsushita Electric Industrial Co., Ltd. | Content using system |
JP2004094677A (ja) * | 2002-08-30 | 2004-03-25 | Toshiba Corp | コンテンツ流通システムの管理装置、閲覧用装置、プログラム及び方法 |
JP2004159036A (ja) * | 2002-11-06 | 2004-06-03 | Mitsubishi Electric Corp | 通信システム及び通信装置 |
US7493499B1 (en) * | 2003-05-22 | 2009-02-17 | Copyright Clearance Center, Inc. | Method and apparatus for secure delivery and rights management of digital content |
US7324648B1 (en) * | 2003-07-08 | 2008-01-29 | Copyright Clearance Center, Inc. | Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site |
US7373330B1 (en) * | 2003-07-08 | 2008-05-13 | Copyright Clearance Center, Inc. | Method and apparatus for tracking and controlling e-mail forwarding of encrypted documents |
US8006307B1 (en) * | 2003-07-09 | 2011-08-23 | Imophaze Research Co., L.L.C. | Method and apparatus for distributing secure digital content that can be indexed by third party search engines |
US7299500B1 (en) * | 2003-07-17 | 2007-11-20 | Copyright Clearance Center, Inc. | Method and apparatus for secure delivery and rights management of digital content at an unsecure site |
KR20060126958A (ko) * | 2003-10-14 | 2006-12-11 | 마츠시타 덴끼 산교 가부시키가이샤 | 콘텐츠 배신 방법 및 콘텐츠 서버 |
US7644446B2 (en) * | 2003-10-23 | 2010-01-05 | Microsoft Corporation | Encryption and data-protection for content on portable medium |
CN101091184B (zh) * | 2005-01-18 | 2010-04-14 | 松下电器产业株式会社 | 数据存储方法、数据记录装置和数据播放装置 |
MX2009000687A (es) * | 2006-12-12 | 2009-03-05 | Panasonic Corp | Aparato de emision de informacion de contenido, aparato de recepcion de informacion de contenido, metodo de emision de informacion de contenido y metodo de recpcion de informacion de contenido. |
-
2007
- 2007-03-09 EP EP07738146A patent/EP2000943A4/en not_active Withdrawn
- 2007-03-09 CN CN200780009428.0A patent/CN102084376B/zh not_active Expired - Fee Related
- 2007-03-09 US US12/293,165 patent/US20090147960A1/en not_active Abandoned
- 2007-03-09 JP JP2008510758A patent/JP5039693B2/ja not_active Expired - Fee Related
- 2007-03-09 WO PCT/JP2007/054661 patent/WO2007119324A1/ja active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002288453A (ja) * | 2001-03-27 | 2002-10-04 | Sanyo Electric Co Ltd | 情報端末装置 |
JP2003030056A (ja) | 2001-07-16 | 2003-01-31 | Nec Corp | 電子情報配布システム及び方法 |
JP2003058430A (ja) * | 2001-08-14 | 2003-02-28 | Sony Corp | 情報記録処理装置、コンテンツ入出力管理装置、コンテンツ管理システム、および情報記録処理方法、コンテンツ入出力管理方法、コンテンツ管理方法、並びにコンピュータ・プログラム |
Non-Patent Citations (1)
Title |
---|
See also references of EP2000943A4 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010061374A (ja) * | 2008-09-03 | 2010-03-18 | Toshiba Corp | 表示装置および鍵管理方法 |
WO2010061801A1 (ja) * | 2008-11-28 | 2010-06-03 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 機密ファイルを保護するためのクライアント・コンピュータ、及びそのサーバ・コンピュータ、並びにその方法及びコンピュータ・プログラム |
US8245042B2 (en) | 2008-11-28 | 2012-08-14 | International Business Machines Corporation | Shielding a sensitive file |
JP5270694B2 (ja) * | 2008-11-28 | 2013-08-21 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 機密ファイルを保護するためのクライアント・コンピュータ、及びそのサーバ・コンピュータ、並びにその方法及びコンピュータ・プログラム |
JP2010237480A (ja) * | 2009-03-31 | 2010-10-21 | Toshiba Corp | コンテンツ保護装置およびコンテンツ保護方法 |
US7984296B2 (en) | 2009-03-31 | 2011-07-19 | Kabushiki Kaisha Toshiba | Content protection device and content protection method |
Also Published As
Publication number | Publication date |
---|---|
EP2000943A1 (en) | 2008-12-10 |
EP2000943A4 (en) | 2012-01-04 |
CN102084376B (zh) | 2012-11-07 |
JPWO2007119324A1 (ja) | 2009-08-27 |
JP5039693B2 (ja) | 2012-10-03 |
CN102084376A (zh) | 2011-06-01 |
US20090147960A1 (en) | 2009-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007119324A1 (ja) | コンテンツ検索装置 | |
JP4850075B2 (ja) | データ格納方法、データ再生方法、データ記録装置、データ再生装置および記録媒体 | |
JP4022976B2 (ja) | 記録再生システム | |
AU784672B2 (en) | Distribution system, semiconductor memory card, receiving apparatus, computer-readable recording medium and receiving method | |
US20100281263A1 (en) | Recording device, server device, recording method, recording medium with computer program recorded therein and integrated circuit | |
US20090231968A1 (en) | Recording medium storing management information for content attribute and recording device and playback device for the recording medium | |
US20020073070A1 (en) | Information processing apparatus and method, and program storing medium | |
JP2007524895A (ja) | コンテンツ識別、個人ドメイン、著作権告知、メタデータ、および電子商取引 | |
JP2006313537A (ja) | 記録媒体及び情報処理装置 | |
US20020010826A1 (en) | Digital memory card and apparatus for reproducing data therefrom | |
US8090920B2 (en) | Recording medium, and information processing device and information processing method for the recording medium | |
WO2005062184A1 (ja) | データ処理装置およびデータ処理方法 | |
JP2004005816A (ja) | 情報記録再生装置及び情報記録再生方法 | |
KR100741482B1 (ko) | 멀티미디어 컨텐츠와 이에 대응하는 자막 정보를 개인용정보 처리기로 제공하기 위한 방법 및 그 시스템 | |
KR20010102179A (ko) | 정보 처리 장치, 정보 처리 방법, 및 프로그램 저장 매체 | |
US20080181313A1 (en) | Ubiquitous audio reproducing and servicing method and apparatus | |
JPWO2004111855A1 (ja) | 記録媒体、データ再生装置、データ記録装置、及びデータ再生方法 | |
US20060253807A1 (en) | Recording medium and data processing device | |
JP2006197303A (ja) | 鍵記録媒体及び再生装置 | |
JP2007200543A (ja) | 電子機器 | |
KR20060003797A (ko) | 정보통신단말기의 디지털 콘텐츠 저작권 보호를 위한콘텐츠 구매등록 및 사용료 청구 시스템과 그 방법 | |
JP2008192025A (ja) | コンテンツ検索システム及びコンテンツ検索方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780009428.0 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07738146 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12293165 Country of ref document: US Ref document number: 2008510758 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007738146 Country of ref document: EP |